Design and Analysis of Algorithms
|
|
- Augustus Warner
- 5 years ago
- Views:
Transcription
1 Design and Analysis of Algorithms CSE 5311 Lecture 5 Divide and Conquer: Fast Fourier Transform Junzhou Huang, Ph.D. Department of Computer Science and Engineering CSE5311 Design and Analysis of Algorithms 1
2 Reviewing: Master Theorem The master method applies to recurrences of the form T(n = a T(n/b + f (n, where constants a 1, b > 1, and f is asymptotically positive function 1. f (n = O(n log ba ε for some constant ε >, then T(n = Θ(n log ba 2. f (n = O(n log ba for some constant ε >, then T(n = Θ(n log ba lgn 3. f (n = O(n log ba + ε for some constant ε >, and if a f (n/b c f (n for some constant c < 1, then T(n = Θ( f (n. How to theoretically prove it? CSE5311 Design and Analysis of Algorithms 2
3 Fast Fourier Transform Applications Optics, acoustics, quantum physics, telecommunications, control systems Signal processing, speech recognition, data compression, image processing Machine learning, data mining, computer vision, big data analytics DVD, JPEG, MP3, MRI, CAT scan Charles van Loan: The FFT is one of the truly great computational developments of this [2th] century. It has changed the face of science and engineering so much that it is not an exaggeration to say that life as we know it would be very different without the FFT. CSE5311 Design and Analysis of Algorithms 3
4 Fast Fourier Transform History Gauss (185, Analyzed periodic motion of asteroid Ceres. Runge-König (1924. Laid theoretical groundwork. Danielson-Lanczos (1942. Efficient algorithm. Cooley-Tukey (1965. Monitoring nuclear tests in Soviet Union and tracking submarines. Rediscovered and popularized FFT. Importance not fully realized until advent of digital computers. CSE5311 Design and Analysis of Algorithms 4
5 Representation of Polynomials A polynomial in the variable x over an algebraic field F is representation of a function A(x as a formal sum Coefficient representation A( x n 1 = a j x j= a = ( a, a1,... an 1 j Point-value representation {( x, y,( x, y,...,( x, y } 1 1 n 1 n 1 Adding Multiplication Coefficient representation Θ( n 2 Θ( n Point-value representation Θ( n Θ( n CSE5311 Design and Analysis of Algorithms 5
6 Polynomials: Coefficient Representation Polynomial. [coefficient representation] Add: O(n arithmetic operations Evaluate: O(n using Horner's method. Multiply (convolve: O(n 2 using brute force. CSE5311 Design and Analysis of Algorithms 6
7 Polynomials: Point-Value Representation Fundamental theorem of algebra. [Gauss, PhD thesis]: A degree n polynomial with complex coefficients has n complex roots. Corollary. A degree n-1 polynomial A(x is uniquely specified by its evaluation at n distinct values of x. CSE5311 Design and Analysis of Algorithms 7
8 Polynomials: Point-Value Representation Polynomial. [Point-value representation] Add: O(n arithmetic operations Multiple: O(n, extend A(x and B(x to 2n-1 points Evaluate: O(n 2 using Lagrange's formula CSE5311 Design and Analysis of Algorithms 8
9 Converting Between Two Polynomial Representations Tradeoff between fast evaluation or fast multiplication. We want both! Goal. Make all ops fast by efficiently converting between two representations. CSE5311 Design and Analysis of Algorithms 9
10 Converting Between Two Polynomial Representations Coefficient to point-value: Given a polynomial a + a 1 x a n-1 x n-1, evaluate it at n distinct points x,..., x n-1. Brute Force! O(n 2 for matrix-vector multiply O(n 3 for Gaussian elimination Vandermonde matrix is invertible iff x i distinct Point-value to coefficient: Given n distinct points x,..., x n-1 and values y,..., y n-1, find unique polynomial a + a 1 x a n-1 x n-1 that has given values at given points. CSE5311 Design and Analysis of Algorithms 1
11 Coefficient to Point-Value Representation: Intuition Coefficient to point-value: Given a polynomial a + a 1 x a n-1 x n-1, evaluate it at n distinct points x,..., x n-1. Divide. Break polynomial up into even and odd powers. Why? Useful Trick Intuition. Choose four points to be ±1, ±i. Can evaluate polynomial of degree n at 4 points by evaluating two polynomials of degree n/2 at 2 points. CSE5311 Design and Analysis of Algorithms 11
12 Useful Trick A(x = a + a 1 x + a 2 x 2 + a 3 x a n-1 x n-1 A even (x = a + a 2 x + a 4 x a n-2 x (n-2/2 A odd (x = a 1 + a 3 x + a 5 x a n-1 x (n-2/2 Show: A(x = A even (x 2 + x A odd (x 2 CSE5311 Design and Analysis of Algorithms 12
13 Fast Multiplication Question. Can we use the linear-time multiplication method for polynomials in pointvalue form to expedite polynomial multiplication in coefficient form? Answer. Yes, but we are to be able to convert quickly from one form to another. a, a,..., a 1 n 1 b, b,..., b 1 n 1 Ordinary multiplication Time Θ(n² c,c 1,...,c2n 2 Evaluation Time Θ(n lg n Interpolation Time Θ(n lg n A ( ω, B( ω 2 n 2 n A ( ω, B( ω n 2 n M A ( ω, B( ω 2 n 1 2 n 1 2 n 2 n Pointwise multiplication Time Θ(n C( ω 2 n C( ω M 1 2 n C( ω 2 n 1 2 n CSE5311 Design and Analysis of Algorithms 13
14 Complex Roots of Unity n Z 1= There are exactly n complex roots of unity. They form a cyclic multiplication group: 2 = ik n ω k e π The value = 2 i n ω is called the primitive root of unity; all of the other complex 1 e π roots are powers of it. 2 i/8 ω = e π is the 8 th root of unity CSE5311 Design and Analysis of Algorithms 14
15 Complex Analysis Polar coordinates: re θi e θi = cos θ + i sin θ a is an n th root of unity if a n = 1 Square roots of unity: +1, -1 Fourth roots of unity: +1, -1, i, -i Eighth roots of unity: +1, -1, i, -i, β + iβ, β - iβ, -β + iβ, -β - iβ where β = sqrt(2 CSE5311 Design and Analysis of Algorithms 15
16 e 2πki/n e 2πi = 1 e πi = -1 n th roots of unity: e 2πki/n for k = n-1 Notation: ω k,n = e 2πki/n Interesting fact: 1 + ω k,n + ω 2 k,n + ω 3 k,n ω n-1 k,n = for k!= CSE5311 Design and Analysis of Algorithms 16
17 Discrete Fourier Transform (DFT Coefficient to point-value: Let F(x be the polynomial with degreebound n (power of 2, n 1 n 2 where F( x = a x + a x a n 1 n 2 Key idea: choose x k = ω k where ω is principal n th root of unity. Let y = F( ω k. Then k y L 1 a 2 n 1 y 1 ω ω ω 1 L a ( n 1 y 1 ω ω ω 2 = L * a 2 M M M M M M 2 n 1 2( n 1 ( n 1 y n 1 1 ω ω ω a L n 1 The vector y= ( y is called the Discrete Fourier Transform of vector, y1,... yn 1 a. The matrix is denoted by F ( n ω. CSE5311 Design and Analysis of Algorithms 17
18 How to find F n -1? Proposition. Let ω be a primitive l-th root of unity over a field L. Then 1 l k = if l > 1 k ω = 1 otherwise Proof. The l =1 case is immediate since ω=1. Since ω is a primitive l-th root, each ω k, k is a distinct l-th root of unity. Z Z Z Z Z l 2 l 1 1 = ( ωl ( ωl ( ωl...( ω l = l 1 l 1 l k l 1 l k ( l Z... ( 1 l k= k= = Z ω + + ω Comparing the coefficients of Z l-1 on the left and right hand sides of this equation proves the proposition. CSE5311 Design and Analysis of Algorithms 18
19 Inverse Matrix to F n Proposition. Let ω be an n-th root of unity. Then, F ( ω F ( ω = ne 1 n n n Proof. The ij element of F ( ωf ( ω th 1 n n n-1 n-1 ik ik k(i j k= k= is, if i j ω ω = ω = n, otherwise i j The i=j case is obvious. If i j then ω will be a primitive root of unity of order l, where l n. Applying the previous proposition completes the proof. So, F n ( ω = F n ( ω n Evaluating y= F n (ω a Interpolation 1 1 a= F n ( ω y n CSE5311 Design and Analysis of Algorithms 19
20 Fast Fourier Transform Goal. Evaluate a degree n-1 polynomial A(x = a + a 1 x + a 2 x 2 + a 3 x a n-1 x n-1 at its n th roots of unity: ω, ω 1,, ω n-1. Divide. Break polynomial up into even and odd powers. Conquer. Evaluate degree A even (x and A odd (x at the (n/2-th roots of unity: ν, ν 1,, ν n/2-1. Combine. CSE5311 Design and Analysis of Algorithms 2
21 Recursive FFT 1 n l e n g t h [ a ] 2 i f n = 1 3 t h e n r e t u r n a 4 ω e 5 ω 1 n 2 π i n [ ] 6 a ( a, a 2,..., a n - 2 [ 1 ] 7 a ( a 1, a 3,..., a n - 1 [ ] [ ] 8 y R e c u r s i v e - F F T ( a [ 1 ] [ 1 ] 9 y R e c u r s i v e - F F T ( a 1 f o r k t o n / d o y y + ω y [ ] [ 1 ] k k k 1 2 y y - ω y 1 3 ω ω ω 1 4 r e t u r n y [ ] [ 1 ] k + ( n / 2 k k n CSE5311 Design and Analysis of Algorithms 21
22 Time of the Recursive-FFT To determine the running time of procedure Recursive-FFT, we note, that exclusive of the recursive calls, each invocation takes time Θ(n, where n is the length of the input vector.the recurrence for the running time is therefore T(n = 2T(n/2 + Θ(n =? Θ(n log n CSE5311 Design and Analysis of Algorithms 22
23 More Effective Implementations [1] The for loop involves computing the value ω k nyk twice.we can change the loop(the butterfly operation: [] y k ω k n. for k [1] k [] y y +t k to n/2-1 do t ωy k [] y y -t k+(n/2 ω ωω [] y [] [1] k y ω k k nyk n y k +ω k y [] [1] k n k There are 1 complex multiplication and 2 complex additions CSE5311 Design and Analysis of Algorithms 23
24 x ( r 1 x ( r 2 x 1( = x( x 1(1 = x(2 x 1(2 = x(4 x 1(3 = x(6 x 2( = x(1 x 2(1 = x(3 x 2(2 = x(5 x 2(3 = x(7 N/2- point DFT N/2- point DFT X 1 ( X 1 (1 X 1 (2 X 1 (3 X 2 ( X 2 (1 X 2 (2 X 2 (3 W N 1 W N 2 W N 3 W N X ( X (1 X (2 X (3 X (4 X (5 X(6 X (7 N-point DFT CSE5311 Design and Analysis of Algorithms 24
25 x( x(4 x(2 x(6 x(1 x(5 x(3 x(7 W N W N W N W N W N 2 W N W N 2 W N W N 1 W N 2 W N 3 W N X ( X (1 X (2 X (3 X (4 X (5 X (6 X (7 CSE5311 Design and Analysis of Algorithms 25
26 Recursion Tree ( a, a1, a2, a3, a4, a5, a6, a7 ( a, a2, a4, a6 ( a1, a3, a5, a7 ( a, a4 ( a2, a6 ( a1, a5 ( a3, a7 ( a ( a4 ( a2 ( a6 ( a1 ( a5 ( a3 ( a7 1 We take the elements in pairs, compute the DFT of each pair, using one butterfly operation, and replace the pair with its DFT 2 We take these n/2 DFT s in pairs and compute the DFT of the four vector elements We take 2 (n/2-element DFT s and combine them using n/2 butterfly operations into the final n-element DFT CSE5311 Design and Analysis of Algorithms 26
27 Why Bit-reversed Order x( n n 2 1n n 1 n1 n x( x(1 x(1 x(11 x(1 x(11 x(11 x(111 x( x(4 x(2 x(6 x(1 x(5 x(3 x(7 CSE5311 Design and Analysis of Algorithms 27
28 Point-Value to Coefficient Representation: Inverse DFT Goal. Given the values y,..., y n-1 of a degree n-1 polynomial at the n points ω, ω 1,, ω n-1, find unique polynomial a + a 1 x a n-1 x n-1 that has given values at given points. CSE5311 Design and Analysis of Algorithms 28
29 Inverse DFT Inverse of Fourier matrix is given by following formula To compute inverse FFT, apply same algorithm but use ω -1 = e -2π i / n as principal n th root of unity (and divide by n. CSE5311 Design and Analysis of Algorithms 29
30 Inverse FFT CSE5311 Design and Analysis of Algorithms 3
31 Inverse FFT Theorem. Inverse FFT algorithm interpolates a degree n-1 polynomial given values at each of the n th roots of unity in O(n log n steps. CSE5311 Design and Analysis of Algorithms 31
32 Polynomial Multiplication Theorem: We can multiply two degree n-1 polynomials in O(n log n steps. CSE5311 Design and Analysis of Algorithms 32
33 A Parallel FFT Circuit ω 2 ω 4 ω 2 1 ω 4 ω 8 ω 2 1 ω 8 ω 2 ω 4 1 ω 4 2 ω 8 3 ω 8 CSE5311 Design and Analysis of Algorithms 33
5.6 Convolution and FFT
5.6 Convolution and FFT Fast Fourier Transform: Applications Applications. Optics, acoustics, quantum physics, telecommunications, control systems, signal processing, speech recognition, data compression,
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 14 Divide and Conquer Fast Fourier Transform Sofya Raskhodnikova 10/7/2016 S. Raskhodnikova; based on slides by K. Wayne. 5.6 Convolution and FFT Fast Fourier Transform:
More informationHow to Multiply. 5.5 Integer Multiplication. Complex Multiplication. Integer Arithmetic. Complex multiplication. (a + bi) (c + di) = x + yi.
How to ultiply Slides by Kevin Wayne. Copyright 5 Pearson-Addison Wesley. All rights reserved. integers, matrices, and polynomials Complex ultiplication Complex multiplication. a + bi) c + di) = x + yi.
More informationDIVIDE AND CONQUER II
DIVIDE AND CONQUER II master theorem integer multiplication matrix multiplication convolution and FFT Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley http://www.cs.princeton.edu/~wayne/kleinberg-tardos
More informationThe Fast Fourier Transform. Andreas Klappenecker
The Fast Fourier Transform Andreas Klappenecker Motivation There are few algorithms that had more impact on modern society than the fast Fourier transform and its relatives. The applications of the fast
More informationCSE 421 Algorithms. T(n) = at(n/b) + n c. Closest Pair Problem. Divide and Conquer Algorithms. What you really need to know about recurrences
CSE 421 Algorithms Richard Anderson Lecture 13 Divide and Conquer What you really need to know about recurrences Work per level changes geometrically with the level Geometrically increasing (x > 1) The
More informationCSE 548: Analysis of Algorithms. Lecture 4 ( Divide-and-Conquer Algorithms: Polynomial Multiplication )
CSE 548: Analysis of Algorithms Lecture 4 ( Divide-and-Conquer Algorithms: Polynomial Multiplication ) Rezaul A. Chowdhury Department of Computer Science SUNY Stony Brook Spring 2015 Coefficient Representation
More informationChapter 5. Divide and Conquer. CS 350 Winter 2018
Chapter 5 Divide and Conquer CS 350 Winter 2018 1 Divide-and-Conquer Divide-and-conquer. Break up problem into several parts. Solve each part recursively. Combine solutions to sub-problems into overall
More informationComputational Methods CMSC/AMSC/MAPL 460
Computational Methods CMSC/AMSC/MAPL 460 Fourier transform Balaji Vasan Srinivasan Dept of Computer Science Several slides from Prof Healy s course at UMD Last time: Fourier analysis F(t) = A 0 /2 + A
More informationCS S Lecture 5 January 29, 2019
CS 6363.005.19S Lecture 5 January 29, 2019 Main topics are #divide-and-conquer with #fast_fourier_transforms. Prelude Homework 1 is due Tuesday, February 5th. I hope you ve at least looked at it by now!
More informationDIVIDE AND CONQUER II
DIVIDE AND CONQUER II master theorem integer multiplication matrix multiplication convolution and FFT SECTION 5.6 Fourier analysis Fourier theorem. [Fourier, Dirichlet, Riemann] Any sufficiently smooth)
More informationThe Fast Fourier Transform: A Brief Overview. with Applications. Petros Kondylis. Petros Kondylis. December 4, 2014
December 4, 2014 Timeline Researcher Date Length of Sequence Application CF Gauss 1805 Any Composite Integer Interpolation of orbits of celestial bodies F Carlini 1828 12 Harmonic Analysis of Barometric
More informationFast Fourier Transform
Why Fourier Transform? Fast Fourier Transform Jordi Cortadella and Jordi Petit Department of Computer Science Polynomials: coefficient representation Divide & Conquer Dept. CS, UPC Polynomials: point-value
More informationIntroduction to Algorithms 6.046J/18.401J/SMA5503
Introduction to Algorithms 6.046J/8.40J/SMA5503 Lecture 3 Prof. Piotr Indyk The divide-and-conquer design paradigm. Divide the problem (instance) into subproblems. 2. Conquer the subproblems by solving
More informationChapter 1 Divide and Conquer Polynomial Multiplication Algorithm Theory WS 2015/16 Fabian Kuhn
Chapter 1 Divide and Conquer Polynomial Multiplication Algorithm Theory WS 2015/16 Fabian Kuhn Formulation of the D&C principle Divide-and-conquer method for solving a problem instance of size n: 1. Divide
More informationFFT: Fast Polynomial Multiplications
FFT: Fast Polynomial Multiplications Jie Wang University of Massachusetts Lowell Department of Computer Science J. Wang (UMass Lowell) FFT: Fast Polynomial Multiplications 1 / 20 Overview So far we have
More informationFast Convolution; Strassen s Method
Fast Convolution; Strassen s Method 1 Fast Convolution reduction to subquadratic time polynomial evaluation at complex roots of unity interpolation via evaluation at complex roots of unity 2 The Master
More informationData Structures and Algorithms CMPSC 465
Data Structures and Algorithms CMPSC 465 LECTURE 9 Solving recurrences Substitution method Adam Smith S. Raskhodnikova and A. Smith; based on slides by E. Demaine and C. Leiserson Review question Draw
More informationMultiplying huge integers using Fourier transforms
Fourier transforms October 25, 2007 820348901038490238478324 1739423249728934932894??? integers occurs in many fields of Computational Science: Cryptography Number theory... Traditional approaches to
More informationDivide and Conquer algorithms
Divide and Conquer algorithms Another general method for constructing algorithms is given by the Divide and Conquer strategy. We assume that we have a problem with input that can be split into parts in
More informationCS711008Z Algorithm Design and Analysis
CS711008Z Algorithm Design and Analysis Lecture 5 FFT and Divide and Conquer Dongbo Bu Institute of Computing Technology Chinese Academy of Sciences, Beijing, China 1 / 56 Outline DFT: evaluate a polynomial
More informationE The Fast Fourier Transform
Fourier Transform Methods in Finance By Umberto Cherubini Giovanni Della Lunga Sabrina Mulinacci Pietro Rossi Copyright 2010 John Wiley & Sons Ltd E The Fast Fourier Transform E.1 DISCRETE FOURIER TRASFORM
More informationChapter 1 Divide and Conquer Algorithm Theory WS 2016/17 Fabian Kuhn
Chapter 1 Divide and Conquer Algorithm Theory WS 2016/17 Fabian Kuhn Formulation of the D&C principle Divide-and-conquer method for solving a problem instance of size n: 1. Divide n c: Solve the problem
More informationFast Polynomial Multiplication
Fast Polynomial Multiplication Marc Moreno Maza CS 9652, October 4, 2017 Plan Primitive roots of unity The discrete Fourier transform Convolution of polynomials The fast Fourier transform Fast convolution
More informationWhat we have learned What is algorithm Why study algorithm The time and space efficiency of algorithm The analysis framework of time efficiency Asympt
Lecture 3 The Analysis of Recursive Algorithm Efficiency What we have learned What is algorithm Why study algorithm The time and space efficiency of algorithm The analysis framework of time efficiency
More informationChapter 5 Divide and Conquer
CMPT 705: Design and Analysis of Algorithms Spring 008 Chapter 5 Divide and Conquer Lecturer: Binay Bhattacharya Scribe: Chris Nell 5.1 Introduction Given a problem P with input size n, P (n), we define
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 9 Divide and Conquer Merge sort Counting Inversions Binary Search Exponentiation Solving Recurrences Recursion Tree Method Master Theorem Sofya Raskhodnikova S. Raskhodnikova;
More informationDivide and Conquer. Maximum/minimum. Median finding. CS125 Lecture 4 Fall 2016
CS125 Lecture 4 Fall 2016 Divide and Conquer We have seen one general paradigm for finding algorithms: the greedy approach. We now consider another general paradigm, known as divide and conquer. We have
More informationDivide and Conquer: Polynomial Multiplication Version of October 1 / 7, 24201
Divide and Conquer: Polynomial Multiplication Version of October 7, 2014 Divide and Conquer: Polynomial Multiplication Version of October 1 / 7, 24201 Outline Outline: Introduction The polynomial multiplication
More informationCS60020: Foundations of Algorithm Design and Machine Learning. Sourangshu Bhattacharya
CS60020: Foundations of Algorithm Design and Machine Learning Sourangshu Bhattacharya Matrix multiplication September 14, 2005 L2.27 Standard algorithm for i 1 to n do for j 1 ton do c ij 0 for k 1 to
More informationCOMS E F15. Lecture 22: Linearity Testing Sparse Fourier Transform
COMS E6998-9 F15 Lecture 22: Linearity Testing Sparse Fourier Transform 1 Administrivia, Plan Thu: no class. Happy Thanksgiving! Tue, Dec 1 st : Sergei Vassilvitskii (Google Research) on MapReduce model
More informationCSE 421 Algorithms: Divide and Conquer
CSE 42 Algorithms: Divide and Conquer Larry Ruzzo Thanks to Richard Anderson, Paul Beame, Kevin Wayne for some slides Outline: General Idea algorithm design paradigms: divide and conquer Review of Merge
More informationCS 577 Introduction to Algorithms: Strassen s Algorithm and the Master Theorem
CS 577 Introduction to Algorithms: Jin-Yi Cai University of Wisconsin Madison In the last class, we described InsertionSort and showed that its worst-case running time is Θ(n 2 ). Check Figure 2.2 for
More informationLecture 20: Discrete Fourier Transform and FFT
EE518 Digital Signal Processing University of Washington Autumn 2001 Dept of Electrical Engineering Lecture 20: Discrete Fourier Transform and FFT Dec 10, 2001 Prof: J Bilmes TA:
More informationHow to Write Fast Numerical Code Spring 2012 Lecture 19. Instructor: Markus Püschel TAs: Georg Ofenbeck & Daniele Spampinato
How to Write Fast Numerical Code Spring 2012 Lecture 19 Instructor: Markus Püschel TAs: Georg Ofenbeck & Daniele Spampinato Miscellaneous Roofline tool Project report etc. online Midterm (solutions online)
More informationDesign and Analysis of Algorithms Recurrence. Prof. Chuhua Xian School of Computer Science and Engineering
Design and Analysis of Algorithms Recurrence Prof. Chuhua Xian Email: chhxian@scut.edu.cn School of Computer Science and Engineering Course Information Instructor: Chuhua Xian ( 冼楚华 ) Email: chhxian@scut.edu.cn
More informationUniversity of the Virgin Islands, St. Thomas January 14, 2015 Algorithms and Programming for High Schoolers. Lecture 5
University of the Virgin Islands, St. Thomas January 14, 2015 Algorithms and Programming for High Schoolers Numerical algorithms: Lecture 5 Today we ll cover algorithms for various numerical problems:
More informationChapter 2. Recurrence Relations. Divide and Conquer. Divide and Conquer Strategy. Another Example: Merge Sort. Merge Sort Example. Merge Sort Example
Recurrence Relations Chapter 2 Divide and Conquer Equation or an inequality that describes a function by its values on smaller inputs. Recurrence relations arise when we analyze the running time of iterative
More informationAlgorithms and Data Structures
Charles A. Wuethrich Bauhaus-University Weimar - CogVis/MMC June 1, 2017 1/44 Space reduction mechanisms Range searching Elementary Algorithms (2D) Raster Methods Shell sort Divide and conquer Quicksort
More informationHow to Write Fast Numerical Code
How to Write Fast Numerical Code Lecture: Discrete Fourier transform, fast Fourier transforms Instructor: Markus Püschel TA: Georg Ofenbeck & Daniele Spampinato Rest of Semester Today Lecture Project meetings
More informationChapter 5. Divide and Conquer CLRS 4.3. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.
Chapter 5 Divide and Conquer CLRS 4.3 Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 1 Divide-and-Conquer Divide-and-conquer. Break up problem into several parts. Solve
More informationMatrix Multiplication
Matrix Multiplication Matrix Multiplication Matrix multiplication. Given two n-by-n matrices A and B, compute C = AB. n c ij = a ik b kj k=1 c 11 c 12 c 1n c 21 c 22 c 2n c n1 c n2 c nn = a 11 a 12 a 1n
More information4.3 The Discrete Fourier Transform (DFT) and the Fast Fourier Transform (FFT)
CHAPTER. TIME-FREQUECY AALYSIS: FOURIER TRASFORMS AD WAVELETS.3 The Discrete Fourier Transform (DFT and the Fast Fourier Transform (FFT.3.1 Introduction In this section, we discuss some of the mathematics
More informationAnalysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort
Analysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort Xi Chen Columbia University We continue with two more asymptotic notation: o( ) and ω( ). Let f (n) and g(n) are functions that map
More informationCS 4407 Algorithms Lecture 3: Iterative and Divide and Conquer Algorithms
CS 4407 Algorithms Lecture 3: Iterative and Divide and Conquer Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Lecture Outline CS 4407, Algorithms Growth Functions
More informationDIVIDE AND CONQUER II
DIVIDE AND CONQUER II master theorem integer multiplication matrix multiplication convolution and FFT DIVIDE AND CONQUER II master theorem integer multiplication matrix multiplication convolution and FFT
More informationTaking Stock. IE170: Algorithms in Systems Engineering: Lecture 3. Θ Notation. Comparing Algorithms
Taking Stock IE170: Algorithms in Systems Engineering: Lecture 3 Jeff Linderoth Department of Industrial and Systems Engineering Lehigh University January 19, 2007 Last Time Lots of funky math Playing
More informationCS 4407 Algorithms Lecture 2: Iterative and Divide and Conquer Algorithms
CS 4407 Algorithms Lecture 2: Iterative and Divide and Conquer Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Lecture Outline CS 4407, Algorithms Growth Functions
More informationFast reversion of formal power series
Fast reversion of formal power series Fredrik Johansson LFANT, INRIA Bordeaux RAIM, 2016-06-29, Banyuls-sur-mer 1 / 30 Reversion of power series F = exp(x) 1 = x + x 2 2! + x 3 3! + x 4 G = log(1 + x)
More informationMid-term Exam Answers and Final Exam Study Guide CIS 675 Summer 2010
Mid-term Exam Answers and Final Exam Study Guide CIS 675 Summer 2010 Midterm Problem 1: Recall that for two functions g : N N + and h : N N +, h = Θ(g) iff for some positive integer N and positive real
More informationChapter 4 Divide-and-Conquer
Chapter 4 Divide-and-Conquer 1 About this lecture (1) Recall the divide-and-conquer paradigm, which we used for merge sort: Divide the problem into a number of subproblems that are smaller instances of
More informationElliptic Curves Spring 2013 Lecture #3 02/12/2013
18.783 Elliptic Curves Spring 2013 Lecture #3 02/12/2013 3.1 Arithmetic in finite fields To make explicit computations with elliptic curves over finite fields, we need to know how to perform arithmetic
More informationAlgorithms and data structures
Algorithms and data structures Amin Coja-Oghlan LFCS Complex numbers Roots of polynomials A polynomial of degree d is a function of the form p(x) = d a i x i with a d 0. i=0 There are at most d numbers
More informationSequential Fast Fourier Transform (PSC ) Sequential FFT
Sequential Fast Fourier Transform (PSC 3.1 3.2) 1 / 18 Applications of Fourier analysis Fourier analysis studies the decomposition of functions into their frequency components. Piano Concerto no. 9 by
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More informationKartsuba s Algorithm and Linear Time Selection
CS 374: Algorithms & Models of Computation, Fall 2015 Kartsuba s Algorithm and Linear Time Selection Lecture 09 September 22, 2015 Chandra & Manoj (UIUC) CS374 1 Fall 2015 1 / 32 Part I Fast Multiplication
More informationChapter 5. Divide and Conquer CLRS 4.3. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.
Chapter 5 Divide and Conquer CLRS 4.3 Slides by Kevin Wayne. Copyright 25 Pearson-Addison Wesley. All rights reserved. Divide-and-Conquer Divide-and-conquer. Break up problem into several parts. Solve
More informationCOMP 382: Reasoning about algorithms
Fall 2014 Unit 4: Basics of complexity analysis Correctness and efficiency So far, we have talked about correctness and termination of algorithms What about efficiency? Running time of an algorithm For
More informationCS483 Design and Analysis of Algorithms
CS483 Design and Analysis of Algorithms Lecture 6-8 Divide and Conquer Algorithms Instructor: Fei Li lifei@cs.gmu.edu with subject: CS483 Office hours: STII, Room 443, Friday 4:00pm - 6:00pm or by appointments
More informationCopyright 2000, Kevin Wayne 1
Divide-and-Conquer Chapter 5 Divide and Conquer Divide-and-conquer. Break up problem into several parts. Solve each part recursively. Combine solutions to sub-problems into overall solution. Most common
More informationDIVIDE AND CONQUER II
DIVIDE AND CONQUER II DIVIDE AND CONQUER II master theorem integer multiplication matrix multiplication convolution and FFT master theorem integer multiplication matrix multiplication convolution and FFT
More informationAlgorithms and Data Structures Strassen s Algorithm. ADS (2017/18) Lecture 4 slide 1
Algorithms and Data Structures Strassen s Algorithm ADS (2017/18) Lecture 4 slide 1 Tutorials Start in week (week 3) Tutorial allocations are linked from the course webpage http://www.inf.ed.ac.uk/teaching/courses/ads/
More informationCS168: The Modern Algorithmic Toolbox Lecture #11: The Fourier Transform and Convolution
CS168: The Modern Algorithmic Toolbox Lecture #11: The Fourier Transform and Convolution Tim Roughgarden & Gregory Valiant May 8, 2015 1 Intro Thus far, we have seen a number of different approaches to
More informationA design paradigm. Divide and conquer: (When) does decomposing a problem into smaller parts help? 09/09/ EECS 3101
A design paradigm Divide and conquer: (When) does decomposing a problem into smaller parts help? 09/09/17 112 Multiplying complex numbers (from Jeff Edmonds slides) INPUT: Two pairs of integers, (a,b),
More informationThe maximum-subarray problem. Given an array of integers, find a contiguous subarray with the maximum sum. Very naïve algorithm:
The maximum-subarray problem Given an array of integers, find a contiguous subarray with the maximum sum. Very naïve algorithm: Brute force algorithm: At best, θ(n 2 ) time complexity 129 Can we do divide
More informationFast Multipole Methods: Fundamentals & Applications. Ramani Duraiswami Nail A. Gumerov
Fast Multipole Methods: Fundamentals & Applications Ramani Duraiswami Nail A. Gumerov Week 1. Introduction. What are multipole methods and what is this course about. Problems from physics, mathematics,
More informationChapter 4. Recurrences
Chapter 4. Recurrences Outline Offers three methods for solving recurrences, that is for obtaining asymptotic bounds on the solution In the substitution method, we guess a bound and then use mathematical
More informationTutorials. Algorithms and Data Structures Strassen s Algorithm. The Master Theorem for solving recurrences. The Master Theorem (cont d)
DS 2018/19 Lecture 4 slide 3 DS 2018/19 Lecture 4 slide 4 Tutorials lgorithms and Data Structures Strassen s lgorithm Start in week week 3 Tutorial allocations are linked from the course webpage http://www.inf.ed.ac.uk/teaching/courses/ads/
More informationAsymptotic Analysis and Recurrences
Appendix A Asymptotic Analysis and Recurrences A.1 Overview We discuss the notion of asymptotic analysis and introduce O, Ω, Θ, and o notation. We then turn to the topic of recurrences, discussing several
More informationDivide and Conquer. CSE21 Winter 2017, Day 9 (B00), Day 6 (A00) January 30,
Divide and Conquer CSE21 Winter 2017, Day 9 (B00), Day 6 (A00) January 30, 2017 http://vlsicad.ucsd.edu/courses/cse21-w17 Merging sorted lists: WHAT Given two sorted lists a 1 a 2 a 3 a k b 1 b 2 b 3 b
More informationThe Divide-and-Conquer Design Paradigm
CS473- Algorithms I Lecture 4 The Divide-and-Conquer Design Paradigm CS473 Lecture 4 1 The Divide-and-Conquer Design Paradigm 1. Divide the problem (instance) into subproblems. 2. Conquer the subproblems
More informationSpeedy Maths. David McQuillan
Speedy Maths David McQuillan Basic Arithmetic What one needs to be able to do Addition and Subtraction Multiplication and Division Comparison For a number of order 2 n n ~ 100 is general multi precision
More informationThe Master Theorem for solving recurrences. Algorithms and Data Structures Strassen s Algorithm. Tutorials. The Master Theorem (cont d)
The Master Theorem for solving recurrences lgorithms and Data Structures Strassen s lgorithm 23rd September, 2014 Theorem Let n 0 N, k N 0 and a, b R with a > 0 and b > 1, and let T : N R satisfy the following
More information! Break up problem into several parts. ! Solve each part recursively. ! Combine solutions to sub-problems into overall solution.
Divide-and-Conquer Chapter 5 Divide and Conquer Divide-and-conquer.! Break up problem into several parts.! Solve each part recursively.! Combine solutions to sub-problems into overall solution. Most common
More informationNAME (1 pt): SID (1 pt): TA (1 pt): Name of Neighbor to your left (1 pt): Name of Neighbor to your right (1 pt):
CS 170 First Midterm 26 Feb 2010 NAME (1 pt): SID (1 pt): TA (1 pt): Name of Neighbor to your left (1 pt): Name of Neighbor to your right (1 pt): Instructions: This is a closed book, closed calculator,
More informationThe divide-and-conquer strategy solves a problem by: 1. Breaking it into subproblems that are themselves smaller instances of the same type of problem
Chapter 2. Divide-and-conquer algorithms The divide-and-conquer strategy solves a problem by: 1. Breaking it into subproblems that are themselves smaller instances of the same type of problem. 2. Recursively
More informationAlgorithms Chapter 4 Recurrences
Algorithms Chapter 4 Recurrences Instructor: Ching Chi Lin 林清池助理教授 chingchi.lin@gmail.com Department of Computer Science and Engineering National Taiwan Ocean University Outline The substitution method
More informationInput Decidable Language -- Program Halts on all Input Encoding of Input -- Natural Numbers Encoded in Binary or Decimal, Not Unary
Complexity Analysis Complexity Theory Input Decidable Language -- Program Halts on all Input Encoding of Input -- Natural Numbers Encoded in Binary or Decimal, Not Unary Output TRUE or FALSE Time and Space
More informationFast Fourier Transform
Fast Fourier Transform December 8, 2016 FFT JPEG RGB Y C B C R (luma (brightness), chroma 2 (color)) chroma resolution is reduced image is split in blocks 8 8 pixels JPEG RGB Y C B C R (luma (brightness),
More informationDivide-and-conquer algorithm
Divide-and-conquer algorithm IDEA: n n matrix = 2 2 matrix of (n/2) (n/2) submatrices: r=ae+bg s=af+bh t =ce+dh u=cf+dg r t s u = a c e g September 15, 2004 Introduction to Algorithms L3.31 b d C = A B
More informationarxiv:math/ v1 [math.na] 12 Jul 2004
arxiv:math/0407177v1 [math.na] 12 Jul 2004 On improving the accuracy of Horner s and Goertzel s algorithms Alica Smoktunowicz and Iwona Wróbel Faculty of Mathematics and Information Science, Warsaw University
More informationSequential Fast Fourier Transform
Sequential Fast Fourier Transform Departement Computerwetenschappen Room 03.018 (Celestijnenlaan 200A) albert-jan.yzelman@cs.kuleuven.be Includes material from slides by Prof. dr. Rob H. Bisseling Applications
More informationComputer Vision, Convolutions, Complexity and Algebraic Geometry
Computer Vision, Convolutions, Complexity and Algebraic Geometry D. V. Chudnovsky, G.V. Chudnovsky IMAS Polytechnic Institute of NYU 6 MetroTech Center Brooklyn, NY 11201 December 6, 2012 Fast Multiplication:
More informationCS/COE 1501 cs.pitt.edu/~bill/1501/ Integer Multiplication
CS/COE 1501 cs.pitt.edu/~bill/1501/ Integer Multiplication Integer multiplication Say we have 5 baskets with 8 apples in each How do we determine how many apples we have? Count them all? That would take
More informationPart IB Numerical Analysis
Part IB Numerical Analysis Definitions Based on lectures by G. Moore Notes taken by Dexter Chua Lent 206 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after
More informationPractical Session #3 - Recursions
Practical Session #3 - Recursions Substitution method Guess the form of the solution and prove it by induction Iteration Method Convert the recurrence into a summation and solve it Tightly bound a recurrence
More informationThe tangent FFT. D. J. Bernstein University of Illinois at Chicago
The tangent FFT D. J. Bernstein University of Illinois at Chicago Advertisement SPEED: Software Performance Enhancement for Encryption and Decryption A workshop on software speeds for secret-key cryptography
More informationData Structures and Algorithms CSE 465
Data Structures and Algorithms CSE 465 LECTURE 8 Analyzing Quick Sort Sofya Raskhodnikova and Adam Smith Reminder: QuickSort Quicksort an n-element array: 1. Divide: Partition the array around a pivot
More informationCPS 616 DIVIDE-AND-CONQUER 6-1
CPS 616 DIVIDE-AND-CONQUER 6-1 DIVIDE-AND-CONQUER Approach 1. Divide instance of problem into two or more smaller instances 2. Solve smaller instances recursively 3. Obtain solution to original (larger)
More information23. The Finite Fourier Transform and the Fast Fourier Transform Algorithm
23. The Finite Fourier Transform and the Fast Fourier Transform Algorithm 23.1 Introduction: Fourier Series Early in the Nineteenth Century, Fourier studied sound and oscillatory motion and conceived of
More informationAnalysis of Algorithms Generating Functions II. Holger Findling
Generating Functions II Holger Findling Lecture notes are obtained from Fundamentals of Algorithmics, Gilles Brassard and Paul Bratley. Inhomogeneous Recurrences. The solution of a linear recurrence with
More informationDesign Patterns for Data Structures. Chapter 3. Recursive Algorithms
Chapter 3 Recursive Algorithms Writing recurrences + Writing recurrences To determine the statement execution count is a two-step problem. Write down the recurrence from the recursive code for the algorithm.
More informationOld and new algorithms for computing Bernoulli numbers
Old and new algorithms for computing Bernoulli numbers University of New South Wales 25th September 2012, University of Ballarat Bernoulli numbers Rational numbers B 0, B 1,... defined by: x e x 1 = n
More informationCMPSCI611: Three Divide-and-Conquer Examples Lecture 2
CMPSCI611: Three Divide-and-Conquer Examples Lecture 2 Last lecture we presented and analyzed Mergesort, a simple divide-and-conquer algorithm. We then stated and proved the Master Theorem, which gives
More informationProblem Set 1 Solutions
Introduction to Algorithms September 24, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Piotr Indyk and Charles E. Leiserson Handout 7 Problem Set 1 Solutions Exercise 1-1. Do Exercise
More informationTransforms and Orthogonal Bases
Orthogonal Bases Transforms and Orthogonal Bases We now turn back to linear algebra to understand transforms, which map signals between different domains Recall that signals can be interpreted as vectors
More informationDivide and Conquer. Andreas Klappenecker
Divide and Conquer Andreas Klappenecker The Divide and Conquer Paradigm The divide and conquer paradigm is important general technique for designing algorithms. In general, it follows the steps: - divide
More informationAsymptotic Algorithm Analysis & Sorting
Asymptotic Algorithm Analysis & Sorting (Version of 5th March 2010) (Based on original slides by John Hamer and Yves Deville) We can analyse an algorithm without needing to run it, and in so doing we can
More informationOn the Weight Distribution of N-th Root Codes
Fabrizio Caruso Marta Giorgetti June 10, 2009 The Recurrence Proof by Generating Functions A Computer-Generated Proof Computing Some Steps of the Recurrence A Computer-Provable Identity Proving the Guessed
More informationELEG 305: Digital Signal Processing
ELEG 5: Digital Signal Processing Lecture 6: The Fast Fourier Transform; Radix Decimatation in Time Kenneth E. Barner Department of Electrical and Computer Engineering University of Delaware Fall 8 K.
More information