Spectral Analysis of the Adjacency Matrix of Random Geometric Graphs

Total Page:16

File Type:pdf, Size:1020Kb

Spectral Analysis of the Adjacency Matrix of Random Geometric Graphs Spectral Analysis of the Adjacency Matrix of Random Geometric Graphs Mounia Hamidouche?, Laura Cottatellucciy, Konstantin Avrachenkov ? Departement of Communication Systems, EURECOM, Campus SophiaTech, 06410 Biot, France y Department of Electrical, Electronics, and Communication Engineering, FAU, 51098 Erlangen, Germany Inria, 2004 Route des Lucioles, 06902 Valbonne, France [email protected], [email protected], [email protected]. Abstract—In this article, we analyze the limiting eigen- multivariate statistics of high-dimensional data. In this case, value distribution (LED) of random geometric graphs the coordinates of the nodes can represent the attributes of (RGGs). The RGG is constructed by uniformly distribut- the data. Then, the metric imposed by the RGG depicts the ing n nodes on the d-dimensional torus Td ≡ [0; 1]d and similarity between the data. connecting two nodes if their `p-distance, p 2 [1; 1] is at In this work, the RGG is constructed by considering a most rn. In particular, we study the LED of the adjacency finite set Xn of n nodes, x1; :::; xn; distributed uniformly and matrix of RGGs in the connectivity regime, in which independently on the d-dimensional torus Td ≡ [0; 1]d. We the average vertex degree scales as log (n) or faster, i.e., choose a torus instead of a cube in order to avoid boundary Ω (log(n)). In the connectivity regime and under some effects. Given a geographical distance, rn > 0, we form conditions on the radius rn, we show that the LED of a graph by connecting two nodes xi; xj 2 Xn if their `p- the adjacency matrix of RGGs converges to the LED of distance, p 2 [1; 1] is at most rn, i.e., kxi − xjkp ≤ rn, the adjacency matrix of a deterministic geometric graph where k:kp is the `p-metric defined as (DGG) with nodes in a grid as n goes to infinity. Then, for 8 1=p n finite, we use the structure of the DGG to approximate > Pd (k) (k) p < k=1 jxi − xj j p 2 [1; 1); the eigenvalues of the adjacency matrix of the RGG and kxi−xjkp = > (k) (k) provide an upper bound for the approximation error. : maxfjxi − xj j; k 2 [1; d]g p = 1: Index Terms—Random geometric graphs, adjacency matrix, limiting eigenvalue distribution, Levy distance. The RGG is denoted by G(Xn; rn). Note that for the case p = 2 we obtain the Euclidean metric on Rd. Typically, the function rn is chosen such that rn ! 0 when n ! 1. I. Introduction The degree of a vertex in G(Xn; rn) is the number of edges connected to it. The average vertex degree in G(Xn; rn) is In recent years, random graph theory has been applied given by [3] to model many complex real-world phenomena. A basic (d) d an = θ nrn; random graph used to model complex networks is the Erdös- Rényi (ER) graph [1], where edges between the nodes appear where θ(d) = πd=2=Γ(d=2 + 1) denotes the volume of the d- arXiv:1910.08871v1 [math.SP] 20 Oct 2019 with equal probabilities. In [2], the author introduces another dimensional unit hypersphere in Td and Γ(:) is the Gamma random graph called random geometric graph (RGG) where function. nodes have some random position in a metric space and the Different values of rn, or equivalently an, lead to different edges are determined by the position of these nodes. Since geometric structures in RGGs. In [3], different interesting then, RGG properties have been widely studied [3]. regimes are introduced: the connectivity regime in which an RGGs are very useful to model problems in which the scales as log(n) or faster, i.e., Ω(log(n))1, the thermody- geographical distance is a critical factor. For example, RGGs namic regime in which an ≡ γ, for γ > 0 and the dense have been applied to wireless communication network [4], regime, i.e., an ≡ Θ(n): sensor network [5] and to study the dynamics of a viral RGGs can be described by a variety of random matrices spreading in a specific network of interactions [6], [7]. such as adjacency matrices, transition probability matrices Another motivation for RGGs in arbitrary dimensions is and normalized Laplacian. The spectral properties of those This research was funded by the French Government through 1The notation f(n) = Ω(g(n)) indicates that f(n) is bounded the Investments for the Future Program with Reference: Labex below by g(n) asymptotically, i.e., 9K > 0 and no 2 N such that UCN@Sophia-UDCBWN. 8n > n0 f(n) ≥ Kg(n). random matrices are powerful tools to predict and analyze where the term χ[xi s xj] takes the value 1 when there is a complex networks behavior. In this work, we give a special connection between nodes xi and xj in G(Xn; rn) and zero attention to the limiting eigenvalue distribution (LED) of the otherwise, represented as adjacency matrix of RGGs in the connectivity regime. 8 Some works analyzed the spectral properties of RGGs in <> 1; kxi − xjkp ≤ rn; i 6= j; p 2 [1; 1] different regimes. In particular, in the thermodynamic regime, χ[xi s xj] = > the authors in [8], [9] show that the spectral measure of the : 0; otherwise: adjacency matrix of RGGs has a limit as n ! 1. However, A similar definition holds for A(Dn) defined over due to the difficulty to compute exactly this spectral measure, G(Dn; rn). The matrices A(Xn) and A(Dn) are symmetric Bordenave in [8] proposes an approximation for it as γ ! 1. and their spectrum consists of real eigenvalues. We denote In the connectivity regime, the work in [6] provides a by fλi; i = 1; ::; ng and fµi; i = 1; ::; ng the sets of all real closed form expression for the asymptotic spectral moments eigenvalues of the real symmetric square matrices A(Dn) of the adjacency matrix of G(Xn; rn). Additionnaly, Bor- and A(Xn) of order n, respectively. The empirical spectral denave in [8] characterizes the spectral measure of the adja- 0 distribution functions vn(x) and vn(x) of the adjacency cency matrix normalized by n in the dense regime. However, matrices of an RGG and a DGG, respectively are defined in the connectivity regime and as n ! 1, the normalization as factor n puts to zero all the eigenvalues of the adjacency n n 1 X 1 X matrix that are finite and only the infinite eigenvalues in the v (x) = Ifµ ≤ xg and v0 (x) = Ifλ ≤ xg; n n i n n i adjacency matrix are nonzero in the normalized adjacency i=1 i=1 matrix. Motivated by this results, in this work we analyze the where IfBg denotes the indicator of an event B. behavior of the eigenvalues of the adjacency matrix without Let a0 be the degree of the nodes in G(D ; r ). In the normalization in the connectivity regime and in a wider range n n n following Lemma 1 we provide an upper bound for a0 under of the connectivity regime. n any ` -metric. First, we propose an approximation for the actual LED of p the RGG. Then, we provide a bound on the Levy distance Lemma 1. For any chosen `p-metric with p 2 [1; 1] and between this approximation and the actual distribution. More d ≥ 1, we have precisely, for > 0 we show that the LEDs of the adjacency d 0 1 d 1 matrices of the RGG and the deterministic geometric graph a ≤ d p 2 a 1 + : n n 1=d (DGG) with nodes in a grid converge to the same limit when 2an p 2 an scales as Ω(log (n) n) for d = 1 and as Ω(log (n)) for Proof. See Appendix A d ≥ 2. Then, under the `1-metric we provide an analytical approximation for the eigenvalues of the adjacency matrix of To prove our result on the concentration of the LED of RGGs by taking the d-dimensional discrete Fourier transform RGGs and investigate its relationship with the LED of DGGs (DFT) of an n = Nd tensor of rank d obtained from the first under any `p-metric, we use the Levy distance between two block row of the adjacency matrix of the DGG. distribution functions defined as follows. A B The rest of this paper is organized as follows. In Section Definition 1. ([10], page 257) Let vn and vn be two II we describe the model, then we present our main results A B distribution functions on R. The Levy distance L(vn ; vn ) on the concentration of the LED of large RGGs in the between them is the infimum of all positive such that, for connectivity regime. Numerical results are given in Section all x 2 R III to validate the theoretical results. Finally, conclusions are A B A given in Section IV. vn (x − ) − ≤ vn (x) ≤ vn (x + ) + . Lemma 2. ([11], page 614) Let A and B be two n × n Her- II. Spectral Analysis of RGGs mitian matrices with eigenvalues λ1; :::; λn and µ1; :::; µn, To study the spectrum of G(Xn; rn) we introduce an respectively. Then auxiliary graph called the DGG. The DGG denoted by 1 L3(vA; vB) tr(A − B)2; G(Dn; rn) is formed by letting Dn be the set of n grid points n n 6 n that are at the intersections of axes parallel hyperplanes with A B −1=d 0 0 where L(vn ; vn ) denotes the Levy distance between the separation n , and connecting two points xi, xj 2 Dn A B 0 0 empirical distribution functions vn and vn of the eigenvalues if kxi − xjkp ≤ rn with p 2 [1; 1].
Recommended publications
  • Network Topologies Topologies
    Network Topologies Topologies Logical Topologies A logical topology describes how the hosts access the medium and communicate on the network. The two most common types of logical topologies are broadcast and token passing. In a broadcast topology, a host broadcasts a message to all hosts on the same network segment. There is no order that hosts must follow to transmit data. Messages are sent on a First In, First Out (FIFO) basis. Token passing controls network access by passing an electronic token sequentially to each host. If a host wants to transmit data, the host adds the data and a destination address to the token, which is a specially-formatted frame. The token then travels to another host with the destination address. The destination host takes the data out of the frame. If a host has no data to send, the token is passed to another host. Physical Topologies A physical topology defines the way in which computers, printers, and other devices are connected to a network. The figure provides six physical topologies. Bus In a bus topology, each computer connects to a common cable. The cable connects one computer to the next, like a bus line going through a city. The cable has a small cap installed at the end called a terminator. The terminator prevents signals from bouncing back and causing network errors. Ring In a ring topology, hosts are connected in a physical ring or circle. Because the ring topology has no beginning or end, the cable is not terminated. A token travels around the ring stopping at each host.
    [Show full text]
  • Arxiv:2105.00793V3 [Math.NA] 14 Jun 2021 Tubal Matrices
    Tubal Matrices Liqun Qi∗ and ZiyanLuo† June 15, 2021 Abstract It was shown recently that the f-diagonal tensor in the T-SVD factorization must satisfy some special properties. Such f-diagonal tensors are called s-diagonal tensors. In this paper, we show that such a discussion can be extended to any real invertible linear transformation. We show that two Eckart-Young like theo- rems hold for a third order real tensor, under any doubly real-preserving unitary transformation. The normalized Discrete Fourier Transformation (DFT) matrix, an arbitrary orthogonal matrix, the product of the normalized DFT matrix and an arbitrary orthogonal matrix are examples of doubly real-preserving unitary transformations. We use tubal matrices as a tool for our study. We feel that the tubal matrix language makes this approach more natural. Key words. Tubal matrix, tensor, T-SVD factorization, tubal rank, B-rank, Eckart-Young like theorems AMS subject classifications. 15A69, 15A18 1 Introduction arXiv:2105.00793v3 [math.NA] 14 Jun 2021 Tensor decompositions have wide applications in engineering and data science [11]. The most popular tensor decompositions include CP decomposition and Tucker decompo- sition as well as tensor train decomposition [11, 3, 17]. The tensor-tensor product (t-product) approach, developed by Kilmer, Martin, Bra- man and others [10, 1, 9, 8], is somewhat different. They defined T-product opera- tion such that a third order tensor can be regarded as a linear operator applied on ∗Department of Applied Mathematics, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong, China; ([email protected]). †Department of Mathematics, Beijing Jiaotong University, Beijing 100044, China.
    [Show full text]
  • Topological Optimisation of Artificial Neural Networks for Financial Asset
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by LSE Theses Online The London School of Economics and Political Science Topological Optimisation of Artificial Neural Networks for Financial Asset Forecasting Shiye (Shane) He A thesis submitted to the Department of Management of the London School of Economics for the degree of Doctor of Philosophy. April 2015, London 1 Declaration I certify that the thesis I have presented for examination for the MPhil/PhD degree of the London School of Economics and Political Science is solely my own work other than where I have clearly indicated that it is the work of others (in which case the extent of any work carried out jointly by me and any other person is clearly identified in it). The copyright of this thesis rests with the author. Quotation from it is permitted, provided that full acknowledgement is made. This thesis may not be reproduced without the prior written consent of the author. I warrant that this authorization does not, to the best of my belief, infringe the rights of any third party. 2 Abstract The classical Artificial Neural Network (ANN) has a complete feed-forward topology, which is useful in some contexts but is not suited to applications where both the inputs and targets have very low signal-to-noise ratios, e.g. financial forecasting problems. This is because this topology implies a very large number of parameters (i.e. the model contains too many degrees of freedom) that leads to over fitting of both signals and noise.
    [Show full text]
  • Fourier Transform, Convolution Theorem, and Linear Dynamical Systems April 28, 2016
    Mathematical Tools for Neuroscience (NEU 314) Princeton University, Spring 2016 Jonathan Pillow Lecture 23: Fourier Transform, Convolution Theorem, and Linear Dynamical Systems April 28, 2016. Discrete Fourier Transform (DFT) We will focus on the discrete Fourier transform, which applies to discretely sampled signals (i.e., vectors). Linear algebra provides a simple way to think about the Fourier transform: it is simply a change of basis, specifically a mapping from the time domain to a representation in terms of a weighted combination of sinusoids of different frequencies. The discrete Fourier transform is therefore equiv- alent to multiplying by an orthogonal (or \unitary", which is the same concept when the entries are complex-valued) matrix1. For a vector of length N, the matrix that performs the DFT (i.e., that maps it to a basis of sinusoids) is an N × N matrix. The k'th row of this matrix is given by exp(−2πikt), for k 2 [0; :::; N − 1] (where we assume indexing starts at 0 instead of 1), and t is a row vector t=0:N-1;. Recall that exp(iθ) = cos(θ) + i sin(θ), so this gives us a compact way to represent the signal with a linear superposition of sines and cosines. The first row of the DFT matrix is all ones (since exp(0) = 1), and so the first element of the DFT corresponds to the sum of the elements of the signal. It is often known as the \DC component". The next row is a complex sinusoid that completes one cycle over the length of the signal, and each subsequent row has a frequency that is an integer multiple of this \fundamental" frequency.
    [Show full text]
  • Networking Solutions for Connecting Bluetooth Low Energy Devices - a Comparison
    292 3 MATEC Web of Conferences , 0200 (2019) https://doi.org/10.1051/matecconf/201929202003 CSCC 2019 Networking solutions for connecting bluetooth low energy devices - a comparison 1,* 1 1 2 Mostafa Labib , Atef Ghalwash , Sarah Abdulkader , and Mohamed Elgazzar 1Faculty of Computers and Information, Helwan University, Egypt 2Vodafone Company, Egypt Abstract. The Bluetooth Low Energy (BLE) is an attractive solution for implementing low-cost, low power consumption, short-range wireless transmission technology and high flexibility wireless products,which working on standard coin-cell batteries for years. The original design of BLE is restricted to star topology networking, which limits network coverage and scalability. In contrast, other competing technologies like Wi-Fi and ZigBee overcome those constraints by supporting different topologies such as the tree and mesh network topologies. This paper presents a part of the researchers' efforts in designing solutions to enable BLE mesh networks and implements a tree network topology which is not supported in the standard BLE specifications. In addition, it discusses the advantages and drawbacks of the existing BLE network solutions. During analyzing the existing solutions, we highlight currently open issues such as flooding-based and routing-based solutions to allow end-to-end data transmission in a BLE mesh network and connecting BLE devices to the internet to support the Internet of Things (IoT). The approach proposed in this paper combines the default BLE star topology with the flooding based mesh topology to create a new hybrid network topology. The proposed approach can extend the network coverage without using any routing protocol. Keywords: Bluetooth Low Energy, Wireless Sensor Network, Industrial Wireless Mesh Network, BLE Mesh Network, Direct Acyclic Graph, Time Division Duplex, Time Division Multiple Access, Internet of Things.
    [Show full text]
  • Optimizing the Topology of Bluetooth Wireless Personal Area Networks Marco Ajmone Marsan, Carla F
    Optimizing the Topology of Bluetooth Wireless Personal Area Networks Marco Ajmone Marsan, Carla F. Chiasserini, Antonio Nucci, Giuliana Carello, Luigi De Giovanni Abstract— In this paper, we address the problem of determin- ing an optimal topology for Bluetooth Wireless Personal Area Networks (BT-WPANs). In BT-WPANs, multiple communication channels are available, thanks to the use of a frequency hopping technique. The way network nodes are grouped to share the same channel, and which nodes are selected to bridge traffic from a channel to another, has a significant impact on the capacity and the throughput of the system, as well as the nodes’ battery life- time. The determination of an optimal topology is thus extremely important; nevertheless, to the best of our knowledge, this prob- lem is tackled here for the first time. Our optimization approach is based on a model derived from constraints that are specific to the BT-WPAN technology, but the level of abstraction of the model is such that it can be related to the slave slave & bridge more general field of ad hoc networking. By using a min-max for- mulation, we find the optimal topology that provides full network master master & bridge connectivity, fulfills the traffic requirements and the constraints posed by the system specification, and minimizes the traffic load of Fig. 1. BT-WPAN topology. the most congested node in the network, or equivalently its energy consumption. Results show that a topology optimized for some traffic requirements is also remarkably robust to changes in the traffic pattern. Due to the problem complexity, the optimal so- Master and slaves send and receive traffic alternatively, so as lution is attained in a centralized manner.
    [Show full text]
  • A Framework for Wireless Broadband Network for Connecting the Unconnected
    A Framework for Wireless Broadband Network for Connecting the Unconnected Meghna Khaturia, Prasanna Chaporkar and Abhay Karandikar Department of Electrical Engineering, Indian Institute of Technology Bombay, Mumbai-400076 Email: fmeghnak,chaporkar,[email protected] Abstract—A significant barrier in providing affordable rural providing broadband in rural areas of India. Ashwini [6] broadband is to connect the rural and remote places to the optical and Aravind [7] are some other examples of rural network Point of Presence (PoP) over a distances of few kilometers. A testbeds deployed in India. Hop-Scotch is a long distance Wi- lot of work has been done in the area of long distance Wi- Fi networks. However, these networks require tall towers and Fi network based in UK [8]. LinkNet is a 52 node wireless high gain (directional) antennas. Also, they work in unlicensed network deployed in Zambia [9]. Also, there has been a band which has Effective Isotropically Radiated Power (EIRP) substantial research interest in designing the long distance Wi- limit (e.g. 1 W in India) which restricts the network design. In Fi based mesh networks for rural areas [10]–[12]. All these this work, we propose a Long Term Evolution-Advanced (LTE- efforts are based on IEEE 802.11 standard [13] in unlicensed A) network operating in TV UHF to connect the remote areas to the optical PoP. In India, around 100 MHz of TV UHF band i.e. 2:4 GHz or 5:8 GHz. When working with these band IV (470-585 MHz) is unused at any location and can frequency bands over a long distance point to point link, be put to an effective use in these areas [1].
    [Show full text]
  • The Discrete Fourier Transform
    Tutorial 2 - Learning about the Discrete Fourier Transform This tutorial will be about the Discrete Fourier Transform basis, or the DFT basis in short. What is a basis? If we google define `basis', we get: \the underlying support or foundation for an idea, argument, or process". In mathematics, a basis is similar. It is an underlying structure of how we look at something. It is similar to a coordinate system, where we can choose to describe a sphere in either the Cartesian system, the cylindrical system, or the spherical system. They will all describe the same thing, but in different ways. And the reason why we have different systems is because doing things in specific basis is easier than in others. For exam- ple, calculating the volume of a sphere is very hard in the Cartesian system, but easy in the spherical system. When working with discrete signals, we can treat each consecutive element of the vector of values as a consecutive measurement. This is the most obvious basis to look at a signal. Where if we have the vector [1, 2, 3, 4], then at time 0 the value was 1, at the next sampling time the value was 2, and so on, giving us a ramp signal. This is called a time series vector. However, there are also other basis for representing discrete signals, and one of the most useful of these is to use the DFT of the original vector, and to express our data not by the individual values of the data, but by the summation of different frequencies of sinusoids, which make up the data.
    [Show full text]
  • Quantum Fourier Transform Revisited
    Quantum Fourier Transform Revisited Daan Camps1,∗, Roel Van Beeumen1, Chao Yang1, 1Computational Research Division, Lawrence Berkeley National Laboratory, CA, United States Abstract The fast Fourier transform (FFT) is one of the most successful numerical algorithms of the 20th century and has found numerous applications in many branches of computational science and engineering. The FFT algorithm can be derived from a particular matrix decomposition of the discrete Fourier transform (DFT) matrix. In this paper, we show that the quantum Fourier transform (QFT) can be derived by further decomposing the diagonal factors of the FFT matrix decomposition into products of matrices with Kronecker product structure. We analyze the implication of this Kronecker product structure on the discrete Fourier transform of rank-1 tensors on a classical computer. We also explain why such a structure can take advantage of an important quantum computer feature that enables the QFT algorithm to attain an exponential speedup on a quantum computer over the FFT algorithm on a classical computer. Further, the connection between the matrix decomposition of the DFT matrix and a quantum circuit is made. We also discuss a natural extension of a radix-2 QFT decomposition to a radix-d QFT decomposition. No prior knowledge of quantum computing is required to understand what is presented in this paper. Yet, we believe this paper may help readers to gain some rudimentary understanding of the nature of quantum computing from a matrix computation point of view. 1 Introduction The fast Fourier transform (FFT) [3] is a widely celebrated algorithmic innovation of the 20th century [19]. The algorithm allows us to perform a discrete Fourier transform (DFT) of a vector of size N in (N log N) O operations.
    [Show full text]
  • Circulant Matrix Constructed by the Elements of One of the Signals and a Vector Constructed by the Elements of the Other Signal
    Digital Image Processing Filtering in the Frequency Domain (Circulant Matrices and Convolution) Christophoros Nikou [email protected] University of Ioannina - Department of Computer Science and Engineering 2 Toeplitz matrices • Elements with constant value along the main diagonal and sub-diagonals. • For a NxN matrix, its elements are determined by a (2N-1)-length sequence tn | (N 1) n N 1 T(,)m n t mn t0 t 1 t 2 t(N 1) t t t 1 0 1 T tt22 t1 t t t t N 1 2 1 0 NN C. Nikou – Digital Image Processing (E12) 3 Toeplitz matrices (cont.) • Each row (column) is generated by a shift of the previous row (column). − The last element disappears. − A new element appears. T(,)m n t mn t0 t 1 t 2 t(N 1) t t t 1 0 1 T tt22 t1 t t t t N 1 2 1 0 NN C. Nikou – Digital Image Processing (E12) 4 Circulant matrices • Elements with constant value along the main diagonal and sub-diagonals. • For a NxN matrix, its elements are determined by a N-length sequence cn | 01nN C(,)m n c(m n )mod N c0 cNN 1 c 2 c1 c c c 1 01N C c21 c c02 cN cN 1 c c c c NN1 21 0 NN C. Nikou – Digital Image Processing (E12) 5 Circulant matrices (cont.) • Special case of a Toeplitz matrix. • Each row (column) is generated by a circular shift (modulo N) of the previous row (column). C(,)m n c(m n )mod N c0 cNN 1 c 2 c1 c c c 1 01N C c21 c c02 cN cN 1 c c c c NN1 21 0 NN C.
    [Show full text]
  • Pre- and Post-Processing for Optimal Noise Reduction in Cyclic Prefix
    Pre- and Post-Processing for Optimal Noise Reduction in Cyclic Prefix Based Channel Equalizers Bojan Vrcelj and P. P. Vaidyanathan Dept. of Electrical Engineering 136-93 California Institute of Technology Pasadena, CA 91125-0001 Abstract— Cyclic prefix based equalizers are widely used for It is preceded (followed) by the optimal precoder (equalizer) high-speed data transmission over frequency selective channels. for the given input and noise statistics. These blocks are real- Their use in conjunction with DFT filterbanks is especially attrac- ized by constant matrix multiplication, so that the overall com- tive, given the low complexity of implementation. Some examples munications system remains of low complexity. include the DFT-based DMT systems. In this paper we consider In the following we first give a brief overview of the cyclic a general cyclic prefix based system for communication and show prefix system with DFT matrices used as the basic ISI can- that the equalization performance can be improved by simple pre- celer. Then, we introduce a way to deal with noise suppres- and post-processing aimed at reducing the noise at the receiver. This processing is done independently of the ISI cancellation per- sion separately and derive the optimal constrained pair pre- formed by the frequency domain equalizer.1 coder/equalizer for this purpose. The constraint is that in the absence of noise the overall system is still ISI-free. The per- formance of the proposed method is evaluated through com- I. INTRODUCTION puter simulations and a significant improvement with respect to There has been considerable interest in applying the eq– the original system without pre- and post-processing is demon- ualization techniques based on cyclic prefix to high speed data strated.
    [Show full text]
  • 1 1.1. the DFT Matrix
    FFT January 20, 2016 1 1.1. The DFT matrix. The DFT matrix. By definition, the sequence f(τ)(τ = 0; 1; 2;:::;N − 1), posesses a discrete Fourier transform F (ν)(ν = 0; 1; 2;:::;N − 1), given by − 1 NX1 F (ν) = f(τ)e−i2π(ν=N)τ : (1.1) N τ=0 Of course, this definition can be immediately rewritten in the matrix form as follows 2 3 2 3 F (1) f(1) 6 7 6 7 6 7 6 7 6 F (2) 7 1 6 f(2) 7 6 . 7 = p F 6 . 7 ; (1.2) 4 . 5 N 4 . 5 F (N − 1) f(N − 1) where the DFT (i.e., the discrete Fourier transform) matrix is defined by 2 3 1 1 1 1 · 1 6 − 7 6 1 w w2 w3 ··· wN 1 7 6 7 h i 6 1 w2 w4 w6 ··· w2(N−1) 7 1 − − 1 6 7 F = p w(k 1)(j 1) = p 6 3 6 9 ··· 3(N−1) 7 N 1≤k;j≤N N 6 1 w w w w 7 6 . 7 4 . 5 1 wN−1 w2(N−1) w3(N−1) ··· w(N−1)(N−1) (1.3) 2πi with w = e N being the primitive N-th root of unity. 1.2. The IDFT matrix. To recover N values of the function from its discrete Fourier transform we simply have to invert the DFT matrix to obtain 2 3 2 3 f(1) F (1) 6 7 6 7 6 f(2) 7 p 6 F (2) 7 6 7 −1 6 7 6 .
    [Show full text]