Fourier Analysis
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Fast Fourier Transform
The Fast Fourier Transform Derek L. Smith SIAM Seminar on Algorithms - Fall 2014 University of California, Santa Barbara October 15, 2014 Table of Contents History of the FFT The Discrete Fourier Transform The Fast Fourier Transform MP3 Compression via the DFT The Fourier Transform in Mathematics Table of Contents History of the FFT The Discrete Fourier Transform The Fast Fourier Transform MP3 Compression via the DFT The Fourier Transform in Mathematics Navigating the Origins of the FFT The Royal Observatory, Greenwich, in London has a stainless steel strip on the ground marking the original location of the prime meridian. There's also a plaque stating that the GPS reference meridian is now 100m to the east. This photo is the culmination of hundreds of years of mathematical tricks which answer the question: How to construct a more accurate clock? Or map? Or star chart? Time, Location and the Stars The answer involves a naturally occurring reference system. Throughout history, humans have measured their location on earth, in order to more accurately describe the position of astronomical bodies, in order to build better time-keeping devices, to more successfully navigate the earth, to more accurately record the stars... and so on... and so on... Time, Location and the Stars Transoceanic exploration previously required a vessel stocked with maps, star charts and a highly accurate clock. Institutions such as the Royal Observatory primarily existed to improve a nations' navigation capabilities. The current state-of-the-art includes atomic clocks, GPS and computerized maps, as well as a whole constellation of government organizations. -
The Convolution Theorem
Module 2 : Signals in Frequency Domain Lecture 18 : The Convolution Theorem Objectives In this lecture you will learn the following We shall prove the most important theorem regarding the Fourier Transform- the Convolution Theorem We are going to learn about filters. Proof of 'the Convolution theorem for the Fourier Transform'. The Dual version of the Convolution Theorem Parseval's theorem The Convolution Theorem We shall in this lecture prove the most important theorem regarding the Fourier Transform- the Convolution Theorem. It is this theorem that links the Fourier Transform to LSI systems, and opens up a wide range of applications for the Fourier Transform. We shall inspire its importance with an application example. Modulation Modulation refers to the process of embedding an information-bearing signal into a second carrier signal. Extracting the information- bearing signal is called demodulation. Modulation allows us to transmit information signals efficiently. It also makes possible the simultaneous transmission of more than one signal with overlapping spectra over the same channel. That is why we can have so many channels being broadcast on radio at the same time which would have been impossible without modulation There are several ways in which modulation is done. One technique is amplitude modulation or AM in which the information signal is used to modulate the amplitude of the carrier signal. Another important technique is frequency modulation or FM, in which the information signal is used to vary the frequency of the carrier signal. Let us consider a very simple example of AM. Consider the signal x(t) which has the spectrum X(f) as shown : Why such a spectrum ? Because it's the simplest possible multi-valued function. -
B1. Fourier Analysis of Discrete Time Signals
B1. Fourier Analysis of Discrete Time Signals Objectives • Introduce discrete time periodic signals • Define the Discrete Fourier Series (DFS) expansion of periodic signals • Define the Discrete Fourier Transform (DFT) of signals with finite length • Determine the Discrete Fourier Transform of a complex exponential 1. Introduction In the previous chapter we defined the concept of a signal both in continuous time (analog) and discrete time (digital). Although the time domain is the most natural, since everything (including our own lives) evolves in time, it is not the only possible representation. In this chapter we introduce the concept of expanding a generic signal in terms of elementary signals, such as complex exponentials and sinusoids. This leads to the frequency domain representation of a signal in terms of its Fourier Transform and the concept of frequency spectrum so that we characterize a signal in terms of its frequency components. First we begin with the introduction of periodic signals, which keep repeating in time. For these signals it is fairly easy to determine an expansion in terms of sinusoids and complex exponentials, since these are just particular cases of periodic signals. This is extended to signals of a finite duration which becomes the Discrete Fourier Transform (DFT), one of the most widely used algorithms in Signal Processing. The concepts introduced in this chapter are at the basis of spectral estimation of signals addressed in the next two chapters. 2. Periodic Signals VIDEO: Periodic Signals (19:45) http://faculty.nps.edu/rcristi/eo3404/b-discrete-fourier-transform/videos/chapter1-seg1_media/chapter1-seg1- 0.wmv http://faculty.nps.edu/rcristi/eo3404/b-discrete-fourier-transform/videos/b1_02_periodicSignals.mp4 In this section we define a class of discrete time signals called Periodic Signals. -
Lecture 7: Fourier Series and Complex Power Series 1 Fourier
Math 1d Instructor: Padraic Bartlett Lecture 7: Fourier Series and Complex Power Series Week 7 Caltech 2013 1 Fourier Series 1.1 Definitions and Motivation Definition 1.1. A Fourier series is a series of functions of the form 1 C X + (a sin(nx) + b cos(nx)) ; 2 n n n=1 where C; an; bn are some collection of real numbers. The first, immediate use of Fourier series is the following theorem, which tells us that they (in a sense) can approximate far more functions than power series can: Theorem 1.2. Suppose that f(x) is a real-valued function such that • f(x) is continuous with continuous derivative, except for at most finitely many points in [−π; π]. • f(x) is periodic with period 2π: i.e. f(x) = f(x ± 2π), for any x 2 R. C P1 Then there is a Fourier series 2 + n=1 (an sin(nx) + bn cos(nx)) such that 1 C X f(x) = + (a sin(nx) + b cos(nx)) : 2 n n n=1 In other words, where power series can only converge to functions that are continu- ous and infinitely differentiable everywhere the power series is defined, Fourier series can converge to far more functions! This makes them, in practice, a quite useful concept, as in science we'll often want to study functions that aren't always continuous, or infinitely differentiable. A very specific application of Fourier series is to sound and music! Specifically, re- call/observe that a musical note with frequency f is caused by the propogation of the lon- gitudinal wave sin(2πft) through some medium. -
Impossible Differentials in Twofish
Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999 Abstract We show how an impossible-differential attack, first applied to DEAL by Knudsen, can be applied to Twofish. This attack breaks six rounds of the 256-bit key version using 2256 steps; it cannot be extended to seven or more Twofish rounds. Keywords: Twofish, cryptography, cryptanalysis, impossible differential, block cipher, AES. Current web site: http://www.counterpane.com/twofish.html 1 Introduction 2.1 Twofish as a pure Feistel cipher Twofish is one of the finalists for the AES [SKW+98, As mentioned in [SKW+98, section 7.9] and SKW+99]. In [Knu98a, Knu98b] Lars Knudsen used [SKW+99, section 7.9.3] we can rewrite Twofish to a 5-round impossible differential to attack DEAL. be a pure Feistel cipher. We will demonstrate how Eli Biham, Alex Biryukov, and Adi Shamir gave the this is done. The main idea is to save up all the ro- technique the name of `impossible differential', and tations until just before the output whitening, and applied it with great success to Skipjack [BBS99]. apply them there. We will use primes to denote the In this report we show how Knudsen's attack can values in our new representation. We start with the be applied to Twofish. We use the notation from round values: [SKW+98] and [SKW+99]; readers not familiar with R0 = ROL(Rr;0; (r + 1)=2 ) the notation should consult one of these references. r;0 b c R0 = ROR(Rr;1; (r + 1)=2 ) r;1 b c R0 = ROL(Rr;2; r=2 ) 2 The attack r;2 b c R0 = ROR(Rr;3; r=2 ) r;3 b c Knudsen's 5-round impossible differential works for To get the same output we update the rule to com- any Feistel cipher where the round function is in- pute the output whitening. -
7: Inner Products, Fourier Series, Convolution
7: FOURIER SERIES STEVEN HEILMAN Contents 1. Review 1 2. Introduction 1 3. Periodic Functions 2 4. Inner Products on Periodic Functions 3 5. Trigonometric Polynomials 5 6. Periodic Convolutions 7 7. Fourier Inversion and Plancherel Theorems 10 8. Appendix: Notation 13 1. Review Exercise 1.1. Let (X; h·; ·i) be a (real or complex) inner product space. Define k·k : X ! [0; 1) by kxk := phx; xi. Then (X; k·k) is a normed linear space. Consequently, if we define d: X × X ! [0; 1) by d(x; y) := ph(x − y); (x − y)i, then (X; d) is a metric space. Exercise 1.2 (Cauchy-Schwarz Inequality). Let (X; h·; ·i) be a complex inner product space. Let x; y 2 X. Then jhx; yij ≤ hx; xi1=2hy; yi1=2: Exercise 1.3. Let (X; h·; ·i) be a complex inner product space. Let x; y 2 X. As usual, let kxk := phx; xi. Prove Pythagoras's theorem: if hx; yi = 0, then kx + yk2 = kxk2 + kyk2. 1 Theorem 1.4 (Weierstrass M-test). Let (X; d) be a metric space and let (fj)j=1 be a sequence of bounded real-valued continuous functions on X such that the series (of real num- P1 P1 bers) j=1 kfjk1 is absolutely convergent. Then the series j=1 fj converges uniformly to some continuous function f : X ! R. 2. Introduction A general problem in analysis is to approximate a general function by a series that is relatively easy to describe. With the Weierstrass Approximation theorem, we saw that it is possible to achieve this goal by approximating compactly supported continuous functions by polynomials. -
Fourier Series
Academic Press Encyclopedia of Physical Science and Technology Fourier Series James S. Walker Department of Mathematics University of Wisconsin–Eau Claire Eau Claire, WI 54702–4004 Phone: 715–836–3301 Fax: 715–836–2924 e-mail: [email protected] 1 2 Encyclopedia of Physical Science and Technology I. Introduction II. Historical background III. Definition of Fourier series IV. Convergence of Fourier series V. Convergence in norm VI. Summability of Fourier series VII. Generalized Fourier series VIII. Discrete Fourier series IX. Conclusion GLOSSARY ¢¤£¦¥¨§ Bounded variation: A function has bounded variation on a closed interval ¡ ¢ if there exists a positive constant © such that, for all finite sets of points "! "! $#&% (' #*) © ¥ , the inequality is satisfied. Jordan proved that a function has bounded variation if and only if it can be expressed as the difference of two non-decreasing functions. Countably infinite set: A set is countably infinite if it can be put into one-to-one £0/"£ correspondence with the set of natural numbers ( +,£¦-.£ ). Examples: The integers and the rational numbers are countably infinite sets. "! "!;: # # 123547698 Continuous function: If , then the function is continuous at the point : . Such a point is called a continuity point for . A function which is continuous at all points is simply referred to as continuous. Lebesgue measure zero: A set < of real numbers is said to have Lebesgue measure ! $#¨CED B ¢ £¦¥ zero if, for each =?>A@ , there exists a collection of open intervals such ! ! D D J# K% $#L) ¢ £¦¥ ¥ ¢ = that <GFIH and . Examples: All finite sets, and all countably infinite sets, have Lebesgue measure zero. "! "! % # % # Odd and even functions: A function is odd if for all in its "! "! % # # domain. -
Simple Substitution and Caesar Ciphers
Spring 2015 Chris Christensen MAT/CSC 483 Simple Substitution Ciphers The art of writing secret messages – intelligible to those who are in possession of the key and unintelligible to all others – has been studied for centuries. The usefulness of such messages, especially in time of war, is obvious; on the other hand, their solution may be a matter of great importance to those from whom the key is concealed. But the romance connected with the subject, the not uncommon desire to discover a secret, and the implied challenge to the ingenuity of all from who it is hidden have attracted to the subject the attention of many to whom its utility is a matter of indifference. Abraham Sinkov In Mathematical Recreations & Essays By W.W. Rouse Ball and H.S.M. Coxeter, c. 1938 We begin our study of cryptology from the romantic point of view – the point of view of someone who has the “not uncommon desire to discover a secret” and someone who takes up the “implied challenged to the ingenuity” that is tossed down by secret writing. We begin with one of the most common classical ciphers: simple substitution. A simple substitution cipher is a method of concealment that replaces each letter of a plaintext message with another letter. Here is the key to a simple substitution cipher: Plaintext letters: abcdefghijklmnopqrstuvwxyz Ciphertext letters: EKMFLGDQVZNTOWYHXUSPAIBRCJ The key gives the correspondence between a plaintext letter and its replacement ciphertext letter. (It is traditional to use small letters for plaintext and capital letters, or small capital letters, for ciphertext. We will not use small capital letters for ciphertext so that plaintext and ciphertext letters will line up vertically.) Using this key, every plaintext letter a would be replaced by ciphertext E, every plaintext letter e by L, etc. -
FOURIER TRANSFORM Very Broadly Speaking, the Fourier Transform Is a Systematic Way to Decompose “Generic” Functions Into
FOURIER TRANSFORM TERENCE TAO Very broadly speaking, the Fourier transform is a systematic way to decompose “generic” functions into a superposition of “symmetric” functions. These symmetric functions are usually quite explicit (such as a trigonometric function sin(nx) or cos(nx)), and are often associated with physical concepts such as frequency or energy. What “symmetric” means here will be left vague, but it will usually be associated with some sort of group G, which is usually (though not always) abelian. Indeed, the Fourier transform is a fundamental tool in the study of groups (and more precisely in the representation theory of groups, which roughly speaking describes how a group can define a notion of symmetry). The Fourier transform is also related to topics in linear algebra, such as the representation of a vector as linear combinations of an orthonormal basis, or as linear combinations of eigenvectors of a matrix (or a linear operator). To give a very simple prototype of the Fourier transform, consider a real-valued function f : R → R. Recall that such a function f(x) is even if f(−x) = f(x) for all x ∈ R, and is odd if f(−x) = −f(x) for all x ∈ R. A typical function f, such as f(x) = x3 + 3x2 + 3x + 1, will be neither even nor odd. However, one can always write f as the superposition f = fe + fo of an even function fe and an odd function fo by the formulae f(x) + f(−x) f(x) − f(−x) f (x) := ; f (x) := . e 2 o 2 3 2 2 3 For instance, if f(x) = x + 3x + 3x + 1, then fe(x) = 3x + 1 and fo(x) = x + 3x. -
On the Decorrelated Fast Cipher (DFC) and Its Theory
On the Decorrelated Fast Cipher (DFC) and Its Theory Lars R. Knudsen and Vincent Rijmen ? Department of Informatics, University of Bergen, N-5020 Bergen Abstract. In the first part of this paper the decorrelation theory of Vaudenay is analysed. It is shown that the theory behind the propo- sed constructions does not guarantee security against state-of-the-art differential attacks. In the second part of this paper the proposed De- correlated Fast Cipher (DFC), a candidate for the Advanced Encryption Standard, is analysed. It is argued that the cipher does not obtain prova- ble security against a differential attack. Also, an attack on DFC reduced to 6 rounds is given. 1 Introduction In [6,7] a new theory for the construction of secret-key block ciphers is given. The notion of decorrelation to the order d is defined. Let C be a block cipher with block size m and C∗ be a randomly chosen permutation in the same message space. If C has a d-wise decorrelation equal to that of C∗, then an attacker who knows at most d − 1 pairs of plaintexts and ciphertexts cannot distinguish between C and C∗. So, the cipher C is “secure if we use it only d−1 times” [7]. It is further noted that a d-wise decorrelated cipher for d = 2 is secure against both a basic linear and a basic differential attack. For the latter, this basic attack is as follows. A priori, two values a and b are fixed. Pick two plaintexts of difference a and get the corresponding ciphertexts. -
An Introduction to Fourier Analysis Fourier Series, Partial Differential Equations and Fourier Transforms
An Introduction to Fourier Analysis Fourier Series, Partial Differential Equations and Fourier Transforms Notes prepared for MA3139 Arthur L. Schoenstadt Department of Applied Mathematics Naval Postgraduate School Code MA/Zh Monterey, California 93943 August 18, 2005 c 1992 - Professor Arthur L. Schoenstadt 1 Contents 1 Infinite Sequences, Infinite Series and Improper Integrals 1 1.1Introduction.................................... 1 1.2FunctionsandSequences............................. 2 1.3Limits....................................... 5 1.4TheOrderNotation................................ 8 1.5 Infinite Series . ................................ 11 1.6ConvergenceTests................................ 13 1.7ErrorEstimates.................................. 15 1.8SequencesofFunctions.............................. 18 2 Fourier Series 25 2.1Introduction.................................... 25 2.2DerivationoftheFourierSeriesCoefficients.................. 26 2.3OddandEvenFunctions............................. 35 2.4ConvergencePropertiesofFourierSeries.................... 40 2.5InterpretationoftheFourierCoefficients.................... 48 2.6TheComplexFormoftheFourierSeries.................... 53 2.7FourierSeriesandOrdinaryDifferentialEquations............... 56 2.8FourierSeriesandDigitalDataTransmission.................. 60 3 The One-Dimensional Wave Equation 70 3.1Introduction.................................... 70 3.2TheOne-DimensionalWaveEquation...................... 70 3.3 Boundary Conditions ............................... 76 3.4InitialConditions................................ -
Appendix a Short Course in Taylor Series
Appendix A Short Course in Taylor Series The Taylor series is mainly used for approximating functions when one can identify a small parameter. Expansion techniques are useful for many applications in physics, sometimes in unexpected ways. A.1 Taylor Series Expansions and Approximations In mathematics, the Taylor series is a representation of a function as an infinite sum of terms calculated from the values of its derivatives at a single point. It is named after the English mathematician Brook Taylor. If the series is centered at zero, the series is also called a Maclaurin series, named after the Scottish mathematician Colin Maclaurin. It is common practice to use a finite number of terms of the series to approximate a function. The Taylor series may be regarded as the limit of the Taylor polynomials. A.2 Definition A Taylor series is a series expansion of a function about a point. A one-dimensional Taylor series is an expansion of a real function f(x) about a point x ¼ a is given by; f 00ðÞa f 3ðÞa fxðÞ¼faðÞþf 0ðÞa ðÞþx À a ðÞx À a 2 þ ðÞx À a 3 þÁÁÁ 2! 3! f ðÞn ðÞa þ ðÞx À a n þÁÁÁ ðA:1Þ n! © Springer International Publishing Switzerland 2016 415 B. Zohuri, Directed Energy Weapons, DOI 10.1007/978-3-319-31289-7 416 Appendix A: Short Course in Taylor Series If a ¼ 0, the expansion is known as a Maclaurin Series. Equation A.1 can be written in the more compact sigma notation as follows: X1 f ðÞn ðÞa ðÞx À a n ðA:2Þ n! n¼0 where n ! is mathematical notation for factorial n and f(n)(a) denotes the n th derivation of function f evaluated at the point a.