-FFT Recap (or, what am I expected to know?) - Learning Finite State Environments 15-451 Avrim Blum 11/25/03.

Slides:



Advertisements
Similar presentations
Sublinear Algorithms … Lecture 23: April 20.
Advertisements

Fast Polynomial Factorization and Modular Composition
Polynomial and FFT. Topics 1. Problem 2. Representation of polynomials 3. The DFT and FFT 4. Efficient FFT implementations 5. Conclusion.
Fast Fourier Transform Lecture 6 Spoken Language Processing Prof. Andrew Rosenberg.
Learning and Fourier Analysis Grigory Yaroslavtsev CIS 625: Computational Learning Theory.
FFT1 The Fast Fourier Transform. FFT2 Outline and Reading Polynomial Multiplication Problem Primitive Roots of Unity (§10.4.1) The Discrete Fourier Transform.
Administrative Oct. 2 Oct. 4 – QUIZ #2 (pages of DPV)
Richard Fateman CS 282 Lecture 101 The Finite-Field FFT Lecture 10.
Administrative Sep. 27 (today) – HW4 due Sep. 28 8am – problem session Oct. 2 Oct. 4 – QUIZ #2 (pages of DPV)
CSE 421 Algorithms Richard Anderson Lecture 15 Fast Fourier Transform.
FFT1 The Fast Fourier Transform by Jorge M. Trabal.
Faster Multiplication, Powering of Polynomials
Princeton University COS 423 Theory of Algorithms Spring 2002 Kevin Wayne Fast Fourier Transform Jean Baptiste Joseph Fourier ( ) These lecture.
Chapter 11 Algebraic Coding Theory. Single Error Detection M = (1, 1, …, 1) is the m  1 parity check matrix for single error detection. If c = (0, 1,
Reconfigurable Computing S. Reda, Brown University Reconfigurable Computing (EN2911X, Fall07) Lecture 16: Application-Driven Hardware Acceleration (1/4)
CSE 421 Algorithms Richard Anderson Lecture 13 Divide and Conquer.
Introduction to Algorithms
Asynchronous Pattern Matching - Address Level Errors Amihood Amir Bar Ilan University 2010.
The Fourier series A large class of phenomena can be described as periodic in nature: waves, sounds, light, radio, water waves etc. It is natural to attempt.
ECIV 301 Programming & Graphics Numerical Methods for Engineers Lecture 10 Roots of Polynomials.
11/26/02CSE FFT,etc CSE Algorithms Polynomial Representations, Fourier Transfer, and other goodies. (Chapters 28-30)
CSE 321 Discrete Structures Winter 2008 Lecture 10 Number Theory: Primality.
CPSC 3730 Cryptography and Network Security
Semi-Numerical String Matching. All the methods we’ve seen so far have been based on comparisons. We propose alternative methods of computation such as:
FFT1 The Fast Fourier Transform. FFT2 Outline and Reading Polynomial Multiplication Problem Primitive Roots of Unity (§10.4.1) The Discrete Fourier Transform.
5.6 Convolution and FFT. 2 Fast Fourier Transform: Applications Applications. n Optics, acoustics, quantum physics, telecommunications, control systems,
The Fast Fourier Transform
Great Theoretical Ideas in Computer Science.
Length Reduction in Binary Transforms Oren Kapah Ely Porat Amir Rothschild Amihood Amir Bar Ilan University and Johns Hopkins University.
Quick Crisp Review Zeros of a polynomial function are where the x-intercepts or solutions when you set the equation equal to zero. Synthetic and long division.
Chapter 4 – Finite Fields
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
The Fast Fourier Transform and Applications to Multiplication
Motivation: Wavelets are building blocks that can quickly decorrelate data 2. each signal written as (possibly infinite) sum 1. what type of data? 3. new.
7.4 THE REMAINDER & FACTOR THEOREMS Objectives: The student will be able to… 1)evaluate functions using synthetic substitution 2)determine whether a binomial.
06/12/2015Applied Algorithmics - week41 Non-periodicity and witnesses  Periodicity - continued If string w=w[0..n-1] has periodicity p if w[i]=w[i+p],
Great Theoretical Ideas in Computer Science.
1 Fast Polynomial and Integer Multiplication Jeremy R. Johnson.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Algorithms 2005 Ramesh Hariharan. Polynomial Computation.
Dan Boneh Intro. Number Theory Arithmetic algorithms Online Cryptography Course Dan Boneh.
Applied Symbolic Computation1 Applied Symbolic Computation (CS 567) The Fast Fourier Transform (FFT) and Convolution Jeremy R. Johnson TexPoint fonts used.
Pattern Matching With Don’t Cares Clifford & Clifford’s Algorithm Orgad Keller.
Great Theoretical Ideas in Computer Science.
week 8Complexity of Algorithms1 Elementary Number Theory Given positive integers a and b, we use the notation a¦b to indicated that a divides b, i.e.,
Rabin & Karp Algorithm. Rabin-Karp – the idea Compare a string's hash values, rather than the strings themselves. For efficiency, the hash value of the.
Solved Problems on Limits and Continuity
Lecture 16 Fast Fourier Transform
Data Structures and Algorithms (AT70. 02) Comp. Sc. and Inf. Mgmt
AS Computer Studies Finite State Machines 2.
September 4, 1997 Applied Symbolic Computation (CS 300) Fast Polynomial and Integer Multiplication Jeremy R. Johnson.
Polynomials, Secret Sharing, And Error-Correcting Codes
Pattern Matching With Don’t Cares Clifford & Clifford’s Algorithm
اختر أي شخصية واجعلها تطير!
Applied Symbolic Computation
DFT and FFT By using the complex roots of unity, we can evaluate and interpolate a polynomial in O(n lg n) An example, here are the solutions to 8 =
September 4, 1997 Applied Symbolic Computation (CS 300) Fast Polynomial and Integer Multiplication Jeremy R. Johnson.
The Fast Fourier Transform
Great Theoretical Ideas in Computer Science
Polynomials, Secret Sharing, And Error-Correcting Codes
September 4, 1997 Applied Symbolic Computation (CS 567) Fast Polynomial and Integer Multiplication Jeremy R. Johnson.
Applied Symbolic Computation
Finite Wordlength Effects
In Pattern Matching Convolutions: O(n log m) using FFT b0 b1 b2
Richard Anderson Lecture 14 Inversions, Multiplication, FFT
Solved Problems on Limits and Continuity
The Fast Fourier Transform
CLOCK ARITHMETIC.
Clements MAΘ October 30th, 2014
Fast Polynomial and Integer Multiplication
Presentation transcript:

-FFT Recap (or, what am I expected to know?) - Learning Finite State Environments Avrim Blum 11/25/03

FFT Recap The basic result: Given vectors –A = (a 0, a 1, a 2,..., a n-1 ), and –B = (b 0, b 1,..., b n-1 ), the FFT allows us in O(n log n) time to compute the convolution –C = (c 0, c 1,..., c 2n-2 ) where c j = a 0 b j + a 1 b j a j b 0. I.e., this is polynomial multiplication, where A,B,C are vectors of coefficients.

How does it work? Compute F -1 (F(A) ¢ F(B)), where “F” is FFT. F(A) is evaluation of A at 1,    m  –  is principal m th root of unity. m = 2n-1. E.g.,  = e  /m. Or use modular arithmetic. –Able to do this quickly with divide-and-conquer. F(A) ¢ F(B) gives C(x) at these points. We then saw that F -1 = (1/m)F’, where F’ is same as F but using  -1.

Applications (not on test) signal analysis, lots moresignal analysislots more Pattern matching with don’t cares: –Given text string X = x 1,x 2,...,x n. x i 2 {0..25} –Given pattern Y = y 1,y 2,...,y k. y i 2 {0..25} [ {*}. –Want to find instances of Y inside X. Idea [Adam Kalai based on Karp-Rabin]: –Pick random R: r 1,r 2,...,r k, r i 2 1..N. E.g, N=n 2 –Set r i = 0 if y k-i+1 = *. –Let T = r 1 y k r k y 1. (can do mod p > N) –Now do convolution of R and X. See if any entries match T. Each entry at most 1/N chance of false positive.

OK, on to machine learning...