Professional Documents
Culture Documents
Evaluating X() at = 2k/N Changing the index of the inner summation from n to n lN
and interchange the order of summation we get
2
X k x(n)e j 2kn / N k 0, 1, , N 1
N n 2 N 1
X k x(n l N )e j 2kn / N k 0, 1, , N 1
N n0 l
1
Reconstruction of DT Signals from Reconstruction of DT Signals from
Frequency Domain Samples Frequency Domain Samples
We get a signal x(n lN) which is periodic every N samples. Therefore, we conclude that
1 2
x p n x( n l N ) ck X k k 0, 1, , N 1
l N N
Taking the Fourier series expansion we get And
N 1
x p n ck e j 2kn / N 1 N 1 2 j 2kn / N
k 0
n 0, 1, , N 1 x p ( n) X k e
N k 0 N
n 0, 1, , N 1
with Fourier coefficients Since xp(n) is the periodic extension of x(n), we can recover
1 N 1 x(n) from xp(n) if there is no time-domain aliasing.
ck x p (n)e j 2kn / N k 0, 1, , N 1
N n0 Time-domain aliasing happens when the period L of x(n), is
more than the period N of xp(n).
1 N 1 2 j 2kn / N
x ( n) X k e
N k 0 N
0 n N 1
n
0 L
Substituting this into the formula for X() we have
xp(n) N>L N 1
1 N 1 2 j 2kn / N jn
X X k e e
n 0 N k 0 N
N 1
2 1 N 1
X k e j ( 2k / N ) n
n
0 L N
k 0 N N n0
N<L
xp(n)
n
0 N L Time-domain aliasing
2
Reconstruction of DT Signals from
Frequency Domain Samples Example
We define the phase as P() we have
Consider the signal
1 N 1
P e jn
1 1 e jN 1 e jN / 2 e jN / 2 e jN / 2
N n 0 N 1 e j
N e j / 2 e j / 2 e j / 2 xn a nu (n) 0 a 1
1 sin(N / 2)
e j ( N 1) / 2
N sin( / 2)
The spectrum of this signal is sampled at
Therefore X() is frequencies k = 2k/N, k = 0, 1,, N 1.
N 1
2 2
X X k P k NL
n 0 N N Determine the reconstructed spectra for
Where P() has the property
a = 0.8 when N = 5 and N = 50.
2 1, k 0
P k
N 0, k 1, 2, , N 1
The Discrete Fourier Transform (DFT) The Discrete Fourier Transform (DFT)
3
The Discrete Fourier Transform (DFT) The Discrete Fourier Transform (DFT)
L 1
X ( ) 2 k X k X (k ) x(n)e j 2kn / N
X ( ) x(n)e jn
0 2 N N n 0
n 0 N 1
X (k ) x(n)e j 2kn / N k 0, 1, , N 1
Where x(n) = 0 outside of the n 0
range 0 n L 1.
Where the upper and lower indices
reflect x(n) xp(n) when N > L. This
is the discrete Fourier transform.
The Discrete Fourier Transform (DFT) The Discrete Fourier Transform (DFT)
4
The Discrete Fourier Transform (DFT) The DFT as a Linear Transformation
We have the DFT and the IDFT as
Remember: N 1
n0
N 1
1
X (k )W
kn
x ( n) N n 0, 1, , N 1
N n 0
5
Example Properties of the DFT
If x1 (n) X 1 (k )
DFT
and x2 (n) X 2 (k )
DFT
If x p ( n) x ( n) L , given that NL
N N N
then
and x p (n) x(n lN )
l
x(n) a1 x1 (n) a2 x2 ( n) X ( k ) a1 X 1 (k ) a2 X 2 (k )
DFT
N
then xp (n) x p (n k ) x(n k lN )
l
x (n k ), 0 n N 1
and x ( n ) p
0, otherwise
6
Properties of the DFT Properties of the DFT
In general: x ( n ) x ( n k ) N
n
Example: If N = 4 and k = 2 0 1 2 3
xp(n)
We have x (n) x(n 2) 4
Then x (0) x(2) 4 x(2) n
-4 -3 -2 -1 0 1 2 3 4 5 6 7
x (1) x(1) 4 x(3) xp(n 2) x(n)
7
Multiplication of Two DFTs and Circular Multiplication of Two DFTs and Circular
Convolution Convolution
Suppose that we have two N-point sequences x1(n) and x2(n) 1
N 1 N 1
N 1 j 2kl / N j 2km / N
with their DFTs as x3 (m)
N
x (n)e
k 0 n0
1
j 2kn / N
x2 ( n ) e
l 0
e
N 1
X 1 (k ) x1 (n)e j 2kn / N k 0, 1, , N 1
1 N 1 N 1
N 1
n 0
N 1
N n 0
x1 (n) x2 (n) e j 2km / N e j 2kn / N e j 2kl / N
l 0 k 0
X 2 ( k ) x2 ( n ) e j 2kn / N
k 0, 1, , N 1
1 N 1 N 1 N 1
n 0
Substituting this into the equation for x3(n) we have x1(n) = {2, 1, 2, 1}
N 1
x3 (m) x1 (n) x2 (m n) N m 0,1, ..., N 1
n 0 x2(n) = {1, 2, 3, 4}
Which has a form similar to the convolution sum. Note
however that the index (m n)N refers to circular convolution.
8
Divide-and-Conquer Approach
Signals, Spectra, and
Signal Processing This approach is based on the
decomposition of an N-point DFT
into successively smaller DFTs.
Consider an N-point DFT. N can be
Fast Fourier Transform (FFT) factored into two integers such that
Algorithms N = LM
We can store the sequence x(n) into
a 2-dimensional matrix indexed by
indexed by l and m (l m matrix)
n = l + mL 2
Column-wise .
distribution
L1
9
Divide-and-Conquer Approach Divide-and-Conquer Approach
X(k) = { X(0), X(1), X(2), , X(N 1)} We rewrite the equation for the DFT using the new index
mappings for n and k.
M 1 L 1
q
X ( p, q) x(l , m)WN
( Mp q )( mL l ) where: k Mp q
0 1 2 P1
p m 0 l 0 n mL l
0
( Mp q )( mL l )
But WN
MLmp Mpl mLq lq
WN WN WN WN
1
and WN e j 2 / N also N LM
k = Mp + q 2
Row-wise .
We have WN
MLmp
WN
Nmp
e j 2 / N Nmp
e j 2mp 1
distribution
Q1
WN
mqL
e j 2 / N mqL
e j 2L / N e
mq
W
j 2 / M mq
M
mq
e
j 2 / N Mpl
e e
j 2M / N pl
W
j 2 / L pl
Mpl pl
WN L
l 0 m0 m0
0 q M 1
3. Compute for the L-point DFTs
L 1
X ( p, q ) G (l , q )WL , 0 q M 1
lp
l 0
10
Divide-and-Conquer Approach Divide-and-Conquer Approach
column-wise:
Phase factor
WNlq
x(10)
tD
FT X(2)
Algorithm 2
x(5)
x(11)
3-p
oin X(1)
X(5) 1. Store the signal row-wise.
x(0)
x(6)
X(0)
X(4) 2. Compute for the M-point DFT of each
column.
x(12) X(8)
5-point DFT
x(1) X(3)
11
Decimation in Time (DIT)
Radix-2 FFT Algorithms Radix-2 Algorithm
Consider the sequence x(n) and its DFT X(k)
When N is a highly-composite
number (N = p1p2p3pk), we can x(n) {x(0), x(1), x(2), , x( N 1)}
divide the DFT into even smaller N 1
DFTs. X (k ) x(n)WN
nk
n0
A special case is when p1 = p2 = p3 = pk, x(n) can be split (decimated) into its even and odd terms
thus N = pn. This way, the operations
xeven (m) x(2m) m 0, 1, , N
1
are repetitive n number of times. 2
m 0 m 0
WN
2 mk k 2 mk
e 2 j / N
(m)WN N 2 N 2
e j 1
2
m 0 n0 But WN
But WN
2 mk
e 2 j / N
2 mk
e 2 j ( 2 / N ) mk
e 2 j /(
N
2)
mk
WN 2
mk Therefore, the DFT X(k) can be expressed as
X k F1 (k ) WN F2 (k ) k 0, 1, , 1
k N
N 1 N 1 2
X (k ) f1 (m)WN 2
2 2
WN
mk k mk
So f 2 (m)WN 2
X k F1 (k ) WN k 0, 1, , 1
k N
m0 n 0
N
2 F2 (k ) 2
F1 (k ) WN F2 (k ) k 0, 1, , N 1
k
12
Decimation in Time (DIT) Decimation in Time (DIT)
Radix-2 Algorithm Radix-2 Algorithm
Using this method, we have reduced the number of By computing the N/4-point DFTs, we can obtain the N/2-point
complex multiplications from N 2 (direct DFT computation) DFTs F1(k) and F2(k) from
to (N/2)2 + N/2, which is a reduction by a factor of 4.
F1 k F1 A (k ) WN 2 F1B (k ) k 0, 1, , 1
k N
4
We can further divide the sequences f1(m) and f2(m)
F1 k F1 A (k ) W k 0, 1, , 1
k N
into even smaller N/4-point sequences.
N
4 N
2
F1B (k ) 4
Three-stage computation of an 8-point DFT, where s = log2 N. Butterfly diagram of an 8-point radix-2 DIT FFT computation.
13
Decimation in Frequency (DIF) Decimation in Frequency (DIF)
Radix-2 Algorithm Radix-2 Algorithm
X (k ) x(n)WN 1 x(n
2 2
Then
nk k nk
N )WN
M = 2 and L = N/2. n0 n
2
x(n) 1 xn N 2 WN
2
k nk
nk nk N 1
X (2k ) x(n) 1 xn N 2 WN
n 2 k
2
2k
n0 n N2
Even:
N 1 N 1 n0
n N 2 k
x(n)WN xn N 2 WN
2 2
12 k 1 n 2 k
nk
WN 2
nk
But and WN
n 0 n0
N 1
X (2k ) x(n) xn N 2 WN 2
N 1 N 1 2
k 0, 1, , 1
nk
So
x(n)WN xn WN
2 2 N
nk nk N
2k
N
2 WN 2
n0
n0 n0
x(n) 1xn N 2 WN
n 2 k
2
n
WN x(0) + X(0)
n0
N 1 x(1) + X(4)
X (2k 1) x(n) xn N 2 WN WN 2
2
Upper 4-point DFT
k 0, 1, , 1
n nk N
2 half x(2) + X(2)
n 0
f1 (n) x(n) xn N 2
W80
n 0, 1, , N
2
1 x(4)
1
+ X(1)
W81
f 2 (n) x(n) xn N 2 WN n 0, 1, , 1
n N x(5) + X(5)
1
2 Lower 1 W82 4-point DFT
+ X(3)
half x(6)
N 1
W83
X (2k ) f1 (n)WN 2
2 1
Then nk x(7) + X(7)
n0
N 1
First stage in the computation of an 8-point DIF DFT.
X (2k 1) f 2 (n)WN 2
2
nk
n 0
14
Decimation in Frequency (DIF)
Radix-2 Algorithm
Input Shuffled 8-point
sequence output DFT
X(k)
x(n) sequence
x(0) + + + X(0)
1 W80
x(1) + + + X(4)
W80
x(2) + + + X(2)
1
1 W82 1 W80
x(3) + + + X(6)
W80
x(4) + + + X(1)
1
W81 1 W80
x(5) + + + X(5)
1
1 W82 W80
x(6) + + + X(3)
1
1 W83 1 W82 1 W80
x(7) + + + X(7)
15