- Cooley-Tukey FFT algorithm
The

**Cooley-Tukey**, named after J.W. Cooley andalgorithm John Tukey , is the most commonfast Fourier transform (FFT) algorithm. It re-expresses thediscrete Fourier transform (DFT) of an arbitrary composite size "N" = "N"_{1}"N"_{2}in terms of smaller DFTs of sizes "N"_{1}and "N"_{2}, recursively, in order to reduce the computation time to O("N" log "N") for highly-composite "N" (smooth number s). Because of the algorithm's importance, specific variants and implementation styles have become known by their own names, as described below.Because the Cooley-Tukey algorithm breaks the DFT into smaller DFTs, it can be combined arbitrarily with any other algorithm for the DFT. For example, Rader's or Bluestein's algorithm can be used to handle large prime factors that cannot be decomposed by Cooley-Tukey, or the prime-factor algorithm can be exploited for greater efficiency in separating out

relatively prime factors.See also the

fast Fourier transform for information on other FFT algorithms, specializations for real and/or symmetric data, and accuracy in the face of finitefloating-point precision.**History**This algorithm, including its recursive application, was invented around

1805 byCarl Friedrich Gauss , who used it to interpolate the trajectories of theasteroid s Pallas and Juno, but his work was not widely recognized (being published only posthumously and in neo-Latin) [*Gauss, Carl Friedrich, "Nachlass: Theoria interpolationis methodo nova tractata", Werke, Band 3, 265–327 (Königliche Gesellschaft der Wissenschaften, Göttingen, 1866)*] . Gauss did not analyze the asymptotic computational time, however. Various limited forms were also rediscovered several times throughout the 19th and early 20th centuriesHeideman, M. T., D. H. Johnson, and C. S. Burrus, "Gauss and the history of the fast Fourier transform," IEEE ASSP Magazine, 1, (4), 14–21 (1984)] . FFTs became popular afterJ. W. Cooley of IBM and John W. Tukey of Princeton published a paper in 1965 reinventing the algorithm and describing how to perform it conveniently on a computer Cooley, James W., and John W. Tukey, "An algorithm for the machine calculation of complex Fourier series," "Math. Comput."**19**, 297–301 (1965).] .Tukey reportedly came up with the idea during a meeting of a US presidential advisory committee discussing ways to detect nuclear-weapon tests in the

Soviet Union [*Cooley, James W., Peter A. W. Lewis, and Peter D. Welch, "Historical notes on the fast Fourier transform," "IEEE Trans. on Audio and Electroacoustics"*] [**15**(2), 76–79 (1967).*Rockmore, Daniel N. , "Comput. Sci. Eng."*] . Another participant at that meeting,**2**(1), 60 (2000). [*http://www.cs.dartmouth.edu/~rockmore/cse-fft.pdf The FFT — an algorithm the whole family can use*] Special issue on "top ten algorithms of the century " [*http://amath.colorado.edu/resources/archive/topten.pdf*]Richard Garwin of IBM, recognized the potential of the method and put Tukey in touch with Cooley, who implemented it for a different (and less-classified) problem: analyzing 3d crystallographic data (see also: multidimensional FFTs). Cooley and Tukey subsequently published their joint paper, and wide adoption quickly followed.The fact that Gauss had described the same algorithm (albeit without analyzing its asymptotic cost) was not realized until several years after Cooley and Tukey's 1965 paper. Their paper cited as inspiration only work by I. J. Good on what is now called the

prime-factor FFT algorithm (PFA), but it was not realized until later that PFA is a quite different algorithm (only working for sizes that haverelatively prime factors, unlike any composite size for Cooley-Tukey).**The radix-2 DIT case**A

**radix-2**decimation-in-time (**DIT**) FFT is the simplest and most common form of the Cooley-Tukey algorithm, although highly optimized Cooley-Tukey implementations typically use other forms of the algorithm as described below. Radix-2 DIT divides a DFT of size "N" into two interleaved DFTs (hence the name "radix-2") of size "N"/2 with each recursive stage.The DFT is defined by the formula::$X\_k\; =\; sum\_\{n=0\}^\{N-1\}\; x\_n\; e^\{-frac\{2pi\; i\}\{N\}\; nk\}$where $k$ is an integer ranging from $0$ to $N-1$.

Radix-2 DIT first computes the Fourier transforms of the even-indexed numbers$x\_\{2m\}$ ($x\_0,\; x\_2,\; ldots,\; x\_\{N-2\}$)and of the odd-indexed numbers $x\_\{2m+1\}$ ($x\_1,\; x\_3,\; ldots,\; x\_\{N-1\}$), and then combines those two results to produce the Fourier transform of the whole sequence. This idea can then be performed recursively to reduce the overall runtime to O("N" log "N"). This simplified form assumes that "N" is a

power of two ; since the number of sample points "N" can usually be chosen freely by the application, this is often not an important restriction.More explicitly, let us write $M=N/2$ and denote the DFT of the even-indexed numbers $x\_\{2m\}$ by $E\_j$ and the DFT of the odd-indexed numbers $x\_\{2m+1\}$ by $O\_j$ ($m=0,...,M-1$, $j=0,...,M-1$). Then it follows:

:$egin\{matrix\}$

X_k & = & sum_{m=0}^{frac{N}{2}-1} x_{2m} e^{-frac{2pi i}{N} (2m)k} + sum_{m=0}^{frac{N}{2}-1} x_{2m+1} e^{-frac{2pi i}{N} (2m+1)k} \ \

& = & sum_{m=0}^{M-1} x_{2m} e^{-frac{2pi i}{M} mk} + e^{-frac{2pi i}{N}k} sum_{m=0}^{M-1} x_{2m+1} e^{-frac{2pi i}{M} mk} \ \

& = & left{ egin{matrix} E_k + e^{-frac{2pi i}{N}k} O_k & mbox{if } k

E_{k-M} - e^{-frac{2pi i}{N}(k-M)} O_{k-M} & mbox{if } k geq M. end{matrix} ight. end{matrix}Here we have used the critical fact that $E\_\{k+M\}=E\_k$ and $O\_\{k+M\}=O\_k$, so that these DFTs, in addition to having only "M" sample points, needs only be evaluated for "M" values of "k". The original DFT has thus been divided into two DFTs of size "N/2".

This process is an example of the general technique of

divide and conquer algorithm s; in many traditional implementations, however, the explicit recursion is avoided, and instead one traverses the computational tree in breadth-first fashion.The above re-expression of a size-"N" DFT as two size-"N"/2 DFTs is sometimes called the

**Danielson-Lanczos**lemma, since the identity was noted by those two authors in 1942 [*Danielson, G. C., and C. Lanczos, "Some improvements in practical Fourier analysis and their application to X-ray scattering from liquids," "J. Franklin Inst."*] (influenced by Runge's 1903 work). They applied their lemma in a "backwards" recursive fashion, repeatedly "doubling" the DFT size until the transform spectrum converged (although they apparently didn't realize the**233**, 365–380 and 435–452 (1942).linearithmic asymptotic complexity they had achieved). The Danielson-Lanczos work predated widespread availability ofcomputer s and required hand calculation (possibly with mechanical aides such asadding machine s); they reported a computation time of 140 minutes for a size-64 DFT operating on real inputs to 3-5 significant digits. Cooley and Tukey's 1965 paper reported a running time of 0.02 minutes for a size-2048 complex DFT on anIBM 7094 (probably in 36-bit single precision, ~8 digits). Rescaling the time by the number of operations, this corresponds roughly to a speedup factor of around 800,000. (140 minutes for size 64 may sound like a long time, but it corresponds to an average of at most 16 seconds per floating-point operation, around 20% of which are multiplications...this is a fairly impressive rate for a human being to sustain for over two hours, especially considering the bookkeeping overhead.)**General factorizations**More generally, Cooley-Tukey algorithms recursively re-express a DFT of a composite size "N" = "N"

_{1}"N"_{2}as [*Duhamel, P., and M. Vetterli, "Fast Fourier transforms: a tutorial review and a state of the art," "Signal Processing"*] :**19**, 259–299 (1990)# Perform "N"

_{1}DFTs of size "N"_{2}.

# Multiply by complexroots of unity calledtwiddle factor s.

# Perform "N"_{2}DFTs of size "N"_{1}.Typically, either "N"

_{1}or "N"_{2}is a small factor ("not" necessarily prime), called the**radix**(which can differ between stages of the recursion). If "N"_{1}is the radix, it is called a**decimation in time**(DIT) algorithm, whereas if "N"_{2}is the radix, it is**decimation in frequency**(DIF, also called the Sande-Tukey algorithm). The version presented above was a radix-2 DIT algorithm; in the final expression, the phase multiplying the odd transform is the twiddle factor, and the +/- combination ("butterfly") of the even and odd transforms is a size-2 DFT. (The radix's small DFT is sometimes known as a butterfly, so-called because of the shape of thedataflow diagram for the radix-2 case.)There are many other variations on the Cooley-Tukey algorithm.

**Mixed-radix**implementations handle composite sizes with a variety of (typically small) factors in addition to two, usually (but not always) employing the O("N"^{2}) algorithm for the prime base cases of the recursion. Split radix merges radices 2 and 4, exploiting the fact that the first transform of radix 2 requires no twiddle factor, in order to achieve the lowest known arithmetic operation count for power-of-two sizes. (On present-day computers, performance is determined more by cache andCPU pipeline considerations than by strict operation counts; well-optimized FFT implementations often employ larger radices and/or hard-coded base-case transforms of significant size.) Another way of looking at the Cooley-Tukey algorithm is that it re-expresses a size "N" one-dimensional DFT as an "N"_{1}by "N"_{2}two-dimensional DFT (plus twiddles), where the output matrix is transposed. The net result of all of these transpositions, for a radix-2 algorithm, corresponds to a bit reversal of the input (DIF) or output (DIT) indices. If, instead of using a small radix, one employs a radix of roughly √"N" and explicit input/output matrix transpositions, it is called a**four-step**algorithm (or "six-step", depending on the number of transpositions), initially proposed to improve memory locality,Gentleman W. M., and G. Sande, "Fast Fourier transforms—for fun and profit," "Proc. AFIPS"**29**, 563–578 (1966).] Bailey, David H., "FFTs in external or hierarchical memory," "J. Supercomputing"**4**(1), 23–35 (1990)] e.g. for cache optimization orout-of-core operation, and was later shown to be an optimalcache-oblivious algorithm .M. Frigo, C.E. Leiserson, H. Prokop, and S. Ramachandran. Cache-oblivious algorithms. In "Proceedings of the 40th IEEE Symposium on Foundations of Computer Science" (FOCS 99), p.285-297. 1999. [*http://ieeexplore.ieee.org/iel5/6604/17631/00814600.pdf?arnumber=814600 Extended abstract at IEEE*] , [*http://citeseer.ist.psu.edu/307799.html at Citeseer*] .]The general Cooley-Tukey factorization rewrites the indices "k" and "n" as $k\; =\; N\_2\; k\_1\; +\; k\_2$ and $n\; =\; N\_1\; n\_2\; +\; n\_1$, respectively, where the indices "k"

_{a}and "n"_{a}run from 0.."N"_{a}-1 (for "a" of 1 or 2). That is, it re-indexes the input ("n") and output ("k") as "N"_{1}by "N"_{2}two-dimensional arrays in column-major androw-major order , respectively; the difference between these indexings is a transposition, as mentioned above. When this re-indexing is substituted into the DFT formula for "nk", the $N\_1\; n\_2\; N\_2\; k\_1$ cross term vanishes (its exponential is unity), and the remaining terms give:$X\_\{N\_2\; k\_1\; +\; k\_2\}\; =\; sum\_\{n\_1=0\}^\{N\_1-1\}\; sum\_\{n\_2=0\}^\{N\_2-1\}\; x\_\{N\_1\; n\_2\; +\; n\_1\}\; e^\{-frac\{2pi\; i\}\{N\_1\; N\_2\}\; cdot\; (N\_1\; n\_2\; +\; n\_1)\; cdot\; (N\_2\; k\_1\; +\; k\_2)\; \}$::$=\; sum\_\{n\_1=0\}^\{N\_1-1\}\; left\; [\; e^\{-frac\{2pi\; i\}\{N\}\; n\_1\; k\_2\; \}\; ight]\; left(\; sum\_\{n\_2=0\}^\{N\_2-1\}\; x\_\{N\_1\; n\_2\; +\; n\_1\}\; e^\{-frac\{2pi\; i\}\{N\_2\}\; n\_2\; k\_2\; \}\; ight)\; e^\{-frac\{2pi\; i\}\{N\_1\}\; n\_1\; k\_1\; \}$

where the inner sum is a DFT of size "N"

_{2}, the outer sum is a DFT of size "N"_{1}, and the[...] bracketed term is the twiddle factor.An arbitrary radix "r" (as well as mixed radices) can be employed, as was shown by both Cooley and Tukey as well as Gauss (who gave examples of radix-3 and radix-6 steps). Cooley and Tukey originally assumed that the radix butterfly required O("r"

^{2}) work and hence reckoned the complexity for a radix "r" to be O("r"^{2}"N"/"r" log_{"r"}"N") = O("N" log_{2}("N") "r"/log_{2}"r"); from calculation of values of "r"/log_{2}"r" for integer values of "r" from 2 to 12 the optimal radix is found to be 3 (the closest integer to "e", which minimizes "r"/log_{2}"r"). [*Cooley, J. W., P. Lewis and P. Welch, "The Fast Fourier Transform and its Applications", "IEEE Trans on Education"*] This analysis was erroneous, however: the radix-butterfly is also a DFT and can be performed via an FFT algorithm in O("r" log "r") operations, hence the radix "r" actually cancels in the complexity O("r" log("r") "N"/"r" log**12**, 1, 28-34 (1969)_{"r"}"N"), and the optimal "r" is determined by more complicated considerations. In practice, quite large "r" (32 or 64) are important in practice in order to effectively exploit e.g. the large number ofprocessor register s on modern processors, and even a unbounded radix "r"=√"N" also achieves O("N" log "N") complexity and has theoretical and practical advantages for large "N" as mentioned above.**Data reordering, bit reversal, and in-place algorithms**Although the abstract Cooley-Tukey factorization of the DFT, above, applies in some form to all implementations of the algorithm, much greater diversity exists in the techniques for ordering and accessing the data at each stage of the FFT. Of special interest is the problem of devising an

in-place algorithm that overwrites its input with its output data using only O(1) auxiliary storage.The most well-known reordering technique involves explicit

**bit reversal**for in-place radix-2 algorithms. Bit reversal is thepermutation where the data at an index "n", written in binary with digits "b"_{4}"b"_{3}"b"_{2}"b"_{1}"b"_{0}(e.g. 5 digits for "N"=32 inputs), is transferred to the index with reversed digits "b"_{0}"b"_{1}"b"_{2}"b"_{3}"b"_{4}. Consider the last stage of a radix-2 DIT algorithm like the one presented above, where the output is written in-place over the input: when $E\_k$ and $O\_k$ are combined with a size-2 DFT, those two values are overwritten by the outputs. However, the two output values should go in the first and second "halves" of the output array, corresponding to the "most" significant bit "b"_{4}(for "N"=32); whereas the two inputs $E\_k$ and $O\_k$ are interleaved in the even and odd elements, corresponding to the "least" significant bit "b"_{0}. Thus, in order to get the output in the correct place, these two bits must be swapped in the input. If you include all of the recursive stages of a radix-2 DIT algorithm, "all" the bits must be swapped and thus one must pre-process the "input" with a bit reversal to get in-order output. Correspondingly, the reversed (dual) algorithm is radix-2 DIF, and this takes in-order input and produces bit-reversed "output", requiring a bit-reversal post-processing step. Alternatively, some applications (such as convolution) work equally well on bit-reversed data, so one can do radix-2 DIF without bit reversal, followed by processing, followed by the radix-2 DIT inverse DFT without bit reversal to produce final results in the natural order.Many FFT users, however, prefer natural-order outputs, and a separate, explicit bit-reversal stage can have a non-negligible impact on the computation time, even though bit reversal can be done in O("N") time and has been the subject of much research [

*Karp, Alan H., "Bit reversal on uniprocessors," "SIAM Review"*] [**38**(1), 1–26 (1996)*Carter, Larry and Kang Su Gatlin, "Towards an optimal bit-reversal permutation program," "Proc. 39th Ann. Symp. on Found. of Comp. Sci. (FOCS)", 544–553 (1998).*] [*Rubio, M., P. Gómez, and K. Drouiche, "A new superfast bit reversal algorithm," "Intl. J. Adaptive Control and Signal Processing"*] ). Also, while the permutation is a bit reversal in the radix-2 case, it is more generally an arbitrary (mixed-base) digit reversal for the mixed-radix case, and the permutation algorithms become more complicated to implement. Moreover, it is desirable on many hardware architectures to re-order intermediate stages of the FFT algorithm so that they operate on consecutive (or at least more localized) data elements. To these ends, a number of alternative implementation schemes have been devised for the Cooley-Tukey algorithm that do not require separate bit reversal and/or involve additional permutations at intermediate stages.**16**, 703–707 (2002)The problem is greatly simplified if it is

**out-of-place**: the output array is distinct from the input array or, equivalently, an equal-size auxiliary array is available. The**Stockham auto-sort**algorithm [*Stockham, T. G., "High speed convolution and correlation", "Spring Joint Computer Conference, Proc. AFIPS"*] performs every stage of the FFT out-of-place, typically writing back and forth between two arrays, transposing one "digit" of the indices with each stage, and has been especially popular on**28**, 229–233 (1966)SIMD architectures [*Swarztrauber, P. N., "Vectorizing the FFTs", in G. Rodrigue (Ed.), "Parallel Computations" (Academic Press, New York, 1982), pp. 51–83.*] . Even greater potential SIMD advantages (more consecutive accesses) have been proposed for the**Pease**algorithm [*Pease, M. C."An adaptation of the fast Fourier transform for parallel processing", "J. ACM"*] , which also reorders out-of-place with each stage, but this method requires separate bit/digit reversal and O("N" log "N") storage. One can also directly apply the Cooley-Tukey factorization definition with explicit (depth-first) recursion and small radices, which produces natural-order out-of-place output with no separate permutation step and can be argued to have cache-oblivious locality benefits on systems with hierarchical memory [**15**(2), 252–264 (1968)*Singleton, Richard C., "On computing the fast Fourier transform", "Commun. of the ACM"*] [**10**(1967), 647–654*Frigo, Matteo and Steven G. Johnson: "FFTW", http://www.fftw.org/. A free (GPL) C library for computing discrete Fourier transforms in one or more dimensions, of arbitrary size, using the Cooley-Tukey algorithm*] Frigo, M. and S. G. Johnson, "Proceedings of the IEEE"**93**(2), 216–231 (2005) [*http://fftw.org/fftw-paper-ieee.pdf The Design and Implementation of FFTW3*] ]A typical strategy for in-place algorithms without auxiliary storage and without separate digit-reversal passes involves small matrix transpositions (which swap individual pairs of digits) at intermediate stages, which can be combined with the radix butterflies to reduce the number of passes over the data [

*Johnson, H. W. and C. S. Burrus, "An in-place in-order radix-2 FFT," "Proc. ICASSP", 28A.2.1–28A.2.4 (1984)*] [*Temperton, C., "Self-sorting in-place fast Fourier transform," "SIAM J. Sci. Stat. Comput."*] [**12**(4), 808–823 (1991)*Qian, Z., C. Lu, M. An, and R. Tolimieri, "Self-sorting in-place FFT algorithm with minimum working space," "IEEE Trans. ASSP"*] [**52**(10), 2835–2836 (1994)*Hegland, M., "A self-sorting in-place fast Fourier transform algorithm suitable for vector and parallel processing," "Numerische Mathematik"*]**68**(4), 507–547 (1994)**References**

*Wikimedia Foundation.
2010.*

### См. также в других словарях:

**Cooley–Tukey FFT algorithm**— The Cooley–Tukey algorithm, named after J.W. Cooley and John Tukey, is the most common fast Fourier transform (FFT) algorithm. It re expresses the discrete Fourier transform (DFT) of an arbitrary composite size N = N1N2 in terms of smaller DFTs… … Wikipedia**Bruun's FFT algorithm**— Bruun s algorithm is a fast Fourier transform (FFT) algorithm based on an unusual recursive polynomial factorization approach, proposed for powers of two by G. Bruun in 1978 and generalized to arbitrary even composite sizes by H. Murakami in 1996 … Wikipedia**Split-radix FFT algorithm**— The split radix FFT is a fast Fourier transform (FFT) algorithm for computing the discrete Fourier transform (DFT), and was first described in an obscure paper by R. Yavne (1968) and subsequently rediscovered simultaneously by various authors in… … Wikipedia**Rader's FFT algorithm**— Rader s algorithm (1968) is a fast Fourier transform (FFT) algorithm that computes the discrete Fourier transform (DFT) of prime sizes by re expressing the DFT as a cyclic convolution. (The other algorithm for FFTs of prime sizes, Bluestein s… … Wikipedia**Prime-factor FFT algorithm**— The Prime factor algorithm (PFA), also called the Good Thomas algorithm (1958/1963), is a fast Fourier transform (FFT) algorithm that re expresses the discrete Fourier transform (DFT) of a size N = N 1 N 2 as a two dimensional N 1 times; N 2 DFT … Wikipedia**Bluestein's FFT algorithm**— (1968), commonly called the chirp z transform algorithm (1969), is a fast Fourier transform (FFT) algorithm that computes the discrete Fourier transform (DFT) of arbitrary sizes (including prime sizes) by re expressing the DFT as a convolution.… … Wikipedia**Tukey**— John Wilder Tukey (* 16. Juni 1915 in New Bedford, Massachusetts; † 26. Juli 2000 in New Brunswick (New Jersey)) war ein US amerikanischer Statistiker. Der Begriff Bit wurde von Tukey vermutlich 1946, nach anderen Quellen schon 1943 vorgeschlagen … Deutsch Wikipedia**John Tukey**— Infobox Scientist name = John Tukey caption = John Wilder Tukey birth date = birth date|1915|6|16 birth place = New Bedford, Massachusetts, USA death date = death date and age|2000|7|26|1915|6|16 death place = New Brunswick, New Jersey residence … Wikipedia**James Cooley**— Dr. James Cooley (born 1926) is an American mathematician. James William Cooley received a B.A. degree in 1949 from Manhattan College, Bronx, NY, an M.A. degree in 1951 from Columbia University, New York, NY, and a Ph.D. degree in 1961 in applied … Wikipedia**Goertzel algorithm**— The Goertzel algorithm is a digital signal processing (DSP) technique for identifying frequency components of a signal, published by Dr. Gerald Goertzel in 1958. While the general Fast Fourier transform (FFT) algorithm computes evenly across the… … Wikipedia