Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

20. The following results are relevant in information theory when one tries to recover a signal from its samples. Suppose f is of moderate

image text in transcribed

20. The following results are relevant in information theory when one tries to recover a signal from its samples. Suppose f is of moderate decrease and that its Fourier transform is sup- ported in I = [1/2, 1/2]. Then, f is entirely determined by its restriction to Z. This means that if g is another function of moderate decrease whose Fourier transform is supported in I and f(n) = g(n) for all n Z, then = g. More precisely: (a) Prove that the following reconstruction formula holds: sin Ty f(x) = f(n)K(x n) - where K(y) = Note that K(y) = O(1/|y|) as |y| . (b) If > 1, then f(x) = (1) *. (*-*) } } Kx cos where K(y) COS TY - COSTy = ( 1)y - Thus, if one samples f "more often," the series in the reconstruction formula converges faster since Kx(y) = O(1/|y|) as y |y| . Note that K(y) K(y) as 1. (c) Prove that [ |f(x)| dx = \(n)|. N=1 [Hint: For part (a) show that if x is the characteristic function of I, then () = x() x_ f(n)e-2ing. For (b) use the function in Figure 2 instead of x().] n= -

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Essentials of Accounting for Governmental and Not-for-Profit Organizations

Authors: Paul A. Copley

10th Edition

007352705X, 978-0073527055

More Books

Students also viewed these Accounting questions

Question

How do you secure the network perimeter?

Answered: 1 week ago

Question

How do the different types of firewalls work?

Answered: 1 week ago

Question

What are major aspects of intrusion prevention?

Answered: 1 week ago