Fortran How to Find an Effective 2D FFT Subroutine in Fortran 77?

AI Thread Summary
An effective two-dimensional FFT subroutine in Fortran 77 can be sourced from established libraries rather than being programmed from scratch, as creating these numerical building blocks is complex and often unnecessary. Recommended libraries include MKL and ACML for comprehensive numerical solutions, including matrix operations. FFTW is also a viable option, particularly for Linux systems, but users should note that it is primarily written in C. For those seeking alternative solutions, Ooura's Mathematical Software Packages offer efficient FFT routines that are user-friendly. Utilizing these libraries ensures optimal performance and accuracy in FFT implementations.
seanshee
Messages
3
Reaction score
0
Does someone have an effective two-dimensional FFT subroutine in Fortran 77?
 
Technology news on Phys.org
Numerical building blocks like matrix algebra, linear algebra, or FFTs are not normally programmed by yourself, but taken from libraries. The reason for this is that getting those building blocks right is *very* difficult[1], and you get absolutely nothing from doing them yourself. FFT routines are, for example, provided by MKL or ACML (which are recommended because you also get the matrix stuff), but you can also take them from FFTW, which comes in packages for all linux systems (install fftw3) and can also be used from Fortran.

Note: You mean "efficient". "Effective" and "efficient" are not the same things.

[1] And in the matrix multiplication case, you simply cannot beat BLAS. It's impossible.
 
FFTW is wonderful, but if you want a quicker solution, check Ooura's Mathematical Software Packages. I found Ooura's FFT routines to be efficient and easy to use.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.

Similar threads

Replies
3
Views
2K
Replies
59
Views
11K
Replies
8
Views
4K
Replies
5
Views
3K
Replies
22
Views
4K
Replies
9
Views
4K
Replies
4
Views
2K
Back
Top