Auswahl der wissenschaftlichen Literatur zum Thema „Transformée de Walsh“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Transformée de Walsh" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Transformée de Walsh"
Hu Liang, 胡亮, 胡学娟 Hu Xuejuan, 黄圳鸿 Huang Zhenhong, 徐露 Xu Lu und 连丽津 Lian Lijin. „基于离散Walsh-Hadamard变换和引导滤波的多聚焦图像融合“. Laser & Optoelectronics Progress 58, Nr. 22 (2021): 2210003. http://dx.doi.org/10.3788/lop202158.2210003.
Der volle Inhalt der QuelleSasikala, D., und R. Neelaveni. „Correlation Coefficient Measure of Mono and Multimodal Brain Image Registration using Fast Walsh Hadamard Transform“. International Journal of Engineering and Technology 3, Nr. 2 (2011): 154–60. http://dx.doi.org/10.7763/ijet.2011.v3.215.
Der volle Inhalt der QuelleBirkeland, Peter. „Supermarkets Transformed: Understanding Organizational and Technological Innovations.John P. Walsh“. American Journal of Sociology 100, Nr. 3 (November 1994): 845–46. http://dx.doi.org/10.1086/230598.
Der volle Inhalt der QuelleBerti, E., F. Chiaraluce, N. E. Evans und J. J. McKee. „Reduction of Walsh-transformed electrocardiograms by double logarithmic coding“. IEEE Transactions on Biomedical Engineering 47, Nr. 11 (2000): 1543–47. http://dx.doi.org/10.1109/10.880108.
Der volle Inhalt der QuelleJeyasurya, B., und M. Rahman. „Application of Walsh Functions for Microprocessor-Based Transformer Protection“. IEEE Transactions on Electromagnetic Compatibility EMC-27, Nr. 4 (November 1985): 221–25. http://dx.doi.org/10.1109/temc.1985.304293.
Der volle Inhalt der QuelleMagomed-Kasumov, Magomedrasul, und Salikh Magomedov. „Быстрое преобразование Фурье по системе функций, ортогональных по Соболеву и порожденных системой Уолша“. Daghestan Electronic Mathematical Reports, Nr. 15 (2021): 55–66. http://dx.doi.org/10.31029/demr.15.5.
Der volle Inhalt der QuelleMustafa, Ziyad Tariq, Alaa Al-Hammami und Jasim Al-Samarai. „Evaluation of Wavelet Transform Audio Hiding“. Iraqi Journal for Computers and Informatics 40, Nr. 1 (31.12.2002): 32–44. http://dx.doi.org/10.25195/ijci.v40i1.224.
Der volle Inhalt der QuelleWU, Wei. „Characteristics of Dual-cylinder Hydraulic Transformer with Rotatable Wash Plate“. Journal of Mechanical Engineering 49, Nr. 22 (2013): 144. http://dx.doi.org/10.3901/jme.2013.22.144.
Der volle Inhalt der QuelleShuo-Yen Tseng. „Synthesis of a 4 $\times$ 4 Walsh–Hadamard Transformer Using Long-Period Waveguide Grating Arrays“. IEEE Photonics Technology Letters 21, Nr. 14 (Juli 2009): 972–74. http://dx.doi.org/10.1109/lpt.2009.2021154.
Der volle Inhalt der QuelleMAGAÑA, SONIA, SARAH M. SCHLEMMER, GORDON R. DAVIDSON, ELLIOT T. RYSER und DANIEL V. LIM. „Laboratory and Pilot-Scale Dead-End Ultrafiltration Concentration of Sanitizer-Free and Chlorinated Lettuce Wash Water for Improved Detection of Escherichia coli O157:H7“. Journal of Food Protection 77, Nr. 8 (01.08.2014): 1260–68. http://dx.doi.org/10.4315/0362-028x.jfp-13-421.
Der volle Inhalt der QuelleDissertationen zum Thema "Transformée de Walsh"
Flórez, Gutiérrez Antonio. „Improved Techniques in the Cryptanalysis of Symmetric Primitives“. Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS281.
Der volle Inhalt der QuelleThis thesis proposes improvements which can be applied to several techniques for the cryptanalysis of symmetric primitives. Special attention is given to linear cryptanalysis, for which a technique based on the fast Walsh transform was already known (Collard et al., ICISIC 2007). We introduce a generalised version of this attack, which allows us to apply it on key recovery attacks over multiple rounds, as well as to reduce the complexity of the problem using information extracted, for example, from the key schedule. We also propose a general technique for speeding key recovery attacks up which is based on the representation of Sboxes as binary decision trees. Finally, we showcase the construction of a linear approximation of the full version of the Gimli permutation using mixed-integer linear programming (MILP) optimisation
Lazaridis, George. „Image processing using the Walsh transform“. Thesis, University of Surrey, 2004. http://epubs.surrey.ac.uk/843950/.
Der volle Inhalt der QuelleFuris, Mihai Alexandru Johnson Jeremy. „Cache miss analysis of Walsh-Hadamard Transform algorithms /“. Philadelphia : Drexel University, 2003. http://dspace.library.drexel.edu/handle/1721.1/109.
Der volle Inhalt der QuelleO'Dowd, Timothy R. „Discovery of bent functions using the Fast Walsh Transform“. Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5080.
Der volle Inhalt der QuelleLinear cryptanalysis attacks are a threat against cryptosystems. These attacks can be defended against by using combiner functions composed of highly nonlinear Boolean functions. Bent functions, which have the highest possible nonlinearity, are uncommon. As the number of variables in a Boolean function increases, bent functions become extremely rare. A method of computing the nonlinearity of Boolean functions using the Fast Walsh Transform (FWT) is presented. The SRC-6 reconfigurable computer allows testing of functions at a much faster rate than a PC. With a clock frequency of 100 MHz, throughput of the SRC-6 is 100,000,000 functions per second. An implementation of the FWT used to compute the nonlinearity of Boolean functions with up to five variables is presented. Since there are 22n Boolean functions of n variables, computation of the nonlinearity of every Boolean function with six or more variables takes thousands of years to complete. This makes discovery of bent functions difficult for large n. An algorithm is presented that uses information in the FWT of a function to produce similar functions with increasingly higher nonlinearity. This algorithm demonstrated the ability to enumerate every bent function for n = 4 without the necessity of exhaustively testing all fourvariable functions.
Davis, Jeffrey H. „A study of potential uses for Walsh transformed images in target recognition“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA292722.
Der volle Inhalt der QuelleDesmond, Allan Peter. „An analytical signal transform derived from the Walsh Transform for efficient detection of dual tone multiple frequency (DTMF) signals“. Thesis, Bucks New University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.401474.
Der volle Inhalt der QuelleSagdicoglu, Serhat. „Cryptological Viewpoint Of Boolean Functions“. Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1082403/index.pdf.
Der volle Inhalt der QuelleRAJYALAKSHMI, P. S., und R. K. RAJANGAM. „DATA COMPRESSION SYSTEM FOR VIDEO IMAGES“. International Foundation for Telemetering, 1986. http://hdl.handle.net/10150/615539.
Der volle Inhalt der QuelleIn most transmission channels, bandwidth is at a premium and an important attribute of any good digital signalling scheme is to optimally utilise the bandwidth for transmitting the information. The Data Compression System in this way plays a significant role in the transmission of picture data from any Remote Sensing Satellite by exploiting the statistical properties of the imagery. The data rate required for transmission to ground can be reduced by using suitable compression technique. A data compression algorithm has been developed for processing the images of Indian Remote Sensing Satellite. Sample LANDSAT imagery and also a reference photo are used for evaluating the performance of the system. The reconstructed images are obtained after compression for 1.5 bits per pixel and 2 bits per pixel as against the original of 7 bits per pixel. The technique used is uni-dimensional Hadamard Transform Technique. The Histograms are computed for various pictures which are used as samples. This paper describes the development of such a hardware and software system and also indicates how hardware can be adopted for a two dimensional Hadamard Transform Technique.
Ahmed, Kamal Ali. „Digital watermarking of still images“. Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/digital-watermarking-of-still-images(0dc4b146-3d97-458f-9506-8c67bc3a155b).html.
Der volle Inhalt der QuelleEl, Omer. „Avalanche Properties And Randomness Of The Twofish Cipher“. Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605571/index.pdf.
Der volle Inhalt der Quelles results. The strength of the cipher to cryptanalytic attacks is investigated by measuring its randomness according to the avalanche criterion. The avalanche criterion results are compared with those of the Statistical Test Suite of the NIST and discrepancies in the second and third rounds are explained theoretically.
Bücher zum Thema "Transformée de Walsh"
Golubov, B., A. Efimov und V. Skvortsov. Walsh Series and Transforms. Dordrecht: Springer Netherlands, 1991. http://dx.doi.org/10.1007/978-94-011-3288-6.
Der volle Inhalt der QuelleV, Efimov A., und Skvort͡s︡ov V. A, Hrsg. Walsh series and transforms: Theory and applications. Dordrecht [Netherlands]: Kluwer Academic Publishers, 1991.
Den vollen Inhalt der Quelle findenGolubov, B. Walsh Series and Transforms: Theory and Applications. Dordrecht: Springer Netherlands, 1991.
Den vollen Inhalt der Quelle findenGolubov, B., V. Skvortsov und A. Efimov. Walsh Series and Transforms: Theory and Applications. Springer Netherlands, 2012.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Transformée de Walsh"
Klapper, Andrew, und Mark Goresky. „A With-Carry Walsh Transform“. In Sequences and Their Applications – SETA 2010, 217–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15874-2_18.
Der volle Inhalt der QuelleWu, Chuan-Kun, und Dengguo Feng. „Boolean Functions and Their Walsh Transforms“. In Advances in Computer Science and Technology, 1–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-48865-2_1.
Der volle Inhalt der QuelleGolubov, Boris I. „Dyadic Derivative and Walsh-Fourier Transform“. In Dyadic Walsh Analysis from 1924 Onwards Walsh-Gibbs-Butzer Dyadic Differentiation in Science Volume 1 Foundations, 443–47. Paris: Atlantis Press, 2015. http://dx.doi.org/10.2991/978-94-6239-160-4_11.
Der volle Inhalt der QuelleArndt, Jörg. „The Walsh transform and its relatives“. In Matters Computational, 459–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14764-7_23.
Der volle Inhalt der QuelleKlapper, Andrew. „Arithmetic Walsh Transform of Quadratic Boolean Functions“. In Lecture Notes in Computer Science, 65–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30615-0_6.
Der volle Inhalt der QuelleSrivastva, Ranjeet, und Yogendra Narain Singh. „ECG Biometric Analysis Using Walsh–Hadamard Transform“. In Advances in Data and Information Sciences, 201–10. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8360-0_19.
Der volle Inhalt der QuelleJin, Wengang, Xiaoni Du, Jinxia Hu und Yanzhong Sun. „Boolean Functions with a Few Walsh Transform Values“. In Advances in Artificial Intelligence and Security, 642–55. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78618-2_53.
Der volle Inhalt der QuelleDiana Andrushia, A., und R. Thangarjan. „Saliency-Based Image Compression Using Walsh–Hadamard Transform (WHT)“. In Biologically Rationalized Computing Techniques For Image Processing Applications, 21–42. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61316-1_2.
Der volle Inhalt der QuelleFlórez-Gutiérrez, Antonio. „Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning“. In Advances in Cryptology – ASIACRYPT 2022, 447–76. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22972-5_16.
Der volle Inhalt der QuelleGong, Guang, Tor Helleseth, Honggang Hu und Chunlei Li. „New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences“. In Lecture Notes in Computer Science, 327–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30615-0_30.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Transformée de Walsh"
Uri, Joseph B. „The Cormack - Walsh Transform“. In 14th Congress of the International Commission for Optics, herausgegeben von Henri H. Arsenault. SPIE, 1987. http://dx.doi.org/10.1117/12.967374.
Der volle Inhalt der QuelleGlasser, Adrian, und Howard C. Howland. „Artistic transformations in image processing“. In OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1986. http://dx.doi.org/10.1364/oam.1986.thn9.
Der volle Inhalt der QuelleIrion, Jeff, und Naoki Saito. „The generalized Haar-Walsh transform“. In 2014 IEEE Statistical Signal Processing Workshop (SSP). IEEE, 2014. http://dx.doi.org/10.1109/ssp.2014.6884678.
Der volle Inhalt der QuelleBen Uri, Joseph. „Coded holography for Walsh transform and Haar transform“. In Holographics International '92, herausgegeben von Yuri N. Denisyuk und Frank Wyrowski. SPIE, 1993. http://dx.doi.org/10.1117/12.140399.
Der volle Inhalt der QuelleIttycheriah, Abraham P., John F. Walkup und Thomas F. Krile. „Applications of a Polarization-Based Optical Processor“. In Optical Computing. Washington, D.C.: Optica Publishing Group, 1989. http://dx.doi.org/10.1364/optcomp.1989.tui10.
Der volle Inhalt der QuelleLee, Man Hee, Muhammad Basit Shahab, Md Fazlul Kader und Soo Young Shin. „Spatial multiplexing using walsh-hadamard transform“. In 2016 International Conference on Smart Green Technology in Electrical and Information Systems (ICSGTEIS). IEEE, 2016. http://dx.doi.org/10.1109/icsgteis.2016.7885764.
Der volle Inhalt der QuelleFalkowski, Bogdan J., und Shixing Yan. „Ternary Walsh spectral transform decision diagrams“. In 2007 6th International Conference on Information, Communications & Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/icics.2007.4449769.
Der volle Inhalt der QuelleLu, Yi. „Practical tera-scale Walsh-Hadamard Transform“. In 2016 Future Technologies Conference (FTC). IEEE, 2016. http://dx.doi.org/10.1109/ftc.2016.7821757.
Der volle Inhalt der QuelleFalkowski, Bogdan, und Shixing Yan. „Arithmetic-Walsh Spectral Transform Decision Diagrams“. In 2006 IEEE International Symposium on Information Theory. IEEE, 2006. http://dx.doi.org/10.1109/isit.2006.261902.
Der volle Inhalt der QuelleEl-Konyaly, El-Sayed H., Sabry F. Saraya und Wael W. A. A. Al-Khazragy. „Point feature matching adopting Walsh transform“. In Intelligent Systems & Advanced Manufacturing, herausgegeben von David P. Casasent. SPIE, 1997. http://dx.doi.org/10.1117/12.290330.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Transformée de Walsh"
Liberty, Edo, Nir Ailon und Amit Singer. Fast Random Projections Using Lean Walsh Transforms. Fort Belvoir, VA: Defense Technical Information Center, Dezember 2007. http://dx.doi.org/10.21236/ada489771.
Der volle Inhalt der Quelle