Academic literature on the topic 'Transformée de Walsh'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Transformée de Walsh.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Transformée de Walsh"
Hu Liang, 胡亮, 胡学娟 Hu Xuejuan, 黄圳鸿 Huang Zhenhong, 徐露 Xu Lu, and 连丽津 Lian Lijin. "基于离散Walsh-Hadamard变换和引导滤波的多聚焦图像融合." Laser & Optoelectronics Progress 58, no. 22 (2021): 2210003. http://dx.doi.org/10.3788/lop202158.2210003.
Full textSasikala, D., and R. Neelaveni. "Correlation Coefficient Measure of Mono and Multimodal Brain Image Registration using Fast Walsh Hadamard Transform." International Journal of Engineering and Technology 3, no. 2 (2011): 154–60. http://dx.doi.org/10.7763/ijet.2011.v3.215.
Full textBirkeland, Peter. "Supermarkets Transformed: Understanding Organizational and Technological Innovations.John P. Walsh." American Journal of Sociology 100, no. 3 (November 1994): 845–46. http://dx.doi.org/10.1086/230598.
Full textBerti, E., F. Chiaraluce, N. E. Evans, and J. J. McKee. "Reduction of Walsh-transformed electrocardiograms by double logarithmic coding." IEEE Transactions on Biomedical Engineering 47, no. 11 (2000): 1543–47. http://dx.doi.org/10.1109/10.880108.
Full textJeyasurya, B., and M. Rahman. "Application of Walsh Functions for Microprocessor-Based Transformer Protection." IEEE Transactions on Electromagnetic Compatibility EMC-27, no. 4 (November 1985): 221–25. http://dx.doi.org/10.1109/temc.1985.304293.
Full textMagomed-Kasumov, Magomedrasul, and Salikh Magomedov. "Быстрое преобразование Фурье по системе функций, ортогональных по Соболеву и порожденных системой Уолша." Daghestan Electronic Mathematical Reports, no. 15 (2021): 55–66. http://dx.doi.org/10.31029/demr.15.5.
Full textMustafa, Ziyad Tariq, Alaa Al-Hammami, and Jasim Al-Samarai. "Evaluation of Wavelet Transform Audio Hiding." Iraqi Journal for Computers and Informatics 40, no. 1 (December 31, 2002): 32–44. http://dx.doi.org/10.25195/ijci.v40i1.224.
Full textWU, Wei. "Characteristics of Dual-cylinder Hydraulic Transformer with Rotatable Wash Plate." Journal of Mechanical Engineering 49, no. 22 (2013): 144. http://dx.doi.org/10.3901/jme.2013.22.144.
Full textShuo-Yen Tseng. "Synthesis of a 4 $\times$ 4 Walsh–Hadamard Transformer Using Long-Period Waveguide Grating Arrays." IEEE Photonics Technology Letters 21, no. 14 (July 2009): 972–74. http://dx.doi.org/10.1109/lpt.2009.2021154.
Full textMAGAÑA, SONIA, SARAH M. SCHLEMMER, GORDON R. DAVIDSON, ELLIOT T. RYSER, and DANIEL V. LIM. "Laboratory and Pilot-Scale Dead-End Ultrafiltration Concentration of Sanitizer-Free and Chlorinated Lettuce Wash Water for Improved Detection of Escherichia coli O157:H7." Journal of Food Protection 77, no. 8 (August 1, 2014): 1260–68. http://dx.doi.org/10.4315/0362-028x.jfp-13-421.
Full textDissertations / Theses on the topic "Transformée de Walsh"
Flórez, Gutiérrez Antonio. "Improved Techniques in the Cryptanalysis of Symmetric Primitives." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS281.
Full textThis thesis proposes improvements which can be applied to several techniques for the cryptanalysis of symmetric primitives. Special attention is given to linear cryptanalysis, for which a technique based on the fast Walsh transform was already known (Collard et al., ICISIC 2007). We introduce a generalised version of this attack, which allows us to apply it on key recovery attacks over multiple rounds, as well as to reduce the complexity of the problem using information extracted, for example, from the key schedule. We also propose a general technique for speeding key recovery attacks up which is based on the representation of Sboxes as binary decision trees. Finally, we showcase the construction of a linear approximation of the full version of the Gimli permutation using mixed-integer linear programming (MILP) optimisation
Lazaridis, George. "Image processing using the Walsh transform." Thesis, University of Surrey, 2004. http://epubs.surrey.ac.uk/843950/.
Full textFuris, Mihai Alexandru Johnson Jeremy. "Cache miss analysis of Walsh-Hadamard Transform algorithms /." Philadelphia : Drexel University, 2003. http://dspace.library.drexel.edu/handle/1721.1/109.
Full textO'Dowd, Timothy R. "Discovery of bent functions using the Fast Walsh Transform." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5080.
Full textLinear cryptanalysis attacks are a threat against cryptosystems. These attacks can be defended against by using combiner functions composed of highly nonlinear Boolean functions. Bent functions, which have the highest possible nonlinearity, are uncommon. As the number of variables in a Boolean function increases, bent functions become extremely rare. A method of computing the nonlinearity of Boolean functions using the Fast Walsh Transform (FWT) is presented. The SRC-6 reconfigurable computer allows testing of functions at a much faster rate than a PC. With a clock frequency of 100 MHz, throughput of the SRC-6 is 100,000,000 functions per second. An implementation of the FWT used to compute the nonlinearity of Boolean functions with up to five variables is presented. Since there are 22n Boolean functions of n variables, computation of the nonlinearity of every Boolean function with six or more variables takes thousands of years to complete. This makes discovery of bent functions difficult for large n. An algorithm is presented that uses information in the FWT of a function to produce similar functions with increasingly higher nonlinearity. This algorithm demonstrated the ability to enumerate every bent function for n = 4 without the necessity of exhaustively testing all fourvariable functions.
Davis, Jeffrey H. "A study of potential uses for Walsh transformed images in target recognition." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA292722.
Full textDesmond, Allan Peter. "An analytical signal transform derived from the Walsh Transform for efficient detection of dual tone multiple frequency (DTMF) signals." Thesis, Bucks New University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.401474.
Full textSagdicoglu, Serhat. "Cryptological Viewpoint Of Boolean Functions." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1082403/index.pdf.
Full textRAJYALAKSHMI, P. S., and R. K. RAJANGAM. "DATA COMPRESSION SYSTEM FOR VIDEO IMAGES." International Foundation for Telemetering, 1986. http://hdl.handle.net/10150/615539.
Full textIn most transmission channels, bandwidth is at a premium and an important attribute of any good digital signalling scheme is to optimally utilise the bandwidth for transmitting the information. The Data Compression System in this way plays a significant role in the transmission of picture data from any Remote Sensing Satellite by exploiting the statistical properties of the imagery. The data rate required for transmission to ground can be reduced by using suitable compression technique. A data compression algorithm has been developed for processing the images of Indian Remote Sensing Satellite. Sample LANDSAT imagery and also a reference photo are used for evaluating the performance of the system. The reconstructed images are obtained after compression for 1.5 bits per pixel and 2 bits per pixel as against the original of 7 bits per pixel. The technique used is uni-dimensional Hadamard Transform Technique. The Histograms are computed for various pictures which are used as samples. This paper describes the development of such a hardware and software system and also indicates how hardware can be adopted for a two dimensional Hadamard Transform Technique.
Ahmed, Kamal Ali. "Digital watermarking of still images." Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/digital-watermarking-of-still-images(0dc4b146-3d97-458f-9506-8c67bc3a155b).html.
Full textEl, Omer. "Avalanche Properties And Randomness Of The Twofish Cipher." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605571/index.pdf.
Full texts results. The strength of the cipher to cryptanalytic attacks is investigated by measuring its randomness according to the avalanche criterion. The avalanche criterion results are compared with those of the Statistical Test Suite of the NIST and discrepancies in the second and third rounds are explained theoretically.
Books on the topic "Transformée de Walsh"
Golubov, B., A. Efimov, and V. Skvortsov. Walsh Series and Transforms. Dordrecht: Springer Netherlands, 1991. http://dx.doi.org/10.1007/978-94-011-3288-6.
Full textV, Efimov A., and Skvort͡s︡ov V. A, eds. Walsh series and transforms: Theory and applications. Dordrecht [Netherlands]: Kluwer Academic Publishers, 1991.
Find full textGolubov, B. Walsh Series and Transforms: Theory and Applications. Dordrecht: Springer Netherlands, 1991.
Find full textGolubov, B., V. Skvortsov, and A. Efimov. Walsh Series and Transforms: Theory and Applications. Springer Netherlands, 2012.
Find full textBook chapters on the topic "Transformée de Walsh"
Klapper, Andrew, and Mark Goresky. "A With-Carry Walsh Transform." In Sequences and Their Applications – SETA 2010, 217–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15874-2_18.
Full textWu, Chuan-Kun, and Dengguo Feng. "Boolean Functions and Their Walsh Transforms." In Advances in Computer Science and Technology, 1–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-48865-2_1.
Full textGolubov, Boris I. "Dyadic Derivative and Walsh-Fourier Transform." In Dyadic Walsh Analysis from 1924 Onwards Walsh-Gibbs-Butzer Dyadic Differentiation in Science Volume 1 Foundations, 443–47. Paris: Atlantis Press, 2015. http://dx.doi.org/10.2991/978-94-6239-160-4_11.
Full textArndt, Jörg. "The Walsh transform and its relatives." In Matters Computational, 459–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14764-7_23.
Full textKlapper, Andrew. "Arithmetic Walsh Transform of Quadratic Boolean Functions." In Lecture Notes in Computer Science, 65–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30615-0_6.
Full textSrivastva, Ranjeet, and Yogendra Narain Singh. "ECG Biometric Analysis Using Walsh–Hadamard Transform." In Advances in Data and Information Sciences, 201–10. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8360-0_19.
Full textJin, Wengang, Xiaoni Du, Jinxia Hu, and Yanzhong Sun. "Boolean Functions with a Few Walsh Transform Values." In Advances in Artificial Intelligence and Security, 642–55. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78618-2_53.
Full textDiana Andrushia, A., and R. Thangarjan. "Saliency-Based Image Compression Using Walsh–Hadamard Transform (WHT)." In Biologically Rationalized Computing Techniques For Image Processing Applications, 21–42. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61316-1_2.
Full textFlórez-Gutiérrez, Antonio. "Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning." In Advances in Cryptology – ASIACRYPT 2022, 447–76. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22972-5_16.
Full textGong, Guang, Tor Helleseth, Honggang Hu, and Chunlei Li. "New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences." In Lecture Notes in Computer Science, 327–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30615-0_30.
Full textConference papers on the topic "Transformée de Walsh"
Uri, Joseph B. "The Cormack - Walsh Transform." In 14th Congress of the International Commission for Optics, edited by Henri H. Arsenault. SPIE, 1987. http://dx.doi.org/10.1117/12.967374.
Full textGlasser, Adrian, and Howard C. Howland. "Artistic transformations in image processing." In OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1986. http://dx.doi.org/10.1364/oam.1986.thn9.
Full textIrion, Jeff, and Naoki Saito. "The generalized Haar-Walsh transform." In 2014 IEEE Statistical Signal Processing Workshop (SSP). IEEE, 2014. http://dx.doi.org/10.1109/ssp.2014.6884678.
Full textBen Uri, Joseph. "Coded holography for Walsh transform and Haar transform." In Holographics International '92, edited by Yuri N. Denisyuk and Frank Wyrowski. SPIE, 1993. http://dx.doi.org/10.1117/12.140399.
Full textIttycheriah, Abraham P., John F. Walkup, and Thomas F. Krile. "Applications of a Polarization-Based Optical Processor." In Optical Computing. Washington, D.C.: Optica Publishing Group, 1989. http://dx.doi.org/10.1364/optcomp.1989.tui10.
Full textLee, Man Hee, Muhammad Basit Shahab, Md Fazlul Kader, and Soo Young Shin. "Spatial multiplexing using walsh-hadamard transform." In 2016 International Conference on Smart Green Technology in Electrical and Information Systems (ICSGTEIS). IEEE, 2016. http://dx.doi.org/10.1109/icsgteis.2016.7885764.
Full textFalkowski, Bogdan J., and Shixing Yan. "Ternary Walsh spectral transform decision diagrams." In 2007 6th International Conference on Information, Communications & Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/icics.2007.4449769.
Full textLu, Yi. "Practical tera-scale Walsh-Hadamard Transform." In 2016 Future Technologies Conference (FTC). IEEE, 2016. http://dx.doi.org/10.1109/ftc.2016.7821757.
Full textFalkowski, Bogdan, and Shixing Yan. "Arithmetic-Walsh Spectral Transform Decision Diagrams." In 2006 IEEE International Symposium on Information Theory. IEEE, 2006. http://dx.doi.org/10.1109/isit.2006.261902.
Full textEl-Konyaly, El-Sayed H., Sabry F. Saraya, and Wael W. A. A. Al-Khazragy. "Point feature matching adopting Walsh transform." In Intelligent Systems & Advanced Manufacturing, edited by David P. Casasent. SPIE, 1997. http://dx.doi.org/10.1117/12.290330.
Full textReports on the topic "Transformée de Walsh"
Liberty, Edo, Nir Ailon, and Amit Singer. Fast Random Projections Using Lean Walsh Transforms. Fort Belvoir, VA: Defense Technical Information Center, December 2007. http://dx.doi.org/10.21236/ada489771.
Full text