Gotowa bibliografia na temat „Transformée de Walsh”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Transformée de Walsh”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Transformée de Walsh"
Hu Liang, 胡亮, 胡学娟 Hu Xuejuan, 黄圳鸿 Huang Zhenhong, 徐露 Xu Lu i 连丽津 Lian Lijin. "基于离散Walsh-Hadamard变换和引导滤波的多聚焦图像融合". Laser & Optoelectronics Progress 58, nr 22 (2021): 2210003. http://dx.doi.org/10.3788/lop202158.2210003.
Pełny tekst źródłaSasikala, D., i R. Neelaveni. "Correlation Coefficient Measure of Mono and Multimodal Brain Image Registration using Fast Walsh Hadamard Transform". International Journal of Engineering and Technology 3, nr 2 (2011): 154–60. http://dx.doi.org/10.7763/ijet.2011.v3.215.
Pełny tekst źródłaBirkeland, Peter. "Supermarkets Transformed: Understanding Organizational and Technological Innovations.John P. Walsh". American Journal of Sociology 100, nr 3 (listopad 1994): 845–46. http://dx.doi.org/10.1086/230598.
Pełny tekst źródłaBerti, E., F. Chiaraluce, N. E. Evans i J. J. McKee. "Reduction of Walsh-transformed electrocardiograms by double logarithmic coding". IEEE Transactions on Biomedical Engineering 47, nr 11 (2000): 1543–47. http://dx.doi.org/10.1109/10.880108.
Pełny tekst źródłaJeyasurya, B., i M. Rahman. "Application of Walsh Functions for Microprocessor-Based Transformer Protection". IEEE Transactions on Electromagnetic Compatibility EMC-27, nr 4 (listopad 1985): 221–25. http://dx.doi.org/10.1109/temc.1985.304293.
Pełny tekst źródłaMagomed-Kasumov, Magomedrasul, i Salikh Magomedov. "Быстрое преобразование Фурье по системе функций, ортогональных по Соболеву и порожденных системой Уолша". Daghestan Electronic Mathematical Reports, nr 15 (2021): 55–66. http://dx.doi.org/10.31029/demr.15.5.
Pełny tekst źródłaMustafa, Ziyad Tariq, Alaa Al-Hammami i Jasim Al-Samarai. "Evaluation of Wavelet Transform Audio Hiding". Iraqi Journal for Computers and Informatics 40, nr 1 (31.12.2002): 32–44. http://dx.doi.org/10.25195/ijci.v40i1.224.
Pełny tekst źródłaWU, Wei. "Characteristics of Dual-cylinder Hydraulic Transformer with Rotatable Wash Plate". Journal of Mechanical Engineering 49, nr 22 (2013): 144. http://dx.doi.org/10.3901/jme.2013.22.144.
Pełny tekst źródłaShuo-Yen Tseng. "Synthesis of a 4 $\times$ 4 Walsh–Hadamard Transformer Using Long-Period Waveguide Grating Arrays". IEEE Photonics Technology Letters 21, nr 14 (lipiec 2009): 972–74. http://dx.doi.org/10.1109/lpt.2009.2021154.
Pełny tekst źródłaMAGAÑA, SONIA, SARAH M. SCHLEMMER, GORDON R. DAVIDSON, ELLIOT T. RYSER i DANIEL V. LIM. "Laboratory and Pilot-Scale Dead-End Ultrafiltration Concentration of Sanitizer-Free and Chlorinated Lettuce Wash Water for Improved Detection of Escherichia coli O157:H7". Journal of Food Protection 77, nr 8 (1.08.2014): 1260–68. http://dx.doi.org/10.4315/0362-028x.jfp-13-421.
Pełny tekst źródłaRozprawy doktorskie na temat "Transformée de Walsh"
Flórez, Gutiérrez Antonio. "Improved Techniques in the Cryptanalysis of Symmetric Primitives". Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS281.
Pełny tekst źródłaThis thesis proposes improvements which can be applied to several techniques for the cryptanalysis of symmetric primitives. Special attention is given to linear cryptanalysis, for which a technique based on the fast Walsh transform was already known (Collard et al., ICISIC 2007). We introduce a generalised version of this attack, which allows us to apply it on key recovery attacks over multiple rounds, as well as to reduce the complexity of the problem using information extracted, for example, from the key schedule. We also propose a general technique for speeding key recovery attacks up which is based on the representation of Sboxes as binary decision trees. Finally, we showcase the construction of a linear approximation of the full version of the Gimli permutation using mixed-integer linear programming (MILP) optimisation
Lazaridis, George. "Image processing using the Walsh transform". Thesis, University of Surrey, 2004. http://epubs.surrey.ac.uk/843950/.
Pełny tekst źródłaFuris, Mihai Alexandru Johnson Jeremy. "Cache miss analysis of Walsh-Hadamard Transform algorithms /". Philadelphia : Drexel University, 2003. http://dspace.library.drexel.edu/handle/1721.1/109.
Pełny tekst źródłaO'Dowd, Timothy R. "Discovery of bent functions using the Fast Walsh Transform". Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5080.
Pełny tekst źródłaLinear cryptanalysis attacks are a threat against cryptosystems. These attacks can be defended against by using combiner functions composed of highly nonlinear Boolean functions. Bent functions, which have the highest possible nonlinearity, are uncommon. As the number of variables in a Boolean function increases, bent functions become extremely rare. A method of computing the nonlinearity of Boolean functions using the Fast Walsh Transform (FWT) is presented. The SRC-6 reconfigurable computer allows testing of functions at a much faster rate than a PC. With a clock frequency of 100 MHz, throughput of the SRC-6 is 100,000,000 functions per second. An implementation of the FWT used to compute the nonlinearity of Boolean functions with up to five variables is presented. Since there are 22n Boolean functions of n variables, computation of the nonlinearity of every Boolean function with six or more variables takes thousands of years to complete. This makes discovery of bent functions difficult for large n. An algorithm is presented that uses information in the FWT of a function to produce similar functions with increasingly higher nonlinearity. This algorithm demonstrated the ability to enumerate every bent function for n = 4 without the necessity of exhaustively testing all fourvariable functions.
Davis, Jeffrey H. "A study of potential uses for Walsh transformed images in target recognition". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA292722.
Pełny tekst źródłaDesmond, Allan Peter. "An analytical signal transform derived from the Walsh Transform for efficient detection of dual tone multiple frequency (DTMF) signals". Thesis, Bucks New University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.401474.
Pełny tekst źródłaSagdicoglu, Serhat. "Cryptological Viewpoint Of Boolean Functions". Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1082403/index.pdf.
Pełny tekst źródłaRAJYALAKSHMI, P. S., i R. K. RAJANGAM. "DATA COMPRESSION SYSTEM FOR VIDEO IMAGES". International Foundation for Telemetering, 1986. http://hdl.handle.net/10150/615539.
Pełny tekst źródłaIn most transmission channels, bandwidth is at a premium and an important attribute of any good digital signalling scheme is to optimally utilise the bandwidth for transmitting the information. The Data Compression System in this way plays a significant role in the transmission of picture data from any Remote Sensing Satellite by exploiting the statistical properties of the imagery. The data rate required for transmission to ground can be reduced by using suitable compression technique. A data compression algorithm has been developed for processing the images of Indian Remote Sensing Satellite. Sample LANDSAT imagery and also a reference photo are used for evaluating the performance of the system. The reconstructed images are obtained after compression for 1.5 bits per pixel and 2 bits per pixel as against the original of 7 bits per pixel. The technique used is uni-dimensional Hadamard Transform Technique. The Histograms are computed for various pictures which are used as samples. This paper describes the development of such a hardware and software system and also indicates how hardware can be adopted for a two dimensional Hadamard Transform Technique.
Ahmed, Kamal Ali. "Digital watermarking of still images". Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/digital-watermarking-of-still-images(0dc4b146-3d97-458f-9506-8c67bc3a155b).html.
Pełny tekst źródłaEl, Omer. "Avalanche Properties And Randomness Of The Twofish Cipher". Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605571/index.pdf.
Pełny tekst źródłas results. The strength of the cipher to cryptanalytic attacks is investigated by measuring its randomness according to the avalanche criterion. The avalanche criterion results are compared with those of the Statistical Test Suite of the NIST and discrepancies in the second and third rounds are explained theoretically.
Książki na temat "Transformée de Walsh"
Golubov, B., A. Efimov i V. Skvortsov. Walsh Series and Transforms. Dordrecht: Springer Netherlands, 1991. http://dx.doi.org/10.1007/978-94-011-3288-6.
Pełny tekst źródłaV, Efimov A., i Skvort͡s︡ov V. A, red. Walsh series and transforms: Theory and applications. Dordrecht [Netherlands]: Kluwer Academic Publishers, 1991.
Znajdź pełny tekst źródłaGolubov, B. Walsh Series and Transforms: Theory and Applications. Dordrecht: Springer Netherlands, 1991.
Znajdź pełny tekst źródłaGolubov, B., V. Skvortsov i A. Efimov. Walsh Series and Transforms: Theory and Applications. Springer Netherlands, 2012.
Znajdź pełny tekst źródłaCzęści książek na temat "Transformée de Walsh"
Klapper, Andrew, i Mark Goresky. "A With-Carry Walsh Transform". W Sequences and Their Applications – SETA 2010, 217–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15874-2_18.
Pełny tekst źródłaWu, Chuan-Kun, i Dengguo Feng. "Boolean Functions and Their Walsh Transforms". W Advances in Computer Science and Technology, 1–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-48865-2_1.
Pełny tekst źródłaGolubov, Boris I. "Dyadic Derivative and Walsh-Fourier Transform". W Dyadic Walsh Analysis from 1924 Onwards Walsh-Gibbs-Butzer Dyadic Differentiation in Science Volume 1 Foundations, 443–47. Paris: Atlantis Press, 2015. http://dx.doi.org/10.2991/978-94-6239-160-4_11.
Pełny tekst źródłaArndt, Jörg. "The Walsh transform and its relatives". W Matters Computational, 459–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14764-7_23.
Pełny tekst źródłaKlapper, Andrew. "Arithmetic Walsh Transform of Quadratic Boolean Functions". W Lecture Notes in Computer Science, 65–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30615-0_6.
Pełny tekst źródłaSrivastva, Ranjeet, i Yogendra Narain Singh. "ECG Biometric Analysis Using Walsh–Hadamard Transform". W Advances in Data and Information Sciences, 201–10. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8360-0_19.
Pełny tekst źródłaJin, Wengang, Xiaoni Du, Jinxia Hu i Yanzhong Sun. "Boolean Functions with a Few Walsh Transform Values". W Advances in Artificial Intelligence and Security, 642–55. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78618-2_53.
Pełny tekst źródłaDiana Andrushia, A., i R. Thangarjan. "Saliency-Based Image Compression Using Walsh–Hadamard Transform (WHT)". W Biologically Rationalized Computing Techniques For Image Processing Applications, 21–42. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61316-1_2.
Pełny tekst źródłaFlórez-Gutiérrez, Antonio. "Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning". W Advances in Cryptology – ASIACRYPT 2022, 447–76. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22972-5_16.
Pełny tekst źródłaGong, Guang, Tor Helleseth, Honggang Hu i Chunlei Li. "New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences". W Lecture Notes in Computer Science, 327–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30615-0_30.
Pełny tekst źródłaStreszczenia konferencji na temat "Transformée de Walsh"
Uri, Joseph B. "The Cormack - Walsh Transform". W 14th Congress of the International Commission for Optics, redaktor Henri H. Arsenault. SPIE, 1987. http://dx.doi.org/10.1117/12.967374.
Pełny tekst źródłaGlasser, Adrian, i Howard C. Howland. "Artistic transformations in image processing". W OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1986. http://dx.doi.org/10.1364/oam.1986.thn9.
Pełny tekst źródłaIrion, Jeff, i Naoki Saito. "The generalized Haar-Walsh transform". W 2014 IEEE Statistical Signal Processing Workshop (SSP). IEEE, 2014. http://dx.doi.org/10.1109/ssp.2014.6884678.
Pełny tekst źródłaBen Uri, Joseph. "Coded holography for Walsh transform and Haar transform". W Holographics International '92, redaktorzy Yuri N. Denisyuk i Frank Wyrowski. SPIE, 1993. http://dx.doi.org/10.1117/12.140399.
Pełny tekst źródłaIttycheriah, Abraham P., John F. Walkup i Thomas F. Krile. "Applications of a Polarization-Based Optical Processor". W Optical Computing. Washington, D.C.: Optica Publishing Group, 1989. http://dx.doi.org/10.1364/optcomp.1989.tui10.
Pełny tekst źródłaLee, Man Hee, Muhammad Basit Shahab, Md Fazlul Kader i Soo Young Shin. "Spatial multiplexing using walsh-hadamard transform". W 2016 International Conference on Smart Green Technology in Electrical and Information Systems (ICSGTEIS). IEEE, 2016. http://dx.doi.org/10.1109/icsgteis.2016.7885764.
Pełny tekst źródłaFalkowski, Bogdan J., i Shixing Yan. "Ternary Walsh spectral transform decision diagrams". W 2007 6th International Conference on Information, Communications & Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/icics.2007.4449769.
Pełny tekst źródłaLu, Yi. "Practical tera-scale Walsh-Hadamard Transform". W 2016 Future Technologies Conference (FTC). IEEE, 2016. http://dx.doi.org/10.1109/ftc.2016.7821757.
Pełny tekst źródłaFalkowski, Bogdan, i Shixing Yan. "Arithmetic-Walsh Spectral Transform Decision Diagrams". W 2006 IEEE International Symposium on Information Theory. IEEE, 2006. http://dx.doi.org/10.1109/isit.2006.261902.
Pełny tekst źródłaEl-Konyaly, El-Sayed H., Sabry F. Saraya i Wael W. A. A. Al-Khazragy. "Point feature matching adopting Walsh transform". W Intelligent Systems & Advanced Manufacturing, redaktor David P. Casasent. SPIE, 1997. http://dx.doi.org/10.1117/12.290330.
Pełny tekst źródłaRaporty organizacyjne na temat "Transformée de Walsh"
Liberty, Edo, Nir Ailon i Amit Singer. Fast Random Projections Using Lean Walsh Transforms. Fort Belvoir, VA: Defense Technical Information Center, grudzień 2007. http://dx.doi.org/10.21236/ada489771.
Pełny tekst źródła