Literatura científica selecionada sobre o tema "Transformée de Walsh"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Transformée de Walsh".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Transformée de Walsh"
Hu Liang, 胡亮, 胡学娟 Hu Xuejuan, 黄圳鸿 Huang Zhenhong, 徐露 Xu Lu e 连丽津 Lian Lijin. "基于离散Walsh-Hadamard变换和引导滤波的多聚焦图像融合". Laser & Optoelectronics Progress 58, n.º 22 (2021): 2210003. http://dx.doi.org/10.3788/lop202158.2210003.
Texto completo da fonteSasikala, D., e R. Neelaveni. "Correlation Coefficient Measure of Mono and Multimodal Brain Image Registration using Fast Walsh Hadamard Transform". International Journal of Engineering and Technology 3, n.º 2 (2011): 154–60. http://dx.doi.org/10.7763/ijet.2011.v3.215.
Texto completo da fonteBirkeland, Peter. "Supermarkets Transformed: Understanding Organizational and Technological Innovations.John P. Walsh". American Journal of Sociology 100, n.º 3 (novembro de 1994): 845–46. http://dx.doi.org/10.1086/230598.
Texto completo da fonteBerti, E., F. Chiaraluce, N. E. Evans e J. J. McKee. "Reduction of Walsh-transformed electrocardiograms by double logarithmic coding". IEEE Transactions on Biomedical Engineering 47, n.º 11 (2000): 1543–47. http://dx.doi.org/10.1109/10.880108.
Texto completo da fonteJeyasurya, B., e M. Rahman. "Application of Walsh Functions for Microprocessor-Based Transformer Protection". IEEE Transactions on Electromagnetic Compatibility EMC-27, n.º 4 (novembro de 1985): 221–25. http://dx.doi.org/10.1109/temc.1985.304293.
Texto completo da fonteMagomed-Kasumov, Magomedrasul, e Salikh Magomedov. "Быстрое преобразование Фурье по системе функций, ортогональных по Соболеву и порожденных системой Уолша". Daghestan Electronic Mathematical Reports, n.º 15 (2021): 55–66. http://dx.doi.org/10.31029/demr.15.5.
Texto completo da fonteMustafa, Ziyad Tariq, Alaa Al-Hammami e Jasim Al-Samarai. "Evaluation of Wavelet Transform Audio Hiding". Iraqi Journal for Computers and Informatics 40, n.º 1 (31 de dezembro de 2002): 32–44. http://dx.doi.org/10.25195/ijci.v40i1.224.
Texto completo da fonteWU, Wei. "Characteristics of Dual-cylinder Hydraulic Transformer with Rotatable Wash Plate". Journal of Mechanical Engineering 49, n.º 22 (2013): 144. http://dx.doi.org/10.3901/jme.2013.22.144.
Texto completo da fonteShuo-Yen Tseng. "Synthesis of a 4 $\times$ 4 Walsh–Hadamard Transformer Using Long-Period Waveguide Grating Arrays". IEEE Photonics Technology Letters 21, n.º 14 (julho de 2009): 972–74. http://dx.doi.org/10.1109/lpt.2009.2021154.
Texto completo da fonteMAGAÑA, SONIA, SARAH M. SCHLEMMER, GORDON R. DAVIDSON, ELLIOT T. RYSER e DANIEL V. LIM. "Laboratory and Pilot-Scale Dead-End Ultrafiltration Concentration of Sanitizer-Free and Chlorinated Lettuce Wash Water for Improved Detection of Escherichia coli O157:H7". Journal of Food Protection 77, n.º 8 (1 de agosto de 2014): 1260–68. http://dx.doi.org/10.4315/0362-028x.jfp-13-421.
Texto completo da fonteTeses / dissertações sobre o assunto "Transformée de Walsh"
Flórez, Gutiérrez Antonio. "Improved Techniques in the Cryptanalysis of Symmetric Primitives". Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS281.
Texto completo da fonteThis thesis proposes improvements which can be applied to several techniques for the cryptanalysis of symmetric primitives. Special attention is given to linear cryptanalysis, for which a technique based on the fast Walsh transform was already known (Collard et al., ICISIC 2007). We introduce a generalised version of this attack, which allows us to apply it on key recovery attacks over multiple rounds, as well as to reduce the complexity of the problem using information extracted, for example, from the key schedule. We also propose a general technique for speeding key recovery attacks up which is based on the representation of Sboxes as binary decision trees. Finally, we showcase the construction of a linear approximation of the full version of the Gimli permutation using mixed-integer linear programming (MILP) optimisation
Lazaridis, George. "Image processing using the Walsh transform". Thesis, University of Surrey, 2004. http://epubs.surrey.ac.uk/843950/.
Texto completo da fonteFuris, Mihai Alexandru Johnson Jeremy. "Cache miss analysis of Walsh-Hadamard Transform algorithms /". Philadelphia : Drexel University, 2003. http://dspace.library.drexel.edu/handle/1721.1/109.
Texto completo da fonteO'Dowd, Timothy R. "Discovery of bent functions using the Fast Walsh Transform". Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5080.
Texto completo da fonteLinear cryptanalysis attacks are a threat against cryptosystems. These attacks can be defended against by using combiner functions composed of highly nonlinear Boolean functions. Bent functions, which have the highest possible nonlinearity, are uncommon. As the number of variables in a Boolean function increases, bent functions become extremely rare. A method of computing the nonlinearity of Boolean functions using the Fast Walsh Transform (FWT) is presented. The SRC-6 reconfigurable computer allows testing of functions at a much faster rate than a PC. With a clock frequency of 100 MHz, throughput of the SRC-6 is 100,000,000 functions per second. An implementation of the FWT used to compute the nonlinearity of Boolean functions with up to five variables is presented. Since there are 22n Boolean functions of n variables, computation of the nonlinearity of every Boolean function with six or more variables takes thousands of years to complete. This makes discovery of bent functions difficult for large n. An algorithm is presented that uses information in the FWT of a function to produce similar functions with increasingly higher nonlinearity. This algorithm demonstrated the ability to enumerate every bent function for n = 4 without the necessity of exhaustively testing all fourvariable functions.
Davis, Jeffrey H. "A study of potential uses for Walsh transformed images in target recognition". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA292722.
Texto completo da fonteDesmond, Allan Peter. "An analytical signal transform derived from the Walsh Transform for efficient detection of dual tone multiple frequency (DTMF) signals". Thesis, Bucks New University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.401474.
Texto completo da fonteSagdicoglu, Serhat. "Cryptological Viewpoint Of Boolean Functions". Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1082403/index.pdf.
Texto completo da fonteRAJYALAKSHMI, P. S., e R. K. RAJANGAM. "DATA COMPRESSION SYSTEM FOR VIDEO IMAGES". International Foundation for Telemetering, 1986. http://hdl.handle.net/10150/615539.
Texto completo da fonteIn most transmission channels, bandwidth is at a premium and an important attribute of any good digital signalling scheme is to optimally utilise the bandwidth for transmitting the information. The Data Compression System in this way plays a significant role in the transmission of picture data from any Remote Sensing Satellite by exploiting the statistical properties of the imagery. The data rate required for transmission to ground can be reduced by using suitable compression technique. A data compression algorithm has been developed for processing the images of Indian Remote Sensing Satellite. Sample LANDSAT imagery and also a reference photo are used for evaluating the performance of the system. The reconstructed images are obtained after compression for 1.5 bits per pixel and 2 bits per pixel as against the original of 7 bits per pixel. The technique used is uni-dimensional Hadamard Transform Technique. The Histograms are computed for various pictures which are used as samples. This paper describes the development of such a hardware and software system and also indicates how hardware can be adopted for a two dimensional Hadamard Transform Technique.
Ahmed, Kamal Ali. "Digital watermarking of still images". Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/digital-watermarking-of-still-images(0dc4b146-3d97-458f-9506-8c67bc3a155b).html.
Texto completo da fonteEl, Omer. "Avalanche Properties And Randomness Of The Twofish Cipher". Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605571/index.pdf.
Texto completo da fontes results. The strength of the cipher to cryptanalytic attacks is investigated by measuring its randomness according to the avalanche criterion. The avalanche criterion results are compared with those of the Statistical Test Suite of the NIST and discrepancies in the second and third rounds are explained theoretically.
Livros sobre o assunto "Transformée de Walsh"
Golubov, B., A. Efimov e V. Skvortsov. Walsh Series and Transforms. Dordrecht: Springer Netherlands, 1991. http://dx.doi.org/10.1007/978-94-011-3288-6.
Texto completo da fonteV, Efimov A., e Skvort͡s︡ov V. A, eds. Walsh series and transforms: Theory and applications. Dordrecht [Netherlands]: Kluwer Academic Publishers, 1991.
Encontre o texto completo da fonteGolubov, B. Walsh Series and Transforms: Theory and Applications. Dordrecht: Springer Netherlands, 1991.
Encontre o texto completo da fonteGolubov, B., V. Skvortsov e A. Efimov. Walsh Series and Transforms: Theory and Applications. Springer Netherlands, 2012.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Transformée de Walsh"
Klapper, Andrew, e Mark Goresky. "A With-Carry Walsh Transform". In Sequences and Their Applications – SETA 2010, 217–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15874-2_18.
Texto completo da fonteWu, Chuan-Kun, e Dengguo Feng. "Boolean Functions and Their Walsh Transforms". In Advances in Computer Science and Technology, 1–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-48865-2_1.
Texto completo da fonteGolubov, Boris I. "Dyadic Derivative and Walsh-Fourier Transform". In Dyadic Walsh Analysis from 1924 Onwards Walsh-Gibbs-Butzer Dyadic Differentiation in Science Volume 1 Foundations, 443–47. Paris: Atlantis Press, 2015. http://dx.doi.org/10.2991/978-94-6239-160-4_11.
Texto completo da fonteArndt, Jörg. "The Walsh transform and its relatives". In Matters Computational, 459–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14764-7_23.
Texto completo da fonteKlapper, Andrew. "Arithmetic Walsh Transform of Quadratic Boolean Functions". In Lecture Notes in Computer Science, 65–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30615-0_6.
Texto completo da fonteSrivastva, Ranjeet, e Yogendra Narain Singh. "ECG Biometric Analysis Using Walsh–Hadamard Transform". In Advances in Data and Information Sciences, 201–10. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8360-0_19.
Texto completo da fonteJin, Wengang, Xiaoni Du, Jinxia Hu e Yanzhong Sun. "Boolean Functions with a Few Walsh Transform Values". In Advances in Artificial Intelligence and Security, 642–55. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78618-2_53.
Texto completo da fonteDiana Andrushia, A., e R. Thangarjan. "Saliency-Based Image Compression Using Walsh–Hadamard Transform (WHT)". In Biologically Rationalized Computing Techniques For Image Processing Applications, 21–42. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61316-1_2.
Texto completo da fonteFlórez-Gutiérrez, Antonio. "Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning". In Advances in Cryptology – ASIACRYPT 2022, 447–76. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22972-5_16.
Texto completo da fonteGong, Guang, Tor Helleseth, Honggang Hu e Chunlei Li. "New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences". In Lecture Notes in Computer Science, 327–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30615-0_30.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Transformée de Walsh"
Uri, Joseph B. "The Cormack - Walsh Transform". In 14th Congress of the International Commission for Optics, editado por Henri H. Arsenault. SPIE, 1987. http://dx.doi.org/10.1117/12.967374.
Texto completo da fonteGlasser, Adrian, e Howard C. Howland. "Artistic transformations in image processing". In OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1986. http://dx.doi.org/10.1364/oam.1986.thn9.
Texto completo da fonteIrion, Jeff, e Naoki Saito. "The generalized Haar-Walsh transform". In 2014 IEEE Statistical Signal Processing Workshop (SSP). IEEE, 2014. http://dx.doi.org/10.1109/ssp.2014.6884678.
Texto completo da fonteBen Uri, Joseph. "Coded holography for Walsh transform and Haar transform". In Holographics International '92, editado por Yuri N. Denisyuk e Frank Wyrowski. SPIE, 1993. http://dx.doi.org/10.1117/12.140399.
Texto completo da fonteIttycheriah, Abraham P., John F. Walkup e Thomas F. Krile. "Applications of a Polarization-Based Optical Processor". In Optical Computing. Washington, D.C.: Optica Publishing Group, 1989. http://dx.doi.org/10.1364/optcomp.1989.tui10.
Texto completo da fonteLee, Man Hee, Muhammad Basit Shahab, Md Fazlul Kader e Soo Young Shin. "Spatial multiplexing using walsh-hadamard transform". In 2016 International Conference on Smart Green Technology in Electrical and Information Systems (ICSGTEIS). IEEE, 2016. http://dx.doi.org/10.1109/icsgteis.2016.7885764.
Texto completo da fonteFalkowski, Bogdan J., e Shixing Yan. "Ternary Walsh spectral transform decision diagrams". In 2007 6th International Conference on Information, Communications & Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/icics.2007.4449769.
Texto completo da fonteLu, Yi. "Practical tera-scale Walsh-Hadamard Transform". In 2016 Future Technologies Conference (FTC). IEEE, 2016. http://dx.doi.org/10.1109/ftc.2016.7821757.
Texto completo da fonteFalkowski, Bogdan, e Shixing Yan. "Arithmetic-Walsh Spectral Transform Decision Diagrams". In 2006 IEEE International Symposium on Information Theory. IEEE, 2006. http://dx.doi.org/10.1109/isit.2006.261902.
Texto completo da fonteEl-Konyaly, El-Sayed H., Sabry F. Saraya e Wael W. A. A. Al-Khazragy. "Point feature matching adopting Walsh transform". In Intelligent Systems & Advanced Manufacturing, editado por David P. Casasent. SPIE, 1997. http://dx.doi.org/10.1117/12.290330.
Texto completo da fonteRelatórios de organizações sobre o assunto "Transformée de Walsh"
Liberty, Edo, Nir Ailon e Amit Singer. Fast Random Projections Using Lean Walsh Transforms. Fort Belvoir, VA: Defense Technical Information Center, dezembro de 2007. http://dx.doi.org/10.21236/ada489771.
Texto completo da fonte