Siga este enlace para ver otros tipos de publicaciones sobre el tema: Transformée de Walsh.

Tesis sobre el tema "Transformée de Walsh"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 24 mejores tesis para su investigación sobre el tema "Transformée de Walsh".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Flórez, Gutiérrez Antonio. "Improved Techniques in the Cryptanalysis of Symmetric Primitives." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS281.

Texto completo
Resumen
Dans cette thèse, on propose des améliorations qui peuvent être appliquées à plusieurs techniques de cryptanalyse de primitives symétriques. On dédie une attention spéciale à la cryptanalyse linéaire, pour laquelle une technique basée sur la transformée de Walsh rapide était déjà connue (Collard et al., ICISC 2007). On introduit une version généralisée de cette attaque, qui permet de l'appliquer pour la récupération de clé considerant plusieurs tours, ainsi que le réduction de la complexité du problème en utilisant par example des informations provénantes du key-schedule. On propose aussi une
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Lazaridis, George. "Image processing using the Walsh transform." Thesis, University of Surrey, 2004. http://epubs.surrey.ac.uk/843950/.

Texto completo
Resumen
This thesis presents a new algorithm which can be used to register images of the same or different modalities e.g images with multiple channels such as X-rays, temperature, or elevation or simply images of different spectral bands. In particular, a correlation-based scheme is used, but instead of grey values, it correlates numbers formulated by different combinations of the extracted local Walsh coefficients of the images. Each image patch is expanded in terms of Walsh basis functions. Each Walsh basis function can be thought of as measuring a different aspect of local structure, eg horizontal
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Furis, Mihai Alexandru Johnson Jeremy. "Cache miss analysis of Walsh-Hadamard Transform algorithms /." Philadelphia : Drexel University, 2003. http://dspace.library.drexel.edu/handle/1721.1/109.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

O'Dowd, Timothy R. "Discovery of bent functions using the Fast Walsh Transform." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5080.

Texto completo
Resumen
Approved for public release; distribution is unlimited<br>Linear cryptanalysis attacks are a threat against cryptosystems. These attacks can be defended against by using combiner functions composed of highly nonlinear Boolean functions. Bent functions, which have the highest possible nonlinearity, are uncommon. As the number of variables in a Boolean function increases, bent functions become extremely rare. A method of computing the nonlinearity of Boolean functions using the Fast Walsh Transform (FWT) is presented. The SRC-6 reconfigurable computer allows testing of functions at a much fa
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Davis, Jeffrey H. "A study of potential uses for Walsh transformed images in target recognition." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA292722.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Desmond, Allan Peter. "An analytical signal transform derived from the Walsh Transform for efficient detection of dual tone multiple frequency (DTMF) signals." Thesis, Bucks New University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.401474.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Sagdicoglu, Serhat. "Cryptological Viewpoint Of Boolean Functions." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1082403/index.pdf.

Texto completo
Resumen
Boolean functions are the main building blocks of most cipher systems. Various aspects of their cryptological characteristics are examined and investigated by many researchers from different fields. This thesis has no claim to obtain original results but consists in an attempt at giving a unified survey of the main results of the subject. In this thesis, the theory of boolean functions is presented in details, emphasizing some important cryptological properties such as balance, nonlinearity, strict avalanche criterion and propagation criterion. After presenting many results about these criteri
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

RAJYALAKSHMI, P. S., and R. K. RAJANGAM. "DATA COMPRESSION SYSTEM FOR VIDEO IMAGES." International Foundation for Telemetering, 1986. http://hdl.handle.net/10150/615539.

Texto completo
Resumen
International Telemetering Conference Proceedings / October 13-16, 1986 / Riviera Hotel, Las Vegas, Nevada<br>In most transmission channels, bandwidth is at a premium and an important attribute of any good digital signalling scheme is to optimally utilise the bandwidth for transmitting the information. The Data Compression System in this way plays a significant role in the transmission of picture data from any Remote Sensing Satellite by exploiting the statistical properties of the imagery. The data rate required for transmission to ground can be reduced by using suitable compression technique
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Ahmed, Kamal Ali. "Digital watermarking of still images." Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/digital-watermarking-of-still-images(0dc4b146-3d97-458f-9506-8c67bc3a155b).html.

Texto completo
Resumen
This thesis presents novel research work on copyright protection of grey scale and colour digital images. New blind frequency domain watermarking algorithms using one dimensional and two dimensional Walsh coding were developed. Handwritten signatures and mobile phone numbers were used in this project as watermarks. In this research eight algorithms were developed based on the DCT using 1D and 2D Walsh coding. These algorithms used the low frequency coefficients of the 8 × 8 DCT blocks for embedding. A shuffle process was used in the watermarking algorithms to increase the robustness against th
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

El, Omer. "Avalanche Properties And Randomness Of The Twofish Cipher." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605571/index.pdf.

Texto completo
Resumen
In this thesis, one finalist cipher of the Advanced Encryption Standard (AES) block cipher contest, Twofish proposed by Schneier et al, is studied in order to observe the validity of the statement made by Arikan about the randomness of the cipher, which contradicts National Institute of Standards and Technology (NIST)&rsquo<br>s results. The strength of the cipher to cryptanalytic attacks is investigated by measuring its randomness according to the avalanche criterion. The avalanche criterion results are compared with those of the Statistical Test Suite of the NIST and discrepancies in the sec
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Aydin, Ozge Zelal. "Detection Of Bladder Tumor Recurrence By Fourier Transform Infrared Spectroscopy As A Novel Method." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/2/12610883/index.pdf.

Texto completo
Resumen
Bladder cancer is one of the most common urogenital cancers worldwide. Two techniques commonly used for bladder cancer diagnosis are urine cytology and cystoscopy. Cytology is not sensitive for detecting tumors. Cystoscopy is an invasive technique which disturbs patient comfort. In the current study, we used Fourier transform infrared (FT-IR) spectroscopy as a novel method which is rapid and non-invasive to investigate the bladder tumor recurrence using the bladder wash samples collected in the course of control cystoscopy. This study is unique since it is the first one to use the bladder wash
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Sertkaya, Isa. "Nonlinearity Preserving Post-transformations." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605183/index.pdf.

Texto completo
Resumen
Boolean functions are accepted to be cryptographically strong if they satisfy some common pre-determined criteria. It is expected that any design criteria should remain invariant under a large group of transformations due to the theory of similarity of secrecy systems proposed by Shannon. One of the most important design criteria for cryptographically strong Boolean functions is the nonlinearity criterion. Meier and Staffelbach studied nonlinearity preserving transformations, by considering the invertible transformations acting on the arguments of Boolean functions, namely the pre-transformati
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Millan, William L. "Analysis and design of Boolean functions for cryptographic applications." Thesis, Queensland University of Technology, 1997.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

ZHENG, XIN-GU, and 鄭信富. "An application of walsh transform in PVC diagnoisis." Thesis, 1986. http://ndltd.ncl.edu.tw/handle/50353655943156501853.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Sharma, Purnima. "A microprocesser-based scheme using fast Walsh-Hadamard transform." Thesis, 1986. http://localhost:8080/xmlui/handle/12345678/5409.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Anderson, Neil Arnold. "The classification of Boolean functions using the Rademacher-Walsh transform." Thesis, 2007. http://hdl.handle.net/1828/221.

Texto completo
Resumen
When considering Boolean switching functions with n input variables, there are 2^(2^n) possible functions that can be realized by enumerating all possible combinations of input values and arrangements of output values. As is expected with double exponential growth, the number of functions becomes unmanageable very quickly as n increases. This thesis develops a new approach for computing the spectral classes where the spectral operations are performed by manipulating the truth tables rather than first moving to the spectral domain to manipulate the spectral coefficients. Additionally, a gener
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Wen, Chia-Chang, and 溫家昶. "Researches on Generalized Legendre Sequence and Generalized Walsh-Fourier Transform." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/58183559898661696070.

Texto completo
Resumen
博士<br>國立臺灣大學<br>電信工程學研究所<br>102<br>The thesis contains two research topics: The first one is the discussion about the properties and applications of the complete generalized Legendre sequence (CGLS) and the second one is about the generalization between the Walsh-Hadamard transform (WHT) and the DFT and their properties. The CGLS is first defined to solve the DFT eigenvector problem. The proposed CGLS based DFT eigenvectors have the advantages of closed-form solutions, completeness, orthogonality, being well defined for arbitrary N, and fast DFT expansion so that the CGLS is helpful for develo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

MacDonald, Roderick H. "A Walsh Transform ASIC design with built-in test using VHDL." 1992. http://hdl.handle.net/1993/18588.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Lin, Chun-Fan, and 林純帆. "Study of Orthogonal STBC Using Walsh-Hadamard Transform with Decoupling in Time Domain." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/01353163889531838536.

Texto completo
Resumen
碩士<br>國立東華大學<br>電機工程學系<br>101<br>This thesis presents the Space-Time Block Codes (STBC) constructed by using the diagonal orthogonal coefficient with decoupling in time domain. The novel Walsh-Hadamard STBC (WHSTBC) gives full rate and full diversity order with appropriate pre-coding of the PSK or QAM modulated symbols, when the number of receiver antennas is at least equal to the number of transmit antennas. Hadamard matrices exist for orders equal to N=2^n, where n≥1, and the receiver allows for some decoupling methods and decoding with Maximal Ratio Combining (MRC). Finally, the performance
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Ting, Kou-Cheng, and 丁國政. "Designing Fast Walsh Hadamard Transform on Various Interconnection Networks Using Tensor Product Formulation." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/r8f2ma.

Texto completo
Resumen
碩士<br>逢甲大學<br>資訊工程所<br>91<br>The fast Walsh Hadamard transform is a simple and important algorithm in digital signal processing, especially, in digital image compression. The fast Walsh Hadamard transform is a block recursive algorithm, which can be easily expressed as a tensor product formula. Also, the tensor product notation can be used to express the topology of interconnection networks. In this thesis, we will emerge the specification of tensor product formulation of block recursive algorithms and interconnection networks to design fast Walsh Hadamard transform algorithms on various inter
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Tsai, Yao-Tsung, and 蔡曜聰. "Identification and Redution fo 2-D Discrete-time LSI Systmn via Discrete Walsh Transform." Thesis, 1990. http://ndltd.ncl.edu.tw/handle/23957526741177142652.

Texto completo
Resumen
碩士<br>國立交通大學<br>控制工程研究所<br>78<br>The discrete Walsh transform (DWT) is applied to response analysis, identification and model reduction of the 2-D discrete-time LSI system. The data arrays are transformed into discrete Walsh spectrum matrices using DWT. First, with the shift DWT being utilized and the Walsh spectra manipulated by Kronecker product of two matrices, the response of 2-D system can be easily evaluated for arbitrary in- put with zero initial conditions. Next, from the point of view of data matching, the transfer function of 2-D system is identified from finite input-output data,
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Chen, Kuan-Han, and 陳冠翰. "SELECTIVE MAPPING SCHEME COMBINING WITH WALSH HADAMARD TRANSFORM FOR PAPR REDUCTION OF OFDM SYSTEMS." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/58893504047388376254.

Texto completo
Resumen
碩士<br>大同大學<br>通訊工程研究所<br>97<br>Orthogonal Frequency Division Multiplex (OFDM) is a very suitable technique for achieving high-rate wireless data transmission. High spectral efficiency, robustness to channel fading, immunity to impulse interference and less non linear distortion are among the favorite properties of OFDM. One major drawback of OFDM is high Peak to Average Power Ratio (PAPR) of the transmitted signal. The high peaks of an OFDM signal are distorted nonlinearly by the high power amplifier (HPA) because the HPA heavily distorts all signal parts that come close to or exceed satu
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Chen, Chien-Hung, and 陳建宏. "The Joint Use of the Walsh-Hadamard Transform and Signal Companding Techniques for PAPR Reduction in OFDM Systems." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/59838485929160687499.

Texto completo
Resumen
碩士<br>國立高雄第一科技大學<br>電腦與通訊工程所<br>92<br>The orthogonal frequency division multiplexing (OFDM) technique is one of the most attractive multicarrier modulation schemes for its high bandwidth efficiency and strong immunity to multipath fading. Even though there are many advantages of OFDM, it has two main drawbacks: high Peak to Average Power Ratio (PAPR) and frequency offset. To overcome these PAPR probblems, different methods have been proposed to mitigate the PAPR problem of OFDM. These techniques can be divided into two categories: Signal scrambling and Signal distortion technique. In the thesi
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Kadrolkar, Abhijit. "Energy Aware Signal Processing and Transmission for System Condition Monitoring." 2010. https://scholarworks.umass.edu/theses/457.

Texto completo
Resumen
The operational life of wireless sensor network based distributed sensing systems is limited by the energy provided by a portable battery pack. Owing to the inherently resource constrained nature of wireless sensor networks and nodes, a major research thrust in this field is the search for energy-aware methods of operation. Communication is among the most energy-intensive operations on a wireless device. It is therefore, the focus of our efforts to develop an energy-aware method of communication and to introduce a degree of reconfigurability to ensure autonomous operation of such devices. Give
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!