Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Transformée de Walsh.

Thèses sur le sujet « Transformée de Walsh »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 24 meilleures thèses pour votre recherche sur le sujet « Transformée de Walsh ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

Flórez, Gutiérrez Antonio. "Improved Techniques in the Cryptanalysis of Symmetric Primitives." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS281.

Texte intégral
Résumé :
Dans cette thèse, on propose des améliorations qui peuvent être appliquées à plusieurs techniques de cryptanalyse de primitives symétriques. On dédie une attention spéciale à la cryptanalyse linéaire, pour laquelle une technique basée sur la transformée de Walsh rapide était déjà connue (Collard et al., ICISC 2007). On introduit une version généralisée de cette attaque, qui permet de l'appliquer pour la récupération de clé considerant plusieurs tours, ainsi que le réduction de la complexité du problème en utilisant par example des informations provénantes du key-schedule. On propose aussi une
Styles APA, Harvard, Vancouver, ISO, etc.
2

Lazaridis, George. "Image processing using the Walsh transform." Thesis, University of Surrey, 2004. http://epubs.surrey.ac.uk/843950/.

Texte intégral
Résumé :
This thesis presents a new algorithm which can be used to register images of the same or different modalities e.g images with multiple channels such as X-rays, temperature, or elevation or simply images of different spectral bands. In particular, a correlation-based scheme is used, but instead of grey values, it correlates numbers formulated by different combinations of the extracted local Walsh coefficients of the images. Each image patch is expanded in terms of Walsh basis functions. Each Walsh basis function can be thought of as measuring a different aspect of local structure, eg horizontal
Styles APA, Harvard, Vancouver, ISO, etc.
3

Furis, Mihai Alexandru Johnson Jeremy. "Cache miss analysis of Walsh-Hadamard Transform algorithms /." Philadelphia : Drexel University, 2003. http://dspace.library.drexel.edu/handle/1721.1/109.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

O'Dowd, Timothy R. "Discovery of bent functions using the Fast Walsh Transform." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5080.

Texte intégral
Résumé :
Approved for public release; distribution is unlimited<br>Linear cryptanalysis attacks are a threat against cryptosystems. These attacks can be defended against by using combiner functions composed of highly nonlinear Boolean functions. Bent functions, which have the highest possible nonlinearity, are uncommon. As the number of variables in a Boolean function increases, bent functions become extremely rare. A method of computing the nonlinearity of Boolean functions using the Fast Walsh Transform (FWT) is presented. The SRC-6 reconfigurable computer allows testing of functions at a much fa
Styles APA, Harvard, Vancouver, ISO, etc.
5

Davis, Jeffrey H. "A study of potential uses for Walsh transformed images in target recognition." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA292722.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Desmond, Allan Peter. "An analytical signal transform derived from the Walsh Transform for efficient detection of dual tone multiple frequency (DTMF) signals." Thesis, Bucks New University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.401474.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Sagdicoglu, Serhat. "Cryptological Viewpoint Of Boolean Functions." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1082403/index.pdf.

Texte intégral
Résumé :
Boolean functions are the main building blocks of most cipher systems. Various aspects of their cryptological characteristics are examined and investigated by many researchers from different fields. This thesis has no claim to obtain original results but consists in an attempt at giving a unified survey of the main results of the subject. In this thesis, the theory of boolean functions is presented in details, emphasizing some important cryptological properties such as balance, nonlinearity, strict avalanche criterion and propagation criterion. After presenting many results about these criteri
Styles APA, Harvard, Vancouver, ISO, etc.
8

RAJYALAKSHMI, P. S., and R. K. RAJANGAM. "DATA COMPRESSION SYSTEM FOR VIDEO IMAGES." International Foundation for Telemetering, 1986. http://hdl.handle.net/10150/615539.

Texte intégral
Résumé :
International Telemetering Conference Proceedings / October 13-16, 1986 / Riviera Hotel, Las Vegas, Nevada<br>In most transmission channels, bandwidth is at a premium and an important attribute of any good digital signalling scheme is to optimally utilise the bandwidth for transmitting the information. The Data Compression System in this way plays a significant role in the transmission of picture data from any Remote Sensing Satellite by exploiting the statistical properties of the imagery. The data rate required for transmission to ground can be reduced by using suitable compression technique
Styles APA, Harvard, Vancouver, ISO, etc.
9

Ahmed, Kamal Ali. "Digital watermarking of still images." Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/digital-watermarking-of-still-images(0dc4b146-3d97-458f-9506-8c67bc3a155b).html.

Texte intégral
Résumé :
This thesis presents novel research work on copyright protection of grey scale and colour digital images. New blind frequency domain watermarking algorithms using one dimensional and two dimensional Walsh coding were developed. Handwritten signatures and mobile phone numbers were used in this project as watermarks. In this research eight algorithms were developed based on the DCT using 1D and 2D Walsh coding. These algorithms used the low frequency coefficients of the 8 × 8 DCT blocks for embedding. A shuffle process was used in the watermarking algorithms to increase the robustness against th
Styles APA, Harvard, Vancouver, ISO, etc.
10

El, Omer. "Avalanche Properties And Randomness Of The Twofish Cipher." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605571/index.pdf.

Texte intégral
Résumé :
In this thesis, one finalist cipher of the Advanced Encryption Standard (AES) block cipher contest, Twofish proposed by Schneier et al, is studied in order to observe the validity of the statement made by Arikan about the randomness of the cipher, which contradicts National Institute of Standards and Technology (NIST)&rsquo<br>s results. The strength of the cipher to cryptanalytic attacks is investigated by measuring its randomness according to the avalanche criterion. The avalanche criterion results are compared with those of the Statistical Test Suite of the NIST and discrepancies in the sec
Styles APA, Harvard, Vancouver, ISO, etc.
11

Aydin, Ozge Zelal. "Detection Of Bladder Tumor Recurrence By Fourier Transform Infrared Spectroscopy As A Novel Method." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/2/12610883/index.pdf.

Texte intégral
Résumé :
Bladder cancer is one of the most common urogenital cancers worldwide. Two techniques commonly used for bladder cancer diagnosis are urine cytology and cystoscopy. Cytology is not sensitive for detecting tumors. Cystoscopy is an invasive technique which disturbs patient comfort. In the current study, we used Fourier transform infrared (FT-IR) spectroscopy as a novel method which is rapid and non-invasive to investigate the bladder tumor recurrence using the bladder wash samples collected in the course of control cystoscopy. This study is unique since it is the first one to use the bladder wash
Styles APA, Harvard, Vancouver, ISO, etc.
12

Sertkaya, Isa. "Nonlinearity Preserving Post-transformations." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605183/index.pdf.

Texte intégral
Résumé :
Boolean functions are accepted to be cryptographically strong if they satisfy some common pre-determined criteria. It is expected that any design criteria should remain invariant under a large group of transformations due to the theory of similarity of secrecy systems proposed by Shannon. One of the most important design criteria for cryptographically strong Boolean functions is the nonlinearity criterion. Meier and Staffelbach studied nonlinearity preserving transformations, by considering the invertible transformations acting on the arguments of Boolean functions, namely the pre-transformati
Styles APA, Harvard, Vancouver, ISO, etc.
13

Millan, William L. "Analysis and design of Boolean functions for cryptographic applications." Thesis, Queensland University of Technology, 1997.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

ZHENG, XIN-GU, and 鄭信富. "An application of walsh transform in PVC diagnoisis." Thesis, 1986. http://ndltd.ncl.edu.tw/handle/50353655943156501853.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Sharma, Purnima. "A microprocesser-based scheme using fast Walsh-Hadamard transform." Thesis, 1986. http://localhost:8080/xmlui/handle/12345678/5409.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Anderson, Neil Arnold. "The classification of Boolean functions using the Rademacher-Walsh transform." Thesis, 2007. http://hdl.handle.net/1828/221.

Texte intégral
Résumé :
When considering Boolean switching functions with n input variables, there are 2^(2^n) possible functions that can be realized by enumerating all possible combinations of input values and arrangements of output values. As is expected with double exponential growth, the number of functions becomes unmanageable very quickly as n increases. This thesis develops a new approach for computing the spectral classes where the spectral operations are performed by manipulating the truth tables rather than first moving to the spectral domain to manipulate the spectral coefficients. Additionally, a gener
Styles APA, Harvard, Vancouver, ISO, etc.
17

Wen, Chia-Chang, and 溫家昶. "Researches on Generalized Legendre Sequence and Generalized Walsh-Fourier Transform." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/58183559898661696070.

Texte intégral
Résumé :
博士<br>國立臺灣大學<br>電信工程學研究所<br>102<br>The thesis contains two research topics: The first one is the discussion about the properties and applications of the complete generalized Legendre sequence (CGLS) and the second one is about the generalization between the Walsh-Hadamard transform (WHT) and the DFT and their properties. The CGLS is first defined to solve the DFT eigenvector problem. The proposed CGLS based DFT eigenvectors have the advantages of closed-form solutions, completeness, orthogonality, being well defined for arbitrary N, and fast DFT expansion so that the CGLS is helpful for develo
Styles APA, Harvard, Vancouver, ISO, etc.
18

MacDonald, Roderick H. "A Walsh Transform ASIC design with built-in test using VHDL." 1992. http://hdl.handle.net/1993/18588.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

Lin, Chun-Fan, and 林純帆. "Study of Orthogonal STBC Using Walsh-Hadamard Transform with Decoupling in Time Domain." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/01353163889531838536.

Texte intégral
Résumé :
碩士<br>國立東華大學<br>電機工程學系<br>101<br>This thesis presents the Space-Time Block Codes (STBC) constructed by using the diagonal orthogonal coefficient with decoupling in time domain. The novel Walsh-Hadamard STBC (WHSTBC) gives full rate and full diversity order with appropriate pre-coding of the PSK or QAM modulated symbols, when the number of receiver antennas is at least equal to the number of transmit antennas. Hadamard matrices exist for orders equal to N=2^n, where n≥1, and the receiver allows for some decoupling methods and decoding with Maximal Ratio Combining (MRC). Finally, the performance
Styles APA, Harvard, Vancouver, ISO, etc.
20

Ting, Kou-Cheng, and 丁國政. "Designing Fast Walsh Hadamard Transform on Various Interconnection Networks Using Tensor Product Formulation." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/r8f2ma.

Texte intégral
Résumé :
碩士<br>逢甲大學<br>資訊工程所<br>91<br>The fast Walsh Hadamard transform is a simple and important algorithm in digital signal processing, especially, in digital image compression. The fast Walsh Hadamard transform is a block recursive algorithm, which can be easily expressed as a tensor product formula. Also, the tensor product notation can be used to express the topology of interconnection networks. In this thesis, we will emerge the specification of tensor product formulation of block recursive algorithms and interconnection networks to design fast Walsh Hadamard transform algorithms on various inter
Styles APA, Harvard, Vancouver, ISO, etc.
21

Tsai, Yao-Tsung, and 蔡曜聰. "Identification and Redution fo 2-D Discrete-time LSI Systmn via Discrete Walsh Transform." Thesis, 1990. http://ndltd.ncl.edu.tw/handle/23957526741177142652.

Texte intégral
Résumé :
碩士<br>國立交通大學<br>控制工程研究所<br>78<br>The discrete Walsh transform (DWT) is applied to response analysis, identification and model reduction of the 2-D discrete-time LSI system. The data arrays are transformed into discrete Walsh spectrum matrices using DWT. First, with the shift DWT being utilized and the Walsh spectra manipulated by Kronecker product of two matrices, the response of 2-D system can be easily evaluated for arbitrary in- put with zero initial conditions. Next, from the point of view of data matching, the transfer function of 2-D system is identified from finite input-output data,
Styles APA, Harvard, Vancouver, ISO, etc.
22

Chen, Kuan-Han, and 陳冠翰. "SELECTIVE MAPPING SCHEME COMBINING WITH WALSH HADAMARD TRANSFORM FOR PAPR REDUCTION OF OFDM SYSTEMS." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/58893504047388376254.

Texte intégral
Résumé :
碩士<br>大同大學<br>通訊工程研究所<br>97<br>Orthogonal Frequency Division Multiplex (OFDM) is a very suitable technique for achieving high-rate wireless data transmission. High spectral efficiency, robustness to channel fading, immunity to impulse interference and less non linear distortion are among the favorite properties of OFDM. One major drawback of OFDM is high Peak to Average Power Ratio (PAPR) of the transmitted signal. The high peaks of an OFDM signal are distorted nonlinearly by the high power amplifier (HPA) because the HPA heavily distorts all signal parts that come close to or exceed satu
Styles APA, Harvard, Vancouver, ISO, etc.
23

Chen, Chien-Hung, and 陳建宏. "The Joint Use of the Walsh-Hadamard Transform and Signal Companding Techniques for PAPR Reduction in OFDM Systems." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/59838485929160687499.

Texte intégral
Résumé :
碩士<br>國立高雄第一科技大學<br>電腦與通訊工程所<br>92<br>The orthogonal frequency division multiplexing (OFDM) technique is one of the most attractive multicarrier modulation schemes for its high bandwidth efficiency and strong immunity to multipath fading. Even though there are many advantages of OFDM, it has two main drawbacks: high Peak to Average Power Ratio (PAPR) and frequency offset. To overcome these PAPR probblems, different methods have been proposed to mitigate the PAPR problem of OFDM. These techniques can be divided into two categories: Signal scrambling and Signal distortion technique. In the thesi
Styles APA, Harvard, Vancouver, ISO, etc.
24

Kadrolkar, Abhijit. "Energy Aware Signal Processing and Transmission for System Condition Monitoring." 2010. https://scholarworks.umass.edu/theses/457.

Texte intégral
Résumé :
The operational life of wireless sensor network based distributed sensing systems is limited by the energy provided by a portable battery pack. Owing to the inherently resource constrained nature of wireless sensor networks and nodes, a major research thrust in this field is the search for energy-aware methods of operation. Communication is among the most energy-intensive operations on a wireless device. It is therefore, the focus of our efforts to develop an energy-aware method of communication and to introduce a degree of reconfigurability to ensure autonomous operation of such devices. Give
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!