The Extended Hadamard Transform: Sensitivity-Enhanced NMR Experiments Among Labile and Non-Labile 1 Hs of SARS-CoV-2-derived RNAs. [PDF]
Kim J+9 more
europepmc +1 more source
Practical multi-spectrum Hadamard transform spectrometer [PDF]
Ming Hing Tai+3 more
openalex +1 more source
Coloured shuffle compatibility, Hadamard products, and ask zeta functions
Abstract We devise an explicit method for computing combinatorial formulae for Hadamard products of certain rational generating functions. The latter arise naturally when studying so‐called ask zeta functions of direct sums of modules of matrices or class‐ and orbit‐counting zeta functions of direct products of nilpotent groups.
Angela Carnevale+2 more
wiley +1 more source
Computationally Efficient Robust Color Image Watermarking Using Fast Walsh Hadamard Transform
Watermark is the copy deterrence mechanism used in the multimedia signal that is to be protected from hacking and piracy such a way that it can later be extracted from the watermarked signal by the decoder.
Suja Kalarikkal Pullayikodi+3 more
doaj +1 more source
Generation of Quantum Software From Truth Tables
ABSTRACT Background Quantum Computing (QC) represents a disruptive paradigm in computing, with significant implications across various domains such as medicine, logistics, chemistry, and defense. However, quantum software development—the discipline that enables the exploitation of QC's potential—faces considerable challenges due to the inherent ...
Macario Polo+3 more
wiley +1 more source
Hybrid Precoding-Beamforming Design With Hadamard RF Codebook for mmWave Large-Scale MIMO Systems
This paper proposes a hybrid structure for multi-stream large-scale multi-input multi-output (MIMO) beamforming systems, in single-user scenario, using a Hadamard radio frequency (RF) codebook with low-bit resolution phase shifters. We show that Hadamard
Hussein Seleem+2 more
doaj +1 more source
Laplace Transforms via Hadamard Factorization [PDF]
Fuchang Gao+3 more
openalex +1 more source
QuantumNetSec: Quantum Machine Learning for Network Security
ABSTRACT As the digital landscape becomes increasingly complex, traditional cybersecurity measures are struggling to keep pace with the growing sophistication of cyber threats. This escalating challenge calls for new, more robust solutions. In this context, quantum computing emerges as a powerful tool that can change our approach to network security ...
Diego Abreu+3 more
wiley +1 more source
Uniform approximations for Randomized Hadamard Transforms with applications [PDF]
Yeshwanth Cherapanamjeri, Jelani Nelson
openalex +3 more sources
Comparison between Different Data Image Compression Techniques Applied on SAR Images
In this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size.
Eanas Y. Al-Tae’e
doaj