Results 11 to 20 of about 2,157,914 (307)

Cascaded, self-calibrated, single-pixel mid-infrared Hadamard transform spectrometer

open access: goldOptics Express, 2021
In this paper, a single-pixel mid-infrared (mid-IR) Hadamard transform spectrometer is developed. The spectrometer's design, fabrication and experimental results are discussed.
Zi Heng Lim   +5 more
openalex   +2 more sources

Pauli decomposition via the fast Walsh-Hadamard transform [PDF]

open access: yesNew Journal of Physics
The decomposition of a square matrix into a sum of Pauli strings is a classical pre-processing step required to realize many quantum algorithms. Such a decomposition requires significant computational resources for large matrices. We present an exact and
Timothy N Georges   +3 more
doaj   +2 more sources

Hadamard transform imaging [PDF]

open access: green, 1992
We have constructed a Hadamard transform Raman microscopic imaging system, and have developed it to a high definition (64K pixel) technique. We have demonstrated multispectral Raman imaging and developed the first three-dimensional (digital confocal) Raman imaging. We have explored the systematic errors in Hadamard multiplexing techniques and developed
M. D. Morris
openalex   +4 more sources

Hadamard-transform fluorescence-lifetime imaging

open access: goldOptics Express, 2016
We discuss a Hadamard-transform-based fluorescence-lifetime-imaging (HT-FLI) technique for fluorescence-lifetime-imaging microscopy (FLIM). The HT-FLI uses a Fourier-transform phase-modulation fluorometer (FT-PMF) for fluorescence-lifetime measurements, where the modulation frequency of the excitation light is swept linearly in frequency from zero to a
Takahiko Mizuno, Tetsuo Iwata
openalex   +3 more sources

SVD-Based Image Watermarking Using the Fast Walsh-Hadamard Transform, Key Mapping, and Coefficient Ordering for Ownership Protection [PDF]

open access: goldSymmetry, 2019
Proof of ownership on multimedia data exposes users to significant threats due to a myriad of transmission channel attacks over distributed computing infrastructures.
Tahmina Khanam   +3 more
openalex   +2 more sources

Using the Hadamard and related transforms for simplifying the spectrum of the quantum baker's map [PDF]

open access: green, 2006
We rationalize the somewhat surprising efficacy of the Hadamard transform in simplifying the eigenstates of the quantum baker's map, a paradigmatic model of quantum chaos.
Allouche J P   +17 more
core   +2 more sources

The Hadamard transform-a tool for index assignment [PDF]

open access: greenIEEE Transactions on Information Theory, 1996
We show that the channel distortion for maximum-entropy encoders, due to noise on a binary-symmetric channel, is minimized if the vector quantizer can be expressed as a linear transform of a hypercube. The index assignment problem is regarded as a problem of linearizing the vector quantizer.
Petter Knagenhjelm, Erik Agrell
openalex   +2 more sources

A Novel Autofocus Measure Based on Weighted Walsh-Hadamard Transform

open access: yesIEEE Access, 2019
The autofocus measure plays an important role in passive digital imaging systems. However, most of the existing methods are more sensitive to the noise. In order to overcome this drawback, we proposed a novel autofocus measure based on the weighted Walsh-
Liqiang Guo, Xiang Cao, Lian Liu
doaj   +2 more sources

QuIP#: Even Better LLM Quantization with Hadamard Incoherence and Lattice Codebooks. [PDF]

open access: yesProc Mach Learn Res
Post-training quantization (PTQ) reduces the memory footprint of LLMs by quantizing their weights to low-precision. In this work, we introduce QuIP#, a weight-only PTQ method that achieves state-of-the-art results in extreme compression regimes (≤ 4 bits
Tseng A   +4 more
europepmc   +2 more sources

The Sufficient Condition for Ensuring the Reliability of Perception of the Steganographic Message in the Walsh-Hadamard Transform Domain [PDF]

open access: yesProblems of the Regional Energetics, 2022
In view of the high compatibility of the Walsh-Hadamard transform to the architecture of mod-ern computing facilities, it is sensible to use it in methods of steganography and steganalysis.
Kobozeva A.A., Sokolov A.V.
doaj   +1 more source

Home - About - Disclaimer - Privacy