Results 21 to 30 of about 4,861 (197)

Quantum computers can search rapidly by using almost any transformation [PDF]

open access: yes, 1997
A quantum computer has a clear advantage over a classical computer for exhaustive search. The quantum mechanical algorithm for exhaustive search was originally derived by using subtle properties of a particular quantum mechanical operation called the ...
C. H. Bennett   +11 more
core   +2 more sources

Robust Steganographic Method with Code-Controlled Information Embedding [PDF]

open access: yesProblems of the Regional Energetics, 2021
In view of the fact that most images are compressed when transmitted through telecommunica-tion systems and telecommunication systems in the energetics, from the point of view of the practical use of steganographic algorithms in real information security
Kobozeva A.A. , Sokolov A.V
doaj   +1 more source

Complexity adaptation in H.264/AVC video coder for static cameras [PDF]

open access: yes, 2009
H.264/AVC uses variable block size motion estimation (VBSME) to improve coding gain. However, its complexity is significant and fixed regardless of the required quality or of the scene characteristics. In this paper, we propose an adaptive complexity
Kim, Chanyul, O'Connor, Noel E.
core   +1 more source

Cache miss analysis of WHT algorithms [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2005
On modern computers memory access patterns and cache utilization are as important, if not more important, than operation count in obtaining high-performance implementations of algorithms.
Mihai Furis   +2 more
doaj   +1 more source

New fast Walsh–Hadamard–Hartley transform algorithm

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2023
<span lang="EN-US">This paper presents an efficient fast Walsh–Hadamard–Hartley transform (FWHT) algorithm that incorporates the computation of the Walsh-Hadamard transform (WHT) with the discrete Hartley transform (DHT) into an orthogonal, unitary single fast transform possesses the block diagonal structure. The proposed algorithm is implemented
Suha Suliman Mardan, Mounir Taha Hamood
openaire   +1 more source

Some Cryptographic Properties of Functions Based on their 2q-Nega-Hadamard Transform [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences
Negabent functions play a vital role in the field of cryptography and coding theory for designing secure cryptosystems. In this article, we investigate the various properties of 2q-nega-Hadamard transform (2q-NHT) of the functions from Z_q^n to Z_2q with
Deep Singh   +4 more
doaj   +1 more source

Visible Light Communication: An Investigation of LED Non-Linearity Effects on VLC Utilising C-OFDM

open access: yesPhotonics, 2022
The electro-optic output of light-emitting diodes commonly used in visible light communication systems is generally nonlinear in nature. It is particularly problematic when using advanced modulation formats, such as orthogonal frequency-division ...
Jummah Abdulwali, Said Boussakta
doaj   +1 more source

Robust Watermarking in Multiresolution Walsh-Hadamard Transform [PDF]

open access: yes2009 IEEE International Advance Computing Conference, 2009
6 Pages, 16 Figure, 2 ...
Bhatnagar, Gaurav   +1 more
openaire   +2 more sources

Low computational complexity variable block size (VBS) partitioning for motion estimation using the Walsh Hadamard transform (WHT) [PDF]

open access: yes, 2009
Variable Block Size (VBS) based motion estimation has been adapted in state of the art video coding, such as H.264/AVC, VC-1. However, a low complexity H.264/AVC encoder cannot take advantage of VBS due to its power consumption requirements.
Kim, Chanyul, O'Connor, Noel E.
core   +1 more source

A Characterization of Generalized Boolean Functions Employed in CDMA Communications [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences
In design of secure cryptosystems and CDMA communications, the negabent functions play a significant role. The generalized Boolean functions have been extensively studied by Schmidt and established several important results in this setup.
Deep Singh   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy