Quantum computers can search rapidly by using almost any transformation [PDF]
A quantum computer has a clear advantage over a classical computer for exhaustive search. The quantum mechanical algorithm for exhaustive search was originally derived by using subtle properties of a particular quantum mechanical operation called the ...
C. H. Bennett +11 more
core +2 more sources
Robust Steganographic Method with Code-Controlled Information Embedding [PDF]
In view of the fact that most images are compressed when transmitted through telecommunica-tion systems and telecommunication systems in the energetics, from the point of view of the practical use of steganographic algorithms in real information security
Kobozeva A.A. , Sokolov A.V
doaj +1 more source
Complexity adaptation in H.264/AVC video coder for static cameras [PDF]
H.264/AVC uses variable block size motion estimation (VBSME) to improve coding gain. However, its complexity is significant and fixed regardless of the required quality or of the scene characteristics. In this paper, we propose an adaptive complexity
Kim, Chanyul, O'Connor, Noel E.
core +1 more source
Cache miss analysis of WHT algorithms [PDF]
On modern computers memory access patterns and cache utilization are as important, if not more important, than operation count in obtaining high-performance implementations of algorithms.
Mihai Furis +2 more
doaj +1 more source
New fast Walsh–Hadamard–Hartley transform algorithm
<span lang="EN-US">This paper presents an efficient fast Walsh–Hadamard–Hartley transform (FWHT) algorithm that incorporates the computation of the Walsh-Hadamard transform (WHT) with the discrete Hartley transform (DHT) into an orthogonal, unitary single fast transform possesses the block diagonal structure. The proposed algorithm is implemented
Suha Suliman Mardan, Mounir Taha Hamood
openaire +1 more source
Some Cryptographic Properties of Functions Based on their 2q-Nega-Hadamard Transform [PDF]
Negabent functions play a vital role in the field of cryptography and coding theory for designing secure cryptosystems. In this article, we investigate the various properties of 2q-nega-Hadamard transform (2q-NHT) of the functions from Z_q^n to Z_2q with
Deep Singh +4 more
doaj +1 more source
Visible Light Communication: An Investigation of LED Non-Linearity Effects on VLC Utilising C-OFDM
The electro-optic output of light-emitting diodes commonly used in visible light communication systems is generally nonlinear in nature. It is particularly problematic when using advanced modulation formats, such as orthogonal frequency-division ...
Jummah Abdulwali, Said Boussakta
doaj +1 more source
Robust Watermarking in Multiresolution Walsh-Hadamard Transform [PDF]
6 Pages, 16 Figure, 2 ...
Bhatnagar, Gaurav +1 more
openaire +2 more sources
Low computational complexity variable block size (VBS) partitioning for motion estimation using the Walsh Hadamard transform (WHT) [PDF]
Variable Block Size (VBS) based motion estimation has been adapted in state of the art video coding, such as H.264/AVC, VC-1. However, a low complexity H.264/AVC encoder cannot take advantage of VBS due to its power consumption requirements.
Kim, Chanyul, O'Connor, Noel E.
core +1 more source
A Characterization of Generalized Boolean Functions Employed in CDMA Communications [PDF]
In design of secure cryptosystems and CDMA communications, the negabent functions play a significant role. The generalized Boolean functions have been extensively studied by Schmidt and established several important results in this setup.
Deep Singh +3 more
doaj +1 more source

