Results 61 to 70 of about 512,361 (324)
REGULAR METHOD FOR SYNTHESIS OF BASIC BENT-SQUARES OF RANDOM ORDER
The paper is devoted to the class construction of the most non-linear Boolean bent-functions of any length N = 2k (k = 2, 4, 6…), on the basis of their spectral representation – Agievich bent squares.
A. V. Sokolov
doaj +1 more source
Linear Functions Based on Walsh Functions
В статті розглянуто метод побудови ортонормованої системи лінійних функцій для апроксимації функції зміни швидкості вітру лінійними наближеннями з метою оптимізації режиму роботи вітрогенератора і максимізації відбору енергії від відновлюваних джерел. При побудові вказаної системи за основу була взята система ортонормованих функцій Уолша.
Vadym Ihorovych Martyniuk +1 more
openaire +3 more sources
ABSTRACT Alcohol and other drug‐facilitated sexual violence can have significant impacts on victim‐survivors, yet little is known about what support service providers offer them. To understand the experiences and perceptions of service providers, interviews with counsellors, health workers, forensic toxicologists and harm reduction workers were ...
Jessica Ison +5 more
wiley +1 more source
Clot Composition Profiling in Large Vessel Occlusion Stroke Via Radiomics
Objective Clot composition may offer insights into the mechanism of ischemic stroke. Radiomics, a noninvasive imaging technique, enables tissue characterization through radiomic features (RFs). We aimed to evaluate clot composition using radiomics on non‐contrast computed tomography (NCCT).
Andres Gudino +23 more
wiley +1 more source
Linear Codes Constructed from Two Weakly Regular Plateaued Functions with Index (p − 1)/2
Linear codes are the most important family of codes in cryptography and coding theory. Some codes only have a few weights and are widely used in many areas, such as authentication codes, secret sharing schemes and strongly regular graphs.
Shudi Yang, Tonghui Zhang, Zheng-an Yao
doaj +1 more source
Some Cryptographic Properties of Functions Based on their 2q-Nega-Hadamard Transform [PDF]
Negabent functions play a vital role in the field of cryptography and coding theory for designing secure cryptosystems. In this article, we investigate the various properties of 2q-nega-Hadamard transform (2q-NHT) of the functions from Z_q^n to Z_2q with
Deep Singh +4 more
doaj +1 more source
An overview of the postcranial osteology of caecilians (Gymnophiona, Lissamphibia)
Abstract Caecilians comprise a relatively small (~220 species) group (Gymnophiona) of snake‐like or worm‐like, mostly tropical amphibians. Most adult caecilians are fossorial, although some species may live in aquatic or semi‐aquatic environments, either as larvae or adults.
Rodolfo Otávio Santos +2 more
wiley +1 more source
The Walsh Family Resilience Questionnaire: the Italian version
Silvana Rocchi,1 Claudio Ghidelli,2 Roberto Burro,3 Michele Vitacca,4 Simonetta Scalvini,5 Anna Maria Della Vedova,6 Gianmarco Roselli,7 Jean-Pierre Ramponi,8 Giorgio Bertolotti9 1Psychology Service, ICS Maugeri Spa SB, Institute of Lumezzane ...
Rocchi S +8 more
doaj
Abstract Actinopterygii is a major extant vertebrate group, but limited data are available for its earliest members. Here we investigate the morphology of Devonian actinopterygians, focusing on the lower jaw. We use X‐ray computed tomography (XCT) to provide comprehensive descriptions of the mandibles of 19 species, which span the whole of the Devonian
Ben Igielman +11 more
wiley +1 more source
Walsh function generator for the Electronically Scanned Thinned Array Radiometer (ESTAR) instrument [PDF]
A prototype Walsh Function Generator (WFG) for the ESTAR (Electronically Scanned Thinned Array Radiometer) instrument has been designed and tested. Implemented in a single Xilinx XC3020PC68-50 Field Programmable Gate Array (FPGA), it generates a user ...
Chren, William A., Jr.
core +1 more source

