Skip to Content

50 Results Found

  • Article
  • Open Access
474 Views
21 Pages

Communication System with Walsh Transform-Based End-to-End Autoencoder

  • Mindaugas Knyva,
  • Julius Ruseckas and
  • Alfonsas Juršėnas

1 December 2025

This paper investigates the design of end-to-end (E2E) autoencoders within AI-enhanced communication systems. It emphasizes the advantages of transitioning from Fast Fourier Transform (FFT)-based Orthogonal Frequency Division Multiplexing (OFDM) to a...

  • Article
  • Open Access
13 Citations
3,457 Views
16 Pages

19 May 2020

This paper focuses on reconstruction of dynamic velocity and displacement from seismic acceleration signal. For conventional time-domain approaches or frequency-domain approaches, due to initial values and non-negligible noise in the acceleration sig...

  • Article
  • Open Access
8 Citations
2,602 Views
18 Pages

Incipient Fault Diagnosis of a Grid-Connected T-Type Multilevel Inverter Using Multilayer Perceptron and Walsh Transform

  • Tito G. Amaral,
  • Vitor Fernão Pires,
  • Armando Cordeiro,
  • Daniel Foito,
  • João F. Martins,
  • Julia Yamnenko,
  • Tetyana Tereschenko,
  • Liudmyla Laikova and
  • Ihor Fedin

13 March 2023

This article deals with fault detection and the classification of incipient and intermittent open-transistor faults in grid-connected three-level T-type inverters. Normally, open-transistor detection algorithms are developed for permanent faults. Nev...

  • Article
  • Open Access
1 Citations
2,755 Views
24 Pages

Compact Walsh–Hadamard Transform-Driven S-Box Design for ASIC Implementations

  • Omer Tariq,
  • Muhammad Bilal Akram Dastagir and
  • Dongsoo Han

With the exponential growth of the Internet of Things (IoT), ensuring robust end-to-end encryption is paramount. Current cryptographic accelerators often struggle with balancing security, area efficiency, and power consumption, which are critical for...

  • Article
  • Open Access
4 Citations
1,327 Views
22 Pages

10 July 2024

This paper introduces an effective blind watermarking algorithm for double-color images utilizing the Walsh–Hadamard Transform (WHT) with symmetric embedding locations to enhance imperceptibility. The proposed algorithm leverages the energy acc...

  • Article
  • Open Access
354 Views
24 Pages

A Novel Dual Color Image Watermarking Algorithm Using Walsh–Hadamard Transform with Difference-Based Embedding Positions

  • Yutong Jiang,
  • Shuyuan Shen,
  • Songsen Yu,
  • Yining Luo,
  • Zhaochuang Lao,
  • Hongrui Wei,
  • Jing Wu and
  • Zhong Zhuang

30 December 2025

Image watermarking is an essential technique for protecting the copyright of digital images. This paper proposes a novel color image watermarking algorithm based on the Walsh–Hadamard Transform (WHT). By analyzing the differences among WHT coef...

  • Article
  • Open Access
26 Citations
5,631 Views
20 Pages

26 December 2019

Proof of ownership on multimedia data exposes users to significant threats due to a myriad of transmission channel attacks over distributed computing infrastructures. In order to address this problem, in this paper, an efficient blind symmetric image...

  • Article
  • Open Access
56 Citations
4,797 Views
20 Pages

Detection of Focal and Non-Focal Electroencephalogram Signals Using Fast Walsh-Hadamard Transform and Artificial Neural Network

  • Prasanna J.,
  • M. S. P. Subathra,
  • Mazin Abed Mohammed,
  • Mashael S. Maashi,
  • Begonya Garcia-Zapirain,
  • N. J. Sairamya and
  • S. Thomas George

1 September 2020

The discrimination of non-focal class (NFC) and focal class (FC), is vital in localizing the epileptogenic zone (EZ) during neurosurgery. In the conventional diagnosis method, the neurologist has to visually examine the long hour electroencephalogram...

  • Article
  • Open Access
39 Citations
4,672 Views
23 Pages

Enhancing Tool Wear Prediction Accuracy Using Walsh–Hadamard Transform, DCGAN and Dragonfly Algorithm-Based Feature Selection

  • Milind Shah,
  • Himanshu Borade,
  • Vedant Sanghavi,
  • Anshuman Purohit,
  • Vishal Wankhede and
  • Vinay Vakharia

8 April 2023

Tool wear is an important concern in the manufacturing sector that leads to quality loss, lower productivity, and increased downtime. In recent years, there has been a rise in the popularity of implementing TCM systems using various signal processing...

  • Article
  • Open Access
6 Citations
4,054 Views
26 Pages

Walsh–Hadamard Transform Based Non-Orthogonal Multiple Access (NOMA) and Interference Rejection Combining in Next-Generation HetNets

  • M. Rehan Usman,
  • M. Arslan Usman,
  • Soo Young Shin,
  • Gandeva Bayu Satrya,
  • Rizwan A. Naqvi,
  • Maria G. Martini and
  • Christos Politis

9 February 2021

In heterogeneous networks (HetNets), non-orthogonal multiple access (NOMA) has recently been proposed for hybrid-access small-cells, promising a manifold network capacity compared to OMA. One of the major issues with the installation of a hybrid-acce...

  • Article
  • Open Access
2 Citations
3,031 Views
23 Pages

27 October 2023

Stream ciphers usually rely on highly secure Boolean functions to ensure safe communication within unsafe channels. However, discovering secure Boolean functions is a non-trivial optimization problem that has been addressed by many optimization techn...

  • Article
  • Open Access
12 Citations
6,119 Views
13 Pages

Computationally Efficient Robust Color Image Watermarking Using Fast Walsh Hadamard Transform

  • Suja Kalarikkal Pullayikodi,
  • Naser Tarhuni,
  • Afaq Ahmed and
  • Fahad Bait Shiginah

13 October 2017

Watermark is the copy deterrence mechanism used in the multimedia signal that is to be protected from hacking and piracy such a way that it can later be extracted from the watermarked signal by the decoder. Watermarking can be used in various applica...

  • Article
  • Open Access
1 Citations
3,615 Views
21 Pages

3 December 2015

An explicit method for the construction of a tight wavelet frame generated by the Walsh polynomials with the help of extension principles was presented by Shah (Shah, 2013). In this article, we extend the notion of wavelet frames to periodic wavelet...

  • Article
  • Open Access
8 Citations
5,145 Views
17 Pages

Hierarchical Cubical Tensor Decomposition through Low Complexity Orthogonal Transforms

  • Roumen K. Kountchev,
  • Rumen P. Mironov and
  • Roumiana A. Kountcheva

25 May 2020

In this work, new approaches are proposed for the 3D decomposition of a cubical tensor of size N × N × N for N = 2n through hierarchical deterministic orthogonal transforms with low computational complexity, whose kernels are based on the...

  • Article
  • Open Access
16 Citations
1,788 Views
25 Pages

Matrix Summability of Walsh–Fourier Series

  • Ushangi Goginava and
  • Károly Nagy

14 July 2022

The presented paper discusses the matrix summability of the Walsh–Fourier series. In particular, we discuss the convergence of matrix transforms in L1 space and in CW space in terms of modulus of continuity and matrix transform variation. Moreo...

  • Article
  • Open Access
4 Citations
3,584 Views
21 Pages

31 December 2022

This paper proposes an identification approach for the Electronic Control Units (ECUs) in the vehicle, which are based on the physical characteristics of the ECUs extracted from their voltage output. Then, the identification is not based on cryptogra...

  • Article
  • Open Access
1 Citations
1,031 Views
16 Pages

Matrix Factorization and Some Fast Discrete Transforms

  • Iliya Bouyukliev,
  • Mariya Dzhumalieva-Stoeva and
  • Paskal Piperkov

23 July 2024

In this paper, three discrete transforms related to vector spaces over finite fields are studied. For our purposes, and according to the properties of the finite fields, the most suitable transforms are as follows: for binary fields, this is the Wals...

  • Article
  • Open Access
2 Citations
1,506 Views
19 Pages

27 May 2024

Linear codes are the most important family of codes in cryptography and coding theory. Some codes only have a few weights and are widely used in many areas, such as authentication codes, secret sharing schemes and strongly regular graphs. By setting...

  • Article
  • Open Access
1 Citations
3,435 Views
20 Pages

7 October 2024

The autofluorescence of erythrocyte porphyrins has emerged as a potential method for multi-cancer early detection (MCED). With this method’s dependence on research-grade spectrofluorometers, significant improvements in instrumentation are neces...

  • Article
  • Open Access
27 Citations
3,751 Views
13 Pages

27 April 2019

The paper presents a method of processing vibration signals which was designed to detect damage to wheels of gearboxes for means of transport. This method uses entropy calculation, and multi-stage filtering calculated by means of digital filters and...

  • Article
  • Open Access
36 Citations
4,753 Views
22 Pages

The usage of images in different fields has increased dramatically, especially in medical image analysis and social media. Many risks can threaten the integrity and confidentiality of digital images transmitted through the internet. As such, the pres...

  • Article
  • Open Access
75 Citations
8,061 Views
19 Pages

Audio Encryption Algorithm Based on Chen Memristor Chaotic System

  • Wanying Dai,
  • Xiangliang Xu,
  • Xiaoming Song and
  • Guodong Li

23 December 2021

The data space for audio signals is large, the correlation is strong, and the traditional encryption algorithm cannot meet the needs of efficiency and safety. To solve this problem, an audio encryption algorithm based on Chen memristor chaotic system...

  • Article
  • Open Access
1 Citations
2,802 Views
11 Pages

Probabilistically-Shaped DMT for IM-DD Systems with Low-Complexity Fast WHT-Based PDSP

  • Yi Liu,
  • Haimiao Long,
  • Ming Chen,
  • Yun Cheng and
  • Taoyun Zhou

15 September 2022

Transmission capacity and receiver sensitivity of an intensity-modulation direct detection (IM-DD) optical discrete multi-tone (DMT) system can be improved by using the probabilistically shaping (PS) technique. However, different probabilistic distri...

  • Article
  • Open Access
18 Citations
3,563 Views
23 Pages

Blind Watermarking of Color Medical Images Using Hadamard Transform and Fractional-Order Moments

  • Mostafa M. Abdel-Aziz,
  • Khalid M. Hosny,
  • Nabil A. Lashin and
  • Mostafa M. Fouda

25 November 2021

This paper proposes a new blind, color image watermarking method using fast Walsh–Hadamard transformation (FWHT) and multi-channel fractional Legendre–Fourier moments (MFrLFMs). The input host color image is first split into 4 × 4 n...

  • Article
  • Open Access
2 Citations
1,271 Views
13 Pages

Single-Shot Wavefront Sensing in Focal Plane Imaging Using Transformer Networks

  • Hangning Kou,
  • Jingliang Gu,
  • Jiang You,
  • Min Wan,
  • Zixun Ye,
  • Zhengjiao Xiang and
  • Xian Yue

20 March 2025

Wavefront sensing is an essential technique in optical imaging, adaptive optics, and atmospheric turbulence correction. Traditional wavefront reconstruction methods, including the Gerchberg–Saxton (GS) algorithm and phase diversity (PD) techniq...

  • Article
  • Open Access
1 Citations
1,105 Views
21 Pages

In several stream cipher designs, Boolean functions (BFs) play a crucial role as non-linear components, either serving as filtering functions or being used within the combining process. The overall strength of stream ciphers mainly depends on certain...

  • Article
  • Open Access
5 Citations
2,391 Views
18 Pages

17 February 2023

Linear codes with a few weights have been extensively studied due to their wide applications in secret sharing schemes, strongly regular graphs, association schemes, and authentication codes. In this paper, we choose the defining sets from two distin...

  • Article
  • Open Access
4 Citations
1,940 Views
16 Pages

Resiliency and Nonlinearity Profiles of Some Cryptographic Functions

  • Deep Singh,
  • Amit Paul,
  • Neerendra Kumar,
  • Veronika Stoffová and
  • Chaman Verma

27 November 2022

Boolean functions are important in terms of their cryptographic and combinatorial properties for different kinds of cryptosystems. The nonlinearity and resiliency of cryptographic functions are crucial criteria with respect to protection of ciphers f...

  • Article
  • Open Access
10 Citations
2,812 Views
16 Pages

Multiband SHEPWM Control Technology Based on Walsh Functions

  • Song Li,
  • Guizhi Song,
  • Manyuan Ye,
  • Wei Ren and
  • Qiwen Wei

The drawback of modulation ratio limitation in selective harmonic elimination pulse width modulation (SHEPWM) technology based on Walsh function transformation. In order to solve this problem, a multiband SHEPWM control technology method for a multil...

  • Proceeding Paper
  • Open Access
7 Citations
2,284 Views
3 Pages

A comparison between the four most used transforms, the discrete Fourier transform (DFT), discrete cosine transform (DCT), the Walsh–Hadamard transform (WHT) and the Haar-wavelet transform (DWT), for the transmission of analog images, varying their c...

  • Article
  • Open Access
13 Citations
3,816 Views
19 Pages

A Novel GFDM Waveform Design Based on Cascaded WHT-LWT Transform for the Beyond 5G Wireless Communications

  • Meryem Maraş,
  • Elif Nur Ayvaz,
  • Meltem Gömeç,
  • Asuman Savaşcıhabeş and
  • Ali Özen

5 March 2021

In this paper, a new WHT-LWT-GFDM waveform obtained by combining Walsh–Hadamard Transform (WHT), Lifting Wavelet Transform (LWT), and Generalized Frequency Division Multiplexing (GFDM) is presented for use in next-generation wireless communication sy...

  • Article
  • Open Access
1 Citations
12,592 Views
32 Pages

23 July 2010

Chemists use one set of orbitals when comparing to a structural formula, hybridized AOs or NBOs for example, and another for reasoning in terms of frontier orbitals, MOs usually. Chemical arguments can frequently be made in terms of energy and/or ele...

  • Feature Paper
  • Article
  • Open Access
2 Citations
3,968 Views
17 Pages

22 January 2022

We review and compare three algebraic methods to compute the nonlinearity of Boolean functions. Two of them are based on Gröbner basis techniques: the first one is defined over the binary field, while the second one over the rationals. The third...

  • Article
  • Open Access
9 Citations
4,751 Views
11 Pages

12 August 2021

In the paper, orthogonal transforms based on proposed symmetric, orthogonal matrices are created. These transforms can be considered as generalized Walsh–Hadamard Transforms. The simplicity of calculating the forward and inverse transforms is one of...

  • Article
  • Open Access
4 Citations
3,927 Views
15 Pages

Walsh–Hadamard Kernel Feature-Based Image Compression Using DCT with Bi-Level Quantization

  • Dibyalekha Nayak,
  • Kananbala Ray,
  • Tejaswini Kar and
  • Chiman Kwan

To meet the high bit rate requirements in many multimedia applications, a lossy image compression algorithm based on Walsh–Hadamard kernel-based feature extraction, discrete cosine transform (DCT), and bi-level quantization is proposed in this...

  • Article
  • Open Access
12 Citations
3,603 Views
13 Pages

The electro-optic output of light-emitting diodes commonly used in visible light communication systems is generally nonlinear in nature. It is particularly problematic when using advanced modulation formats, such as orthogonal frequency-division mult...

  • Article
  • Open Access
6 Citations
5,144 Views
23 Pages

Doubly Orthogonal Wavelet Packets for Multi-Users Indoor Visible Light Communication Systems

  • Arslan Khalid,
  • Hafiz Muhammad Asif,
  • Konstantin I. Kostromitin,
  • Sattam Al-Otaibi,
  • Kazi Mohammed Saidul Huq and
  • Jonathan Rodriguez

Visible Light Communication (VLC) is a data communication technology that modulates the intensity of the light to transmit the information mostly by means of Light Emitting Diodes (LEDs). The data rate is mainly throttled by the limited bandwidth of...

  • Article
  • Open Access
4 Citations
2,877 Views
16 Pages

26 September 2020

In this work is introduced one new hierarchical decomposition for cubical tensor of size 2n, based on the well-known orthogonal transforms Principal Component Analysis and Karhunen–Loeve Transform. The decomposition is called 3D Frequency-Order...

  • Article
  • Open Access
58 Citations
4,254 Views
19 Pages

3 November 2021

Retinopathy of Prematurity (ROP) affects preterm neonates and could cause blindness. Deep Learning (DL) can assist ophthalmologists in the diagnosis of ROP. This paper proposes an automated and reliable diagnostic tool based on DL techniques called D...

  • Feature Paper
  • Article
  • Open Access
3,140 Views
22 Pages

Gyre Precoding and T-Transformation-Based GFDM System for UAV-Aided mMTC Network

  • Joarder Jafor Sadique,
  • Shaikh Enayet Ullah,
  • Raad Raad,
  • Md. Rabiul Islam,
  • Md. Mahbubar Rahman,
  • Abbas Z. Kouzani and
  • M. A. Parvez Mahmud

25 November 2021

In this paper, an unmanned aerial vehicle (UAV)-aided multi-antenna configured downlink mmWave cooperative generalized frequency division multiplexing (GFDM) system is proposed. To provide physical layer security (PLS), a 3D controlled Lorenz mapping...

  • Article
  • Open Access
6 Citations
5,228 Views
24 Pages

Improvements on Making BKW Practical for Solving LWE

  • Alessandro Budroni,
  • Qian Guo,
  • Thomas Johansson,
  • Erik Mårtensson and
  • Paul Stankovski Wagner

The learning with errors (LWE) problem is one of the main mathematical foundations of post-quantum cryptography. One of the main groups of algorithms for solving LWE is the Blum–Kalai–Wasserman (BKW) algorithm. This paper presents new improvements of...

  • Article
  • Open Access
9 Citations
4,366 Views
25 Pages

Metaheuristics in the Optimization of Cryptographic Boolean Functions

  • Isaac López-López,
  • Guillermo Sosa-Gómez,
  • Carlos Segura,
  • Diego Oliva and
  • Omar Rojas

21 September 2020

Generating Boolean Functions (BFs) with high nonlinearity is a complex task that is usually addresses through algebraic constructions. Metaheuristics have also been applied extensively to this task. However, metaheuristics have not been able to attai...

  • Article
  • Open Access
2 Citations
1,882 Views
14 Pages

MLTSP: New 3D Framework, Based on the Multilayer Tensor Spectrum Pyramid

  • Roumiana A. Kountcheva,
  • Rumen P. Mironov and
  • Roumen K. Kountchev

12 September 2022

A tensor representation structure based on the multilayer tensor spectrum pyramid (MLTSP) is introduced in this work. The structure is “truncated”, i.e., part of the high-frequency spectrum coefficients is cut-off, and on the retained low-frequency c...

  • Article
  • Open Access
22 Citations
4,552 Views
15 Pages

26 August 2022

A novel intelligent centrifugal pump (CP) fault diagnosis method is proposed in this paper. The method is based on the contrast in vibration data obtained from a centrifugal pump (CP) under several operating conditions. The vibration signals data obt...

  • Article
  • Open Access
2 Citations
1,834 Views
17 Pages

22 February 2024

Vectorial Boolean functions and codes are closely related and interconnected. On the one hand, various requirements of binary linear codes are needed for their theoretical interests but, more importantly, for their practical applications (such as few...

  • Article
  • Open Access
2 Citations
1,848 Views
36 Pages

Lower-Complexity Multi-Layered Security Partitioning Algorithm Based on Chaos Mapping-DWT Transform for WA/SNs

  • Tarek Srour,
  • Mohsen A. M. El-Bendary,
  • Mostafa Eltokhy,
  • Atef E. Abouelazm,
  • Ahmed A. F. Youssef and
  • Ali M. El-Rifaie

The resource limitations of Low-Power Wireless Networks (LP-WNs), such as Wireless Sensor Networks (WSNs), Wireless Actuator/Sensor Networks (WA/SNs), and Internet of Things (IoT) outdoor applications, restrict the utilization of the error-performanc...

  • Article
  • Open Access
84 Citations
5,055 Views
23 Pages

23 November 2022

Among the leading causes of mortality and morbidity in people are lung and colon cancers. They may develop concurrently in organs and negatively impact human life. If cancer is not diagnosed in its early stages, there is a great likelihood that it wi...

  • Feature Paper
  • Article
  • Open Access
34 Citations
3,117 Views
24 Pages

Utilizing TGAN and ConSinGAN for Improved Tool Wear Prediction: A Comparative Study with ED-LSTM, GRU, and CNN Models

  • Milind Shah,
  • Himanshu Borade,
  • Vipul Dave,
  • Hitesh Agrawal,
  • Pranav Nair and
  • Vinay Vakharia

2 September 2024

Developing precise deep learning (DL) models for predicting tool wear is challenging, particularly due to the scarcity of experimental data. To address this issue, this paper introduces an innovative approach that leverages the capabilities of tabula...

  • Article
  • Open Access
2,064 Views
18 Pages

30 November 2023

In her recent book, Kierkegaard and Religion: Personality, Character, and Virtue, Sylvia Walsh argues that Kierkegaard is not a virtue ethicist in the most common senses associated with eudaimonism, which he understands as enlightened self-interest....

  • Article
  • Open Access
1,716 Views
21 Pages

An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis

  • Christoph Graebnitz,
  • Valentin Pickel,
  • Holger Eble,
  • Frank Morgner,
  • Hannes Hattenbach and
  • Marian Margraf

22 December 2024

In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many sophisticated cryptographic ciphers. Since these linear cryptanalytic techniques require e...