Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,379,974 papers from all fields of science
Search
Sign In
Create Free Account
Welch's method
Known as:
Welch
, Welch method
In physics, engineering, and applied mathematics, Welch's method, named after P.D. Welch, is used for estimating the power of a signal at different…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Bartlett's method
Discrete Fourier transform
Fast Fourier transform
Modified discrete cosine transform
Expand
Broader (1)
Digital signal processing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Combating micronutrient malnutrition: identification of commercial sorghum cultivars with high grain iron and zinc.
Arvind Kumar
,
B. Reddy
,
K. Sahrawat
,
B. Ramaiah
2010
Corpus ID: 86525642
Sorghum (Sorghum bicolor) is the fifth most important cereal crop grown on 47 million ha in 104 countries in Africa, Asia…
Expand
Highly Cited
2008
Highly Cited
2008
Functional Interleukin-17 Receptor A is Expressed in the Central Nervous System and Upregulated in Experimental Autoimmune Encephalomyelitisa
J. D. Sarma
,
B. Ciric
,
+5 authors
A. Rostami
2008
Corpus ID: 15943052
Interleukin-17A (IL-17A) is founding member of a novel family of inflammatory cytokines that plays a critical role in the…
Expand
2006
2006
Low-Correlation Sequences Over the QAM Constellation
S. M. I. M. Anand
,
F. I. P. Vijay Kumar
IEEE Transactions on Information Theory
2006
Corpus ID: 13915481
This paper presents the first concerted look at low correlation sequence families over quadrature amplitude modulation (QAM…
Expand
Review
2005
Review
2005
An estuarine observatory for real‐time telemetry of migrant macrofauna: Design, performance, and constraints
T. Grothues
,
K. Able
,
J. McDonnell
,
M. Sisak
2005
Corpus ID: 55460673
In 2002, we began tagging macrofauna and established an array of hydrophones in the Mullica River and Great Bay estuary in…
Expand
Highly Cited
2003
Highly Cited
2003
Meeting the Welch and Karystinos-Pados Bounds on DS-CDMA Binary Signature Sets
C. Ding
,
M. Golin
,
T. Kløve
Des. Codes Cryptogr.
2003
Corpus ID: 12973275
The Welch lower bound on the total-squared-correlation (TSC) of binary signature sets is loose for binary signature sets whose…
Expand
Highly Cited
2002
Highly Cited
2002
Cryptographic properties of the Welch-Gong transformation sequence generators
G. Gong
,
A. Youssef
IEEE Transactions on Information Theory
2002
Corpus ID: 16279768
Welch-Gong (WG) transformation sequences are binary sequences of period 2/sup n/ - 1 with two-level autocorrelation. These…
Expand
Highly Cited
1998
Highly Cited
1998
Identification of hidden Markov models for ion channel currents. I. Colored background noise
Lalitha Venkataramanan
,
J. L. Walsh
,
R. Kuc
,
F. Sigworth
IEEE Transactions on Signal Processing
1998
Corpus ID: 5603659
Signal processing based on hidden Markov models (HMM's) has been applied recently to the characterization of single ion channel…
Expand
Highly Cited
1998
Highly Cited
1998
Identification of hidden Markov models for ion channel currents. II. State-dependent excess noise
Lalitha Venkataramanan
,
R. Kuc
,
F. Sigworth
IEEE Transactions on Signal Processing
1998
Corpus ID: 15988556
For pt.I see ibid., vol.46, no.7, p.1901 (1998). Hidden Markov modeling (HMM) techniques have been applied in the past few years…
Expand
Highly Cited
1988
Highly Cited
1988
Exact filters for the estimation of the number of transitions of finite-state continuous-time Markov processes
O. Zeitouni
,
A. Dembo
IEEE Transactions on Information Theory
1988
Corpus ID: 1360943
The problem of estimating the number of transitions of finite-state continuous-time Markov processes observed by a noisy sensor…
Expand
Highly Cited
1969
Highly Cited
1969
A Cycle Generation Algorithm for Finite Undirected Linear Graphs
N. Gibbs
JACM
1969
Corpus ID: 15903728
When the algorithms of J. T. Welch, Jr. were implemented it was discovered that they did not perform as described. The generation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE