Digital Signal Processing

Previous months:
2009 - 0908(1)
2010 - 1004(1)
2011 - 1103(1)
2012 - 1206(1) - 1208(69) - 1210(1) - 1211(7) - 1212(1)
2013 - 1301(7) - 1306(1) - 1308(1) - 1309(1) - 1310(8)
2014 - 1402(1) - 1403(4) - 1405(42) - 1406(1) - 1408(1) - 1409(1) - 1410(1) - 1411(1) - 1412(1)
2015 - 1502(2) - 1503(1) - 1504(14) - 1505(1) - 1506(2) - 1507(1) - 1508(1) - 1509(2) - 1510(15) - 1511(1)
2016 - 1601(10) - 1603(1) - 1604(2) - 1605(3) - 1607(2) - 1608(3) - 1609(2) - 1610(7) - 1611(1) - 1612(2)
2017 - 1701(3) - 1702(7) - 1703(4) - 1704(5) - 1705(7) - 1706(1) - 1707(2) - 1708(5) - 1709(12) - 1710(7) - 1711(1) - 1712(4)
2018 - 1801(2) - 1802(9) - 1803(13) - 1804(11) - 1805(11) - 1806(6) - 1807(8) - 1808(10) - 1809(2) - 1810(7) - 1811(5) - 1812(15)
2019 - 1901(9) - 1902(3) - 1903(6) - 1904(11) - 1905(14) - 1906(9) - 1907(7) - 1908(4) - 1909(6) - 1910(4) - 1911(1)
2020 - 2001(3) - 2002(4) - 2003(4) - 2004(12) - 2005(3) - 2006(1) - 2008(1) - 2009(4) - 2012(1)
2021 - 2102(3) - 2103(1) - 2106(3) - 2108(3) - 2109(1) - 2110(2) - 2111(1)
2022 - 2201(2) - 2202(1) - 2204(4) - 2205(1) - 2208(1) - 2210(1) - 2211(2)
2023 - 2305(1) - 2308(2) - 2309(2)
2024 - 2403(1)

Recent submissions

Any replacements are listed farther down

[523] viXra:2403.0043 [pdf] submitted on 2024-03-11 20:24:08

AB485: A Simplified Data Transfer Protocol for Process Control and Automation

Authors: Abdalrhman Alquaary, Hasan Bayhan
Comments: 11 Pages.

In industrial environments, achieving effective communication between electronic devices poses a multifaceted challenge that hinges on the seamless integration of both hardware and software protocols. This paper introduces AB485, a purpose-built data transfer protocol designed primarily for microcontroller-based systems, offering a streamlined solution to the complexities of software protocol implementation. We delve into AB485's design principles and features, underscoring its minimal hardware and software requirements. Notably, AB485 stands out for its ease of implementation, enabling engineers or system integrators to seamlessly integrate it into their projects. We also explore potential applications where AB485's efficiency and low overhead make substantial contributions to ensuring reliable data transmission. By presenting AB485, our research contributes to the field of data transfer protocols, offering an accessible and efficient solution for resource-constrained applications, while addressing the intricate interplay of hardware and software in data communication.
Category: Digital Signal Processing

[522] viXra:2309.0147 [pdf] submitted on 2023-09-29 11:51:49

The Dirac Comb and its Fourier Transform

Authors: Marcello Colozzo
Comments: 2 Pages.

We determine the Fourier Transform of the Dirac comb.
Category: Digital Signal Processing

[521] viXra:2309.0075 [pdf] submitted on 2023-09-16 19:55:42

Microcontrollers A Comprehensive Overview and Comparative Analysis of Diverse Types

Authors: Muhammad Samiullah, Muhammad Zohaib Irfan
Comments: 5 Pages.

This review paper provides a comprehensive overview of five popular microcontrollers: AVR, 8052, PIC, ESP32, and STM32. Each microcontroller is analyzed in terms of its architecture, peripherals, development environment, and application areas. A comparison is provided to highlight the key differences between these microcontrollers and assist engineers in selecting the most appropriate microcontroller for their specific needs. This paper serves as a valuable resource for beginners and experienced engineers alike, providing a comprehensive understanding of the different microcontrollers available and their respective applications.
Category: Digital Signal Processing

[520] viXra:2308.0149 [pdf] submitted on 2023-08-23 00:30:59

Improvement of Imperceptibility Evaluation Method and Security of Non-Blind Digital Image Watermarking Technique

Authors: Jon Tae Bom, Kim Kyong Jin, Ri Hyo Il, HyonChol Kim, Jang Un Ju
Comments: 6 Pages.

This paper presents the new digital image watermarking technique that has high imperceptibility and robustness against various geometric image attacks such as rotation attack and cropping attack using discrete wavelet transform (DWT) and singular value decomposition (SVD).In this paper, watermark logo is scrambled by 3D Arnold’s cat mapping and Chebyshev mapping, then security of watermark logo is realized.And control parameters of chaos mapping are encrypted bythe proposed quantum resistant encryption technique.Also in this paper, the suitable color image similarity evaluation method and the suitable embedding scaling factor using the relative vision characteristic of human are defined,computed and used in evaluation of imperceptibility.
Category: Digital Signal Processing

[519] viXra:2308.0104 [pdf] submitted on 2023-08-15 20:09:41

Establishment of a Security System Based on Arduino

Authors: GyongBong Ju, KyuSol Han, SongIl An, SongIl Han
Comments: 19 Pages.

Today, the security problem is emerging as a crucial problem for people, and research into solving this problem is now on its way worldwide. Everyone is aware of the urgency and seriousness of the security problem, and at this time, this problem has a giant impact on the overall social life. As science and technology develop, researches for solving security problems are advancing to a new stage, and their reliability is increasing day by day.In this study, a powerful quadruple security system was designed and realized by combining Keypad, RFID, Fingerprint, and Bluetooth (HC06) modules to thoroughly secure the security of medicines, jewelry, documents, and other valuables and doors.This system is based on the Arduino Mega 2560 microcontroller and is an intelligent system with a display function, voice function, SMS transmission function by GSM module, and alarm function. The system is an excellent system that can thoroughly guarantee the safety of security with low cost and low power consumption.
Category: Digital Signal Processing

[518] viXra:2305.0086 [pdf] submitted on 2023-05-11 00:47:25

Undocumented Feature or Potential Vulnerability?

Authors: Evgenii Litvinov
Comments: 7 Pages.

According Wikipedia, an undocumented feature is an unintended or undocumented hardware operation, for example an undocumented instruction, or software feature found in computer hardware and software that is considered beneficial or useful. Sometimes the documentation is omitted through oversight, but undocumented features are sometimes not intended for use by end users, but left available for use by the vendor for software support anddevelopment. Also, some unintended operation of hardware or software that ends up being of utility to users is simply a bug, flaw or quirk [1]. I believe that according to the definition of backdoor [2], and it refers to a special case of undocumented feature, because in both cases this information, which is known and used byvendors for software support and development. Manufacturers of advanced sensors, gate valves, pumps, video cameras and other lowlevel (abbreviated as LL) automation products offer "smart" versions of their products. All ofthese "smart" solutions involve variability, programmability and versatility in terms of productapplication, as well as cost and commissioning time reduction. Given that product variability, programmability and versatility are often achieved through the use of programmable elements, this imposes a great deal of responsibility on product manufacturers and requires vigilance on the part of consumers. This article will not discuss individual household products in the form of smart homes, smart TVs, the Internet of Things, etc., but anyone who reads the material outlined can imagine how unpredictable any item in their home can be if the manufacturer has not shown sufficient responsibility.
Category: Digital Signal Processing

[517] viXra:2212.0071 [pdf] submitted on 2022-12-09 00:09:42

WAMS - Winternitz Abstract Merkle Signature Scheme

Authors: Herman Schoenfeld
Comments: 10 Pages. Copyright (c) Sphere 10 Software Pty Ltd, originally written in 2020.

A quantum-resistant, many-time signature scheme combining Winternitz and Merkle-Signatureschemes is proposed. This construction is compatible with the Abstract Merkle Signature (AMS)Scheme 1 and thus is an AMS-algorithm called "WAMS".
Category: Digital Signal Processing

[516] viXra:2212.0019 [pdf] submitted on 2022-12-04 01:16:13

An Abstracted Merkle Signature Scheme (AMS)

Authors: Herman Schoenfeld
Comments: 9 Pages. Copyright (c) Sphere 10 Software Pty Ltd, MIT license, originally written in 2020.

An abstract post-quantum digital signature scheme is presented that parameterizes a one-timesignature scheme (OTS) for "many-time" use. This scheme permits a single key to sign a (great)many messages without security degradation by following the original Merkle-Signature Schemebut without a coupling to a specific OTS. Various features are include a reduction of signaturesizes, resistance to denial-of-service attacks and smaller public keys. This construction comprisesa bit-level specification for the Abstract Merkle Signature Scheme (AMSS).
Category: Digital Signal Processing

[515] viXra:2211.0125 [pdf] submitted on 2022-11-21 01:10:29

Radio Holographic Method for UAV Detection and Recognition

Authors: Valeriy Kizka
Comments: 6 Pages. 1 Figure.

The article proposes to use a radio holography for the detection and identification of unmanned aerial vehicles (UAVs).
Category: Digital Signal Processing

[514] viXra:2210.0010 [pdf] submitted on 2022-10-02 23:37:17

Subsurface Canal Seepage Detection Using Risat-1 Sar Data in Parts of Hanumangarh District, Rajasthan

Authors: Ram Lal Mehta, Touseef Ahmad, Arundhati Misra
Comments: 10 Pages. 38th Asian Conference on Remote Sensing (ACRS 2017)

Indira Gandhi Canal Project has enhanced considerable food production in the desert area of Rajasthan, it also brought problems such as waterlogging and secondary salinisation. Impounding of Ghaggar flood water in natural depression is the main cause of seepage. Villages are located at a lower altitude than the level of water stored in depressions, which creates a steep gradient and sand dunes being pervious, causing heavy seepage. The steady rise of the water table causes waterlogging conditions in surrounding areas. The unlined canals from the saddle dams and continuous application of surface irrigation at higher frequencies have further added to the problem. One of the significant advantages of SAR is penetration through dry soil and detecting subsurface geological and fluvial features. This paper presents the results of identifying subsurface canal seepage in the sand dune area of Hanumangarh district, Rajasthan using multi-date MRS RISAT-1 SAR data. Signatures of high subsurface soil moisture accumulated in the depressions below the sand dunes and along the canal was analysed and identified as seepage areas. Landsat-8 images and field soil moisture data were used as complementary information to find the surface and subsurface soil moisture, crop and vegetation condition of the area. Subsurface moisture was identified with higher sensitivity in the cross polarizations (HV) images due to high volume scattering caused by the buried moisture-bearing structures. The cross-polarization ratio (CPR) observed was higher in the case of subsurface soil moisture than surface moisture signature. Significant depletion in soil moisture of seepage areas was observed in the images acquired during the month of June 2015.
Category: Digital Signal Processing

[513] viXra:2208.0172 [pdf] submitted on 2022-08-31 03:47:52

A Novel 1D State Space for Efficient Music Rhythmic Analysis

Authors: Mojtaba Heydari, Matthew McCallum, Andreas Ehmann, Zhiyao Duan
Comments: 5 Pages. 2022 IEEE International Conference on Acoustics, Speech and Signal Processing

Inferring music time structures has a broad range of applications in music production, processing and analysis. Scholars have proposed various methods toanalyze different aspects of time structures, such as beat, downbeat, tempo and meter.Many state-of-the-art (SOFA) methods, however, are computationally expensive. This makes them inapplicable in real-world industrial settings where the scale of the music collections can be millions. This paper proposes a new state space and a semi-Markov model for music time structure analysis. The proposed approach turns the commonly used 2D state spaces into a 1D model through a jump-back reward strategy. It reduces the state spaces size drastically. We then utilize the proposed method for causal, joint beat, downbeat, tempo, and meter tracking, and compare it against several previous methods. The proposed method delivers similar performance with the SOFA joint causal models with a much smaller state space and a more than 30 times speedup.
Category: Digital Signal Processing

[512] viXra:2204.0110 [pdf] submitted on 2022-04-18 00:22:10

Ġasaq: Provably Secure Key Derivation

Authors: M. Rajululkahf
Comments: 6 Pages.

This paper proposes Ġasaq; a provably secure key derivation method that, when given access to a true random number generator (TRNG), allows communicating parties, that have a pre-shared secret password p, to agree on a secret key k that is indistinguishable from truly random numbers with a guaranteed entropy of min(H(p), |k|). Ġasaq's security guarantees hold even in a post-quantum world under Grover's algorithm, or even if it turns out that P = NP. Such strong security guarantees, that are similar to those of the one time pad (OTP), became attractive after the introduction of Băhēm; a similarly provably secure symmetric cipher that is strong enough to shift cipher's security bottleneck to the key derivation function. State of art key derivation functions such as the PBKDF, or even memory-hard variants such as Argon2, are not provably secure, but rather not fully broken yet. They do not guarantee against needlessly losing password entropies; that is, the output key could have an entropy lower than password's entropy, even if such entropy is less than key's bit length. In addition to assuming that P != NP, and, even then, getting their key space square-rooted under Grover's algorithm---none of which are limitations of Ġasaq. Using such key derivation functions, as the PBKDF or Argon2, is acceptable with conventional ciphers, such as ChaCha20 or AES, as they, too, suffer the same limitations, hence none of them are bottlenecks for the other. Similarly to how a glass door is not a security bottleneck for a glass house. However, a question is: why would a people secure their belongings in a glass made structure, to justify a glass door, when they can use a re-enforced steel structure at a similar cost? This is where Ġasaq comes to offer Băhēm the re-enforced steel door that matches its security.
Category: Digital Signal Processing

[511] viXra:2204.0094 [pdf] submitted on 2022-04-16 07:14:26

Clock Synchronization in Distributed Systems

Authors: Amey Thakur, Mega Satish
Comments: 6 Pages, 7 figures, Volume 9, Issue III, International Research Journal of Engineering and Technology (IRJET), 2022.

Clock discrepancies are troublesome in distributed systems and pose major difficulties. To avoid mistakes, the clocks of separate CPUs must be synced. This is to ensure that communication and resource sharing are as efficient as possible. As a result, the clocks must be constantly monitored and adjusted. Otherwise, the clocks drift apart. Clock skew causes a disparity in the time values of two clocks. Both of these issues must be solved in order to make effective use of distributed system characteristics. In this study, we briefly explored the features of distributed systems and its algorithms.
Category: Digital Signal Processing

[510] viXra:2204.0084 [pdf] submitted on 2022-04-15 08:57:55

My Definition and Dram Structure

Authors: Yuji Masuda
Comments: 2 Pages.

The purpose of this chapter is to illustrate in figures the similarities between My Definition and the basic DRAM structure, as well as expectations for its application.
Category: Digital Signal Processing

[509] viXra:2204.0064 [pdf] submitted on 2022-04-13 20:44:34

Băhēm: A Provably Secure Symmetric Cipher

Authors: M. Rajululkahf
Comments: 4 Pages.

This paper proposes Băhēm; a symmetric cipher that, when used with a pre-shared secret key k, no cryptanalysis can degrade its security below H(k) bits of entropy, even under Grover's algorithm or even if it turned out that P = NP. Băhēm's security is very similar to that of the one-time pad (OTP), except that it does not require the communicating parties the inconvenient constraint of generating a large random pad in advance of their communication. Instead, Băhēm allows the parties to agree on a small pre-shared secret key, such as |k| = 128 bits, and then generate their random pads in the future as they go. For any operation, be it encryption or decryption, Băhēm performs only 4 exclusive-or operations (XORs) per cleartext bit including its 2 overhead bits. If it takes a CPU 1 cycle to perform an XOR between a pair of 64 bit variables, then a Băhēm operation takes 4 / 8 = 0.5 cycles per byte. Further, all Băhēm's operations are independent, therefore a system with n many CPU cores can perform 0.5 / n cpu cycles per byte per wall-clock time. While Băhēm has an overhead of 2 extra bits per every encrypted cleartext bit, its early single-threaded prototype implementation achieves a faster /decryption/ than OpenSSL's ChaCha20's, despite the fact that Băhēm's ciphertext is 3 times larger than ChaCha20's. This support that the 2 bit overhead is practically negligible for most applications. Băhēm's early prototype has a slower /encryption/ time than OpenSSL's ChaCha20 due to its use of a true random number generator (TRNG). However, this can be trivially optimised by gathering the true random bits in advance, so Băhēm gets the entropy conveniently when it runs. Aside from Băhēm's usage as a provably-secure general-purpose symmetric cipher, it can also be used, in some applications such as password verification, to enhance existing hashing functions to become provably one-way, by using Băhēm to encrypt a predefined string using the hash as the key. A password is then verified if its hash decrypts the Băhēm ciphertext to retrieve the predefined string.
Category: Digital Signal Processing

[508] viXra:2202.0123 [pdf] submitted on 2022-02-19 21:04:47

Techniques De Réduction Du PAPR (PAPR Reduction Techniques)

Authors: Wendyida Kabore Kabore
Comments: 73 Pages. [Corrections made by viXra Admin to conform with the requirements on the Submission Form]

Power amplification efficiency enhancement is a critical issue for wireless communication applications. The amplification of signals that have a high dynamic range consumes a lot of energy. Amplifying signals with a constant envelope is a possible solution to get a maximum performance of the amplifier. However, the signals that are currently available in several systems, are multi-carrier signals which are very attractive but have a high PAPR in principle. During this internship, we studied a multi-carrier waveform (to enjoy all the benefits inherent in it) with a low PAPR. This is about to use PAPR reduction techniques like "adding signal" methods, coupled with a new definition of the multicarrier signal. The clipping for example, has been modeled as an adding signal technique, but the addition of the clipping signal occurs on certain free subcarriers that are not used to transmit data. Not all the clipping signal frequencies are used. The major problem is that the subcarriers on which the clipping signal can be added are reduced in number. So to add the clipping signal more efficiently we need to have more frequency space. The key idea here is to perform the duobinary coding in each of the OFDM subcarriers. The duobinary coding reduces the spectral occupancy by half. Thus, we can use the vacant spectrum to add the clipping signal orthogonaly to the data signal. Then comes the study of the performances of this new waveform in terms of gain in PAPR, complexity (receiving process) and ACPR. This study confirm the efficiency of the proposed technique.
Category: Digital Signal Processing

[507] viXra:2201.0141 [pdf] submitted on 2022-01-20 18:41:26

A Blind Source Separation Technique for Document Restoration Based on Edge Estimation

Authors: Antonio Boccuto, Ivan Gerace, Valentina Giorgetti, Gabriele Valenti
Comments: 86 Pages.

In this paper we study a Blind Source Separation (BSS) problem, and in particular we deal with document restoration. We consider the classical linear model. To this aim, we analyze the derivatives of the images instead of the intensity levels. Thus, we can establish a non-overlapping constraints on document sources. Moreover, we impose that the rows of the mixture matrices of the sources have sum equal to 1, in order to keep equal the lightnesses of the estimated sources and of the data. Here we give a technique which uses the symmetric factorization, whose goodness is tested by the experimental results.
Category: Digital Signal Processing

[506] viXra:2201.0050 [pdf] submitted on 2022-01-10 14:13:32

Blind Source Separation in Document Restoration: an Interference Level Estimation

Authors: Antonio Boccuto, Ivan Gerace, Valentina Giorgetti
Comments: 21 Pages.

We deal with the problem of blind separation of the components, in particular for documents corrupted by bleed-through and show-through. So, we analyze a regularization technique, which estimates the original sources, the interference levels and the blur operators. We treat the estimate of the interference levels, given the original sources and the blur operators. In particular, we investigate several GNC-type algorithms for minimizing the energy function. In the experimental results, we find which algorithm gives more precise estimates of the interference levels.
Category: Digital Signal Processing

[505] viXra:2111.0040 [pdf] submitted on 2021-11-07 22:45:54

Tokenize the Food : A Permissionless NFT Information System

Authors: Jules Repusseau
Comments: 12 Pages. [Corrections made by viXra Admin]

Collecting and utilizing food data across the life cycle is difficult and expensive because of their movement across the multiple stakeholders on the agrifood supply chain. Interestingly, product centric approaches that present effective solutions to analyze product lifecycle have been problematic to deploy across multiple industries. Blockchain has been adopted in the food system and traceability and brings many advantages for provenance, compliance, authenticity and quality. However most of the applications are permissioned and mostly at the benefits of a private owner or consortium. Accumulated data therefore cannot be reused by all stakeholders and no common data model can be built. This lack of cooperation has an impact on farmers, where data governance can be a direct source of income and social benefits, and an impact on researchers that cannot reuse and improve food security models, study sustainability or carbon emission without relying on private companies. Food security is a public good and our proposal introduces a permissionless food product centered approach based on NFT to protect public information and farmers stability.
Category: Digital Signal Processing

[504] viXra:2110.0151 [pdf] submitted on 2021-10-25 08:48:24

Foundations for Strip Adjustment of Airborne Laserscanning Data with Conformal Geometric Algebra

Authors: Eckhard Hitzer, Werner Benger, Manfred Niederwieser, Ramona Baran, Frank Steinbacher
Comments: 34 Pages. Accepted for publication in Advances in Applied Clifford Algebras, Oct. 2021, 1 table, 1 figure.

Typically, airborne laserscanning includes a laser mounted on an airplane or drone (its pulsed beam direction can scan in flight direction and perpendicular to it) an intertial positioning system of gyroscopes, and a global navigation satellite system. The data, relative orientation and relative distance of these three systems are combined in computing strips of ground surface point locations in an earth fixed coordinate system. Finally, all laserscanning strips are combined via iterative closes point methods to an interactive three-dimensional terrain map. In this work we describe the mathematical framework for how to use the iterative closest point method for the adjustment of the airborne laserscanning data strips in the framework of conformal geometric algebra.
Category: Digital Signal Processing

[503] viXra:2110.0094 [pdf] submitted on 2021-10-18 21:36:07

Simple and Effective Algorithm for Constant State Detection in Time Series

Authors: Andrei Keino
Comments: 4 Pages. GPL v. 3.0 License

The article introduces very simple and quite effective algorithm for constant state detection in time series. The algorithm, based on sliding window of variable length, searches a sections of time series with some given minimal length, that have all the values in some given range. It is shown that the computational complexity of aforementioned algorithm is O(N log N); where N is the length of time series.
Category: Digital Signal Processing

[502] viXra:2109.0172 [pdf] submitted on 2021-09-23 04:01:04

The Evolution of Wi-Fi Technology in Human Motion Recognition: Concepts, Techniques and Future Works

Authors: Mahmoud Amin, Noha Mohamed
Comments: 13 Pages.

Human motion recognition is an important topic in computer vision as well as security. It is used in scientific research, surveillance cameras industry and robotics technology as well. The human interaction with the objects creates a complex stance. Multiple artefacts such as clutter, occlusions, and backdrop diversity contribute to the complexity of this technology. Wi-Fi signals with the usage of their features could help solve some of these issues, with the help of other wearable sensors, such as: RGB-D camera, IR sensor (thermal camera), inertial sensor etc. This paper reviews various approaches for Wi-Fi human motion recognition systems, their analytical methodologies, challenges and proposed techniques along with the aspects to this paper: (a) applications; (b) single and multi-modality sensing; (c) Wi-Fi-based techniques; d) challenges and future works. More research related to Wi-Fi human related activity recognition can be encouraged and improved.
Category: Digital Signal Processing

[501] viXra:2108.0132 [pdf] submitted on 2021-08-24 09:51:43

Gravitational Quantum Bit

Authors: Fran De Aquino
Comments: 3 Pages.

The Quantum Computers use qubits (or qbits), the quanta bits, which can assume values 0 or 1, or a superposition of both. In this work, we propose a new type of quantum bit, the Gravitational Quantum Bit or Gqbit, which can be used as an information unit. The concept of the Gqbit is based on the theory of the Gravitational Electromotive Force (Gemf) [1], which shows that, when an electron absorbs a quantum of energy sufficient strong, the gravitational force acting upon it (its weight) changes of direction. The weight of the electron can assume two fundamental statuses. For up, (gravitational force in opposite direction to the gravity g )and, for down (gravitational force in the same direction of g ). Conventionally, we can then assume that for up, the weight of the electron represents the number 0, and that for down, it represents the number 1, similarly to the spin of the electron, which can be interpreted as if the electron rotates in one direction or the other - in this case, rotation in one direction would represent 0 and, in the other, it would represent 1.
Category: Digital Signal Processing

[500] viXra:2108.0010 [pdf] submitted on 2021-08-03 22:00:24

Area Efficient Decoder and Simulation Study Using Quantum Dot Cellular Automata

Authors: Aarthi Nadarajan
Comments: 3 Pages.

The progress and dominance of the microelectronics industry has been based on scaling and maintaining functionality at ever smaller scales. The resulting changes in size and package density have limitations due to the physical laws that govern the transistor paradigm. Quantum dot cellular automata (QCA) offer a solution to accomplish device functionalities at nanometer scales. This paper details QCA implementation with simulation results which intuitively prove they are much smaller than the same circuits in standard CMOS technology. The proposed area efficient decoder in this paper is optimal in terms of usage of number of quantum dot cells with a simpler clocking scheme and good performance. The field of quantum dots is relatively at its infancy with significant opportunities for future growth and real time implementations.
Category: Digital Signal Processing

[499] viXra:2108.0001 [pdf] submitted on 2021-08-01 18:49:37

A Machine Prototype to Assist Differently Abled People

Authors: Shiv Kokroo
Comments: 2 Pages. Creative Commons license.

Here, I describe a machine prototype that allows differently-abled people to walk again. The unique feature of this machine is that it can be mass-produced for a very reasonable cost and the hardware/software is mostly open source.
Category: Digital Signal Processing

[498] viXra:2106.0123 [pdf] submitted on 2021-06-22 10:40:18

Using Spice to Simulate Gain Dynamics in Doped-fiber Amplifier Chains

Authors: Alberto Bononi, Lorenzo Barbieri, Leslie Ann Rusch
Comments: 2 Pages. This abstract was made public at the optical fiber conference 1998, workshop 204, monday Feb 23, 1998, but not included in the proceedings.

It has recently been shown that gain dynamics in doped-fiber amplifiers can be simulated by an equivalent electric circuit [1]. Here we include ASE-induced self- saturation in the model, and discuss its implementation using SPICE.
Category: Digital Signal Processing

[497] viXra:2106.0018 [pdf] submitted on 2021-06-04 01:06:15

On Standardrization of Addresses

Authors: Arjun Dahal
Comments: 3 Pages.

On progressing world, where pigeons are no longer used to carry messages like as in fairy tales, and historical tales, need of standarization of address was felt, for physical and internet means. In this paper, author has attempted to describe address in standard form, allowing to be cited, as per available databases, uniqueness, and accuracy.
Category: Digital Signal Processing

[496] viXra:2106.0006 [pdf] submitted on 2021-06-01 21:31:50

Development of a Quadruple Security System Combining Keypad, Rfid, Fingerprint, and Bluetooth Modules

Authors: Gyongbong Ju, Cholhyon Sim, Choljin Kim, Yongmin Kim
Comments: 16 Pages.

Today, the security problem is emerging as a crucial problem for people, and research into solving this problem is now on its way worldwide. Everyone is aware of the urgency and seriousness of the security problem, and at this time, this problem has a giant impact on the overall social life. As science and technology develop, researches for solving security problems are advancing to a new stage, and their reliability is increasing day by day. In this study, a powerful quadruple security system was designed and realized by combining Keypad, RFID, Fingerprint, and Bluetooth (HC06) modules to thoroughly secure the security of medicines, jewelry, documents, and other valuables and doors. This system is based on the Arduino Mega 2560 microcontroller and is an intelligent system with a display function, voice function, SMS transmission function by GSM module, and alarm function. The system is an excellent system that can thoroughly guarantee the safety of security with low cost and low power consumption.
Category: Digital Signal Processing

[495] viXra:2103.0094 [pdf] submitted on 2021-03-15 20:39:03

Rotational Motion Blur Invariants Based on Gaussian Hermit Moment

Authors: Guo Rui, Jia Li, Hao Hongxiang, Mo Hanlin, Li Hua
Comments: 13 Pages. [Corrections are made by viXra Admin to comply with the rules of viXra.org]

How to recognize the target from blurred image is one of the fundamental problems in computer vision and pattern recognition. Image blurring caused by abnormal energy accumulation during exposure time because of relative rotational motion between imaging system and objects. Our work is different from most of others which need “deblurring”. We try to find the invariant features between original image and blurred image based on the mathematical model of blurring and the theory of moment invariants, instead of restoring the blurred image. Method In this study, based on degraded model of rotation motion blur and Gaussian Hermit moment, we demonstrated how the rotation motion blur Gaussian Hermit moment been built and proved the existing of low-rank rotation motion blur Gaussian Hermit moment invariants. Correspondingly, rotational motion blur invariants based on Gaussian Hermit moment is built. We filtrated 5 Gaussian Hermit moment invariants from exiting rotation geometry moment invariants which had been extended to Gaussian Hermit moment invariants to construct a highly stable 5-dimensional feature vector and named it RMB_GHMI-5, and we verified that RMB_GHMI-5 had great properties of invariability and distinguishability through experiments. Finally, we introduced RMB_GHMI-5 to the field of image retrieval. Result In invariance experiment, We validate the properties of invariance of the proposed feature vector on the dataset USC-SIPI. Tow set of 18 composite blurred image and been made to test RMB_GHMI-5. The result shows the feature distance between original image and composited blurred image are extremely tiny which means RMB_GHMI-5 has great properties of invariance. In addition to the image retrieval experiments, we introduce two image database including Flavia and Butterfly for original image. Composited image which are blurred by different degree of rotation、rotational motion and Gaussian noise or Salt-pepper noise have been used to validate the invariability and distinguishability of RMB_GHMI-5. Compared with 4 state-of-the-art saliency approaches, for leaf image degraded by rotation, rotational motion and Gaussian noise, at 80% recall rate, the recognition accuracy of RMB_GHMI-5 is 25.89% higher than others. For leaf image degraded by rotation, rotational motion and Salt-pepper noise, the recognition accuracy of RMB_GHMI-5 is 39.95% higher than others. For butterfly image degraded by rotation, rotational motion and Gaussian noise, at 80% recall rate, the recognition accuracy of RMB_GHMI-5 is 7.18% higher than others. For leaf image degraded by rotation, rotational motion and Salt-pepper noise, the recognition accuracy of RMB_GHMI-5 is 3.04% higher than others. Conclusion In this study, we proposed a highly stable 5-dimensional feature vector RMB_GHMI-5, and we verified that RMB_GHMI-5 had great properties of invariability and distinguishability through experiments. The experiment results show that RMB_GHMI-5 outperforms several state-of-the-art saliency approaches and has stronger practical application value.
Category: Digital Signal Processing

[494] viXra:2102.0057 [pdf] submitted on 2021-02-10 20:30:48

Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communication System

Authors: Chathuranga M. Wijerathna Basnayaka, Dushantha Nalin K. Jayakody, Tharindu D. Ponnimbaduge Perera
Comments: 6 Pages.

Age of Information (AoI) measures the freshness of data in mission critical Internet-of-Things (IoT) applications i.e., industrial internet, intelligent transportation systems etc. In this paper, a new system model is proposed to estimate the average AoI (AAoI) in an ultra-reliable low latency communication (URLLC) enabled wireless communication system with decodeand-forward relay scheme over the quasi-static Rayleigh block fading channels. Short packet communication scheme is used to meet both reliability and latency requirements of the proposed wireless network. By resorting finite block length information theory, queuing theory and stochastic processes, a closed-form expression for AAoI is obtained. Finally, the impact of the system parameters, such as update generation rate, block length and block length allocation factor on the AAoI are investigated. All results are validated by the numerical results.
Category: Digital Signal Processing

[493] viXra:2102.0037 [pdf] submitted on 2021-02-06 18:43:52

IPTV Improvement Approach over LTE-WLAN Heterogeneous Networks

Authors: Mohamed Matoui, Noureddine Moumkine, Abdellah Adib
Comments: 19 Pages. [Corrections are made by viXra Admin to comply with the rules of viXra.org]

IPTV (Internet Protocol Television) includes several video components. The IMS (IP Multimedia Subsystem) cannot differentiate between them what causes their treatment similarly. These sub-components must have different priorities because they have distinct QoS constraints. In this paper, we suggest the implementation of IPTV in a heterogeneous network that improved QoS by providing the capability to prioritize the sub traffic according to the system administrator policy. A new IPv6 flow label field definition was proposed that is ready for standardization. OPNET Modeler software is used to design our approached architecture. The results show that IPTV users receive different amounts of video data based on the stream's priority.
Category: Digital Signal Processing

[492] viXra:2102.0028 [pdf] submitted on 2021-02-05 21:57:05

Hridai: a Tale of Two Categories of Ecgs

Authors: Priya Ranjan, Kumar Dron Shrivastav, Satya Vadlamani, Rajiv Janardhanan
Comments: 21 Pages. Proc. SIRS-2020.

This work presents a geometric study of computational disease tagging of ECGs problems. Using ideas like Earthmover’s distance (EMD) and Euclidean distance, it clusters category 1 and category −1 ECGs in two clusters, computes their average and then predicts the category of 100 test ECGs, if they belong to category 1 or category −1. We report 80% success rate using Euclidean distance at the cost of intense computation investment and 69% success using EMD. We suggest further ways to augment and enhance this automated classification scheme using bio-markers like Troponin isoforms, CKMB, BNP. Future direc- tions include study of larger sets of ECGs from diverse populations and collected from a heterogeneous mix of patients with different CVD conditions. Further we advocate the robustness of this programmatic approach as compared to deep learning kind of schemes which are amenable to dynamic instabilities. This work is a part of our ongoing framework Heart Regulated Intelligent Decision Assisted Information (HRIDAI) system.
Category: Digital Signal Processing

[491] viXra:2012.0127 [pdf] submitted on 2020-12-16 21:36:55

Ten-bit Character Encoding Based in Extended ASCII

Authors: Juan Elias Millas Vera
Comments: 17 Pages.

Extended ASCII is a character encoding which uses 8-bit for every single symbol. My character encoding uses 10-bit for symbol, and it is more efficient in the transmission of the data in short and long texts because its properties.
Category: Digital Signal Processing

[490] viXra:2009.0111 [pdf] submitted on 2020-09-15 09:29:35

An Injection Locked Oszillator as Adaptive Filter

Authors: Herbert Weidner
Comments: 3 Pages.

An Injection Locked Synchronous Oscillator is a narrowband digital filter that tracks its frequency to a variable frequency signal. This allows the detection of weak signals of variable frequency despite a strong noise background. The signal is processed in the time domain with negligible phase shift. The calculation effort is much lower than with comparable filter types.
Category: Digital Signal Processing

[489] viXra:2009.0110 [pdf] submitted on 2020-09-15 09:30:49

Ein Injection Locked Oszillator Als Adaptives Filter

Authors: Herbert Weidner
Comments: 3 Pages.

Ein Injection Locked Synchronous Oscillator ist ein schmalbandiges digitales Filter, das seine Frequenz einem frequenzvariablen Signal nachführt. Damit lassen sich schwache Signale veränderlicher Frequenz trotz starkem Rauschhintergrund nachweisen. Das Signal wird im Zeit­bereich bei vernachlässigbarer Phasenverschiebung verarbeitet. Der Berechnungsaufwand ist wesentlich geringer als bei vergleichbaren Filtertypen.
Category: Digital Signal Processing

[488] viXra:2009.0084 [pdf] submitted on 2020-09-12 11:17:11

Detektion Schwacher Signale Mit Einem Injection Locked Oszillator

Authors: Herbert Weidner
Comments: 4 Pages.

Ein Software-Ringoszillator mit einem Fangbereich von über ± 5% kann injizierte Signale mit SNR = -20 dB regenerieren und noch schwächere Signale mit SNR = -27 dB identifizieren. Injection-locking entspricht einer PLL erster Ordnung und ist immer stabil. Deshalb sind keine Berechnungen oder Abgleichmaßnahmen notwendig. Ein ILO ist sehr einfach zu implementieren: kein Phasendetektor, Varaktor oder Schleifenfilter.
Category: Digital Signal Processing

[487] viXra:2009.0083 [pdf] submitted on 2020-09-12 11:19:00

Detection of Weak Signals with an Injection Locked Oscillator

Authors: Herbert Weidner
Comments: 3 Pages.

A software ring oscillator with a capture range of more than ± 5% can regenerate injected signals with SNR = -20 dB and identify even weaker signals with SNR = -27 dB. Injection Locked Synchronous Oscillators correspond to a first-order PLL and are always stable. Therefore no calculations or adjustments are necessary. An ILO is very easy to implement: no phase detector, no varactor, no loop filter.
Category: Digital Signal Processing

[486] viXra:2008.0085 [pdf] submitted on 2020-08-12 12:36:18

Smart Systems for Road Traffic Congestion Detection and Control

Authors: Tannistha Pal, Farhan Hai Khan, Uttaran Chaudhuri, Tiyasa Kundu
Comments: 7 Pages.

By the dusk of the 21st century, both developed & developing countries will witness a tremendous rise in automobile sales. Everybody will want to travel as fast as possible and reduce traffic waiting time. The objective of this research is to provide efficient algorithms and sound scientific principles for accurate traffic density estimations even in the busiest traffic hours. The methodologies discussed in this paper include the use of Infrared, Ultrasonic, Pressure & Piezoelectric sensors, and also Inductive loop detectors. These methodologies are further used to control real-time traffic lighting systems based on threshold-based decision algorithms. Further, Digital Image Processing techniques are analyzed which involve camera installation for congestion assessment and traffic control. Therefore, proper application of these methodologies will lead to early traffic detection with immediate disaster preventive measures that will ensure better passage for vehicles.
Category: Digital Signal Processing

[485] viXra:2007.0194 [pdf] submitted on 2020-07-24 02:18:17

W-OTS# - Shorter and Faster Winternitz Signatures

Authors: Herman Schoenfeld
Comments: 3 Pages.

A very simple modification to the standard W-OTS scheme is presented called W-OTS# that achieves a security enhancement similar to W-OTS+ but without the overhead of hashing a randomization vector in every round of the chaining function. The idea proffered by W-OTS# is to simply thwart Birthday-attacks altogether by signing an HMAC of the message-digest (keyed with cryptographically random salt) rather than the message-digest itself. The signer thwarts a birthday attack by virtue of requiring that the attacker guess the salt bits in addition to the message-digest bits during the collision scanning process. By choosing a salt length matching the message-digest length, the security of W-OTS# reduces to that of the cryptographic hash function. This essentially doubles the security level of W-OTS and facilitates the use of shorter hash functions which provide shorter and faster signatures for same security. For example, W-OTS# 128-bit signatures have commensurate security to standard W-OTS 256-bit signatures yet are roughly half the size and twice as fast. It is proposed that Blake2b-128 and Winternitz parameter w=4 (i.e. base-16 digits) be adopted as the default parameter set for the W-OTS# scheme.
Category: Digital Signal Processing

[484] viXra:2006.0030 [pdf] submitted on 2020-06-03 18:21:14

Online Shopping with Fraud Detection

Authors: Dean Iangrai
Comments: 3 Pages.

Online exchanges have picked up ubiquity in the ongoing years with an effect of expanding fraud cases related with it. Fraud increments as new advances and shortcomings are found, bringing about huge misfortunes each year. Credit card fraud occasions occur as often as possible and afterward bring about colossal money related misfortunes. In this manner, banks and monetary establishments offer Visa fraud identification applications much worth and request. False exchanges can happen in different manners and can be placed into various classes. This paper centres on fraud events in certifiable exchanges.
Category: Digital Signal Processing

[483] viXra:2005.0126 [pdf] submitted on 2020-05-10 19:32:55

Detecting a Valve Spring Failure of a Piston Compressor with the Help of the Vibration Monitoring.

Authors: Andrei Keino
Comments: 7 Pages.

The article presents problems related to vibration diagnostics in reciprocating compressors. This paper presents the evaluation of several techniques of the digital signal processing, such as the spectrum calculation with the Discrete Fourier Transform (DFT), Continuous Wavelet Transform (CWT), Segmented Analysis for detection the spring failure in reciprocating compressor valve with the help of the vibration monitoring. The experimental investigation to collect the data from the compressor with both the faultless valve and the valve with spring failure was conducted. Three 112DV1 vibration acceleration probes manufactured by TIK were mounted on the cylinder of the compressor. The keyphasor probe was mounted on the compressor’s flywheel. The signal of the vibration acceleration probe mounted on the top of the cylinder was used for the Condition Monitoring and Fault Detection of the valve. The TIK-RVM system of monitoring and data acquisition was used for gathering the signal samples from the probes. The sampling frequency was 30193.5 Hz, signal length was 65535 samples. To imitate the spring fault, the exhaust valve spring was replaced by the shortened one with the same stiffness. As it can be seen from the signal processing results in the article, the techniques used are showing quite different results for the cases of the normal valve spring and the short one. It seems what for this type of the compressor and valve, the valve spring failure can be quite reliably detected with the help of the vibration monitoring. To see if this is a case for other compressor types and other valve types, the additional experiments are needed.
Category: Digital Signal Processing

[482] viXra:2005.0089 [pdf] submitted on 2020-05-07 04:13:58

The Theoretical Average Encoding Length for Micro-States in Boltzmann System Based on Deng Entropy

Authors: Jixiang Deng, Yong Deng
Comments: 14 Pages.

Because of the good performance of handling uncertainty, Dempster-Shafer evidence theory (evidence theory) has been widely used. Recently, a novel entropy, named as Deng entropy, is proposed in evidence theory, which is a generalization of Shannon entropy. Deng entropy and the maximum Deng entropy have been applied in many fields due to their efficiency and reliability of measuring uncertainty. However, the maximum Deng entropy lacks a proper explanation in physics, which limits its further application. Thus, in this paper, with respect to thermodynamics and Shannon's source coding theorem, the theoretical average encoding length for micro-states in Boltzmann system based on Deng entropy is proposed, which is a possible physical interpretation of the maximum Deng entropy.
Category: Digital Signal Processing

[481] viXra:2005.0017 [pdf] submitted on 2020-05-01 15:13:50

The Internet of Things: Security Challenges and Solutions

Authors: Haseeb Farooq
Comments: 4 Pages.

The Internet of Things (IoT) is the notion of converting everyday objects into smart objects. The purpose of this is to connect the rigid objects we use in our everyday lives to one another to create smart homes, smart cities and smart environments. Objects such as clocks, thermostats, speakers and almost every other electrical object are being equipped with the ability to connect to the internet. This in turn converts the object into a smart object which becomes a part of the internet of things family.
Category: Digital Signal Processing

[480] viXra:2004.0697 [pdf] submitted on 2020-04-30 12:22:32

E-Authentication System with QR code & OTP

Authors: Afrin Hussain, M. N. Nachappa
Comments: 3 Pages.

As a fast web framework is being created and individuals are informationized, even the budgetary undertakings are occupied with web field. In PC organizing, hacking is any specialized exertion to control the ordinary conduct of system associations and associated frameworks. The current web banking framework was presented to the threat of hacking and its result which couldn't be overlooked. As of late, the individual data has been spilled by a high-degree technique, for example, Phishing or Pharming past grabbing a client's ID and Password. Along these lines, a protected client affirmation framework gets considerably more fundamental and significant. Right now, propose another Online Banking Authentication framework. This confirmation framework utilized Mobile OTP with the mix of QR-code which is a variation of the 2D standardized identification
Category: Digital Signal Processing

[479] viXra:2004.0655 [pdf] submitted on 2020-04-28 03:59:14

Low-Power Data Storage

Authors: George Rajna
Comments: 91 Pages.

"Currently, we require two electrode pairs to achieve full control of MTJs, but the operation is very complicated. We are now looking to simplify the operation by using only one pair of electrodes," says Chen. [56] "The atom-scale devices we are developing create a new basis for computer electronics that will be able to run at least 100 times faster or operate at the same speed as today but using 100 times less energy," continued Wolkow. [55] Significant technical and financial issues remain towards building a large, fault-tolerant quantum computer and one is unlikely to be built within the coming decade. [54] Chemists at Friedrich Schiller University in Jena (Germany) have now synthesised a molecule that can perform the function of a computing unit in a quantum computer. [53] The research team developed the first optical microchip to generate, manipulate and detect a particular state of light called squeezed vacuum, which is essential for HYPERLINK "https://phys.org/tags/quantum/" quantum computation. [52] Australian scientists have investigated new directions to scale up qubits-utilising the spin-orbit coupling of atom qubits-adding a new suite of tools to the armory. [51] A team of international researchers led by engineers from the National University of Singapore (NUS) have invented a new magnetic device to manipulate digital information 20 times more efficiently and with 10 times more stability than commercial spintronic digital memories. [50] Working in the lab of Mikhail Lukin, the George Vasmer Leverett Professor of Physics and co-director of the Quantum Science and Engineering Initiative, Evans is lead author of a study, described in the journal Science, that demonstrates a method for engineering an interaction between two qubits using photons. [49] Researchers with the Department of Energy's Oak Ridge National Laboratory have demonstrated a new level of control over photons encoded with quantum information. [48] Researchers from Intel Corp. and the University of California, Berkeley, are looking beyond current transistor technology and preparing the way for a new type of memory and logic circuit that could someday be in every computer on the planet. [47]
Category: Digital Signal Processing

[478] viXra:2004.0578 [pdf] submitted on 2020-04-24 14:05:05

How to Read Faces Without Looking at Them

Authors: Suyash Shandilya, Waris Quamer
Comments: 6 Pages.

Face reading is the most intuitive aspect of emotion recognition. Unfortunately, digital analysis offacial expression requires digitally recording personal faces. As emotional analysis is particularlyrequired in more poised scenario, capturing faces becomes a gross violation of privacy. In thispaper, we use the concept ofcompressive analysisintroduced in [1] to conceptualise a systemwhich compressively acquires faces in order to ascertain unusable reconstruction, while allowing foracceptable (and adjustable) accuracy in inference.
Category: Digital Signal Processing

[477] viXra:2004.0562 [pdf] submitted on 2020-04-24 09:45:27

Terahertz Data Networks

Authors: George Rajna
Comments: 37 Pages.

In a paper published in Nature Communications, researchers from Brown and Rice University showed that a device known as a leaky waveguide can be used for link discovery at terahertz frequencies. [25] Following three years of extensive research, Hebrew University of Jerusalem (HU) physicist Dr. Uriel Levy and his team have created technology that will enable computers and all optic communication devices to run 100 times faster through terahertz microchips. [24] When the energy efficiency of electronics poses a challenge, magnetic materials may have a solution. [23]
Category: Digital Signal Processing

[476] viXra:2004.0532 [pdf] submitted on 2020-04-22 01:34:26

Organic Memory Devices

Authors: George Rajna
Comments: 62 Pages.

"Now we are making individual devices in the laboratory. We need to make circuits for large-scale functional implementation of these devices." [40] Organic electronics have the potential to revolutionize technology with their high cost-efficiency and versatility compared with more commonly used inorganic electronics. [39] By using an infrared laser beam to induce a phenomenon known as an electron avalanche breakdown near the material, the new technique is able to detect shielded material from a distance. [38] The light scattered by plasmonic nanoparticles is useful, but some of it gets lost at the surface and scientists are now starting to figure out why. [37] In a new review, researchers have described the fundamental physics that causes magnetoelectricity from a theoretical viewpoint. [36] Physicists at EPFL propose a new "quantum simulator": a laser-based device that can be used to study a wide range of quantum systems. [35] The DESY accelerator facility in Hamburg, Germany, goes on for miles to host a particle making kilometer-long laps at almost the speed of light. Now researchers have shrunk such a facility to the size of a computer chip. [34] University of Michigan physicists have led the development of a device the size of a match head that can bend light inside a crystal to generate synchrotron radiation in a lab. [33] A new advance by researchers at MIT could make it possible to produce tiny spectrometers that are just as accurate and powerful but could be mass produced using standard chip-making processes. [32] Scientists from the Department of Energy's SLAC National Accelerator Laboratory and the Massachusetts Institute of Technology have demonstrated a surprisingly simple way of flipping a material from one state into another, and then back again, with single flashes of laser light. [31] Materials scientists at Duke University computationally predicted the electrical and optical properties of semiconductors made from extended organic molecules sandwiched by inorganic structures. [30]
Category: Digital Signal Processing

[475] viXra:2004.0380 [pdf] submitted on 2020-04-15 13:00:29

Next-Generation Skyrmions Data Storage

Authors: George Rajna
Comments: 95 Pages.

An international team of researchers, led by physicist Paul Ching-Wu Chu, founding director of the Texas Center for Superconductivity at the University of Houston, is reporting a new compound capable of maintaining its skyrmion properties at room temperature through the use of high pressure. [58] Prospective digital data storage devices predominantly rely on novel fundamental magnetic phenomena. [57] Scientists at Linköping University have shown how a quantum computer really works and have managed to simulate quantum computer properties in a classical computer. [56]
Category: Digital Signal Processing

[474] viXra:2004.0291 [pdf] submitted on 2020-04-12 00:42:50

Data Centers on Moon

Authors: A. Akil
Comments: 12 Pages.

Data is a crucial part of the present world; users save the data either in their physical devices or on the cloud. The cloud data will be stored in the data centers and these data centers are present in the unknown location and thus, the users believe that the data present in the data canter is secured. The location of the data centers is usually not revealed so that the location is unidentified, and the data will be safe. The supercomputers are used in this data center. The data center occupies a large space to store all the servers and other data storage capacities, this will emit a large amount of heat and which uses more effects of the environment and humans also. What if the data centers are present on the lunar surface or on the process of which the space on Earth and the heat are reduced? My paper is about building the data centers on the moon. The moon is 384,400kms away from Earth, the satellites are present on the space the communication will not be a problem in this state. Since we get the communication through the satellites this will be easy to get in the process of building the data centers on the moon. The moon’s surface will be helpful to make the simple data centers and can be useful in having the data stored with the help of satellites that are in communication with the moon and the ground station on the earth. Through that, the communication will not be blacked out. The data center servers are to be remotely accessed.
Category: Digital Signal Processing

[473] viXra:2004.0257 [pdf] submitted on 2020-04-11 04:31:57

Image Reconstruction with a NON–PARALLELISM Constraint

Authors: Antonio Boccuto, Ivan Gerace
Comments: 5 Pages.

We consider the problem of restorating images from blur and noise. We find the minimum of the primal energy function, which has two terms, related to faithfulness to the data, and smoothness constraints, respectively. In general, we do not know and we have to estimate the discontinuities of the ideal image. We require that the obtained images are piecewise continuous and with thin edges. We associate with the primal energy function a dual energy function, which treats discontinuities implicitly. We determine a dual energy function, which is convex and takes into account non-parallelism constraints, in order to have thin edges. The proposed dual energy can be used as initial function in a GNC (Graduated Non-Convexity)-type algorithm, to obtain reconstructed images with Boolean discontinuities. In the experimental results, we show that the formation of parallel lines is inhibited.
Category: Digital Signal Processing

[472] viXra:2004.0225 [pdf] submitted on 2020-04-10 09:35:58

A New Method for Image Super-Resolution

Authors: Sebastien LABLANCHE, Gerard LABLANCHE
Comments: 6 Pages.

The aim of this paper is to demonstrate that it is possible to reconstruct coherent human faces from very degraded pixelated images with a very fast algorithm, more faster than compressed sensing (CS) algorithm, easier to compute and without deep learning, so without important information technology resources, i.e. a large database of thousands training images (see https://arxiv.org/pdf/2003.13063.pdf). This technological breakthrough has been patented in 2018 with the demand of french patent FR 1855485 (https://patents.google.com/patent/FR3082980A1). The Face Super-Resolution (FSR) has many interests, in particular in a remote surveillance context which already exists in China but which can be a reality in USA and European countries. Today, deep learning methods and artificial intelligence (AI) appears in this context but these methods are difficult to put in their systems because of the need of important data. The demand of chinese patent CN107563965 and the scientist publication "Pixel Recursive Super Resolution", R. Dahl, M. Norouzi, J. Shlens propose such methods (see https://arxiv.org/pdf/1702.00783.pdf). In this context, this new method could help governments, institutions and enterprises to accelerate the generalisation of automatic facial identification and to earn time for reconstruction process in industrial steps such as terahertz imaging, medical imaging or spatial imaging.
Category: Digital Signal Processing

[471] viXra:2004.0221 [pdf] submitted on 2020-04-10 12:25:43

Multi-Key Homomorphic Encryption based Blockchain Voting System

Authors: Racco Wang
Comments: 6 Pages.

During the pandemic covid-19. More than 70 national elections scheduled for the rest of the year worldwide, the coronavirus (COVID-19) pandemic is putting into question whether some of these elections will happen on time or at all. We proposed a novel solution based on multi-key homomorphic encryption and blockchain technology, which is unhackable,privacy-preserving and decentralized. We first introduce the importance of a feasible voting system in this special era, then we demonstrated how we construct the system. finally, we made a thorough comparison of the possible solutions.
Category: Digital Signal Processing

[470] viXra:2004.0011 [pdf] submitted on 2020-04-01 04:17:38

Terabits-per-second Data Links

Authors: George Rajna
Comments: 47 Pages.

Using the same technology that allows high-frequency signals to travel on regular phone lines, researchers tested sending extremely high-frequency, 200 GHz signals through a pair of copper wires. [35] A new type of quantum memory that could extend the range of quantum encryption systems has been unveiled by physicists at Harvard University in the US. [34] The companies constructed an application for data transmission via optical fiber lines, which when combined with high-speed quantum cryptography communications technologies demonstrated practical key distribution speeds even in a real-world environment. [33] Nanosized magnetic particles called skyrmions are considered highly promising candidates for new data storage and information technologies. [32] They do this by using "excitons," electrically neutral quasiparticles that exist in insulators, semiconductors and in some liquids. [31] Researchers at ETH Zurich have now developed a method that makes it possible to couple such a spin qubit strongly to microwave photons. [30] Quantum dots that emit entangled photon pairs on demand could be used in quantum communication networks. [29] Researchers successfully integrated the systems-donor atoms and quantum dots. [28] A team of researchers including U of A engineering and physics faculty has developed a new method of detecting single photons, or light particles, using quantum dots. [27] Recent research from Kumamoto University in Japan has revealed that polyoxometalates (POMs), typically used for catalysis, electrochemistry, and photochemistry, may also be used in a technique for analyzing quantum dot (QD) photoluminescence (PL) emission mechanisms. [26] Researchers have designed a new type of laser called a quantum dot ring laser that emits red, orange, and green light. [25] The world of nanosensors may be physically small, but the demand is large and growing, with little sign of slowing. [24]
Category: Digital Signal Processing

[469] viXra:2004.0002 [pdf] submitted on 2020-04-01 10:06:05

Optical Data Processing Mobility

Authors: George Rajna
Comments: 49 Pages.

Now, researchers in China and Canada have demonstrated how to achieve efficient optical mode transfer in more compact devices than previously possible by exploiting "exceptional points" with new mobile properties. [36] Using the same technology that allows high-frequency signals to travel on regular phone lines, researchers tested sending extremely high-frequency, 200 GHz signals through a pair of copper wires. [35] A new type of quantum memory that could extend the range of quantum encryption systems has been unveiled by physicists at Harvard University in the US. [34] The companies constructed an application for data transmission via optical fiber lines, which when combined with high-speed quantum cryptography communications technologies demonstrated practical key distribution speeds even in a real-world environment. [33] Nanosized magnetic particles called skyrmions are considered highly promising candidates for new data storage and information technologies. [32] They do this by using "excitons," electrically neutral quasiparticles that exist in insulators, semiconductors and in some liquids. [31] Researchers at ETH Zurich have now developed a method that makes it possible to couple such a spin qubit strongly to microwave photons. [30] Quantum dots that emit entangled photon pairs on demand could be used in quantum communication networks. [29] Researchers successfully integrated the systems-donor atoms and quantum dots. [28] A team of researchers including U of A engineering and physics faculty has developed a new method of detecting single photons, or light particles, using quantum dots. [27] Recent research from Kumamoto University in Japan has revealed that polyoxometalates (POMs), typically used for catalysis, electrochemistry, and photochemistry, may also be used in a technique for analyzing quantum dot (QD) photoluminescence (PL) emission mechanisms. [26] Researchers have designed a new type of laser called a quantum dot ring laser that emits red, orange, and green light. [25]
Category: Digital Signal Processing

[468] viXra:2003.0507 [pdf] submitted on 2020-03-24 10:28:50

Brain-Mimicking Processing Systems

Authors: George Rajna
Comments: 34 Pages.

This pioneering work on neuromorphic electronic circuits inspired researchers in Germany and Switzerland to explore the possibility of reproducing the physics of real neural circuits by using the physics of silicon. [22] A computer built to mimic the brain's neural networks produces similar results to that of the best brain-simulation supercomputer software currently used for neural-signaling research, finds a new study published in the open-access journal Frontiers in Neuroscience. [21]
Category: Digital Signal Processing

[467] viXra:2003.0242 [pdf] submitted on 2020-03-12 11:50:09

All-Electric Magnetic Logic Gates

Authors: George Rajna
Comments: 64 Pages.

A team of researchers from ETH Zurich and the Paul Scherrer Institute has developed a way to build an all-electric magnetic logic gate. [40] Novel insight comes now from experiments and simulations performed by a team led by ETH physicists who have studied electronic transport properties in a one-dimensional quantum wire containing a mesoscopic lattice. [39] Femtosecond lasers are capable of processing any solid material with high quality and high precision using their ultrafast and ultra-intense characteristics. [38]
Category: Digital Signal Processing

[466] viXra:2003.0200 [pdf] submitted on 2020-03-10 08:31:12

Light-Operated Hard Drives

Authors: George Rajna
Comments: 22 Pages.

EPFL physicist László Forró and his team pave the way for the future of data storage. [16] Researchers from the University of Toronto Engineering and King Abdullah University of Science and Technology (KAUST) have overcome a key obstacle in combining the emerging solar-harvesting technology of perovskites with the commercial gold standard-silicon solar cells. [15] Researchers from the Theory Department of the MPSD in Hamburg and North Carolina State University in the US have demonstrated that the long-sought magnetic Weyl semi-metallic state can be induced by ultrafast laser pulses in a three-dimensional class of magnetic materials dubbed pyrochlore iridates. [14] At TU Wien recently, particles known as 'Weyl fermions' were discovered in materials with strong interaction between electrons. Just like light particles, they have no mass but nonetheless they move extremely slowly. [13] Quantum behavior plays a crucial role in novel and emergent material properties, such as superconductivity and magnetism. [12] A source of single photons that meets three important criteria for use in quantum information systems has been unveiled in China by an international team of physicists. Based on a quantum dot, the device is an efficient source of photons that emerge as solo particles that are indistinguishable from each other. The researchers are now trying to use the source to create a quantum computer based on "boson sampling". [11] With the help of a semiconductor quantum dot, physicists at the University of Basel have developed a new type of light source that emits single photons. For the first time, the researchers have managed to create a stream of identical photons. [10] Optical photons would be ideal carriers to transfer quantum information over large distances. Researchers envisage a network where information is processed in certain nodes and transferred between them via photons. [9] While physicists are continually looking for ways to unify the theory of relativity, which describes large-scale phenomena, with quantum theory, which describes small-scale phenomena, computer scientists are searching for technologies to build the quantum computer using Quantum Information. In August 2013, the achievement of "fully deterministic" quantum teleportation, using a hybrid technique, was reported. On 29 May 2014, scientists announced a reliable way of transferring data by quantum teleportation. Quantum teleportation of data had been done before but with highly unreliable methods. The accelerating electrons explain not only the Maxwell Equations and the Special Relativity, but the Heisenberg Uncertainty Relation, the Wave-Particle Duality and the electron's spin also, building the Bridge between the Classical and Quantum Theories. The Planck Distribution Law of the electromagnetic oscillators explains the electron/proton mass rate and the Weak and Strong Interactions by the diffraction patterns. The Weak Interaction changes the diffraction patterns by moving the electric charge from one side to the other side of the diffraction pattern, which violates the CP and Time reversal symmetry. The diffraction patterns and the locality of the self-maintaining electromagnetic potential explains also the Quantum Entanglement, giving it as a natural part of the Relativistic Quantum Theory and making possible to build the Quantum Computer with the help of Quantum Information.
Category: Digital Signal Processing

Replacements of recent Submissions

[40] viXra:2212.0019 [pdf] replaced on 2022-12-07 23:27:39

AMS - Abstract Merkle Signature Scheme

Authors: Herman Schoeneld
Comments: 9 Pages. Copyright (c) Sphere 10 Software Pty Ltd (originally written in 2020).

An abstract post-quantum digital signature scheme is presented that parameterizes a one-time signature scheme (OTS) for "many-time" use. This scheme permits a single key-pair to fficiently sign and verify a (great) many messages without security degradation. It achieves this by following the original Merkle-Signature Scheme but without a coupling to a specific OTS. Various improvements include a reduction in signature size, resistance to denial-of-service attacks and smaller keys. This construction comprises a bit-level specification for the Abstract Merkle Signature Scheme (AMS).
Category: Digital Signal Processing

[39] viXra:2211.0096 [pdf] replaced on 2023-01-29 18:58:40

Arbitrarily Accurate Classification Applied to Specific Emitter Identification

Authors: Michael C. Kleder
Comments: 7 Pages. Minor update

This article introduces a method of evaluating subsamples until any prescribed level of classification accuracy is attained, thus obtaining arbitrary accuracy. A logarithmic reduction in error rate is obtained with a linear increase in sample count. The technique is applied to specific emitter identification on a published dataset of physically recorded over-the-air signals from 16 ostensibly identical high-performance radios. The technique uses a multi-channel deep learning convolutional neural network acting on the bispectra of I/Q signal subsamples each consisting of 56 parts per million (ppm) of the original signal duration. High levels of accuracy are obtained with minimal computation time: in this application, each addition of eight samples decreases error by one order of magnitude.
Category: Digital Signal Processing

[38] viXra:2205.0050 [pdf] replaced on 2022-05-12 03:09:47

FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher

Authors: Michele Fabbrini
Comments: 25 Pages.

In this paper we describe a symmetric key algorithm that offers an unprecedented grade of confidentiality. Based on the uniqueness of the modular multiplicative inverse of a positive integer a modulo n and on its computability in a polynomial time, this non-deterministic cipher can easily and quickly handle keys of millions or billions of bits that an attacker does not even know the length of. The algorithm’s primary key is the modulo, while the ciphertext is given by the concatenation of the modular inverse of blocks of plaintext whose length is randomly chosen within a predetermined range. In addition to the full specification, we present a working implementation of it in Julia Programming Language, accompanied by real examples of encryption and decryption.
Category: Digital Signal Processing

[37] viXra:2106.0006 [pdf] replaced on 2023-08-15 09:50:01

Development of a Quadruple Security System Combining Keypad, Rfid, Fingerprint, and Bluetooth Modules

Authors: GyongBong Ju, CholHyon Sim,CholJin Kim, JongChol Chu
Comments: 19 Pages.

Today, the security problem is emerging as a crucial problem for people, and research into solving this problem is now on its way worldwide. Everyone is aware of the urgency and seriousness of the security problem, and at this time, this problem has a giant impact on the overall social life. As science and technology develop, researches for solving security problems are advancing to a new stage, and their reliability is increasing day by day.In this study, a powerful quadruple security system was designed and realized by combining Keypad, RFID, Fingerprint, and Bluetooth (HC06) modules to thoroughly secure the security of medicines, jewelry, documents, and other valuables and doors.This system is based on the Arduino Mega 2560 microcontroller and is an intelligent system with a display function, voice function, SMS transmission function by GSM module, and alarm function. The system is an excellent system that can thoroughly guarantee the safety of security with low cost and low power consumption.
Category: Digital Signal Processing

[36] viXra:2004.0225 [pdf] replaced on 2023-09-14 21:02:53

A New Method for Image Super-Resolution

Authors: Sébastien Lablanche, Gérard Lablanche
Comments: 19 Pages.

The aim of this paper is to demonstrate that it is possible to reconstruct coherent human faces from very degraded pixelated images with a very fast algorithm, more faster than compressed sensing (CS) algorithm, easier to compute and without deep learning, so without important information technology resources, i.e. a large database of thousands training images (see https://arxiv.org/pdf/2003.13063.pdf). This technological breakthrough has been patented in 2018 with the demand of french patent FR 1855485 (https://patents.google.com/patent/FR3082980A1). The Face Super-Resolution (FSR) has many interests, in particular in a remote surveillance context which already exists in China but which can be a reality in USA and European countries. Today, deep learning methods and artificial intelligence (AI) appears in this context but these methods are difficult to put in their systems because of the need of important data. The demand of chinese patent CN107563965 and the scientist publication "Pixel Recursive Super Resolution", R. Dahl, M. Norouzi, J. Shlens propose such methods (see https://arxiv.org/pdf/1702.00783.pdf). In this context, this new method could help governments, institutions and enterprises to accelerate the generalisation of automatic facial identification and to earn time for reconstruction process in industrial steps such as terahertz imaging, medical imaging or spatial imaging.
Category: Digital Signal Processing

[35] viXra:2004.0225 [pdf] replaced on 2020-04-17 10:04:34

A New Method for Image Super-Resolution

Authors: sebastien LABLANCHE, gerard LABLANCHE
Comments: 6 Pages.

The aim of this paper is to demonstrate that it is possible to reconstruct coherent human faces from very degraded pixelated images with a very fast algorithm, more faster than compressed sensing (CS) algorithm, easier to compute and without deep learning, so without important information technology resources, i.e. a large database of thousands training images (see https://arxiv.org/pdf/2003.13063.pdf). This technological breakthrough has been patented in 2018 with the demand of french patent FR 1855485 (https://patents.google.com/patent/FR3082980A1). The Face Super-Resolution (FSR) has many interests, in particular in a remote surveillance context which already exists in China but which can be a reality in USA and European countries. Today, deep learning methods and artificial intelligence (AI) appears in this context but these methods are difficult to put in their systems because of the need of important data. The demand of chinese patent CN107563965 and the scientist publication "Pixel Recursive Super Resolution", R. Dahl, M. Norouzi, J. Shlens propose such methods (see https://arxiv.org/pdf/1702.00783.pdf). In this context, this new method could help governments, institutions and enterprises to accelerate the generalisation of automatic facial identification and to earn time for reconstruction process in industrial steps such as terahertz imaging, medical imaging or spatial imaging.
Category: Digital Signal Processing