Digital Signal Processing

Previous months:
2009 - 0908(1)
2010 - 1003(1) - 1004(1)
2011 - 1103(1)
2012 - 1206(1) - 1208(69) - 1210(1) - 1211(7) - 1212(1)
2013 - 1301(7) - 1306(1) - 1308(1) - 1309(1) - 1310(8)
2014 - 1402(1) - 1403(4) - 1405(42) - 1406(1) - 1407(1) - 1408(1) - 1409(1) - 1410(1) - 1411(1) - 1412(1)
2015 - 1502(2) - 1503(1) - 1504(14) - 1505(1) - 1506(2) - 1507(1) - 1508(1) - 1509(2) - 1510(15) - 1511(1)
2016 - 1601(10) - 1603(1) - 1604(2) - 1605(3) - 1607(2) - 1608(3) - 1609(2) - 1610(7) - 1611(1) - 1612(2)
2017 - 1701(3) - 1702(7) - 1703(4) - 1704(5) - 1705(7) - 1706(1) - 1707(2) - 1708(6) - 1709(12) - 1710(6) - 1711(1)

Recent submissions

Any replacements are listed further down

[281] viXra:1711.0269 [pdf] submitted on 2017-11-10 19:23:08

Application of Prony Analysis for Distance Protection Scheme

Authors: Peng Yu
Comments: 2 Pages.

The application of prony method for various distance protection schemes is studied in this paper. The prony method extracts the desired information like frequency, amplitude, phase and damping components from a sampled response. The information generated from prony analysis is used for implementing distance protection scheme.
Category: Digital Signal Processing

[280] viXra:1710.0324 [pdf] submitted on 2017-10-29 06:43:09

New Sufficient Conditions of Signal Recovery with Tight Frames Via $l_1$-Analysis

Authors: Jianwen Huang, Jianjun Wang
Comments: 15 Pages.

The paper discusses the recovery of signals in the case that signals are nearly sparse with respect to a tight frame $D$ by means of the $l_1$-analysis approach. We establish several new sufficient conditions regarding the $D$-restricted isometry property to ensure stable reconstruction of signals that are approximately sparse with respect to $D$. It is shown that if the measurement matrix $\Phi$ fulfils the condition $\delta_{ts}<t/(4-t)$ for $0<t<4/3$, then signals which are approximately sparse with respect to $D$ can be stably recovered by the $l_1$-analysis method. In the case of $D=I$, the bound is sharp, see Cai and Zhang's work \cite{Cai and Zhang 2014}. When $t=1$, the present bound improves the condition $\delta_s<0.307$ from Lin et al.'s reuslt to $\delta_s<0.333$.
Category: Digital Signal Processing

[279] viXra:1710.0320 [pdf] submitted on 2017-10-29 11:20:58

A Novel Suggestion on Informatics Framework of Smart Devices Involving Hardware,firmware,software & Communication Protocol/s Verification in the Context of Iot Based on e Theorem Prover.

Authors: N.T.Kumar, Thiago R, Sandro B, Vinicius R, Lisane V, Vanderlei P
Comments: 4 Pages. E Theorem Prover/Smart Devices/Hardware/Firmware/Software/Protocols/IoT

We present in this short communication - “E Theorem Prover and Verification of Smart Devices & Protocols Based on IoT Environments – A Novel Suggestion on Informatics Framework of Smart Devices involving Hardware,Firmware & Software Verification.”
Category: Digital Signal Processing

[278] viXra:1710.0210 [pdf] submitted on 2017-10-18 14:30:33

Importance of Manchester Coding Using Micro-Controllers/Related Data Processing Mechanisms – An Interesting Insight into Manchester Coding & Smart Watch Applications.

Authors: N.T.Kumar, Thiago R, Sandro B, Vinicius R, Lisane V, Vanderlei P
Comments: 4 Pages. Manchester Coding & Applications - SmartWatch Applications-SAML21

Smart Watches are modern devices involving cutting edge technologies in all aspects of working and communicating with the surrounding environments by detecting parameters and also providing a means to transmit the related data for further processing via Computers/Tablets/Smart Phones etc..We wish to highlight the importance of “Manchester Coding” in the context of Smart Watches based on Micro- controllers for example SAML21 Series from ATMEL.
Category: Digital Signal Processing

[277] viXra:1710.0178 [pdf] submitted on 2017-10-16 13:48:15

Gnuplantex: a Novel Free Software for Analyzing Texture and Color in Plants; Its Industrial Application.

Authors: Enrique Marcet Garcia
Comments: 22 Pages.

In many industrial applications where plants are used as raw material in the production process, is important to perform a proper phytosanitary and quality control. To perform these controls is possible by raw materials visual inspection, however, to analyze texture and color in plants would allow identifying/quantifying problems as: nutrient deficiencies; diseases (caused by fungi, bacteria, etc.), as well as to identify problems in industrial process. The aims of this paper are: (1) to develop free software (GPL) for texture analysis (GLCM), color measurement (CIELab) and color-difference calculation using CIEDE2000; (2) software application in the analysis of Moringa oleifera Lam leaves. For programming the software we used Perl and wxBasic languages. GNUplantex is easy-to-use software. It is available at: http://www.2shared.com/file/tvzJPBy5/gnuplantex.html
Category: Digital Signal Processing

[276] viXra:1710.0128 [pdf] submitted on 2017-10-11 13:37:47

Higher Order Logic( HOL) Based Configuration & Verification of Smart Watches – A Short Communication & Novel Suggestion to Develop an Informatics Framework

Authors: N.T.Kumar, Thiago R, Sandro B, Vinicius R, Lisane V, Vanderlei P
Comments: 4 Pages. HOL/JVM/Circadian Systems/Smart Watches/Hardware Configuration&Verification

In this short communication we focused on Higher Order Logic(HOL) based configuration and verification of hardware in the java virtual machine environment(JVM) using HOL-Isabelle system. Smart Watches are fast becoming excellent information processing devices to monitor health.Hence we wish to communicate our idea in the context of circadian systems and informatics applications
Category: Digital Signal Processing

[275] viXra:1710.0116 [pdf] submitted on 2017-10-11 03:59:19

Advanced Bio-Inspired Computing

Authors: George Rajna
Comments: 42 Pages.

By finding materials that act in ways similar to the mechanisms that biology uses to retain and process information, scientists hope to find clues to help us build smarter computers. [25] Scientists have made a crucial step towards unlocking the "holy grail" of computing-microchips that mimic the way the human brain works to store and process information. [24] Considerable interest in new single-photon detector technologies has been scaling in this past decade. [23] Engineers develop key mathematical formula for driving quantum experiments. [22] Physicists are developing quantum simulators, to help solve problems that are beyond the reach of conventional computers. [21] Engineers at Australia's University of New South Wales have invented a radical new architecture for quantum computing, based on novel 'flip-flop qubits', that promises to make the large-scale manufacture of quantum chips dramatically cheaper-and easier-than thought possible. [20] A team of researchers from the U.S. and Italy has built a quantum memory device that is approximately 1000 times smaller than similar devices— small enough to install on a chip. [19] The cutting edge of data storage research is working at the level of individual atoms and molecules, representing the ultimate limit of technological miniaturisation. [18] This is an important clue for our theoretical understanding of optically controlled magnetic data storage media. [17] A crystalline material that changes shape in response to light could form the heart of novel light-activated devices. [16] Now a team of Penn State electrical engineers have a way to simultaneously control diverse optical properties of dielectric waveguides by using a two-layer coating, each layer with a near zero thickness and weight. [15]
Category: Digital Signal Processing

[274] viXra:1710.0005 [pdf] submitted on 2017-10-01 05:56:15

Driverless Devices

Authors: Domenico Oricchio
Comments: 1 Page.

A hypothetical method to connect any future device to any operating system without drivers
Category: Digital Signal Processing

[273] viXra:1709.0429 [pdf] submitted on 2017-09-28 16:39:01

Time-Coordinated Signatures

Authors: Santi J. Vives Maccallini
Comments: 17 Pages.

Abstract: Hash-based signatures are typically stateful: they need to keep a state with the number of past signatures to know which values have been already used and cannot be reused. If the memory storing the state fails, the security would degrade. Some implementations solve the problem by using a number of secret values so large that the probability of picking the same at random is negligible, but this solution can make the signatures impractical for some real world applications. This paper proposes a new approach to hash-based signatures: we show that it is possible to derive their state entirely from time, without the need to keep a state with the number of past signatures, Keywords: many-times signatures, hash-based signatures, post-quantum cryptography, stateless, authentication, merkle tree, directed graph, time, clock.
Category: Digital Signal Processing

[272] viXra:1709.0413 [pdf] submitted on 2017-09-28 05:21:39

Brain-Like Photonic Microchips

Authors: George Rajna
Comments: 40 Pages.

Scientists have made a crucial step towards unlocking the "holy grail" of computing-microchips that mimic the way the human brain works to store and process information. [24] Considerable interest in new single-photon detector technologies has been scaling in this past decade. [23] Engineers develop key mathematical formula for driving quantum experiments. [22] Physicists are developing quantum simulators, to help solve problems that are beyond the reach of conventional computers. [21] Engineers at Australia's University of New South Wales have invented a radical new architecture for quantum computing, based on novel 'flip-flop qubits', that promises to make the large-scale manufacture of quantum chips dramatically cheaper-and easier-than thought possible. [20] A team of researchers from the U.S. and Italy has built a quantum memory device that is approximately 1000 times smaller than similar devices— small enough to install on a chip. [19] The cutting edge of data storage research is working at the level of individual atoms and molecules, representing the ultimate limit of technological miniaturisation. [18] This is an important clue for our theoretical understanding of optically controlled magnetic data storage media. [17] A crystalline material that changes shape in response to light could form the heart of novel light-activated devices. [16] Now a team of Penn State electrical engineers have a way to simultaneously control diverse optical properties of dielectric waveguides by using a two-layer coating, each layer with a near zero thickness and weight. [15] Just like in normal road traffic, crossings are indispensable in optical signal processing.
Category: Digital Signal Processing

[271] viXra:1709.0412 [pdf] submitted on 2017-09-27 14:15:40

Formalizing Image Processing in Higher Order Logic(hol) by Understanding and Using XML-Hol-Scala-JVM Software Framework Towards Processing of Cryo-Em/tem/sem Images Based on Levy Processes a Novel Suggestion

Authors: D.N.T.Kumar
Comments: 14 Pages. A NOVEL SUGGESTION IN THE CONTEXT OF INSTRUMENTATION & HIGH PERFORMANCE COMPUTING ENVIRONMENT.

In this research work it was proposed to understand and use Levy processes based on XML-HOL-Scala/JVM software in the context of Cryo-EM/SEM/TEM image processing.Though the discussion is very much related to Cryo-EM based topics similar logic could be applied in developing a convenient informatics framework to process other electron-microscopy images.It is one of the pioneering efforts in this direction to use Levy processes in such situations.In the near future,inorder to achieve “Smart & Intelligent” image processing platforms,we could envision incorporating advanced technology based on HOL-XML-Scala/JVM framework which will allow the seamless integration of technologies such as agents, model-based reasoning,genetic algorithms,and artificial neural nets towards robust image processing tasks on-hand.
Category: Digital Signal Processing

[270] viXra:1709.0402 [pdf] submitted on 2017-09-26 13:34:49

Detection and Prevention of Non-PC Botnets

Authors: Jai Puneet Singh, Akashdeep Chauhan
Comments: 7 Pages.

Botnet attacks are serious and well-established threat to the internet community. These attacks are not only restricted to PC or laptops but spreading their roots to a device such as smartphones, refrigerators, and medical instruments. According to users, they are devices which are least prone to attacks. On the other hand, a device that is expected to be least vulnerable has low-security aspects which attract the attackers. In this paper, we have listed the details of latest Botnet attacks and common vulnerabilities behind such attacks. We have also explained as well as suggested proved Detection ways based on their types. After an analysis of attacks and detection techniques, we have suggested recommendations which can be utilized in order to mitigate such attacks.
Category: Digital Signal Processing

[269] viXra:1709.0389 [pdf] submitted on 2017-09-26 11:10:29

An Insight Into Commutative Algebra Based Informatics & Computational Architecture for Cryo-em Image Processing Involving Gröbner Bases Using C++/java/hol/scala/scalalab/imagej Software Environments – a Short Communication on Gröbner Bases

Authors: D.N.T.Kumar
Comments: 7 Pages. A Short Communication on Gröbner Bases With Applications in Signals and Systems Using JikesRVM/JVM.

In this research communication on commutative algebra it was proposed to deal with Grobner Bases and its applications in signals and systems domain.This is one of the pioneering communications in dealing with Cryo-EM Image Processing application using multi-disciplinary concepts involving thermodynamics and electro magnetics based on first principles approach.
Category: Digital Signal Processing

[268] viXra:1709.0376 [pdf] submitted on 2017-09-24 14:31:58

Haskell-Java-JikesRVM/ImageJ Nano-Bio Informatics Framework based Cryo-Electron Microscopy/TEM/SEM Image Processing in the Context of Haskell Image Processing Libraries & HDF5 Image Format – A Simple Communication on Applications of Meta-circular Research

Authors: D.N.T.Kumar
Comments: 9 Pages. A Simple Communication on Applications of Meta-circular Research Virtual Machine(RVM) & JTransformer-Prolog Development Tool.

Current R&D project was the development of a software platform designed to be an advanced research testbed for the prototyping of Haskell based novel technologies in Cryo-EM Methodologies. Focused upon software architecture concepts and frameworks involving Haskell image processing libraries.Cryo-EM is an important tool to probe nano-bio systems.A number of hi-tech firms are implementing BIG-DATA analysis using Haskell especially in the domains of Pharma,Bio-informatics etc. Hence current research paper is one of the pioneering attempts made by the author to encourage advanced data analysis in the Cryo-EM domain to probe important aspects of nano-bio applications.
Category: Digital Signal Processing

[267] viXra:1709.0164 [pdf] submitted on 2017-09-13 13:04:54

RSA Cryptography over Polynomials (II)

Authors: Antoine Balan
Comments: 2 pages, written in french

Here is presented a cryptosystem near the RSA cryptosystem but for polynomials over a finite field, more precisely two irreducible polynomials instead of two prime numbers.
Category: Digital Signal Processing

[266] viXra:1709.0152 [pdf] submitted on 2017-09-12 12:53:40

Cryptography Over the Circle

Authors: Antoine Balan
Comments: 2 pages, written in french

As a commutativ group the circle can be used to make cryptography. Here is presented the general figure of a cryptography over the circle.
Category: Digital Signal Processing

[265] viXra:1709.0078 [pdf] submitted on 2017-09-07 09:58:35

Magnetic Data Writing

Authors: George Rajna
Comments: 33 Pages.

Magnetic data storage has long been considered too slow for use in the working memories of computers. Researchers at ETH have now investigated a technique by which magnetic data writing can be done considerably faster and using less energy. [20] A team of researchers from the U.S. and Italy has built a quantum memory device that is approximately 1000 times smaller than similar devices— small enough to install on a chip. [19] The cutting edge of data storage research is working at the level of individual atoms and molecules, representing the ultimate limit of technological miniaturisation. [18] This is an important clue for our theoretical understanding of optically controlled magnetic data storage media. [17] A crystalline material that changes shape in response to light could form the heart of novel light-activated devices. [16] Now a team of Penn State electrical engineers have a way to simultaneously control diverse optical properties of dielectric waveguides by using a two-layer coating, each layer with a near zero thickness and weight. [15] Just like in normal road traffic, crossings are indispensable in optical signal processing. In order to avoid collisions, a clear traffic rule is required. A new method has now been developed at TU Wien to provide such a rule for light signals. [14] Researchers have developed a way to use commercial inkjet printers and readily available ink to print hidden images that are only visible when illuminated with appropriately polarized waves in the terahertz region of the electromagnetic spectrum. [13] That is, until now, thanks to the new solution devised at TU Wien: for the first time ever, permanent magnets can be produced using a 3D printer. This allows magnets to be produced in complex forms and precisely customised magnetic fields, required, for example, in magnetic sensors. [12]
Category: Digital Signal Processing

[264] viXra:1709.0061 [pdf] submitted on 2017-09-06 06:43:56

Computational Environments

Authors: George Rajna
Comments: 36 Pages.

Differences in software environments can cause problems when those experiments need to be reproduced—so scientists at the MDC in Berlin are seeking a solution. [21] Engineers at Australia's University of New South Wales have invented a radical new architecture for quantum computing, based on novel 'flip-flop qubits', that promises to make the large-scale manufacture of quantum chips dramatically cheaper-and easier-than thought possible. [20] A team of researchers from the U.S. and Italy has built a quantum memory device that is approximately 1000 times smaller than similar devices— small enough to install on a chip. [19] The cutting edge of data storage research is working at the level of individual atoms and molecules, representing the ultimate limit of technological miniaturisation. [18] This is an important clue for our theoretical understanding of optically controlled magnetic data storage media. [17] A crystalline material that changes shape in response to light could form the heart of novel light-activated devices. [16] Now a team of Penn State electrical engineers have a way to simultaneously control diverse optical properties of dielectric waveguides by using a two-layer coating, each layer with a near zero thickness and weight. [15] Just like in normal road traffic, crossings are indispensable in optical signal processing. In order to avoid collisions, a clear traffic rule is required. A new method has now been developed at TU Wien to provide such a rule for light signals. [14] Researchers have developed a way to use commercial inkjet printers and readily available ink to print hidden images that are only visible when illuminated with appropriately polarized waves in the terahertz region of the electromagnetic spectrum. [13] That is, until now, thanks to the new solution devised at TU Wien: for the first time ever, permanent magnets can be produced using a 3D printer.
Category: Digital Signal Processing

[263] viXra:1708.0477 [pdf] submitted on 2017-08-31 05:50:19

Towards Soliton Computer Based on Solitary Wave Solution of Maxwell-Dirac Equation: a Plausible Alternative to Manakov System

Authors: Victor Christianto, Florentin Smarandache
Comments: 7 Pages. This paper has not been submitted to a journal. Your comments are welcome

In recent years, there are a number of proposals to consider collision-based soliton computer based on certain chemical reactions, namely Belousov-Zhabotinsky reaction, which leads to soliton solutions of coupled Nonlinear Schroedinger equations. They are called Manakov System. But it seems to us that such a soliton computer model can also be based on solitary wave solution of Maxwell-Dirac equation, which reduces to Choquard equation. And soliton solution of Choquard equation has been investigated by many researchers, therefore it seems more profound from physics perspective. However, we consider both schemes of soliton computer are equally possible. More researches are needed to verify our proposition.
Category: Digital Signal Processing

[262] viXra:1708.0468 [pdf] submitted on 2017-08-30 08:00:11

Store Data on Single Atom

Authors: George Rajna
Comments: 31 Pages.

The cutting edge of data storage research is working at the level of individual atoms and molecules, representing the ultimate limit of technological miniaturisation. [18] This is an important clue for our theoretical understanding of optically controlled magnetic data storage media. [17] A crystalline material that changes shape in response to light could form the heart of novel light-activated devices. [16] Now a team of Penn State electrical engineers have a way to simultaneously control diverse optical properties of dielectric waveguides by using a two-layer coating, each layer with a near zero thickness and weight. [15] Just like in normal road traffic, crossings are indispensable in optical signal processing. In order to avoid collisions, a clear traffic rule is required. A new method has now been developed at TU Wien to provide such a rule for light signals. [14] Researchers have developed a way to use commercial inkjet printers and readily available ink to print hidden images that are only visible when illuminated with appropriately polarized waves in the terahertz region of the electromagnetic spectrum. [13] That is, until now, thanks to the new solution devised at TU Wien: for the first time ever, permanent magnets can be produced using a 3D printer. This allows magnets to be produced in complex forms and precisely customised magnetic fields, required, for example, in magnetic sensors. [12] For physicists, loss of magnetisation in permanent magnets can be a real concern. In response, the Japanese company Sumitomo created the strongest available magnet—one offering ten times more magnetic energy than previous versions—in 1983. [11] New method of superstrong magnetic fields' generation proposed by Russian scientists in collaboration with foreign colleagues. [10] By showing that a phenomenon dubbed the "inverse spin Hall effect" works in several organic semiconductors-including carbon-60 buckyballs-University of Utah physicists changed magnetic "spin current" into electric current. The efficiency of this new power conversion method isn't yet known, but it might find use in future electronic devices including batteries, solar cells and computers. [9] Researchers from the Norwegian University of Science and Technology (NTNU) and the University of Cambridge in the UK have demonstrated that it is possible to directly generate an electric current in a magnetic material by rotating its magnetization. [8] This paper explains the magnetic effect of the electric current from the observed effects of the accelerating electrons, causing naturally the experienced changes of the electric field potential along the electric wire. The accelerating electrons explain not only the Maxwell Equations and the Special Relativity, but the Heisenberg Uncertainty Relation, the wave particle duality and the electron's spin also, building the bridge between the Classical and Quantum Theories. The changing acceleration of the electrons explains the created negative electric field of the magnetic induction, the changing relativistic mass and the Gravitational Force, giving a Unified Theory of the physical forces. Taking into account the Planck Distribution Law of the electromagnetic oscillators also, we can explain the electron/proton mass rate and the Weak and Strong Interactions.
Category: Digital Signal Processing

[261] viXra:1708.0377 [pdf] submitted on 2017-08-27 06:46:29

High Frequency Chip

Authors: George Rajna
Comments: 37 Pages.

Novel, high-frequency electronic chip potentially capable of transmitting tens of gigabits of data per second—a rate that is orders of magnitude above the fastest internet speeds available today—has been developed by engineers at the University of California, Davis. [19] For the first time, researchers have sent a quantum-secured message containing more than one bit of information per photon through the air above a city. [18] In early July, Google announced that it will expand its commercially available cloud computing services to include quantum computing. A similar service has been available from IBM since May. [17] Quantum computing is described as "just around the corner", simply awaiting the engineering prowess and entrepreneurial spirit of the tech sector to realise its full potential. [16] For the first time, physicists have demonstrated that hyperentangled photons can be transmitted in free space, which they showed by sending many thousands of these photons between the rooftops of two buildings in Vienna. [15] Now in a new study, physicists have cloned quantum states and demonstrated that, because the clones are entangled, it's possible to precisely and simultaneously measure the complementary properties of the clones. [14] Light particles (photons) occur as tiny, indivisible portions. Many thousands of these light portions can be merged to form a single super-photon if they are sufficiently concentrated and cooled. [13] The concept of temperature is critical in describing many physical phenomena, such as the transition from one phase of matter to another. Turn the temperature knob and interesting things can happen. But other knobs might be just as important for some studying some phenomena. One such knob is chemical potential, a thermodynamic parameter first introduced in the nineteenth century scientists for keeping track of potential energy absorbed or emitted by a system during chemical reactions. [12] For the first time, physicists have performed an experiment confirming that thermodynamic processes are irreversible in a quantum system—meaning that, even on the quantum level, you can't put a broken egg back into its shell. The results have implications for understanding thermodynamics in quantum systems and, in turn, designing quantum computers and other quantum information technologies. [11]
Category: Digital Signal Processing

[260] viXra:1708.0295 [pdf] submitted on 2017-08-23 07:08:02

Magnetoelectric RAM

Authors: George Rajna
Comments: 34 Pages.

MIPT researchers teamed up with collaborators for a successful demonstration of magnetoelectric random access memory (MELRAM). [22] Concepts for information storage and logical processing based on magnetic domain walls have great potential for implementation in future information and communications technologies." [21] Research at the National Institute of Standards and Technology (NIST) suggests it also may be true in the microscopic world of computer memory, where a team of scientists may have found that subtlety solves some of the issues with a novel memory switch. [20] Los Alamos National Laboratory has produced the first known material capable of single-photon emission at room temperature and at telecommunications wavelengths. [19] In their paper published in Nature, the team demonstrates that photons can become an accessible and powerful quantum resource when generated in the form of colour-entangled quDits. [18] But in the latest issue of Physical Review Letters, MIT researchers describe a new technique for enabling photon-photon interactions at room temperature, using a silicon crystal with distinctive patterns etched into it. [17] Kater Murch's group at Washington University in St. Louis has been exploring these questions with an artificial atom called a qubit. [16] Researchers have studied how light can be used to observe the quantum nature of an electronic material. [15] An international team of researchers led by the National Physical Laboratory (NPL) and the University of Bern has revealed a new way to tune the functionality of next-generation molecular electronic devices using graphene. [14] Researchers at the Department of Physics, University of Jyväskylä, Finland, have created a theory that predicts the properties of nanomagnets manipulated with electric currents. This theory is useful for future quantum technologies. [13] Quantum magnetism, in which – unlike magnetism in macroscopic-scale materials, where electron spin orientation is random – atomic spins self-organize into one-dimensional rows that can be simulated using cold atoms.
Category: Digital Signal Processing

[259] viXra:1708.0207 [pdf] submitted on 2017-08-18 05:45:49

Error Concealment by Means of Motion Refinement and Regularized Bregman Divergence

Authors: Alessandra M. Coelho, Vania V. Estrela, Felipe P. do Carmo, Sandro R. Fernandes, V. V. Estrela, Vania Vieira Estrela
Comments: 8 Pages. Proceedings of the IDEAL 2012, Springer Verlag, 2012

This work addresses the problem of error concealment in video transmission systems over noisy channels employing Bregman divergences along with regularization. Error concealment intends to improve the effects of disturbances at the reception due to bit-errors or cell loss in packet networks. Bregman regularization gives accurate answers after just some iterations with fast convergence, better accuracy, and stability. This technique has an adaptive nature: the regularization functional is updated according to Bregman functions that change from iteration to iteration according to the nature of the neighborhood under study at iteration n. Numerical experiments show that high-quality regularization parameter estimates can be obtained. The convergence is sped up while turning the regularization parameter estimation less empiric, and more automatic.
Category: Digital Signal Processing

[258] viXra:1708.0094 [pdf] submitted on 2017-08-09 08:36:56

Flash Memory Successor

Authors: George Rajna
Comments: 31 Pages.

in the microscopic world of computer memory, where a team of scientists may have found that subtlety solves some of the issues with a novel memory switch. [20] Los Alamos National Laboratory has produced the first known material capable of single-photon emission at room temperature and at telecommunications wavelengths. [19] In their paper published in Nature, the team demonstrates that photons can become an accessible and powerful quantum resource when generated in the form of colour-entangled quDits. [18] But in the latest issue of Physical Review Letters, MIT researchers describe a new technique for enabling photon-photon interactions at room temperature, using a silicon crystal with distinctive patterns etched into it. [17] Kater Murch's group at Washington University in St. Louis has been exploring these questions with an artificial atom called a qubit. [16] Researchers have studied how light can be used to observe the quantum nature of an electronic material. [15] An international team of researchers led by the National Physical Laboratory (NPL) and the University of Bern has revealed a new way to tune the functionality of next-generation molecular electronic devices using graphene. [14] Researchers at the Department of Physics, University of Jyväskylä, Finland, have created a theory that predicts the properties of nanomagnets manipulated with electric currents. This theory is useful for future quantum technologies. [13] Quantum magnetism, in which – unlike magnetism in macroscopic-scale materials, where electron spin orientation is random – atomic spins self-organize into one-dimensional rows that can be simulated using cold atoms trapped along a physical structure that guides optical spectrum electromagnetic waves known as a photonic crystal waveguide. [12] Scientists have achieved the ultimate speed limit of the control of spins in a solid state magnetic material. The rise of the digital information era posed a daunting challenge to develop ever faster and smaller devices for data storage and processing.
Category: Digital Signal Processing

[257] viXra:1707.0375 [pdf] submitted on 2017-07-28 09:35:41

Digital Information Without Loss

Authors: George Rajna
Comments: 18 Pages.

The researchers showed that the combination of these two properties can be used to transfer an encoded digital signal without information loss, which has potential applications for realizing highly efficient optical communication systems. [12] Physicists from the University of Würzburg have designed a light source that emits photon pairs, which are particularly well suited for tap-proof data encryption. The experiment's key ingredients: a semiconductor crystal and some sticky tape. [11] Quantum cryptography involves two parties sharing a secret key that is created using the states of quantum particles such as photons. The communicating parties can then exchange messages by conventional means, in principle with complete security, by encrypting them using the secret key. Any eavesdropper trying to intercept the key automatically reveals their presence by destroying the quantum states. [10] Optical photons would be ideal carriers to transfer quantum information over large distances. Researchers envisage a network where information is processed in certain nodes and transferred between them via photons. [9] While physicists are continually looking for ways to unify the theory of relativity, which describes large-scale phenomena, with quantum theory, which describes small-scale phenomena, computer scientists are searching for technologies to build the quantum computer using Quantum Information. In August 2013, the achievement of "fully deterministic" quantum teleportation, using a hybrid technique, was reported. On 29 May 2014, scientists announced a reliable way of transferring data by quantum teleportation. Quantum teleportation of data had been done before but with highly unreliable methods. The accelerating electrons explain not only the Maxwell Equations and the Special Relativity, but the Heisenberg Uncertainty Relation, the Wave-Particle Duality and the electron's spin also, building the Bridge between the Classical and Quantum Theories. The Planck Distribution Law of the electromagnetic oscillators explains the electron/proton mass rate and the Weak and Strong Interactions by the diffraction patterns. The Weak Interaction changes the diffraction patterns by moving the electric charge from one side to the other side of the diffraction pattern, which violates the CP and Time reversal symmetry. The diffraction patterns and the locality of the self-maintaining electromagnetic potential explains also the Quantum Entanglement, giving it as a natural part of the Relativistic Quantum Theory and making possible to build the Quantum Computer with the help of Quantum Information.
Category: Digital Signal Processing

[256] viXra:1707.0164 [pdf] submitted on 2017-07-12 02:37:27

Photosynthesis Help Computer Technology

Authors: George Rajna
Comments: 57 Pages.

"From new ways of capturing and storing the energy coming to us from the Sun, to developing new forms of computing technology, this research opens up some exciting new opportunities." [30] Jiang and his team created a way to measure and control the energy differences of electron valley states in silicon quantum dots, which are a key component of quantum computing research. [29] Now, researchers at Stanford University and MIT have built a new chip to overcome this hurdle. [28] In the quest to make computers faster and more efficient, researchers have been exploring the field of spintronics—shorthand for spin electronics—in hopes of controlling the natural spin of the electron to the benefit of electronic devices. [27] When two researchers from the Swiss Federal Institute of Technology (ETH Zurich) announced in April that they had successfully simulated a 45-qubit quantum circuit, the science community took notice: it was the largest ever simulation of a quantum computer, and another step closer to simulating "quantum supremacy"—the point at which quantum computers become more powerful than ordinary computers. [26] Researchers from the University of Pennsylvania, in collaboration with Johns Hopkins University and Goucher College, have discovered a new topological material which may enable fault-tolerant quantum computing. [25] The central idea of TQC is to encode qubits into states of topological phases of matter (see Collection on Topological Phases). [24] One promising approach to building them involves harnessing nanometer-scale atomic defects in diamond materials. [23] Based on early research involving the storage of movies and documents in DNA, Microsoft is developing an apparatus that uses biology to replace tape drives, researchers at the company say. [22] Our brains are often compared to computers, but in truth, the billions of cells in our bodies may be a better analogy. The squishy sacks of goop may seem a far cry from rigid chips and bundled wires, but cells are experts at taking inputs, running them through a complicated series of logic gates and producing the desired programmed output. [21]
Category: Digital Signal Processing

[255] viXra:1706.0011 [pdf] submitted on 2017-06-02 09:38:09

How to Hack a Quantum Communication Chinese Satellite.

Authors: Ricardo Gil
Comments: 2 Pages.

A rule in Physics that is believed or set is stone is that a quantum satellite can’t be hack. If a Peek can be made to see the spins in a system that is entangled then the entanglement in a Chinese Quantum Satellite can be Peeked at (Active Quantum Measurement Proposal).
Category: Digital Signal Processing

[254] viXra:1705.0208 [pdf] submitted on 2017-05-13 04:18:00

Physics Solutions for Computational Problems

Authors: George Rajna
Comments: 17 Pages.

Researchers from the University of Central Florida and Boston University have developed a novel approach to solve such difficult computational problems more quickly. [29] By precisely measuring the entropy of a cerium copper gold alloy with baffling electronic properties cooled to nearly absolute zero, physicists in Germany and the United States have gleaned new evidence about the possible causes of high-temperature superconductivity and similar phenomena. [28] Physicists have theoretically shown that a superconducting current of electrons can be induced to flow by a new kind of transport mechanism: the potential flow of information. [27] This paper explains the magnetic effect of the superconductive current from the observed effects of the accelerating electrons, causing naturally the experienced changes of the electric field potential along the electric wire. The accelerating electrons explain not only the Maxwell Equations and the Special Relativity, but the Heisenberg Uncertainty Relation, the wave particle duality and the electron's spin also, building the bridge between the Classical and Quantum Theories. The changing acceleration of the electrons explains the created negative electric field of the magnetic induction, the Higgs Field, the changing Relativistic Mass and the Gravitational Force, giving a Unified Theory of the physical forces. Taking into account the Planck Distribution Law of the electromagnetic oscillators also, we can explain the electron/proton mass rate and the Weak and Strong Interactions. Since the superconductivity is basically a quantum mechanical phenomenon and some entangled particles give this opportunity to specific matters, like Cooper Pairs or other entanglements, as strongly correlated materials and Exciton-mediated electron pairing, we can say that the secret of superconductivity is the quantum entanglement.
Category: Digital Signal Processing

[253] viXra:1705.0194 [pdf] submitted on 2017-05-12 04:58:46

Robots Sense of Touch

Authors: George Rajna
Comments: 31 Pages.

Engineering researchers at the University of Minnesota have developed a revolutionary process for 3D printing stretchable electronic sensory devices that could give robots the ability to feel their environment. The discovery is also a major step forward in printing electronics on real human skin. [18] Researchers from France and the University of Arkansas have created an artificial synapse capable of autonomous learning, a component of artificial intelligence. [17] Intelligent machines of the future will help restore memory, mind your children, fetch your coffee and even care for aging parents. [16] Unlike experimental neuroscientists who deal with real-life neurons, computational neuroscientists use model simulations to investigate how the brain functions. [15] A pair of physicists with ETH Zurich has developed a way to use an artificial neural network to characterize the wave function of a quantum many-body system. [14] A team of researchers at Google's DeepMind Technologies has been working on a means to increase the capabilities of computers by combining aspects of data processing and artificial intelligence and have come up with what they are calling a differentiable neural computer (DNC.) In their paper published in the journal Nature, they describe the work they are doing and where they believe it is headed. To make the work more accessible to the public team members, Alexander Graves and Greg Wayne have posted an explanatory page on the DeepMind website. [13] Nobody understands why deep neural networks are so good at solving complex problems. Now physicists say the secret is buried in the laws of physics. [12] A team of researchers working at the University of California (and one from Stony Brook University) has for the first time created a neural-network chip that was built using just memristors. In their paper published in the journal Nature, the team describes how they built their chip and what capabilities it has. [11] A team of researchers used a promising new material to build more functional memristors, bringing us closer to brain-like computing. Both academic and industrial laboratories are working to develop computers that operate more like the human brain. Instead of operating like a conventional, digital system,
Category: Digital Signal Processing

[252] viXra:1705.0189 [pdf] submitted on 2017-05-11 21:28:54

Introduction to Logplex Encoding

Authors: Russell Leidich
Comments: 5 Pages.

Logplex codes are universal codes, that is, bitstrings which map one-to-one to the whole numbers, regardless of the bits which follow them in memory. The codes are dense, in the sense that there is no finite series of bits which does not map to at least one whole number. Their asymptotic efficiency (size out divided by size in) is one, as with Elias omega codes[1], but they have some convient features absent in the latter: Given whole numbers M and N. If (M<N) then (logplex(M)<logplex(N)). This provides for more efficient searching and sorting, as such tasks can be done without the need to allocate separate memory for the corresponding decoded whole numbers. For all nonzero M, M itself is encoded verbatim in the high bits of its logplex. In all cases, the high (last) bit of a logplex is one. Representation of all subparts of logplexes are bitwise little endian. This is in contrast to Elias omega codes, the endianness of the subparts of which are opposite to the expansion direction. Finally, logplexes are scale-agnostic: there is no need to assume that (log 2 M) has any particular maximum value. This feature stems from their recursive structure, which is analogous to that of Elias omega codes.
Category: Digital Signal Processing

[251] viXra:1705.0188 [pdf] submitted on 2017-05-11 21:39:13

Introduction to Agnentropy

Authors: Russell Leidich
Comments: 28 Pages.

Claude Shannon[1] devised a way to quantify the information entropy[2] of a finite integer set, given the probabilities of finding each integer in the set. Information entropy, hereinafter simply "entropy", refers to the number of bits required to encode some such set in a given numerical base (usually binary). Unfortunately, his formula for the "Shannon entropy" seems to have been widely misappropriated as a means by which to measure the entropy of such sets by supplanting the probability coefficients (which are generally unknowable) with the normalized frequencies of the integers as they actually occur in the set. This practice is so common that Shannon entropy is often defined in precisely this manner, and indeed this is how we define it here. However, the inaccuracy induced by this compromise may lead to erroneous conclusions, especially when very short or faint signals are concerned. To make matters worse, the numerical behavior of Shannon entropy formula is rather unstable over large sets, where otherwise it would be more accurate. Herein we introduce the concept of agnentropy, short for "agnostic entropy", in the sense of an entropy metric which begins with almost no assumptions about the set under analysis. (Technically, it's a "divergence" -- essentially a Kullback-Leibler divergence[3] without the implicit singularies -- because it fails the triangle inequality. We refer to it as a "metric" only in the qualitative sense that it measures something.) This stands in stark contrast to the (compromised) Shannon entropy, which presupposes that the frequencies of integers within a given set are already known. In addition to being more accurate when used appropriately, agnentropy is also more numerically stable and faster to compute than Shannon entropy. To be precise, Shannon entropy does not measure the number of bits in an invertibly compressed code. It is, more accurately, an underestimation of that value. Unfortunately, the margin of underestimation is not straightforwardly computable, and has a size O(Z), where Z is the number of unique integers in the set, assuming that said integers are of predetermined maximum size. By contrast, agnentropy underestimates that bit count by no more than 2, plus the size of 2 logplexes. (Logplexes are universal (affine) codes introduced in [8].) In practice, this overhead amounts to tens of bits, as opposed to potentially thousands of bits for Shannon. This difference has meaningful ramifications for the optimization of both lossless and lossy compression algos.
Category: Digital Signal Processing

[250] viXra:1705.0187 [pdf] submitted on 2017-05-11 21:51:26

Introduction to Entropy Transforms

Authors: Russell Leidich
Comments: 34 Pages.

We have at our disposal a wide variety of discrete transforms for the discovery of "interesting" signals in discrete data sets in any number of dimensions, which are of particular utility when the default assumption is that the set is mundane. SETI, the Search for Extraterrestrial Intelligence, is the archetypical case, although problems in drug discovery, malware detection, financial arbitrage, geologic exploration, forensic analysis, and other diverse fields are perpetual clients of such tools. Fundamentally, these include the Fourier, wavelet, curvelet, wave atom, contourlet, brushlet, etc. transforms which have churned out of math departments with increasing frequency since the days of Joseph Fourier. A mountain of optimized applications has been built on top of them, for example the Fastest Fourier Transform in the West[1] and the Wave Atom Toolbox[2]. Such transforms excel at discovering particular classes of signals. So much so that the return on investment in new math would appear to be approaching zero. What's missing, however, is efficiency: the question must be asked as towhen such transforms are computationally justifiable. Herein we investigate a preprocessing technique, abstractly known as an "entropy transform", which, in a wide variety of practical applications, can discern in essentially real time whether or not an "interesting" signal exists within a particular data set. (Entropy transforms say nothing as to the nature of the signal, but merely how interesting a particular subset of the data appears to be.) Entropy transforms have the added advantage that they can also be tuned to behave as crude classifiers -- not as good as their deep learning counterparts, but requiring orders of magnitude less processing power. In applications where identifying many targets with moderate accuracy is more important than identifying a few targets with excellent accuracy, entropy transforms could bridge the gap to product viability. It would be fair to say that in the realm of signal detection, discrete transforms should be the tool of choice because they tend to produce the most accurate and well characterized results. But processor power and execution time are not free! Particularly when, as in the case of SETI, the bottleneck is the rate at which newly acquired data can be processed, a more productive approach would be use to cheap but reasonably accurate O(N) transforms to filter out all but the most surprising subsets of the data. This would reserve processing capacity for those rare weird cases more deserving of closer inspection. I published Agnentro[3], an open-source toolkit for signal search and comparison. The reason, first and foremost, was to support these broad and rather unintuitive assertions with numerical evidence. The goal of this paper is to formalize the underlying math.
Category: Digital Signal Processing

[249] viXra:1705.0157 [pdf] submitted on 2017-05-10 04:48:19

OPRA Technique for M-QAM over Nakagami-m Fading Channel with Imperfect CSI

Authors: Mr. Bhargabjyoti Saikia1, Rupaban Subadar†2
Comments: 12 Pages.

Analysis of an Optimum Power and Rate Adaptation (OPRA) technique has been carried out for Multilevel-Quadrature Amplitude Modulation (M-QAM) over Nakagami-m ?at fading channels considering an imperfect channel estimation at the receiver side. The optimal solution has been derived for a continuous adaptation, which is a specific bound function and not possible to express in close mathematical form. Therefore, a sub-optimal solution is derived for the continuous adaptation and it has been observed that it tends to the optimum solution as the correlation coefficient between the true channel gain and its estimation tends to one. It has been observed that the receiver performance degrades with an increase in estimation error.
Category: Digital Signal Processing

[248] viXra:1705.0006 [pdf] submitted on 2017-05-01 07:33:55

Cloud Storage Services

Authors: George Rajna
Comments: 33 Pages.

Adding to strong recent demonstrations that particles of light perform what Einstein called "spooky action at a distance," in which two separated objects can have a connection that exceeds everyday experience, physicists at the National Institute of Standards and Technology (NIST) have confirmed that particles of matter can act really spooky too. [17] How fast will a quantum computer be able to calculate? While fully functional versions of these long-sought technological marvels have yet to be built, one theorist at the National Institute of Standards and Technology (NIST) has shown that, if they can be realized, there may be fewer limits to their speed than previously put forth. [16] Unlike experimental neuroscientists who deal with real-life neurons, computational neuroscientists use model simulations to investigate how the brain functions. [15] A pair of physicists with ETH Zurich has developed a way to use an artificial neural network to characterize the wave function of a quantum many-body system. [14] A team of researchers at Google's DeepMind Technologies has been working on a means to increase the capabilities of computers by combining aspects of data processing and artificial intelligence and have come up with what they are calling a differentiable neural computer (DNC.) In their paper published in the journal Nature, they describe the work they are doing and where they believe it is headed. To make the work more accessible to the public team members, Alexander Graves and Greg Wayne have posted an explanatory page on the DeepMind website. [13] Nobody understands why deep neural networks are so good at solving complex problems. Now physicists say the secret is buried in the laws of physics. [12]
Category: Digital Signal Processing

[247] viXra:1704.0400 [pdf] submitted on 2017-04-30 08:09:55

Secure Sharing of Personal Health Records in Cloud Using Attribute Based Encryption

Authors: Yogita Vaishnani1, Chintan Patel2, Sunil Vithlani3, Priyank Bhojak4
Comments: 8 Pages.

In emerging world of cloud computing gives wide range of functionalities. Personal Health Record (PHR) enables patients to store, share, and access personal health data in centralized way that it can be accessible from anywhere and anytime. One major problem in the existing work is the cloud to manage and secure data from the unauthorized persons. However, combining of PHR with cloud gives new horizons for medical eldest to be digitalized in centralized storage but it comes with major concern as security. There are many researchers are work in securing PHR which stored in cloud using nave approaches but it’s not enough to secure it. So there is need for new technology as Attribute based Encryption that secure PHR with providing many functionalities such as accountability, revocation of user, searching over encrypted les, delegation of other user access, searching over encrypted les, multi-authority and many more.
Category: Digital Signal Processing

[246] viXra:1704.0346 [pdf] submitted on 2017-04-26 10:26:25

Performance of Computer Components

Authors: George Rajna
Comments: 34 Pages.

NIST scientists have developed a novel automated probe system for evaluating the performance of computer components designed to run 100 times faster than today's best supercomputers and consume as little as Adding to strong recent demonstrations that particles of light perform what Einstein called "spooky action at a distance," in which two separated objects can have a connection that exceeds everyday experience, physicists at the National Institute of Standards and Technology (NIST) have confirmed that particles of matter can act really spooky too. [17] How fast will a quantum computer be able to calculate? While fully functional versions of these long-sought technological marvels have yet to be built, one theorist at the National Institute of Standards and Technology (NIST) has shown that, if they can be realized, there may be fewer limits to their speed than previously put forth. [16] Unlike experimental neuroscientists who deal with real-life neurons, computational neuroscientists use model simulations to investigate how the brain functions. [15] A pair of physicists with ETH Zurich has developed a way to use an artificial neural network to characterize the wave function of a quantum many-body system. [14] A team of researchers at Google's DeepMind Technologies has been working on a means to increase the capabilities of computers by combining aspects of data processing and artificial intelligence and have come up with what they are calling a differentiable neural computer (DNC.) In their paper published in the journal Nature, they describe the work they are doing and where they believe it is headed. To make the work more accessible to the public team members, Alexander Graves and Greg Wayne have posted an explanatory page on the DeepMind website. [13]
Category: Digital Signal Processing

[245] viXra:1704.0267 [pdf] submitted on 2017-04-21 10:15:27

Soft Starter of Single Phase Pump Motor

Authors: Rai Shailesh, Dubey Jayesh, Gupta Ajay
Comments: 2 Pages. Thank You for providing us platform to explore our project idea.

In single-phase induction motor of ratings beyond a certain limit of withstand take very large currents and low powe factor while being started directly from a 1-phase supply. In order to mitigate the adverse effects of starting torque transients and high inrush currents in induction motors, a popular method is to use electronically controlled soft-starting voltages utilizing TRIAC. Normally soft-starters are used for avoiding this problem and to achieve smooth starting of large capacity induction motors. Soft starters use ac voltage controllers to start the induction motor and to adjust its speed. The performance of a voltage controlled large induction motor soft starter has been improved, resulting in nearly perfect current and torque profiles. Soft starters are used as induction motor controllers in compressors, blowers, fans, pumps, mixers, crushers and grinders, and many other applications. Starting torque pulsations are eliminated by triggering back-to-back-connected TRIAC at proper points on the first supply voltage cycle. The soft starter is connected in motor drive during the starting condition only and once the motor get its rated speed then the soft starter is disconnected from the main motor system so that the motor get protected.
Category: Digital Signal Processing

[244] viXra:1704.0251 [pdf] submitted on 2017-04-20 04:18:06

Universal Remote Control

Authors: Sheshmani Yadav, Aditya Asthana, Vishal Jain, Sumit Salunkhe
Comments: 3 Pages.

With most pieces of consumer electronics, from camcorders to stereo equipment, an infrared remote control is always included. Today we all are using mobile phones, and in each mobile devices there is one common communication media through which devices communicate and that common platform is Bluetooth. This Paper connects these two platforms to create a more simplified process to bridge the gap between modern devices.
Category: Digital Signal Processing

[243] viXra:1704.0034 [pdf] submitted on 2017-04-03 17:19:23

From One to Many: Synced Hash-Based Signatures

Authors: Santi J. Vives Maccallini
Comments: 16 Pages.

Hash-based signatures use a one-time signature (OTS) as its main building block, and transform it into a many-times scheme, to sign a larger number of signatures. In known constructions, the cost and the size of each signature increases as the number of needed signatures grows. In real-world applications, requiring a significant number of signatures, the signatures can get quite large. As a result, it is usually believed that post-quantum signatures based on hashes need more computation and much larger sizes than classical signatures. We introduce a construction to challenge that idea: we show that it is possible to construct a many-times signatures scheme that is more efficient than the OTS it is built from, rather than less. We study the generation of signatures in conjunction with a blockchain, like bitcoin. The proposed scheme permits an unlimited number of signatures. The size of each signatures is constant and the same as in the OTS. The verification cost starts the same as in the OTS and decreases with each new signature, becoming more efficient on average as the number of signatures grows. Keywords: many-time signatures, hash, post-quantum cryptography, authentication, blockchain, bitcoin, optimization.
Category: Digital Signal Processing

[242] viXra:1703.0258 [pdf] submitted on 2017-03-27 08:50:44

Quantum Computers Speed Limits

Authors: George Rajna
Comments: 28 Pages.

How fast will a quantum computer be able to calculate? While fully functional versions of these long-sought technological marvels have yet to be built, one theorist at the National Institute of Standards and Technology (NIST) has shown that, if they can be realized, there may be fewer limits to their speed than previously put forth. [16] Unlike experimental neuroscientists who deal with real-life neurons, computational neuroscientists use model simulations to investigate how the brain functions. [15] A pair of physicists with ETH Zurich has developed a way to use an artificial neural network to characterize the wave function of a quantum many-body system. [14] A team of researchers at Google's DeepMind Technologies has been working on a means to increase the capabilities of computers by combining aspects of data processing and artificial intelligence and have come up with what they are calling a differentiable neural computer (DNC.) In their paper published in the journal Nature, they describe the work they are doing and where they believe it is headed. To make the work more accessible to the public team members, Alexander Graves and Greg Wayne have posted an explanatory page on the DeepMind website. [13] Nobody understands why deep neural networks are so good at solving complex problems. Now physicists say the secret is buried in the laws of physics. [12] A team of researchers working at the University of California (and one from Stony Brook University) has for the first time created a neural-network chip that was built using just memristors. In their paper published in the journal Nature, the team describes how they built their chip and what capabilities it has. [11] A team of researchers used a promising new material to build more functional memristors, bringing us closer to brain-like computing. Both academic and industrial laboratories are working to develop computers that operate more like the human brain. Instead of operating like a conventional, digital system, these new devices could potentially function more like a network of neurons. [10] Cambridge Quantum Computing Limited (CQCL) has built a new Fastest Operating System aimed at running the futuristic superfast quantum computers. [9] IBM scientists today unveiled two critical advances towards the realization of a practical quantum computer. For the first time, they showed the ability to detect and measure both kinds of quantum errors simultaneously, as well as demonstrated a new, square quantum bit circuit design that is the only physical architecture that could successfully scale to larger dimensions. [8] Physicists at the Universities of Bonn and Cambridge have succeeded in linking two completely different quantum systems to one another. In doing so, they have taken an important step forward on the way to a quantum computer. To accomplish their feat the researchers used a method that seems to function as well in the quantum world as it does for us people: teamwork. The results have now been published in the "Physical Review Letters". [7] While physicists are continually looking for ways to unify the theory of relativity, which describes large-scale phenomena, with quantum theory, which describes small-scale phenomena, computer scientists are searching for technologies to build the quantum computer. The accelerating electrons explain not only the Maxwell Equations and the Special Relativity, but the Heisenberg Uncertainty Relation, the Wave-Particle Duality and the electron's spin also, building the Bridge between the Classical and Quantum Theories. The Planck Distribution Law of the electromagnetic oscillators explains the electron/proton mass rate and the Weak and Strong Interactions by the diffraction patterns. The Weak Interaction changes the diffraction patterns by moving the electric charge from one side to the other side of the diffraction pattern, which violates the CP and Time reversal symmetry. The diffraction patterns and the locality of the self-maintaining electromagnetic potential explains also the Quantum Entanglement, giving it as a natural part of the Relativistic Quantum Theory and making possible to build the Quantum Computer.
Category: Digital Signal Processing

[241] viXra:1703.0246 [pdf] submitted on 2017-03-26 05:19:39

Magnetic Tunnel Junctions

Authors: George Rajna
Comments: 41 Pages.

For the last two decades, magnetic tunnel junctions (MTJs) have played a central role in spintronic devices such as read heads of hard disk drives and nonvolatile magnetoresistive random access memories (MRAMs), and researchers are constantly working to improve their performance. [24] Magnetic materials are a vital ingredient in the components that store information in computers and mobile phones. Now, A*STAR researchers have developed a material that could help these magnetic-based memory devices to store and retrieve data faster while using less power. [23] A team of researchers with members from institutions in Germany and Israel has developed a way to launch plasmons with controlled amounts of angular momentum using spiral-like structures fashioned into a smooth layer of gold plate. [22] Work at the New York Genome Centre represents a big step towards DNA-based information storage. Andrew Masterson reports. [21] At Caltech, a group of researchers led by Assistant Professor of Bioengineering Lulu Qian is working to create circuits using not the usual silicon transistors but strands of DNA. [20] Researchers have introduced a new type of "super-resolution" microscopy and used it to discover the precise walking mechanism behind tiny structures made of DNA that could find biomedical and industrial applications. [19] Genes tell cells what to do—for example, when to repair DNA mistakes or when to die—and can be turned on or off like a light switch. Knowing which genes are switched on, or expressed, is important for the treatment and monitoring of disease. Now, for the first time, Caltech scientists have developed a simple way to visualize gene expression in cells deep inside the body using a common imaging technology. [18] Researchers at The University of Manchester have discovered that a potential new drug reduces the number of brain cells destroyed by stroke and then helps to repair the damage. [17] Researchers at the University of Connecticut have uncovered new information about how particles behave in our bloodstream, an important advancement that could help pharmaceutical scientists develop more effective cancer drugs. [16]
Category: Digital Signal Processing

[240] viXra:1703.0140 [pdf] submitted on 2017-03-14 09:06:04

Nanologic Computing

Authors: George Rajna
Comments: 30 Pages.

Scientists have built tiny logic machines out of single atoms that operate completely differently than conventional logic devices do. [18] Extremely short, configurable "femtosecond" pulses of light demonstrated by an international team could lead to future computers that run up to 100,000 times faster than today's electronics. [17] Physicists from the Faculty of Physics at the University of Warsaw have developed a holographic atomic memory device capable of generating single photons on demand in groups of several dozen or more. The device, successfully demonstrated in practice, overcomes one of the fundamental obstacles towards the construction of a quantum computer. [16] Random number generators are crucial to the encryption that protects our privacy and security when engaging in digital transactions such as buying products online or withdrawing cash from an ATM. For the first time, engineers have developed a fast random number generator based on a quantum mechanical process that could deliver the world's most secure encryption keys in a package tiny enough to use in a mobile device. [15] Researchers at the University of Rochester have moved beyond the theoretical in demonstrating that an unbreakable encrypted message can be sent with a key that's far shorter than the message—the first time that has ever been done. [14] Quantum physicists have long thought it possible to send a perfectly secure message using a key that is shorter than the message itself. Now they've done it. [13] What once took months by some of the world's leading scientists can now be done in seconds by undergraduate students thanks to software developed at the University of Waterloo's Institute for Quantum Computing, paving the way for fast, secure quantum communication. [12] The artificial intelligence system's ability to set itself up quickly every morning and compensate for any overnight fluctuations would make this fragile technology much more useful for field measurements, said co-lead researcher Dr Michael Hush from UNSW ADFA. [11]
Category: Digital Signal Processing

[239] viXra:1703.0003 [pdf] submitted on 2017-03-01 07:49:59

Computer Grows as Computes

Authors: George Rajna
Comments: 38 Pages.

Researchers from The University of Manchester have shown it is possible to build a new super-fast form of computer that "grows as it computes". [21] At Caltech, a group of researchers led by Assistant Professor of Bioengineering Lulu Qian is working to create circuits using not the usual silicon transistors but strands of DNA. [20] Researchers have introduced a new type of "super-resolution" microscopy and used it to discover the precise walking mechanism behind tiny structures made of DNA that could find biomedical and industrial applications. [19] Genes tell cells what to do—for example, when to repair DNA mistakes or when to die—and can be turned on or off like a light switch. Knowing which genes are switched on, or expressed, is important for the treatment and monitoring of disease. Now, for the first time, Caltech scientists have developed a simple way to visualize gene expression in cells deep inside the body using a common imaging technology. [18] Researchers at The University of Manchester have discovered that a potential new drug reduces the number of brain cells destroyed by stroke and then helps to repair the damage. [17] Researchers at the University of Connecticut have uncovered new information about how particles behave in our bloodstream, an important advancement that could help pharmaceutical scientists develop more effective cancer drugs. [16] For the past 15 years, the big data techniques pioneered by NASA's Jet Propulsion Laboratory in Pasadena, California, have been revolutionizing biomedical research. On Sept. 6, 2016, JPL and the National Cancer Institute (NCI), part of the National Institutes of Health, renewed a research partnership through 2021, extending the development of data science that originated in space exploration and is now supporting new cancer discoveries. [15] IBM scientists have developed a new lab-on-a-chip technology that can, for the first time, separate biological particles at the nanoscale and could enable physicians to detect diseases such as cancer before symptoms appear. [14] Scientists work toward storing digital information in DNA. [13] Leiden theoretical physicists have proven that DNA mechanics, in addition to genetic information in DNA, determines who we are. Helmut Schiessel and his group simulated many DNA sequences and found a correlation between mechanical cues and the way DNA is folded. They have published their results in PLoS One. [12] We model the electron clouds of nucleic acids in DNA as a chain of coupled quantum harmonic oscillators with dipole-dipole interaction between nearest neighbours resulting in a van der Waals type bonding. [11] Scientists have discovered a secret second code hiding within DNA which instructs cells on how genes are controlled. The amazing discovery is expected to open new doors to the diagnosis and treatment of diseases, according to a new study. [10] There is also connection between statistical physics and evolutionary biology, since the arrow of time is working in the biological evolution also. From the standpoint of physics, there is one essential difference between living things and inanimate clumps of carbon atoms: The former tend to be much better at capturing energy from their environment and dissipating that energy as heat. [8] This paper contains the review of quantum entanglement investigations in living systems, and in the quantum mechanically modeled photoactive prebiotic kernel systems. [7] The human body is a constant flux of thousands of chemical/biological interactions and processes connecting molecules, cells, organs, and fluids, throughout the brain, body, and nervous system. Up until recently it was thought that all these interactions operated in a linear sequence, passing on information much like a runner passing the baton to the next runner. However, the latest findings in quantum biology and biophysics have discovered that there is in fact a tremendous degree of coherence within all living systems. The accelerating electrons explain not only the Maxwell Equations and the Special Relativity, but the Heisenberg Uncertainty Relation, the Wave-Particle Duality and the electron’s spin also, building the Bridge between the Classical and Quantum Theories. The Planck Distribution Law of the electromagnetic oscillators explains the electron/proton mass rate and the Weak and Strong Interactions by the diffraction patterns. The Weak Interaction changes the diffraction patterns by moving the electric charge from one side to the other side of the diffraction pattern, which violates the CP and Time reversal symmetry. The diffraction patterns and the locality of the self-maintaining electromagnetic potential explains also the Quantum Entanglement, giving it as a natural part of the Relativistic Quantum Theory and making possible to understand the Quantum Biology.
Category: Digital Signal Processing

[238] viXra:1702.0240 [pdf] submitted on 2017-02-19 04:41:53

A Study on the Effect of Regularization Matrices in Motion Estimation

Authors: Vania Vieira Estrela, A. M. Coelho, Vania V. Estrela
Comments: 21 Pages. Int J Comput Appl. 2012 August 1; 51(19): 17–24. doi:10.5120/8151-1886

Inverse problems are very frequent in computer vision and machine learning applications. Since noteworthy hints can be obtained from motion data, it is important to seek more robust models. The advantages of using a more general regularization matrix such as Λ=diag{λ1,…,λK} to robustify motion estimation instead of a single parameter λ (Λ=λI) are investigated and formally stated in this paper, for the optical flow problem. Intuitively, this regularization scheme makes sense, but it is not common to encounter high-quality explanations from the engineering point of view. The study is further confirmed by experimental results and compared to the nonregularized Wiener filter approach. Int J Comput Appl. 2012 August 1; 51(19): 17–24. doi:10.5120/8151-1886
Category: Digital Signal Processing

[237] viXra:1702.0075 [pdf] submitted on 2017-02-05 10:49:25

Google Quantum Computing

Authors: George Rajna
Comments: 50 Pages.

A team of researchers from Google, the University of the Basque Country, the University of California and IKERBASQUE, Basque Foundation for Science has devised a means for combining the two leading ideas for creating a quantum computer in one machine, offering a possible means for learning more about how to create a true quantum computer sometime in the future. [31] When future users of quantum computers need to analyze their data or run quantum algorithms, they will often have to send encrypted information to the computer. [30] Quantum systems were believed to provide perfectly secure data transmission because until now, attempts to copy the transmitted information resulted in an altered or deteriorated version of the original information, thereby defeating the purpose of the initial hack. [29] Researchers have developed a new type of light-enhancing optical cavity that is only 200 nanometers tall and 100 nanometers across. Their new nanoscale system represents a step toward brighter single-photon sources, which could help propel quantum-based encryption and a truly secure and future-proofed network. [28] Researchers at Tohoku University have, for the first time, successfully demonstrated the basic operation of spintronics-based artificial intelligence. [27] The neural structure we use to store and process information in verbal working memory is more complex than previously understood, finds a new study by researchers at New York University. [26] Surviving breast cancer changed the course of Regina Barzilay's research. The experience showed her, in stark relief, that oncologists and their patients lack tools for data-driven decision making. [25] New research, led by the University of Southampton, has demonstrated that a nanoscale device, called a memristor, could be used to power artificial systems that can mimic the human brain. [24] Scientists at Helmholtz-Zentrum Dresden-Rossendorf conducted electricity through DNA-based nanowires by placing gold-plated nanoparticles on them. In this way it could become possible to develop circuits based on genetic material. [23]
Category: Digital Signal Processing

[236] viXra:1702.0074 [pdf] submitted on 2017-02-05 11:18:47

Quantum Fredkin Gate

Authors: George Rajna
Comments: 51 Pages.

Researchers from Griffith University and the University of Queensland have overcome one of the key challenges to quantum computing by simplifying a complex quantum logic operation. They demonstrated this by experimentally realising a challenging circuit—the quantum Fredkin gate—for the first time. [32] A team of researchers from Google, the University of the Basque Country, the University of California and IKERBASQUE, Basque Foundation for Science has devised a means for combining the two leading ideas for creating a quantum computer in one machine, offering a possible means for learning more about how to create a true quantum computer sometime in the future. [31] When future users of quantum computers need to analyze their data or run quantum algorithms, they will often have to send encrypted information to the computer. [30] Quantum systems were believed to provide perfectly secure data transmission because until now, attempts to copy the transmitted information resulted in an altered or deteriorated version of the original information, thereby defeating the purpose of the initial hack. [29] Researchers have developed a new type of light-enhancing optical cavity that is only 200 nanometers tall and 100 nanometers across. Their new nanoscale system represents a step toward brighter single-photon sources, which could help propel quantum-based encryption and a truly secure and future-proofed network. [28] Researchers at Tohoku University have, for the first time, successfully demonstrated the basic operation of spintronics-based artificial intelligence. [27] The neural structure we use to store and process information in verbal working memory is more complex than previously understood, finds a new study by researchers at New York University. [26] Surviving breast cancer changed the course of Regina Barzilay's research. The experience showed her, in stark relief, that oncologists and their patients lack tools for data-driven decision making. [25] New research, led by the University of Southampton, has demonstrated that a nanoscale device, called a memristor, could be used to power artificial systems that can mimic the human brain. [24]
Category: Digital Signal Processing

[235] viXra:1702.0071 [pdf] submitted on 2017-02-05 09:58:15

Encrypted and Unencrypted Inputs

Authors: George Rajna
Comments: 49 Pages.

When future users of quantum computers need to analyze their data or run quantum algorithms, they will often have to send encrypted information to the computer. [30] Quantum systems were believed to provide perfectly secure data transmission because until now, attempts to copy the transmitted information resulted in an altered or deteriorated version of the original information, thereby defeating the purpose of the initial hack. [29] Researchers have developed a new type of light-enhancing optical cavity that is only 200 nanometers tall and 100 nanometers across. Their new nanoscale system represents a step toward brighter single-photon sources, which could help propel quantum-based encryption and a truly secure and future-proofed network. [28] Researchers at Tohoku University have, for the first time, successfully demonstrated the basic operation of spintronics-based artificial intelligence. [27] The neural structure we use to store and process information in verbal working memory is more complex than previously understood, finds a new study by researchers at New York University. [26] Surviving breast cancer changed the course of Regina Barzilay's research. The experience showed her, in stark relief, that oncologists and their patients lack tools for data-driven decision making. [25] New research, led by the University of Southampton, has demonstrated that a nanoscale device, called a memristor, could be used to power artificial systems that can mimic the human brain. [24] Scientists at Helmholtz-Zentrum Dresden-Rossendorf conducted electricity through DNA-based nanowires by placing gold-plated nanoparticles on them. In this way it could become possible to develop circuits based on genetic material. [23] Researchers at the Nanoscale Transport Physics Laboratory from the School of Physics at the University of the Witwatersrand have found a technique to improve carbon superlattices for quantum electronic device applications. [22] The researchers have found that these previously underestimated interactions can play a significant role in preventing heat dissipation in microelectronic devices. [21]
Category: Digital Signal Processing

[234] viXra:1702.0062 [pdf] submitted on 2017-02-04 05:37:17

Protecting Quantum Computing Networks

Authors: George Rajna
Comments: 48 Pages.

Quantum systems were believed to provide perfectly secure data transmission because until now, attempts to copy the transmitted information resulted in an altered or deteriorated version of the original information, thereby defeating the purpose of the initial hack. [29] Researchers have developed a new type of light-enhancing optical cavity that is only 200 nanometers tall and 100 nanometers across. Their new nanoscale system represents a step toward brighter single-photon sources, which could help propel quantum-based encryption and a truly secure and future-proofed network. [28] Researchers at Tohoku University have, for the first time, successfully demonstrated the basic operation of spintronics-based artificial intelligence. [27] The neural structure we use to store and process information in verbal working memory is more complex than previously understood, finds a new study by researchers at New York University. [26] Surviving breast cancer changed the course of Regina Barzilay's research. The experience showed her, in stark relief, that oncologists and their patients lack tools for data-driven decision making. [25] New research, led by the University of Southampton, has demonstrated that a nanoscale device, called a memristor, could be used to power artificial systems that can mimic the human brain. [24] Scientists at Helmholtz-Zentrum Dresden-Rossendorf conducted electricity through DNA-based nanowires by placing gold-plated nanoparticles on them. In this way it could become possible to develop circuits based on genetic material. [23] Researchers at the Nanoscale Transport Physics Laboratory from the School of Physics at the University of the Witwatersrand have found a technique to improve carbon superlattices for quantum electronic device applications. [22] The researchers have found that these previously underestimated interactions can play a significant role in preventing heat dissipation in microelectronic devices. [21]
Category: Digital Signal Processing

[233] viXra:1702.0029 [pdf] submitted on 2017-02-02 12:29:37

Data Transfer Efficiency Record

Authors: George Rajna
Comments: 38 Pages.

Researchers at the Department of Energy's Oak Ridge National Laboratory have set a new record in the transfer of information via superdense coding, a process by which the properties of particles like photons, protons and electrons are used to store as much information as possible. [27] An international team, led by a scientist from the University of Sussex, have today unveiled the first practical blueprint for how to build a quantum computer, the most powerful computer on Earth. [26] Data centers are the central point of many, if not most, information systems today, but the masses of wires interconnecting the servers and piled high on racks begins to resemble last year's tangled Christmas-tree lights disaster. Now a team of engineers is proposing to eliminate most of the wires and substitute infrared free-space optics for communications. [25] Characterising quantum channels with non-separable states of classical light the researchers demonstrate the startling result that sometimes Nature cannot tell the difference between particular types of laser beams and quantum entangled photons. [24] Physicists at Princeton University have revealed a device they've created that will allow a single electron to transfer its quantum information to a photon. [23] A strong, short light pulse can record data on a magnetic layer of yttrium iron garnet doped with Co-ions. This was discovered by researchers from Radboud University in the Netherlands and Bialystok University in Poland. The novel mechanism outperforms existing alternatives, allowing the fastest read-write magnetic recording accompanied by unprecedentedly low heat load. [22] It goes by the unwieldy acronym STT-MRAM, which stands for spin-transfer torque magnetic random access memory. [21] Memory chips are among the most basic components in computers. The random access memory is where processors temporarily store their data, which is a crucial function. Researchers from Dresden and Basel have now managed to lay the foundation for a new memory chip concept. [20] Researchers have built a record energy-efficient switch, which uses the interplay of electricity and a liquid form of light, in semiconductor microchips. The device could form the foundation of future signal processing and information technologies, making electronics even more efficient. [19]
Category: Digital Signal Processing

[232] viXra:1702.0004 [pdf] submitted on 2017-02-01 05:38:01

Simplify Data Center Communications

Authors: George Rajna
Comments: 25 Pages.

Data centers are the central point of many, if not most, information systems today, but the masses of wires interconnecting the servers and piled high on racks begins to resemble last year's tangled Christmas-tree lights disaster. Now a team of engineers is proposing to eliminate most of the wires and substitute infrared free-space optics for communications. [25] Characterising quantum channels with non-separable states of classical light the researchers demonstrate the startling result that sometimes Nature cannot tell the difference between particular types of laser beams and quantum entangled photons. [24] Physicists at Princeton University have revealed a device they've created that will allow a single electron to transfer its quantum information to a photon. [23] A strong, short light pulse can record data on a magnetic layer of yttrium iron garnet doped with Co-ions. This was discovered by researchers from Radboud University in the Netherlands and Bialystok University in Poland. The novel mechanism outperforms existing alternatives, allowing the fastest read-write magnetic recording accompanied by unprecedentedly low heat load. [22] It goes by the unwieldy acronym STT-MRAM, which stands for spin-transfer torque magnetic random access memory. [21] Memory chips are among the most basic components in computers. The random access memory is where processors temporarily store their data, which is a crucial function. Researchers from Dresden and Basel have now managed to lay the foundation for a new memory chip concept. [20] Researchers have built a record energy-efficient switch, which uses the interplay of electricity and a liquid form of light, in semiconductor microchips. The device could form the foundation of future signal processing and information technologies, making electronics even more efficient. [19] The magnetic structure of a skyrmion is symmetrical around its core; arrows indicate the direction of spin. [18] According to current estimates, dozens of zettabytes of information will be stored electronically by 2020, which will rely on physical principles that facilitate the use of single atoms or molecules as basic memory cells. [17] EPFL scientists have developed a new perovskite material with unique properties that can be used to build next-generation hard drives. [16]
Category: Digital Signal Processing

[231] viXra:1701.0542 [pdf] submitted on 2017-01-19 08:52:21

Magnetic Recording with Light

Authors: George Rajna
Comments: 31 Pages.

A strong, short light pulse can record data on a magnetic layer of yttrium iron garnet doped with Co-ions. This was discovered by researchers from Radboud University in the Netherlands and Bialystok University in Poland. The novel mechanism outperforms existing alternatives, allowing the fastest read-write magnetic recording accompanied by unprecedentedly low heat load. [22] It goes by the unwieldy acronym STT-MRAM, which stands for spin-transfer torque magnetic random access memory. [21] Memory chips are among the most basic components in computers. The random access memory is where processors temporarily store their data, which is a crucial function. Researchers from Dresden and Basel have now managed to lay the foundation for a new memory chip concept. [20] Researchers have built a record energy-efficient switch, which uses the interplay of electricity and a liquid form of light, in semiconductor microchips. The device could form the foundation of future signal processing and information technologies, making electronics even more efficient. [19] The magnetic structure of a skyrmion is symmetrical around its core; arrows indicate the direction of spin. [18] According to current estimates, dozens of zettabytes of information will be stored electronically by 2020, which will rely on physical principles that facilitate the use of single atoms or molecules as basic memory cells. [17] EPFL scientists have developed a new perovskite material with unique properties that can be used to build next-generation hard drives. [16] Scientists have fabricated a superlattice of single-atom magnets on graphene with a density of 115 terabits per square inch, suggesting that the configuration could lead to next-generation storage media. [15] Now a researcher and his team at Tyndall National Institute in Cork have made a 'quantum leap' by developing a technical step that could enable the use of quantum computers sooner than expected. [14] A method to produce significant amounts of semiconducting nanoparticles for light-emitting displays, sensors, solar panels and biomedical applications has gained momentum with a demonstration by researchers at the Department of Energy's Oak Ridge National Laboratory. [13] A source of single photons that meets three important criteria for use in quantum-information systems has been unveiled in China by an international team of physicists. Based on a quantum dot, the device is an efficient source of photons that emerge as solo particles that are indistinguishable from each other. The researchers are now trying to use the source to create a quantum computer based on "boson sampling". [11] With the help of a semiconductor quantum dot, physicists at the University of Basel have developed a new type of light source that emits single photons. For the first time, the researchers have managed to create a stream of identical photons. [10] Optical photons would be ideal carriers to transfer quantum information over large distances. Researchers envisage a network where information is processed in certain nodes and transferred between them via photons. [9] While physicists are continually looking for ways to unify the theory of relativity, which describes large-scale phenomena, with quantum theory, which describes small-scale phenomena, computer scientists are searching for technologies to build the quantum computer using Quantum Information. In August 2013, the achievement of "fully deterministic" quantum teleportation, using a hybrid technique, was reported. On 29 May 2014, scientists announced a reliable way of transferring data by quantum teleportation. Quantum teleportation of data had been done before but with highly unreliable methods. The accelerating electrons explain not only the Maxwell Equations and the Special Relativity, but the Heisenberg Uncertainty Relation, the Wave-Particle Duality and the electron’s spin also, building the Bridge between the Classical and Quantum Theories. The Planck Distribution Law of the electromagnetic oscillators explains the electron/proton mass rate and the Weak and Strong Interactions by the diffraction patterns. The Weak Interaction changes the diffraction patterns by moving the electric charge from one side to the other side of the diffraction pattern, which violates the CP and Time reversal symmetry. The diffraction patterns and the locality of the self-maintaining electromagnetic potential explains also the Quantum Entanglement, giving it as a natural part of the Relativistic Quantum Theory and making possible to build the Quantum Computer with the help of Quantum Information.
Category: Digital Signal Processing

[230] viXra:1701.0332 [pdf] submitted on 2017-01-08 22:39:04

An Enhanced Ssvep Bci Application Through Emotion: Preliminary Results

Authors: Hadi Oqaibi, Anas Fattouh
Comments: 10 Pages. International Journal of Innovative Research in Computer and Communication Engineering

Steady-state visual evoked potential (SSVEP) is a well-established paradigm of brain-computer interface (BCI) where the interaction between the user and a controlled device is achieved via brainwave activities and visual stimuli. Although SSVEP-based BCIs are known to have high information transfer rate (ITR), wrong feedback reduces the performance of these applications. In this paper, we investigate the possibility of enhancing SSVEP -based BCI applications by incorporating the user’s emotions. To this end, an SSVEP-based BCI application is designed and implemented where the user has to steer a simulated car moving through a maze to reach a target position. Using standard flickering checkerboards, the user has to select one of two commands, turn right or turn left. After each selection, a visual virtual feedback is shown and the emotional state of the user is estimated from recorded electroencephalogram (EEG) brain activities. This estimated emotion could be used to automatically confirm or cancel the selected command and therefore improve the quality of executed commands.
Category: Digital Signal Processing

[229] viXra:1701.0304 [pdf] submitted on 2017-01-06 12:53:44

New Memory Technology

Authors: George Rajna
Comments: 29 Pages.

It goes by the unwieldy acronym STT-MRAM, which stands for spin-transfer torque magnetic random access memory. [21] Memory chips are among the most basic components in computers. The random access memory is where processors temporarily store their data, which is a crucial function. Researchers from Dresden and Basel have now managed to lay the foundation for a new memory chip concept. [20] Researchers have built a record energy-efficient switch, which uses the interplay of electricity and a liquid form of light, in semiconductor microchips. The device could form the foundation of future signal processing and information technologies, making electronics even more efficient. [19] The magnetic structure of a skyrmion is symmetrical around its core; arrows indicate the direction of spin. [18] According to current estimates, dozens of zettabytes of information will be stored electronically by 2020, which will rely on physical principles that facilitate the use of single atoms or molecules as basic memory cells. [17] EPFL scientists have developed a new perovskite material with unique properties that can be used to build next-generation hard drives. [16] Scientists have fabricated a superlattice of single-atom magnets on graphene with a density of 115 terabits per square inch, suggesting that the configuration could lead to next-generation storage media. [15] Now a researcher and his team at Tyndall National Institute in Cork have made a 'quantum leap' by developing a technical step that could enable the use of quantum computers sooner than expected. [14] A method to produce significant amounts of semiconducting nanoparticles for light-emitting displays, sensors, solar panels and biomedical applications has gained momentum with a demonstration by researchers at the Department of Energy's Oak Ridge National Laboratory. [13] A source of single photons that meets three important criteria for use in quantum-information systems has been unveiled in China by an international team of physicists. Based on a quantum dot, the device is an efficient source of photons that emerge as solo particles that are indistinguishable from each other. The researchers are now trying to use the source to create a quantum computer based on "boson sampling". [11]
Category: Digital Signal Processing

[228] viXra:1612.0241 [pdf] submitted on 2016-12-14 04:16:34

Ds-Bidens: a Novel Computer Program for Studying Bacterial Colony Features

Authors: Enrique Marcet, Manuel Medell-Gago
Comments: 4 Pages.

Optical forward-scattering systems supported by image analysis methods are increasingly being used for rapid identification of bacterial colonies (Vibrio parahaemolyticus, Vibrio vulnificus, Vibrio cholera, etc.). The conventional detection and identification of bacterial colonies comprises a variety of methodologies based on biochemical, serological or DNA/RNA characterization. Such methods involve laborious and time-consuming procedures in order to achieve confirmatory results. In this article we present ds-Bidens, a novel software for studying bacterial colony features. The software ds-Bidens was programmed using C++, Perl and wxBasic programming languages. A graphical user interface (GUI), an image processing tool and functions to compute bacterial colony features were programmed. We obtained versatile software that provides key tools for studying bacterial colony images as: texture analysis, invariant moment and color (CIELab) calculation, etc., simplifying operations previously carried out by MATLAB applications. The new software can be of particular interest in fields of microbiology, both for bacterial colonies identification and the study of their growth, changes in color and textural features. Additionally ds-Bidens offers to the users a versatile environment to study bacterial colonies images. ds-Bidens is freely available from: http://ds-bidens.sourceforge.net/
Category: Digital Signal Processing

[227] viXra:1612.0046 [pdf] submitted on 2016-12-03 23:58:49

Method of Organizing Occ Wireless Computer Network

Authors: Andrey I. Bodrenko
Comments: 4 Pages.

Method of organizing OCC (Optical Camera Communications) wireless computer network is considered.
Category: Digital Signal Processing

[226] viXra:1611.0350 [pdf] submitted on 2016-11-26 06:49:17

Single-Molecule Graphene Switches

Authors: George Rajna
Comments: 22 Pages.

Researchers have discovered how to control molecules attached to graphene, paving the way for tiny biological sensors and devices to hold information. [17] Scientists at the University of Sussex have invented a groundbreaking new method that puts the construction of large-scale quantum computers within reach of current technology. [16] Physicists at the University of Bath have developed a technique to more reliably produce single photons that can be imprinted with quantum information. [15] Now a researcher and his team at Tyndall National Institute in Cork have made a 'quantum leap' by developing a technical step that could enable the use of quantum computers sooner than expected. [14] A method to produce significant amounts of semiconducting nanoparticles for light-emitting displays, sensors, solar panels and biomedical applications has gained momentum with a demonstration by researchers at the Department of Energy's Oak Ridge National Laboratory. [13] A source of single photons that meets three important criteria for use in quantum-information systems has been unveiled in China by an international team of physicists. Based on a quantum dot, the device is an efficient source of photons that emerge as solo particles that are indistinguishable from each other. The researchers are now trying to use the source to create a quantum computer based on "boson sampling". [11] With the help of a semiconductor quantum dot, physicists at the University of Basel have developed a new type of light source that emits single photons. For the first time, the researchers have managed to create a stream of identical photons. [10] Optical photons would be ideal carriers to transfer quantum information over large distances. Researchers envisage a network where information is processed in certain nodes and transferred between them via photons. [9] While physicists are continually looking for ways to unify the theory of relativity, which describes large-scale phenomena, with quantum theory, which describes small-scale phenomena, computer scientists are searching for technologies to build the quantum computer using Quantum Information. In August 2013, the achievement of "fully deterministic" quantum teleportation, using a hybrid technique, was reported. On 29 May 2014, scientists announced a reliable way of transferring data by quantum teleportation. Quantum teleportation of data had been done before but with highly unreliable methods. The accelerating electrons explain not only the Maxwell Equations and the Special Relativity, but the Heisenberg Uncertainty Relation, the Wave-Particle Duality and the electron's spin also, building the Bridge between the Classical and Quantum Theories. The Planck Distribution Law of the electromagnetic oscillators explains the electron/proton mass rate and the Weak and Strong Interactions by the diffraction patterns. The Weak Interaction changes the diffraction patterns by moving the electric charge from one side to the other side of the diffraction pattern, which violates the CP and Time reversal symmetry. The diffraction patterns and the locality of the self-maintaining electromagnetic potential explains also the Quantum Entanglement, giving it as a natural part of the Relativistic Quantum Theory and making possible to build the Quantum Computer with the help of Quantum Information.
Category: Digital Signal Processing

[225] viXra:1610.0330 [pdf] submitted on 2016-10-27 10:47:50

Method for Organizing Wireless Computer Network in Chemical System

Authors: Andrey I. Bodrenko
Comments: 7 Pages.

Method for organizing wireless computer network in chemical system. This invention relates to physical chemistry and computer technology. The nodes of this network are computers with connected chemical feed systems set up to feed substances into the chemical system and online chemical analyzers set up to conduct the chemical analysis of the substance located in the chemical system and register the results of chemical analysis of the substance located in the chemical system. The invention is method for organizing wireless computer network in chemical system, comprising the fact that the transmission of electronic messages from one node to another node of this network is produced through communication channel of this wireless network, created in the chemical system which is organized by connecting a source computer to the chemical feed system, feeding substances into the chemical system by means of the operation of the chemical feed system in accordance with the finite sequence of settings modes of chemical feed system representing electronic message transmitted from the source computer and which is received from the source computer, and by connecting to the receiving computer an online chemical analyzer by which the chemical analysis of the substance located in the chemical system is conducted and the results of chemical analysis of the substance located in the chemical system are registered, and through which, on the receiving computer, the results of registration of the results of chemical analysis of the substance located in the chemical system are received, and the electronic message is restored from the results of registration of the results of chemical analysis of the substance located in the chemical system. In addition, each node of this wireless computer network confer capabilities to receive electronic messages through the connected online chemical analyzer from another node of this wireless network, and transmit electronic messages through the connected chemical feed system to another node of this wireless computer network through communication channels of this wireless computer network, in chemical system. The technical result of this invention is that the radio systems are not used in each wireless communication channel of this wireless computer network in the chemical system. This article is identical to the patent application ”Method for organizing wireless computer network in chemical system” with number: 2015113357, which was published in Russian and filed at Russian Patent Office: Federal Institute For Intellectual Property, Federal Service For Intellectual Property (Rospatent), Russian Federation.
Category: Digital Signal Processing

[224] viXra:1610.0290 [pdf] submitted on 2016-10-24 11:44:28

Unbalanced Winternitz Signatures (Draft)

Authors: Santi J. Vives Maccallini
Comments: 8 Pages.

We introduce 'uwots' (unbalanced Winternitz one-time signatures): an optimized, tweakable generalization of the Winternitz signature scheme.
Category: Digital Signal Processing

[223] viXra:1610.0287 [pdf] submitted on 2016-10-24 13:00:19

Integer Composition Signatures (Draft)

Authors: Santi J. Vives Maccallini
Comments: 11 Pages.

We introduce integer composition signatures (ic): a hash-based family of one-time signatures. The family shows improvements over previous schemes like Winternitz: less costly/shorter signatures, verification in constant time, and tweakable parameters allowing optimization for either signing/verifying.
Category: Digital Signal Processing

[222] viXra:1610.0219 [pdf] submitted on 2016-10-18 23:34:17

Smart Home Realization Through Wireless Communication System

Authors: Krishn Kumar Gupt, Rabindranath Bera, Debasish Bhaskar, Preman Chettri, Debduhita Bose
Comments: 14 Pages.

Over the few decades, the Communication Technology has evolved surprisingly. The data rate, the reliability and multiple access supported by wireless digital communication are very interesting. Accessibility of worldwide information from a remote area via digital signals is not less than any boon for human beings. Receiving information from a far satellite at home at TV screen via STB gave a new dimension to the entertainment world. This success story is further leading to the next generation (G) Internet of Thing (IoT) services for Global communication and M2M (Machine to Machine) communication. With the recent innovation in satellite communication, our Homes are getting SMART. Homes will be blessed by satellite based IoT at very low cost. IoT services will be provided by Satellite, 5G mobile and other competitive technologies. These technologies will enable us to get live interaction via smart devices of our smart home, to control and access our home appliances from anywhere throughout the world with its ubiquitous features. Transmission and Reception of signals from Home to Satellite via DVB-S2 and Indoor distribution of signals via Wi-Fi n within rooms of the Smart Homes is the basic concept behind this idea. Uplink from home will be introduced soon with help of smart LNB using Millimeter wave RF carrier of 30 GHz. This paper presents a cloud centric vision for implementation of IOT services in Smart Homes. DVB-S2 Transmitter, DVB-S2 Receiver and Wi-Fi n with input signal is analyzed on Agilent SystemVue and then synchronized with Agilent Vector Signal Analyzer (VSA) to check and verify the Output Response of the designed Smart Home system.
Category: Digital Signal Processing

[221] viXra:1610.0089 [pdf] submitted on 2016-10-07 22:07:09

A Crack Method, on the BB84 Protocol

Authors: LI WeiGang
Comments: 6 Pages.

The article is a combination of the following BB84 protocol communication schematic diagram , brief description of the protocol for the crack method.
Category: Digital Signal Processing

[220] viXra:1610.0046 [pdf] submitted on 2016-10-04 15:21:33

A Methodology for the Analysis of Thin Clients

Authors: Laura Amelf
Comments: 6 Pages. It's very well-written

Looking at thin clients.
Category: Digital Signal Processing

[219] viXra:1610.0041 [pdf] submitted on 2016-10-04 12:31:48

Method for Organizing Wireless Computer Network in Biological Tissue

Authors: Andrey I. Bodrenko
Comments: 6 Pages.

Method for organizing wireless computer network in biological tissue. This invention relates to computer technology and biophysics, and can be used for the establishment and operation of a wireless computer network in biological tissue. The nodes of this network are computers connected to the vibration meters and vibration generators. The contact surfaces of vibration generators and vibration meters are brought into contact with the biological tissue. The invention is method for organizing wireless computer network in biological tissue, comprising the fact that the transmission of electronic messages from one node to another node of this network is produced through communication channel of this wireless network, created in the biological tissue which is organized by connecting a source computer to the vibration generator, bringing the contact surface of the vibration generator in contact with the biological tissue, creating and transferring the controlled mechanical motions to the biological tissue through the contact surface of the vibration generator by means of the operation of the vibration generator in accordance with the finite sequence of settings modes of vibration generator representing electronic message transmitted from the source computer and which is received from the source computer, and by connecting to the receiving computer a vibration meter by which the parameters of mechanical motions are registered and which are received by the vibration meter from biological tissue through the contact surface of the vibration meter which is brought into contact with the biological tissue, and through which, on the receiving computer, the results of registration of parameters of mechanical motions are received, and the electronic message is restored from the results of registration of mechanical motions parameters. In addition, each node of this wireless computer network confer capabilities to receive electronic messages through the connected vibration meter from another node of this wireless computer network, and transmit electronic messages through the connected vibration generator to another node of this wireless computer network through communication channels of this wireless computer network, through biological tissue. The technical result is that the radio systems are not used in each wireless communication channel of this wireless computer network in the biological tissue.
Category: Digital Signal Processing

[218] viXra:1609.0251 [pdf] submitted on 2016-09-17 06:02:30

Evolution of Modern Communication Systems

Authors: Krishn Kumar Gupt, Vinay Kumar Singh
Comments: 6 Pages.

Modern communications technology revolutionized the way, mobility and efficiency of electronic communications. Starting from with Alexander Graham Bells’ telephone experiments to widely practiced W-CDMA network and the nearly achieved 4G mode of communications, all had and will have great contributions in today’s voice/data network arena. Wireless technology has achieved evolutionary success aiming at unified target: efficiency, performance and feasibility in high mobile environment. The mobile experience is expanding everywhere fulfilling the basic electronic communication needs. The first generation (1G) was analog. 1G established seamless mobile connectivity used for basic mobile voice until being replaced by the second generation (2G) digital telecommunications technologies which increased voice capacity delivering mobile to the masses with network infrastructure supporting text messaging. The success of digital voice and simple data prompted to the development of cellular wireless communication system with improved data connectivity and more accessible features leads to followed by the third generation (3G). Third generation system having mobile optimization for data enabling mobile broadband services with better and higher speed of data transfer and connectivity. The fourth generation (4G) having more capacity for faster and better wireless mobile broadband experiences with accessing capability to wide range of communication services, including advanced mobile services, and enhancement in the quality of services with increase in the bandwidth. In this paper we address the evolution of wireless modern mobile communication systems, from first generation (1G) to the widely practiced third generation (3G), recently introduced fourth generation (4G) and some glimpse of foreseeable future of fifth generation (5G).
Category: Digital Signal Processing

[217] viXra:1609.0019 [pdf] submitted on 2016-09-01 23:12:12

Recognition and Tracking Analytics for Crowd Control

Authors: Abbad Vakil, Saransh Kacharia, Brian Liao, Haytham Shaban, Ibrahim Mohiuddin
Comments: 15 Pages.

We explore and apply methods of image analization in several forms in order to monitor the condition and health of a crowd. Stampedes, congestion, and traffic all occur as a result of inefficient crowd management. Our software identifies congested areas and determines solutions to avoid congestion based on live data. The data is then processed by a local device which is fed via camera. This method was tested in simulation and proved to create a more efficient and congestion-free scenario. Future plans include depth sensing for automatic calibration and suggested course of action.
Category: Digital Signal Processing

[216] viXra:1608.0223 [pdf] submitted on 2016-08-20 07:45:46

Computational Fluid Dynamic Analysis of Aircraft Wing with Assorted Flap Angles at Cruising Speed

Authors: G Sai Rahul, A Dilipy, Rajeev Raushanz
Comments: 9 Pages.

An aircraft wing is actually manufactured by the composite materials with the fibre angled in every ply aligned in multi- direction. Dissimilar thickness of the airfoil and layer directions were almost taken to study the result of bending-torsion. These laminated features are usually designed using the different layers, sequence of stacking, geometrical and mechanical properties. Finite number of layers can be integrated to form many laminates, The wing loading was due to its self-weight and weight of other propulsion systems or due to acceleration due to gravity was deliberated and the deflection over here can be found, this actually studied by aero elasticity. The aircraft wing is severely affected by the loads on along wing direction or vertical direction.NACA 2412 airfoil was taken for designing wing, and it was scaled through a profile with a calculated wingspan to obtain wing model. FLUENT and CFX were used for computational fluid dynamic analysis to determine the lift and drag for wing during zero degreed flaps and angled flaps. By this we intend to show how fast retraction flaps effects the drag and lift of aircraft at cruising speed.
Category: Digital Signal Processing

[215] viXra:1608.0077 [pdf] submitted on 2016-08-07 23:21:52

The Solitary Chaos

Authors: Sai Venkatesh Balasubramanian
Comments: 3 Pages.

nk 404, shriram surabhi, mallasandra, bayanapalyaThe present article demonstrates the generation of signal based chaos by generating the engineer’s chaos as a product of sinusoids and then wave-shaping them by hyperbolic secant (soliton) or tangent (taliton) functions. The frequency ratio of the input sinusoids serves as the control parameter, and the nature of chaos is studied by observing the iterative map, bifurcation plots and phase portraits. While the phase portraits show interesting and rich patterns, the spectrum shows the new frequency components generated, thanks to the nonlinear wave-shaping.
Category: Digital Signal Processing

[214] viXra:1608.0038 [pdf] submitted on 2016-08-04 00:40:18

Dense Communications Using the Engineer’s Chaos

Authors: Sai Venkatesh Balasubramanian
Comments: 7 Pages.

With the central focus on a broadened perspective of chaos, this article introduces the concept of the engineer’s chaos, characterized by determinism, aperiodicity and sensitive dependence on initial conditions, and exhibiting a marked deviation from conventional chaotic systems by possessing a signal based control parameter. It is seen that multiplying two sinusoidal signals, the simplest possible nonlinear operation generates the engineer’s chaos with the frequency ratio of the two signals acting as the control parameter. The nature of the chaos is observed using iterative map and bifurcation plot. Following this, an application of the engineer’s chaos to dense communications is demonstrated using a proof-of-concept, where the two chaos generating signals are amplitude modulated before multiplying, and transmitted over a channel represented as a Additive White Gaussian Noise of 18dB. The ability to receive and demodulate the signals with reasonable accuracy highlights the capabilities of the engineer’s chaos. The demonstration proves how the engineer’s chaos, the result of a broadened perspective on chaos yields triple advantages of minimalist and simple design, increased information carrying capacity, and security inherent to the sensitivity of chaos.
Category: Digital Signal Processing

[213] viXra:1607.0469 [pdf] submitted on 2016-07-25 01:00:22

Design of Carry Select Adder using Binary to Excess-3 Converter in VHDL

Authors: Brijesh Kumar, Mamta Kulkarni
Comments: 4 Pages. International Conference on Electrical, Electronics and Instrumentation Engineering Vol. 1 (2016) p. 114 - 117

This paper presents a modified design of Area-Efficient Low power Carry Select Adder (CSLA) Circuit. In digital adders, the speed of addition is limited by the time required to transmit a carry through the adder. Carry select adder processors and systems. In digital adders, the speed of addition is limited by the time required to propagate a carry through the adder. The sum for each bit position in an elementary adder is generated sequentially only after the previous bit position has been summed and a carry propagated into the next position. The major speed limitation in any adder is in the production of carries.
Category: Digital Signal Processing

[212] viXra:1607.0107 [pdf] submitted on 2016-07-08 17:30:42

Analog Computer Understanding of Hamiltonian Paths, and a Possible Digitization

Authors: Bryce Kim
Comments: 17 Pages.

This paper explores finding existence of undirected hamiltonian paths in a graph using lumped/ideal circuits, specifically low-pass filters. While other alternatives are possible, a first-order RC low-pass filter is chosen to describe the process. The paper proposes a way of obtaining time complexity for counting the number of hamiltonian paths in a graph, and then shows that the time complexity of the circuits is around $O(n \log n)$ where $n$ is the number of vertices in a graph. Because analog computation is often undesirable due to several aspects, a possible digitization scheme is proposed in this paper.
Category: Digital Signal Processing

[211] viXra:1605.0212 [pdf] submitted on 2016-05-20 23:27:18

Electromagnetic Force Modification in Fault Current Limiters under Short-Circuit Condition Using Distributed Winding Configuration

Authors: Asef Ghabeli, Mohammad Reza Besmiy
Comments: 17 Pages.

The electromagnetic forces caused by short-circuits consisting of radial and axial forces impose mechanical damages and failures to the windings. The engineers have tried to decrease these forces using dierent techniques and innovations. Utilization of various kinds of winding arrangements is one of these methods, which enable the transformers and fault current limiters to tolerate higher forces without a substantial increase in construction and fabrication costs. In this paper, a distributed winding arrangement is investigated in terms of axial and radial forces during short-circuit condition in a three-phase FCL. To calculate the force magnitudes of AC and DC supplied windings, a model based on the nite element method in time stepping procedure is employed. The three-phase AC and DC supplied windings are split into multiple sections for more accuracy in calculating the forces. The simulation results are compared with a conventional winding arrangement in terms of leakage ux and radial and axial force magnitudes. The comparisons show that the distributed winding arrangement mitigates radial and especially axial force magnitudes signicantly.
Category: Digital Signal Processing

[210] viXra:1605.0088 [pdf] submitted on 2016-05-10 03:37:47

Design of High Speed Power Efficient Wallace Tree Adders

Authors: Sakshi Sharma, Pallavi Thakur
Comments: 5 Pages. International Journal of Exploration in Engineering and Technology, Vol.1 No. 5, ISSN: 2394-7918, May 2016, pg. 18-22

In this paper FIFB, FIEB and FISB Carry Save Adders and Wallace Tree Adders are designed, encoded in Verilog and simulated using Cadence Software. The 180 nm CMOS technology is used for implementation of adders.The simulation results are compared for power consumption, delay, silicon area and dynamic power dissipation. As the length of inputs increase, power dissipated, silicon area and delay increase in both Carry Save Adder and Wallace Tree Adder. Compared to traditional CSA, the proposed Wallace Tree Adder is found to have shorter delay, lesser power dissipation and lesser silicon area and hence more cost efficient and a better option for real-time applications.
Category: Digital Signal Processing

[209] viXra:1605.0012 [pdf] submitted on 2016-05-02 03:36:15

Design of Biometric Fingerprint Image Enhancement Algorithm by using Iterative Fast Fourier Transform

Authors: Shiwani Dod
Comments: 6 Pages. SSRN Electronic Journal

Among all the minutia based fingerprint identification system, the performance depends on the quality of input fingerprint images. In this paper, we have designed and implemented an algorithm of fingerprint image enhancement by using Iterative Fast Fourier Transform (IFFT). We have designed an approach for removing the false minutia generated during the fingerprint processing and a method to reduce the false minutia to increase the efficacy of identification system. We have used fingerprint Verification Competition 2006 (FVC 2006) as a database for implementation of proposed algorithm. Experimental results show that the results of our enhancement algorithm are better than existing algorithm of fast Fourier transform.
Category: Digital Signal Processing

[208] viXra:1604.0287 [pdf] submitted on 2016-04-19 13:09:55

An Efficient Hardware Design and Implementation of Advanced Encryption Standard (Aes) Algorithm

Authors: Kirat Pal Singh, Shiwani Dod
Comments: 5 Pages. Special Issue on International Journal of Recent Advances in Engineering & Technology (IJRAET) V-4, I-2 For National Conference on Recent Innovations in Science, Technology & Management (NCRISTM) ISSN (Online): 2347-2812, Gurgaon Institute of Technology a

We propose an efficient hardware architecture design & implementation of Advanced Encryption Standard (AES). The AES algorithm defined by the National Institute of Standard and Technology (NIST) of United States has been widely accepted. The cryptographic algorithms can be implemented with software or built with pure hardware. However Field Programmable Gate Arrays (FPGA) implementation offers quicker solution and can be easily upgraded to incorporate any protocol changes. This contribution investigates the AES encryption cryptosystem with regard to FPGA and Very High Speed Integrated Circuit Hardware Description language (VHDL). Optimized and Synthesizable VHDL code is developed for the implementation of 128- bit data encryption process. AES encryption is designed and implemented in FPGA, which is shown to be more efficient than published approaches. Xilinx ISE 12.3i software is used for simulation. Each program is tested with some of the sample vectors provided by NIST and output results are perfect with minimal delay. The throughput reaches the value of 1609Mbit/sec for encryption process with Device XC6vlx240t of Xilinx Virtex Family.
Category: Digital Signal Processing

[207] viXra:1604.0233 [pdf] submitted on 2016-04-14 15:14:17

Two-Step Authentication that Provides Highly Secure Access to Secure Areas or Resources

Authors: Victor Solovyev
Comments: 6 Pages. 3 figures

A two-step authentication system and method are provided for secure authentication that implements highly secure access to secure areas or resources with disabling the access when the main passcode is compromised. A user, after successfully passing through the passcode of the first-step verification stage, is asked to input an additional secret and presumably easy memorezible code (a pin, second password), or recognize an image for authentication (from a generated set). If during this second-step the user entered information fails to match the correct secret code, then the system sends signal message on intrusion to the user or other designated authorities through a communication device (e.g., email or telephone message) and the access is disabled immediately or after a few permitted attempts. Such authentication, while providing better security and user experience, does not require the usual practice of disabling the access, when the first-step access required information (such as complex alphanumeric password) is entered with errors in repeated access attempts.
Category: Digital Signal Processing

[206] viXra:1603.0002 [pdf] submitted on 2016-03-01 08:49:21

Energy Efficient Protocols and Environment Based Protocol Issues in WSN

Authors: Shariq Aziz Butt
Comments: 5 Pages.

Wireless Sensor Network (WSN) is used to sense data and event where human can’t reach. Wireless Sensor Network (WSN) is made up with small size of nodes which need battery’s power to sense Data. Energy Efficiency is a primary requirement in a Wireless Sensor Network (WSN). The Battery power to sense data is major issue in the Wireless Sensor Network (WSN). Therefore the Network’s life is dependent on the Energy. There are many different Types of Techniques such as Sleep/Awake, AAS (Automatic Active and Sleep State) and Location Aware (LA) that are used to manage the power consumption of Nodes. In this paper we will cover the Wireless Sensor Network (WSN), Issues with the Wireless Sensor Network (WSN), Sleep/Awake Technique. We will discuss the Environmental deployment of Sleep Awake Protocol and Location Aware Protocols and Deployment issues with them.
Category: Digital Signal Processing

[205] viXra:1601.0184 [pdf] submitted on 2016-01-17 06:43:47

Closed Loop Current Control of Three Phase Photovoltaic Grid Connected System

Authors: S.mallika, R.saravanakumar
Comments: 15 Pages.

The paper presents a closed loop current control technique of three phase grid connected systems with a renewable energy source. The proposal optimizes the system design, permitting reduction of system losses and harmonics for the three phase grid connected system. The performance of the proposed controller of grid connected PV array with DC-DC converter and multilevel inverter is evaluated through MATLAB-Simulation. The results obtained with the proposed method are compared with those obtained when using without current controller for three-phase photovoltaic multilevel inverter in terms of THD and switching frequency. Experimental works were carried out with the PV module WAREE WS 100, which has a power rating of 10 W, 17 V output voltages and 1000 W=m2 ir-radiance. The test results show that the proposed design exhibits a good performance.
Category: Digital Signal Processing

[204] viXra:1601.0182 [pdf] submitted on 2016-01-17 06:36:54

Optimal Design of Utility Interfaced Adaptive Solar Home Power Supply for Rural India

Authors: F. Karbalaei, M. Ranjbar, M. Kavyani
Comments: 6 Pages.

This paper compares the sensitivity method with a proposed nonlinear optimization method for setting of transmission network load tap changers (LTCs) as a preventive action for voltage instability. The aim of preventive actions is to increase voltage stability margin. In contrast to emergency actions, preventive ones implemented when the power system is stable. Thus, in calculation of a preventive action, in addition to increase stability margin, its effects on current operating point of the system must be considered. The sensitivity method is a linearized based method that uses the sensitivity of the loadability margin with respect to tap values. In the proposed optimization method, the tap values are calculated using optimal powerflow model. Two groups of variables are used in optimization problem: one group is related to base case (current operating point) and the other is related to the voltage stability boundary. By this work, the preventive actions do not cause undesirable changes in the system current variables.
Category: Digital Signal Processing

[203] viXra:1601.0181 [pdf] submitted on 2016-01-17 06:38:54

Life Time Enhancement of a Vacuum Interrupter for ac Smart Grid Applications

Authors: Asaad Shemshadi, Seyed Mohammad Tagi Bathaee, Sima Jalali Kashani
Comments: 11 Pages.

A smart grid is a modern system combined from power system and a network of computers which communicate and process the data achieved from measuring centers located in the power system network. They achieve specific local goals such as: enhancement the reliability, fast and easy control of power network and on-line monitoring. To control the blocks of a smart grid (entrance or outage), HV, MV and LV switching actions frequently are needed. Nowadays Vacuum interrupters (VI) are the most widespread switching devices especially in LV and MV voltage levels (up to 38 kV), through their reliability, heavy duty and maintenance free characteristics. In this article, the important lifetime factors of a VI for smart grid applications will be discussed. Further more the closing and opening speed of a proposed circuit breaker mechanism, as the most important lifetime factor, will be so planned that an important enhancement in the total lifetime of the VI is achieved.
Category: Digital Signal Processing

[202] viXra:1601.0180 [pdf] submitted on 2016-01-17 06:41:12

Zigbee Based Physiological Status Monitoring System

Authors: Mohit Kumar, Nirbhow Jap Singh, Sandeep Sharma
Comments: 10 Pages.

A lot of research has been carried out in the field of health care monitoring. In the recent years, development of wireless health care monitoring system has emerged as an area of research. The presented work falls under the health care monitoring system. Here the system monitors the patient continuously while simultaneously transmitting the physiological data to the doctors and other medical staff. The presented system is based on a dedicated communication protocol for sensor networks, ZigBee. The system has low cost, low power requirements and compact. The performance of the system is analysed for indoor and outdoor environment, under various conditions. It is observed that the system provides reliable monitoring and secure wireless transmission of the monitored data. Further it is observed that the current consumption of the system is 64.1 mA and 71.2 mA at the sensing node and coordinator respectively, when transmitted power is set at -18 dBm. The range of the system varies from 10m (indoor environment) to 30m (line of sight range in outdoor environment) at -18 dBm transmitted power, which is suitable for hospital environment.
Category: Digital Signal Processing

[201] viXra:1601.0139 [pdf] submitted on 2016-01-12 20:23:49

Design of Low Noise Amplifier at 435MHz in Sub-Micron Technologies Using Microwind Layout, Simulation and Parasitic Capabilities

Authors: Sai Venkatesh Balasubramanian, Thrikandiyoor Jayadev
Comments: 36 Pages.

The importance attached to filtering noise out of signal is growing significantly due to the requirement for faster and improved communication systems such as high-speed Internet access and wireless communication. The low-noise amplifier (LNA) is one of the major components in a wireless communication system, employed at the receiver side and is usually the immediate component to the Antenna in the receiver chain. This report attempts to explain the design of a low-noise-amplifier according to specifications. Using 0.35 μm technology to build the layout and the opes-source layout design tool - Microwind to simulate its operation, the performance of the LNA was optimized through the use of different circuit topologies and components. Based on the results obtained from simulation, the components were varied and sized to reach the desired results. The other aspect of the design process that was explored was effect of parasitics to assess the impact of physical structure and it's impact on the over all operation the LNA. To execute this task, the in-built parasitic extraction tool of Microwind was used. To a large extent, the objectives were met, thereby satisfying the requirements of the project. This include meeting the peak gain requirement of 22dB at the desired frequency of 435MHz, an input impedance of 50 ohms and a high output impedance with good noise removal characteristics. However, further study is proposed to explore the use of the Microwind design tool in designing complex analog circuitry and also using the circuit model in many other applications.
Category: Digital Signal Processing

[200] viXra:1601.0138 [pdf] submitted on 2016-01-12 20:35:01

Generation, Characterization and Applications of Digital Chaos

Authors: Sai Venkatesh Balasubramanian, Thadigotla Venkata SubbaReddy, Bommepalli Madhava Reddy
Comments: 30 Pages.

Chaos refers to complex behavior nonetheless deterministic, which arises in nonlinear systems. Chaos embodies two important principles: Extreme sensitivity towards initial conditions (also well-known as the butterfly effect.) Cause (reason) and effect (outcome) are not proportionate - Nonlinearity Chaotic signals serve as ideal candidates as carriers in secure communication systems. The present work proposes the generation, characterization and application of a ‘Digital’ chaotic signal using an iterative map. The present work implements the chaos generation using basic logical operations such as Exclusive OR (XOR) switching on four individual clocks with different frequencies and duty cycles. The above mentioned process is implemented in hardware level using XOR gates and 556 timer IC’s and in layout and simulation levels using Microwind respectively. Secondly Digital chaos generation is implemented in MATLAB and in Field Programmable Gate Array (FPGA) using Very high speed integrated circuits Hardware Description Language (VHDL). The generated chaotic signal is characterized using different parameters like Kolmogorov entropy (K2), Fractal Dimension (D2), Largest Lyapunov exponent (LLE), Phase plane portrait and Recurrence plot (RP). The main advantages of this work are 1. Simplicity - because of simple logical operations. 2. Security - due to high sensitivity of chaos to its initial conditions. Finally different applications of digital chaos have been explored.
Category: Digital Signal Processing

[199] viXra:1601.0137 [pdf] submitted on 2016-01-12 20:37:47

Digital Chaos based Pseudorandom bit Generator

Authors: Sai Venkatesh Balasubramanian, Thadigotla Venkata SubbaReddy, Bommepalli Madhava Reddy
Comments: 13 Pages.

Chaos refers to complex behavior nonetheless deterministic, which arises in nonlinear systems. Chaos embodies two important principles: Extreme sensitivity towards initial conditions (also well-known as the butterfly effect.) Cause (reason) and effect (outcome) are not proportionate - Nonlinearity Chaotic signals serve as ideal candidates as carriers in secure communication systems. The present work proposes the generation, characterization and application of a ‘Digital’ chaotic signal using an iterative map. The present work implements the chaos generation using basic logical operations such as Exclusive OR (XOR) switching on four individual clocks with different frequencies and duty cycles. The above mentioned process is implemented in hardware level using XOR gates and 556 timer IC’s and in layout and simulation levels using Microwind respectively. Secondly Digital chaos generation is implemented in MATLAB and in Field Programmable Gate Array (FPGA) using Very high speed integrated circuits Hardware Description Language (VHDL). The generated chaotic signal is characterized using different parameters like Kolmogorov entropy (K2), Fractal Dimension (D2), Largest Lyapunov exponent (LLE), Phase plane portrait and Recurrence plot (RP). The main advantages of this work are 1. Simplicity - because of simple logical operations. 2. Security - due to high sensitivity of chaos to its initial conditions. Finally different applications of digital chaos have been explored.
Category: Digital Signal Processing

[198] viXra:1601.0136 [pdf] submitted on 2016-01-12 21:02:53

Chaos Generation using Simple Microwave Circuitry

Authors: Sai Venkatesh Balasubramanian, Sri Kalyan Kambhampati
Comments: 21 Pages.

Chaotic signals are ideal nominees as carriers in secure communication systems. The present work proposes the generation, characterization and an interesting application of a Chaotic signal using an iterative map. The generation of a chaotic signal using simple microwave circuitry has been analyzed and implemented. By use of experiment, it was discovered that an ecient use of the nonlinearity in the semionductor device such as BFU725F/N1 NPN microwave bipolar junction transistor, can be used to generate a chaotic signal. The signal generated by the Gunn source is confirmed as a microwave pulse by operating it in the Negative Resistance region. The signal from the AFO is mixed with the Gunn source signal in the transistor producing a chaotic signal at the collector terminal. The bias voltage values are varied to characterize the output waveform. The parameters of a chaotic signal such as Lyapunov exponent, Kolmogorov Entropy and Fractal dimension are calculated for different waveforms obtained at different bias voltages. Frequency Spectrum analysis for both Gunn Source and the chaotic signal is done to ascertain the nonlinearity contributed by the transistor alone. Chaotic signal generated using simple microwave circuitry is more securable and reliable. Circuit complexity has been reduced very much which in turn reduces the cost. It has been observed that only the nonlinearity in the transistor is enough to generate a chaotic Microwave signal. The BFU725F/N1 transistor at 6.02 volts of Gunn bias gives a chaos signal. Chirping phenomenon is observed to be chaotic also.
Category: Digital Signal Processing

[197] viXra:1601.0135 [pdf] submitted on 2016-01-12 21:05:11

Electrical Chirping using Simple Microwave Circuitry

Authors: Sai Venkatesh Balasubramanian, Sri Kalyan Kambhampati
Comments: 21 Pages.

Chaotic signals are ideal nominees as carriers in secure communication systems. The present work proposes an interesting application of a Chaotic signal using an iterative map. By use of experiment, it was discovered that an ecient use of the nonlinearity in the semionductor device such as BFU725F/N1 NPN microwave bipolar junction transistor, can be used to generate a chaotic signal. Frequency Spectrum analysis for both Gunn Source and the chaotic signal is done to ascertain the nonlinearity contributed by the transistor alone. The effect of coupling of two transistors on the output waveform is observed using simulation. The waveform thus obtained is observed to be negatively chirped or down chirped. The characterization of the signal obtained with parameters mentioned above to know its nature is also done. Possible application of the above circuitry in the communication by checking the robustness of signal in a noisy environment is done using MATLAB. Chirping phenomenon is observed to be chaotic also.
Category: Digital Signal Processing

[196] viXra:1601.0099 [pdf] submitted on 2016-01-09 22:07:27

Analysis of Handoff Schemes in Wireless Mobile Network

Authors: Alagu S, Meyyappan T
Comments: 12 Pages.

This paper analyses the different traffic schemes for handoff handling and call blocking attempts. As traffic in mobile cellular networks increases, Handoffs will become an increasingly important issue and as cell sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff schemes need to be used. In this paper the author analyses the various Handoff schemes for multiple traffic system and simulates an ATM based wireless Personal Communication Network to implement the non-preemptive Measurement Based Prioritization Scheme (MBPS).
Category: Digital Signal Processing

[195] viXra:1511.0121 [pdf] submitted on 2015-11-14 23:06:58

Power Line Interference and Baseline Removal in ECG

Authors: Sai Venkatesh Balasubramanian
Comments: 4 Pages.

Power Line Interference, typically occurring at 50-60Hz frequencies and baseline drift at sub-Hertz ranges are two of the key sources of corruption of ECG signals. In this short article, elimination/mitigation of these effects using notch and high pass filters termed DC notch filters are discussed. The results plotted highlight effective removal of PLI and baseline effects.
Category: Digital Signal Processing

[194] viXra:1510.0489 [pdf] submitted on 2015-10-28 20:23:19

Embedding Data in Images Securely using Chaos

Authors: Sai Venkatesh Balasubramanian
Comments: 15 Pages.

A robust high-fidelity technique to hide data in images using chaos is proposed and implemented. By efficiently harnessing the nonlinearity of a semiconductor device such as a MOSFET, a chaotic carrier signal is generated using extremely simple circuitry. This chaotic carrier forms the secure key of the proposed embedding system. The generated chaotic signal is validated using standard metrics such as Lyapunov Exponent, Fractal dimension and Kolmogorov Entropy. The generated carrier is then modulated with three message signals and are embedded into the three colors of the carrier image using a scaling factor. The exact frequencies and amplitudes used to generate the chaotic carrier are used in the receiver end to regenerate the carrier, using which the message is decoded from the embedded image. Standard measures such as Mean Square Error and Peak Signal to Noise Ratio are used to characterise the fidelity of the embedding process. The observed large PSNR values corresponding with high sensitivity as observed in the Lyapunov exponent of the chaotic carrier indicate the achievement of the golden advantages of Sensitivity, Fidelity and Simplicity which form the highlights of the present work.
Category: Digital Signal Processing

[193] viXra:1510.0488 [pdf] submitted on 2015-10-28 20:23:54

Efficient Steganography Using Spread Spectrum with Integrity Verification

Authors: Sai Venkatesh Balasubramanian
Comments: 5 Pages.

Data hiding techniques are growing stronger day by day, and with even stronger detection techniques, a powerful way of hiding and retrieving data is the need of the hour. In this paper, we first discuss basic steganographic techniques in general and spread spectrum steganography in particular. Then we propose a steganographic method which hides data efficiently using Spread Spectrum techniques and also introduces Verification codes to check the integrity of the message at the receiver side. Finally, we look at the advantages of this system over others.
Category: Digital Signal Processing

[192] viXra:1510.0481 [pdf] submitted on 2015-10-28 20:32:55

A Simple Pseudorandom Bit Generator using Frequency Controlled Digital Chaos

Authors: Sai Venkatesh Balasubramanian
Comments: 4 Pages.

A novel kind of chaos, digital chaos is proposed, and an extremely simple circuit to generate frequency controlled digital chaos using two XOR gates driven by three square signals with mismatched frequencies and duty cycles is designed and implemented in FPGA, with the basic principle that the XOR being a difference circuit, amplifies the mismatches, leading to chaos generation. The presence of chaos is ascertained using Lyapunov Exponent and the effect of driving signal frequency on the chaotic nature is studied. The generated chaotic bit sequence is then tested for randomness using standard tests from the NIST Test Suite. It is found that the generated digital chaotic bit sequence is indeed random, proving capability of the proposed circuit as a pseudo random bit generator for computing and communication applications.
Category: Digital Signal Processing

[191] viXra:1510.0470 [pdf] submitted on 2015-10-28 07:59:32

Chaotic Solitary Wavelets in 45nm CMOS Adaptive Bias Controlled Ring Oscillators

Authors: Sai Venkatesh Balasubramanian
Comments: 14 Pages.

A novel kind of iterative map, the frequency dependent map, offering the crucial advantages of easy tunability and signal dependent control is formulated from the standard circle map, and is studied using the bifurcation and cobweb plots. Following this, the nonlinearity of a MOSFET is explored and a novel modification to a conventional ring oscillator is proposed by adding a potential divider in its feedback path, achieving adaptive bias control. It is seen that such a design gives outputs most closely resembling hyperbolic secant based solitons. The ring oscillators, nonlinearly coupled to a ‘split-gate’ CMOS inverter is seen to generate chaotic signals, which are characterized using standard measures such as phase portrait, Kolmogorov Entropy and Lyapunov Exponent, following which the effect of number of ring oscillator stages on the nature if generated chaos is studied. Finally, the chaotic signal is merged with a hyperbolic secant pulse to form a ‘chaotic solitary wavelet’, which is seen to possess a high number of vanishing moments with a distinct and unique negative logarithmic slope, a very desirable quality in wavelets, leading to applications such as secure communications, image compression and efficient detection of burst-type signals.
Category: Digital Signal Processing

[190] viXra:1510.0469 [pdf] submitted on 2015-10-28 08:00:24

Secure Solitary Wavelets using Simple X-Band Microwave Circuitry

Authors: Sai Venkatesh Balasubramanian
Comments: 5 Pages.

The operation of various contemporary communication systems such as WiMax in the Microwave X-Band, coupled with the information explosion in recent times has enforced a high pressure in the capacity and security handling aspects, where it would be convenient to provide these facilities at the physical level itself. The present work proposed a radically new solution to this issue, by developing a Secure Solitary Wavelet. Specifically, a Gunn Oscillator Microwave source is fed to a microwave transistor, and by using a slave low frequency signal, the nature of the output is tuned and the envelope is observed to be chaotic, and is characterized using Kolmogorov Entropy and Lyapunov Exponents. This envelope is modulated onto a hyperbolic secant function to create a Secure Solitary Wavelet. It is seen that the solitary nature induces extreme compactness and smoothness as seen by the vanishing higher moments, while the chaotic envelope is controlled by the slave frequency acting as a key and providing a layer of security to the wavelet. A Secure Solitary Wavelet based Orthogonal Frequency Division Multiplexing (OFDM) is proposed and compared with conventional OFDM in terms of performance assessment. The extreme simplicity of the proposed design coupled with the compactness and security of the Secure Solitary Wavelet form the highlights of the present work.
Category: Digital Signal Processing

[189] viXra:1510.0463 [pdf] submitted on 2015-10-28 09:14:45

Design of Terahertz Radio over Fiber – Beyond 4G

Authors: Sai Venkatesh Balasubramanian, Ganapathy R, Porsezian K
Comments: 2 Pages.

A Radio-over fiber communication system operating at Terahertz frequency is designed, considering the underlying physics of nanoelectronic and nanophotonic devices, and performance of non-conventional soliton based carriers is evaluated, accounting for novelty of this work.
Category: Digital Signal Processing

[188] viXra:1510.0462 [pdf] submitted on 2015-10-28 09:16:04

Modeling and Evaluation of Radio over Fiber Communication Systems on Employing Nanophotonic Devices

Authors: Sai Venkatesh Balasubramanian, Ganapathy R, Porsezian K, Easwaran M, Joshva RG
Comments: 6 Pages.

Radio over Fiber refers to a technology whereby light is modulated by a radio signal and transmitted over an optical fiber link to facilitate wireless access. The present work purports to the modeling of radio over fiber systems in the MATLAB environment on employing specially designed photonic crystal fibers, consisting of subwavelength-core dielectric photonic nanowires embedded in their cladding, as optical channels between the main central station and the set of base stations and silicon photonic based electro-optic modulators. Data transmission at terahertz frequencies using orthogonal frequency division multiplexing schemes with cyclic error control coding along with digital modulation schemes such as amplitude shift keying and binary phase shift keying have been implemented. Different carrier signals such as solitons, similaritons, square, and sine waves are considered. In simulating the radio over fiber system, three different media are considered. In the first stage of signal propagation, photonic crystal fibers embedded with photonic nanowires in their cladding are considered and signal propagation through them is numerically modeled using the predictor-corrector symmetrized split step Fourier method. In the second stage, electrical transmission lines that are modeled as microstrips using S-parameters are considered. In the last stage of signal propagation, wireless channel modeled using additive white Gaussian noise and multipath fading, is considered. The performance of the aforementioned communication system is reviewed using standard metrics such as bit error rate and eye diagrams. It is shown that solitons are more robust carriers for terahertz communications compared to the other carriers and that it is possible to achieve a relatively distortion free communication system even amidst the worst possible SNR levels.
Category: Digital Signal Processing

[187] viXra:1510.0461 [pdf] submitted on 2015-10-28 09:17:03

Non-Conventional Carrier Waveforms in a four user OFDMA Communication System

Authors: Sai Venkatesh Balasubramanian, T. Venkata Subba Reddy, B. Madhava Reddy, R. K. Karn, G. Ramanathan
Comments: 4 Pages.

Conventional communication systems use either sinusoids (pass band) or square waves (baseband) as carriers. However tradeoffs have to be made with regards to bandwidth, fidelity, power consumption and system complexity. This paper explores using Non-conventional waveforms including Gaussian like pulses as carrier waveforms using a 4-user OFDMA system as the benchmark. SPICE simulations are done at the deep submicron VLSI level (120 nm) using MicroWind. The performance of the various carrier waveforms are assessed by using standard metrics such as Bit Error Rate, Signal to Noise ratio and eye-diagram. The results presented in this work give valuable insights into Non-conventional carrier waveforms and their impact on SNR and BER leading to more robust.
Category: Digital Signal Processing

[186] viXra:1510.0460 [pdf] submitted on 2015-10-28 09:17:58

Soliton Carriers in CDMA and OFDM Communication Systems

Authors: Sai Venkatesh Balasubramanian
Comments: 4 Pages.

The concept of solitons has been successfully utilized in optical communications to handle signal distortion. In this light, the present work explores modulation using soliton carriers and subsequently, prototype wireless communication system based on Orthogonal Frequency Division Mutiplexing (OFDM) and Code Division Multiplexing (CDMA) at 11GHz involving Additive White Gaussian Noise Channel is implemented using LabVIEW. The performance of Soliton carriers are compared with sinusoidal counterparts using eye diagrams. The low distortion values observed for solitons form the novelty of the present work.
Category: Digital Signal Processing

[185] viXra:1510.0453 [pdf] submitted on 2015-10-28 09:27:03

Signal Analysis Using The Solitary Chirplet

Authors: Sai Venkatesh Balasubramanian
Comments: 5 Pages.

In the present work, the solitary chirplet, formed by modulating a frequency modulated signal with a hyperbolic secant envelope is formulated. It is seen that this solitary chirplet possesses a high number of vanishing moments. Sample analysis of sinusoidal and FM signals using the solitart chirplet confirms its efficacy in detecting frequency changes and discontinuities, following which the analysis of an earthquake signal is presented. It is seen that the proposed solitary chirplets come in handy while analyzing frequency variations and breaks in signals.
Category: Digital Signal Processing

[184] viXra:1510.0449 [pdf] submitted on 2015-10-28 09:32:49

All-Optical THz OFDM Communications using Photonic Crystal Fibers

Authors: Sai Venkatesh Balasubramanian
Comments: 8 Pages.

An all-optical Orthogonal Frequency Division Multiplexing Communication system at 2 THz is modelled using photonic crystal fiber of length 1km, and the performance of four carrier waveforms - hyperbolic secant, square of hyperbolic secant, square and sinusoidal is evaluated using standard metrics such as eye diagram and bit error rate. From the above mentioned valuations, one can deduce the minimal distortion in hyperbolic secant based carriers, hence leading to unconventional carrier waveforms, which forms the novelty of the present work.
Category: Digital Signal Processing

[183] viXra:1510.0442 [pdf] submitted on 2015-10-27 21:06:47

Genesis of the Solitary Wavelet

Authors: Sai Venkatesh Balasubramanian
Comments: 6 Pages.

A solitary wavelet, based on the hyperbolic secant function is proposed, characterized and applied to real-time data. Numerical analysis of the solitary wavelet reveals that it has a huge number of vanishing higher order moments, tending rapidly towards zero with a negative logarithmic slope. It is seen that the wavelet has a very low number of oscillatory sub-lobes, thus making it the ideal candidate to perform signal analysis of burst-type phenomena without undergoing multiple levels of filtering and approximation, and this concept is illustrated by effectively detecting the QRS complex of an ECG cycle without undergoing multiple filtering levels. The ability of the proposed wavelet to perform analysis of a diverse variety of real time data without multiple levels of decomposition and reconstruction forms the novelty of the present work.
Category: Digital Signal Processing

[182] viXra:1510.0422 [pdf] submitted on 2015-10-27 09:04:47

Soliton based Return to Zero Logic using 180nm CMOS

Authors: Sai Venkatesh Balasubramanian
Comments: 12 Pages.

A Return-to-Zero Logic consisting of Soliton based clock is proposed, and is seen to exhibit more robustness in propagation through interconnects compared with conventional square pulses at microwave and illimetre wave frequencies. The generation of solitons using the nonlinearity of a single transistor is discussed and various combinational and sequential logic circuits based on soliton logic are implemented and characterized using Deep Submicron VLSI SPICE implementations at 180nm CMOS Technology. In addition, Pulse Compression based on single transistor is also discussed. The simplicity of implementation of the soliton logic, coupled with the compatibility with existing CMOS technologies form the key highlights of the present work, paving the way for a futuristic low distortion computing era.
Category: Digital Signal Processing

[181] viXra:1510.0399 [pdf] submitted on 2015-10-26 08:32:11

Supercontinuum Based All-Optical Digital Communication System at 2THz

Authors: Sai Venkatesh Balasubramanian
Comments: 5 Pages.

An all-optical Supercontinuum based communication system at 2 THz is modeled using photonic crystal fiber of length 1km, and its performance using digital modulation techniques such as Amplitude Shift Keying (ASK) is evaluated using standard metrics such as eye diagram and bit error rate. From the above mentioned valuations, one can obtain its robustness, hence leading to secure communication systems at Terahertz data rates, which forms the novelty of the present work.
Category: Digital Signal Processing

[180] viXra:1510.0175 [pdf] submitted on 2015-10-18 06:26:31

Survey on Intelligent Data Repository Using Soft Computing

Authors: A. Prema, A.Pethalakshmi
Comments: 20 Pages.

Data warehouse is one of the components of the overall business intelligence system. An enterprise has one data warehouse, and data marts source has their information from the data warehouse.
Category: Digital Signal Processing

Replacements of recent Submissions

[26] viXra:1709.0359 [pdf] replaced on 2017-09-29 20:15:19

A Sharp Sufficient Condition of Block Signal Recovery Via $l_2/l_1$-Minimization

Authors: Jianwen Huang, Jianjun Wang, Wendong Wang
Comments: 16 Pages.

This work gains a sharp sufficient condition on the block restricted isometry property for the recovery of sparse signal. Under the certain assumption, the signal with block structure can be stably recovered in the present of noisy case and the block sparse signal can be exactly reconstructed in the noise-free case. Besides, an example is proposed to exhibit the condition is sharp. As byproduct, when $t=1$, the result enhances the bound of block restricted isometry constant $\delta_{s|\mathcal{I}}$ in Lin and Li (Acta Math. Sin. Engl. Ser. 29(7): 1401-1412, 2013).
Category: Digital Signal Processing

[25] viXra:1709.0039 [pdf] replaced on 2017-09-05 01:13:16

RSA Cryptography over Polynomials

Authors: Antoine Balan
Comments: 2 pages, written in french

Here is defined, following the RSA cryptosystem, a method of cryptography for polynomials over finite rings.
Category: Digital Signal Processing

[24] viXra:1705.0187 [pdf] replaced on 2017-10-24 23:15:07

Introduction to Entropy Transforms

Authors: Russell Leidich
Comments: 37 Pages.

We have at our disposal a wide variety of discrete transforms for the discovery of "interesting" signals in discrete data sets in any number of dimensions, which are of particular utility when the default assumption is that the set is mundane. SETI, the Search for Extraterrestrial Intelligence, is the archetypical case, although problems in drug discovery, malware detection, financial arbitrage, geologic exploration, forensic analysis, and other diverse fields are perpetual clients of such tools. Fundamentally, these include the Fourier, wavelet, curvelet, wave atom, contourlet, brushlet, etc. transforms which have churned out of math departments with increasing frequency since the days of Joseph Fourier. A mountain of optimized applications has been built on top of them, for example the Fastest Fourier Transform in the West[1] and the Wave Atom Toolbox[2]. Such transforms excel at discovering particular classes of signals. So much so that the return on investment in new math would appear to be approachingzero. What's missing, however, is efficiency: the question must be asked as to when such transforms are computationally justifiable. Herein we investigate a preprocessing technique, abstractly known as an "entropy transform", which, in a wide variety of practical applications, can discern in essentially real time whether or not an "interesting" signal exists within a particular data set. (Entropy transforms say nothing as to the nature of the signal, but merely how interesting a particular subset of the data appears to be.) Entropy transforms have the added advantage that they can also be tuned to behave as crude classifiers – not as good as their deep learning counterparts, but requiring orders of magnitude less processing power. In applications where identifying many targets with moderate accuracy is more important than identifying a few targets with excellent accuracy, entropy transforms could bridge the gap to product viability. It would be fair to say that in the realm of signal detection, discrete transforms should be the tool of choice because they tend to produce the most accurate and well characterized results. But processor power and execution time are not free! Particularly when, as in the case of SETI, the bottleneck is the rate at which newly acquired data can be processed, a more productive approach would be use to cheap but reasonably accurate O(N) transforms to filter out all but the most surprising subsets of the data. This would reserve processing capacity for those rare weird cases more deserving of closer inspection. I published Agnentro[3], an open-source toolkit for signal search and comparison. The reason, first and foremost, was to support these broad and rather unintuitive assertions with numerical evidence. The goal of this paper is to formalize the underlying math.
Category: Digital Signal Processing

[23] viXra:1610.0287 [pdf] replaced on 2017-03-29 12:04:47

Integer Compositions Signatures

Authors: Santi J. Vives Maccallini
Comments: First Publication: 2016-Oct-24. Current Version: 2. Pages: 6. Language: English.

We introduce integer compositions signatures (ic): a post-quantum, hash-based family of one-time signatures. The proposed scheme explores a connection between hash-based signatures and combinatorics: the authentication path taken from the signature to the public key is determined by a restricted composition of an 9. The family shows improvements over previous schemes like Winternitz: reduced cost, verification in constant time, and the possibility to tweak the signature for either faster signing or faster verification. Keywords: one-time signatures, ots, hash, authentication, post-quantum cryptography, composition, combinatorics.
Category: Digital Signal Processing