Digital Signal Processing

1310 Submissions

[8] viXra:1310.0257 [pdf] submitted on 2013-10-30 09:40:17

Computing of the Complex Variable Functions

Authors: Solomon I. Khmelnik, Inna S. Doubson
Comments: 46 Pages.

Hardware algorithms for computing of all elementary complex variable functions are proposed.
Category: Digital Signal Processing

[7] viXra:1310.0247 [pdf] submitted on 2013-10-28 13:22:01

Computer Arithmetic of Geometrical Figures. Algorithms and Hardware Design.

Authors: Solomon I. Khmelnik
Comments: 150 Pages.

This book describes various versions of processors, designed for affine transformations of many-dimensional figures – planar and spatial. This processors is oriented to affine transformation of unstructured geometrical figures with arbitrary points distribution. The type of data presentation used in this book is non-conventional, based on a not well-known theory of vectors and geometrical figures coding. The problems of affine transformation are used widely in science and engineering. The examples of their application are computer tomography and data compression for telecommunication systems. The book covers the figures coding theory – the codes structure, algorithms of coding and decoding for planar and spatial figures, arithmetical operations with planar and spatial figures. The theory is supplemented by numerous examples. The arrangement of several versions of geometrical processor is considered – data representation, operating blocks, hardwares realization of coding, decoding and arithmetic operations algorithms. The processor’s internal performance is appraised. The book is designed for students, engineers and developers, who intend to use the computer arithmetic of geometrical figures in their own research and development in the field of specialized processors.
Category: Digital Signal Processing

[6] viXra:1310.0245 [pdf] submitted on 2013-10-28 11:49:13

Positional Codes of Complex Numbers and Vectors

Authors: Solomon I. Khmelnik, Inna S. Doubson
Comments: 33 Pages.

In book the theory of positional coding of complex numbers and vectors is considered. The method of search of the radix of coding is described and the various radix of coding are offered. Some variants of construction of binary codes of complex numbers and vectors are allocated.
Category: Digital Signal Processing

[5] viXra:1310.0244 [pdf] submitted on 2013-10-28 06:54:07

Computer for Operations with Functions

Authors: Solomon I. Khmelnik
Comments: 11 Pages.

A computer for operations with (mathematical) functions (unlike the usual computer) operated with function at the hardware level (i.e. without programming these operations) [1, 2, 3]. The article briefly describes the functions of one and many arguments coding theory - the codes structure, algorithms of coding and decoding, arithmetical operations. Processor for operations with functions considered - data representation, operating blocks, hardware realization of coding, decoding and arithmetic operations algorithms.
Category: Digital Signal Processing

[4] viXra:1310.0091 [pdf] submitted on 2013-10-13 07:22:07

Security in Manet Based on Pki Using Fuzzy Function

Authors: I.M. Hanafy, A. A. Salama, M. Abdelfttah, Y. M.Wazery4
Comments: 7 Pages. The proposed algorithm of Security-model is an adaptive fuzzy logic based algorithm that can adapt itself with the dynamic conditions of mobile hosts. Experimental results show that the use of fuzzy based security can enhance the security of mobile adhoc

In Mobile Adhoc Network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security scheme is proposed based on Public Key infrastructure for distributing session keys between nodes. The length of those keys is decided using fuzzy logic manipulation for the discrimination between some of the attacks applied over this kind of networks. The proposed algorithm of Security-model is an adaptive fuzzy logic based algorithm that can adapt itself with the dynamic conditions of mobile hosts. Experimental results show that the use of fuzzy based security can enhance the security of mobile adhoc networks.
Category: Digital Signal Processing

[3] viXra:1310.0090 [pdf] submitted on 2013-10-13 07:25:51

Ais Model for Botnet Detection in Manet Using Fuzzy Function

Authors: I.m.hanafy, A.a.salama, M. Abdelfattah, Y. M. Wazery
Comments: 8 Pages. in this paper the Artificial Immune System (AIS) is used as the defense system to the MANET to face botnets. Experimental results show that the use of fuzzy based security can enhance the security of AIS in MANETs.

Mobile adhoc networks (MANETs) poses a large area of challenges in the field of security, this is due to the lake of infrastructure and the continuous changing in the network topology. Botnets are believed to be the most harmful danger that threatens any type of networks; because it controls the units in a non noticeable manner so detection of botnets is more difficult . in this paper the Artificial Immune System (AIS) is used as the defense system to the MANET to face botnets. Experimental results show that the use of fuzzy based security can enhance the security of AIS in MANETs.
Category: Digital Signal Processing

[2] viXra:1310.0088 [pdf] submitted on 2013-10-13 07:35:17

Underdetermined Blind Separation of an Unknown Number of Sources Based on Fourier Transform and Matrix Factorization

Authors: Ossama S. Alshabrawy, A.A.Salama, Aboul Ella Hassanien
Comments: 7 Pages. This paper presents an approach for underdetermined blind source separation that can be applied even if the number of sources is unknown. Moreover, the proposed approach is applicable in the case of separating I+3 sources from I mixtures without additive

This paper presents an approach for underdetermined blind source separation that can be applied even if the number of sources is unknown. Moreover, the proposed approach is applicable in the case of separating I+3 sources from I mixtures without additive noise. This situation is more challenging and suitable to practical real world problems. Also, the sparsity conditions are not imposed unlike to those employed by some conventional approaches. Firstly, the number of source signals are estimated followed by the estimation of the mixing matrix based on the use of short time Fourier transform and rough-fuzzy clustering. Then, source signals are normalized and recovered using modified Lin's projected gradient algorithm with modified Armijo rule. The simulation results show that the proposed approach can separate I+3 source signals from I mixed signals, and it has superior evaluation performance compared to conventional approaches.
Category: Digital Signal Processing

[1] viXra:1310.0037 [pdf] submitted on 2013-10-05 19:40:55

Neutrosophic Logic Approaches Applied to ”RABOT” Real Time Control

Authors: Alexandru Gal, Luige Vladareanu, Florentin Smarandache, Hongnian Yu, Mincong Deng
Comments: 6 Pages.

In this paper we present a way of deciding which control law should operate at a time for a mobile walking robot. The proposed deciding method is based on the new research field, called Neutrosophic Logic. The results are presented as a simulated system for which the output is related to the inputs according to the Neutrosophic Logic.
Category: Digital Signal Processing