Digital Signal Processing

1808 Submissions

[9] viXra:1808.0218 [pdf] submitted on 2018-08-15 06:58:03

Security Gaps in IPsec

Authors: George Rajna
Comments: 58 Pages.

In collaboration with colleagues from Opole University in Poland, researchers at Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum (RUB) have demonstrated that the internet protocol IPsec is vulnerable to attacks. [35] As cloud storage becomes more common, data security is an increasing concern. [34] Scientists of the National Research Nuclear University MEPhI (Russia) have proposed a scheme for optical encoding of information based on the formation of wave fronts, and which works with spatially incoherent illumination. [33] A joint China-Austria team has performed quantum key distribution between the quantum-science satellite Micius and multiple ground stations located in Xinglong (near Beijing), Nanshan (near Urumqi), and Graz (near Vienna). [32] In the race to build a computer that mimics the massive computational power of the human brain, researchers are increasingly turning to memristors, which can vary their electrical resistance based on the memory of past activity. [31] Engineers worldwide have been developing alternative ways to provide greater memory storage capacity on even smaller computer chips. Previous research into two-dimensional atomic sheets for memory storage has failed to uncover their potential— until now. [30] Scientists used spiraling X-rays at the Lab) to observe, for the first time, a property that gives handedness to swirling electric patterns – dubbed polar vortices – in a synthetically layered material. [28] To build tomorrow's quantum computers, some researchers are turning to dark excitons, which are bound pairs of an electron and the absence of an electron called a hole. [27] Concerning the development of quantum memories for the realization of global quantum networks, scientists of the Quantum Dynamics Division led by Professor Gerhard Rempe at the Max Planck Institute of Quantum Optics (MPQ) have now achieved a major breakthrough: they demonstrated the long-lived storage of a photonic qubit on a single atom trapped in an optical resonator. [26]
Category: Digital Signal Processing

[8] viXra:1808.0216 [pdf] submitted on 2018-08-15 07:21:44

Intel Processor Vulnerability

Authors: George Rajna
Comments: 60 Pages.

A newly discovered processor vulnerability could potentially put secure information at risk in any Intel-based PC manufactured since 2008. [36] In collaboration with colleagues from Opole University in Poland, researchers at Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum (RUB) have demonstrated that the internet protocol IPsec is vulnerable to attacks. [35] As cloud storage becomes more common, data security is an increasing concern. [34] Scientists of the National Research Nuclear University MEPhI (Russia) have proposed a scheme for optical encoding of information based on the formation of wave fronts, and which works with spatially incoherent illumination. [33] A joint China-Austria team has performed quantum key distribution between the quantum-science satellite Micius and multiple ground stations located in Xinglong (near Beijing), Nanshan (near Urumqi), and Graz (near Vienna). [32] In the race to build a computer that mimics the massive computational power of the human brain, researchers are increasingly turning to memristors, which can vary their electrical resistance based on the memory of past activity. [31] Engineers worldwide have been developing alternative ways to provide greater memory storage capacity on even smaller computer chips. Previous research into two-dimensional atomic sheets for memory storage has failed to uncover their potential— until now. [30] Scientists used spiraling X-rays at the Lab) to observe, for the first time, a property that gives handedness to swirling electric patterns – dubbed polar vortices – in a synthetically layered material. [28] To build tomorrow's quantum computers, some researchers are turning to dark excitons, which are bound pairs of an electron and the absence of an electron called a hole. [27]
Category: Digital Signal Processing

[7] viXra:1808.0215 [pdf] submitted on 2018-08-15 07:46:58

Equifax Data Breach

Authors: George Rajna
Comments: 62 Pages.

When the Equifax data breach impacting nearly 147 million people occurred just over a year ago most consumers took little to no action to protect themselves despite the risk of identity theft, University of Michigan researchers found. [37] A newly discovered processor vulnerability could potentially put secure information at risk in any Intel-based PC manufactured since 2008. [36] In collaboration with colleagues from Opole University in Poland, researchers at Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum (RUB) have demonstrated that the internet protocol IPsec is vulnerable to attacks. [35] As cloud storage becomes more common, data security is an increasing concern. [34] Scientists of the National Research Nuclear University MEPhI (Russia) have proposed a scheme for optical encoding of information based on the formation of wave fronts, and which works with spatially incoherent illumination. [33] A joint China-Austria team has performed quantum key distribution between the quantum-science satellite Micius and multiple ground stations located in Xinglong (near Beijing), Nanshan (near Urumqi), and Graz (near Vienna). [32] In the race to build a computer that mimics the massive computational power of the human brain, researchers are increasingly turning to memristors, which can vary their electrical resistance based on the memory of past activity. [31] Engineers worldwide have been developing alternative ways to provide greater memory storage capacity on even smaller computer chips. Previous research into two-dimensional atomic sheets for memory storage has failed to uncover their potential— until now. [30] Scientists used spiraling X-rays at the Lab) to observe, for the first time, a property that gives handedness to swirling electric patterns – dubbed polar vortices – in a synthetically layered material. [28] To build tomorrow's quantum computers, some researchers are turning to dark excitons, which are bound pairs of an electron and the absence of an electron called a hole. [27]
Category: Digital Signal Processing

[6] viXra:1808.0210 [pdf] submitted on 2018-08-15 09:46:39

Magnetic Antiparticles for Information Technologies

Authors: George Rajna
Comments: 45 Pages.

Nanosized magnetic particles called skyrmions are considered highly promising candidates for new data storage and information technologies. [32] They do this by using "excitons," electrically neutral quasiparticles that exist in insulators, semiconductors and in some liquids. [31] Researchers at ETH Zurich have now developed a method that makes it possible to couple such a spin qubit strongly to microwave photons. [30] Quantum dots that emit entangled photon pairs on demand could be used in quantum communication networks. [29] Researchers successfully integrated the systems—donor atoms and quantum dots. [28] A team of researchers including U of A engineering and physics faculty has developed a new method of detecting single photons, or light particles, using quantum dots. [27] Recent research from Kumamoto University in Japan has revealed that polyoxometalates (POMs), typically used for catalysis, electrochemistry, and photochemistry, may also be used in a technique for analyzing quantum dot (QD) photoluminescence (PL) emission mechanisms. [26] Researchers have designed a new type of laser called a quantum dot ring laser that emits red, orange, and green light. [25] The world of nanosensors may be physically small, but the demand is large and growing, with little sign of slowing. [24] In a joint research project, scientists from the Max Born Institute for Nonlinear Optics and Short Pulse Spectroscopy (MBI), the Technische Universität Berlin (TU) and the University of Rostock have managed for the first time to image free nanoparticles in a laboratory experiment using a highintensity laser source. [23] For the first time, researchers have built a nanolaser that uses only a single molecular layer, placed on a thin silicon beam, which operates at room temperature. [22] A team of engineers at Caltech has discovered how to use computer-chip manufacturing technologies to create the kind of reflective materials that make safety vests, running shoes, and road signs appear shiny in the dark. [21]
Category: Digital Signal Processing

[5] viXra:1808.0153 [pdf] submitted on 2018-08-12 22:23:29

TensorFlow Tool Interaction with JikesRVM in the Context of Virtual Machine Technologies R&D - A Short Communication On Using TensorFlow Based Informatics in the Domains of Nuclear Physics/Plasma Measurements or Other Similar Applications.

Authors: Nirmal Tej kumar
Comments: 3 Pages. Short Communication

As mentioned in the TITLE above,we are interested in probing “Plasma Measurements” using TensorFlow/JikesRVM/JVM as an Information Processing Framework.
Category: Digital Signal Processing

[4] viXra:1808.0067 [pdf] submitted on 2018-08-06 09:11:23

E Theorem Prover & Its General Interaction with Jikesrvm Via Jni Interface – a Simple Novel Suggestion in the Context of Theorem Provers & Their Interesting Applications.

Authors: Nirmal Tej kumar
Comments: 1 Page. Short Communication

To understand the interaction of E Theorem Prover in the context of JikesRVM/JVM via JNI.
Category: Digital Signal Processing

[3] viXra:1808.0066 [pdf] submitted on 2018-08-06 09:14:22

An Interesting “MixR” Interaction with JikesRVM/JVM/Netbeans/Isabelle in the Context of Image Processing, Natural Language Processing – A Novel Suggestion.

Authors: Nirmal Tej kumar
Comments: 2 Pages. Short Communication

Our main Idea is to test and explore the interesting features of “MixR” in the above mentioned Software Tools to develop a better informatics framework/s.Only a suggestion.
Category: Digital Signal Processing

[2] viXra:1808.0037 [pdf] submitted on 2018-08-02 13:55:40

Generalization of Pollack Rule and Alternative Power Equation

Authors: Juan Ramón González Álvarez
Comments: 7 Pages.

After showing that only one of the different versions of Pollack's rule found on the literature agrees with the experimental behavior of a CPU running at stock frequency versus the same CPU overclocked, we introduce a formal simplified model of a CPU and derive a generalized Pollack's rule also valid for multithread architectures, caches, clusters of processors, and other computational devices described by this model. A companion equation for power consumption is also proposed.
Category: Digital Signal Processing

[1] viXra:1808.0011 [pdf] submitted on 2018-08-01 13:18:50

Probing Jcuda in the Context of Image J/jvm/jikes Rvm/high Performance Computing/informatics & Image Processing Applications.

Authors: Nirmal Tej kumar
Comments: 2 Pages. Short Communication on JCUDA & IMAGE J/JikesRVM/JVM

We observe that “jcuda and imagej” are very useful tools in the context of image processing. Hence this simple suggestion. The title is self explanatory so,we are not going into the details. This short communication just highlights the intended application.
Category: Digital Signal Processing