[11] viXra:1904.0597 [pdf] submitted on 2019-04-30 07:09:49
Authors: Michel SJ Kuipers
Comments: Pages.
Exchanging a secret password or key over an insecure communication line (symmetric key exchange) traditionally always causes the problem that a man-in-the-middle can eavesdrop the communication between the two parties and the intercepted data together with the known algorithm provides a way to deduce the password, making every attempt insecure.
The solution is to use asymmetric key exchange using very complex mathematical formulas which are almost impossible to inverse, invented by Diffie and Hellman.
This article proposes a new invention which is very simple and elegant, and fast to compute, which should make symmetric key exchange logically proven safe (unhackable) and easy to use, solving this old problem in perpetuity.
Category: Digital Signal Processing
[10] viXra:1904.0534 [pdf] submitted on 2019-04-27 11:16:36
Authors: George Rajna
Comments: 47 Pages.
A new study provides insight into multiferroic materials, which could have substantive implications in fields such as data storage. [30] Single-molecule magnets (SMMs) have been attracting a lot of attention recently. This is because of the increased demand for faster, longer-lasting and lower-energy IT systems, and the need for higher data storage capacity. [29] Researchers have discovered that using an easily made combination of materials might be the way to offer a more stable environment for smaller and safer data storage, ultimately leading to miniature computers. [28] demonstrated an original layout of a prototype of multiresonator broadband quantum-memory interface. [27] New nanoparticle-based films that are more than 80 times thinner than a human hair may help to fill this need by providing materials that can holographically archive more than 1000 times more data than a DVD in a 10-by-10-centimeter piece of film. [26] Researches of scientists from South Ural State University are implemented within this area. [25] Following three years of extensive research, Hebrew University of Jerusalem (HU) physicist Dr. Uriel Levy and his team have created technology that will enable computers and all optic communication devices to run 100 times faster through terahertz microchips. [24] When the energy efficiency of electronics poses a challenge, magnetic materials may have a solution. [23]
Category: Digital Signal Processing
[9] viXra:1904.0525 [pdf] submitted on 2019-04-28 04:42:15
Authors: Jianwen Huang, Jianjun Wang, Feng Zhang, Et Al.
Comments: 19 Pages.
Previous work regarding low-rank matrix recovery has concentrated on the scenarios in which the matrix is noise-free and the measurements are corrupted by noise. However, in practical application, the matrix itself is usually perturbed by random noise preceding to measurement. This paper concisely investigates this scenario and evidences that, for most measurement schemes utilized in compressed sensing, the two models are equivalent with the central distinctness that the noise associated with (\ref{eq.3}) is larger by a factor to $mn/M$, where $m,~n$ are the dimension of the matrix and $M$ is the number of measurements. Additionally, this paper discusses the reconstruction of low-rank matrices in the setting, presents sufficient conditions based on the associating null space property to guarantee the robust recovery and obtains the number of measurements. Furthermore, for the non-Gaussian noise scenario, we further explore it and give the corresponding result. The simulation experiments conducted, on the one hand show effect of noise variance on recovery performance, on the other hand demonstrate the verifiability of the proposed model.
Category: Digital Signal Processing
[8] viXra:1904.0471 [pdf] submitted on 2019-04-24 10:45:49
Authors: Saulo Queiroz
Comments: 126 Pages. PhD Thesis
The advent Self-Interference Cancellation (SIC) techniques has turned in-band Full-Duplex
(FD) radios into a reality. FD radios doubles the theoretical capacity of a half-duplex wireless
link by enabling simultaneous transmission and reception in the same channel. A challenging
question raised by that advent is whether it is possible scale the FD gain in Wireless Local Area
Networks (WLANs). Precisely, the question concerns on how a random access Medium Access
Control (MAC) protocol can sustain the FD gain over an increasing number of stations. Also, to
ensure bandwidth resources match traffic demands, the MAC protocol design is also expected
to enable On-Demand Spectrum Allocation (ODSA) policies in the presence of the FD feature.
In this sense, we survey the related literature and find out a coupled FD-ODSA MAC solution
lacks. Also, we identify a prevailing practice for the design of FD MAC protocols we refer to as
the 1:1 FD MAC guideline. Under this guideline, an FD MAC protocol ‘sees’ the whole FD
bandwidth through a single FD PHYsical (PHY) layer. The protocol attempts to occupy the entire
available bandwidth with up to two arbitrary simultaneous transmissions. With this, the resulting
communication range impair the spatial reuse offer which penalizes network throughput. Also,
modulating each data frame across the entire wireless bandwidth demands stronger Received
Signal Strength Indication (RSSI) (in comparison to narrower bandwidths). These drawbacks
can prevent 1:1 FD MAC protocols to scale the FD gain.
To face these drawbacks, we propose the 1:N FD MAC design guideline. Under the 1:N
guideline, FD MAC protocols ‘see’ the FD bandwidth through N >1 orthogonal narrow-channel
PHY layers. Channel orthogonality increases spatial reuse offer and narrow channels relaxes
RSSI requisites. Also, the multi-channel arrangement we adopt facilitates the development
of ODSA policies at the MAC layer. To demonstrate how an FD MAC protocol can operate
under the 1:N design guideline, we propose two case studies. A case study consists of a novel
random access protocol under the 1:N design guideline called the Piece by Piece Enhanced
Distributed Channel Access (PbP-EDCA). The other case study consists in adapting an existing
FD Wi-Fi MAC protocol [Jain et al., 2011]) – we name as the 1:1 FD Busy Tone MAC protocol
(FDBT) – to the 1:N design guideline. Through analytical performance evaluation studies,
we verify the 1:N MAC protocols can outperform the 1:1 FDBT MAC protocol’s saturation
throughput even in scenarios where 1:1 FDBT is expected to maximize the FD gain. Our
results indicate that the capacity upper-bound of an arbitrary 1:1 FD MAC protocol improves
if the protocol functioning can be adapted to work under the 1:N MAC design guideline. To
check whether that assertion is valid, we propose an analytical study and a proof-of-concept
software-defined radio experiment. Our results show the capacity upper-bound gains of both 1:1
and 1:N design guidelines corresponds to 2× and 2.2× the capacity upper-bound achieved by a
standard half-duplex WLAN at the MAC layer, respectively. With these results, we believe our
proposal can inspire a new generation of MAC protocols that can scale the FD gain in WLANs.
Category: Digital Signal Processing
[7] viXra:1904.0470 [pdf] submitted on 2019-04-24 11:22:29
Authors: George Rajna
Comments: 55 Pages.
A team of researchers at NTT Corporation has developed a way to use light-based computer hardware that allows it to to compete with silicon. [36]
Called the Quantum Material Press, or QPress, this system will accelerate the discovery of next-generation materials for the emerging field of quantum information science (QIS). [35]
A novel technique that nudges single atoms to switch places within an atomically thin material could bring scientists another step closer to realizing theoretical physicist Richard Feynman's vision of building tiny machines from the atom up. [34]
Category: Digital Signal Processing
[6] viXra:1904.0394 [pdf] submitted on 2019-04-20 11:59:43
Authors: Michael Harney
Comments: 8 Pages.
Wireless tracking and triangulation approaches have existed for many decades, but the last decade has seen much more focus on efficiency and accuracy of triangulation which has translated into the use of fewer sensors and more efficient algorithms. In the case of tracking high-velocity objects, there is a necessity for accuracy as the error in a tracking system can accumulate quickly and a lock on the object can be lost and never recovered. In the following paper, we will discuss a method of tracking that uses the motion of an object as an advantage in tracking it, with a higher-velocity object providing more data points to allow for more accurate tracking.
Category: Digital Signal Processing
[5] viXra:1904.0253 [pdf] submitted on 2019-04-13 11:44:21
Authors: George Rajna
Comments: 79 Pages.
With a little physics ingenuity, scientists have designed a way to redistribute electricity on a small scale, potentially opening new avenues of research into more energy-efficient computing. [45]
For the first time ever, an international team of researchers imaged the microscopic state of negative capacitance. [44]
One of the leading candidates, spintronics, is based on the idea of carrying information via the spin of electrons. [43]
Category: Digital Signal Processing
[4] viXra:1904.0118 [pdf] submitted on 2019-04-05 08:42:48
Authors: George Rajna
Comments: 51 Pages.
Researchers from the National University of Singapore (NUS) and Singtel, Asia's leading communications technology group, have demonstrated a technique that will help pairs of light particles smoothly navigate these networks, a breakthrough that will enable stronger cyber security. [36]
Researchers of the Institute of Photonic Integration of the Eindhoven University of Technology (TU/e) have developed a 'hybrid technology' which shows the advantages of both light and magnetic hard drives. [35]
Researchers at Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) have developed a simple yet accurate method for finding defects in the latest generation of silicon carbide transistors. [34] In 2017, University of Utah physicist Valy Vardeny called perovskite a "miracle material" for an emerging field of next-generation electronics, called spintronics, and he's standing by that assertion. [33] Scientists at Tokyo Institute of Technology proposed new quasi-1-D materials for potential spintronic applications, an upcoming technology that exploits the spin of electrons. [32] They do this by using "excitons," electrically neutral quasiparticles that exist in insulators, semiconductors and in some liquids. [31] Researchers at ETH Zurich have now developed a method that makes it possible to couple such a spin qubit strongly to microwave photons. [30] Quantum dots that emit entangled photon pairs on demand could be used in quantum communication networks. [29] Researchers successfully integrated the systems-donor atoms and quantum dots. [28] A team of researchers including U of A engineering and physics faculty has developed a new method of detecting single photons, or light particles, using quantum dots. [27] Recent research from Kumamoto University in Japan has revealed that polyoxometalates (POMs), typically used for catalysis, electrochemistry, and photochemistry, may also be used in a technique for analyzing quantum dot (QD) photoluminescence (PL) emission mechanisms. [26]
Category: Digital Signal Processing
[3] viXra:1904.0064 [pdf] submitted on 2019-04-03 11:02:18
Authors: Egger Mielberg
Comments: 12 Pages.
In a system where there are tons of information of different
types it is always hard and frequently impossible to tie the effect to
the cause. There is also a challenge to find relevant data quickly,
especially in case of absence of classification algorithm that is
capable of working with different fields of business and science in
parallel.
We propose a mechanism for building a network of associative
chains that are decentralized to each other. The network allows its
participants to build quickly an associative chain from “effect-tocause”. This feature of the network is extremely useful for
identification of a scam activity.
The mechanism is based on two technologies, “Smart Transactions”
[1] and “Proof of Participation Protocol” [2].
Category: Digital Signal Processing
[2] viXra:1904.0040 [pdf] submitted on 2019-04-02 12:48:01
Authors: Egger Mielberg
Comments: 16 Pages.
As a symmetric as an asymmetric scheme requires a key (session or
private) to be hidden. In this case, an attacker gets a chance and time
for finding and decrypting it. As long as a secret has static attributes
(length, type of characters, etc.) it will always be vulnerable for an
attack.
We propose a new concept of keyless encryption, “Amorphic
scheme”, which is semantically secured and has “Perfect Secrecy”
level. It allows a secret to be transmitted over any public channel with
no public or private key to be generated and stored.
Category: Digital Signal Processing
[1] viXra:1904.0039 [pdf] submitted on 2019-04-02 12:50:41
Authors: Egger Mielberg
Comments: 12 Pages.
Under certain circumstances, determinism of a block cipher can lead
to a disclosure of sensitive information about working mechanism of
underlying machine. Unveiled restrictions of the mechanism can also
give a possibility for an adversary to brute-force the cipher at a
reasonable period of time.
We propose a nondeterministic algorithm operating on variable-length
groups of bits with dynamically varying parts of round ciphertext. We
named it as “Neuron Cipher”. It does not use as public as private key.
In compared with symmetric or asymmetric encryption, it has obvious
practical advantages. Among them is a “Perfect Secrecy” [4].
Category: Digital Signal Processing