Digital Signal Processing

1904 Submissions

[12] viXra:1904.0597 [pdf] submitted on 2019-04-30 07:09:49

Secure Symmetric Key Exchange

Authors: Michel SJ Kuipers
Comments: Pages.

Exchanging a secret password or key over an insecure communication line (symmetric key exchange) traditionally always causes the problem that a man-in-the-middle can eavesdrop the communication between the two parties and the intercepted data together with the known algorithm provides a way to deduce the password, making every attempt insecure. The solution is to use asymmetric key exchange using very complex mathematical formulas which are almost impossible to inverse, invented by Diffie and Hellman. This article proposes a new invention which is very simple and elegant, and fast to compute, which should make symmetric key exchange logically proven safe (unhackable) and easy to use, solving this old problem in perpetuity.
Category: Digital Signal Processing

[11] viXra:1904.0534 [pdf] submitted on 2019-04-27 11:16:36

Materials Improve Data Storage

Authors: George Rajna
Comments: 47 Pages.

A new study provides insight into multiferroic materials, which could have substantive implications in fields such as data storage. [30] Single-molecule magnets (SMMs) have been attracting a lot of attention recently. This is because of the increased demand for faster, longer-lasting and lower-energy IT systems, and the need for higher data storage capacity. [29] Researchers have discovered that using an easily made combination of materials might be the way to offer a more stable environment for smaller and safer data storage, ultimately leading to miniature computers. [28] demonstrated an original layout of a prototype of multiresonator broadband quantum-memory interface. [27] New nanoparticle-based films that are more than 80 times thinner than a human hair may help to fill this need by providing materials that can holographically archive more than 1000 times more data than a DVD in a 10-by-10-centimeter piece of film. [26] Researches of scientists from South Ural State University are implemented within this area. [25] Following three years of extensive research, Hebrew University of Jerusalem (HU) physicist Dr. Uriel Levy and his team have created technology that will enable computers and all optic communication devices to run 100 times faster through terahertz microchips. [24] When the energy efficiency of electronics poses a challenge, magnetic materials may have a solution. [23]
Category: Digital Signal Processing

[10] viXra:1904.0525 [pdf] submitted on 2019-04-28 04:42:15

An Analysis of Noise Folding for Low-Rank Matrix Recovery

Authors: Jianwen Huang, Jianjun Wang, Feng Zhang, Et Al.
Comments: 19 Pages.

Previous work regarding low-rank matrix recovery has concentrated on the scenarios in which the matrix is noise-free and the measurements are corrupted by noise. However, in practical application, the matrix itself is usually perturbed by random noise preceding to measurement. This paper concisely investigates this scenario and evidences that, for most measurement schemes utilized in compressed sensing, the two models are equivalent with the central distinctness that the noise associated with (\ref{eq.3}) is larger by a factor to $mn/M$, where $m,~n$ are the dimension of the matrix and $M$ is the number of measurements. Additionally, this paper discusses the reconstruction of low-rank matrices in the setting, presents sufficient conditions based on the associating null space property to guarantee the robust recovery and obtains the number of measurements. Furthermore, for the non-Gaussian noise scenario, we further explore it and give the corresponding result. The simulation experiments conducted, on the one hand show effect of noise variance on recovery performance, on the other hand demonstrate the verifiability of the proposed model.
Category: Digital Signal Processing

[9] viXra:1904.0471 [pdf] submitted on 2019-04-24 10:45:49

On the In-Band Full-Duplex Gain Scalability in On-demand Spectrum Wireless Local Area Networks

Authors: Saulo Queiroz
Comments: 126 Pages. PhD Thesis

The advent Self-Interference Cancellation (SIC) techniques has turned in-band Full-Duplex (FD) radios into a reality. FD radios doubles the theoretical capacity of a half-duplex wireless link by enabling simultaneous transmission and reception in the same channel. A challenging question raised by that advent is whether it is possible scale the FD gain in Wireless Local Area Networks (WLANs). Precisely, the question concerns on how a random access Medium Access Control (MAC) protocol can sustain the FD gain over an increasing number of stations. Also, to ensure bandwidth resources match traffic demands, the MAC protocol design is also expected to enable On-Demand Spectrum Allocation (ODSA) policies in the presence of the FD feature. In this sense, we survey the related literature and find out a coupled FD-ODSA MAC solution lacks. Also, we identify a prevailing practice for the design of FD MAC protocols we refer to as the 1:1 FD MAC guideline. Under this guideline, an FD MAC protocol ‘sees’ the whole FD bandwidth through a single FD PHYsical (PHY) layer. The protocol attempts to occupy the entire available bandwidth with up to two arbitrary simultaneous transmissions. With this, the resulting communication range impair the spatial reuse offer which penalizes network throughput. Also, modulating each data frame across the entire wireless bandwidth demands stronger Received Signal Strength Indication (RSSI) (in comparison to narrower bandwidths). These drawbacks can prevent 1:1 FD MAC protocols to scale the FD gain. To face these drawbacks, we propose the 1:N FD MAC design guideline. Under the 1:N guideline, FD MAC protocols ‘see’ the FD bandwidth through N >1 orthogonal narrow-channel PHY layers. Channel orthogonality increases spatial reuse offer and narrow channels relaxes RSSI requisites. Also, the multi-channel arrangement we adopt facilitates the development of ODSA policies at the MAC layer. To demonstrate how an FD MAC protocol can operate under the 1:N design guideline, we propose two case studies. A case study consists of a novel random access protocol under the 1:N design guideline called the Piece by Piece Enhanced Distributed Channel Access (PbP-EDCA). The other case study consists in adapting an existing FD Wi-Fi MAC protocol [Jain et al., 2011]) – we name as the 1:1 FD Busy Tone MAC protocol (FDBT) – to the 1:N design guideline. Through analytical performance evaluation studies, we verify the 1:N MAC protocols can outperform the 1:1 FDBT MAC protocol’s saturation throughput even in scenarios where 1:1 FDBT is expected to maximize the FD gain. Our results indicate that the capacity upper-bound of an arbitrary 1:1 FD MAC protocol improves if the protocol functioning can be adapted to work under the 1:N MAC design guideline. To check whether that assertion is valid, we propose an analytical study and a proof-of-concept software-defined radio experiment. Our results show the capacity upper-bound gains of both 1:1 and 1:N design guidelines corresponds to 2× and 2.2× the capacity upper-bound achieved by a standard half-duplex WLAN at the MAC layer, respectively. With these results, we believe our proposal can inspire a new generation of MAC protocols that can scale the FD gain in WLANs.
Category: Digital Signal Processing

[8] viXra:1904.0470 [pdf] submitted on 2019-04-24 11:22:29

Light-Based Computer Hardware

Authors: George Rajna
Comments: 55 Pages.

A team of researchers at NTT Corporation has developed a way to use light-based computer hardware that allows it to to compete with silicon. [36] Called the Quantum Material Press, or QPress, this system will accelerate the discovery of next-generation materials for the emerging field of quantum information science (QIS). [35] A novel technique that nudges single atoms to switch places within an atomically thin material could bring scientists another step closer to realizing theoretical physicist Richard Feynman's vision of building tiny machines from the atom up. [34]
Category: Digital Signal Processing

[7] viXra:1904.0394 [pdf] submitted on 2019-04-20 11:59:43

Improving Triangulation Accuracy in High-Velocity Systems

Authors: Michael Harney
Comments: 8 Pages.

Wireless tracking and triangulation approaches have existed for many decades, but the last decade has seen much more focus on efficiency and accuracy of triangulation which has translated into the use of fewer sensors and more efficient algorithms. In the case of tracking high-velocity objects, there is a necessity for accuracy as the error in a tracking system can accumulate quickly and a lock on the object can be lost and never recovered. In the following paper, we will discuss a method of tracking that uses the motion of an object as an advantage in tracking it, with a higher-velocity object providing more data points to allow for more accurate tracking.
Category: Digital Signal Processing

[6] viXra:1904.0253 [pdf] submitted on 2019-04-13 11:44:21

Negative Capacitor Improve Computing

Authors: George Rajna
Comments: 79 Pages.

With a little physics ingenuity, scientists have designed a way to redistribute electricity on a small scale, potentially opening new avenues of research into more energy-efficient computing. [45] For the first time ever, an international team of researchers imaged the microscopic state of negative capacitance. [44] One of the leading candidates, spintronics, is based on the idea of carrying information via the spin of electrons. [43]
Category: Digital Signal Processing

[5] viXra:1904.0118 [pdf] submitted on 2019-04-05 08:42:48

Photons Trained for Optical Fiber

Authors: George Rajna
Comments: 51 Pages.

Researchers from the National University of Singapore (NUS) and Singtel, Asia's leading communications technology group, have demonstrated a technique that will help pairs of light particles smoothly navigate these networks, a breakthrough that will enable stronger cyber security. [36] Researchers of the Institute of Photonic Integration of the Eindhoven University of Technology (TU/e) have developed a 'hybrid technology' which shows the advantages of both light and magnetic hard drives. [35] Researchers at Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) have developed a simple yet accurate method for finding defects in the latest generation of silicon carbide transistors. [34] In 2017, University of Utah physicist Valy Vardeny called perovskite a "miracle material" for an emerging field of next-generation electronics, called spintronics, and he's standing by that assertion. [33] Scientists at Tokyo Institute of Technology proposed new quasi-1-D materials for potential spintronic applications, an upcoming technology that exploits the spin of electrons. [32] They do this by using "excitons," electrically neutral quasiparticles that exist in insulators, semiconductors and in some liquids. [31] Researchers at ETH Zurich have now developed a method that makes it possible to couple such a spin qubit strongly to microwave photons. [30] Quantum dots that emit entangled photon pairs on demand could be used in quantum communication networks. [29] Researchers successfully integrated the systems-donor atoms and quantum dots. [28] A team of researchers including U of A engineering and physics faculty has developed a new method of detecting single photons, or light particles, using quantum dots. [27] Recent research from Kumamoto University in Japan has revealed that polyoxometalates (POMs), typically used for catalysis, electrochemistry, and photochemistry, may also be used in a technique for analyzing quantum dot (QD) photoluminescence (PL) emission mechanisms. [26]
Category: Digital Signal Processing

[4] viXra:1904.0067 [pdf] submitted on 2019-04-03 10:49:49

Proof of Participation Protocol

Authors: Egger Mielberg
Comments: 21 Pages.

We present an innovative approach to the design of a decentralized asynchronous protocol that will, first, let business of any kind realize any project that can be formalized on a “step-bystep” basis, second, allow its users to completely solve Byzantine problem with one or many contracts-related associative network (subnetwork), third, allow business to design, if needed, a strictly economy-based model that can be stable for a long period of time. The innovative approach is totally based on the technology of Smart Transaction [1]. The protocol is mainly focused on a practical realization of economical business contracts of any kind.
Category: Digital Signal Processing

[3] viXra:1904.0064 [pdf] submitted on 2019-04-03 11:02:18

Neurochain

Authors: Egger Mielberg
Comments: 12 Pages.

In a system where there are tons of information of different types it is always hard and frequently impossible to tie the effect to the cause. There is also a challenge to find relevant data quickly, especially in case of absence of classification algorithm that is capable of working with different fields of business and science in parallel. We propose a mechanism for building a network of associative chains that are decentralized to each other. The network allows its participants to build quickly an associative chain from “effect-tocause”. This feature of the network is extremely useful for identification of a scam activity. The mechanism is based on two technologies, “Smart Transactions” [1] and “Proof of Participation Protocol” [2].
Category: Digital Signal Processing

[2] viXra:1904.0040 [pdf] submitted on 2019-04-02 12:48:01

Amorphic Encryption

Authors: Egger Mielberg
Comments: 16 Pages.

As a symmetric as an asymmetric scheme requires a key (session or private) to be hidden. In this case, an attacker gets a chance and time for finding and decrypting it. As long as a secret has static attributes (length, type of characters, etc.) it will always be vulnerable for an attack. We propose a new concept of keyless encryption, “Amorphic scheme”, which is semantically secured and has “Perfect Secrecy” level. It allows a secret to be transmitted over any public channel with no public or private key to be generated and stored.
Category: Digital Signal Processing

[1] viXra:1904.0039 [pdf] submitted on 2019-04-02 12:50:41

Neuro-Amorphic Construction Algorithm (NACA)

Authors: Egger Mielberg
Comments: 12 Pages.

Under certain circumstances, determinism of a block cipher can lead to a disclosure of sensitive information about working mechanism of underlying machine. Unveiled restrictions of the mechanism can also give a possibility for an adversary to brute-force the cipher at a reasonable period of time. We propose a nondeterministic algorithm operating on variable-length groups of bits with dynamically varying parts of round ciphertext. We named it as “Neuron Cipher”. It does not use as public as private key. In compared with symmetric or asymmetric encryption, it has obvious practical advantages. Among them is a “Perfect Secrecy” [4].
Category: Digital Signal Processing