Previous months:
2009 - 0908(1)
2010 - 1004(1)
2011 - 1103(1)
2012 - 1206(1) - 1208(69) - 1210(1) - 1211(7) - 1212(1)
2013 - 1301(7) - 1306(1) - 1308(1) - 1309(1) - 1310(8)
2014 - 1402(1) - 1403(4) - 1405(42) - 1406(1) - 1408(1) - 1409(1) - 1410(1) - 1411(1) - 1412(1)
2015 - 1502(2) - 1503(1) - 1504(14) - 1505(1) - 1506(2) - 1507(1) - 1508(1) - 1509(2) - 1510(15) - 1511(1)
2016 - 1601(10) - 1603(1) - 1604(2) - 1605(3) - 1607(2) - 1608(3) - 1609(2) - 1610(7) - 1611(1) - 1612(2)
2017 - 1701(3) - 1702(7) - 1703(4) - 1704(5) - 1705(7) - 1706(1) - 1707(2) - 1708(5) - 1709(12) - 1710(7) - 1711(1) - 1712(4)
2018 - 1801(2) - 1802(9) - 1803(13) - 1804(11) - 1805(11) - 1806(6) - 1807(8) - 1808(10) - 1809(2) - 1810(7) - 1811(5) - 1812(15)
2019 - 1901(9) - 1902(3) - 1903(6) - 1904(11) - 1905(14) - 1906(9) - 1907(7) - 1908(4) - 1909(6) - 1910(4) - 1911(1)
2020 - 2001(3) - 2002(4) - 2003(4) - 2004(12) - 2005(3) - 2006(1) - 2008(1) - 2009(4) - 2012(1)
2021 - 2102(3) - 2103(1) - 2106(3) - 2108(3) - 2109(1) - 2110(2) - 2111(1)
2022 - 2201(2) - 2202(1) - 2204(4) - 2205(1) - 2208(1) - 2210(1) - 2211(2)
2023 - 2305(1) - 2308(2) - 2309(2)
2024 - 2403(3) - 2405(1) - 2406(2) - 2408(1) - 2410(1) - 2411(1) - 2412(2)
2025 - 2502(2) - 2503(2) - 2505(1) - 2507(2) - 2510(1) - 2512(2)
2026 - 2601(1) - 2602(1) - 2603(1)
Any replacements are listed farther down
[545] viXra:2603.0018 [pdf] submitted on 2026-03-04 21:08:03
Authors: Donghyeon Sim
Comments: 8 Pages. (Note by viXra Admin: Please submit article written with AI assistance to ai.viXra.org)
Abstract—This paper introduces VPUF Physical OS, the world’s first hardware-native trust substrate designed to establish deterministic biophysical phase coherence for secure wearables and Artificial General Intelligence (AGI) humanoid safety. Traditional Physical Unclonable Functions (PUFs) suffer from environmental instability and failure in genetic proximitydiscrimination[cite: 155, 283]. We propose a biophysical kernel that binds MEMS phase entropy to Ballistocardiogram (BCG) anchors using a Lyapunov-stable operator[cite: 5, 156, 284]. Wefurther establish stochastic stability using Itô calculus to prove noise-resilient quilibrium [cite: 157, 285]. Experimental results on unmodified COTS hardware (iPhone 11 Pro) demonstrate a terminal stability of 0.0072 rad and a 24.7s lock-on time[cite: 6, 158, 286]. Validation with 9 genetically related samplesconfirms an inter-subject correlation of -0.0093[cite: 7, 159, 287]. Furthermore, a Monte Carlo simulation (N=1,000) yields a near-ideal Hamming Distance (HD=0.4731), establishing VPUF as a post-cryptographic standard for DTx and humanoid safety[cite: 160, 288].Index Terms—PUF, Hardware Security, DTx, Lyapunov Stability, Stochastic Differential Equations, Genetic Proximity, Humanoid Safety, AGI Alignment[cite: 8, 161, 289].
Category: Digital Signal Processing
[544] viXra:2602.0078 [pdf] submitted on 2026-02-14 21:12:21
Authors: Shanmuka Gottimukkala
Comments: 4 Pages.
High school students often experience reduced productivity during study sessions due to environmental distractions (noise, poor lighting, temperature) and unmanaged emotional states. Commercial affective computing systems are typically expensive and inaccessible. This study develops and evaluates a low-cost Raspberry Pi-based IoT desk assistant that monitors ambient conditions and delivers real-time visual feedback to enhance emotional awareness and focus.
Category: Digital Signal Processing
[543] viXra:2601.0110 [pdf] submitted on 2026-01-23 03:38:26
Authors: Sasan Ardalan
Comments: 26 Pages.
The algorithms for computing the point target response in Synthetic Aperture Radar (SAR) will be presented. The target modeling and simulations will be performed following the procedure developed by McDonough, et. al. (1985) [1] for SEASAT. Simulation results will be provided through the block diagram modeling of the SAR system with Capsimtextsuperscript{textregistered}[2]. The SAR project has been a part of the Capsimtextsuperscript{textregistered} distribution since 1990. The research on SAR was conducted by the author while a Professor at NC State University in 1987. The GitHub repository was created in November 2025.
Category: Digital Signal Processing
[542] viXra:2512.0073 [pdf] submitted on 2025-12-15 04:56:09
Authors: Sasan Ardalan
Comments: 33 Pages.
In this paper, the computation of the Singular Value Decomposition (SVD) of complex matrices will be presented using fixed point arithmetic. The application of CORDIC operations for fixed point implementations of the SVD of complex matrices will be introduced. SVD plays a major role in Closed Loop MIMO OFDM systems. The impact of fixed point implementation of SVD in a Closed Loop MIMO-OFDM system is examined. The ratio of Maximum to Minimum Singular Value (MMSVR) is computed for both fixed point (CORDIC) and floating point operations (using the LAPACK library). The fixed point implementation closely tracks the floating point results over fading channel models. It is shown that for highly ill-conditioned sub carriers the fixed point implementation deviates from the floating point MMSVR. This leads to noise enhancement and degradation of performance. By adding transmit diversity in Closed Loop MIMO-OFDM the MMSVR can be reduced and performance substantially enhanced for the fixed point implementation. It is also shown how SVD can be used in Open Loop MIMO-OFDM systems. This paper is an important introduction to the algorithms implemented in the GitHub repository for MIMO-OFDM:https://github.com/silicondsp/mimo-ofdm-release
Category: Digital Signal Processing
[541] viXra:2512.0062 [pdf] submitted on 2025-12-15 02:02:49
Authors: Hyok Chol Song, Chol Jin Oh, Chol Hyon Sim, Chol Min Won
Comments: 10 Pages.
Diabetes mellitus poses a significant challenge in clinical settings, necessitating frequent blood glucose measurements for insulin dosage determination. Conventional invasive methods, such as finger pricking, carry risks of infection and skin callusing. Non-invasive monitoring techniques offer a promising alternative for patients with hyperglycemia or hypoglycemia, enabling regular self-monitoring and advancing diabetes research. However, the accuracy and universality of most current non-invasive methods for measuring blood glucose concentration (BGC) remain inadequate. Achieving clinical credibility requires the elimination of individual discrepancies (IDs) in measurements. This study focuses on enhancing monitoring accuracy to a clinically acceptable level by mitigating the effects of IDs. We conducted a detailed analysis of factors influencing Near-Infrared spectroscopy measurements to reduce prediction error. An artificial neural network with a backpropagation algorithm was employed to predict BGC from the acquired spectral data. Experimental results confirm that our proposed BGC prediction model effectively leverages IDs, achieving performance that meets clinical standards.
Category: Digital Signal Processing
[540] viXra:2510.0006 [pdf] submitted on 2025-10-02 23:36:17
Authors: Jorge Martinez Fernandez
Comments: 4 Pages. In Spanish
In this work, two real implementations of sliding mode controllers (CMD) are shown based on a model established as a first order plus dead time (FOPDT) plant, the LabVIEW environment will be used to capture sensor data, as well as to generate the control signal that will be sent to a LabVOLT 3501-M pressure control plant.
Category: Digital Signal Processing
[539] viXra:2507.0098 [pdf] submitted on 2025-07-14 19:43:03
Authors: Warren D. Smith
Comments: 3 Pages.
I formulate the "least cost deconvolution" problem for images, and within my formulation show that with any particular cost-function choices, it (1) has a unique solution, and (2) that solution may be found (for N-pixel images, each pixel value in [0,2V), to D-decimal accuracy) by a polynomial(N,V,D)-time algorithm. "Deconvolution" algorithms have been around since the work of W.H.Richardson, L.B.Lucy, and Jan Högbom in the early 1970s, but it annoyed me that uniqueness and computational-efficiency theorems had not been stated in that literature (at least that I noticed); and indeed some of the prior algorithms had indications to the contrary, e.g. Liu et al 2025, and/or schemes producing local but prpbably non-global cost-minima.
Category: Digital Signal Processing
[538] viXra:2507.0027 [pdf] submitted on 2025-07-04 21:28:32
Authors: Nathan O. Schmidt
Comments: 18 Pages. (Note by viXra Admin: Please submit article written with AI assistance to ai.viXra.org)
In this case study, we engage the novel Tri-Quarter framework by applying it to Binary Phase-Shift Keying (BPSK) signal processing, where we leverage structured orientation phase pair assignments and dynamic weight adjustments to enhance noise filtering and error correction under Gaussian and non-Gaussian noise. We address the challenge of reliable decoding in communication systems like wireless networks, satellite links, and IoT devices, where noise varies from Additive White Gaussian Noise (AWGN) to impulsive noise (IN) interference. The framework implements a model-free methodology by using sign-based phase assignments and distance-based weights to decode signals without prior noise knowledge. Simulations at a signal-to-noise ratio (SNR) of 6 dB with 100,000 trials demonstrate that the Tri-Quarter framework's noise filtering achieves a 2.350% bit error rate (BER) in AWGN, closely matching standard thresholding with 1 CPU cycle, while its error correction with 3 transmissions per symbol yields a 0.138% BER in AWGN and 0.430% BER in IN, performing comparably to majority voting (0.149% BER in AWGN, 1.415% BER in IN) and significantly outperforming Gaussian-tuned soft-decision decoding (0.030% BER in AWGN, 12.769% BER in IN) in non-Gaussian conditions. With 17 CPU cycles for error correction, the Tri-Quarter framework balances efficiency and robustness, dominating in unpredictable noise environments (e.g., urban cellular wireless networks, industrial IoT networks, oceanographic sensor networks, and naval communication networks), though it is less optimal for ultra-low-power devices or Gaussian-dominated environments. This framework offers a versatile solution for modern communication challenges, with potential extensions to complex modulations like Quadrature Phase-Shift Keying (QPSK).
[537] viXra:2505.0191 [pdf] submitted on 2025-05-28 20:40:20
Authors: Saulo Queiroz
Comments: 3 Pages.
We present a novel recursive algorithm for computing the $N$-point Discrete Fourier Transform (DFT) with $O(N log_2 N)$ time complexity, applicable for any integer $N > 0$. Unlike conventional Fast Fourier Transform (FFT) algorithms that often require zero-padding to the nearest power of two, our method operates directly on arbitrary-length input sequences, eliminating the need for zero-padding. At each recusive stage, the algorithm relies on a novel decomposition structure that performs $2(N-1)$ complex additions and $N$ complex ultiplications for typical cases, yielding a total complexity of $T(N)=2T(N/2)+10N-4=10Nlog_2N-4N+K$ real floating point operations (where $K$ is a constant). Although the resulting constants are higher than in classic FFT algorithms -- like radix-2 FFT, that performs $5Nlog_2N$ real floating point operations -- our algorithm does not need zero-padding, which end up by increasing the true complexity of existing FFTs due to the enlarged signal length.
Category: Digital Signal Processing
[536] viXra:2503.0018 [pdf] submitted on 2025-03-03 14:02:01
Authors: Andrei I. Bodrenko
Comments: 5 Pages.
A new type of wireless computer network is presented in this article. This wireless network, for data transmission, uses visible light, and does not use intensity modulation of optical sources, such as light-emitting diodes and etc. Thus represented wireless network differs substantially from wireless networks covered by the existing IEEE standards of 2017, and its ongoing revisions, for visible-light communication (VLC) technologies, Li-Fi technology and optical camera communication (OCC) technologies. This new wireless technology can be used for the next generation of wireless communication networks such as 5G networks.
Category: Digital Signal Processing
[535] viXra:2503.0003 [pdf] submitted on 2025-03-01 14:42:18
Authors: Andrei I. Bodrenko
Comments: 4 Pages.
New type of wireless computer network in chemical systems is presented in this article. This wireless network uses chemical system as physical media for data transmission, instead of environment. Thus, represented wireless network differs substantially from molecular communication networks and wireless networks covered by IEEE standards, such as radio frequency based wireless networks. This new wireless technology can be used not only in chemical industry for continuous controlling chemical processes in chemical reactions zones but also for medical purposes, and as a new type of wireless body area computer network.
Category: Digital Signal Processing
[534] viXra:2502.0020 [pdf] submitted on 2025-02-03 20:17:45
Authors: Andrei I. Bodrenko
Comments: 3 Pages.
Molecular Communications : Method of use of chemical system as transmission medium in wireless data communication channel (DCC) is represented in this article.
Category: Digital Signal Processing
[533] viXra:2412.0028 [pdf] submitted on 2024-12-06 20:43:01
Authors: Sasan Ardalan
Comments: 37 Pages.
A technique for modeling plane wave propagation through inhomogeneous media and plasma layers with different electron densities is presented. The technique is based on transmission line theory. Therefore, a general technique is introduced for solving complex transmission line systems. A data structure and algorithm for representing, and simultaneously solving for all nodes within the transmission line network is presented. The method is based on representing the network as a recursive tree structure and solving for the voltage, current, and impedance at each node using recursive programming techniques. First, all frequency dependent parameters within the tree structure are updated, then in a post-order traversing of the tree, the impedance at each node are computed followed by a pre-order traversing of the tree to compute node voltagesand currents. For plane wave propagation, the reflection coefficient, the electric field andmagnetic field are computed. The method is applied to normal incidence but can easily be extended to oblique incidence. A tapered transmission line model was used to verify the algorithm. In addition, an example was provided verifying the ability to compute the frequency response and impulse response of a system with a plasma. Finally, the application of the technique to model the heat tile and the plasma that develops on either aero-assist or spacecraft re-entry is presented.This paper is based on work done at the Center for Communication and Signal Processing (CCSP) at North Carolina State University by the author in 1987. In addition, the paper presents work which was supported by NASA Langley Research Center under Contract NASI-1x925. The author was the Principal Investigator.
Category: Digital Signal Processing
[532] viXra:2412.0002 [pdf] submitted on 2024-12-02 02:06:58
Authors: Sasan Ardalan
Comments: 38 Pages.
The up conversion of a 5GHz WiFi signal to 10.56GHz IF signal enables the transmission of the WiFi signal at XBand frequencies for high throughput digital communications over XBand. The XBand signal can be up converted from the 10.56GHz XBand signal to 60 GHz or 28 GHz bands. It is imperative that the WiFi channel be centered at a specific frequency, for example, 10.56GHz, for optimal performance and to meet ITU an FCC band allocation requirements. In addition, the WiFi channel centered at 10.56GHz must be interference (jammer) free so that the over the air signal is jammer free, a key requirement. The XBand Spectrum is also available for Amateur Extra Class from 10.0GHz to 10.5GHz so the capability to center the frequency is critical. This paper describes the challenges in up converting and down converting WiFi signals at 5GHz to X-Band and offers a unique solution that provides a jammer free spectrum and capability to dial in the center frequency. A complete system was designed, prototyped and built, verifying the design over the air. IEEE802.11ac Access Points were used at 5.21 GHz with a bandwidth of 160 MHz. This work paves the way for high throughput digital communication over XBand links with bandwidths of 80MHz and 160MHz.
Category: Digital Signal Processing
[531] viXra:2411.0157 [pdf] submitted on 2024-11-25 21:59:07
Authors: Xuancheng Ren, Xinyu Yuan, Qixiang Yang, Hengzhi Zhang, Jingyi Li
Comments: 24 Pages.
This document explores the principles and applications of Synthetic Aperture Radar (SAR) imaging, with a focus on Backprojection (BP) algorithms for microwave data imaging. It starts by introducing SAR technology, its historical development, and fundamental imaging mechanisms. Key differences between SAR and conventional radar systems are highlighted, emphasizing SAR's advantages in achieving high-resolution imaging through pulse compression and Doppler frequency shifts.The document then delves into signal processing techniques, including Linear Frequency Modulation (LFM) signals, range compression, and Doppler phase compensation. The BP algorithm is discussed in depth, covering echo signal modeling, range migration correction, and coherent accumulation. Simulation results demonstrate the BP algorithm's capability to reconstruct detailed images, illustrating the impact of interpolation coefficients on image quality.Additionally, alternative SAR algorithms like DBS, RD, and CS are compared, showcasing their strengths and limitations in various scenarios. The study concludes by emphasizing the BP algorithm's importance in SAR imaging and its potential for future technological advancements.This research, conducted by Fudan University, provides valuable insights into microwave data imaging and signal processing in SAR systems, paving the way for more efficient imaging techniques.
Category: Digital Signal Processing
[530] viXra:2410.0132 [pdf] submitted on 2024-10-22 21:58:59
Authors: Pyon Kwang Hyok, Son Jin Song
Comments: 13 Pages.
These papers introduce control method of random vibration test using fuzzy CMAC (Cerebellar Model Articulation Controller) based on high learning power of CMAC and knowledge-expression of fuzzy.Proposed method is real time control method in time domain in some other way spectra method based on amplitude frequency response. These papers establish the random vibration control theory to neglect the change of mathematical models of vibration testers according to its types and sizes, using fuzzy CMAC neural network. Finally, its accuracy is proved through MATLAB SIMULINK simulation.
Category: Digital Signal Processing
[529] viXra:2408.0084 [pdf] submitted on 2024-08-19 21:34:56
Authors: Andrey V. Voron
Comments: 35 Pages.
It is shown that modern number systems (unlike Fibonacci) have a significant disadvantage in the form of zero redundancy of the code. But the redundancy of the Fibonacci code is not constant: the redundancy of the code for individual numbers varies significantly. Based on the Fibonacci number system with Fibonacci codes with unlimited redundancy, a Rule for limiting code redundancy is formulated.
Category: Digital Signal Processing
[528] viXra:2406.0065 [pdf] submitted on 2024-06-13 20:58:43
Authors: Jang Chol Guk, Ra Song Nam, Kim Hyon Jin, Ri Yong Gwang, Yun Jong Gyong
Comments: 8 Pages.
In Brinell hardness measurement, the diameter measurement of the indentation is an important process related to the measurement accuracy.In this paper, a special image input device was designed to input the magnified image of the indentation to increase the accuracy of hardness measurement. Then, a method for determining Brinell hardness according to the indentation diameter obtained by Hough transform on the input image was established and implemented as a device using a single-board computer Raspberry Pi 3. The experimental results demonstrate that the designed measurement device can be used to provide the high accuracy and convenient measurement.
Category: Digital Signal Processing
[527] viXra:2406.0064 [pdf] submitted on 2024-06-13 20:57:46
Authors: Kwang Su Kim, Jin Myong Kim, Pok Sol Chae, Song Gwon Ri
Comments: 6 Pages.
In this paper, a compact coplanar waveguide (CPW)-fed quintuple-band-notched antenna for ultra-wideband(UWB) applications is presented. The voltage standing wave ratio (VSWR) results show that the proposed antenna exhibits good wideband performance over an UWB frequency range from 1.4 to 10.7 GHz with VSWR less than 2, except for five stop-bands at 2.1 to 2.6 GHz, 3.3 to 3.75 GHz, 5.15 to 5.85 GHz, 7.2 to 7.6 GHz and 8.15 to 8.52 GHz for filtering the worldwide interoperability for microwave access (WiMAX) systems, wireless local area networks (WLANs), downlink of X-band satellite communication system and ITU band signals, respectively. Good radiation patterns and gain characteristics are obtained in the whole UWB frequency range except the notched frequency bands. The simulation results were compared with the measured results and good agreement is obtained. The proposed antenna provides the simple structure and good characteristics and is suitable for UWB applications.
Category: Digital Signal Processing
[526] viXra:2405.0042 [pdf] submitted on 2024-05-07 07:37:45
Authors: Song-Chun Pang, Jong-Pil Sim, Son-Myong Hwang
Comments: 11 Pages.
With the rapid development of the Internet, multimedia communication and authorization become more and more important. In order to avoid geometric distortions in watermark embedding, this paper proposes a geometrical attack resistant image watermarking algorithm based on histogram modification. The watermark information is embedded into the original image by modifying the number of the gray samples of the image histogram. One bit of the watermark is embedded by changing the number of samples of the three adjacent grey levels in the histograms and the same watermark repeatedly embedded into each of the four histograms. Watermark detection is an inverse process of watermark embedding. Watermark information is detected based on the relationship of the number of samples of the three successive gray levels. The experimental results show that our algorithm is robust to both geometrical attacks and those conventional signal processing attacks and achieves high detection rate.
Category: Digital Signal Processing
[525] viXra:2403.0136 [pdf] submitted on 2024-03-30 01:28:54
Authors: Md Mubdiul Hasan
Comments: 4 Pages.
Hearing loss is a common health issue that affects nearly 10% of the world population reported by international studies. The hearing impaired typically experience more mental disorientation than those with normal hearing levels. It is often difficult to analyze hearing loss that would closely match with prescribed real ear gain/frequency responses due to technological limitations. The conventional device for hearing impairment is an electronic circuit whose main components are transducers (microphone and receiver). This study is focused on the electronic components those are relatively cheap and available in local market. In this paper the conventional active equalizer circuit especially bass, treble, and mid control based equalizer is implemented by op-amp LM741. Overall gain is split between input and output buffers, for bass ±15dB in 100Hz, mid ±9dB for 1kHz and for treble ±15dB in 10kHz. A trimmer-adjusted, lighter, pocket —carry device can be developed in this case.
Category: Digital Signal Processing
[524] viXra:2403.0095 [pdf] submitted on 2024-03-20 21:01:36
Authors: Jan Langen, Kerstin Sahler, Claus Brell
Comments: 13 Pages.
Today, the Internet of Things (IoT) is here to stay. In addition to various application areas, IoT is useful in the context of beekeeping, especially for digital and networked monitoring of hives. For practical implementation, differ-ent application layer protocols can be chosen. But which protocol is more suitable in the context of beekeeping? HTTP (Hypertext Transfer Protocol) or MQTT (Message Queuing Telemetry Transport)? This is one of the questions addressed in the Biene40 project, which focuses on networked sensors. In this paper, we derive the advantages and disadvantages of each protocol based on a literature review and the development of two IoT-based prototypes that communicate via either HTTP or MQTT. Our research show that the message overhead of the MQTT protocol is lower than that of HTTP. However, the connection cost of MQTT is quite high, especially at the beginning of a connection. Therefore, the choice of protocol depends on the specific use case. If only a few messages are transmitted at long intervals, HTTP is more resource efficient. With respect to the developed prototypes and the application context of beehive monitoring, HTTP is the preferred choice.
Category: Digital Signal Processing
[523] viXra:2403.0043 [pdf] submitted on 2024-03-11 20:24:08
Authors: Abdalrhman Alquaary, Hasan Bayhan
Comments: 11 Pages.
In industrial environments, achieving effective communication between electronic devices poses a multifaceted challenge that hinges on the seamless integration of both hardware and software protocols. This paper introduces AB485, a purpose-built data transfer protocol designed primarily for microcontroller-based systems, offering a streamlined solution to the complexities of software protocol implementation. We delve into AB485's design principles and features, underscoring its minimal hardware and software requirements. Notably, AB485 stands out for its ease of implementation, enabling engineers or system integrators to seamlessly integrate it into their projects. We also explore potential applications where AB485's efficiency and low overhead make substantial contributions to ensuring reliable data transmission. By presenting AB485, our research contributes to the field of data transfer protocols, offering an accessible and efficient solution for resource-constrained applications, while addressing the intricate interplay of hardware and software in data communication.
Category: Digital Signal Processing
[522] viXra:2309.0147 [pdf] submitted on 2023-09-29 11:51:49
Authors: Marcello Colozzo
Comments: 2 Pages.
We determine the Fourier Transform of the Dirac comb.
Category: Digital Signal Processing
[521] viXra:2309.0075 [pdf] submitted on 2023-09-16 19:55:42
Authors: Muhammad Samiullah, Muhammad Zohaib Irfan
Comments: 5 Pages.
This review paper provides a comprehensive overview of five popular microcontrollers: AVR, 8052, PIC, ESP32, and STM32. Each microcontroller is analyzed in terms of its architecture, peripherals, development environment, and application areas. A comparison is provided to highlight the key differences between these microcontrollers and assist engineers in selecting the most appropriate microcontroller for their specific needs. This paper serves as a valuable resource for beginners and experienced engineers alike, providing a comprehensive understanding of the different microcontrollers available and their respective applications.
Category: Digital Signal Processing
[520] viXra:2308.0149 [pdf] submitted on 2023-08-23 00:30:59
Authors: Jon Tae Bom, Kim Kyong Jin, Ri Hyo Il, HyonChol Kim, Jang Un Ju
Comments: 6 Pages.
This paper presents the new digital image watermarking technique that has high imperceptibility and robustness against various geometric image attacks such as rotation attack and cropping attack using discrete wavelet transform (DWT) and singular value decomposition (SVD).In this paper, watermark logo is scrambled by 3D Arnold’s cat mapping and Chebyshev mapping, then security of watermark logo is realized.And control parameters of chaos mapping are encrypted bythe proposed quantum resistant encryption technique.Also in this paper, the suitable color image similarity evaluation method and the suitable embedding scaling factor using the relative vision characteristic of human are defined,computed and used in evaluation of imperceptibility.
Category: Digital Signal Processing
[519] viXra:2308.0104 [pdf] submitted on 2023-08-15 20:09:41
Authors: GyongBong Ju, KyuSol Han, SongIl An, SongIl Han
Comments: 19 Pages.
Today, the security problem is emerging as a crucial problem for people, and research into solving this problem is now on its way worldwide. Everyone is aware of the urgency and seriousness of the security problem, and at this time, this problem has a giant impact on the overall social life. As science and technology develop, researches for solving security problems are advancing to a new stage, and their reliability is increasing day by day.In this study, a powerful quadruple security system was designed and realized by combining Keypad, RFID, Fingerprint, and Bluetooth (HC06) modules to thoroughly secure the security of medicines, jewelry, documents, and other valuables and doors.This system is based on the Arduino Mega 2560 microcontroller and is an intelligent system with a display function, voice function, SMS transmission function by GSM module, and alarm function. The system is an excellent system that can thoroughly guarantee the safety of security with low cost and low power consumption.
Category: Digital Signal Processing
[518] viXra:2305.0086 [pdf] submitted on 2023-05-11 00:47:25
Authors: Evgenii Litvinov
Comments: 7 Pages.
According Wikipedia, an undocumented feature is an unintended or undocumented hardware operation, for example an undocumented instruction, or software feature found in computer hardware and software that is considered beneficial or useful. Sometimes the documentation is omitted through oversight, but undocumented features are sometimes not intended for use by end users, but left available for use by the vendor for software support anddevelopment. Also, some unintended operation of hardware or software that ends up being of utility to users is simply a bug, flaw or quirk [1]. I believe that according to the definition of backdoor [2], and it refers to a special case of undocumented feature, because in both cases this information, which is known and used byvendors for software support and development. Manufacturers of advanced sensors, gate valves, pumps, video cameras and other lowlevel (abbreviated as LL) automation products offer "smart" versions of their products. All ofthese "smart" solutions involve variability, programmability and versatility in terms of productapplication, as well as cost and commissioning time reduction. Given that product variability, programmability and versatility are often achieved through the use of programmable elements, this imposes a great deal of responsibility on product manufacturers and requires vigilance on the part of consumers. This article will not discuss individual household products in the form of smart homes, smart TVs, the Internet of Things, etc., but anyone who reads the material outlined can imagine how unpredictable any item in their home can be if the manufacturer has not shown sufficient responsibility.
Category: Digital Signal Processing
[517] viXra:2212.0071 [pdf] submitted on 2022-12-09 00:09:42
Authors: Herman Schoenfeld
Comments: 10 Pages. Copyright (c) Sphere 10 Software Pty Ltd, originally written in 2020.
A quantum-resistant, many-time signature scheme combining Winternitz and Merkle-Signatureschemes is proposed. This construction is compatible with the Abstract Merkle Signature (AMS)Scheme 1 and thus is an AMS-algorithm called "WAMS".
Category: Digital Signal Processing
[516] viXra:2212.0019 [pdf] submitted on 2022-12-04 01:16:13
Authors: Herman Schoenfeld
Comments: 9 Pages. Copyright (c) Sphere 10 Software Pty Ltd, MIT license, originally written in 2020.
An abstract post-quantum digital signature scheme is presented that parameterizes a one-timesignature scheme (OTS) for "many-time" use. This scheme permits a single key to sign a (great)many messages without security degradation by following the original Merkle-Signature Schemebut without a coupling to a specific OTS. Various features are include a reduction of signaturesizes, resistance to denial-of-service attacks and smaller public keys. This construction comprisesa bit-level specification for the Abstract Merkle Signature Scheme (AMSS).
Category: Digital Signal Processing
[515] viXra:2211.0125 [pdf] submitted on 2022-11-21 01:10:29
Authors: Valeriy Kizka
Comments: 6 Pages. 1 Figure.
The article proposes to use a radio holography for the detection and identification of unmanned aerial vehicles (UAVs).
Category: Digital Signal Processing
[514] viXra:2210.0010 [pdf] submitted on 2022-10-02 23:37:17
Authors: Ram Lal Mehta, Touseef Ahmad, Arundhati Misra
Comments: 10 Pages. 38th Asian Conference on Remote Sensing (ACRS 2017)
Indira Gandhi Canal Project has enhanced considerable food production in the desert area of Rajasthan, it also brought problems such as waterlogging and secondary salinisation. Impounding of Ghaggar flood water in natural depression is the main cause of seepage. Villages are located at a lower altitude than the level of water stored in depressions, which creates a steep gradient and sand dunes being pervious, causing heavy seepage. The steady rise of the water table causes waterlogging conditions in surrounding areas. The unlined canals from the saddle dams and continuous application of surface irrigation at higher frequencies have further added to the problem. One of the significant advantages of SAR is penetration through dry soil and detecting subsurface geological and fluvial features. This paper presents the results of identifying subsurface canal seepage in the sand dune area of Hanumangarh district, Rajasthan using multi-date MRS RISAT-1 SAR data. Signatures of high subsurface soil moisture accumulated in the depressions below the sand dunes and along the canal was analysed and identified as seepage areas. Landsat-8 images and field soil moisture data were used as complementary information to find the surface and subsurface soil moisture, crop and vegetation condition of the area. Subsurface moisture was identified with higher sensitivity in the cross polarizations (HV) images due to high volume scattering caused by the buried moisture-bearing structures. The cross-polarization ratio (CPR) observed was higher in the case of subsurface soil moisture than surface moisture signature. Significant depletion in soil moisture of seepage areas was observed in the images acquired during the month of June 2015.
Category: Digital Signal Processing
[513] viXra:2208.0172 [pdf] submitted on 2022-08-31 03:47:52
Authors: Mojtaba Heydari, Matthew McCallum, Andreas Ehmann, Zhiyao Duan
Comments: 5 Pages. 2022 IEEE International Conference on Acoustics, Speech and Signal Processing
Inferring music time structures has a broad range of applications in music production, processing and analysis. Scholars have proposed various methods toanalyze different aspects of time structures, such as beat, downbeat, tempo and meter.Many state-of-the-art (SOFA) methods, however, are computationally expensive. This makes them inapplicable in real-world industrial settings where the scale of the music collections can be millions. This paper proposes a new state space and a semi-Markov model for music time structure analysis. The proposed approach turns the commonly used 2D state spaces into a 1D model through a jump-back reward strategy. It reduces the state spaces size drastically. We then utilize the proposed method for causal, joint beat, downbeat, tempo, and meter tracking, and compare it against several previous methods. The proposed method delivers similar performance with the SOFA joint causal models with a much smaller state space and a more than 30 times speedup.
Category: Digital Signal Processing
[512] viXra:2204.0110 [pdf] submitted on 2022-04-18 00:22:10
Authors: M. Rajululkahf
Comments: 6 Pages.
This paper proposes Ġasaq; a provably secure key derivation method that, when given access to a true random number generator (TRNG), allows communicating parties, that have a pre-shared secret password p, to agree on a secret key k that is indistinguishable from truly random numbers with a guaranteed entropy of min(H(p), |k|).
Ġasaq's security guarantees hold even in a post-quantum world under Grover's algorithm, or even if it turns out that P = NP. Such strong security guarantees, that are similar to those of the one time pad (OTP), became attractive after the introduction of Băhēm; a similarly provably secure symmetric cipher that is strong enough to shift cipher's security bottleneck to the key derivation function.
State of art key derivation functions such as the PBKDF, or even memory-hard variants such as Argon2, are not provably secure, but rather not fully broken yet. They do not guarantee against needlessly losing password entropies; that is, the output key could have an entropy lower than password's entropy, even if such entropy is less than key's bit length. In addition to assuming that P != NP, and, even then, getting their key space square-rooted under Grover's algorithm---none of which are limitations of Ġasaq.
Using such key derivation functions, as the PBKDF or Argon2, is acceptable with conventional ciphers, such as ChaCha20 or AES, as they, too, suffer the same limitations, hence none of them are bottlenecks for the other. Similarly to how a glass door is not a security bottleneck for a glass house.
However, a question is: why would a people secure their belongings in a glass made structure, to justify a glass door, when they can use a re-enforced steel structure at a similar cost? This is where Ġasaq comes to offer Băhēm the re-enforced steel door that matches its security.
Category: Digital Signal Processing
[511] viXra:2204.0094 [pdf] submitted on 2022-04-16 07:14:26
Authors: Amey Thakur, Mega Satish
Comments: 6 Pages, 7 figures, Volume 9, Issue III, International Research Journal of Engineering and Technology (IRJET), 2022.
Clock discrepancies are troublesome in distributed systems and pose major difficulties. To avoid mistakes, the clocks of separate CPUs must be synced. This is to ensure that communication and resource sharing are as efficient as possible. As a result, the clocks must be constantly monitored and adjusted. Otherwise, the clocks drift apart. Clock skew causes a disparity in the time values of two clocks. Both of these issues must be solved in order to make effective use of distributed system characteristics. In this study, we briefly explored the features of distributed systems and its algorithms.
Category: Digital Signal Processing
[510] viXra:2204.0084 [pdf] submitted on 2022-04-15 08:57:55
Authors: Yuji Masuda
Comments: 2 Pages.
The purpose of this chapter is to illustrate in figures the similarities between My Definition and the basic DRAM structure, as well as expectations for its application.
Category: Digital Signal Processing
[509] viXra:2204.0064 [pdf] submitted on 2022-04-13 20:44:34
Authors: M. Rajululkahf
Comments: 4 Pages.
This paper proposes Băhēm; a symmetric cipher that, when used with a pre-shared secret key k, no cryptanalysis can degrade its security below H(k) bits of entropy, even under Grover's algorithm or even if it turned out that P = NP. Băhēm's security is very similar to that of the one-time pad (OTP), except that it does not require the communicating parties the inconvenient constraint of generating a large random pad in advance of their communication. Instead, Băhēm allows the parties to agree on a small pre-shared secret key, such as |k| = 128 bits, and then generate their random pads in the future as they go. For any operation, be it encryption or decryption, Băhēm performs only 4 exclusive-or operations (XORs) per cleartext bit including its 2 overhead bits. If it takes a CPU 1 cycle to perform an XOR between a pair of 64 bit variables, then a Băhēm operation takes 4 / 8 = 0.5 cycles per byte. Further, all Băhēm's operations are independent, therefore a system with n many CPU cores can perform 0.5 / n cpu cycles per byte per wall-clock time. While Băhēm has an overhead of 2 extra bits per every encrypted cleartext bit, its early single-threaded prototype implementation achieves a faster /decryption/ than OpenSSL's ChaCha20's, despite the fact that Băhēm's ciphertext is 3 times larger than ChaCha20's. This support that the 2 bit overhead is practically negligible for most applications. Băhēm's early prototype has a slower /encryption/ time than OpenSSL's ChaCha20 due to its use of a true random number generator (TRNG). However, this can be trivially optimised by gathering the true random bits in advance, so Băhēm gets the entropy conveniently when it runs. Aside from Băhēm's usage as a provably-secure general-purpose symmetric cipher, it can also be used, in some applications such as password verification, to enhance existing hashing functions to become provably one-way, by using Băhēm to encrypt a predefined string using the hash as the key. A password is then verified if its hash decrypts the Băhēm ciphertext to retrieve the predefined string.
Category: Digital Signal Processing
[508] viXra:2202.0123 [pdf] submitted on 2022-02-19 21:04:47
Authors: Wendyida Kabore Kabore
Comments: 73 Pages. [Corrections made by viXra Admin to conform with the requirements on the Submission Form]
Power amplification efficiency enhancement is a critical issue for wireless communication applications. The amplification of signals that have a high dynamic range consumes a lot of energy. Amplifying signals with a constant envelope is a possible solution to get a maximum performance of the amplifier. However, the signals that are currently available in several systems, are multi-carrier signals which are very attractive but have a high PAPR in principle. During this internship, we studied a multi-carrier waveform (to enjoy all the benefits inherent in it) with a low PAPR. This is about to use PAPR reduction techniques like "adding signal" methods, coupled with a new definition of the multicarrier signal. The clipping for example, has been modeled as an adding signal technique, but the addition of the clipping signal occurs on certain free subcarriers that are not used to transmit data. Not all the clipping signal frequencies are used. The major problem is that the subcarriers on which the clipping signal can be added are reduced in number. So to add the clipping signal more efficiently we need to have more frequency space. The key idea here is to perform the duobinary coding in each of the OFDM subcarriers. The duobinary coding reduces the spectral occupancy by half. Thus, we can use the vacant spectrum to add the clipping signal orthogonaly to the data signal. Then comes the study of the performances of this new waveform in terms of gain in PAPR, complexity (receiving process) and ACPR. This study confirm the efficiency of the proposed technique.
Category: Digital Signal Processing
[507] viXra:2201.0141 [pdf] submitted on 2022-01-20 18:41:26
Authors: Antonio Boccuto, Ivan Gerace, Valentina Giorgetti, Gabriele Valenti
Comments: 86 Pages.
In this paper we study a Blind Source Separation (BSS) problem, and in particular we deal with document restoration. We consider the classical linear model. To this aim, we analyze the derivatives of the images instead of the intensity levels. Thus, we can establish a non-overlapping constraints on document sources. Moreover, we impose that the rows of the mixture matrices of the sources have sum equal to 1, in order to keep equal the lightnesses of the estimated sources and of the data.
Here we give a technique which uses the symmetric
factorization, whose goodness is tested by the
experimental results.
Category: Digital Signal Processing
[506] viXra:2201.0050 [pdf] submitted on 2022-01-10 14:13:32
Authors: Antonio Boccuto, Ivan Gerace, Valentina Giorgetti
Comments: 21 Pages.
We deal with the problem of blind separation of the components, in particular for documents corrupted by bleed-through and show-through. So, we analyze a regularization technique, which
estimates the original sources, the interference levels and the blur operators. We treat the estimate of the interference levels, given the original sources and the blur operators. In particular, we investigate several GNC-type algorithms for minimizing the energy function.
In the experimental results, we find which algorithm gives more precise estimates of the interference levels.
Category: Digital Signal Processing
[505] viXra:2111.0040 [pdf] submitted on 2021-11-07 22:45:54
Authors: Jules Repusseau
Comments: 12 Pages. [Corrections made by viXra Admin]
Collecting and utilizing food data across the life cycle is difficult and expensive because of their movement across the multiple stakeholders on the agrifood supply chain.
Interestingly, product centric approaches that present effective solutions to analyze product lifecycle have been problematic to deploy across multiple industries.
Blockchain has been adopted in the food system and traceability and brings many advantages for provenance, compliance, authenticity and quality. However most of the applications are permissioned and mostly at the benefits of a private owner or consortium. Accumulated data therefore cannot be reused by all stakeholders and no common data model can be built. This lack of cooperation has an impact on farmers, where data governance can be a direct source of income and social benefits, and an impact on researchers that cannot reuse and improve food security models, study sustainability or carbon emission without relying on private companies. Food security is a public good and our proposal introduces a permissionless food product centered approach based on NFT to protect public information and farmers stability.
Category: Digital Signal Processing
[504] viXra:2110.0151 [pdf] submitted on 2021-10-25 08:48:24
Authors: Eckhard Hitzer, Werner Benger, Manfred Niederwieser, Ramona Baran, Frank Steinbacher
Comments: 34 Pages. Accepted for publication in Advances in Applied Clifford Algebras, Oct. 2021, 1 table, 1 figure.
Typically, airborne laserscanning includes a laser mounted
on an airplane or drone (its pulsed beam direction can scan in flight
direction and perpendicular to it) an intertial positioning system of gyroscopes, and a global navigation satellite system. The data, relative
orientation and relative distance of these three systems are combined
in computing strips of ground surface point locations in an earth fixed
coordinate system. Finally, all laserscanning strips are combined via iterative closes point methods to an interactive three-dimensional terrain
map. In this work we describe the mathematical framework for how
to use the iterative closest point method for the adjustment of the airborne laserscanning data strips in the framework of conformal geometric
algebra.
Category: Digital Signal Processing
[503] viXra:2110.0094 [pdf] submitted on 2021-10-18 21:36:07
Authors: Andrei Keino
Comments: 4 Pages. GPL v. 3.0 License
The article introduces very simple and quite effective algorithm for constant state
detection in time series. The algorithm, based on sliding window of variable length,
searches a sections of time series with some given minimal length, that have all the
values in some given range. It is shown that the computational complexity of aforementioned algorithm is O(N log N); where N is the length of time series.
Category: Digital Signal Processing
[502] viXra:2109.0172 [pdf] submitted on 2021-09-23 04:01:04
Authors: Mahmoud Amin, Noha Mohamed
Comments: 13 Pages.
Human motion recognition is an important topic in computer vision as well as security. It is used in scientific research, surveillance cameras industry and robotics technology as well. The human interaction with the objects creates a complex stance. Multiple artefacts such as clutter, occlusions, and backdrop diversity contribute to the complexity of this technology. Wi-Fi signals with the usage of their features could help solve some of these issues, with the help of other wearable sensors, such as: RGB-D camera, IR sensor (thermal camera), inertial sensor etc. This paper reviews various approaches for Wi-Fi human motion recognition systems, their analytical methodologies, challenges and proposed techniques along with the aspects to this paper: (a) applications; (b) single and multi-modality sensing; (c) Wi-Fi-based techniques; d) challenges and future works. More research related to Wi-Fi human related activity recognition can be encouraged and improved.
Category: Digital Signal Processing
[501] viXra:2108.0132 [pdf] submitted on 2021-08-24 09:51:43
Authors: Fran De Aquino
Comments: 3 Pages.
The Quantum Computers use qubits (or qbits), the quanta bits, which can assume values 0 or 1, or a superposition of both. In this work, we propose a new type of quantum bit, the Gravitational Quantum Bit or Gqbit, which can be used as an information unit. The concept of the Gqbit is based on the theory of the Gravitational Electromotive Force (Gemf) [1], which shows that, when an electron absorbs a quantum of energy sufficient strong, the gravitational force acting upon it (its weight) changes of direction. The weight of the electron can assume two fundamental statuses. For up, (gravitational force in opposite direction to the gravity g )and, for down (gravitational force in the same direction of g ). Conventionally, we can then assume that for up, the weight of the electron represents the number 0, and that for down, it represents the number 1, similarly to the spin of the electron, which can be interpreted as if the electron rotates in one direction or the other - in this case, rotation in one direction would represent 0 and, in the other, it would represent 1.
Category: Digital Signal Processing
[500] viXra:2108.0010 [pdf] submitted on 2021-08-03 22:00:24
Authors: Aarthi Nadarajan
Comments: 3 Pages.
The progress and dominance of the microelectronics
industry has been based on scaling and maintaining functionality at ever smaller scales. The resulting changes in size and package
density have limitations due to the physical laws that govern the transistor paradigm. Quantum dot cellular automata (QCA) offer a solution to accomplish device functionalities at nanometer
scales. This paper details QCA implementation with simulation results which intuitively prove they are much smaller than the same circuits in standard CMOS technology. The proposed area
efficient decoder in this paper is optimal in terms of usage of number of quantum dot cells with a simpler clocking scheme and good performance. The field of quantum dots is relatively at its
infancy with significant opportunities for future growth and real time implementations.
Category: Digital Signal Processing
[499] viXra:2108.0001 [pdf] submitted on 2021-08-01 18:49:37
Authors: Shiv Kokroo
Comments: 2 Pages. Creative Commons license.
Here, I describe a machine prototype that allows differently-abled people to walk again. The unique feature of this machine is that it can be mass-produced for a very reasonable cost and the hardware/software is mostly open source.
Category: Digital Signal Processing
[498] viXra:2106.0123 [pdf] submitted on 2021-06-22 10:40:18
Authors: Alberto Bononi, Lorenzo Barbieri, Leslie Ann Rusch
Comments: 2 Pages. This abstract was made public at the optical fiber conference 1998, workshop 204, monday Feb 23, 1998, but not included in the proceedings.
It has recently been shown that gain dynamics in doped-fiber amplifiers can be simulated by an equivalent electric circuit [1]. Here we include ASE-induced self- saturation in the model, and discuss its implementation using SPICE.
Category: Digital Signal Processing
[497] viXra:2106.0018 [pdf] submitted on 2021-06-04 01:06:15
Authors: Arjun Dahal
Comments: 3 Pages.
On progressing world, where pigeons are no longer used to carry messages like as in fairy tales, and historical tales, need of standarization of address was felt, for physical and internet means. In this paper, author has attempted to describe address in standard form, allowing to be cited, as per available databases, uniqueness, and accuracy.
Category: Digital Signal Processing
[496] viXra:2106.0006 [pdf] submitted on 2021-06-01 21:31:50
Authors: Gyongbong Ju, Cholhyon Sim, Choljin Kim, Yongmin Kim
Comments: 16 Pages.
Today, the security problem is emerging as a crucial problem for people, and research into solving this problem is now on its way worldwide. Everyone is aware of the urgency and seriousness of the security problem, and at this time, this problem has a giant impact on the overall social life. As science and technology develop, researches for solving security problems are advancing to a new stage, and their reliability is increasing day by day.
In this study, a powerful quadruple security system was designed and realized by combining Keypad, RFID, Fingerprint, and Bluetooth (HC06) modules to thoroughly secure the security of medicines, jewelry, documents, and other valuables and doors.
This system is based on the Arduino Mega 2560 microcontroller and is an intelligent system with a display function, voice function, SMS transmission function by GSM module, and alarm function. The system is an excellent system that can thoroughly guarantee the safety of security with low cost and low power consumption.
Category: Digital Signal Processing
[42] viXra:2502.0039 [pdf] replaced on 2025-02-22 00:44:14
Authors: Andrei Keino
Comments: 6 Pages.
The article introduces a simple and effective algorithm for constant state detection in the time series. The algorithm, based on the sliding window of variable length, finds all the sections of the time series which have length greater or equal than some given minimal length and have difference between maximal and minimal value in the section less or equal than some given value. It is shown that the computationalcomplexity of the aforementioned algorithm is O(N log N), where N is the length of time series.
Category: Digital Signal Processing
[41] viXra:2212.0019 [pdf] replaced on 2022-12-07 23:27:39
Authors: Herman Schoeneld
Comments: 9 Pages. Copyright (c) Sphere 10 Software Pty Ltd (originally written in 2020).
An abstract post-quantum digital signature scheme is presented that parameterizes a one-time signature scheme (OTS) for "many-time" use. This scheme permits a single key-pair to fficiently sign and verify a (great) many messages without security degradation. It achieves this by following the original Merkle-Signature Scheme but without a coupling to a specific OTS. Various improvements include a reduction in signature size, resistance to denial-of-service attacks and smaller keys. This construction comprises a bit-level specification for the Abstract Merkle Signature Scheme (AMS).
Category: Digital Signal Processing
[40] viXra:2211.0096 [pdf] replaced on 2023-01-29 18:58:40
Authors: Michael C. Kleder
Comments: 7 Pages. Minor update
This article introduces a method of evaluating subsamples until any prescribed level of classification accuracy is attained, thus obtaining arbitrary accuracy. A logarithmic reduction in error rate is obtained with a linear increase in sample count. The technique is applied to specific emitter identification on a published dataset of physically recorded over-the-air signals from 16 ostensibly identical high-performance radios. The technique uses a multi-channel deep learning convolutional neural network acting on the bispectra of I/Q signal subsamples each consisting of 56 parts per million (ppm) of the original signal duration. High levels of accuracy are obtained with minimal computation time: in this application, each addition of eight samples decreases error by one order of magnitude.
Category: Digital Signal Processing
[39] viXra:2205.0050 [pdf] replaced on 2022-05-12 03:09:47
Authors: Michele Fabbrini
Comments: 25 Pages.
In this paper we describe a symmetric key algorithm that offers an unprecedented grade of confidentiality. Based on the uniqueness of the modular multiplicative inverse of a positive integer a modulo n and on its computability in a polynomial time, this non-deterministic cipher can easily and quickly handle keys of millions or billions of bits that an attacker does not even know the length of. The algorithm’s primary key is the modulo, while the ciphertext is given by the concatenation of the modular inverse of blocks of plaintext whose length is randomly chosen within a predetermined range. In addition to the full specification, we present a working implementation of it in Julia Programming Language, accompanied by real examples of encryption and decryption.
Category: Digital Signal Processing
[38] viXra:2108.0132 [pdf] replaced on 2025-03-22 13:47:55
Authors: Fran De Aquino
Comments: 3 Pages.
The Quantum Computers use qubits (or qbits), the quanta bits, which can assume values 0 or 1, or a superposition of both. In this work, we propose a new type of quantum bit, the Gravitational Quantum Bit or Gqbit, which can be used as an information unit. The concept of the Gqbit is based on the theory of the Gravitational Electromotive Force (Gemf) [1], which shows that, when an electron absorbs a quantum of energy sufficient strong, the gravitational force acting upon it (its weight) changes of direction. The weight of the electron can assume two fundamental statuses. For up, (gravitational force in opposite direction to the gravity g )and, for down (gravitational force in the same direction of g ). Conventionally, we can then assume that for up, the weight of the electron represents the number 0, and that for down, it represents the number 1, similarly to the spin of the electron, which can be interpreted as if the electron rotates in one direction or the other - in this case, rotation in one direction would represent 0 and, in the other, it would represent 1.
Category: Digital Signal Processing
[37] viXra:2106.0006 [pdf] replaced on 2023-08-15 09:50:01
Authors: GyongBong Ju, CholHyon Sim,CholJin Kim, JongChol Chu
Comments: 19 Pages.
Today, the security problem is emerging as a crucial problem for people, and research into solving this problem is now on its way worldwide. Everyone is aware of the urgency and seriousness of the security problem, and at this time, this problem has a giant impact on the overall social life. As science and technology develop, researches for solving security problems are advancing to a new stage, and their reliability is increasing day by day.In this study, a powerful quadruple security system was designed and realized by combining Keypad, RFID, Fingerprint, and Bluetooth (HC06) modules to thoroughly secure the security of medicines, jewelry, documents, and other valuables and doors.This system is based on the Arduino Mega 2560 microcontroller and is an intelligent system with a display function, voice function, SMS transmission function by GSM module, and alarm function. The system is an excellent system that can thoroughly guarantee the safety of security with low cost and low power consumption.
Category: Digital Signal Processing