The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
ePIXfab brings silicon photonics within reach of European small and medium sized enterprises, thereby building on its track record and its integration into Europractice. To this end, ePIXfab offers affordable access to standardized active and passive silicon photonic IC and packaging technology, a path from design to manufacturing and hands-on training. Based on a consortium of major research institutes...
UWB-IR is an excellent choice for precision positioning systems because of its inherent advantage in providing very good accuracy while operating dense multipath environments. This paper describes a UWB-IR transceiver that acts as an active reflector for ranging applications. The active reflector works as a ranging or positioning tag that can be attached to objects whose range or position needs to...
Threshold detection is a simple and an excellent choice for UWB-IR receivers used in high precision positioning applications. However, due to variations in the shape and amplitude of the received signals, the threshold detectors suffer from timing jitter, leading to loss in timing precision. In this paper, a methodology to reduce the timing jitter in threshold detectors is proposed. It is shown that...
We experimentally characterize a linear optics, telecom-band quantum controlled-NOT gate using a fiber-based source of degenerate photon pairs, and bound its process fidelity to 0.907 les Fp les 0.948.
The possibility of using purely text stream (keyboard-enterable) as carrier of malware is under-researched and often under estimated. A text attack can happen at multiple levels, from code-injection attacks at the top level to host-compromising text-based machine code at the lowest level. Since a large number of protocols are text-based, at times the servers based on those protocols use ASCII filters...
We experimentally show that nonzero pump-beam angular momentum plays a different role in type-II parametric down-converstion than in type-I. We explore the reason(s) why pump-beam profile does not appear in coincidence imaging of type-II down-converstion.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.