The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We experimentally demonstrate the high-speed free-space optical (FSO) transmission over 1 km using 20 Gbit/s advanced coherent quadrature phase-shift keying (QPSK) signals. The constellation diagram and the bit error rate (BER) are measured. The receiving sensitivity of the FSO transmission is about −23.9 dBm at the BER of 3.3×10−3.
In this paper, a pulse width compression scheme for optical time division multiplexing (OTDM) system based on supercontinuum (SC) is proposed. After injecting a high power narrow line-width pulse width laser into high nonlinear fiber (HNLF), the pulse width has been obviously narrowed. This demonstration suggests that the pulse width compression effect of SC could be used in free-space OTDM system.
Quantum dots have excellent optical properties such as broad excitation spectra, tunable emission spectra, large Stokes shift, quantum-enhanced luminescence efficiency and so on. In this work, CuInS2 quantum dots were prepared successfully by utilizing the non-thermal injection method. They had diameters in the range of 2∼4 nm. The average diameter of the dots was about 2.4 nm. The dominant wavelength...
Mobile Healthcare Networks (MHN) continuouslycollect the patients' health data sensed by wearable devices, andanalyze the collected data pre-processed by servers combinedwith medical histories, such that disease diagnosis and treatmentare improved, and the heavy burden on the existing healthservices is released. However, the network is vulnerable to Sybilattacks, which would degrade network performance,...
The matrix-matrix multiplication is an essential building block that can be found in various scientific and engineering applications. High-performance implementations of the matrix-matrix multiplication on state-of-the-art processors may be of great importance for both the vendors and the users. In this paper, we present a detailed methodology of implementing and optimizing the double-precision general...
In order to solve the problem that the capsule endoscope is limited by energy, it can reduce the volume and weight of the capsule robot by using the external wireless power to replace the button cell. This paper proposed a miniaturized, low-power energy transmission mode based on magnetic coupling resonant WPT(Wireless Power Transmission). Based on the scheme design, we finished the contrasting experiments...
This paper present a Galerkin-type method of moments (MoM) solution of volume surface integral equation (VSIE) and Taylor series expansion (TSE). This VSIE-TSE scheme is developed for the wideband frequency analysis of composite metallic and dielectric (CMD) structures. By expanding the exponential of the Green's function into a Taylor series, the impedance matrices can be efficiently calculated and...
This paper presents a method of moment (MoM) solution of volume integral equation (VIE) for electromagnetic scattering analysis from anisotropic media. The scheme utilizes the curved tetrahedral elements for geometric modeling and the associated higher order hierarchical vector basis functions for current modeling. In comparison with traditional low order VIE method, this higher order VIE method generates...
This paper presents the electric field distribution and current emission in a vacuum nano-diode. The electric field is calculated exactly inside a finite vacuum cathode-anode (A-K) gap with a single trapezoid protrusion on one of the electrode surface. It is found there is strong field enhancement on both electrodes near the protrusion, when the ratio of the A-K gap distance to the protrusion height...
Noninvasive assessment of corneal mechanical properties in vivo will help to the understanding of the pathogenesis and early diagnosis of ectatic corneal disorders. This study presented a noninvasive method that assesses the corneal biomechanical properties by exciting the cornea with acoustic radiation force and monitoring its displacement using a dual-frequency confocal transducer. A 3.85-MHz pushing...
This paper presents an improvement strategy for conventional sliding mode control. First, in consideration of alleviating chattering phenomenon, unidirectional auxiliary surfaces (UASs) are used to form the positively invariant set, where once the sliding mode enters, it will not leave any more. Under the effect of switching surfaces and UASs, the process of balance point reaching gets smoother. However,...
A secrecy transmission method with robust power control is investigated in this paper for a downlink two-tier femtocell network, where an eavesdropper attempts to wiretap the legitimate macrocell users. Considering the imperfect channel gains, a probability constraint robust optimization problem is formulated to satisfy the quality-of-service (QoS) of users. We aim to maximize the secrecy rate with...
We propose and theoretically demonstrate the generation of optical traction of nanoparticles through nonparaxial accelerating beams. A convenient optical pulling and manipulating of nanoparticles along curved trajectory is achieved, and the method to determine the conditions of optical traction is also presented.
Deep convolution networks based strategies have shown a remarkable performance in different recognition tasks. Unfortunately, in a variety of realistic scenarios, accurate and robust recognition is hard especially for the videos. Different challenges such as cluttered backgrounds or viewpoint change etc. may generate the problem like large intrinsic and extrinsic class variations. In addition, the...
Cloud storage service has been increasing in popularity as cloud computing plays an important role in the IT domain. Users can be relieved of the burden of storage and computation, by outsourcing the large data files to the cloud servers. However, from the cloud service providers' point of view, it is wise to utilize the data deduplication techniques to reduce the costs of running large storage system...
With the advent of emerging technologies such as the Internet of things and big data, the pace of transformation from traditional agriculture to modern agriculture will continue to be accelerated. Given that traditional agriculture exists many problems currently, such as low utilization of irrigation water and backward in management level, the integration of water and fertilizer irrigation intelligent...
Aiming to reduce the user's computational overhead and tackle the attribute revocation issue, an attribute-based encryption scheme supporting decryption outsourcing and attribute revocation is proposed in this paper. The proposed scheme outsources some decryption computational tasks to a cloud server such that the computational overhead on the user is simple and constant. We also propose an efficient...
This paper presents a wakeup receiver for latency-critical IoT applications in 90nm CMOS, which is fully compliant to many popular IoT wireless standards with constant envelope modulations, such as Bluetooth Low Energy and IEEE802.15.4. Paired with a standard-compliant transmitter, the proposed wakeup receiver method minimizes the overhead in system power, area and complexity. The proposed 2-dimensional...
A cyber-attack detection system issues alerts when an attacker attempts to coerce a trusted software application to perform unsafe actions on the attacker's behalf. One way of issuing such alerts is to create an application-agnostic cyber- attack detection system that responds to prevalent software vulnerabilities. The creation of such an autonomic alert system, however, is impeded by the disparity...
Traffic statistics are fundamental for many network measurement tasks like heavy hitter identification, traffic matrix estimator, anomaly detection, etc. However, traditional techniques like NetFlow and sFlow only provide coarse-grained statistics due to packet or flow sampling. Even Software Defined Networking (SDN) offers fine-grained traffic statistics collection, most of existing methods focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.