3,077 research outputs found
Properties of the Quarter-Wave Bragg Reflection Waveguide: Theory
The Bragg reflection waveguide (BRW), or one-dimensional photonic crystal waveguide, has recently been proposed for a wide spectrum of applications ranging from particle acceleration to nonlinear frequency conversion. Here, we conduct a thorough analytical investigation of the quarter-wave BRW, in which the layers of the resonant cladding have a thickness corresponding to one quarter of the transverse wavelength of a desired guided mode. An analytical solution to the mode dispersion equation is derived, and it is shown that the quarter-wave BRW is polarization degenerate, although the TE and TM mode profiles differ significantly as the external Brewster’s angle condition in the cladding is approached. Analytical expressions for waveguide properties such as the modal normalization constants, propagation loss, and overlap factors between the mode and each waveguide layer are derived, as are dispersion and tuning curves
Dispersion Tailoring of the Quarter-Wave Bragg Reflection Waveguide
We present analytical formulae for the polarization dependent first- and second-order dispersion of a quarter-wave Bragg reflection waveguide (QtW-BRW). Using these formulae, we develop several qualitative properties of the QtW-BRW. In particular, we show that the birefringence of these waveguides changes sign at the QtW wavelength. Regimes of total dispersion corresponding to predominantly materialdominated and waveguide-dominated dispersion are identified. Using this concept, it is shown that the QtW-BRW can be designed so as to provide anomalous group velocity dispersion of large magnitude, or very small GVD of either sign, simply by an appropriate chose of layer thicknesses. Implications on nonlinear optical devices in compound semiconductors are discussed
Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers
In this paper, we present the results of using bags of system calls for
learning the behavior of Linux containers for use in anomaly-detection based
intrusion detection system. By using system calls of the containers monitored
from the host kernel for anomaly detection, the system does not require any
prior knowledge of the container nature, neither does it require altering the
container or the host kernel.Comment: Published version available on IEEE Xplore
(http://ieeexplore.ieee.org/document/7414047/) arXiv admin note: substantial
text overlap with arXiv:1611.0305
- …