3,077 research outputs found

    Properties of the Quarter-Wave Bragg Reflection Waveguide: Theory

    Get PDF
    The Bragg reflection waveguide (BRW), or one-dimensional photonic crystal waveguide, has recently been proposed for a wide spectrum of applications ranging from particle acceleration to nonlinear frequency conversion. Here, we conduct a thorough analytical investigation of the quarter-wave BRW, in which the layers of the resonant cladding have a thickness corresponding to one quarter of the transverse wavelength of a desired guided mode. An analytical solution to the mode dispersion equation is derived, and it is shown that the quarter-wave BRW is polarization degenerate, although the TE and TM mode profiles differ significantly as the external Brewster’s angle condition in the cladding is approached. Analytical expressions for waveguide properties such as the modal normalization constants, propagation loss, and overlap factors between the mode and each waveguide layer are derived, as are dispersion and tuning curves

    Dispersion Tailoring of the Quarter-Wave Bragg Reflection Waveguide

    Get PDF
    We present analytical formulae for the polarization dependent first- and second-order dispersion of a quarter-wave Bragg reflection waveguide (QtW-BRW). Using these formulae, we develop several qualitative properties of the QtW-BRW. In particular, we show that the birefringence of these waveguides changes sign at the QtW wavelength. Regimes of total dispersion corresponding to predominantly materialdominated and waveguide-dominated dispersion are identified. Using this concept, it is shown that the QtW-BRW can be designed so as to provide anomalous group velocity dispersion of large magnitude, or very small GVD of either sign, simply by an appropriate chose of layer thicknesses. Implications on nonlinear optical devices in compound semiconductors are discussed

    Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers

    Full text link
    In this paper, we present the results of using bags of system calls for learning the behavior of Linux containers for use in anomaly-detection based intrusion detection system. By using system calls of the containers monitored from the host kernel for anomaly detection, the system does not require any prior knowledge of the container nature, neither does it require altering the container or the host kernel.Comment: Published version available on IEEE Xplore (http://ieeexplore.ieee.org/document/7414047/) arXiv admin note: substantial text overlap with arXiv:1611.0305
    • …
    corecore