3,223 research outputs found

    Nonlocality-controlled interaction of spatial solitons in nematic liquid crystals

    Full text link
    We demonstrate experimentally that the interactions between a pair of nonlocal spatial optical solitons in a nematic liquid crystal (NLC) can be controlled by the degree of nonlocality. For a given beam width, the degree of nonlocality can be modulated by varying the pretilt angle of NLC molecules via the change of the bias. When the pretilt angle is smaller than pi/4, the nonlocality is strong enough to guarantee the independence of the interactions on the phase difference of the solitons. As the pretilt angle increases, the degree of nonlocality decreases. When the degree is below its critical value, the two solitons behavior in the way like their local counterpart: the two in-phase solitons attract and the two out-of-phase solitons repulse.Comment: 3 pages, 4 figure

    Solar Heating and Cooling Application Potential and Application Case Analysis in New-type Urbanization in China

    Get PDF
    AbstractAs the new government came to power, urbanization construction created waves in China, and it will produce hundreds of thousands of billion production value. New-type urbanization has the feature of ecological, energy saving. In this situation, renewable energy especially the lower cost solar energy will play a major role in the urbanization construction. In this paper, we analyzed application potential of SHC (solar energy heating and cooling) and typical cases of Beijing in urbanization construction

    Measuring Information Leakage in Website Fingerprinting Attacks and Defenses

    Full text link
    Tor provides low-latency anonymous and uncensored network access against a local or network adversary. Due to the design choice to minimize traffic overhead (and increase the pool of potential users) Tor allows some information about the client's connections to leak. Attacks using (features extracted from) this information to infer the website a user visits are called Website Fingerprinting (WF) attacks. We develop a methodology and tools to measure the amount of leaked information about a website. We apply this tool to a comprehensive set of features extracted from a large set of websites and WF defense mechanisms, allowing us to make more fine-grained observations about WF attacks and defenses.Comment: In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18
    • …
    corecore