3,346 research outputs found
Nonlocality-controlled interaction of spatial solitons in nematic liquid crystals
We demonstrate experimentally that the interactions between a pair of
nonlocal spatial optical solitons in a nematic liquid crystal (NLC) can be
controlled by the degree of nonlocality. For a given beam width, the degree of
nonlocality can be modulated by varying the pretilt angle of NLC molecules via
the change of the bias. When the pretilt angle is smaller than pi/4, the
nonlocality is strong enough to guarantee the independence of the interactions
on the phase difference of the solitons. As the pretilt angle increases, the
degree of nonlocality decreases. When the degree is below its critical value,
the two solitons behavior in the way like their local counterpart: the two
in-phase solitons attract and the two out-of-phase solitons repulse.Comment: 3 pages, 4 figure
Solar Heating and Cooling Application Potential and Application Case Analysis in New-type Urbanization in China
AbstractAs the new government came to power, urbanization construction created waves in China, and it will produce hundreds of thousands of billion production value. New-type urbanization has the feature of ecological, energy saving. In this situation, renewable energy especially the lower cost solar energy will play a major role in the urbanization construction. In this paper, we analyzed application potential of SHC (solar energy heating and cooling) and typical cases of Beijing in urbanization construction
Measuring Information Leakage in Website Fingerprinting Attacks and Defenses
Tor provides low-latency anonymous and uncensored network access against a
local or network adversary. Due to the design choice to minimize traffic
overhead (and increase the pool of potential users) Tor allows some information
about the client's connections to leak. Attacks using (features extracted from)
this information to infer the website a user visits are called Website
Fingerprinting (WF) attacks. We develop a methodology and tools to measure the
amount of leaked information about a website. We apply this tool to a
comprehensive set of features extracted from a large set of websites and WF
defense mechanisms, allowing us to make more fine-grained observations about WF
attacks and defenses.Comment: In Proceedings of the 2018 ACM SIGSAC Conference on Computer and
Communications Security (CCS '18
- …