46,640 research outputs found
Novel Compact and High Selectivity Dual-band BPF with Wide Stopband
A novel type of compact and high selectivity dual-band bandpass filter (BPF) incorporating a dual-mode defected ground structure resonator (DDGSR) and a dual-mode open-stub loaded stepped impedance resonator (DOLSIR) is proposed in this paper. Utilizing capacitive source-load coupling and the intrinsic characteristics of the two types of dual-mode resonators, compact dual-band BPF with multi transmission zeros near the passband edges as well as a wide stopband which can be used to achieve high selectivity is realized. An experimental dual-band BPF located at 2.4 and 3.2 GHz was designed and fabricated. The validity of the design approach is verified by good agreement between simulated and measurement results
The possible members of the meson nonet
The strong decays of the states are evaluated in the
model with two types of space wave functions. Comparing the model
expectations with the experimental data for the , ,
, and , we suggest that the , , and
can be assigned as the members of the meson nonet, while the
assignment for the is not favored by its width. The
kaon is predicted to have a mass of about 2418 MeV and a width of about 163 MeV
or 225 MeV.Comment: 10 pages, 5 figures, version accepted by Eur. Phys. J.
Secure agent data integrity shield
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection. We propose the use of Secure Agent Data Integrity Shield (SADIS) as a scheme that protects the integrity of data collected during agent roaming. With the use of a key seed negotiation protocol and integrity protection protocol, SADIS protects the secrecy as well as the integrity of agent data. Any illegal data modification, deletion, or insertion can be detected either by the subsequent host or the agent butler. Most important of all, the identity of each malicious host can be established. To evaluate the feasibility of our design, a prototype has been developed using Java. The result of benchmarking shows improvement both in terms of data and time efficiency
- …