575,571 research outputs found
Geometric phases induced in auxiliary qubits by many-body systems near its critical points
The geometric phase induced in an auxiliary qubit by a many-body system is
calculated and discussed. Two kinds of coupling between the auxiliary qubit and
the many-body system are considered, which lead to dephasing and dissipation in
the qubit, respectively. As an example, we consider the XY spin-chain
dephasingly couple to a qubit, the geometric phase induced in the qubit is
presented and discussed. The results show that the geometric phase might be
used to signal the critical points of the many-body system, and it tends to
zero with the parameters of the many-body system going away from the critical
points
Photonic band structure of ZnO photonic crystal slab laser
We recently reported on the first realization of ultraviolet photonic crystal
laser based on zinc oxide [Appl. Phys. Lett. {\bf 85}, 3657 (2004)]. Here we
present the details of structural design and its optimization. We develop a
computational super-cell technique, that allows a straightforward calculation
of the photonic band structure of ZnO photonic crystal slab on sapphire
substrate. We find that despite of small index contrast between the substrate
and the photonic layer, the low order eigenmodes have predominantly
transverse-electric (TE) or transverse-magnetic (TM) polarization. Because
emission from ZnO thin film shows strong TE preference, we are able to limit
our consideration to TE bands, spectrum of which can possess a complete
photonic band gap with an appropriate choice of structure parameters. We
demonstrate that the geometry of the system may be optimized so that a sizable
band gap is achieved.Comment: 8 pages, 7 figure
3D Textured Model Encryption via 3D Lu Chaotic Mapping
In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be
popularized just as images and videos today. The security and privacy of these
3D contents should be taken into consideration. 3D contents contain surface
models and solid models. The surface models include point clouds, meshes and
textured models. Previous work mainly focus on encryption of solid models,
point clouds and meshes. This work focuses on the most complicated 3D textured
model. We propose a 3D Lu chaotic mapping based encryption method of 3D
textured model. We encrypt the vertexes, the polygons and the textures of 3D
models separately using the 3D Lu chaotic mapping. Then the encrypted vertices,
edges and texture maps are composited together to form the final encrypted 3D
textured model. The experimental results reveal that our method can encrypt and
decrypt 3D textured models correctly. In addition, our method can resistant
several attacks such as brute-force attack and statistic attack.Comment: 13 pages, 7 figures, under review of SCI
A 35 GHz solid state transmitter/driver
Solid state transmitter/driver /multiplier/ signal source has been designed and fabricated to produce a stable crystal-controlled CW power output of 100 mw at 35 GHz
Recommended from our members
Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard
The IEEE 802.11i standard has been designed to enhance security in wireless networks. The EAP-TLS handshake aims to provide mutual authentication between supplicant and authentication server, and then derive the Pairwise Master Key (PMK). In the 4 -way handshake the supplicant and the authenticator use PMK to derive a fresh pairwise transient key (PTK). The PMK is not used directly for security while assuming the supplicant and authenticator have the same PMK before running 4- way handshake. In this paper, the EAP-TLS handshake and the 4-way handshake phases have been analysed with a proposed framework using Isabelle tool. In the analysis, we have found a new Denial-of-Service (DoS) attack in the 4-way handshake. The attack prevents the authenticator from receiving message 4 after the supplicant sends it out. This attack forces the authenticator to re-send the message 3 until time out and subsequently to de-authenticate supplicant. This paper has proposed improvements to the 4-way handshake to avoid the Denial-of-Service attack
- …