59 research outputs found

    Transform-limited photons from a coherent tin-vacancy spin in diamond

    Get PDF
    Solid-state quantum emitters that couple coherent optical transitions to long-lived spin qubits are essential for quantum networks. Here we report on the spin and optical properties of individual tin-vacancy (SnV) centers in diamond nanostructures. Through cryogenic magneto-optical and spin spectroscopy, we verify the inversion-symmetric electronic structure of the SnV, identify spin-conserving and spin-flipping transitions, characterize transition linewidths, measure electron spin lifetimes and evaluate the spin dephasing time. We find that the optical transitions are consistent with the radiative lifetime limit even in nanofabricated structures. The spin lifetime is phononlimited with an exponential temperature scaling leading to T1T_1 >> 10 ms, and the coherence time, T2T_2 reaches the nuclear spin-bath limit upon cooling to 2.9 K. These spin properties exceed those of other inversion-symmetric color centers for which similar values require millikelvin temperatures. With a combination of coherent optical transitions and long spin coherence without dilution refrigeration, the SnV is a promising candidate for feasable and scalable quantum networking applications

    A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks

    Full text link
    The 5G networks have the capability to provide high compatibility for the new applications, industries, and business models. These networks can tremendously improve the quality of life by enabling various use cases that require high data-rate, low latency, and continuous connectivity for applications pertaining to eHealth, automatic vehicles, smart cities, smart grid, and the Internet of Things (IoT). However, these applications need secure servicing as well as resource policing for effective network formations. There have been a lot of studies, which emphasized the security aspects of 5G networks while focusing only on the adaptability features of these networks. However, there is a gap in the literature which particularly needs to follow recent computing paradigms as alternative mechanisms for the enhancement of security. To cover this, a detailed description of the security for the 5G networks is presented in this article along with the discussions on the evolution of osmotic and catalytic computing-based security modules. The taxonomy on the basis of security requirements is presented, which also includes the comparison of the existing state-of-the-art solutions. This article also provides a security model, "CATMOSIS", which idealizes the incorporation of security features on the basis of catalytic and osmotic computing in the 5G networks. Finally, various security challenges and open issues are discussed to emphasize the works to follow in this direction of research.Comment: 34 pages, 7 tables, 7 figures, Published In 5G Enabled Secure Wireless Networks, pp. 69-102. Springer, Cham, 201

    Reinforcement learning-based allocation of fog nodes for cloud-based smart grid

    Get PDF
    Real-time monitoring in smart grids requires efficient handling of massive amount of data. Fog cloud nodes can be strategically located within the smart grid to: pull readings from smart meters, implement local processing and control, and make all data available to the smart grid control center with minimum overall latency. Unlike existing studies in literature, we propose a novel Fog node allocation strategy that is tightly coupled with the power grid structure, and hence, accounts for the spatial distribution of data traffic sources (e.g., smart meters) within the power grid. Furthermore, the allocation strategy considers the diverse latency requirements of fixed scheduling and event driven data services within the power grid. The proposed allocation strategy first implements an unsupervised machine learning approach to determine initial number and locations of Fog nodes that can serve the data traffic with minimum overall latency. Then, a reinforcement-based mechanism is applied to minimize the required number of Fog nodes, and hence capital cost, through efficient mapping between Fog nodes and smart meters while still complying with the latency requirements. Our simulation studies demonstrate that a 50% reduction in required number of Fog nodes can be achieved while minimizing overall latency when the proposed allocation strategy is adopted

    Performance evaluation of windowing based energy detector in multipath and multi-signal scenarios

    No full text
    Abstract Connectivity in remote areas continues to be a major challenge despite of the evolution of cellular technology. 5th Generation (5G) technology can address remote connectivity if lower carrier frequencies are available, which calls for shared use of spectrum to enable cost-efficient license-free solution. Therefore, spectrum sensing has its own role in future wireless systems such as mobile 5G networks and Internet of Things (IoT) to complement database approach in dynamic spectrum utilization. In this paper, a windowing based (WIBA) blind spectrum sensing method is studied. Its performance is compared to the localization algorithm based on double-thresholding (LAD) detection method. Both the methods are based on energy detection and can be used in any frequency range as well as for detecting all kind of relatively narrowband signals. Probability of detection, relative mean square error for the bandwidth estimation, and the number of detected signals were evaluated, including multipath and multi-signal scenarios. The simulation results show that the WIBA method is very suitable for future 5G applications especially for remote area connectivity, due to its good detection performance in low signal-to-noise ratio (SNR) areas with low complexity and reasonable costs. The simulation results also show importance of the used detection window selection since too wide detection window degrades the detection performance of the WIBA method
    corecore