59 research outputs found
Transform-limited photons from a coherent tin-vacancy spin in diamond
Solid-state quantum emitters that couple coherent optical transitions to
long-lived spin qubits are essential for quantum networks. Here we report on
the spin and optical properties of individual tin-vacancy (SnV) centers in
diamond nanostructures. Through cryogenic magneto-optical and spin
spectroscopy, we verify the inversion-symmetric electronic structure of the
SnV, identify spin-conserving and spin-flipping transitions, characterize
transition linewidths, measure electron spin lifetimes and evaluate the spin
dephasing time. We find that the optical transitions are consistent with the
radiative lifetime limit even in nanofabricated structures. The spin lifetime
is phononlimited with an exponential temperature scaling leading to
10 ms, and the coherence time, reaches the nuclear spin-bath limit upon
cooling to 2.9 K. These spin properties exceed those of other
inversion-symmetric color centers for which similar values require millikelvin
temperatures. With a combination of coherent optical transitions and long spin
coherence without dilution refrigeration, the SnV is a promising candidate for
feasable and scalable quantum networking applications
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks
The 5G networks have the capability to provide high compatibility for the new
applications, industries, and business models. These networks can tremendously
improve the quality of life by enabling various use cases that require high
data-rate, low latency, and continuous connectivity for applications pertaining
to eHealth, automatic vehicles, smart cities, smart grid, and the Internet of
Things (IoT). However, these applications need secure servicing as well as
resource policing for effective network formations. There have been a lot of
studies, which emphasized the security aspects of 5G networks while focusing
only on the adaptability features of these networks. However, there is a gap in
the literature which particularly needs to follow recent computing paradigms as
alternative mechanisms for the enhancement of security. To cover this, a
detailed description of the security for the 5G networks is presented in this
article along with the discussions on the evolution of osmotic and catalytic
computing-based security modules. The taxonomy on the basis of security
requirements is presented, which also includes the comparison of the existing
state-of-the-art solutions. This article also provides a security model,
"CATMOSIS", which idealizes the incorporation of security features on the basis
of catalytic and osmotic computing in the 5G networks. Finally, various
security challenges and open issues are discussed to emphasize the works to
follow in this direction of research.Comment: 34 pages, 7 tables, 7 figures, Published In 5G Enabled Secure
Wireless Networks, pp. 69-102. Springer, Cham, 201
Reinforcement learning-based allocation of fog nodes for cloud-based smart grid
Real-time monitoring in smart grids requires efficient handling of massive amount of data. Fog cloud nodes can be strategically located within the smart grid to: pull readings from smart meters, implement local processing and control, and make all data available to the smart grid control center with minimum overall latency. Unlike existing studies in literature, we propose a novel Fog node allocation strategy that is tightly coupled with the power grid structure, and hence, accounts for the spatial distribution of data traffic sources (e.g., smart meters) within the power grid. Furthermore, the allocation strategy considers the diverse latency requirements of fixed scheduling and event driven data services within the power grid. The proposed allocation strategy first implements an unsupervised machine learning approach to determine initial number and locations of Fog nodes that can serve the data traffic with minimum overall latency. Then, a reinforcement-based mechanism is applied to minimize the required number of Fog nodes, and hence capital cost, through efficient mapping between Fog nodes and smart meters while still complying with the latency requirements. Our simulation studies demonstrate that a 50% reduction in required number of Fog nodes can be achieved while minimizing overall latency when the proposed allocation strategy is adopted
Performance evaluation of windowing based energy detector in multipath and multi-signal scenarios
Abstract
Connectivity in remote areas continues to be a major challenge despite of the evolution of cellular technology. 5th Generation (5G) technology can address remote connectivity if lower carrier frequencies are available, which calls for shared use of spectrum to enable cost-efficient license-free solution. Therefore, spectrum sensing has its own role in future wireless systems such as mobile 5G networks and Internet of Things (IoT) to complement database approach in dynamic spectrum utilization. In this paper, a windowing based (WIBA) blind spectrum sensing method is studied. Its performance is compared to the localization algorithm based on double-thresholding (LAD) detection method. Both the methods are based on energy detection and can be used in any frequency range as well as for detecting all kind of relatively narrowband signals. Probability of detection, relative mean square error for the bandwidth estimation, and the number of detected signals were evaluated, including multipath and multi-signal scenarios. The simulation results show that the WIBA method is very suitable for future 5G applications especially for remote area connectivity, due to its good detection performance in low signal-to-noise ratio (SNR) areas with low complexity and reasonable costs. The simulation results also show importance of the used detection window selection since too wide detection window degrades the detection performance of the WIBA method
- …