Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
This book demonstrates the implementation of an automated measuring system for very efficient measurement of chromatic dispersion, which uses a modulation phase shift method over long haul of optical single mode fiber. The authors show how a new scheme for measuring chromatic dispersion is adopted in conjunction with a tunable laser (TLS), providing the optical power at required wavelength and digital oscilloscope (DOSC) for measuring the phase difference between microwave signals from transmitter and microwave signals at the receiver. This is a novel approach for real-time chromatic dispersion in optical systems such as optical fibers. The setup used is very simple, accurate and cost effective, compared to other methods such as direct measurement, differential mode delay, polarization mode dispersion measurement and phase delay method. Describes algorithms for characterization and controlling optical apparatus; Introduces a new automated characterization system for electro-optic modulators with application of driving microwaves; Describes a new algorithm for automated dispersion measurement for different length of fibers; Provides system analysis to show the effects of critical parameters, such as dimensions on dispersion.
Electronics --- Electrical engineering --- Applied physical engineering --- Computer. Automation --- beeldverwerking --- optische vezels --- spraaktechnologie --- elektronica --- ingenieurswetenschappen --- elektrische circuits --- signaalverwerking
Choose an application
This book discusses analytical approaches and modeling of the breakdown voltage (BV) effects on graphene-based transistors. It presents semi-analytical models for lateral electric field, length of velocity saturation region (LVSR), ionization coefficient (α), and breakdown voltage (BV) of single and double-gate graphene nanoribbon field effect transistors (GNRFETs). The application of Gauss’s law at drain and source regions is employed in order to derive surface potential and lateral electric field equations. LVSR is then calculated as a solution of surface potential at saturation condition. The ionization coefficient is modelled and calculated by deriving equations for probability of collisions in ballistic and drift modes based on the lucky drift theory of ionization. The threshold energy of ionization is computed using simulation and an empirical equation is derived semi-analytically. Lastly avalanche breakdown condition is employed to calculate the lateral BV. On the basis of this, simple analytical and semi-analytical models are proposed for the LVSR and BV, which could be used in the design and optimization of semiconductor devices and sensors. The proposed equations are used to examine BV at different channel lengths, supply voltages, oxide thickness, GNR widths, and gate voltages. Simulation results show that the operating voltage of FETs could be as low as 0.25 V in order to prevent breakdown. However, after optimization, it can go as high as 1.5 V. This work is useful for researchers working in the area of graphene nanoribbon-based transistors.
Chemical structure --- Electrical engineering --- Applied physical engineering --- Biotechnology --- nanotechniek --- biotechnologie --- ingenieurswetenschappen --- elektrische circuits
Choose an application
The title explain new technique of secured and high capacity optical communication signals generation by using the micro and nano ring resonators. The pulses are known as soliton pulses which are more secured due to having the properties of chaotic and dark soliton signals with ultra short bandwidth. They have high capacity due to the fact that ring resonators are able to generate pulses in the form of solitons in multiples and train form. These pulses generated by ring resonators are suitable in optical communication due to use the compact and integrated rings system, easy to control, flexibility, less loss, application in long distance communication and many other advantages. Using these pulses overcome the problems such as losses during the propagation, long distances, error detection, using many repeaters or amplifiers, undetectable received signals, pulse broadening, overlapping and so on. This book show how to generate soliton pulses using ring resonators in the micro and nano range which can be used in optical communication to improve the transmission technique and quality of received signals in networks such as WiFi and wireless communication.
Mathematics --- Fluid mechanics --- Optics. Quantum optics --- Spectrometric and optical chemical analysis --- Electronics --- Electrical engineering --- Applied physical engineering --- Engineering sciences. Technology --- Production management --- Mass communications --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- toegepaste wiskunde --- photonics --- lasers (technologie) --- veiligheid (mensen) --- economie --- telecommunicatie --- wiskunde --- ingenieurswetenschappen --- elektrotechniek --- communicatietechnologie --- spectrometrie --- optica
Choose an application
Choose an application
This book provides detailed and accurate information on the history, structure, operation, benefits and advanced structures of silicon MESFET, along with modeling and analysis of the device. The authors explain the detailed physics that are important in modeling of SOI-MESFETs, and present the derivations of compact model expressions so that users can recognize the physical meaning of the model equations and parameters. The discussion also includes advanced structures for SOI-MESFET for submicron applications. Describes the evolution of MESFET in the semiconductor industry; Discusses challenges and solutions associated with downscaling; Provides comprehensive information on the structure and operation of silicon MESFETs.
Electronics --- Electrical engineering --- Applied physical engineering --- elektronica --- ingenieurswetenschappen --- elektrische circuits
Choose an application
This book investigates the effect of sintering temperature on willemite based glass-ceramic doped with different content of Er2O3. It is the first to report research on producing willemite by using waste materials and using trivalent erbium (Er3+) as a dopant. This book provides a survey of the literature on glass and glass-ceramic, while comprehensive experiments and analysis have been performed on the material used. .
Materials sciences --- Electrical engineering --- Applied arts. Arts and crafts --- materiaalkennis --- keramiek --- elektrische circuits
Choose an application
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.
Choose an application
This book describes Service-Oriented Architecture (SOA) and the significant factors which affect its adoption, such as governance, strategy, complexity, Return on Investment (ROI), business and IT alignment, culture and communication, costs, and security. The study on which this book is based, involved a quantitative analysis to investigate the influential factors for adopting SOA, paving the way to further research in the field. Describes the various factors, such as security, influencing Service-Oriented Architecture (SOA) adoption in many organizations Investigates the relation between SOA adoption factors and the organizations’ performance Developes a new SOA adoption framework to measure the effect on organizational performance.
Choose an application
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.
Choose an application
The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from this resource and it can be used for master level in computer science, information security, wireless network security and cryptography. --
Listing 1 - 10 of 11 | << page >> |
Sort by
|