92 resultados para Internal security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A compact optical switch matrix was designed, in which light circuits were folded by total internal reflective (TIR) mirrors. Two key elements, 2 x 2 switch and TIR mirror, have been fabricated on silicon-on-insulator wafer by anisotropy chemical etching. The 2 x 2 switch showed very low power consumption of 140 mW and a very high speed of 8 +/- 1 mus. An improved design for the TIR mirror was developed, and the fabricated mirror with smooth and vertical reflective facet showed low excess loss of 0.7 +/- 0.3 dB at 1.55 mum.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Under selective photo-excitation, the capacitance response of internal tunnelling coupling in quantum-dots-imbedded heterostructures is studied to clarify the electronic states and the number densities of electrons filling in the quantum dots (QDs). The random nature for both optical transitions and the filling in a QD assembly makes highly resolved capacitance peaks appear in the C-V characteristic after turning off the photo-excitation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a new way to meet the amount of strain relaxation in an InGaN quantum well layer grown on relaxed GaN by calculating and measuring its internal field. With perturbation theory, we also calculate the transition energy of InGaN/GaN SQWs as affected by internal fields. The newly reported experimental data by Graham et al. fit our calculations well on the assumption that the InGaN well layer suffered a 20% strain relaxation, we discuss the differences between our calculated results and the experimental data. Our calculation suggests that with the increase of indium mole fraction in the InGaN/GaN quantum well, the effect of polarization fields on the luminescence of the quantum well will increase. Moreover, our calculation also suggests that an increase in the quantum well width by only one monolayer can result in a large reduction in the transition energy. (c) 2006 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SOI (Silicon on Insulator) based photonic devices has attracted more and more attention in the recent years. Integration of SOI optical switch matrix with isolating grooves, total internal reflection (TIR) mirrors and spot size converter (SSC) was studied. A folding re-arrangeable non-blocking 4x4 optical switch matrix and a blocking 16x16 matrix with TIR mirrors and SSC were fabricated on SOI wafer. The performaces, including extinction ratio and the crosstalk, are better than before. The insertion loss and the polarization dependent loss (PDL) at 1.55 mu m increase slightly with longer device length, more bend and intersecting waveguides. The insertion losses decrease 2 similar to 3 dB when anti-reflection films are added in the ends of the devices. The rise and fall times of the devices are 2.1 mu s and 2.3 mu s, respectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigated the solid particle flow characteristics and biomass gasification in a clapboard-type internal circulating fluidized bed reactor. The effect of fluidization velocity on particle circulation rate and pressure distribution in the bed showed that fluidization velocities in the high and low velocity zones were the main operational parameters controlling particle circulation. The maximum internal circulation rates in the low velocity zone came almost within the range of velocities in the high velocity zone, when uH/umf = 2.2-2.4 for rice husk and uH/umf = 3.5-4.5 for quartz sand. In the gasification experiment, the air equvalence ratio (ER) was the main controlling parameter. Rice husk gasification gas had a maximum heating value of around 5000 kJ/m3 when ER = 0.22-0.26, and sawdust gasification gas reached around 6000-6500 kJ/m3 when ER = 0.175-0.24. The gasification efficiency of rice husk reached a maximum of 77% at ER = 0.28, while the gasification efficiency of sawdust reached a maximum of 81% at ER = 0.25.