981 resultados para G-Hilbert Scheme


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The electronic state of a two-dimensional electron system (2DES) in the presence of a perpendicular uniform magnetic field and a lateral superlattice (LS) is investigated theoretically. A comparative study is made between a LS induced by a spatial electrostatic potential modulation (referred to as a PMLS) and that induced by a spatial magnetic-field modulation (referred ro asa MMLS). By utilizing a finite-temperature self-consistent Hartree-Fock approximation scheme; the dependence of the electronic state on different system parameters (e.g., the modulation period, the modulation strength, the effective electron-electron interaction strength, the averaged electron density, and the system temperature) is studied in detail. The inclusion of exchange effect is found to bring qualitative changes to the electronic state of a PMLS, leading generally to a nonuniform spin splitting, and consequently the behavior of the electronic state becomes similar to that of a MMLS. The Landau-level coupling is taken into account, and is found to introduce some interesting features not observed before. It is also found that, even in the regime of intermediate modulation strength, the density dependence of the spin splitting of energy levels, either for a PMLS or a MMLS, can be qualitatively understood within the picture of a 2DES in a perpendicular magnetic field with the modulation viewed as a perturbation. [S0163-1829(97)02248-0].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, a low-power, highly linear, integrated, active-RC filter exhibiting a multi-standard (IEEE 802.11a/b/g and DVB-H) application and bandwidth (3MHz, 4MHz, 9.5MHz) is present. The filter exploits digitally-controlled polysilicon resister banks and an accurate automatic tuning scheme to account for process and temperature variations. The automatic frequency calibration scheme provides better than 3% corner frequency accuracy. The Butterworth filter is design for receiver (WLAN and DVB-H mode) and transmitter (WLAN mode). The filter dissipation is 3.4 mA in RX mode and 2.3 mA (only for one path) in TX mode from 2.85-V supply. The dissipation of calibration consumes 2mA. The circuit has been fabricated in a 0.35um 47-GHz SiGe BiCMOS technology, the receiver and transmitter occupy 0.28-mm(2) and 0.16-mm(2) (calibration circuit excluded), respectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the binary exponential backoff mechanism of 802.11 distributed coordination function (DCF), and introduces some methods of modifying the backoff scheme. Then a novel backoff scheme, called Two-step Backoff scheme, is presented and illustrated. The simulation process in OPNET environment has been described also. At last, the analysis and simulation results show that the Two-step backoff scheme can enhance the performance of the IEEE 802.11 DCF.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the Wireless Local Area Networks (WLANs), the terminals are often powered by battery, so the power-saving performance of the wireless network card is a very important issue. For IEEE 802.11 Ad hoc networks, a power-saving scheme is presented in Medium Access Control (MAC) layer to reduce the power consumption by allowing the nodes enter into the sleep mode, but the scheme is based on Time-Drive Scheme (TDS) whose power-saving efficiency becomes lower and lower with the network load increasing. This paper presented a novel energy-saving mechanism, called as Hybrid-Drive Scheme (HDS), which introduces into a Message.-Drive Scheme (MDS) and combines MDS with the conventional TDS. The MDS, could obtain high efficiency when the load is heavy; meanwhile the TDS has high efficiency when the network load is small. The analysis shows that the proposed HDS could obtain high energy-efficiency whether the network load is light or heavy and have higher energy-saving efficiency than conventional scheme in the IEEE 802.11 standard.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a novel and innovative scheme for 10Gb/s parallel Very Short Reach (VSR) optical communication system. The optimized scheme properly manages the SDH/SONET redundant bytes and adjusts the position of error detecting bytes and error correction bytes. Compared with the OIF-VSR4-01.0 proposal, the scheme has a coding process module. The SDH/SONET frames in transmission direction are disposed as follows: (1) The Framer-Serdes Interface (FSI) gets 16x622.08Mb/s STM-64 frame. (2) The STM-64 frame is byte-wise stripped across 12 channels, all channels are data channels. During this process, the parity bytes and CRC bytes are generated in the similar way as OIF-VSR4-01.0 and stored in the code process module. (3) The code process module will regularly convey the additional parity bytes and CRC bytes to all 12 data channels. (4) After the 8B/10B coding, the 12 channels is transmitted to the parallel VCSEL array. The receive process approximately in reverse order of transmission process. By applying this scheme to 10Gb/s VSR system, the frame size in VSR system is reduced from 15552x12 bytes to 14040x12 bytes, the system redundancy is reduced obviously.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the effect of an external biaxial stress on the light emission of single InGaAs/GaAs(001) quantum dots placed onto piezoelectric actuators. With increasing compression, the emission blueshifts and the binding energies of the positive trion (X+) and biexciton (XX) relative to the neutral exciton (X) show a monotonic increase. This phenomenon is mainly ascribed to changes in electron and hole localization and it provides a robust method to achieve color coincidence in the emission of X and XX, which is a prerequisite for the possible generation of entangled photon pairs via the recently proposed "time reordering'' scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.

Relevância:

20.00% 20.00%

Publicador: