Experimental demonstration of small angle (0.8 degrees-5 degrees ) direct UV-written X couplers in silica-on-silicon is presented. Maximum and minimum coupling ratios of 95%(+/-0.8%) and 1.9% (+/-1%), respectively, were recorded. The structures also display very low polarization and wavelength dependence. A typical excess loss of 1.0 dB(+/-0.5 dB) was recorded. Device modeling using the beam propagation method and an analytical model showed good agreement with experimental results over a broad crossing angle and wavelength range. 相似文献
Two qubit quantum computations are viewed as two player, strictly competitive games and a game-theoretic measure of optimality of these computations is developed. To this end, the geometry of Hilbert space of quantum computations is used to establish the equivalence of game-theoretic solution concepts of Nash equilibrium and mini-max outcomes in games of this type, and quantum mechanisms are designed for realizing these mini-max outcomes. 相似文献
Computational Economics - This study tries to unravel the stock market prediction puzzle using the textual analytic with the help of natural language processing (NLP) techniques and Deep-learning... 相似文献
Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.
The performance of most of the classification algorithms on a particular dataset is highly dependent on the learning parameters used for training them. Different approaches like grid search or genetic algorithms are frequently employed to find suitable parameter values for a given dataset. Grid search has the advantage of finding more accurate solutions in general at the cost of higher computation time. Genetic algorithms, on the other hand, are able to find good solutions in less time, but the accuracy of these solutions is usually lower than those of grid search. 相似文献
Concept browsing interfaces can help educators and learners to locate and use learning resources that are aligned with recognized learning goals. The Strand Map Service enables users to navigate interactive visualizations of related learning goals and to request digital library resources aligned with learning goals. These interfaces are created using a programmatic Web service interface that dynamically generates interactive visual components. Preliminary findings suggest that these library interfaces appear to help users stay focused on the scientific content of their information discovery task, as opposed to focusing on the mechanics of searching. 相似文献
Microsystem Technologies - Electronic devices are shrinking day by day, while the speed and reliability is increasing. At the same time, IC designs and micro/nano electronic systems are becoming... 相似文献
The detection of manmade disasters particularly fire is valuable because it causes many damages in terms of human lives. Research on fire detection using wireless sensor network and video-based methods is a very hot research topic. However, the WSN based detection model need fire happens and a lot of smoke and fire for detection. Similarly, video-based models also have some drawbacks because conventional algorithms need feature vectors and high rule-based models for detection. In this paper, we proposed a fire detection method which is based on powerful machine learning and deep learning algorithms. We used both sensors data as well as images data for fire prevention. Our proposed model has three main deep neural networks i.e. a hybrid model which consists of Adaboost and many MLP neural networks, Adaboost-LBP model and finally convolutional neural network. We used Adaboost-MLP model to predict the fire. After the prediction, we proposed two neural networks i.e. Adaboost-LBP model and convolutional neural network for detection of fire using the videos and images taken from the cameras installed for the surveillance. Adaboost-LBP model is to generate the ROIs from the image where emergencies exist Our proposed model results are quite good, and the accuracy is almost 99%. The false alarming rate is very low and can be reduced more using further training.
In cognitive radio network, the secondary users (SUs) use the spectrum of primary users for communication which arises the security issues. The status of SUs as legitimate users is compulsory for the stability of the system. This paper addresses the issue of delay caused by a band-selection decision process that directly affects the security and performance. The model cluster-based distributed cooperative spectrum sensing is proposed. In this model, cluster heads (CHs) exchange control information with other CHs and ordinary nodes. This model significantly reduced the delay, sensing, convergence, routing, in band-selection process. This also reduces the energy consumption while sensing the spectrum which seriously leads to performance upgradation. The simulated results show the improved performance of cognitive radio networks in terms of delay, packet loss ratio and bandwidth usage as compared to cluster-based cooperative spectrum sensing model. The opportunity for primary user emulation attacker is minimized as the overall delay is reduced. 相似文献