Constructing earth-fixed cells with low-earth orbit (LEO) satellites in non-terrestrial networks (NTNs) has been the most promising paradigm to enable global coverage. The limited computing capabilities on LEO satelli...
详细信息
Mode splitters that directly separate modes without changing their orders are highly promising to improve the flexibility of the mode-division multiplexing *** this paper,we design a high-performance mode splitter on ...
详细信息
Mode splitters that directly separate modes without changing their orders are highly promising to improve the flexibility of the mode-division multiplexing *** this paper,we design a high-performance mode splitter on the silicon-oninsulator platform with a compact footprint of 14μm×2.5μm using an inverse design method based on shape *** fabrication of this mode splitter requires only a single lithography step and exhibits good fabrication *** experimental results show that the proposed device exhibits state-of-the-art insertion loss(<0.9 dB)and cross talk(<-16 dB)over a broad bandwidth(1500-1600 nm).Furthermore,the shape optimization method used is implemented to design a dual-mode(de)multiplexer,and the experimental results fulfill the design objective,demonstrating the excellent generality of the design method in this paper.
The Internet of Things (IoT) has been the talk of the town for quite some time now, and its adoption is growing rapidly. With the growth of IoT, there is a need for high-speed communication networks to support a large...
详细信息
The papers in this special section focus on the trustworthiness of artificial intelligence/machine learning models/deep learning models (AI/ML/DL) as it applies to the Industrial Internet of Things (IIot). This includ...
详细信息
The papers in this special section focus on the trustworthiness of artificial intelligence/machine learning models/deep learning models (AI/ML/DL) as it applies to the Industrial Internet of Things (IIot). This includes automated environments, such as smart factories, smart airports, and smart healthcare systems. AI approaches enable automation and data analytic across industrial technologies, including the IIoT, cloud and edge, and fog computing paradigms. Current ML models, such as DL still suffer from designing a generalized trustworthy architecture that reveals semantics and contexts of models and attacks threat surface. The papers in this section were inspired by the convincing challenges and necessities described above and attempt to compile research results that essentially adopts them.
Response time for AI-based models in time-critical applications is always a matter of concern. The situation is challenging when the model is deployed in a cloud-based infrastructure. To address this issue, a cloud-na...
详细信息
Despite using Community Detection Algorithms (CDA) in various network partitioning real-world applications, these algorithms tend to fail to partition complex weighted functional networks such as power grids. When con...
详细信息
With the ever-expanding ubiquity of the Internet, wireless networks have permeated every facet of modern life, escalating concerns surrounding network security for users. Consequently, the demand for a robust Intrusio...
详细信息
This study deals with the coordination of surge protection devices (SPD) in photovoltaic systems (PV). A PV farm model was developed in MATLAB Simulink with all the main components, solar panels, converter, grounding ...
详细信息
Understanding the thermodynamic properties of electrolyte solutions is of vital importance for a myriad of physiological and technological *** mean activity coefficientγ±is associated with the deviation of an el...
详细信息
Understanding the thermodynamic properties of electrolyte solutions is of vital importance for a myriad of physiological and technological *** mean activity coefficientγ±is associated with the deviation of an electrolyte solution from its ideal behavior and may be obtained by combining the Debye-Hückel(DH)and Born(B)***,the DH and B equations depend on the concentration and temperature-dependent static permittivity of the solutionεr(c,T)and the size of the solvated ions ri,whose experimental data is often not ***,we use a combination of molecular dynamics and density functional theory to predictεr(c,T)and ri,which enables us to apply the DH and B equations to any technologically relevant aqueous and nonaqueous electrolyte at any concentration and temperature of interest.
Differential privacy (DP) provides a principled approach to synthesizing data (e.g., loads) from real-world power systems while limiting the exposure of sensitive information. However, adversaries may exploit syntheti...
详细信息
暂无评论