We propose and demonstrate a data-driven plasmonic metascreen that efficiently absorbs incident light over a wide spectral range in an ultra-thin silicon *** embedding a double-nanoring silver array within a 20 nm ult...
详细信息
We propose and demonstrate a data-driven plasmonic metascreen that efficiently absorbs incident light over a wide spectral range in an ultra-thin silicon *** embedding a double-nanoring silver array within a 20 nm ultrathin amorphous silicon(a-Si)layer,we achieve a significant enhancement of light *** enhancement arises from the interaction between the resonant cavity modes and localized plasmonic modes,requiring precise tuning of plasmon resonances to match the absorption region of the silicon active *** facilitate the device design and improve light absorption without increasing the thickness of the active layer,we develop a deep learning framework,which learns to map from the absorption spectra to the design *** inverse design strategy helps to tune the absorption for selective spectral *** optimized design surpasses the bare silicon planar device,exhibiting a remarkable enhancement of over 100%.Experimental validation confirms the broadband enhancement of light absorption in the proposed *** proposed metascreen absorber holds great potential for light harvesting applications and may be leveraged to improve the light conversion efficiency of ultra-thin silicon solar cells,photodetectors,and optical filters.
Solutions to protect Hardware Intellectual Property (IP) are crucial to safeguard against various hardware security threats, including IP piracy, theft, and reverse engineering. Logic locking, a prominent design trans...
详细信息
ISBN:
(数字)9798350354119
ISBN:
(纸本)9798350354126
Solutions to protect Hardware Intellectual Property (IP) are crucial to safeguard against various hardware security threats, including IP piracy, theft, and reverse engineering. Logic locking, a prominent design transformation technique, aims to mitigate these attacks by introducing additional logic into the circuit to enable the locking of design functionality and hiding of the design intent based on a secret key. However, most existing logic locking schemes are vulnerable to a range of invasive and non-invasive attacks that can unlock the design, compromising their effectiveness. In this paper, we summarize these major threats and discuss a potential approach of replacing conventional logic gates with analog chaos-based gates to mitigate these threats. The novel chaos-based locking mechanism offers unclonability and reconfigurability, making it challenging for attackers to apply the well-known attack vectors, including SAT-based attacks, physical attacks, and side-channel attacks. We also discuss the challenges of integrating this novel approach compared to an existing locking method and provide a discussion on future research directions to address them.
Searching and Accessing files in a computer device is one of the most important and basic task performed by the computer today. Each Operating System has a dedicated search bar for this, But however, In a network enco...
详细信息
The optimisation of control engineering tools based on digital twin capabilities and other cyber-physical metaverse manufacturing system (CPMMS) components are crucial for the successful performance. This study propos...
详细信息
To address the critical challenge of pupil segmentation accuracy in medical image analysis, this paper proposes an innovative pupil segmentation method based on an enhanced TransUNet deep neural network. The proposed ...
详细信息
Distinction of weak and strong AC grids for emerging hierarchical-infeed LCC-UHVDC systems is important for planning and operation departments. However, accuracy of earlier distinction methods is limited as they were ...
详细信息
Distinction of weak and strong AC grids for emerging hierarchical-infeed LCC-UHVDC systems is important for planning and operation departments. However, accuracy of earlier distinction methods is limited as they were developed by empirical reasoning without rigorous theoretical analysis. Hence in this letter, hierarchical-infeed interactive effective short-circuit ratio (HIESCR) index is first used for strength evaluation of HIDC systems with complex inter-inverter interactions considered. Boundary HIESCR (BHIESCR) is also introduced in the proposed distinction method of weak and strong AC grids. That is, weak (or strong) AC grids are, respectively, identified when HIESCR is less (or greater) than BHIESCR. Second, it is shown BHIESCR remains almost unchanged as 3.0 versus various system parameters and rated operation variables based on rigorous theoretical analysis. This salient feature makes the proposed method more accurate than earlier methods. Finally, the proposed method is validated by simulations based on the PSCAD/EMTDC program.
Deep neural networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples - input samples that have be...
详细信息
In the context of printed circuit board (PCB) manufacturing, accessibility and affordability are pivotal, especially for individuals and institutions with limited financial resources. The advent of ultra-low-cost and ...
详细信息
This paper proposes a novel cost-reflective and computationally efficient method for allocating distribution network costs to residential customers. First, the method estimates the growth in peak demand with a 50% pro...
详细信息
ISBN:
(数字)9798350377941
ISBN:
(纸本)9798350377958
This paper proposes a novel cost-reflective and computationally efficient method for allocating distribution network costs to residential customers. First, the method estimates the growth in peak demand with a 50% probability of exceedance (50POE) and the associated network augmentation costs using a probabilistic long-run marginal cost computation based on the Turvey perturbation method. Second, it allocates these costs to customers on a cost-causal basis using the Shapley value solution concept. To overcome the intractability of the exact Shapley value computation for real-world applications, we implement a fast, scalable and efficient clustering technique based on customers’ peak demand contribution, which drastically reduces the Shapley value computation time. Using customer load traces from an Australian smart grid trial (Solar Home Electricity Data), we demonstrate the efficacy of our method by comparing it with established energy-and peak demand-based cost allocation approaches.
Numerical analysis of few-atom cavity quantum electrodynamics (QED) is challenging due to the exponentially scaling size of the Hilbert space when multiple quantized electromagnetic modes are considered. To overcome t...
详细信息
暂无评论