In quantum sensing of magnetic fields, ensembles of nitrogen-vacancy centers in diamond offer high sensitivity, high bandwidth and outstanding spatial resolution while operating in harsh environments. Moreover, the or...
详细信息
In quantum sensing of magnetic fields, ensembles of nitrogen-vacancy centers in diamond offer high sensitivity, high bandwidth and outstanding spatial resolution while operating in harsh environments. Moreover, the orientation of defect centers along four crystal axes forms an intrinsic coordinate system, enabling vector magnetometry within a single diamond crystal. While most vector magnetometers rely on a known bias magnetic field for full recovery of three-dimensional (3D) field information, employing external 3D Helmholtz coils or permanent magnets results in bulky, laboratory-bound setups, impeding miniaturization of the device. Here, a novel approach is presented that utilizes a fiber-integrated microscale coil at the fiber tip to generate a localized uniaxial magnetic field. The same fiber-tip coil is used in parallel for spin control by combining dc and microwave signals in a bias tee. To implement vector magnetometry using a uniaxial bias field, the orientation of the diamond crystal is preselected and then fully characterized by rotating a static magnetic field in three planes of rotation. The measurement of vector magnetic fields in the full solid angle is demonstrated with a shot-noise-limited sensitivity of 19.4nT/Hz1/2 and microscale spatial resolution while achieving a fiber sensor head cross section of less than 1mm2.
作者:
Samant, Indu SekharPanda, SubhasisRout, Pravat Kumar
Department of Computer Science Engineering Odisha India
Department of Electrical Engineering Odisha India
Department of Electrical and Electronics Engineering Odisha India
Smart grids are advanced power systems that have the potential to bring enormous benefits to power consumers and providers. Smart grids utilize advanced communication and information technologies to deliver power more...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
The breach of data confidentiality, integrity, and availability due to cyberattacks can adversely impact the operation of grid-connected Photovoltaic (PV) inverters. Detecting such attacks based on their signatures or...
详细信息
The research discusses a multimodal framework for analyzing and detecting fake news and understanding its impact on society. This framework employs diverse strategies, including linguistic analysis, social network mon...
详细信息
Charge carrier doping usually reduces the resistance of a semiconductor or insulator, but was recently found to dramatically enhance the resistance in certain series of materials. This remarkable antidoping effect has...
详细信息
Charge carrier doping usually reduces the resistance of a semiconductor or insulator, but was recently found to dramatically enhance the resistance in certain series of materials. This remarkable antidoping effect has been leveraged to realize synaptic memory trees in nanoscale hydrogenated perovskite nickelates, opening a new direction for neuromorphic computing. To understand these phenomena, we formulate a physical phase-field model of the antidoping effect based on its microscopic mechanism and simulate the voltage-driven resistance change in the prototypical system of hydrogenated perovskite nickelates. Remarkably, the simulations using this model, containing only one adjustable parameter whose magnitude is justified by first-principles calculations, quantitatively reproduce the experimentally observed treelike resistance states, which are shown unambiguously to arise from proton redistribution-induced local band gap enhancement and carrier blockage. Our work lays the foundation for modeling the antidoping phenomenon in strongly correlated materials at the mesoscale, which can provide guidance to the design of novel antidoping-physics-based devices.
"Integration of blockchain and fog computing" involves the two different concepts, i.e. blockchain technology and fog computing which has something in common—the decentralised system. The rapid advancement ...
详细信息
Gliomas are aggressive brain tumors known for their heterogeneity,unclear borders,and diverse locations on Magnetic Resonance Imaging(MRI)*** factors present significant challenges for MRI-based segmentation,a crucial...
详细信息
Gliomas are aggressive brain tumors known for their heterogeneity,unclear borders,and diverse locations on Magnetic Resonance Imaging(MRI)*** factors present significant challenges for MRI-based segmentation,a crucial step for effective treatment planning and monitoring of glioma *** study proposes a novel deep learning framework,ResNet Multi-Head Attention U-Net(ResMHA-Net),to address these challenges and enhance glioma segmentation ***-Net leverages the strengths of both residual blocks from the ResNet architecture and multi-head attention *** powerful combination empowers the network to prioritize informative regions within the 3D MRI data and capture long-range *** doing so,ResMHANet effectively segments intricate glioma sub-regions and reduces the impact of uncertain tumor *** rigorously trained and validated ResMHA-Net on the BraTS 2018,2019,2020 and 2021 ***,ResMHA-Net achieved superior segmentation accuracy on the BraTS 2021 dataset compared to the previous years,demonstrating its remarkable adaptability and robustness across diverse ***,we collected the predicted masks obtained from three datasets to enhance survival prediction,effectively augmenting the dataset *** features were then extracted from these predicted masks and,along with clinical data,were used to train a novel ensemble learning-based machine learning model for survival *** model employs a voting mechanism aggregating predictions from multiple models,leading to significant improvements over existing *** ensemble approach capitalizes on the strengths of various models,resulting in more accurate and reliable predictions for patient ***,we achieved an impressive accuracy of 73%for overall survival(OS)prediction.
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
In the era of big data, traditional data trading methods designed for one-time queries on static databases fail to meet the demands of continuous query-based trading on streaming data, often resulting in repeated and ...
详细信息
暂无评论