We demonstrate a visible light communication (VLC) system based on compact eight-color laser transmitter. A capacity of 805Gbit/s and mean spectral efficiency of 50.3 bits/s/Hz can be achieved utilizing 8-λ, WDM and ...
详细信息
In this paper, we analyze the scattering of an incident plane wave on a space-time metal slab in the presence of dispersion. Frequency dispersion is taken into account here by means of the Drude model. Analytical resu...
详细信息
ISBN:
(数字)9798350373493
ISBN:
(纸本)9798350373509
In this paper, we analyze the scattering of an incident plane wave on a space-time metal slab in the presence of dispersion. Frequency dispersion is taken into account here by means of the Drude model. Analytical results, obtained via first-principle calculations, are in good agreement with in-house finite-difference time-domain (FDTD) computations.
We report a 250-fold photoluminescence enhancement of VB- spin-defects in hBN by coupling them to nanopatch antennas (NPA). Considering the relative size of the NPAs and laser-spot, an actual enhancement of 1695 times...
详细信息
In this paper, we consider an aerial reconfigurable intelligent surface (ARIS)-assisted wireless network, where multiple unmanned aerial vehicles (UAVs) collect data from ground users (GUs) by using the non-orthogonal...
详细信息
The event camera is a novel bio-inspired vision sensor. When the brightness change exceeds the preset threshold, the sensor generates events asynchronously. The number of valid events directly affects the performance ...
详细信息
Currently, efficient task scheduling and resource allocation processes are crucial for optimizing performance in cloud computing environments. In this paper, we introduce a novel approach that prioritizes tasks based ...
详细信息
ISBN:
(数字)9798350356144
ISBN:
(纸本)9798350356151
Currently, efficient task scheduling and resource allocation processes are crucial for optimizing performance in cloud computing environments. In this paper, we introduce a novel approach that prioritizes tasks based on their specific requirements and allocates resources accordingly. Task priority is determined through a scoring threshold that considers different requirements such as deadline, temporal requirements, and task length. To ensure efficient matching, virtual machines (VMs) are categorized into three distinct groups using K-means clustering. Simulations conducted within the CloudSim simulator demonstrate the effectiveness of this method, leading to significant reductions in makespan and energy consumption, while simultaneously improving resource utilization compared to existing algorithms.
作者:
罗雨婷胡书萁刘碧录Department of Electrical and Computer Engineering
University of TorontoTorontoOntario M5S 3G4Canada Shenzhen Geim Graphene Center
Shenzhen Key Laboratory of Layered Materials for Value-Added ApplicationsTsinghua-Berkeley Shenzhen Institute&Institute of Materials ResearchTsinghua Shenzhen International Graduate SchoolTsinghua UniversityShenzhen 518055China
In this study, we propose a novel methodology for determining accurate positions of characteristic points encountered in the analysis of bioimpedance signals. The proposed approach fully utilizes two fundamental model...
详细信息
The electronic design automation of analog circuits has been a longstanding challenge in the integrated circuit field due to the huge design space and complex design trade-offs among circuit specifications. In the pas...
详细信息
Opacity is a security and privacy property that guarantees predefined secret behavior of a cyber-physical system will not be inferred with certainty by a malicious entity. If a system is opacity-violating, extended in...
Opacity is a security and privacy property that guarantees predefined secret behavior of a cyber-physical system will not be inferred with certainty by a malicious entity. If a system is opacity-violating, extended insertion functions that insert fake symbols can be implemented to enforce opacity. By constricting the ways in which the fake symbols are inserted, this paper addresses opacity enforcement under the framework of finite state automata using extended insertion functions under event insertion constraints and limited insertion events constraints, i.e., only a limited number of symbols in a specified set can be inserted before and after an actual system output. The notion of (k b ,k a )-EIC-enforceability is proposed to describe how to enforce opacity via extended insertion functions in the presence of both event insertion constraints and limited insertion events constraints. A necessary and sufficient condition to check (k b ,k a )-EIC-enforceability is derived by constructing an appropriate verifier.
暂无评论