Introduction: Photonic devices play a pivotal role in the realm of high-speed data communication due to their inherent capability to expedite the transfer of information. Historically, research efforts in this domain ...
详细信息
Introduction: Photonic devices play a pivotal role in the realm of high-speed data communication due to their inherent capability to expedite the transfer of information. Historically, research efforts in this domain have predominantly concentrated on investigating the fundamental mode propagation within photonic waveguides. Methods: This study diverges from the conventional approach by delving into the untapped potential of higher-order modes in addition to the fundamental mode of propagation. The exploration of these higher-order modes opens up new possibilities for optimizing and enhancing the performance of photonic devices in high-speed data communication scenarios. As a distinctive aspect of this study, various coating materials were scrutinized for their impact on both fundamental and higher-order mode propagation. The materials under examination included AlN (aluminum nitride), Germanium, and Silicon. These materials were chosen based on their unique optical properties and suitability for influencing different modes of light propagation. The findings from the study reveal that applying a coating of germanium demonstrates advantageous characteristics, particularly in terms of reduced signal loss, even when considering higher-order modes of propagation within photonic devices. Results: In this context, the results indicate that germanium-coated waveguides exhibit notably low propagation losses, with measurements as minimal as 0.25 dB/cm. This low level of loss is particularly noteworthy, especially when the waveguide has a width of 550 nm and is coated with a thickness of 50 nm. The dimensions and coating specifications play a crucial role in determining the efficiency of light transmission within the waveguide. Conclusion: The fact that the propagation loss is substantially low under these conditions suggests that the germanium-coated waveguide, even when considering higher-order modes of light propagation, can effectively maintain the integrity of the optica
The manuscript presents the design and development of a Microwave Hyperthermia (MHT) applicator integrated with an Electromagnetic (EM) lens. The purpose of the proposed MHT applicator is to provide non-invasive micro...
详细信息
The manuscript presents the design and development of a Microwave Hyperthermia (MHT) applicator integrated with an Electromagnetic (EM) lens. The purpose of the proposed MHT applicator is to provide non-invasive microwave hyperthermia treatment for skin cancer. The proposed MHT applicator comprises of an EM lens (133.75 × 133.75 mm3) placed ahead of a Hybrid Fractal Microstrip Patch Antenna (HFMA) (30 × 26 × 1.645 mm3), backed by a Meshedgrid-shaped Artificial magnetic Conductor (AMC) (48 × 48 × 3.27 mm3) reflector at an optimal distance of 16 mm The prototype of the HFMA is fabricated on a Rogers (RT5880) substrate and offers an impedance BW of 278 MHz, for a frequency from 2.316 to 2.594 GHz. To improve the front-to-back ratio (FBR) of the proposed HFMA, an EM lens that reduces the beam width and concentrated the energy in the desired direction is integrated with the AMC-backed HFMA. The final MHT applicator configuration provides a 3 dB beam width of 49.6° and a gain of 7.35 dBi at 2.45 GHz. The testing and validation of the proposed MHT applicator is carried out in a simulation environment using Computer Simulation technology (CST) Multiphysics for thermal analysis to check the temperature rise in the phantom. An in-vitro sample of skin phantom with a tumor is prepared using chemicals mimicking skin properties is exposed to the EM radiations emitted by the proposed HT applicator excited using a RF signal generator and power amplifier. the temperature rise in the phantom is recorded using optical temperature measurement probe. A temperature rise in the cancer-affected area up to 44 °C (Effective Temperature Area (ETA) 36 × 20 mm2) is observed in the simulation environment for an exposure time of approx. 45 min and in the measurement environment after a span of 25 minuites. A reported Specific Absorption Rate (SAR) value of 10 W/Kg shows that the proposed MHT applicator is safe for human exposure, and also reduces hot spots by enhancing the focus with controlled t
Recurrent Neural Networks (RNNs), recognized for their high accuracy and strong robustness. However, the adoption of RNN-based solutions for array signal beamforming is still in its infancy, as RNNs are very sensitive...
详细信息
In this study, we designed and fabricated a Dual Metal Gate (DMG) AlGaN/AlN/GaN High Electron Mobility Transistor (HEMT) for the detection of mercury ions. The device features an extended gate electrode integrated wit...
详细信息
The increasing use of electronic health records (EHRs) has led to a growing concern about the security of sensitive medical information. Medical images hold critical diagnostic and therapeutic information about patien...
详细信息
The increasing use of electronic health records (EHRs) has led to a growing concern about the security of sensitive medical information. Medical images hold critical diagnostic and therapeutic information about patients, making their confidentiality essential, especially in telehealth contexts. Data encryption is essential for protecting sensitive information, especially in the realm of image encryption, which is vital for safeguarding visual data. This paper proposes a new encryption algorithm of EHR medical images using chaotic Henon map systems with self-adaptive approach. This approach creates as many correlated security keys as there are elements contained in the medical images delivered by EHR by means of Plaintext-Associated Key Generation (PAKG). This self-adaptive framework guarantees that the generated key revolves entirely around the characteristics of the plaintext image. For the pixel confusion phase, a block-based generalization technique along with multi-level map is used and for the diffusion phase, the threshold-based generalization technique involving the chaotic Henon map systems is used. Through this method, medical image encryption is made possible with low computational power required thus striking more of the balance between the two factors, efficiency and security. Our presented scheme has been implemented and simulated over standard EHR images;the security aspects have been weighed and measured in terms of entropy, key sensitivity, key space, correlation, and histogram analysis. Finally, comparing the results of our scheme with other existing methods it proven that our scheme performs substantially better in case of similar conditions. As for the strengths of our approach, it is necessary to mention that security keys are generated dynamically for each of the input medical images and the information of the image itself is considered for-key creation. The entropy values closely approximate optimal threshold value 8, affirming the efficiency o
This paper presents a solution to the throughput challenges of interconnecting systems in data centers that process big data every second. The Long-Short-Term-Memory (LSTM)-based neural network is implemented. It disc...
详细信息
Attention deficit hyperactivity disorder (ADHD) is a critical neurodevelopmental disorder that needs to be diagnosed and treated early to lower the risk of related health issues. This research study uses a machine-lea...
详细信息
The wireless ad-hoc networks are decentralized networks with a dynamic topology that allows for end-to-end communications via multi-hop routing operations with several nodes collaborating themselves,when the destinati...
详细信息
The wireless ad-hoc networks are decentralized networks with a dynamic topology that allows for end-to-end communications via multi-hop routing operations with several nodes collaborating themselves,when the destination and source nodes are not in range of *** of its wireless type,it has lot of security concerns than an infrastructure *** attacks are one of the most serious security vulnerabilities in the network *** is simple to launch,even if there is no prior network *** are the sole thing that preventive measures rely *** detection systems(IDS)and other reactive measures detect all types of *** majority of IDS employ features from various network *** issue is calculating a huge layered features set from an ad-hoc *** research implements genetic algorithm(GA)-based feature reduction intrusion detection approaches to minimize the quantity of wireless feature sets required to identify worm hole *** attack detection,the reduced feature set was put to a fuzzy logic system(FLS).The performance of proposed model was compared with principal component analysis(PCA)and statistical parametric mapping(SPM).Network performance analysis like delay,packet dropping ratio,normalized overhead,packet delivery ratio,average energy consumption,throughput,and control overhead are evaluated and the IDS performance parameters like detection ratio,accuracy,and false alarm rate are evaluated for validation of the proposed *** proposed model achieves 95.5%in detection ratio with 96.8%accuracy and produces very less false alarm rate(FAR)of 14%when compared with existing techniques.
Aided by device-to-device(D2D) connections, unmanned aerial vehicle(UAV) can significantly enhance the coverage of wireless communications. In this paper, we consider a data collection system with the assistance of D2...
详细信息
Aided by device-to-device(D2D) connections, unmanned aerial vehicle(UAV) can significantly enhance the coverage of wireless communications. In this paper, we consider a data collection system with the assistance of D2D, where two fixed-wing UAVs as aerial base stations cooperatively serve the ground devices. To accommodate more devices, we propose two effective algorithms to establish the multi-hop D2D connections. Then, the user scheduling, UAV trajectory, and transmit power are jointly optimized to maximize the energy efficiency, which is a non-convex problem. Accordingly, we decompose it into three subproblems. The scheduling optimization is first converted into a linear programming. Then, the trajectory design and the transmit power optimization are reformulated as two convex problems by the Dinkelbach method. Finally, an iterative algorithm is proposed to effectively solve the original problem. Simulation results are presented to verify the effectiveness of the proposed scheme.
In wireless communications networks, the non-orthogonal multiple access (NOMA) technique is different from the existing orthogonal multiple access (OMA) techniques. In NOMA, the available number of resources are more ...
详细信息
暂无评论