Results 1 to 10 of about 745,558 (246)
Coexistence Demonstration and Wavelength Dependency Analysis of S-Band CV-QKD Signal with Fully Loaded C+L-Band DWDM Signals [PDF]
We demonstrated the coexistence of an S-band CV-QKD signal with fully loaded C+L-band classical signals for the first time. The secret key rate of the S-band QKD system was 986 kbps with the C+L-band WDM signals transmitted through a 20 km G.654.E fiber ...
Tetsuo Kawakami +3 more
doaj +2 more sources
Bipolarization L-band microwave radiometer [PDF]
A new bipolarization L-band microwave radiometer designed to measure soil moisture from an unmanned helicopter is presented. The schematic of the radiometer and an overview of the radiometer parts circuits are considering.
Gudkov Alexandr +3 more
doaj +3 more sources
Convergence is a crucial issue in iterative algorithms. Damping is commonly employed to ensure the convergence of iterative algorithms. The conventional ways of damping are scalar-wise, and either heuristic or empirical. Recently, an analytically optimized vector damping was proposed for memory message-passing (iterative) algorithms.
Shunqi Huang, Lei Liu, Brian M. Kurkoski
openaire +3 more sources
SABADT: Hybrid Intrusion Detection Approach for Cyber Attacks Identification in WLAN
With the advancement of technology, the use of wireless media and devices are increasing every day. In particular, the use of wireless local area networks (WLAN) has increased rapidly in recent years and is expected to increase further. The current state
Merve Ozkan-Okay +3 more
doaj +1 more source
A Novel Approach for Gaussian Mixture Model Clustering Based on Soft Computing Method
Determining the number of clusters in a data set is a significant and difficult problem in cluster analysis. In this study, a new model-based clustering approach is proposed for the estimation of the number of clusters. In the proposed method, the number
Maruf Gogebakan
doaj +1 more source
A Comprehensive Systematic Literature Review on Intrusion Detection Systems
Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently.
Merve Ozkan-Okay +3 more
doaj +1 more source
In the past decades, important research has been carried out to map the natural disturbances in the Paraná River Delta. The benefits of the combined use optical and radar data are also known. The main objective of this paper is to assess the wetland fire
Héctor Del Valle +2 more
doaj +1 more source
Pocketqube L-Band RFI Detection Payload
In the last decades, the number of wireless devices has notably increased, and improper RF filtering has resulted in an increase in Radio Frequency Interference (RFI). At L-band this is due to a plethora of reasons: from VHF/UHF harmonics, higher frequency band (e.g. WiFi boosters) emissions, or even intentional RFI created by Personal Privacy Devices (
Podaru, Stefan +2 more
openaire +2 more sources
Design of 960~1 400 MHz broadband power amplifier
Based on laterally diffused metal-oxide-semiconductor (LDMOS) devices, a broadband RF power amplifier for L-band was developed. The amplifier is composed of two stages of amplification and cascade connection. In order to achieve broadband and good output
Cheng Sujie +4 more
doaj +1 more source
The rapid growth and spreading of invasive plant species could be related to their efficient photosynthesis performance. We analysed and compared photosynthetic efficiency of invasive indigo bush (Amorpha fruticosa L.) and noninvasive native Quercus ...
S. MLINARIĆ +6 more
doaj +1 more source

