scholarly journals Polarimetry for Photonic Integrated Circuits

2019 ◽  
Vol 9 (15) ◽  
pp. 2987
Author(s):  
Moritz Baier ◽  
Axel Schoenau ◽  
Francisco M. Soares ◽  
Martin Schell

Photonic integrated circuits (PICs) play a key role in a wide range of applications. Very often, the performance of PICs depends strongly on the state of polarization of light. Classically, this is regarded as undesirable, but more and more applications emerge that make explicit use of polarization dependence. In either case, the characterization of the polarization properties of a PIC can be a nontrivial task. We present a way of characterizing PICs in terms of their full Müller matrix, yielding a complete picture of their polarization properties. The approach is demonstrated by carrying out measurements of fabricated PICs.

mSystems ◽  
2020 ◽  
Vol 5 (3) ◽  
Author(s):  
Lars Barquist

ABSTRACT Small RNAs (sRNAs) have been discovered in every bacterium examined and have been shown to play important roles in the regulation of a diverse range of behaviors, from metabolism to infection. However, despite a wide range of available techniques for discovering and validating sRNA regulatory interactions, only a minority of these molecules have been well characterized. In part, this is due to the nature of posttranscriptional regulation: the activity of an sRNA depends on the state of the transcriptome as a whole, so characterization is best carried out under the conditions in which it is naturally active. In this issue of mSystems, Arrieta-Ortiz and colleagues (M. L. Arrieta-Ortiz, C. Hafemeister, B. Shuster, N. S. Baliga, et al., mSystems 5:e00057-20, 2020, https://doi.org/10.1128/mSystems.00057-20) present a network inference approach based on estimating sRNA activity across transcriptomic compendia. This shows promise not only for identifying new sRNA regulatory interactions but also for pinpointing the conditions in which these interactions occur, providing a new avenue toward functional characterization of sRNAs.


2020 ◽  
Vol 7 (12) ◽  
pp. 70-77
Author(s):  
А. Альван

Scientific approaches to the concept of "national security" are systematized in the article. The author substantiates that there are four main approaches to the concept of "national security". The first group - works devoted to the terminological characterization of national security. Another group - the authors define national security because of the state of protection of vital interests, the individual, society and the state against all kinds of threats. The third group is studies that analyze the types of national security, in particular: economic, environmental, financial, personnel, financial, social, etc. These characteristics reflect their socio-political nature, trace the unity of personal, public and state security, developing political and other processes. The fourth group of studies are those that pay attention to problems related to the correct use of the concept of "national security" and the possibility of its replacement. Fifth group - analyzes the interaction and correlation of threats and security.There is no single, well-defined definition of national security today. No matter what approach the authors use, there are different approaches, and in some cases, complications or simplifications of this category.In our opinion, national security should be understood as a state of protection of the individual, society and state against a wide range of internal and external threats, which ensure the realization of citizens' constitutional rights and freedoms, decent quality and standard of living, sovereignty, independence, state and territorial integrity. , sustainable socio-economic development of the state.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5165
Author(s):  
Chen Dong ◽  
Yi Xu ◽  
Ximeng Liu ◽  
Fan Zhang ◽  
Guorong He ◽  
...  

Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourced manufacturing tools and intellectual property (IP) cores may bring enormous risks from highly integrated. Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality, leakage of information, even a denial of services (DoS), and so on. In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques. Starting from the introduction of HT structures, the recent researches in the academic community about HTs is compiled and comprehensive classification of HTs is proposed. The state-of-the-art HT protection techniques with their advantages and disadvantages are further analyzed. Finally, the development trends in hardware security are highlighted.


Micromachines ◽  
2020 ◽  
Vol 11 (9) ◽  
pp. 795
Author(s):  
Soumava Ghosh ◽  
Kuan-Chih Lin ◽  
Cheng-Hsun Tsai ◽  
Harshvardhan Kumar ◽  
Qimiao Chen ◽  
...  

Metal-semiconductor-metal photodetectors (MSM PDs) are effective for monolithic integration with other optical components of the photonic circuits because of the planar fabrication technique. In this article, we present the design, growth, and characterization of GeSn MSM PDs that are suitable for photonic integrated circuits. The introduction of 4% Sn in the GeSn active region also reduces the direct bandgap and shows a redshift in the optical responsivity spectra, which can extend up to 1800 nm wavelength, which means it can cover the entire telecommunication bands. The spectral responsivity increases with an increase in bias voltage caused by the high electric field, which enhances the carrier generation rate and the carrier collection efficiency. Therefore, the GeSn MSM PDs can be a suitable device for a wide range of short-wave infrared (SWIR) applications.


Author(s):  
M. Rajarajan ◽  
S.SA. Obayya ◽  
B.M.A. Rahman ◽  
K.T.V. Grattan ◽  
H.A. El-Mikati

2012 ◽  
Vol 4 (3) ◽  
pp. 825-831 ◽  
Author(s):  
S. Mas ◽  
J. Matres ◽  
J. Marti ◽  
C. J. Oton

Sign in / Sign up

Export Citation Format

Share Document