Parametric Study of Silicon Based Optical Leaky-Wave Antenna
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 9
Abstract
Parametric study is presented for 1550 nm CMOS compatible optical leaky wave antenna. The antenna is designed with Si3N4 waveguide perturbed periodically with silicon. The silicon perturbations are used to transform the guided mode into a leaky mode radiated to the surrounding space. Simulation results are obtained using the commercial software package CST STUDIO SUITE 2012 and indicate clearly the strong dependence of radiation parameters on the number and dimensions of the silicon perturbations.
Authors and Affiliations
Ali A. Hummadi, R. S. Fyath
AN IMPROVED RESOURCE ALLOCATION STRATEGY BASED ON PACKAGE LEVEL ACCESS IN CLOUD ENVIRONMENT
Cloud computing is an emerging field of computer science, where heterogeneous services such as applications, servers and storage are delivered to an individual or organization's computer and devices through the Internet....
IMPLEMENTATION OF FINGER TOKEN AUTHENTICATION TECHNIQUE USING ARTIFICIAL INTELLIGENCE APPROACH IN NTT MICROSYSTEMS
Personal authentication that correctly identifies valid users in an indispensable security technology for enabling people to enjoy the access to data services with a sense of confidence and assurance. Passwords have been...
ENHANCED CBIR MECHANISM USING STEERABLE PYRAMID AND MEDIAN VECTOR ALGORITHM
Recently, digital content has become a significant and inevitable asset of or any enterprise and the need for visual content management is on the rise as well. Content-based image retrieval has attracted voluminous resea...
IMPLEMENTATION AND ANALYSIS OF FIR FILTER USING TMS 320C6713 DSK
In most of the applications, analog signals are produced in response to some physical phenomenon or activity. But it is quite difficult to process that analog signal; here comes the need to convert an analog signal to a...
Forensic Analysis of Databases by Combining Multiple Evidences
The information security for securing enterprise databases from internal and external attacks and violations of mutual policy is an interminable struggle. With the growing number of attacks and frauds, the organizations...