1,859 research outputs found
Design study of time-preserving grating monochromators for ultrashort pulses in the extreme-ultraviolet and soft X-rays
The design of grating-based instruments to handle and condition coherent ultrafast
pulses in the extreme-ultraviolet is discussed. The main application of such instruments is the
monochromatization of high-order laser harmonics and free-electron-laser pulses in the femtosecond
time scale. Broad-band monochromators require the use of diffraction gratings at grazing incidence.
A grating can be used for the spectral selection of ultrashort pulses without altering the pulse duration
in a significant way, provided that the number of illuminated grooves is equal to the resolution.
We discuss here the design conditions to be fulfilled by a grating monochromator that does not
increase the pulse duration significantly longer than the Fourier limit
Recommended from our members
Food, Acid Supplementation and Drug Absorption - a Complicated Gastric Mix: a Randomized Control Trial.
PURPOSE:The purpose of this study was to determine the impact of food on gastric pH and the ability of over the counter betaine hydrochloride (BHCl) acid to reacidify gastric pH after food-induced elevations in gastric pH. METHODS:This open-label cross over clinical study (NCT02758015) included 9 subjects who were randomly assigned to one of 16 possible, 4-period cross-over sequences to determine the impact and relationship of food and gastric pH with acid supplementation. Subjects were administered various doses (1500 mg, 3000 mg and 4500 mg) of betaine hydrochloride (BHCl) to determine the ability of acid supplementation to reacidify gastric pH after the elevation of gastric pH caused by the ingestion of food. RESULTS:Following the administration of food and the resulting elevation in gastric pH, time to return to baseline gastric pH levels without acid supplementation was 49.7 ± 14.0 min. Administering 4500 mg of BHCl acid in capsules was able to reacidify gastric pH levels back to baseline following the administration of food in approximately 17.3 ± 5.9 min. AUCpH of each treatment were similar and not statistically different. Mean max pH following the administration of food was 3.20 ± 0.55. CONCLUSION:The ability of food to elevate and maintain gastric pH levels in the presence of acid supplementation was made evident throughout the study. A 4500 mg dose of BHCl was required to reacidify gastric pH after the administration of food. This study details the difficulty faced by clinicians in dosing a poorly soluble, weakly basic drug to patients receiving acid reducing agents where administration with food is recommended to avoid gastric side effects. TRIAL REGISTRATION:https://clinicaltrials.gov/ct2/show/NCT02758015
Compression of extreme-ultraviolet ultrashort pulses by grating configurations
The design and realization of grating instruments to condition the spectral phase of ultrashort extreme-ultraviolet pulses are discussed. The main application of such configurations is the temporal compression of pulses by compensating the phase chirp and getting close to the Fourier limit. We discuss the two configurations useful for the realization of ultrafast grating compressors, namely, the classical diffraction mount and the off-plane one. The configuration may be applied to free-electron lasers and high-order laser harmonics
Recommended from our members
Traditional and nontraditional risks for kidney disease: a comparison of Western and Paleolithic-type diets
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization
Recent research has demonstrated that Intel's SGX is vulnerable to
software-based side-channel attacks. In a common attack, the adversary monitors
CPU caches to infer secret-dependent data accesses patterns. Known defenses
have major limitations, as they require either error-prone developer
assistance, incur extremely high runtime overhead, or prevent only specific
attacks. In this paper, we propose data location randomization as a novel
defense against side-channel attacks that target data access patterns. Our goal
is to break the link between the memory observations by the adversary and the
actual data accesses by the victim. We design and implement a compiler-based
tool called DR.SGX that instruments the enclave code, permuting data locations
at fine granularity. To prevent correlation of repeated memory accesses we
periodically re-randomize all enclave data. Our solution requires no developer
assistance and strikes the balance between side-channel protection and
performance based on an adjustable security parameter
Evaluating software-based fingerprint liveness detection using Convolutional Networks and Local Binary Patterns
With the growing use of biometric authentication systems in the past years,
spoof fingerprint detection has become increasingly important. In this work, we
implement and evaluate two different feature extraction techniques for
software-based fingerprint liveness detection: Convolutional Networks with
random weights and Local Binary Patterns. Both techniques were used in
conjunction with a Support Vector Machine (SVM) classifier. Dataset
Augmentation was used to increase classifier's performance and a variety of
preprocessing operations were tested, such as frequency filtering, contrast
equalization, and region of interest filtering. The experiments were made on
the datasets used in The Liveness Detection Competition of years 2009, 2011 and
2013, which comprise almost 50,000 real and fake fingerprints' images. Our best
method achieves an overall rate of 95.2% of correctly classified samples - an
improvement of 35% in test error when compared with the best previously
published results.Comment: arXiv admin note: text overlap with arXiv:1301.3557 by other author
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT
With the rapid growth of the Internet-of-Things (IoT), concerns about the
security of IoT devices have become prominent. Several vendors are producing
IP-connected devices for home and small office networks that often suffer from
flawed security designs and implementations. They also tend to lack mechanisms
for firmware updates or patches that can help eliminate security
vulnerabilities. Securing networks where the presence of such vulnerable
devices is given, requires a brownfield approach: applying necessary protection
measures within the network so that potentially vulnerable devices can coexist
without endangering the security of other devices in the same network. In this
paper, we present IOT SENTINEL, a system capable of automatically identifying
the types of devices being connected to an IoT network and enabling enforcement
of rules for constraining the communications of vulnerable devices so as to
minimize damage resulting from their compromise. We show that IOT SENTINEL is
effective in identifying device types and has minimal performance overhead
- …
