Search Constraints
Number of results to display per page
Search Results
-
- Resource Type:
- Article
- Creator:
- Albert, Jacques, Berini, P., Chen, Chengkun, Caucheteur, C., and Voisin, V.
- Abstract:
- The effective indices of the cladding modes of optical fibers depend on the refractive index of the medium surrounding the fiber. We show experimentally and theoretically that while cladding modes with similar effective indices normally have similar refractometric sensitivities, the addition of a 50 nm thick gold sheath enhances the sensitivity of some EH modes by more than one order of magnitude while nearly completely suppressing the sensitivity of neighbouring HE modes (by three orders of magnitude, down to insignificant levels). A differential sensitivity of ∼1000 nm/(refractive index unit) is experimentally reported between adjacent EH and HE grating resonances.
- Date Created:
- 2011-07-25
-
- Resource Type:
- Article
- Creator:
- Johnson, D. C., Malo, B., Hill, K. O., Thériault, S., Bilodeau, F., and Albert, Jacques
- Date Created:
- 1995-12-01
-
- Resource Type:
- Article
- Creator:
- Albert, Jacques, Bilodeau, F., Malo, B., Hill, K. O., and Johnson, D. C.
- Abstract:
- A photolithographic method is described for fabricating refractive index Bragg gratings in photosensitive optical fiber by using a special phase mask grating made of silica glass. A KrF excimer laser beam (249 nm) at normal incidence is modulated spatially by the phase mask grating. The diffracted light, which forms a periodic, high-contrast intensity pattern with half the phase mask grating pitch, photoimprints a refractive index modulation into the core of photosensitive fiber placed behind, in proximity, and parallel, to the mask; the phase mask grating striations are oriented normal to the fiber axis. This method of fabricating in-fiber Bragg gratings is flexible, simple to use, results in reduced mechanical sensitivity of the grating writing apparatus and is functional even with low spatial and temporal coherence laser sources.
- Date Created:
- 1993-12-01
-
- Resource Type:
- Conference Proceeding
- Creator:
- Oommen, B. John, Zhan, Justin, and Crisostomo, Johanna
- Abstract:
- Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize "normal" observations. Subsequently, based on the characteristics of data learned from the normal observations, new observations are classified as being either normal or not. Most state-of-the-art approaches, especially those which belong to the family parameterized statistical schemes, work under the assumption that the underlying distributions of the observations are stationary. That is, they assume that the distributions that are learned during the training (or learning) phase, though unknown, are not time-varying. They further assume that the same distributions are relevant even as new observations are encountered. Although such a " stationarity" assumption is relevant for many applications, there are some anomaly detection problems where stationarity cannot be assumed. For example, in network monitoring, the patterns which are learned to represent normal behavior may change over time due to several factors such as network infrastructure expansion, new services, growth of user population, etc. Similarly, in meteorology, identifying anomalous temperature patterns involves taking into account seasonal changes of normal observations. Detecting anomalies or outliers under these circumstances introduces several challenges. Indeed, the ability to adapt to changes in non-stationary environments is necessary so that anomalous observations can be identified even with changes in what would otherwise be classified as normal behavior. In this paper, we proposed to apply weak estimation theory for anomaly detection in dynamic environments. In particular, we apply this theory to detect anomaly activities in system calls. Our experimental results demonstrate that our proposal is both feasible and effective for the detection of such anomalous activities.
- Date Created:
- 2012-09-22
-
- Resource Type:
- Article
- Creator:
- Shao, Li-Yang, Simard, Benoit, Albert, Jacques, Sun, Tingting, and Jakubinek, Michael B.
- Abstract:
- The observation of four-wave mixing (FWM) in single-walled carbon nanotubes (SWCNTs) deposited around a tilted fiber Bragg grating (TFBG) has been demonstrated. A thin, floating SWCNT film is manually wrapped around the outer cladding of the fiber and FWM occurs between two core-guided laser signals by TFBG-induced interaction of the core mode and cladding modes. The effective nonlinear coefficient is calculated to be 1.8 10 3W -1Km -1. The wavelength of generated idlers is tunable with a range of 7.8 nm.
- Date Created:
- 2012-02-13
-
- Resource Type:
- Article
- Creator:
- Hill, K.O., Johnson, D.C., Mihailov, S.J., McClelland, A.W., Stryckman, D., Bilodeau, F., Albert, Jacques, Carr, D.W., Hugues, B.J., Tiberio, R.C., and Rooks, M.J.
- Abstract:
- We report on the fabrication of a chirped, phase mask that was used to create a fiber Bragg grating(FBG)device for the compensation of chromatic dispersion in longhaul optical transmission networks.Electron beamlithography was used to expose the grating onto a resist-coated quartz plate. After etching, this phase mask was used to holographically expose an index grating into the fiber core [K. O. Hill, F. Bilodeau, D. C. Johnson, and J. Albert, Appl. Phys. Lett.62, 1035 (1993)]. The linear increase in the grating period, “chirp,” is only 0.55 nm over the 10 cm grating. This is too small to be defined by computer aided design and a digital deflection system. Instead, the chirp was incorporated by repeatedly rescaling the analog electronics used for field size calibration. Special attention must be paid to minimize any field stitching and exposure artifacts. This was done by using overlapping fields in a “voting” method. As a result, each grating line is exposed by the accumulation of three overlapping exposures at 1/3 dose. This translates any abrupt stitching error into a small but uniform change in the line-to-space ratio of the grating. The phase mask was used with the double-exposure photoprinting technique [K. O. Hill, F. Bilodeau, B. Malo, T. Kitagawa, S. Thériault, D. C. Johnson, J. Albert, and K. Takiguchi, Opt. Lett. 19, 1314 (1994)]: a KrF excimer laser holographically imprints an apodized chirped Bragg grating in a hydrogen loaded SMF-28 optical fiber. Our experiments have demonstrated a spectral delay of −1311 ps/nm with a linearity of +/−10 ps over the 3 dB bandwidth of the resonant wavelength of the FBG. The reflectance, centered on 1550 nm, shows a side-lobe suppression of −25 dB. Fabrication processes and optical characterization will be discussed.
- Date Created:
- 1998-09-16
-
- Resource Type:
- Conference Proceeding
- Creator:
- Foster, Blair and Somayaji, Anil
- Abstract:
- This paper presents ObjRecombGA, a genetic algorithm framework for recombining related programs at the object file level. A genetic algorithm guides the selection of object files, while a robust link resolver allows working program binaries to be produced from the object files derived from two ancestor programs. Tests on compiled C programs, including a simple web browser and a well-known 3D video game, show that functional program variants can be created that exhibit key features of both ancestor programs. This work illustrates the feasibility of applying evolutionary techniques directly to commodity applications. Copyright 2010 ACM.
- Date Created:
- 2010-08-27
-
- Resource Type:
- Conference Proceeding
- Creator:
- Van Oorschot, Paul C., Biddle, Robert, Forget, Alain, Chiasson, Sonia, and Stobert, Elizabeth
- Abstract:
- The underlying issues relating to the usability and security of multiple passwords are largely unexplored. However, we know that people generally have difficulty remembering multiple passwords. This reduces security since users reuse the same password for different systems or reveal other passwords as they try to log in. We report on a laboratory study comparing recall of multiple text passwords with recall of multiple click-based graphical passwords. In a one-hour session (short-term), we found that participants in the graphical password condition coped significantly better than those in the text password condition. In particular, they made fewer errors when recalling their passwords, did not resort to creating passwords directly related to account names, and did not use similar passwords across multiple accounts. After two weeks, participants in the two conditions had recall success rates that were not statistically different from each other, but those with text passwords made more recall errors than participants with graphical passwords. In our study, click-based graphical passwords were significantly less susceptible to multiple password interference in the short-term, while having comparable usability to text passwords in most other respects. Copyright 2009 ACM.
- Date Created:
- 2009-12-01
-
- Resource Type:
- Conference Proceeding
- Creator:
- Brubaker, Jed R., Handel, Mark, Yarosh, Svetlana, Bivens, Rena, Haimson, Oliver L., and Lingel, Jessa
- Abstract:
- Online systems often struggle to account for the complicated self-presentation and disclosure needs of those with complex identities or specialized anonymity. Using the lenses of gender, recovery, and performance, our proposed panel explores the tensions that emerge when the richness and complexity of individual personalities and subjectivities run up against design norms that imagine identity as simplistic or one-dimensional. These models of identity not only limit the ways individuals can express their own identities, but also establish norms for other users about what to expect, causing further issues when the inevitable dislocations do occur. We discuss the challenges in translating identity into these systems, and how this is further marred by technical requirements and normative logics that structure cultures and practices of databases, algorithms and computer programming.
- Date Created:
- 2015-01-01
-
- Resource Type:
- Conference Proceeding
- Creator:
- Noble, James, Marshall, Stuart, Anslow, Craig, and Biddle, Robert
- Abstract:
- Developing applications for touch devices is hard. Developing touch based applications for multi-user input is harder. The Multi-Touch for Java (MT4j) toolkit supports developing touch based applications for multiple users. In this paper, we outline our experience using MT4j for developing a number of software applications to support developers working in co-located teams. Our experience using the toolkit will help developers to understand the nuances of the toolkit and design issues that can be applied to other toolkits for developing multi-user touch based applications.
- Date Created:
- 2016-10-21