A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Revathi, S.
- Analysis of Air Core Index Guided Photonic Crystal Fiber
Authors
1 School of Electrical Sciences, VIT University, Vellore, TamilNadu, IN
Source
Networking and Communication Engineering, Vol 1, No 4 (2009), Pagination: 173-176Abstract
In this paper, two types of PCF structure are designed as air core index guided with three rings of three different diameters nmis numerically investigated, using finite element method (COMSOL Multi Physics3.2a). The impact of the air-core on the three parameters that is, effective mode index, confinement loss and birefringence behavior are studied for this two different types of structure. By destroying the symmetry of the structure and make effective index difference between two orthogonal polarization states, birefringence is achieved. By using different diameter of air- holes around the newly formed core, the confinement loss is reduced and birefringence becomes high. It is seen that the effective mode index decreases with increase in wavelength and birefringence decreases with increase in normalized frequency.
Keywords
Comsol Multi Physics, Finite-Element Method, Photonic Crystal Fiber.- Handling of Cloud Computing Audit Logs using Data Mining Techniques
Authors
1 Department of PG & Research in Computer Science, Dr.N.G.P Arts and Science College, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 9, No 1 (2017), Pagination: 1-4Abstract
Cloud computing has now extended as a new paradigm for delivering services over the Internet. It is attractive to business owners, since it reduces the upfront investments. However, despite the fact that cloud computing offers potential opportunities to the IT industry, it has many issues and challenges still to be addressed. Eventually the business owners could not seek the physical location of their application or data, which reduces the confidentiality on cloud computing. Audit logs are used as one of the possible ways to secure the data and it allows forensic analysis when any security incidents that occurs. This paper present the data mining techniques used in audit logs.