Photon Energy Upconverting Nanopaper: A Bioinspired Oxygen Protection Strategy

ACS Nano ◽  
2014 ◽  
Vol 8 (8) ◽  
pp. 8198-8207 ◽  
Author(s):  
Anna J. Svagan ◽  
Dmitry Busko ◽  
Yuri Avlasevich ◽  
Gunnar Glasser ◽  
Stanislav Baluschev ◽  
...  
2014 ◽  
Vol 6 (2) ◽  
pp. 1178-1190
Author(s):  
A. JOHN PETER ◽  
Ada Vinolin

Simultaneous effects of magnetic field, pressure and temperature on the exciton binding energies are found in a 9.0 1.0 6.0 4.0 GaAs P / GaAs P quantum dot. Numerical calculations are carried out taking into consideration of spatial confinement effect. The cylindrical system is taken in the present problem with the strain effects. The electronic properties and the optical properties are found with the combined effects of magnetic field strength, hydrostatic pressure and temperature values. The exciton binding energies and the nonlinear optical properties are carried out taking into consideration of geometrical confinement and the external perturbations.Compact density approach is employed to obtain the nonlinear optical properties. The optical rectification coefficient is obtained with the photon energy in the presence of pressure, temperature and external magnetic field strength. Pressure and temperature dependence on nonlinear optical susceptibilities of generation of second and third order harmonics as a function of incident photon energy are brought out in the influence of magnetic field strength. The result shows that the electronic and nonlinear optical properties are significantly modified by the applications of external perturbations in a 9.0 1.0 6.0 4.0 GaAs P / GaAs P quantum dot.


2019 ◽  
Vol 13 (4) ◽  
pp. 325-333
Author(s):  
Xu Liu ◽  
Xiaoqiang Di ◽  
Jinqing Li ◽  
Huamin Yang ◽  
Ligang Cong ◽  
...  

Background: User behavior models have been widely used to simulate attack behaviors in the security domain. We revised all patents related to response to attack behavior models. How to decide the protected target against multiple models of attack behaviors is studied. Methods: We utilize one perfect rational and three bounded rational behavior models to simulate attack behaviors in cloud computing, and then investigate cloud provider’s response based on Stackelberg game. The cloud provider plays the role of defender and it is assumed to be intelligent enough to predict the attack behavior model. Based on the prediction accuracy, two schemes are built in two situations. Results: If the defender can predict the attack behavior model accurately, a single-objective game model is built to find the optimal protection strategy; otherwise, a multi-objective game model is built to find the optimal protection strategy. Conclusion: The numerical results prove that the game theoretic model performs better in the corresponding situation.


Sign in / Sign up

Export Citation Format

Share Document