Experimental verification of ‘waveguide’ plasmonics
نویسندگان
چکیده
منابع مشابه
Experimental Verification of Predicted Sources of G/T Improvement for the DSS-13 Beam-Waveguide Antenna
This article presents the results of tests performed to verify predicted sources of receive antenna gain-to-system noise temperature ratio (G/T ) improvements for the DSS-13 beam-waveguide antenna. The sources that gave the most improvement were (1) covering holography adjustment holes with aluminum-tape circular disks, (2) covering all panel gaps on the main-reflector surface with aluminum tap...
متن کاملExperimental verification of epsilon-near-zero metamaterial coupling and energy squeezing using a microwave waveguide.
Utilizing a microwave setup, we experimentally verify our recently developed theory of energy squeezing and tunneling [Phys. Rev. Lett. 97, 157403 (2006)10.1103/PhysRevLett.97.157403] through an ultranarrow waveguide channel that mimics zero-permittivity properties. Exploiting the infinite phase velocity supported by a waveguide transition section at cutoff, we test our theory of tunneling in t...
متن کاملPlasmonics.
Plasmonics publishes peer-reviewed articles that both advance and report on the knowledge and practice of the interactions of free-metal electrons, Plasmons. Coverage includes theory, physics, and applications of surface plasmons in metals, and rapidly emerging areas of nanotechnology, biophotonics, sensing, biochemistry and medicine. The journal covers the theory, synthesis and optical proper...
متن کاملExperimental Verification of Acoustic Saturation
The maximum value of acoustic pressure within an ultrasonic beam is limited by acoustic saturation. The t oretical basis for acoustic saturation has been analyzed previously. In this work, a high-power pulse source is used to drive acoustic pressure levels from an ultrasonic beam to saturation. An automatic procedure determines the field’s beam axis using a calibrated Marconi PVDF hydrophone. T...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: New Journal of Physics
سال: 2017
ISSN: 1367-2630
DOI: 10.1088/1367-2630/aa936c