A novel differential quasi-Yagi antenna is first presented and compared with a normal single-ended counterpart. The simulated and measured results show that the differential quasi-Yagi antenna outperforms the conventional single-ended one. The differential quasi-Yagi antenna is then used as an element for linear arrays. A study of the coupling mechanism between the two differential and the two single-ended quasi-Yagi antennas is conducted, which reveals that the TE0 mode is the dominant mode, and the driver is the decisive part to account for the mutual coupling. Next, the effects of four decoupling structures are respectively evaluated between the two differential quasi-Yagi antennas. Finally, the arrays with simple but effective decoupling structures are fabricated and measured. The measured results demonstrate that the simple slit or air-hole decoupling structure can reduce the coupling level from -18 dB to -25 dB and meanwhile maintain the impedance matching and radiation patterns of the array over the broad bandwidth. The differential quasi-Yagi antenna should be a promising antenna candidate for many applications.
An improved parasitic parameter extraction method for InP high electron mobility transistor (HEMT) is presented. Parasitic parameter extraction is the first step of model parameter extraction and its accuracy has a great impact on the subsequent internal parameter extraction. It is necessary to accurately determine and effectively eliminate the parasitic effect, so as to avoid the error propagation to the internal circuit parameters. In this paper, in order to obtain higher accuracy of parasitic parameters, parasitic parameters are extracted based on traditional analytical method and optimization algorithm to obtain the best parasitic parameters. The validity of the proposed parasitic parameter extraction method is verified with excellent agreement between the measured and modeled S-parameters up to 40 GHz for InP HEMT. In 0.1–40 GHz InP HEMT, the average relative error of the optimization algorithm is about 9% higher than that of the analysis method, which verifies the validity of the parasitic parameter extraction method. The extraction of parasitic parameters not only provides a foundation for the high-precision extraction of small signal intrinsic parameters of HEMT devices, but also lays a foundation for the high-precision extraction of equivalent circuit model parameters of large signal and noise signals of HEMT devices.
Modern backup systems exploit data deduplication technology to save storage space whereas suffering from the fragmentation problem caused by deduplication. Fragmentation degrades the restore performance because of restoring the chunks that are scattered all over different containers. To improve the restore performance, the state-of-the-art History Aware Rewriting Algorithm (HAR) is proposed to collect fragmented chunks in the last backup and rewrite them in the next backup. However, due to rewriting fragmented chunks in the next backup, HAR fails to eliminate internal fragmentation caused by self-referenced chunks (that exist more than two times in a backup) in the current backup, thus degrading the restore performance. In this paper, we propose Selectively Rewriting Self-Referenced Chunks (SRSC), a scheme that designs a buffer to simulate a restore cache, identify internal fragmentation in the cache and selectively rewrite them. Our experimental results based on two real-world datasets show that SRSC improves the restore performance by 45% with an acceptable sacrifice of the deduplication ratio.
With the development and revolution of network in recent years, the scale and complexity of network have become big issues. Traditional hardware based network security solution has shown some significant disadvantages in cloud computing based Internet data centers (IDC), such as high cost and lack of flexibility. With the implementation of software defined networking (SDN), network security solution could be more flexible and efficient, such as SDN based firewall service and SDN based DDoS-attack mitigation service. Moreover, combined with cloud computing and SDN technology, network security services could be lighter-weighted, more flexible, and on-demanded. This paper analyzes some typical SDN based network security services, and provide a research on SDN based cloud security service (network security service pool) and its implementation in IDCs.
The demand for 5G services and applications is driving the change of network architecture. The mobile edge computing (MEC) technology combines the mobile network technology with cloud computing and virtualization, and is one of the key technologies for 5G networks. Compared to network function virtualization (NFV), another critical enabler of 5G networks, MEC reduces latency and enhances the offered capacity. In this paper, we discuss the combination of the two technologies and propose a new architecture. Moreover, we list the application scenarios using the proposed architecture.