2012 Oceans 2012
DOI: 10.1109/oceans.2012.6405031
|View full text |Cite
|
Sign up to set email alerts
|

Brillouin precursors propagation through sea water at GHz frequency

Abstract: Precursor fields in lossy Debye media have been shown to have a sub-exponential attenuation rate, thus they are good candidates for underwater communications. In this paper, we investigate the propagation of Brillouin precursors through sea water with static conductivity using the dielectric models proposed by Meissner and Wentz. A fast-Fourier-transform method is used to analyze the peak amplitude decay and pulse broadening related to the precursor. The sea water salinity considered is between 25 and 50 ppt. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Recent NIST [7] gives detailed assessment of all access control approaches but beside these established approaches, there are several applications and scenario specific access control schemes have been developed. Extended role based access control model for IoT by incorporating the context information is presented in [8]. In [8], authors have considered IoT users rather than device.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent NIST [7] gives detailed assessment of all access control approaches but beside these established approaches, there are several applications and scenario specific access control schemes have been developed. Extended role based access control model for IoT by incorporating the context information is presented in [8]. In [8], authors have considered IoT users rather than device.…”
Section: Related Workmentioning
confidence: 99%
“…Extended role based access control model for IoT by incorporating the context information is presented in [8]. In [8], authors have considered IoT users rather than device. Furthermore, presented model have been demonstrated with the case studies than implementation.…”
Section: Related Workmentioning
confidence: 99%