937 resultados para pulse compression
Resumo:
A microcap SPICE circuit-level model of a 12-pulse autotransformer based rectifier for an aircraft fuel-pump motor drive is described. The importance of including the nonlinear magnetising inductance of the interphase transformers is illustrated. Small supply voltage distortions are seen to result in current imbalance in the interphase transformers, degrading the rectifier input current, and may lead to infringement of the power quality specification. The model has been validated for various operating supply voltages, frequencies and output powers, against measurements from a 3.75 kW unit.
Resumo:
Self-seeded, gain-switched operation of an InGaN multi-quantum-well diode laser is reported for the first time. Narrow-line, wavelength-tunable, picosecond pulses have been generated from a standard, uncoated diode laser in an external cavity.
Resumo:
A possibility of a strong change of an electromagnetic signal by a short sequence of time cycles of pulses that modulate the medium parameters is shown. The backward wave is demonstrated to be an inevitable result of the medium time change. Dependence of the relation between backward and forward waves on the parameters of the medium modulation is investigated. The finite statistical complexity of the electromagnetic signal transformed by a finite sequence of modulating cycles is calculated. Increase of the complexity with the number of cycles is shown.
Resumo:
We develop a theoretical method to calculate jitter statistics of interacting solitons. Applying this approach, we have derived the non-Gaussian probability density function and calculated the bit-error rate as a function of noise level, initial separation and phase difference between solitons.
Resumo:
In this paper, we present a technique for the shaping of short pulses based on the use of superstructured fiber Bragg gratings (SSFBGs), We apply this technique to demonstrate the generation of 20-ps rectangular pulses by phase and amplitude profiling of 2.5-ps soliton pulses. Numerical calculations validate our experimental findings.
Resumo:
We numerically show the possibility of pulse shaping in a mode-locked fiber laser by inclusion of an amplitude-phase spectral filter into the laser cavity. Various advanced temporal waveforms are generated, including parabolic, flat-top and triangular pulses. © 2014 OSA.
Resumo:
A comprehensive model of processes involved in femtosecond laser inscription and the subsequent structural material modification is developed. Different time scales of the pulse-plasma dynamics and thermo-mechanical relaxation allow for separate numerical treatments of these processes, while linking them by an energy transfer equation. The model is illustrated and analysed on examples of inscription in fused silica and the results are used to explain previous experimental observations. © 2007 Springer Science+Business Media, LLC.
Resumo:
In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-efficient of information security, which reflects the influence of the level of compression obtained after applying methods of compression to objects and the time, required by the attack to get access to the corresponding object, is proposed. Methods’ groups with the highest and respectively the lowest values of the co-efficient of information security for all methods’ groups in relation to all attacks’ groups are determined. Assessments and conclusions for future investigations are proposed.
Resumo:
In this paper is proposed a model for researching the capability to influence, by selected methods’ groups of compression, to the co-efficient of information security of selected objects’ groups, exposed to selected attacks’ groups. With the help of methods for multi-criteria evaluation are chosen the methods’ groups with the lowest risk with respect to the information security. Recommendations for future investigations are proposed.
Resumo:
In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of information security of objects – TIME and SIZE – are chosen and the characteristics, which reflect on their evaluation, are analyzed and estimated. A co-efficient of information security of object is proposed as a mean of the coefficients of the parameter TIME and SIZE. From the simulation experiments which were carried out methods with the highest co-efficient of information security had been determined. Assessments and conclusions for future investigations are proposed.
Resumo:
questions of forming of learning sets for artificial neural networks in problems of lossless data compression are considered. Methods of construction and use of learning sets are studied. The way of forming of learning set during training an artificial neural network on the data stream is offered.
Resumo:
The paper discusses the application of a similarity metric based on compression to the measurement of the distance among Bulgarian dia- lects. The similarity metric is de ned on the basis of the notion of Kolmo- gorov complexity of a le (or binary string). The application of Kolmogorov complexity in practice is not possible because its calculation over a le is an undecidable problem. Thus, the actual similarity metric is based on a real life compressor which only approximates the Kolmogorov complexity. To use the metric for distance measurement of Bulgarian dialects we rst represent the dialectological data in such a way that the metric is applicable. We propose two such representations which are compared to a baseline distance between dialects. Then we conclude the paper with an outline of our future work.
Resumo:
This report examines important issues pertaining to the different ways of affecting the information security of file objects under information attacks through methods of compression. Accordingly, the report analyzes the three-way relationships which may exist among a selected set of attacks, methods and objects. Thus, a methodology is proposed for evaluation of information security, and a coefficient of information security is created. With respects to this coefficient, using different criteria and methods for evaluation and selection of alternatives, the lowest-risk methods of compression are selected.