首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 718 毫秒
1.
The authors consider linear lightwave networks with a single waveband that have N inputs, each with a transmitter, and N outputs, each with a receiver, interconnected by optical links, broadcast stars, and wavelength-independent 2×2 switches. The transmitters and receivers can tune to C different wavelengths. The authors describe a rearrangeably nonblocking network that is a modification of the Benes network and uses transmitters that are fixed tuned and switches with two states. The network uses [1+o(1)] N/log2(N/C) switches, which is shown to be nearly the minimum number. It is also shown that, if C =o(log N), then a rearrangeably nonblocking network requires [1+o(1)]Nlog2N switches even if the switches have more than two states  相似文献   

2.
Analysis is made of the effects of Doppler on the error rate performance of a low data rate binary FSK frequency hopping receiver, employing a discrete Fourier transform (DFT) technique for baseband detection. Bit detection decision is made by locating the maximum of the DFT outputs which, in the frequency domain, are assumed to be separated by 1/T where T is the bit period. Both the worst case and average error performances are obtained and presented as a function of Eb/N0 for various values of M where Eb/N0 is the signal bit energy-to-noise density ratio and M is the degree of freedom associated with the Doppler uncertainty window. The E b/N0 degradation as a function of M is also presented  相似文献   

3.
Theoretical and experimental results are presented for the signal-to-noise (S/N) ratio caused by mode partition noise, intensity noise, and reflection-induced noise in optical data links. Under given conditions an additional noise source with a S /N ratio of 20 dB will cause a power penalty of 1 dB in order to maintain a 10-9 bit error rate. From numerical simulations the authors predict the maximum allowable dispersion in the presence of mode partition noise to be approximately 40% of a clock period. This figure is almost independent of bit rate and laser structure and agrees well with the measurements and with results of other workers. Numerical simulations of a buried-heterostructure and a TJS laser were carried out at four bit rates from 565 Mbit/s to 4.5 Gbit/s and the measurements were done at 2.2 Gbit/s using a TJS laser  相似文献   

4.
In burst digital transmission using PSK (phase shift keying) modulation with coherent detection, the recovery of the carrier reference phase and the symbol clock is a key aspect. If all users have a common clock synchronization, symbol timing needs not to be recovered in each burst. A digital processor for carrier recovery without preambles, in the presence of frequency offset, is considered. As an example, a 2 Mb/s QPSK transmission system is considered in which E b/No=10 dB, and the burst and estimation interval length L=15. Using the algorithm described and averaging eight successive estimated frequency offsets, in order to eliminate anomalous errors, the BER (bit error rate) degradation is equal to 0.14 dB when Δf=20 kHz  相似文献   

5.
Multistate self-electrooptic-effect devices (M-SEEDs) containing several quantum-well diodes in series are discussed. It is shown that a device with N diodes in series with a voltage source and illuminated by N diodes in series with a voltage source and illuminated by N light beams has N stable states corresponding to any one (and only one) of the diodes being highly transmissive. This voltage-biased M-SEED can perform contention resolution in the sense required by analog systems, because the diode illuminated by the weakest beam becomes the highly transmitting one on powering up the system. A current-biased M-SEED with N diodes in series with a current supply can have 2N stable states, corresponding to any combination of diodes in their transmitting or absorbing states. This same device can also function as a binary image thresholder. The M-SEEDs are multistable in multiple beams, in contrast to previous multistable optical devices that have multiple states for one beam. Electrically and optically enabled symmetric SEEDs (S-SEEDs) that comprise a pair of quantum-well p-i-n diodes in series with a transistor or a third diode are also discussed. This device is the equivalent of an electrical tristate device that is used in some bus architectures  相似文献   

6.
Secret key agreement by public discussion from common information   总被引:15,自引:0,他引:15  
The problem of generating a shared secret key S by two parties knowing dependent random variables X and Y, respectively, but not sharing a secret key initially, is considered. An enemy who knows the random variable Z, jointly distributed with X and Y according to some probability distribution PXYZ, can also receive all messages exchanged by the two parties over a public channel. The goal of a protocol is that the enemy obtains at most a negligible amount of information about S. Upper bounds on H(S) as a function of PXYZ are presented. Lower bounds on the rate H (S)/N (as N→∞) are derived for the case in which X=[X1, . . ., X N], Y=[Y1, . . ., YN] and Z=[Z1, . . ., ZN] result from N independent executions of a random experiment generating Xi, Yi and Zi for i=1, . . ., N. It is shown that such a secret key agreement is possible for a scenario in which all three parties receive the output of a binary symmetric source over independent binary symmetric channels, even when the enemy's channel is superior to the other two channels  相似文献   

7.
On the Hamming distance properties of group codes   总被引:1,自引:0,他引:1  
Under certain mild conditions, the minimum Hamming distance D of an (N, K, D) group code C over a non-abelian group G is bounded by DN -2K+2 if KN/2, and is equal to 1 if K>N/2. Consequently, there exists no (N, K, N-K+1) group code C over an non-abelian group G if 1<K<N. Moreover, any normal code C with a non-abelian output space has minimum Hamming distance equal to D=1. These results follow from the fact that non-abelian groups have nontrivial commutator subgroups. Finally, if C is an (N, K, D) group code over an abelian group G that is not elementary abelian, then there exists an (N, K, D) group code over a smaller elementary abelian group G'. Thus, a group code over a general group G cannot have better parameters than a conventional linear code over a field of the same size as G  相似文献   

8.
The decision problem of testing M hypotheses when the source is Kth-order Markov and there are M (or fewer) training sequences of length N and a single test sequence of length n is considered. K, M, n, N are all given. It is shown what the requirements are on M , n, N to achieve vanishing (exponential) error probabilities and how to determine or bound the exponent. A likelihood ratio test that is allowed to produce a no-match decision is shown to provide asymptotically optimal error probabilities and minimum no-match decisions. As an important serial case, the binary hypotheses problem without rejection is discussed. It is shown that, for this configuration, only one training sequence is needed to achieve an asymptotically optimal test  相似文献   

9.
In the testing of logic circuits, two proposed data-compression methods use the number of ones (syndrome) and the number of sequence changes (transition count). An enumeration N(m, k , t) of the number of length-m binary sequences having syndrome value k and transition count t is developed. Examination of this result reveals that the parallel compression of these two methods has small overlap in error masking. An asymptotic expression for N(m, k, t) is developed  相似文献   

10.
The normalization of the far-field distribution from phase-locked linear arrays of evanescently coupled semiconductor diode lasers is evaluated. As the element number N→∞, the peak irradiance of the fundamental array mode tends to 81% of the peak irradiance of an array of in-phase equal-intensity diodes. It is also found that for N⩾10, the peak irradiance is proportional to 0.81 (1+1/N)N2, and the diffraction-limited beamwidth is approximately 1.19 λ(N+1)S where λ is the vacuum wavelength and S is the array period. The far-field array factor is the same for an N-element array and an (N+1) S-wide cosine source as long as N⩾10  相似文献   

11.
The asymptotic (M→∞) probability of symbol error Pe,m for M-ary orthogonal modulation in a Nakagami-m fading channel is given by the incomplete gamma function P(m, mx) where x=In 2/(Eb/N0) and Eb is the average energy per bit. For large signal-to-noise ratio this leads to a channel where the probability of symbol error varies as the inverse mth power of Eb/N0. These channels exist for all m⩾1/2. The special case of m=1 corresponds to Rayleigh fading, an inverse linear channel  相似文献   

12.
The authors present a new nonblocking property of the reverse banyan network under a particular input packet pattern at the input ports. The reverse banyan network is the mirror image of the banyan network. If the input packets of the N×N reverse banyan network have consecutive output address as modulo N, then the reverse banyan network is nonblocking. The routing of packets in the reverse banyan network is described, and the nonblocking property of the reverse banyan network is proved. A possible application of this property in the switching network is discussed  相似文献   

13.
Life testing of highly reliable integrated circuits (ICs) is a time-consuming process because it usually takes a long time before an IC fails. Several methods have been proposed in the literature to reduce the time required for testing one type of IC. The author considers the problem of estimating the mean life of I types of IC (I>1). Assuming that the lifetime distribution of the ICs is exponential and at most N ICs can be tested concurrently, it is shown that the optimal life testing schedule that requires the smallest mean testing time is to test N ICs of type 1, then test N ICs of type 2,. . . and finally test N ICs of type I   相似文献   

14.
The performance of nonblocking packet switches such as the knockout switch and Batcher banyan switch for high-speed communication networks can be improved as the switching capacity L per output increases; the switching capacity per output refers to the maximum number of packets transferred to an output during a slot. The N×N switch with L=N was shown to attain the best possible performance by M.J. Karol et al. (1987). Here a N×N nonblocking packet switch with input and output buffers is analyzed for an arbitrary number of L such that 1⩽LN. The maximum throughput and packet loss probability at input are obtained when N=∞  相似文献   

15.
Quadtree-structured recursive plane decomposition coding of images   总被引:4,自引:0,他引:4  
The approximation of two-dimensional highly correlated grey value functions can be performed using a linear model of the type f( x, y)=a+bx+cy. The set of plane parameters (PPs) [a, b, c] can be determined in the least squares sense for a block of size N×N pixels, for example. Starting with a block size of 2×2 pixels, it is shown that the PPs obey a recursive law such that the PPs of a 2N×2N block can be computed recursively when only the PPs of the four adjacent subblocks of size N×N in the lower decomposition level are known. This concept of recursive plane decomposition (RPD) is embedded in a quadtree data structure to obtain a new variable block size image coding algorithm that offers a high performance at a low computational cost. Extensive comparisons to other state-of-the-art image coding algorithms are reported  相似文献   

16.
The generalized eigenproblem: pole-zero computation   总被引:1,自引:0,他引:1  
A modification-decomposition (MD) method is used to compute linear system transfer function poles and zeros by transforming an N-dimensional generalized eigenvalue problem to an M-dimensional standard eigenvalue problem with Mr, where r is the lesser of the ranks of the dynamic or nondynamic component matrix of the system. Hence, network eigenvalue problems normally solved by applying the QZ algorithm directly, or after deflation preprocessing, are solvable with the more efficient QR algorithm. It is shown that the flop (floating-point operations) count for MD-QR algorithms is always less than the flop count for the most efficient deflation-QZ algorithms. For rN, the MD-QR algorithms are exceptionally efficient. Using a parameter matrix decomposition of the dynamic or nondynamic component matrix, the MD method gives physical insight, and it provides a general proof of manifold constraints relating network time constants and poles and zeros. From these relations, accurate dominant and subdominant pole approximations are derived. A general eigenvalue sensitivity formula and a very flexible method for computing eigenvectors is developed and applied to pole sensitivity computation  相似文献   

17.
An upper bound on the probability of a sequence drawn from a finite-state source is derived. The bound is given in terms of the number of phrases obtained by parsing the sequence according to the Lempel-Ziv (L-Z) incremental parsing rule, and is universal in the sense that it does not depend on the statistical parameters that characterize the source. This bound is used to derive an upper bound on the redundance of the L-Z universal data compression algorithm applied to finite-state sources, that depends on the length N of the sequence, on the number K of states of the source, and, eventually, on the source entropy. A variation of the L-Z algorithm is presented, and an upper bound on its redundancy is derived for finite-state sources. A method to derive tighter implicit upper bounds on the redundancy of both algorithms is also given, and it is shown that for the proposed variation this bound is smaller than for the original L-Z algorithm, or every value of N and K  相似文献   

18.
The authors examine several different kinds of subadjacent blocks, and consider fast computation for a transform family including the Walsh-Hadamard transform and the Rh transform as special cases. The approach proposed here provides a direct frequency-frequency procedure. Results indicate that, for this transform family, a reduction of the number of multiplications and additions is achieved by a factor of two-thirds. An example for the Rh transform shows that further reduction of arithmetic operations is also possible. The results of this method are even better for the Walsh-Hadamard transform. The new algorithms can reduce the number of additions from the level O(N log 2 N) to the level O(N), as compared to the traditional method  相似文献   

19.
A fast algorithm for the discrete cosine transform (DCT) of a Toeplitz matrix of order N is derived. Only O(N log N)+O(M) time is needed for the computation of M elements. The storage requirement is O(N). The method carries over to other transforms (DFT, DST) and to Hankel or circulant matrices. Some applications of the algorithm are discussed  相似文献   

20.
The authors propose a star topology for multihop lightwave networks in which the conventional N×N passive star coupler is replaced by fixed wavelength division multiplexed (WDM) cross connects. The proposed topology overcomes three major limitations of the conventional star topology. First, it reduces the number of wavelengths needed in a (p,k) ShuffleNet from kp k+1 wavelengths in the conventional topology to p wavelengths in the proposed one. Second, the signal power loss due to the 1/N power splitting at the star coupler no longer exists in the WDM cross connects and, therefore, the restriction on the supported number of users by the star network is alleviated. Third, it completely eliminates the need for wavelength filtering at the input to the receivers as is the case in the conventional star topology  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号