Log-log growth of channel capacity for nondispersive nonlinear optical fiber channel in intermediate power range

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Next-to-leading order corrections to capacity for nondispersive nonlinear optical fiber channel in intermediate power region

We consider the optical fiber channel modeled by the nonlinear Schrödinger equation with zero dispersion and additive Gaussian noise. Using the Feynman path-integral approach for the model, we find corrections to conditional probability density function, output signal distribution, conditional and output signal entropies, and the channel capacity at large signal-to-noise ratio. We demonstrate t...

متن کامل

Optimal input signal distribution and per-sample mutual information for nondispersive nonlinear optical fiber channel in large SNR limit

We consider a model nondispersive nonlinear optical fiber channel with additive white Gaussian noise at large SNR (signalto-noise ratio) in the intermediate power region. Using Feynman path-integral technique we for the first time find the optimal input signal distribution maximizing the channel’s per-sample mutual information. The finding of the optimal input signal distribution allows us to i...

متن کامل

A novel representation for Multi-Channel log-polar quantum images

Mostly existing quantum image models represent image in Cartesian coordinates. Some complicated affine transformation can not be easily handled in Cartesian coordinates. In this paper, a new representation of Multi-Channel log-polar quantum image (MCLPQI) sampled in log-polar coordinates is proposed. This form contains the image RGB color information and transparency αof the corresponding pixel...

متن کامل

Leaving Timing Channel Fingerprints in Hidden Service Log Files

Hidden services are anonymously hosted services that can be accessed over an anonymity network, such as Tor. While most hidden services are legitimate, some host illegal content. There has been a fair amount of research on locating hidden services, but an open problem is to develop a general method to prove that a physical machine, once confiscated, was in fact the machine that had been hosting...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review E

سال: 2017

ISSN: 2470-0045,2470-0053

DOI: 10.1103/physreve.95.062133