Log-log growth of channel capacity for nondispersive nonlinear optical fiber channel in intermediate power range
نویسندگان
چکیده
منابع مشابه
Next-to-leading order corrections to capacity for nondispersive nonlinear optical fiber channel in intermediate power region
We consider the optical fiber channel modeled by the nonlinear Schrödinger equation with zero dispersion and additive Gaussian noise. Using the Feynman path-integral approach for the model, we find corrections to conditional probability density function, output signal distribution, conditional and output signal entropies, and the channel capacity at large signal-to-noise ratio. We demonstrate t...
متن کاملOptimal input signal distribution and per-sample mutual information for nondispersive nonlinear optical fiber channel in large SNR limit
We consider a model nondispersive nonlinear optical fiber channel with additive white Gaussian noise at large SNR (signalto-noise ratio) in the intermediate power region. Using Feynman path-integral technique we for the first time find the optimal input signal distribution maximizing the channel’s per-sample mutual information. The finding of the optimal input signal distribution allows us to i...
متن کاملA novel representation for Multi-Channel log-polar quantum images
Mostly existing quantum image models represent image in Cartesian coordinates. Some complicated affine transformation can not be easily handled in Cartesian coordinates. In this paper, a new representation of Multi-Channel log-polar quantum image (MCLPQI) sampled in log-polar coordinates is proposed. This form contains the image RGB color information and transparency αof the corresponding pixel...
متن کاملLeaving Timing Channel Fingerprints in Hidden Service Log Files
Hidden services are anonymously hosted services that can be accessed over an anonymity network, such as Tor. While most hidden services are legitimate, some host illegal content. There has been a fair amount of research on locating hidden services, but an open problem is to develop a general method to prove that a physical machine, once confiscated, was in fact the machine that had been hosting...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review E
سال: 2017
ISSN: 2470-0045,2470-0053
DOI: 10.1103/physreve.95.062133