Different distortions that affect gridless wavelength division multiplexing (WDM) systems due to nonlinear impairments of the optical fiber and linear interchannel interference (ICI) errors cause signal degradation an...
详细信息
Different distortions that affect gridless wavelength division multiplexing (WDM) systems due to nonlinear impairments of the optical fiber and linear interchannel interference (ICI) errors cause signal degradation and a decrease in the transmission system quality. Overcoming these effects is a challenge if there is no information about the source of the distortion. In this work, we propose two asymmetric demodulation methods based on decision tree (DT) algorithms to mitigate distortions associated with linear ICI in gridless WDM systems, even when optical channels are spectrally overlapped. The first method uses the conventional DT and random forest (RDF) algorithms adapted to create asymmetrical thresholds in m-QAM digital demodulation. The second method uses the density-based spatial clustering of applications with a noise (DBSCAN) algorithm, including the K-Dimensional tree (K-D tree) algorithm to treat symbols in boundary conditions. Both methods were experimentally validated in a 3 x 16 GBd gridless Nyquist WDM system modulated in 16-QAM with different channel spacing. DT-based demodulation, including RDF, achieved gains up to <^> 1.6 dB in the FEC limit 3.8 x 10-3, - 3 , while demodulation based on DBSCAN plus the K-D tree achieved gains up to <^> 1.2 dB compared to conventional demodulation. Additionally, we performed a brief latency analysis in comparison to other previous machine learning-based demodulation methods, where DT and RDF presented latency up to <^> 0.3% and <^> 32% of the DBSCAN + K-D tree latency, respectively. Finally, the proposed asymmetric demodulation methods can improve the performance of future elastic optical networks by offering easy interpretation of the digital demodulation process and the possibility of adapting them to any m-QAM modulation format being agnostic to signal distortion. (c) 2024 Optica Publishing Group
optical encryption methods, due to their efficient operation speed and parallel processing capabilities, hold significant importance in securing multidimensional and large -volume data. Enhancing the security of optic...
详细信息
optical encryption methods, due to their efficient operation speed and parallel processing capabilities, hold significant importance in securing multidimensional and large -volume data. Enhancing the security of optical cryptosystems from the perspective of cryptanalysis holds significant importance currently. Presently, attack methods against optical encryption are complex, and the effectiveness of these attacks is insufficient. Security analysis solutions face limitations in both breadth and depth. Therefore, this paper proposes an attack on optical cryptosystems based on a skip connection network, demonstrating the susceptibility of optical cryptosystems to attacks based on neural network algorithms. The network model is trained on plaintext-ciphertext pairs, fitting equivalent keys without various additional conditions. It approximates plaintext information in high -dimensional space, directly obtaining corresponding plaintext through ciphertext information, expanding the applicability and enhancing the effectiveness of the attack scheme. Finally, the feasibility and effectiveness of the attack scheme were verified through computer simulations. The experiments indicate that the method proposed in this paper has low computational complexity, wide applicability, produces high -quality decrypted images, and high decipherment accuracy. This provides a universal approach for analyzing the security of various optical cryptosystems from the perspective of chosen plaintext attacks.
Object tracking is a widely used algorithm in image processing. When tracking objects on thermal images, however, issues, such as changes in size, temporary occlusion, lack of prominent features, and active thermal no...
详细信息
The use of Alamouti-coded polarization -time block code (A-PTBC) in combination with a simple single polarization coherent receiver enables phase -diverse coherent detection without any optical polarization tracking. ...
详细信息
The use of Alamouti-coded polarization -time block code (A-PTBC) in combination with a simple single polarization coherent receiver enables phase -diverse coherent detection without any optical polarization tracking. However, applying this technique to high-speed single -carrier systems is not straightforward, as it requires specialized digital signal processing (DSP) algorithms for data recovery, which increases DSP complexity. In this paper, we propose a novel Alamouti-coded coherent algorithm designed to significantly reduce the complexity of the receiver DSP for data recovery. The proposed algorithm achieves the comparable performance to the conventional algorithm but requires only half the number of necessary equalizers for data recovery. We validate its performance through simulations and also experimentally demonstrate a 100 Gb/s 16-quadrature amplitude modulation (QAM) single -carrier coherent system employed the single -polarization coherent receiver over 20 km of standard single -mode fiber (SMF). Through the performance verification, the coherent system with the proposed algorithm exhibits performance comparable to that of the conventional Alamouti-coded coherent system and achieves a power budget of 34 dB when the transmit launch power is set to 7 dBm at a Bit Error Rate (BER) of 1 x 10 - 2 for 0-20 km fiber transmission.
An achromatic extended depth-of-field (EDOF) system can obtain clear scene information that is crucial for target recognition, dynamic monitoring, and other applications. However, the imaging performance of most optic...
详细信息
An achromatic extended depth-of-field (EDOF) system can obtain clear scene information that is crucial for target recognition, dynamic monitoring, and other applications. However, the imaging performance of most opticalsystems is depth-variant and wavelength- variant, which leads to the generation of chromatic aberrations. Traditional optical design and image post-processingalgorithms cannot effectively eliminate these chromatic aberrations. Here, we propose a deep configurable multiple virtual lenses optimization method that embeds four virtual lenses in parallel conjugated with a real lens. Combined with a lens fusion recovery network (LFRNet), it compensates for chromatic aberrations at different depths to achieve achromatic EDOF imaging. Trainable virtual optics can eliminate chromatic aberrations and overcome the limitations of traditional optics. The proposed framework reduces the optical design complexity and improves the imaging quality of a simple optical system. We validate our method using a singlet lens, and the experimental results show that the reconstructed images have an average peak signal-to-noise ratio (PSNR) improvement of 12.1447 dB and an average structural similarity index measure (SSIM) improvement of 0.2465. The proposed method opens a new avenue for ultra-compact, high-freedom, high-efficiency, and wholly configurable deep optics design, and empowers various advanced applications, such as portable photography and other complex vision tasks.
This paper aims to evaluate detection algorithms for perimeter security systems based on phase-sensitive optical time-domain reflectometry (Phi-OTDR). Our own designed and developed sensor system was used for the meas...
详细信息
This paper aims to evaluate detection algorithms for perimeter security systems based on phase-sensitive optical time-domain reflectometry (Phi-OTDR). Our own designed and developed sensor system was used for the measurement. The main application of the system is in the area the perimeter fencing intrusion detection. The system is unique thanks to the developed motherboard, which contains a field-programmable gate array (FPGA) that takes care of signal processing. This allows the entire system to be integrated into a 1U rack chassis. A polygon containing two different fence types and also cable laid underground in a plastic tube was used for testing. Edge detection algorithms using the Sobel and Prewitt operators are considered for post-processing. The comparison is made based on the signal-to-noise ratio (SNR) values calculated for each event. Results of algorithms based on edge detection methods are compared with the conventional differential method commonly used in Phi-OTDR systems.
In the realm of lithography misalignment sensing, achieving sub-0.2 nm precision is fraught with significant obstacles, largely due to the exacting demands placed on regression algorithms tasked with analyzing moir &a...
详细信息
In the realm of lithography misalignment sensing, achieving sub-0.2 nm precision is fraught with significant obstacles, largely due to the exacting demands placed on regression algorithms tasked with analyzing moir & eacute;fringes. These challenges stem from the inherent limitations of convolutional networks that process information from only one domain, often resulting in a deficit of critical feature data necessary for high-precision regression. To overcome these hurdles, we have engineered a groundbreaking convolutional regression network that synthesizes both spatial and frequency domain information from fringe patterns. This holistic approach has successfully recorded misalignment measurements with remarkable accuracy, achieving 0.12 nm at a 3 sigma confidence level. The method has shown considerable robustness against both system errors and environmental noise, bolstering its suitability for critical applications.
opticalMark Recognition(OMR)systems have been studied since *** is widely accepted as a data entry *** technology is used for surveys and multiple-choice *** to its ease of use,OMR technology has grown in popularity o...
详细信息
opticalMark Recognition(OMR)systems have been studied since *** is widely accepted as a data entry *** technology is used for surveys and multiple-choice *** to its ease of use,OMR technology has grown in popularity over the past two decades and is widely used in universities and colleges to automatically grade and grade student responses to *** accuracy of OMR systems is very important due to the environment inwhich they are *** relies on pixel projection or Hough transform to determine the exact answer in the *** techniques rely on majority voting to approximate a predetermined *** performance of these systems depends on precise input from dedicated *** and scanning OMR tables introduces artifacts that make table processing *** observation is a fundamental limitation of traditional pixel projection and Hough transform *** on the type of artifact introduced,accuracy is affected *** classified the types of errors and their frequency according to the artifacts in the OMR *** a major contribution,we propose an improved algorithm that fixes errors due to *** proposal is based on the Hough transform for improving the accuracy of bias correction mechanisms in OMR *** a minor contribution,our proposal also improves the accuracy of detecting markers in OMR *** results show an improvement in accuracy over existing algorithms in each of the identified *** improvement increases confidence in OMR document processing and increases efficiency when using automated OMR document processing.
The article discusses the main topics and results of the scientific conference "systems of signals generating and processing in the field of on board communications", in which leading industry experts annual...
详细信息
Existing CNN architectures have been developed to train digital image datasets obtained from hardware systems operating with classical bits, such as optical cameras. With the increase of quantum computing algorithms a...
详细信息
Existing CNN architectures have been developed to train digital image datasets obtained from hardware systems operating with classical bits, such as optical cameras. With the increase of quantum computing algorithms and quantum system providers, academic research is being conducted to combine the strengths of classical computing and quantum algorithms. This fusion allows for the development of hybrid quantum systems, with proposed methods specifically for the quantum representation of digital images. While methods for transforming digital images into quantum-compatible circuits have been proposed, no study has been found on the quantum transformation of entire datasets, especially for the use of fully classical CNN architectures. This article presents the quantum image dataset transform method, which utilizes quantum circuits to transform digital images and create a new dataset of the transformed images. Each of the 10,000 digital images of 28 x\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\times $$\end{document} 28 dimensions in the MNIST handwritten digits dataset is individually sub-parts, and the common weight values of each segment are determined as the phase value to be used in the quantum circuit. The quantum outputs of each sub-part are converted into classical equivalents by creating a quantum converter, and a new digital image is obtained by combining all the sub-parts. The newly generated digital images are labeled as MNISTQimage+\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\textbf {MNIST}} {\textbf {Q}}<^>{{\textbf {+}}}_{{{\textbf {image}}}}$$\end{document} and are publicly shared along wit
暂无评论