We present an active optical clock scheme with a four-level quantum potassium *** calculate the population probabilities of each state using the density *** the steady state,ρ33 andρ55 are equal to 8.3%and 3.5%,resp...
详细信息
We present an active optical clock scheme with a four-level quantum potassium *** calculate the population probabilities of each state using the density *** the steady state,ρ33 andρ55 are equal to 8.3%and 3.5%,respectively,and the population inversion between the 5S1/2 and 4P3/2 states is built up in the thermal potassium cell with a 404.7 nm pumping *** to the mechanism of the active optical clock,under the action of the 404.7 nm pumping laser,the scheme can output a 1252.2 nm quantum-limited-linewidth laser,which can be directly used as an active optical frequency standard.
作者:
庄伟张同刚陈景标Institute of Quantum Electronics
and State Key Laboratory of Advanced Optical Communication System and Network School of Electronics Engineering and Computer Science Peking University Beijing 100871
We propose a scheme for an active ion optical clock with a detailed description of the pumping method, lasing states, output power, linewidth and light shift. Considering 171 yb+ ions in a Paul trap, we propose utili...
详细信息
We propose a scheme for an active ion optical clock with a detailed description of the pumping method, lasing states, output power, linewidth and light shift. Considering 171 yb+ ions in a Paul trap, we propose utilizing a Fabry-Perot resonator to realize the lasing of active optical frequency standards. The quantum-limited linewidth of an active 171 yb+ ion optical clock is narrower than I mHz. Based on the mechanism and the advantages of an active optical clock at the ion optical clock transition frequency, this new laser light source as a stable local oscillator will be beneficial to the single-ion optical clock, which currently is one of the most accurate clocks.
作者:
解晓鹏庄伟陈景标Institute of Quantum Electronics
and State Key Laboratory of Advanced Optical Communication System & Network School of Electronics Engineering & Computer Science Peking University Beijing 100871
We propose a new application of the optical adiabatic passage effect for the excitation of a thermal atomic beam, which will be used in the calcium active optical clock to produce population inversion. A comparison be...
详细信息
We propose a new application of the optical adiabatic passage effect for the excitation of a thermal atomic beam, which will be used in the calcium active optical clock to produce population inversion. A comparison between the optical adiabatic passage effect and the Rabi π pulse is investigated, 99% of the calcium atoms in the atomic beam that has a wide velocity distribution will be excited to the upper state for population inversion using the adiabatic passage, while 76% at most will be excited to the excited state using the π pulse with suitable parameters.
Accurate and affordable methods for predicting the underwater radiated noise of ships will facilitate the development of effective noise control techniques. The acoustic overlapping mesh (AOM) technique, which enables...
详细信息
—The independence of logic optimization and technology mapping poses a significant challenge in achieving high-quality synthesis results. Recent studies have improved optimization outcomes through collaborative optim...
详细信息
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ...
详细信息
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system based on Paillier encryption, which is claimed to protect both client C 's location privacy and service provider S's database privacy. However, Yang et al. presented a practical data privacy attack in INFOCOM'18, which allows a polynomial time attacker to obtain S's database. We propose a novel WiFi fingerprint localization system based on CastagnosLaguillaumie(CL) encryption, which has a trustless setup and is efficient due to the excellent properties of CL encryption. To prevent Yang et al.'s attack, the system requires that S selects only the locations from its database that can receive the nonzero signals from all the available access points in C 's nonzero fingerprint in order to determine C's location. Security analysis shows that our scheme is secure under Li et al.'s threat model. Furthermore, to enhance the security level of privacy-preserving WiFi fingerprint localization scheme based on CL encryption, we propose a secure and efficient zero-knowledge proof protocol for the discrete logarithm relations in C's encrypted localization queries.
Visual analytics has been widely studied in the past decade. One key to make visual analytics practical for both research and industrial applications is the appropriate definition and implementation of the visual anal...
详细信息
Visual analytics has been widely studied in the past decade. One key to make visual analytics practical for both research and industrial applications is the appropriate definition and implementation of the visual analytics pipeline which provides effective abstractions for designing and implementing visual analytics systems. In this paper we review the previous work on visual analytics pipelines and individual modules from multiple perspectives: data, visualization, model and knowledge. In each module we discuss various representations and descriptions of pipelines inside the module, and compare the commonalities and the differences among them.
In wireless cellular networks, the interference alignment (IA) is a promising technique for interference management. A new IA scheme for downlink cellular network with multi-cell and multi-user was proposed, in the ...
详细信息
In wireless cellular networks, the interference alignment (IA) is a promising technique for interference management. A new IA scheme for downlink cellular network with multi-cell and multi-user was proposed, in the proposed scheme, the interference in the networks is divided into inter-cell interference (ICI) among cells and inter-user interference (IUI) in each cell. The ICI is aligned onto a multi-dimensional subspace by multiplying the ICI alignment precoding matrix which is designed by the singular value decomposition (SVD) scheme at the base station (BS) side. The aligned ICI is eliminated by timing the interference suppression matrix which is designed by zero-forcing (ZF) scheme at the user equipment (UE) side. Meanwhile, the IUI is aligned by multiplying the IUI alignment precoding matrix which is designed based on Nash bargaining solution (NBS) in game theory. The NBS is solved by the particle swarm optimization (PSO) method. Simulations show that, compared with the traditional ZF IA scheme, the proposed scheme can obtain higher data rate and guarantee the data rate fairness of UEs with little additional complexity.
In order to realize laser frequency stabilization,the global evolution of an analyzer angle on the electrodeless-discharge-vaporlamp-based excited-state Faraday anomalous dispersion optical filter(LESFADOF)with a sing...
详细信息
In order to realize laser frequency stabilization,the global evolution of an analyzer angle on the electrodeless-discharge-vaporlamp-based excited-state Faraday anomalous dispersion optical filter(LESFADOF)with a single transmission peak operating on the Rb1529 nm(5P3/2-4D5/2)is *** find that the transmission of the line center peak at 80°arrives at 14%in a 3 cm length lamp contained natural Rb mixed with 2 torr Xe buffer gas operating at 250°C with 176 MHz radio *** it is used to realize laser frequency stabilization,the LESFADOF at near 80°is *** a single transmission peak or double transmission peaks depend on the rf voltage when two polarizers are crossed.
In the present paper, a general solution involv- ing three arbitrary functions for the generalized (2+1)- dimensional KdV-mKdV equation, which is derived from the generalized (1+1)-dimensional KdV-mKdV equa- tio...
详细信息
In the present paper, a general solution involv- ing three arbitrary functions for the generalized (2+1)- dimensional KdV-mKdV equation, which is derived from the generalized (1+1)-dimensional KdV-mKdV equa- tion, is first introduced by means of the Wiess, Tabor, Carnevale (WTC) truncation method. And then multi- symplectic formulations with several conservation laws taken into account are presented for the generalized (2+1)- dimensional KdV-mKdV equation based on the multi- symplectic theory of Bridges. Subsequently, in order to simulate the periodic wave solutions in terms of rational functions of the Jacobi elliptic functions derived from thegeneral solution, a semi-implicit multi-symplectic scheme is constructed that is equivalent 1:o the Preissmann scheme. From the results of the numerical experiments, we can con- clude that the multi-symplectic schemes can accurately sim- ulate the periodic wave solutions of the generalized (2+1)- dimensional KdV-mKdV equation while preserve approxi- mately the conservation laws.
暂无评论