Results 11 to 20 of about 2,385,918 (340)
In this paper, we use two methods to research the propagation characteristics of a Hypergeometric-Gaussian (HyGG) vortex beam under oceanic turbulence. One is numerical calculation based on the Rytov approximation theory, where the theoretical detection ...
Xinguang Wang, Le Wang, Shengmei Zhao
doaj +1 more source
Based on the extended Huygens–Fresnel principle and the power spectrum of anisotropic oceanic turbulence, the analytical expressions of the average intensity and coherence properties of an off-axis hollow Gaussian-Schell model (OAHGSM) vortex beam ...
Xinguang Wang, Le Wang, Shengmei Zhao
doaj +1 more source
As a variant of the twin-field quantum key distribution (TF-QKD), the sending-or-not twin-field quantum key distribution (SNS TF-QKD) is famous for its higher tolerance of misalignment error, in addition to the capacity of surpassing the rate–distance ...
Yang Yu+4 more
doaj +1 more source
Ghost edge detection based on HED network
In this paper, we present an edge detection scheme based on ghost imaging (GI) with a holistically-nested neural network. The so-called holistically-nested edge detection (HED) network is adopted to combine the fully convolutional neural network (CNN ...
Shengmei Zhao+3 more
doaj +1 more source
Capturing the amplitude and phase profile of the vortex beam based on coherent detection
In this study, we propose a scheme to capture the amplitude and phase profile of the orbital angular momentum (OAM) beam based on coherent detection. In the scheme, the OAM beam to be measured is interfered with a local plain wave which is prepared at ...
Shengmei Zhao+3 more
doaj +1 more source
Performance Comparison of Impedance-Based Fault Location Methods for Transmission Line
Electric transmission lines play a very essential role in transmitting power energy from generation centers to consumption regions. They can be exposed to fault occurrences due to various reasons, such as lightning strikes, malfunction of components, and
N. Khoa+3 more
semanticscholar +1 more source
Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because it can exceed the basic rate-distance limit without quantum repeaters.
Ke Xue+3 more
doaj +1 more source
The world of telecommunications, from some years, is revitalizing an high interest to Deep Space Communication (DSC) and Delay Tolerant Network (DTN) architecture as enabling technologies to offer internet services for aerospace vehicles or orbital ...
F. De Rango, M. Tropea
semanticscholar +1 more source
Error correction in data storage systems using polar codes
This paper investigates error correction in two‐dimensional (2‐D) intersymbol interference (ISI) channels using polar codes. 2‐D channels offer high data storage capacity compared to traditional one‐dimensional (1‐D) channels but suffer from greater ISI ...
Nana Kobina Gerrar+2 more
doaj +1 more source
Network Coding Datagram Protocol for TCP/IP Networks
In this article, a new multicast protocol is introduced at the session layer, which is based on network coding and is called the Network Coding Datagram Protocol (NCDP). The NCDP protocol is specifically designed for content delivery systems that utilize
Sergey S. Vladimirov+4 more
doaj +1 more source