565 research outputs found

    Symbol synchronization in convolutionally coded systems

    Get PDF
    Alternate symbol inversion is sometimes applied to the output of convolutional encoders to guarantee sufficient richness of symbol transition for the receiver symbol synchronizer. A bound is given for the length of the transition-free symbol stream in such systems, and those convolutional codes are characterized in which arbitrarily long transition free runs occur

    High-sensitivity plasma density retrieval in a common-path second-harmonic interferometer through simultaneous group and phase velocity measurement

    Get PDF
    Precise measurements of the plasma density in ionized gas cells and discharged capillaries are critical to the design and operation of plasma-based accelerators, active plasma lenses, and plasma-based radiation sources. In this manuscript, a spectral-domain common-path second-harmonic interferometer is upgraded with the simultaneous measurement of the group and phase velocity, allowing for high-sensitivity density characterization (from the phase velocity advance) without the need for phase tracking from zero-density (enabled by the group velocity delay). The technique is applied to 1.5-cm-long plasma structures, without density ambiguity in parameter scans with >2π phase jumps. The single-shot sensitivity in phase retrieval is demonstrated at 63 mrad, equivalent to a density-length product of 1.8·1015 cm -2 . This is an improvement of ×45 compared to group velocity analysis alone

    On the inherent intractability of certain coding problems

    Get PDF
    The fact that the general decoding problem for linear codes and the general problem of finding the weights of a linear code are both NP-complete is shown. This strongly suggests, but does not rigorously imply, that no algorithm for either of these problems which runs in polynomial time exists

    Two-dimensional burst identification codes and their use in burst correction

    Get PDF
    A new class of codes, called burst identification codes, is defined and studied. These codes can be used to determine the patterns of burst errors. Two-dimensional burst correcting codes can be easily constructed from burst identification codes. The resulting class of codes is simple to implement and has lower redundancy than other comparable codes. The results are pertinent to the study of radiation effects on VLSI RAM chips, which can cause two-dimensional bursts of errors

    On the existence of optimum cyclic burst-correcting codes

    Get PDF
    It is shown that for each integer b >= 1 infinitely many optimum cyclic b-burst-correcting codes exist, i.e., codes whose length n, redundancy r, and burst-correcting capability b, satisfy n = 2^{r-b+1} - 1. Some optimum codes for b = 3, 4, and 5 are also studied in detail

    Femtosecond Spectroscopy with Vacuum Ultraviolet Pulse Pairs

    Get PDF
    We combine different wavelengths from an intense high-order harmonics source with variable delay at the focus of a split-mirror interferometer to conduct pump-probe experiments on gas-phase molecules. We report measurements of the time resolution (<44 fs) and spatial profiles (4 {\mu}m x 12 {\mu}m) at the focus of the apparatus. We demonstrate the utility of this two-color, high-order-harmonic technique by time resolving molecular hydrogen elimination from C2H4 excited into its absorption band at 161 nm

    Authentication codes from ε-ASU hash functions with partially secret keys

    Get PDF
    An authentication code can be constructed with a family of e-Almost strong universal (e-ASU) hash functions, with the index of hash functions as the authentication key. This paper considers the performance of authentication codes from e-ASU, when the authentication key is only partially secret. We show how to apply the result to privacy amplification against active attacks in the scenario of two independent partially secret strings shared between a sender and a receiver. Keywords: Authentication code; Information theory; Privacy amplification; Unconditional securit
    corecore