期刊文献+

基于波分复用思想的啁啾脉冲堆积方法 被引量:6

Pulse Stacking Scheme Based on Wavelength Division Multiplexing
原文传递
导出
摘要 利用传统的脉冲堆积方法进行脉冲整形时,由于拍频效应会使得堆积出来的整形脉冲出现强度起伏,由于光谱干涉效应会使得堆积出来的脉冲光谱出现强度起伏。针对上述问题,提出了一种基于波分复用思想的啁啾脉冲堆积脉冲整形方法。利用该方法对啁啾脉冲堆积脉冲整形问题展开了理论分析与数值模拟,并将结果与传统的啁啾脉冲堆积脉冲整形技术进行了对比。结果表明,基于波分复用思想的啁啾脉冲堆积脉冲整形方法可以有效地降低拍频效应,得到更为平滑的整形脉冲;且波长间隔越大,脉冲平滑效果就越好。另外,基于波分复用思想的啁啾脉冲堆积脉冲整形方法还可以有效地降低或消除频谱干涉效应。 For the case of pulse shaping by the usual pulse stacking scheme, the beat effect brings intensity fluctuation to the shaped pulse, and the spectrum interference effect will cause intensity fluctuation of the spectrum of the shaped pulse. To solve these problems, a pulse stacking scheme based on the wavelength division multiplexing (WDM) is proposed. Theoretical analysis and numerical simulation are developed on this scheme and this scheme is compared with the usual pulse stacking scheme. The results show that the pulse stacking scheme based on WDM can reduce the beat effect effectively, and smoother shaped pulse can be obtained. The larger the wavelength spacings are, the smoother shaped pulse we can get. Otherwise, this scheme can also reduce or eliminate the spectrum interference effect.
出处 《光学学报》 EI CAS CSCD 北大核心 2013年第5期148-153,共6页 Acta Optica Sinica
基金 宜昌市科学技术研究与开发项目(A2012-302-28) 三峡大学优秀人才科研启动基金(KJ2011B066)资助课题
关键词 光纤光学 脉冲堆积 脉冲整形 波分复用 拍频效应 频谱干涉效应 fiber optics pulse stacking pulse shaping wavelength division multiplexing (WDM) beat effect spectrum interference effect
  • 相关文献

参考文献13

二级参考文献84

共引文献52

同被引文献67

  • 1王琛,刘百玉,欧阳娴,白永林,李东,白晓红,杨文正,田进寿,黄蕾,侯洵.用于高功率激光脉冲整形的可编程任意波形电脉冲发生器[J].光子学报,2007,36(7):1181-1186. 被引量:4
  • 2江秀娟,周申蕾,林尊琪.利用二维光谱色散和透镜列阵改善靶面辐照均匀性[J].中国激光,2007,34(11):1533-1537. 被引量:5
  • 3Amornrat Jirattigalachote, NinaSkorin-Kapov, Marija Furdek, et al: Sparse power equalization placement for limiting jamming attack propagation in transparent optical networks[J]. Optical Switching and Networking, 2011, 8(4): 249-258.
  • 4Marija Furdek. Physical-layer attacks in optical WDM networks and attack-aware network planning[J]. European Journal of Operational Research, 2011, 178(2): 1160-1167.
  • 5Gerardo Castanon, Ivan Razo-Zapata, Carlos Mex, et al: Security in all-optical networks: Failure and attack avoidance using self-organization[C]. IEEE 2nd ICTON, 2008. 1-5.
  • 6M Medard, D Marquis, R A Barry, et al: Security issues in all-optical networks[J]. IEEE Network, 1997, 11(3): 42-48.
  • 7Neeraj Sharma. Effects of crosstalk propagation on the performance of all-optical networks[C]. IEEE International Conference on Recent Advances in Information Technology, 2012. 240-245.
  • 8Yunfeng Peng, Zeyu Sun, Shu Du, et al: Propagation of all-optical crosstalk attack in transparent optical networks[J]. Optical Engineering, 2011, 50(8): 085002.
  • 9Nina Skorin-Kapov, Jiajia Chen, Lena Wosinska. A new approach to optical networks security: attack-aware routing and wavelength assignment[J]. IEEE/ACM Transaction on Networking, 2010, 18(3): 750-760.
  • 10Marija Furdek, Nina Skorin-Kapov, Anna Tzanakaki. Survivable routing and wavelength assignment considering high- powered jamming attacks[C]. SPIE, 2011, 8310: 83101H.

引证文献6

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部