-
Intelligent mode-locked NPR fiber laser based on laser speckle characteristics
Authors:
Yongjie Pu,
a Minyu Fan,
a Zhicheng Zhang,
a Jie Zhu,
a Huinan Li,
a Sha Wanga
Abstract:
Passively mode-locked fiber lasers based on nonlinear polarization rotation (NPR) have been widely used due to their ability to produce short pulses with high peak power and broad spectrum. Nevertheless, environmental disturbances can disrupt the mode-locked state, making it a challenge for practical implementation. Therefore, scientists have proposed mode-locked NPR lasers assisted with artificia…
▽ More
Passively mode-locked fiber lasers based on nonlinear polarization rotation (NPR) have been widely used due to their ability to produce short pulses with high peak power and broad spectrum. Nevertheless, environmental disturbances can disrupt the mode-locked state, making it a challenge for practical implementation. Therefore, scientists have proposed mode-locked NPR lasers assisted with artificial intelligence, which can effectively address the issues related to mode-locking stability. Speckle patterns containing spectral information can be generated when the laser transmitting through a scattering medium, which can be served as indicators of the mode-locked state. The contrast of the Tamura texture feature of the speckle patterns exhibits periodic "V" shaped variations with respect to the rotation angles of the waveplates, according to experimental results. The stable mode-locking region is confined to the area close to the minimum contrast. Based on these characteristics, an intelligent approach employing a modified gradient algorithm to identify the region of minimum speckle contrast for achieving mode-locked state. The average number of iterations needed to achieve initial mode-locking and recover mode-locking are about 20 and 10, respectively. Once the mode-locking is achieved, the neural network can be employed to distinguish single-pulse or multi-pulses outputs based on the speckle pattern, thereby enabling intelligent stable mode-locked single-pulse genration from the NPR fiber laser.
△ Less
Submitted 10 June, 2023;
originally announced June 2023.
-
The High Energy X-ray telescope (HE) onboard the Insight-HXMT astronomy satellite
Authors:
C. Z. Liu,
Y. F. Zhang,
X. F. Li,
X. F. Lu,
Z. Chang,
Z. W. Li,
A. Z. Zhang,
Y. J. **,
H. M. Yu,
Z. Zhang,
M. X. Fu,
Y. B. Chen,
J. F. Ji,
Y. P. Xu,
J. K. Deng,
R. C. Shang,
G. Q. Liu,
F. J. Lu,
S. N. Zhang,
Y. W. Dong,
T. P. Li,
M. Wu,
Y. G. Li,
H. Y. Wang,
B. B. Wu
, et al. (8 additional authors not shown)
Abstract:
The Insight-Hard X-ray Modulation Telescope (Insight-HXMT) is a broad band X-ray and gamma-ray (1-3000 keV) astronomy satellite. The High Energy X-ray telescope (HE) is one of its three main telescopes. The main detector plane of HE is composed of 18 NaI(Tl)/CsI(Na) phoswich detectors, where NaI(Tl) serves as primary detector to measure ~ 20-250 keV photons incident from the field of view (FOV) de…
▽ More
The Insight-Hard X-ray Modulation Telescope (Insight-HXMT) is a broad band X-ray and gamma-ray (1-3000 keV) astronomy satellite. The High Energy X-ray telescope (HE) is one of its three main telescopes. The main detector plane of HE is composed of 18 NaI(Tl)/CsI(Na) phoswich detectors, where NaI(Tl) serves as primary detector to measure ~ 20-250 keV photons incident from the field of view (FOV) defined by the collimators, and CsI(Na) is used as an active shield detector to NaI(Tl) by pulse shape discrimination. CsI(Na) is also used as an omnidirectional gamma-ray monitor. The HE collimators have a diverse FOV: 1.1°x 5.7° (15 units), 5.7°x 5.7° (2 units) and blocked (1 unit), thus the combined FOV of HE is about 5.7°x 5.7°. Each HE detector has a diameter of 190 mm, resulting in the total geometrical area of about 5100 cm_2. The energy resolution is ~15% at 60 keV. The timing accuracy is better than 10 μs and dead-time for each detector is less than 10 μs. HE is devoted to observe the spectra and temporal variability of X-ray sources in the 20-250 keV band either by pointing observations for known sources or scanning observations to unveil new sources, and to monitor the gamma-ray sky in 0.2-3 MeV. This paper presents the design and performance of the HE instruments. Results of the on-ground calibration experiments are also reported.
△ Less
Submitted 10 October, 2019;
originally announced October 2019.
-
The number of generators of the first Koszul homology of an Artinian ring
Authors:
Alex Zhongyi Zhang
Abstract:
We study the conjecture that if $I,J$ are $μ-$primary in a regular local ring $(R,μ)$ with dim$(R)=n$, then $\frac{I \cap J}{IJ} \cong \Tor_1(R/I, R/J)$ needs at least $n$ generators, and a related conjecture about the number of generators of the first Koszul homology module of an Artinian local ring $(A,m)$. In this manuscript, we focus our attention on the complete intersection defect of the Art…
▽ More
We study the conjecture that if $I,J$ are $μ-$primary in a regular local ring $(R,μ)$ with dim$(R)=n$, then $\frac{I \cap J}{IJ} \cong \Tor_1(R/I, R/J)$ needs at least $n$ generators, and a related conjecture about the number of generators of the first Koszul homology module of an Artinian local ring $(A,m)$. In this manuscript, we focus our attention on the complete intersection defect of the Artinian ring and its quotient by the Koszul elements. We prove that the number of generators of the first Koszul homology module of $x_1,...,x_n \in m$ on an Artinian local ring $(A,m)$ is at least $n+ \cid(A)- \cid(\frac{A}{(x_1,...,x_n)A})$, where $\cid A$ denotes the complete intersection defect of the Artinian local ring $A$.
△ Less
Submitted 25 November, 2014;
originally announced November 2014.
-
Bayesian Differential Privacy through Posterior Sampling
Authors:
Christos Dimitrakakis,
Blaine Nelson,
and Zuhe Zhang,
Aikaterini Mitrokotsa,
Benjamin Rubinstein
Abstract:
Differential privacy formalises privacy-preserving mechanisms that provide access to a database. We pose the question of whether Bayesian inference itself can be used directly to provide private access to data, with no modification. The answer is affirmative: under certain conditions on the prior, sampling from the posterior distribution can be used to achieve a desired level of privacy and utilit…
▽ More
Differential privacy formalises privacy-preserving mechanisms that provide access to a database. We pose the question of whether Bayesian inference itself can be used directly to provide private access to data, with no modification. The answer is affirmative: under certain conditions on the prior, sampling from the posterior distribution can be used to achieve a desired level of privacy and utility. To do so, we generalise differential privacy to arbitrary dataset metrics, outcome spaces and distribution families. This allows us to also deal with non-i.i.d or non-tabular datasets. We prove bounds on the sensitivity of the posterior to the data, which gives a measure of robustness. We also show how to use posterior sampling to provide differentially private responses to queries, within a decision-theoretic framework. Finally, we provide bounds on the utility and on the distinguishability of datasets. The latter are complemented by a novel use of Le Cam's method to obtain lower bounds. All our general results hold for arbitrary database metrics, including those for the common definition of differential privacy. For specific choices of the metric, we give a number of examples satisfying our assumptions.
△ Less
Submitted 23 December, 2016; v1 submitted 5 June, 2013;
originally announced June 2013.