Simultaneous pulse compression and extinction ratio improvement of gain-switched lasers using comb-like dispersion profiled fiber for OTDM system application

Author(s):  
Fan Zhang ◽  
Peng Zuo ◽  
Jan Wu ◽  
Jintong Lin ◽  
Yizhi Gao ◽  
...  
2003 ◽  
Vol 39 (5) ◽  
pp. 401-404 ◽  
Author(s):  
Jianping Wang ◽  
Yue Wu ◽  
Caiyun Lou ◽  
Yizhi Gao

2007 ◽  
Vol 32 (18) ◽  
pp. 2695 ◽  
Author(s):  
Takashi Inoue ◽  
Yuki Taniguchi ◽  
Jiro Hiroishi ◽  
Takeshi Yagi ◽  
Yu Mimura

2001 ◽  
Vol 11 (PR2) ◽  
pp. Pr2-617-Pr2-620
Author(s):  
Z. Zeng ◽  
R. Li ◽  
Z. Z. Xu

2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document