We numerically investigate the formation and interaction of a parabolic-shaped pulse pair in a passively mode-locked Yb-doped fiber laser. Based on a lumped model, the parabolic-shaped pulse pair is obtained by controlling the intercavity average dispersion and gain saturation energy, Moreover, pulse repulsive and attractive motion are also achieved with different pulse separations. Simulation results show that the phase shift plays an important role in pulse interaction, and the interaction is determined by the inter-cavity average dispersion and gain saturation energy, i.e., the strength of the interaction is proportional to the gain saturation energy, a stronger gain saturation energy will result in a higher interaction intensity. On the contrary, the increase of the inter-cavity dispersion will counterbalance some interaction force. The results also show that the interaction of a parabolic-shaped pulse pair has a larger interaction distance compared to conventional solitons.
The influence of actively mode-locked Erbium-Doped Fiber Laser (EDFL) cavity length variation on the noises of an optical pulse train is investigated, in theory and in MATLAB simulation. Using a simple model, the noise characre, tics of the output pulse train are studied. The results show that the noises of the output pulse train increase with the increasing of the variation of the cavity length. The theory analysis and the simulation results agree well. This result is very significant for us to improve the reliability and the stability of the actively mode-locked fiber laser.
A new Hash function based on the generalized Henon map is proposed. We have obtained a binary sequence with excellent pseudo-random characteristics through improving the sequence generated by the generalized Henon map, and use it to construct Hash function. First we divide the message into groups, and then carry out the Xor operation between the ASCII value of each group and the binary sequence, the result can be used as the initial values of the next loop. Repeat the procedure until all the groups have been processed, and the final binary sequence is the Hash value. In the scheme, the initial values of the generalized Henon map are used as the secret key and the messages are mapped to Hash values with a designated length. Simulation results show that the proposed scheme has strong diffusion and confusion capability, good collision resistance, large key space, extreme sensitivity to message and secret key, and it is easy to be realized and extended.