首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   6篇
物理学   8篇
  2018年   1篇
  2015年   1篇
  2014年   1篇
  2012年   1篇
  2008年   1篇
  2007年   1篇
  2003年   1篇
  2002年   1篇
排序方式: 共有8条查询结果,搜索用时 31 毫秒
1
1.
采用Authorware 5制作现代光学实验多媒体课件   总被引:3,自引:0,他引:3  
我们采用目前最流行的多媒体制作软件Authorware 5开发工具,把现代光学实验原理,公式推导,实验内容,步骤等字材料,以及用CCD采集的干涉图像,优美的背景音乐及解说词等多种数学信息,制作成多媒体课件,可直接用于远程教育,有较大的实用价值。  相似文献   
2.
We give an analysis of the frequency distribution trends in the four lowest bands of two-dimensional square lattices formed by holographic lithography (HL) and in the lattices of the same kind but with regular dielectric columns with increasing filling ratios, and then present a comparative study on the left-handed properties in these two kinds of structures using plane wave expansion method and finite-difference time-domain (FDTD) simulations. The results show that the left-handed properties are more likely to exist in structures with large high-epsilon filling ratios or in a connected lattice.  相似文献   
3.
结合双随机相位编码技术与相移干涉术,提出了一种信息隐藏系统,待隐藏信息被加密到多幅干涉图数据中后。通过选取合适的权重因子,它们可以被嵌入到宿主图像中;利用特定的相移再现公式和逆菲涅耳衍射变换,可以实现隐藏信息的提取及解密.通过基于Matcom的VisualC++与Matlab混合编程,设计和开发了一款信息隐藏系统软件,经过界面测试,该软件可以实现图像读取及显示、基本几何参数输入、信息加密及嵌入、信息提取及解密、鲁棒性测试等主要功能.  相似文献   
4.
结合相位恢复和像素行、列循环移动置乱技术, 本文提出了一种基于复振幅场信息复用和RSA算法的非对称多幅图像认证方法, 通过菲涅耳域的相位恢复算法, 依次恢复并生成多幅图像各自所对应的输入平面的复振幅信息, 通过各自的行、列向量随机数对原始二值振幅模板进行行、列循环移动置乱操作来获得每幅图像的采样模板, 认证系统将多个复振幅场信息采样、叠加并空间复用, 同时, 行向量随机数和列向量随机数被RSA算法公钥编码成密文. 系统认证时, 认证方利用自己持有的私钥将密文解码成行向量随机数和列向量随机数, 通过行、列循环移动置乱变换后获得各自的采样模板, 合成的复振幅信息和采样模板等认证信息均放置在各自正确位置, 当认证系统被正确波长的平面波照射时, 在输出平面能获得输出图像, 通过计算、显示输出图像和对应认证图像的非线性相关系数峰值来判断认证是否成功.  相似文献   
5.
A new ternary photopolymer system is used in fabricating photonic crystals (PhCs) with controlled defects by combination of single-photon and two-photon photopolymerization. The former process can produce PhCs in one-step recording with a low-power (tens mW) continuous-wave laser at 532nm, while the latter can create desired defects. The preparation of the material, the optical setup and the preliminary experimental results are given. Compared with other methods, this approach is much more accessible and convenient for use of visible light and has advantages of making PhCs in a large scale quickly and economicaJly and introducing any defects exactly, especially for three-dimensional structures.  相似文献   
6.
A new structure based on a semi-circular photonic crystal is proposed to achieve asymmetric light propagation. The semi-circular photonic crystal structure proposed in this paper is a deformation of a two-dimensional conventional square photonic crystal. Through the directional bandgap of the semi-circular photonic crystal, the light from one direction can transfer to the other side, but the light from the opposite direction cannot. A high contrast ratio is obtained by designing the constitutive parameters of the photonic crystal and choosing the suitable light frequency. This structure promises a significant potential in optical integration and other areas.  相似文献   
7.
根据多年教学经验,把传统光栅光谱仪用现代技术进行改造,自制了一套CCD光谱仪.此仪器克服了传统光谱研究的方法——照相法、光电法的缺点,并能同时采集各个波长点的数据,串行地传输给计算机.由计算机对这些数据进行图像处理,实现了光谱的快速分析.实践证明:该仪器比购买的多功能光栅光谱仪在教学中有更多的独特优点。  相似文献   
8.
A multiple-image encryption method based on two-step phase-shifting interferometry(PSI) and spatial multiplexing of a smooth compressed signal is proposed. In the encoding and encryption process, with the help of four index matrices to store original pixel positions, all the pixels of four secret images are firstly reordered in an ascending order; then, the four reordered images are transformed by five-order Haar wavelet transform and performed sparseness operation. After Arnold transform and pixels sampling operation, one combined image can be grouped with the aid of compressive sensing(CS)and spatial multiplexing techniques. Finally, putting the combined image at the input plane of the PSI encryption scheme,only two interferograms ciphertexts can be obtained. During the decoding and decryption, utilizing all the secret key groups and index matrices keys, all the original secret images can be successfully decrypted by a wave-front retrieval algorithm of two-step PSI, spatial de-multiplexing, inverse Arnold transform, inverse discrete wavelet transform, and pixels reordering operation.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号