首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   34篇
  免费   0篇
化学   6篇
力学   1篇
数学   1篇
物理学   26篇
  2014年   1篇
  2013年   1篇
  2012年   2篇
  2011年   2篇
  2010年   1篇
  2009年   1篇
  2008年   1篇
  2007年   5篇
  2006年   4篇
  2003年   1篇
  2002年   4篇
  2001年   1篇
  2000年   2篇
  1999年   1篇
  1996年   2篇
  1985年   1篇
  1984年   2篇
  1981年   1篇
  1979年   1篇
排序方式: 共有34条查询结果,搜索用时 46 毫秒
1.
Multiple image encryption using an aperture-modulated optical system   总被引:2,自引:0,他引:2  
A multiple image cryptosystem based on different apertures in an optical set-up under a holographic arrangement is proposed. The system is a security architecture that uses different pupil aperture mask in the encoding lens to encrypt different images. Based on this approach multiple encryption is achieved by changing the pupil aperture arrangement of the optical system among exposures. In addition to the classical speckle phase mask, the geometrical parameters characterizing the apertures are introduced to increase the system security. Even when an illegal user steals the speckle phase mask, the system cannot be broken into without the correct pupil geometrical parameters. The experimental set-up is based on a volume photorefractive BSO crystal as storing device. Information retrieval is done via a phase conjugation operation. We also have to stress that the multiple storage under this scheme, is only possible with the help of the aperture mask. Simulation and experimental results are further introduced to verify the proposed method.  相似文献   
2.
We describe the characteristics of a double-exposure specklegram obtained through a double-aperture system, by introduction of a wedge in front of one aperture in one exposure. It is assumed that a uniform displacement of the diffuser is produced between exposures. The average intensity distribution and visibility of the interferometric fringes in the Fourier plane are analyzed. An alternative interferometric technique for phase-object detection is proposed.  相似文献   
3.
The use of a grating in the form of modulation of birefringence in a BSO crystal in a novel Lau interferometer set-up is proposed. The system behaves as a conventional Lau interferometer implemented by using two amplitude gratings. Moreover, it permits control of the visibility and provides a contrast inversion of the interferometric fringes by rotating a polarizer. Two alternative experimental arrangements with similar performance are presented. A theoretical approach is outlined and the predicted behavior is confirmed by results obtained under different experimental conditions.  相似文献   
4.
The self-image phenomenon by a volume grating is proposed and theoretically analyzed. A theoretical model based on a path integral formulation to describe wave propagation through the grating inhomogeneous medium is applied. A modified version of the scalar diffraction theory Fresnel propagator is obtained which allows calculating the diffracted field amplitude by the grating. The proposed model is applied to amplitude and/or phase volume gratings. Remarkable features appear, in particular at the fractional Talbot distance 0.125zT. In this case, if an in-phase real and imaginary grating modulation is considered a self-image intensity profile is observed for determined values of the absorptive and refractive parameters. On the other hand, a spatial comb intensity profile for a near half period shift between the real and imaginary grating modulations is found.  相似文献   
5.
We develop an experimental protocol to visualize decrypted images that otherwise would have been barely recognizable, while keeping the standard security levels. This image deterioration is partly due to the natural speckle noise as well as the practical limitations arising from the optical elements composing the setup. This protocol is based on an optical image synthesis with digital holography using enlarged sub-samples of an entire image together with a multiplexing technique. We implement the process using a Mach-Zehnder interferometer with a joint transform correlator encrypting architecture. As a result, we get smaller speckle patterns on the final assembled image and a spatial frequency enhancement with respect to the decoded image obtained with the conventional procedures.  相似文献   
6.
The fixed point behavior ofN-mode truncations of the Navier-Stokes equations on a two-dimensional torus is investigated asN increases. FromN=44 on the behavior does not undergo any qualitative change. Furthermore, the bifurcations occur at critical parameter values which clearly tend to stabilize asN approaches 100.  相似文献   
7.
We report first results on the controlled radical polymerization of 2,3‐epithiopropyl methacrylate (ETMA) also known as thiiran‐2‐ylmethyl methacrylate. Reversible addition‐fragmentation chain transfer (RAFT) of ETMA was carried out in bulk and in solution, using AIBN as initiator and the chain transfer agents: cyanopropyl dithiobenzoate (CPDB) and cumyl dithiobenzoate (CDB). A linear increase of the number‐average molecular weight and decrease of the polydispersity with monomer conversion were observed using CPDB as transfer agent, indicating a controlled process. Atom transfer radical polymerization (ATRP) of ETMA was performed under different reaction conditions using copper bromide complexed by tertiary amine ligands and ethyl 2‐bromoisobutyrate (EBiB) or 2‐bromopropionitrile (BPN) as initiator. All experiments lead to a crosslinked polymer. Preliminary studies in the absence of initiator showed that the CuBr/ligand complex alone initiates the ring‐opening polymerization of thiirane leading to a poly(propylene sulfide) with pendant methacrylate groups.

  相似文献   

8.
A photorefractive optical correlator stored and fixed in lithium niobate is presented. The device shows good correlation characteristics together with very high output efficiency and insensitivity to optical erasure during read-out. Received: 10 May 1999 / Revised version: 21 June 1999 / Published online: 16 September 1999  相似文献   
9.
We analyse the stability of an adaptive cellular network model, similar to a Lotka–Volterra model for population growth. Copyright © 2000 John Wiley & Sons, Ltd.  相似文献   
10.
Breaking and disappearance of tori   总被引:3,自引:0,他引:3  
A mechanism is illustrated which can cause a torus to disappear in dissipative differential equations. Three different examples give evidence that a collision with a neighbouring unstable periodic orbit, possibly preceded by a transition into a weakly chaotic attractor, causes the sudden destruction of a torus.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号