首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 453 毫秒
1.
基于联合变换相关和相移干涉的图像加密   总被引:1,自引:1,他引:0  
沈丽娜  李军  常鸿森 《光子学报》2008,37(10):2114-2117
提出了一种在联合变换相关器结构中引入三步相移干涉和二元置乱技术的图像加密方法.用纯相位空间光调制器同时调制原始图像和两个随机相位掩模,利用三步相移技术分别将图像信息和主密钥加密为全息图,并用CCD在输出面上接收,再利用二元置乱技术置乱图像信息的全息图.在获得置乱密钥和附加密钥的情况下,可以通过一定的算法快速、清晰的重建原始图像.用计算机仿真验证了它的可行性和有效性.  相似文献   

2.
Collection mode near-field microscopy is demonstrated using a 10.56 GHz (X-band) frequency illumination. Imaging of a standing evanescent microwave was experimentally used to evaluate the capabilities of the microscope. The microscope functionality was validated by imaging near field interactions of different systems of dipole-like resonances. We prove that those microscope images contain near-field information by presenting numerical modeling of dipole-like resonant interactions. The model makes use of an analytic Dyadic Green's which is based in the near-field electrostatic approximation. We propose that this microscopy technique can be used, with certain limitations, as a check for 2D mapping of designed (spoof) surface plasmon at microwave frequencies.  相似文献   

3.
A dyadic shell model for the Navier-Stokes equations is studied in the context of turbulence. The model is an infinite nonlinearly coupled system of ODEs. It is proved that the unique fixed point is a global attractor, which converges to the global attractor of the inviscid system as viscosity goes to zero. This implies that the average dissipation rate for the viscous system converges to the anomalous dissipation rate for the inviscid system (which is positive) as viscosity goes to zero. This phenomenon is called the dissipation anomaly predicted by Kolmogorov’s theory for the actual Navier-Stokes equations.  相似文献   

4.
Metrics calculated from images acquired using the diffusion tensor imaging (DTI) technique possess a systematic bias that depends on signal-to-noise ratio (SNR). Dyadic sorting provides a simple method for remediating some of this bias within a region(s) of interest (ROI). Although this bias and its removal using dyadic sorting have been studied previously within a theoretical framework, one can employ precise geometric knowledge of microstructures to perform an empirical comparison between expected DTI results and those measured with a scanner. In this project, the biasing effect of low SNR (approximately 1-10) on DTI eigenvalues was measured directly using water-filled capillary structures of two different sizes, and the magnitude of the corrective effect of dyadically sorting eigenvector-eigenvalue pairs was characterized. Multiple DTI series were acquired for determining DTI metrics at eight unique SNR values, using T(R) to vary signal intensity via T(1) contrast. Differences between the second and third eigenvalues, which should be equal for prolate geometry, ranged from approximately 23% to 45% and from 19% to 41% for large and small inner diameter capillaries after sorting eigenvalues by magnitude, and ranged from approximately 1% to 18% and from 1% to 4% after dyadic sorting. A high-resolution DTI series was used to observe the effect of ROI size on dyadic sorting. For restriction of diffusion on the scale of the small capillary at SNR approximately 18, an ROI with > or =50 pixels is adequate to determine fractional anisotropy to 99% accuracy, while larger ROI are required to resolve the two smaller eigenvalues to the same accuracy ( approximately 330-390 pixels). At low values of SNR, the iteration of dyadic sorting is suggested to achieve good accuracy. A method for the incorporation of empirical measurements into a bias-correction map, which would be useful for characterizing uncertainty and for reducing systematic bias in DTI data, is introduced.  相似文献   

5.
图象的多尺度边缘相位水印算法   总被引:1,自引:1,他引:0  
王卫卫  刘波  徐国华 《光子学报》2001,30(11):1348-1352
提出一种基于图象多尺度边缘的新相位水印算法.利用常用于边缘检测的二进小波刻画图象的多尺度边缘,在多尺度边缘的相位成分中嵌入数字水印,利用相关检测器进行水印检测.实验证明算法具有不可见性,较好的安全性,对通常的图象处理有很强的鲁棒性.  相似文献   

6.
提出了一个谐振腔内微波与等离子体相互作用的简化模型。通过对格林函数并矢的渐进展开,用Fredholm矢量积分方程计算了等离子体散射区的电场分布和等离子体的吸收效率。对非均匀性,等离子体密度等素对吸收效率的影响进行了分析。  相似文献   

7.
 利用球矢量波函数的线性组合导出了球壳并矢格林函数;使用并矢格林函数方法,取5阶、球面波半张角8°、口面半径0.2 m、频率为10 GHz的高斯场,分析了半球壳型输出窗在束腰分别取0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8情况下对高斯口面场远场辐射图的影响。分析表明:当束腰较小时(取0.3,0.2),半球壳型输出窗对高斯口面场的辐射图影响较小;当束腰较大时(取0.8,0.7,0.6),辐射图的旁瓣升高,主瓣变窄,反射场对口面场的影响较大。半球壳型输出窗适用于束腰较小的高斯馈源,对于束腰较大的高斯馈源则不适用。  相似文献   

8.
The multistability of a time-delayed feedback system can be used as an alternative for storing information. In this case the information is stored in various temporal patterns by controlling a chaotic system. The capability of storing information can be enhanced since more complex wave forms can be stored, each of which can be used as a memory unit. We showed numerically and experimentally this possibility in a hybrid diode laser system. We also showed that this method is robust to possible errors in the process of coding information.  相似文献   

9.
傅里叶变换近红外光谱信息资源共享的基础研究   总被引:1,自引:0,他引:1  
为了实现农产品傅里叶变换近红外光谱库信息资源的共享 ,使光谱库的信息资源达到充分利用 ,首先研究了仪器间光谱信息的准确表达 ,即仪器到仪器光谱信息间的映射 ;并以映射光谱研究了用于不同仪器上进行定量分析的无标样建模方法。对于 2 2个小麦样品蛋白质含量 ,无标样建模模型预测值与凯氏定氮结果的相关系数r =0 94 1,平均相对误差为 3 2 8% ;为了考察无标样建模模型定量分析的使用性 ,同时亦对 2 2个小麦样品的蛋白质含量采用有标样建模定量分析 ,模型预测值与凯氏定氮结果的相关系数r =0 96 3,平均相对误差为 2 4 %。有标样建模与无标样建模的模型分析结果的比较 ,为不同仪器间光谱信息的可共享性提供了依据。由此根据不同仪器建立的光谱信息库的库信息即可转化为另一仪器的映射光谱信息 ,保证了光谱库信息资源在不同仪器上的共享利用  相似文献   

10.
11.
Supply and demand law under limited information   总被引:1,自引:0,他引:1  
Yi-Cheng Zhang   《Physica A》2005,350(2-4):500-532
We present a model for the supply-demand law with quality and limited information capability. We postulate that imperfect information permeates in almost all economic transactions to varying degrees. Through a simple model we outline a research agenda that re-examines many standard issues in economics. Our analysis shows that whereas imperfect information can be improved, it leads to new uncertainties so that the perfect information limit can never be reached. As a corollary neoclassical perfect equilibrium can never be attained.  相似文献   

12.
Bell inequality is an important resource in the quantum information theory, which can be applied to guarantee security of the device independent quantum information protocols. By utilizing the quantum weak measurement technology, we propose the Chain inequality violation with three parties, and the analysis result demonstrates that double Chain inequality violation can be observed in the case of Alice and Bob have two different measurement bases.Since the weak measurement model can be assumed to be an eavesdropping model, our analysis model may be applied to analyze security of the device independent quantum information protocols.  相似文献   

13.
利用多光子相互作用实现量子信息传递   总被引:2,自引:1,他引:2  
王菊霞  杨志勇  安毓英 《光学学报》2007,27(8):1508-1512
利用全量子理论,研究了多原子-腔场系统中多光子相互作用的过程,给出了不同情况下系统的一般演化式,发现利用此过程可实现量子纠缠信息的传递:只要控制腔场与原子相互作用的时间即原子以特定速度通过腔场时,处于基态的原子与存储纠缠信息的腔场相互作用的结果使原子获得量子纠缠信息;相反,纠缠原子中的量子纠缠信息也可传递给处于真空态的腔场;基态原子作为"飞行的量子比特"还可将量子纠缠信息从一个腔场传递到另一个腔场。该结论适应于讨论任意多个原子-腔场系统中任意多个光子相互作用的普遍情形。  相似文献   

14.
利用相位模板实现数字全息超分辨成像   总被引:2,自引:2,他引:0  
袁操今  翟宏琛 《光子学报》2014,39(5):893-896
为了简化数字全息超分辨记录系统,分别在其物光和参考光部分引入一块相位模板,以获得垂直和倾斜方向照明物体的光束和具有不同载波频率的参考光束.当这些具有不同照射方向的光透过物体后,可以使CCD在位置固定的情况下记录到携带低频和高频信息的物体衍射场,不同载波频率的参考光则保证了高频和低频信息在复合全息图的频谱面上能够相互分离.实验结果证明,通过将记录到的物体高频和低频信息合成,可以获得超出系统衍射极限分辨率的再现像.  相似文献   

15.
We propose schemes for the efficient information transfer between a propagating photon and a quantum-dot(QD) spin qubit in an optical microcavity that have no auxiliary particles required. With these methods, the information transfer between two photons or two QD spins can also be achieved. All of our proposals can work with high fidelity, even with a high leakage rate. What is more, each information transfer process above can also be seen as a controlled-NOT(CNOT) operation. It is found that the information transfer can be equivalent to a CNOT gate. These proposals will promote more efficient quantum information networks and quantum computation.  相似文献   

16.
We prove the conjectured existence of bound information, a classical analog of bound entanglement, in the multipartite scenario. We give examples of tripartite probability distributions from which it is impossible to extract any kind of secret key, even in the asymptotic regime, although they cannot be created by local operations and public communication. Moreover, we show that bound information can be activated: three honest parties can distill a common secret key from different distributions having bound information. Our results demonstrate that quantum information theory can provide useful insight for solving open problems in classical information theory.  相似文献   

17.
The concepts of information transfer and causal effect have received much recent attention, yet often the two are not appropriately distinguished and certain measures have been suggested to be suitable for both. We discuss two existing measures, transfer entropy and information flow, which can be used separately to quantify information transfer and causal information flow respectively. We apply these measures to cellular automata on a local scale in space and time, in order to explicitly contrast them and emphasize the differences between information transfer and causality. We also describe the manner in which the measures are complementary, including the conditions under which they in fact converge. We show that causal information flow is a primary tool to describe the causal structure of a system, while information transfer can then be used to describe the emergent computation on that causal structure.  相似文献   

18.
Distributed computation can be described in terms of the fundamental operations of information storage, transfer, and modification. To describe the dynamics of information in computation, we need to quantify these operations on a local scale in space and time. In this paper we extend previous work regarding the local quantification of information storage and transfer, to explore how information modification can be quantified at each spatiotemporal point in a system. We introduce the separable information, a measure which locally identifies information modification events where separate inspection of the sources to a computation is misleading about its outcome. We apply this measure to cellular automata, where it is shown to be the first direct quantitative measure to provide evidence for the long-held conjecture that collisions between emergent particles therein are the dominant information modification events.  相似文献   

19.
The entropy of a pair of random variables is commonly depicted using a Venn diagram. This representation is potentially misleading, however, since the multivariate mutual information can be negative. This paper presents new measures of multivariate information content that can be accurately depicted using Venn diagrams for any number of random variables. These measures complement the existing measures of multivariate mutual information and are constructed by considering the algebraic structure of information sharing. It is shown that the distinct ways in which a set of marginal observers can share their information with a non-observing third party corresponds to the elements of a free distributive lattice. The redundancy lattice from partial information decomposition is then subsequently and independently derived by combining the algebraic structures of joint and shared information content.  相似文献   

20.
Roughness is an important parameter to describe the microtopography of target surface. In the field of roughness detection, constraints on traditional methods are significant. Meanwhile, polarization imaging technology is gradually mature in recent years. In this paper, a method of roughness estimation with Mueller matrix is presented. Battery of lenses with fixed orientation have been introduced to produce a facula on the measured surface. Polarized information of each pixel can be obtained with the lenses of known position. According to the polarized information and Lambertian model, Stocks vector, Mueller matrix, and reflected Mueller matrix of each pixel can be acquired. Therefore, the roughness information of target surface can be obtained according to the relationship between roughness information and elements of matrix. Experimental results show that with the proposed method, efficiency of roughness detection can be improved without precision deducing. It can lay a foundation for extending the application of roughness into the field of object identification.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号