首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   49篇
  免费   3篇
化学   18篇
力学   6篇
数学   6篇
物理学   22篇
  2022年   3篇
  2021年   1篇
  2020年   2篇
  2018年   1篇
  2017年   3篇
  2016年   5篇
  2014年   1篇
  2013年   4篇
  2012年   3篇
  2011年   2篇
  2010年   1篇
  2009年   2篇
  2008年   4篇
  2007年   2篇
  2006年   1篇
  2005年   1篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
  2000年   3篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1990年   1篇
  1989年   2篇
  1987年   1篇
排序方式: 共有52条查询结果,搜索用时 828 毫秒
1.
Holography: an interpretation from the phase-space point of view   总被引:1,自引:0,他引:1  
Situ G  Sheridan JT 《Optics letters》2007,32(24):3492-3494
The formation of holograms is interpreted as the consequence of the bilinearity of the ambiguity function. Reconstruction can then be regarded as the manipulation of the ambiguity function. Specifically, we show that in the case of in-line holography, the reconstruction can be regarded as phase tomography. In this way we provide a unified picture for the formulation of both noninterferometric and interferometric phase-retrieval techniques.  相似文献   
2.
Multiple-image encryption by wavelength multiplexing   总被引:7,自引:0,他引:7  
Situ G  Zhang J 《Optics letters》2005,30(11):1306-1308
We introduce the technique of wavelength multiplexing into a double random-phase encoding system to achieve multiple-image encryption. Each primary image is first encrypted by the double phase encoding method and then superposed to yield the final enciphered image. We analyze the minimum separation between two adjacent multiplexing wavelengths through cross talk and the multiplexing capacity through the correlation coefficient. Computer simulations are performed to demonstrate the concept. This technique can be used for hiding multiple images as well.  相似文献   
3.
For partially observed process in n-dimensional space $\[\left\{ \begin{array}{l} {\beta _i} = {\beta _0} + \int\limits_0^t {{A_1}(s,{\beta _t})ds + \int\limits_0^t {{B_1}(s,{\beta _s})d{w_s}^{(1)},} } \{\xi _i} = \int\limits_0^t {B(s,{\xi _s}){B^*}(s,{\xi _s})\varphi (s,{\beta _s})ds + \int\limits_0^t {B(s,{\xi _s})d{w_s},} } \end{array} \right.\]$ under non-Lipschitz (even discontinuous) condition, a Bayes formula different from [1] is derived (Theorem 1). By means of this formula the innovation problem for the above process under rather weak condition is solved (Theorem 2) .Then the existence of an optimal pathwise Bang-Bang control for a partially observed process with bounded controls is obtained (Theorem 4).  相似文献   
4.
5.
We study dense coding under the condition that the sender’s encoding operations be imperfect. In order to formally describe the effect of the imperfect encoding operations, we use four kinds of quantum noise processes. In this way, the imperfect operation is the corresponding perfect operation followed by a quantum noise process. We show the relation among the average probability of decoding the correct information, the non-maximally entangled state, the imperfect encoding operations, and the receiver’s measurement basis.  相似文献   
6.
For the d–dimensional reflecting stochastic differential equations (1) with non-smooth boundary and unbounded domain the existence of a strong solution, (weak solution) is obtained under the conditions that the coefficients are less than linear growth and they are non-Lipschitz, (and the diffusion coefficient is non-degenerate, the drift coefficient is bounded and measurable only). Moreover, the Girsanov theorem and the martingale representation theorem with respect to system (1) are also derived. Then by using the Ekeland lemma and the martingale method the existence, necessary and sufficient conditions for an optimal control and an optimal control are obtained. The results are then applied to solve an optimal control problem for a stochastic population model  相似文献   
7.
Shi Y  Situ G  Zhang J 《Optics letters》2008,33(6):542-544
The information inevitably lost in multiple-image hiding is discarded in advance by the operation of prechoosing information before the hiding process; thus both fidelity and multiplexing capacity can be improved significantly. Various characters of each image provide a great many possibilities for information prechoosing. The ideal low-pass filter presented with the matched encoding and hiding procedure may be one of the simplest examples of information prechoosing for generally used images. Computer simulations demonstrate its good performance, and the security is analyzed as well.  相似文献   
8.
Analysis of phase encoding for optical encryption   总被引:1,自引:0,他引:1  
A phase encoded image is encrypted using the double random phase encoding technique, (DRPE). The effects of using a variable dynamic range of phase distribution during phase encoding (pre-encryption) are examined. We begin by phase encoding the input image using the full phase range, from −π to π. We perform numerically perfect encryption and we then introduce errors into the decrypting phase-keys in the form of a pseudo-random distribution (position and phase) of incorrect pixels values. By quantifying the resulting error in the attempted decryptions, for increasing amounts of error in the decrypting phase-keys, we examine the effects of reducing the phase range to, +/− (π − Δ). In this way we attempt to improve the phase encoding procedure for use with the DRPE technique. When the pixel values calculated, during an attempted decryption, fall outside the phase range used to phase encode the assigned input image, we examine different methods of redistributing the value of that pixel to an assigned value within the allowed phase range. The effects of the phase quantisation used in the keys are also examined.  相似文献   
9.
We propose a teleportation protocol and a dense coding protocol. In these protocols, one sender intends to send quantum states or classical bits to two receivers through two GHZ entanglement channels. The entanglement channels are locked by the sender and the communication process is supervised by a controller. In order to obtain the messages, the receivers need the controller’s permission, and must collaborate to unlock the entanglement channels.  相似文献   
10.
碱性橙与蛋白间的特异性与非特异性作用荧光光谱比较   总被引:1,自引:0,他引:1  
将碱性橙与抗体的作用、碱性橙与牛血清白蛋白(BSA)间的作用分别作为特异性作用和非特异性作用模型,采用荧光光谱法固定激发波长为280 nm,扫描不同温度下碱性橙与抗体和牛血清白蛋白两种相互作用,在300~600 nm的发射波长,比较了两种相互作用的差异.结果表明,碱性橙与抗体结合为单一的静态猝灭过程,二者之间的作用力主要为静电作用力;在溶液中,二者以摩尔比1∶1结合,结合常数为3.88×104 L/mol(25.C),3.73×104 L/mol(37.C)和2.35×104 L/mol (45.C);碱性橙距抗体分子色氨酸残基最短距离(r)为5.52 nm.碱性橙与BSA的结合也为静态猝灭,作用力为静电作用力.但碱性橙与抗体作用过程中形成了激基复合物,与BSA则不形成激基复合物.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号