The 1999 Thai horror movie Nang Nak was the turning point for the“new wave”of Thai movies,and it became a model for the horror genre in Thailand.Even today,vengeance from female ghosts remains a central theme of Tha...The 1999 Thai horror movie Nang Nak was the turning point for the“new wave”of Thai movies,and it became a model for the horror genre in Thailand.Even today,vengeance from female ghosts remains a central theme of Thai horror movies.展开更多
In the existing ghost-imaging-based cryptographic key distribution(GCKD)protocols,the cryptographic keys need to be encoded by using many modulated patterns,which undoubtedly incurs long measurement time and huge memo...In the existing ghost-imaging-based cryptographic key distribution(GCKD)protocols,the cryptographic keys need to be encoded by using many modulated patterns,which undoubtedly incurs long measurement time and huge memory consumption.Given this,based on snapshot compressive ghost imaging,a public network cryptographic key distribution protocol is proposed,where the cryptographic keys and joint authentication information are encrypted into several color block diagrams to guarantee security.It transforms the previous single-pixel sequential multiple measurements into multi-pixel single exposure measurements,significantly reducing sampling time and memory storage.Both simulation and experimental results demonstrate the feasibility of this protocol and its ability to detect illegal attacks.Therefore,it takes GCKD a big step closer to practical applications.展开更多
Improving the speed of ghost imaging is one of the main ways to leverage its advantages in sensitivity and imperfect spectral regions for practical applications.Because of the proportional relationship between image r...Improving the speed of ghost imaging is one of the main ways to leverage its advantages in sensitivity and imperfect spectral regions for practical applications.Because of the proportional relationship between image resolution and measurement time,when the image pixels are large,the measurement time increases,making it difficult to achieve real-time imaging.Therefore,a high-quality ghost imaging method based on undersampled natural-order Hadamard is proposed.This method uses the characteristics of the Hadamard matrix under undersampling conditions where image information can be fully obtained but overlaps,as well as deep learning to extract aliasing information from the overlapping results to obtain the true original image information.We conducted numerical simulations and experimental tests on binary and grayscale objects under undersampling conditions to demonstrate the effectiveness and scalability of this method.This method can significantly reduce the number of measurements required to obtain high-quality image information and advance application promotion.展开更多
We take phase modulation to create discrete phase-controlled sources and realize the super-bunching effect by a phasecorrelated method. From theoretical and numerical simulations, we find the space translation invaria...We take phase modulation to create discrete phase-controlled sources and realize the super-bunching effect by a phasecorrelated method. From theoretical and numerical simulations, we find the space translation invariance of the bunching effect is a key point for the ghost imaging realization. Experimentally, we create the orderly phase-correlated discrete sources which can realize high-visibility second-order ghost imaging than the result with chaotic sources. Moreover, some factors affecting the visibility of ghost image are discussed in detail.展开更多
Dark energy is explained using familiar notions and concepts used in quantum field theory, string theory and the exact mathematical theory of spacetime. The main result of the present work is first a new mathematical ...Dark energy is explained using familiar notions and concepts used in quantum field theory, string theory and the exact mathematical theory of spacetime. The main result of the present work is first a new mathematical definition of pre-quantum spacetime (QST) as a multiset made of infinitely many empty Cantor sets connected to pre-quantum wave empty set (QW) and the pre-quantum particle (QP) zero set via the cobordism equation ∂(QW) = (QP)U(QST). Second, and in turn, this new path of reasoning is used to validate the quantum splitting of Einstein’s E = mc<sup>2</sup> into the sum of the ordinary energy E = mc<sup>2</sup>/22 of the quantum particle and the dark energy E = mc<sup>2</sup>(21/22) of the quantum wave, used predominantly to explain the observed accelerated expansion of the universe.展开更多
Owing to the constraints on the fabrication ofγ-ray coding plates with many pixels,few studies have been carried out onγ-ray computational ghost imaging.Thus,the development of coding plates with fewer pixels is ess...Owing to the constraints on the fabrication ofγ-ray coding plates with many pixels,few studies have been carried out onγ-ray computational ghost imaging.Thus,the development of coding plates with fewer pixels is essential to achieveγ-ray computational ghost imaging.Based on the regional similarity between Hadamard subcoding plates,this study presents an optimization method to reduce the number of pixels of Hadamard coding plates.First,a moving distance matrix was obtained to describe the regional similarity quantitatively.Second,based on the matrix,we used two ant colony optimization arrangement algorithms to maximize the reuse of pixels in the regional similarity area and obtain new compressed coding plates.With full sampling,these two algorithms improved the pixel utilization of the coding plate,and the compression ratio values were 54.2%and 58.9%,respectively.In addition,three undersampled sequences(the Harr,Russian dolls,and cake-cutting sequences)with different sampling rates were tested and discussed.With different sampling rates,our method reduced the number of pixels of all three sequences,especially for the Russian dolls and cake-cutting sequences.Therefore,our method can reduce the number of pixels,manufacturing cost,and difficulty of the coding plate,which is beneficial for the implementation and application ofγ-ray computational ghost imaging.展开更多
[Objective] To study on genetic inactivation bacterial ghosts of Pasteurella multocida based PhiX174 gene E lysis cassette mediated. [ Method ] Recombinant pPBA1100-e was constructed by which the gene E of bacteriopha...[Objective] To study on genetic inactivation bacterial ghosts of Pasteurella multocida based PhiX174 gene E lysis cassette mediated. [ Method ] Recombinant pPBA1100-e was constructed by which the gene E of bacteriophage Phix174 and temperature sensitivity expressing control system hybridized with plasmid pPBA1100 by genetic engineering method. Recombinant was transformed to Pasteurella multocida and lysis gene E expressed by temperature induction. Recombinant was detected by restriction endonuclease. Cell morphology of bacterial ghost of Pasteurella mul- tocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysis. I Result~ The results indicated that the recombination plasmid presented three bands by restriction endonuclease and agarose electrophoresis and that molecular weight of every band ac- corded with theoretical value. The result of SEM observing showed that recombination plasmid expressed successfully in P. multocida and produced bacterial ghost. The result of CFU detecting demonstrated that inactivation ratio of P. multocida reached 99 per cent. ~Conclusion~ This study pro- vided technical bases for the preparation of antigen vaccine of natural bacterial outer membrane protein.展开更多
Based on the artificial intelligence algorithm of RetinaNet,we propose the Ghost-RetinaNet in this paper,a fast shadow detection method for photovoltaic panels,to solve the problems of extreme target density,large ove...Based on the artificial intelligence algorithm of RetinaNet,we propose the Ghost-RetinaNet in this paper,a fast shadow detection method for photovoltaic panels,to solve the problems of extreme target density,large overlap,high cost and poor real-time performance in photovoltaic panel shadow detection.Firstly,the Ghost CSP module based on Cross Stage Partial(CSP)is adopted in feature extraction network to improve the accuracy and detection speed.Based on extracted features,recursive feature fusion structure ismentioned to enhance the feature information of all objects.We introduce the SiLU activation function and CIoU Loss to increase the learning and generalization ability of the network and improve the positioning accuracy of the bounding box regression,respectively.Finally,in order to achieve fast detection,the Ghost strategy is chosen to lighten the size of the algorithm.The results of the experiment show that the average detection accuracy(mAP)of the algorithm can reach up to 97.17%,the model size is only 8.75 MB and the detection speed is highly up to 50.8 Frame per second(FPS),which can meet the requirements of real-time detection speed and accuracy of photovoltaic panels in the practical environment.The realization of the algorithm also provides new research methods and ideas for fault detection in the photovoltaic power generation system.展开更多
This paper explores the message hidden in the ghost characters in Dickens'A Christmas Carol. There are an immense number of books about ghost both in Chinese and British literature. Ghost is an imaginary afterlife...This paper explores the message hidden in the ghost characters in Dickens'A Christmas Carol. There are an immense number of books about ghost both in Chinese and British literature. Ghost is an imaginary afterlife of human being; similarly novel is also a kind of fiction based on the real life. Therefore,when novels are used to shape the ghost images,there will be a powerful and unstrained space produced by the double-tier imagination. The ghost novels can also serve as a mirror of human society and speak of some problems in human life. So a better understanding of the ghost characters in literature can give us a deep insight into the society at the time when the story took place,as well as providing us a good chance of literature appreciation.Considering the role that the ghosts play in this novel,it should be called memory figures,developing Scrooge from a character wishing to shut out his past to one living in the past,the present,and the future. The first indication of his character can be derived from the remark that he takes "his melancholy dinner in his usual melancholy tavern" and then returns to his "gloomy suite of rooms ". The adjectives tell us that Scrooge should have a talent for remem?brance or rather a good memory. His humoral constitution predisposes him for it. The three ghosts,whose visitation Marley announced,each take Scrooge to places,to towns and buildings,the most traditional type of image in artificial memory. It is typical of these visits that Scrooge,like Vergil in Dante's Divine Comedy,becomes an invisible visitor,who enters the world of his past evoked by the memorial places. This immediate contact appears as a precondition for the reformative influence of the past on Scrooge. If we look back to an earlier Christmas story,which also preaches the change of heart,Dickens' new and specific frame of reference shows up even more clearly. (Cerny,257)展开更多
Microglia are the tissue resident macrophages of the brain and represent the sole immune population located in the parenchyma of the central nervous system (CNS). These cells are hidden be-tween neurons, astrocytes ...Microglia are the tissue resident macrophages of the brain and represent the sole immune population located in the parenchyma of the central nervous system (CNS). These cells are hidden be-tween neurons, astrocytes as well as oligodendrocytes and account for only 5-10% of CNS cells. Even though microglia were already identified in 1913 by the Spanish neuroanatomist Ramon y Cajal and further seminally investigated by his student Pio del Rio Hortega,展开更多
An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadam...An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 × 32 pixels image, the number of bits sent from Alice to Bob by using SSGIOE(M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme.When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.展开更多
文摘The 1999 Thai horror movie Nang Nak was the turning point for the“new wave”of Thai movies,and it became a model for the horror genre in Thailand.Even today,vengeance from female ghosts remains a central theme of Thai horror movies.
基金supported by the Beijing Natural Science Foundation(Grant No.4222016).
文摘In the existing ghost-imaging-based cryptographic key distribution(GCKD)protocols,the cryptographic keys need to be encoded by using many modulated patterns,which undoubtedly incurs long measurement time and huge memory consumption.Given this,based on snapshot compressive ghost imaging,a public network cryptographic key distribution protocol is proposed,where the cryptographic keys and joint authentication information are encrypted into several color block diagrams to guarantee security.It transforms the previous single-pixel sequential multiple measurements into multi-pixel single exposure measurements,significantly reducing sampling time and memory storage.Both simulation and experimental results demonstrate the feasibility of this protocol and its ability to detect illegal attacks.Therefore,it takes GCKD a big step closer to practical applications.
基金the Science and Technology Development Plan Project of Jilin Province,China(Grant No.20220204134YY)the National Natural Science Foundation of China(Grant No.62301140)+3 种基金Project of the Education Department of Jilin Province(Grant Nos.JJKH20231292KJ and JJKH20240242KJ)Program for Science and Technology Development of Changchun City(Grant No.23YQ11)Innovation and Entrepreneurship Talent Funding Project of Jilin Province(Grant No.2023RY17)the Project of Jilin Provincial Development and Reform Commission(Grant No.2023C042-4).
文摘Improving the speed of ghost imaging is one of the main ways to leverage its advantages in sensitivity and imperfect spectral regions for practical applications.Because of the proportional relationship between image resolution and measurement time,when the image pixels are large,the measurement time increases,making it difficult to achieve real-time imaging.Therefore,a high-quality ghost imaging method based on undersampled natural-order Hadamard is proposed.This method uses the characteristics of the Hadamard matrix under undersampling conditions where image information can be fully obtained but overlaps,as well as deep learning to extract aliasing information from the overlapping results to obtain the true original image information.We conducted numerical simulations and experimental tests on binary and grayscale objects under undersampling conditions to demonstrate the effectiveness and scalability of this method.This method can significantly reduce the number of measurements required to obtain high-quality image information and advance application promotion.
基金Project supported by the National Natural Science Foundation of China(Grant No.62105188)。
文摘We take phase modulation to create discrete phase-controlled sources and realize the super-bunching effect by a phasecorrelated method. From theoretical and numerical simulations, we find the space translation invariance of the bunching effect is a key point for the ghost imaging realization. Experimentally, we create the orderly phase-correlated discrete sources which can realize high-visibility second-order ghost imaging than the result with chaotic sources. Moreover, some factors affecting the visibility of ghost image are discussed in detail.
文摘Dark energy is explained using familiar notions and concepts used in quantum field theory, string theory and the exact mathematical theory of spacetime. The main result of the present work is first a new mathematical definition of pre-quantum spacetime (QST) as a multiset made of infinitely many empty Cantor sets connected to pre-quantum wave empty set (QW) and the pre-quantum particle (QP) zero set via the cobordism equation ∂(QW) = (QP)U(QST). Second, and in turn, this new path of reasoning is used to validate the quantum splitting of Einstein’s E = mc<sup>2</sup> into the sum of the ordinary energy E = mc<sup>2</sup>/22 of the quantum particle and the dark energy E = mc<sup>2</sup>(21/22) of the quantum wave, used predominantly to explain the observed accelerated expansion of the universe.
基金supported by the Youth Science Foundation of Sichuan Province(Nos.22NSFSC3816 and 2022NSFSC1231)the General Project of the National Natural Science Foundation of China(Nos.12075039 and 41874121)the Key Project of the National Natural Science Foundation of China(No.U19A2086).
文摘Owing to the constraints on the fabrication ofγ-ray coding plates with many pixels,few studies have been carried out onγ-ray computational ghost imaging.Thus,the development of coding plates with fewer pixels is essential to achieveγ-ray computational ghost imaging.Based on the regional similarity between Hadamard subcoding plates,this study presents an optimization method to reduce the number of pixels of Hadamard coding plates.First,a moving distance matrix was obtained to describe the regional similarity quantitatively.Second,based on the matrix,we used two ant colony optimization arrangement algorithms to maximize the reuse of pixels in the regional similarity area and obtain new compressed coding plates.With full sampling,these two algorithms improved the pixel utilization of the coding plate,and the compression ratio values were 54.2%and 58.9%,respectively.In addition,three undersampled sequences(the Harr,Russian dolls,and cake-cutting sequences)with different sampling rates were tested and discussed.With different sampling rates,our method reduced the number of pixels of all three sequences,especially for the Russian dolls and cake-cutting sequences.Therefore,our method can reduce the number of pixels,manufacturing cost,and difficulty of the coding plate,which is beneficial for the implementation and application ofγ-ray computational ghost imaging.
基金Supported by the Hongkong Fok Ying Tung Ming Yuan Fund(HK314-14591)Guangdong Provincial Agricultural Research Projects(2004B20201019)Shaoguan Science and Technology Innovation Projects(2010140473)
文摘[Objective] To study on genetic inactivation bacterial ghosts of Pasteurella multocida based PhiX174 gene E lysis cassette mediated. [ Method ] Recombinant pPBA1100-e was constructed by which the gene E of bacteriophage Phix174 and temperature sensitivity expressing control system hybridized with plasmid pPBA1100 by genetic engineering method. Recombinant was transformed to Pasteurella multocida and lysis gene E expressed by temperature induction. Recombinant was detected by restriction endonuclease. Cell morphology of bacterial ghost of Pasteurella mul- tocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysis. I Result~ The results indicated that the recombination plasmid presented three bands by restriction endonuclease and agarose electrophoresis and that molecular weight of every band ac- corded with theoretical value. The result of SEM observing showed that recombination plasmid expressed successfully in P. multocida and produced bacterial ghost. The result of CFU detecting demonstrated that inactivation ratio of P. multocida reached 99 per cent. ~Conclusion~ This study pro- vided technical bases for the preparation of antigen vaccine of natural bacterial outer membrane protein.
基金supported by the National Natural Science Foundation of China(No.52074305)Henan Scientific and Technological Research Project(No.212102210005)Open Fund of Henan Engineering Laboratory for Photoelectric Sensing and Intelligent Measurement and Control(No.HELPSIMC-2020-00X).
文摘Based on the artificial intelligence algorithm of RetinaNet,we propose the Ghost-RetinaNet in this paper,a fast shadow detection method for photovoltaic panels,to solve the problems of extreme target density,large overlap,high cost and poor real-time performance in photovoltaic panel shadow detection.Firstly,the Ghost CSP module based on Cross Stage Partial(CSP)is adopted in feature extraction network to improve the accuracy and detection speed.Based on extracted features,recursive feature fusion structure ismentioned to enhance the feature information of all objects.We introduce the SiLU activation function and CIoU Loss to increase the learning and generalization ability of the network and improve the positioning accuracy of the bounding box regression,respectively.Finally,in order to achieve fast detection,the Ghost strategy is chosen to lighten the size of the algorithm.The results of the experiment show that the average detection accuracy(mAP)of the algorithm can reach up to 97.17%,the model size is only 8.75 MB and the detection speed is highly up to 50.8 Frame per second(FPS),which can meet the requirements of real-time detection speed and accuracy of photovoltaic panels in the practical environment.The realization of the algorithm also provides new research methods and ideas for fault detection in the photovoltaic power generation system.
文摘This paper explores the message hidden in the ghost characters in Dickens'A Christmas Carol. There are an immense number of books about ghost both in Chinese and British literature. Ghost is an imaginary afterlife of human being; similarly novel is also a kind of fiction based on the real life. Therefore,when novels are used to shape the ghost images,there will be a powerful and unstrained space produced by the double-tier imagination. The ghost novels can also serve as a mirror of human society and speak of some problems in human life. So a better understanding of the ghost characters in literature can give us a deep insight into the society at the time when the story took place,as well as providing us a good chance of literature appreciation.Considering the role that the ghosts play in this novel,it should be called memory figures,developing Scrooge from a character wishing to shut out his past to one living in the past,the present,and the future. The first indication of his character can be derived from the remark that he takes "his melancholy dinner in his usual melancholy tavern" and then returns to his "gloomy suite of rooms ". The adjectives tell us that Scrooge should have a talent for remem?brance or rather a good memory. His humoral constitution predisposes him for it. The three ghosts,whose visitation Marley announced,each take Scrooge to places,to towns and buildings,the most traditional type of image in artificial memory. It is typical of these visits that Scrooge,like Vergil in Dante's Divine Comedy,becomes an invisible visitor,who enters the world of his past evoked by the memorial places. This immediate contact appears as a precondition for the reformative influence of the past on Scrooge. If we look back to an earlier Christmas story,which also preaches the change of heart,Dickens' new and specific frame of reference shows up even more clearly. (Cerny,257)
基金supported by the Deutsche Forschungsgemeinschaft(DFGMI1328)
文摘Microglia are the tissue resident macrophages of the brain and represent the sole immune population located in the parenchyma of the central nervous system (CNS). These cells are hidden be-tween neurons, astrocytes as well as oligodendrocytes and account for only 5-10% of CNS cells. Even though microglia were already identified in 1913 by the Spanish neuroanatomist Ramon y Cajal and further seminally investigated by his student Pio del Rio Hortega,
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61871234 and 62001249)the Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX200729)+3 种基金the Natural Science Research Project of Higher Education of Jiangsu Province(Grant No.20KJB510030)the Qing Lan Project of Jiangsu Province(Su Teacher’s Letter[2022]No.29)the Research project of NanJing Tech University Pujiang Institute(Grant No.njpj2022-1-25)the Priority Academic Program Development of Jiangsu Higher Education Institutions.
文摘An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 × 32 pixels image, the number of bits sent from Alice to Bob by using SSGIOE(M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme.When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.