期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于差分传递函数法的大口径平面镜检测 被引量:3
1
作者 安其昌 姜晰文 +1 位作者 李洪文 唐境 《中国光学(中英文)》 EI CAS CSCD 北大核心 2022年第5期992-999,共8页
为了实现大口径平面镜的原位检测,本文基于差分传递函数结合瑞奇康芒检测架构,利用全息检测方法结合瑞奇康芒法,通过光瞳的遮拦编码实现大口径平面镜的面形检测。首先,对基于差分传递函数法的大口径平面镜检测基本原理进行了推导,并将... 为了实现大口径平面镜的原位检测,本文基于差分传递函数结合瑞奇康芒检测架构,利用全息检测方法结合瑞奇康芒法,通过光瞳的遮拦编码实现大口径平面镜的面形检测。首先,对基于差分传递函数法的大口径平面镜检测基本原理进行了推导,并将现有的大口径波前与重建波前进行对比。最后,利用变形镜搭建了检测光路。本文方法所得到面形与输入面形相关性不低于70%。本文的研究成果对宇宙“首光”探测以及“一黑两暗三起源”等宇宙学基础命题的研究均有十分重要的意义。 展开更多
关键词 大口径平面镜 全息传感 差分光学递函数 瑞奇康芒法
下载PDF
Rough Outlier Detection Based Security Risk Analysis Methodology 被引量:13
2
作者 Li Qianmu Li Jia 《China Communications》 SCIE CSCD 2012年第7期14-21,共8页
Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor networ... Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor network system may fail and the evaluation of the severity of the damage caused by the failure. In this paper, we devise a methodology of Rough Outlier Detection (ROD) for the detection of security-based risk factor, which originates from violations of attack requirements (namely, attack risks). The methodology elaborates dimension reduction method to analyze the attack risk probability from high dimensional and nonlinear data set, and combines it with rough redundancy reduction and the distance measurement of kernel function which is obtained using the ROD. In this way, it is possible to determine the risky scenarios, and the analysis feedback can be used to improve the sensor network system design. We illustrate the methodology in the DARPA case set study using step-by-step approach and then prove that the method is effective in lowering the rate of false alarm. 展开更多
关键词 rough outlier risk analysis dimensionality reduction
下载PDF
Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
3
作者 Yilun Wu Xicheng Lu +3 位作者 Jinshu Su Peixin Chen Xiaofeng Wang Bofeng Zhang 《China Communications》 SCIE CSCD 2017年第5期124-133,共10页
Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support ... Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However,they have some potential limitations. First,most of the existing schemes only consider the scenario with the single data owner. Second,they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third,in some schemes,the data owner should be online to help data users when data users intend to perform the search,which is inconvenient.In this paper,we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that,our scheme is a non-interactive solution,in which all the users only need to communicate with the cloud server. Furthermore,the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes,we evaluate the performance of our scheme,which shows that our scheme is practical. 展开更多
关键词 keyword search cloud security secure channels proxy re-encryption
下载PDF
Vectorial holography-mediated growth of plasmonic metasurfaces 被引量:1
4
作者 Zhen Yin Yue Shi +5 位作者 Mengjia Cen Tun Cao Chunxiang Xu Dan Luo Guixin Li Yan-Jun Liu 《Science Bulletin》 SCIE EI CSCD 2021年第15期1518-1524,M0003,共8页
Nowadays,the electromagnetic properties of artificial photonic materials can be well-tuned via designs over their composition and geometries.However,engineering the properties of artificial materials at the nanoscale ... Nowadays,the electromagnetic properties of artificial photonic materials can be well-tuned via designs over their composition and geometries.However,engineering the properties of artificial materials at the nanoscale is challenging and costly.Here we demonstrate a facile and low-cost method for fabricating large-area silver nanoparticle metasurfaces(AgNPMSs)by using the vectorial holography-mediated growth technique.The AgNPMS,which can be regarded as a hologram device,possesses excellent chiroptical properties.The vectorial holographic technique may open avenues for fabricating novel chiroptical metamaterials with large degrees of freedom,which can be further used for beam steering,photocatalysis,biosensing,etc. 展开更多
关键词 Vectorial holography PLASMONICS Metasurface POLARIZATION Silver nanoparticle
原文传递
Experimental study of the optical fiber characteristics by digital hologram 被引量:3
5
作者 黄素娟 付兴虎 王廷云 《Optoelectronics Letters》 EI 2011年第3期222-224,共3页
The characteristics of optical fiber are quite important for improving the performance of optical fiber communication and sensor systems.Based on the Mach-Zehnder interferometer,a new measuring method is proposed and ... The characteristics of optical fiber are quite important for improving the performance of optical fiber communication and sensor systems.Based on the Mach-Zehnder interferometer,a new measuring method is proposed and the digital holograms between the single mode fibers(SMFs) and specialty double-cladding(DC) fibers are analyzed.The experimental results show that the fringe density can be changed under the conditions of coaxial and off-axial interferences.Therefore it can be used to analyze the optical fiber characteristics including refractive index distribution,fiber modes,phase difference,etc. 展开更多
关键词 HOLOGRAMS Optical communication Refractive index Single mode fibers
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部