共查询到20条相似文献,搜索用时 109 毫秒
1.
合成孔径数字全息的记录、再现及实现 总被引:2,自引:0,他引:2
介绍了合成孔径数字全息记录和再现的基本原理,提出了相应的实现方法和技术方案。特别对合成孔径数字全息再现中的两类方法:用单参考光记录的子全息图数字再现光场复振幅叠加或强度叠加,以及用多参考光记录的子全息图数字再现光场复振幅叠加或强度叠加方法进行了详细理论分析和实验研究。结果表明,合成孔径技术是一种提高数字全息再现像的分辨率的有效方法。与传统的子全息图直接拼接的合成孔径数字全息再现方法相比,用子数字全息图再现光场复振幅叠加或强度叠加两种再现方法均可实现合成孔径数字全息的再现,并可显著提高再现像的分辨率,但强度叠加方法的记录和再现难度远小于前者。在实际中可以根据解决问题的要求和子数字全息图的记录情况选用。 相似文献
2.
3.
4.
重建像质量的优劣是衡量数字全息成像最主要的标准.针对影响重建像质量的三个主要因素:参物角、CCD像素间距和再现距离,采用离轴全息记录与菲涅尔衍射近似重建算法对数字全息记录与再现过程进行了模型仿真,系统地探讨了各个因素对重建像质量的影响.通过仿真和分析获得了CCD像素间距和再现距离的参数范围以及参物角最大允许值,为具体实验验证提供了理论依据和操作指导.仿真实验结果表明,只有当参物角在最大允许值以内,选取合适的CCD像素间距和再现距离参数才能再现出清晰的重建物像. 相似文献
5.
6.
预放大相移无透镜傅里叶变换显微数字全息术的研究 总被引:3,自引:0,他引:3
利用菲涅耳衍射和全息理论 ,对预放大相移无透镜傅里叶变换显微数字全息术的记录和再现进行详细的理论分析和实验研究。其结果表明 :相移技术可以有效地解决数字全息再现像分离问题 ;预放大方法用透镜可以方便进行显微物体的放大 ;无透镜傅里叶变换全息术不仅可以降低数字全息采样条件的要求 ,而且在相同条件下可以记录物体更多的高频信息 ,上述三种技术的结合将是在目前CCD性能限制的条件下 ,提高显微数字全息再现像分辨率的有效途径。同时 ,也为高质量显微数字全息再现像的获得提供重要参考 相似文献
7.
汪泽文李琦袁静 《激光与光电子学进展》2017,(11):149-157
在太赫兹离轴数字全息中,因其记录及再现距离较短,零级衍射会对再现像造成严重影响。利用三种图像质量客观评价指标,对2.52THz离轴数字全息中使用复振幅复原法和拉普拉斯算子消零级方法得到的再现像进行了比较分析。以成像实验中的分辨率板为模型设计了仿真目标,根据实验获得的照明光和参考光的强度分布仿真了全息图,利用角谱法进行再现,最后对真实太赫兹数字全息图进行了相同的处理,所得结果与仿真结论基本吻合。复振幅复原法和拉普拉斯算子法均能很好的抑制零级衍射。相比拉普拉斯算子法,复振幅复原法的零级衍射亮度衰减率更高,再现像整体上峰值信噪比更高,在高分辨率的0.2mm亮竖条纹区域具有更高的信噪比,图像质量更好。 相似文献
8.
改善数字全息显微术分辨率的几种方法 总被引:14,自引:3,他引:11
从理论和实验上研究了数字全息显微术的分辨率问题。通过分析几种不同数字全息记录光路对记录介质空间分辨率的要求表明,无透镜傅里叶变换全息光路对CCD的空间分辨率要求最低,最能充分利用CCD的带宽;再现像面的空间分辨率在不同方向上的不一致,会导致再现像在空间分辨率高的方向上相对展宽,而在空间分辨率低的方向上相对压缩;再现像的横向分辨率主要由CCD所能记录的物体的最高空间频率决定,它随CCD的尺寸和空间分辨率的提高及记录距离D的减小而提高。给出了消除再现像畸变的方法及实验结果,并提出了3种改善横向分辨率的方法。 相似文献
9.
分析了传统全息片的微观结构,介绍了细光束成像和合成孔径数字全息记录、再现的基本原理,研究了利用传统方法拍摄的散射物体透射式、振幅型全息片实现合成孔径数字全息的方法,给出了实验结果。理论分析和实验结果表明,利用传统透射式、振幅型全息片,通过光学显微镜放大制作子数字全息图和合成孔径数字全息图,经计算机处理是可以得到完整再现像的,其性质与细激光束照射成像一致。用子全息图再现像的复振幅叠加方法和采用子全息图再现像的强度叠加方法均可实现合成孔径数字全息图的再现,且强度叠加方法的视觉效果要好些,但它们对缩小再现像中散斑的尺寸没有帮助。用子全息图拼接成的合成孔径全息图得到的再现像效果最好,可以缩小再现像中散斑的尺寸,信噪比、分辨率均有提高。要得到更好的再现像,需要用更多的子数字全息图拼接成尺寸更大的合成孔径数字全息图。 相似文献
10.
11.
The relation between the power of the Brillouin signal and the strain is one of the bases of the distributed fiber sensors of temperature and strain. The coefficient of the Bfillouin gain can be changed by the temperature and the strain that will affect the power of the Brillouin scattering. The relation between the change of the Brillouin gain coefficient and the strain is thought to be linear by many researchers. However, it is not always linear based on the theoretical analysis and numerical simulation. Therefore, errors will be caused if the relation between the change of the Brillouin gain coefficient and the strain is regarded as to be linear approximately for measuring the temperature and the strain. For this reason, the influence of the parameters on the Brillouin gain coefficient is proposed through theoretical analysis and numerical simulation. 相似文献
12.
数字经济时代,企业面临更加激烈的市场竞争环境,传统的供应链管理模式的问题日趋显现,亟需进行数字化转型。企业的发展需要更加智能、高效的数字化供应链的支撑。针对这一现状和需求,文章着力于研究如何解决传统企业供应链数字化转型的问题,设计了一套基于SAP ERP和EWM系统为核心的企业数字化供应链的解决方案:通过SAP ERP和EWM系统的无缝对接实现了企业物流相关业务的自动流转;通过EWM与WCS系统的无缝对接以及WCS系统与自动化立体仓库硬件设备的集成实现了仓库所有出入库作业的自动传递和执行;通过引入条码技术以及与RF设备的集成实现了全流程作业的自动识别和准确高效的处理。该解决方案的设计与实现,帮助企业极大地提高了供应链各个环节的作业效率,提高了整个供应链的透明度,进而提升了企业的整体运营效率和管理水平,使得企业能在日趋激烈的市场竞争环境中保持竞争优势,并取得长足发展。 相似文献
13.
14.
15.
本文在概述红外热象技术应用于石化设备检测的基本原理和方法的同时,着重介绍了对石化重点装置催化再生器的检测及其衬时故障诊断,以及热管道、阀门外保温效果评估等方面的应用情况。并对此项技术在石化企业的应用前景和研究方向做了一定的介绍。 相似文献
16.
Three alternative schemes for secure Virtual Private Network (VPN) deployment over the Universal Mobile Telecommunication
System (UMTS) are proposed and analyzed. The proposed schemes enable a mobile node to voluntarily establish an IPsec-based
secure channel to a private network. The alternative schemes differ in the location where the IPsec functionality is placed
within the UMTS network architecture (mobile node, access network, and UMTS network border), depending on the employed security
model, and whether data in transit are ever in clear-text, or available to be tapped by outsiders. The provided levels of
privacy in the deployed VPN schemes, as well as the employed authentication models are examined. An analysis in terms of cost,
complexity, and performance overhead that each method imposes to the underlying network architecture, as well as to the mobile
devices is presented. The level of system reliability and scalability in granting security services is presented. The VPN
management, usability, and trusted relations, as well as their behavior when a mobile user moves are analyzed. The use of
special applications that require access to encapsulated data traffic is explored. Finally, an overall comparison of the proposed
schemes from the security and operation point of view summarizes their relative performance.
Christos Xenakis received his B.Sc. degree in computer science in 1993 and his M.Sc. degree in telecommunication and computer networks in
1996, both from the Department of Informatics and Telecommunications, University of Athens, Greece. In 2004 he received his
Ph.D. from the University of Athens (Department of Informatics and Telecommunications). From 1998–2000 was with the Greek
telecoms system development firm Teletel S.A., where was involved in the design and development of advanced telecommunications
subsystems for ISDN, ATM, GSM, and GPRS. Since 1996 he has been a member of the Communication Networks Laboratory of the University
of Athens. He has participated in numerous projects realized in the context of EU Programs (ACTS, ESPRIT, IST). His research
interests are in the field of mobile/wireless networks, security and distributed network management. He is the author of over
15 papers in the above areas.
Lazaros Merakos received the Diploma in electrical and mechanical engineering from the National Technical University of Athens, Greece, in
1978, and the M.S. and Ph.D. degrees in electrical engineering from the State University of New York, Buffalo, in 1981 and
1984, respectively. From 1983 to 1986, he was on the faculty of Electrical Engineering and Computer Science at the University
of Connecticut, Storrs. From 1986 to 1994 he was on the faculty of the Electrical and Computer Engineering Department at Northeastern
University, Boston, MA. During the period 1993–1994 he served as Director of the Communications and Digital Processing Research
Center at Northeastern University. During the summers of 1990 and 1991, he was a Visiting Scientist at the IBM T. J. Watson
Research Center, Yorktown Heights, NY. In 1994, he joined the faculty of the University of Athens, Athens, Greece, where he
is presently a Professor in the Department of Informatics and Telecommunications, and Director of the Communication Networks
Laboratory (UoA-CNL) and the Networks Operations and Management Center. His research interests are in the design and performance
analysis of broadband networks, and wireless/mobile communication systems and services. He has authored more than 150 papers
in the above areas. Since 1995, he is leading the research activities of UoA-CNL in the area of mobile communications, in
the framework of the Advanced Communication Technologies & Services (ACTS) and Information Society Technologies (IST) programmes
funded by the European Union (projects RAINBOW, Magic WAND, WINE, MOBIVAS, POLOS, ANWIRE). He is chairman of the board of
the Greek Universities Network, the Greek Schools Network, and member of the board of the Greek Research Network. In 1994,
he received the Guanella Award for the Best Paper presented at the International Zurich Seminar on Mobile Communications. 相似文献
17.
18.
19.
文中针对单相无刷直流电机结构设计及驱动方式展开研究,推导出电机理想工况下的基本方程,根据工程实际需求并结合无刷直流电机的设计原则确定该电机的设计方案。利用设计方案设计一台额定功率38 W,额定转速750 rpm的单相无刷直流电机,并分析了渐变气隙对电机起动性能和齿槽转矩的影响,确定了最优气隙长度。通过对比单极性绕组和双极性绕组形式的优缺点确定绕组形式,结合传统电机设计公式确定绕组匝数。文中利用有限元法初步验证了设计方案的合理性。根据电机动态数学模型在Simulink环境中搭建了电机系统的模型,仿真得到电机的转速、转矩变化曲线,结果与理论分析吻合良好,验证了电机设计方案的合理性和电机模型的有效性。 相似文献
20.
崔莹 《电子产品可靠性与环境试验》2009,27(4):10-14
基于美国宇航用电感器和变压器发生失效的类型、原因、检测方法和发生频次的数据,总结了其失效特征,并给出了电感器和变压器在MIL-STD-981中各项试验重要性的认识。通过对美国和国内宇航用电感器和变压器由设计、生产产生的失效和实验中失效的对比分析。给出了此类元件的失效特征。依据国情,提出了如何通过制定标准和失效数据分析工作来提高国产宇航用电感器和变压器可靠性的建议。 相似文献