首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6篇
  免费   0篇
电工技术   1篇
无线电   1篇
一般工业技术   4篇
  2021年   1篇
  2013年   1篇
  2003年   1篇
  2000年   2篇
  1995年   1篇
排序方式: 共有6条查询结果,搜索用时 0 毫秒
1
1.
Magnetic Resonance Materials in Physics, Biology and Medicine - The aim of the study is to compare structure tensor imaging (STI) with diffusion tensor imaging (DTI) of the sheep heart...  相似文献   
2.
We present a real-time holographic interferometer for which two reference waves of different phases are created by two-wave mixing with a stationary signal wave in a photorefractive crystal. These waves are reconstructions of the stationary signal wave and interfere with the momentary (changing) signal wave in the manner of a holographic real-time interferometer. A fast change (phase or intensity) of the signal wave leads to different intensity changes in both interferograms that are jointly used for evaluation. With an electric dc field applied to the crystal, a high sensitivity for measuring phase changes (down to lambda/50, lambda = 633 nm) is found, and the sign of the phase change can be determined.  相似文献   
3.
Abstract

The unusually fast response of the two-wave mixing process in fibre-like Bi12TiO20 crystals on transient change of the external electric field was experimentally observed. Pulses of the amplification of the signal wave with a rise time of 0.2 ms and a width of 0.5 ms at a total input intensity of 6 mW mm?2 are obtained when applying a rising or decreasing front of an external electric field to the crystal. The two-wave coupling without external field has a response time of 200 ms. A simple calculation based on the bandtransport model qualitatively explains the fast transient amplification but fails to explain the slow response without the electric field.  相似文献   
4.
Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere-anytime computing. Our work securely enables clients to access and utilize services in heterogeneous networks. We provide a service registration and discovery mechanism implemented through a hierarchy of service management. The system is built upon a simplified Public Key Infrastructure that provides for authentication, non-repudiation, anti-playback, and access control. Smartcards are used as secure containers for digital certificates. The system is implemented in Java and we use Extensible Markup Language as the sole medium for communications and data exchange. Currently, we are solely dependent on a base set of access rights for our distributed trust model however, we are expanding the model to include the delegation of rights based upon a predefined policy. In our proposed expansion, instead of exclusively relying on predefined access rights, we have developed a flexible representation of trust information, in Prolog, that can model permissions, obligations, entitlements, and prohibitions. In this paper, we present the implementation of our system and describe the modifications to the design that are required to further enhance distributed trust. Our implementation is applicable to any distributed service infrastructure, whether the infrastructure is wired, mobile, or ad hoc.  相似文献   
5.
The optically generated joint Fourier transform (JFT) of a test image and a reference image is processed using a new method: the JFT is recorded twice. In the second recording the reference image is phase shifted by π with respect to the first recording. The two JFT's are subtracted and binarized with a threshold of zero. Strong correlation peaks are obtained, and correlations within the test image are suppressed. Some results of optical implementation are presented, using a ferroelectric liquid crystal display with 128 × 128 pixels for data input. The phase shift of the reference was implemented by the contrast-inverted reference input on the binary light-modulating device. Processing of the JFT is done by a CCD camera, a frame grabber, and a personal computer.  相似文献   
6.
The interference pattern of light waves creates a refractive index modulation in photorefractive media. This process is relatively well described by the theory (Kukhtarev equations) but deviations are found. Therefore, experimental methods are used in order to characterise the processes. The influence of the absolute intensity as well as the intensity ratio of the interfering waves on the refractive index modulation are studied in a two-wave mixing arrangement. Especially for the dependence on the absolute intensity the interesting relation Δn=f(Iabs)Iabs was found that is not predicted by the theory. Nevertheless, this experimental approximation can be used in calculations in order to minimise the error.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号