When using the image mutual information to assess the quality of reconstructed image in pseudothermal light ghost imaging, a negative exponential behavior with respect to the measurement number is observed. Based on i...
详细信息
When using the image mutual information to assess the quality of reconstructed image in pseudothermal light ghost imaging, a negative exponential behavior with respect to the measurement number is observed. Based on information theory and a few simple and verifiable assumptions, semi-quantitative model of image mutual information under varying measurement numbers is established. It is the Gaussian characteristics of the bucket detector output probability distribution that leads to this negative exponential behavior. Designed experiments verify the model.
Previous approaches for blind identification of space-frequency block codes (SFBC) do not perform well for short observation periods due to their inefficient utilization of frequency-domain redundancy. This paper prop...
详细信息
A novel and compact silica capillary based Whispering Gallery Mode resonators and functional fiber devices are demonstrated with Fano resonances observed, while the temperature, refractive index and strain sensing are...
详细信息
With the rapid progress in computer science,including artificial intelligence,big data and cloud computing,full-space spot generation can be pivotal to many practical applications,such as facial recognition,motion det...
详细信息
With the rapid progress in computer science,including artificial intelligence,big data and cloud computing,full-space spot generation can be pivotal to many practical applications,such as facial recognition,motion detection,augmented reality,*** opportunities may be achieved by using diffractive optical elements(DOEs)or light detection and ranging(LIDAR).However,DOEs suffer from intrinsic limitations,such as demanding depth-controlled fabrication techniques,large thicknesses(more than the wavelength),Lambertian operation only in half space,*** nevertheless relies on complex and bulky scanning systems,which hinders the miniaturization of the spot ***,inspired by a Lambertian scatterer,we report a Hermitian-conjugate metasurface scrambling the incident light to a cloud of random points in full space with compressed information density,functioning in both transmission and reflection *** 4044 random spots are experimentally observed in the entire space,covering angles at nearly 90°.Our scrambling metasurface is made of amorphous silicon with a uniform subwavelength height,a nearly continuous phase coverage,a lightweight,flexible design,and low-heat ***,it may be mass produced by and integrated into existing semiconductor foundry *** work opens important directions for emerging 3D recognition sensors,such as motion sensing,facial recognition,and other applications.
We demonstrate a 0.95 GHz repetition rate fully stabilized Yb:fiber frequency comb without optical amplification. Benefitted from the high mode power and high coherence, this comb achieved 35 dB to 42 dB signal to noi...
详细信息
In this letter, we consider a uniform circular array (UCA) based line-of-sight (LOS) multiple-input-multiple-output (MIMO) system, where the transmit and receive UCAs are aligned with each other. We propose a simple c...
详细信息
Through the refractive index engineering of the subwavelength grating, an ultra-compact multimode interference based diplexer is proposed and demonstrated. It is 43.4 μm in length, only ~30% of its conventional count...
详细信息
High performance couplers are highly desired in many applications, but the design is limited by nearly unchangeable material refractive index. To tackle this issue, refractive index engineering method is investigated,...
详细信息
In this paper, we investigate flexible power transfer among electric vehicles (EVs) from a cooperative perspective in an EV system. First, the concept of cooperative EV-to- EV (V2V) charging is introduced, which enabl...
详细信息
Cloud Data Center (CDC) security remains a major challenge for business organizations and takes an important concern with research works. The attacker purpose is to guarantee the service unavailability and maximize th...
详细信息
暂无评论