The subwavelength metal grating is designed and simulated by using the finite difference time domain (FDTD) algorithm. The transmission characteristics of subwavelength metal grating structure are studied based on the...
详细信息
Quantum-well infrared photodetectors have been studied extensively due to their night vision, astronomy and environmental monitoring research in recent years. However, responsivity and detectivity are relatively low i...
详细信息
Embedded systems and computational intelligence have been greatly developed in recent years. It is necessary to consider the design of a handheld terminal for industrial control purposes because there is still some wo...
详细信息
In this paper, a novel design of theWideband Bandstop Filter, based on Split Ring Resonators, (SRR) is proposed. The Defect Ground Structure (DGS) is achieved by opening the SRR-shaped slot in the ground plane, and th...
详细信息
The cyclic codes with parity check polynomial the reciprocal of the characteristic polynomial of the Fibonacci recurrence over a prime finite field are shown to have either one weight or two weights. When these codes ...
详细信息
In this paper, we prove existence of optimal complementary dual codes (LCD codes) over large finite fields. We also give methods to generate orthogonal matrices over finite fields and then apply them to construct LCD ...
详细信息
In this paper, a novel design of the dual passband lowpass filter based on the Defect Ground Structure (DGS) is proposed. The defect ground structure (DGS) is achieved by opening a set of asymmetric U-shaped slot in t...
详细信息
Various kinds of information in large touch screen system need to be protected by various reasons so we need to hide them. One kind of image hiding selection algorithm is proposed here. The steps are as follows, the c...
详细信息
ISBN:
(纸本)9781509041039
Various kinds of information in large touch screen system need to be protected by various reasons so we need to hide them. One kind of image hiding selection algorithm is proposed here. The steps are as follows, the carrier image and secret message is obtained by pre-processing to get a most hiding matrix suitable for image and message, then secret message is hidden into the carrier image by using Kim's method. The final hidden image and the original carrier image is almost the same from the naked eye. Finally, a few tests are carried out and the test results suggest that the hidden effect of the whole scheme is good.
暂无评论