Optical Double Binary Amplitude Mask Structure for Security Authentication

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Binary and Phase Shifting Mask Design for Optical Lithography

We propose a number of pre-distorted mask design techniques for binary and phase-shifting masks. Our approach is based on modeling the imaging mechanism of a stepper by the Hopkins equations and taking advantage of the contrastenhancement characteristics of photoresist. Optimization techniques such as the branch and bound algorithm and simulated annealing algorithm are used to systematically de...

متن کامل

Binary mask programmable hologram.

We report, for the first time, the concept and generation of a novel Fresnel hologram called the digital binary mask programmable hologram (BMPH). A BMPH is comprised of a static, high resolution binary grating that is overlaid with a lower resolution binary mask. The reconstructed image of the BMPH can be programmed to approximate a target image (including both intensity and depth information)...

متن کامل

Techniques for Estimating the Ideal Binary Mask

This paper provides a comparison of binary mask estimation techniques, based on different ways of estimating the instantaneous SNR. The effect of six different gain functions and three noise estimation algorithms on estimating the SNR, and subsequently the binary mask was assessed. New criteria are proposed for classifying time-frequency bins as belonging to the target or masker signals. Senten...

متن کامل

Test Generation for the Binary Floating Point Add Operation With Mask-Mask-Mask Constraints

The mathematical problem discussed is important for generating test cases in order to debug floating point adders designs. Floating point numbers are assumed to be written as strings of {0, 1} bits, in a format compatible with IEEE standard 754. A mask is a string of characters, composed of {′0′,′ 1′,′ x′}. A number and a mask are compatible if they have the same length and each numerical chara...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Photonics Journal

سال: 2016

ISSN: 1943-0655

DOI: 10.1109/jphot.2016.2628798