Ten implementations of ptychography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Single-shot ptychography & sparsity-based subwavelength ptychography

We overcome two major limitations in ptychography – a powerful scanning-based coherent diffraction imaging technique. We demonstrate single-shot ptychography, overcoming the scanning-limited temporal resolution and also demonstrate sparsity-based subwavelength ptychography, overcoming the Abbe spatial resolution limit. OSCI: Phase retrieval: 100.5070; Scanning microscopy: 180.5810; Computationa...

متن کامل

Fuzzy controller implementations with fewer than ten transistors?

Evolutionary algorithms (EA) offer good promise for automated design of analog circuits as well as for adaptation and automatic reconfiguration of programmable devices. In particular, EAs faciitate the design of analog Circuits for very specific requirements, such as those related to the implementation of fuzzy operators, or even of complete fuzzy systems. The paper starts with a brief overview...

متن کامل

Fly-scan ptychography

We report an experimental ptychography measurement performed in fly-scan mode. With a visible-light laser source, we demonstrate a 5-fold reduction of data acquisition time. By including multiple mutually incoherent modes into the incident illumination, high quality images were successfully reconstructed from blurry diffraction patterns. This approach significantly increases the throughput of p...

متن کامل

Low Rank Fourier Ptychography

In this paper, we introduce a principled algorithmic approach for Fourier ptychographic imaging of dynamic, time-varying targets. To the best of our knowledge, this setting has not been explicitly addressed in the ptychography literature. We argue that such a setting is very natural, and that our methods provide an important first step towards helping reduce the sample complexity (and hence acq...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Microscopy

سال: 2017

ISSN: 0022-2720

DOI: 10.1111/jmi.12614