منابع مشابه
Single-shot ptychography & sparsity-based subwavelength ptychography
We overcome two major limitations in ptychography – a powerful scanning-based coherent diffraction imaging technique. We demonstrate single-shot ptychography, overcoming the scanning-limited temporal resolution and also demonstrate sparsity-based subwavelength ptychography, overcoming the Abbe spatial resolution limit. OSCI: Phase retrieval: 100.5070; Scanning microscopy: 180.5810; Computationa...
متن کاملFuzzy controller implementations with fewer than ten transistors?
Evolutionary algorithms (EA) offer good promise for automated design of analog circuits as well as for adaptation and automatic reconfiguration of programmable devices. In particular, EAs faciitate the design of analog Circuits for very specific requirements, such as those related to the implementation of fuzzy operators, or even of complete fuzzy systems. The paper starts with a brief overview...
متن کاملFly-scan ptychography
We report an experimental ptychography measurement performed in fly-scan mode. With a visible-light laser source, we demonstrate a 5-fold reduction of data acquisition time. By including multiple mutually incoherent modes into the incident illumination, high quality images were successfully reconstructed from blurry diffraction patterns. This approach significantly increases the throughput of p...
متن کاملLow Rank Fourier Ptychography
In this paper, we introduce a principled algorithmic approach for Fourier ptychographic imaging of dynamic, time-varying targets. To the best of our knowledge, this setting has not been explicitly addressed in the ptychography literature. We argue that such a setting is very natural, and that our methods provide an important first step towards helping reduce the sample complexity (and hence acq...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Microscopy
سال: 2017
ISSN: 0022-2720
DOI: 10.1111/jmi.12614