http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Influence of Atmospheric Turbulence Channel on a Ghost-imaging Transmission System
Wang, Kaimin,Wang, Zhaorui,Zhang, Leihong,Kang, Yi,Ye, Hualong,Hu, Jiafeng,Xu, Jiaming Optical Society of Korea 2020 Current Optics and Photonics Vol.4 No.1
We research a system of compressed-sensing computational ghost imaging (CSCGI) based on the intensity fluctuation brought by turbulence. In this system, we used the gamma-gamma intensity-fluctuation model, which is commonly used in transmission systems, to simulate the CSCGI system. By setting proper values of the parameters such as transmission distance, refractive-index structure parameter, and sampling rates, the peak signal-to-noise ratio (PSNR) performance and bit-error rate (BER) performance are obtained to evaluate the imaging quality, which provides a theoretical model to further research the ghost-imaging algorithm.
Influence of Atmospheric Turbulence Channel on a Ghost-imaging Transmission System
Kaimin Wang,Zhaorui Wang,Leihong Zhang,Yi Kang,Hualong Ye,Jiafeng Hu,Jiaming Xu 한국광학회 2020 Current Optics and Photonics Vol.4 No.1
We research a system of compressed-sensing computational ghost imaging (CSCGI) based on the intensity fluctuation brought by turbulence. In this system, we used the gamma-gamma intensity-fluctuation model, which is commonly used in transmission systems, to simulate the CSCGI system. By setting proper values of the parameters such as transmission distance, refractive-index structure parameter, and sampling rates, the peak signal-to-noise ratio (PSNR) performance and bit-error rate (BER) performance are obtained to evaluate the imaging quality, which provides a theoretical model to further research the ghost-imaging algorithm.
A Ghost-Imaging System Based on a Microfluidic Chip
Kaimin Wang,Xiaoxuan Han,Hualong Ye,Zhaorui Wang,Leihong Zhang,Jiafeng Hu,Meiyong Xu,Xiangjun Xin,Dawei Zhang 한국광학회 2021 Current Optics and Photonics Vol.5 No.2
Microfluidic chip technology is a research focus in biology, chemistry, and medicine, for example. However, microfluidic chips are rarely applied in imaging, especially in ghost imaging. Thus in this work we propose a ghost-imaging system, in which we deploy a novel microfluidic chip modulator (MCM) constructed of double-layer zigzag micro pipelines. While in traditional situations a spatial light modulator (SLM) and supporting computers are required, we can get rid of active modulation devices and computers with this proposed scheme. The corresponding simulation analysis verifies good feasibility of the scheme, which can ensure the quality of data transmission and achieve convenient, fast ghost imaging passively.
Peiming Zhang,Yahui Su,Yiqiang Zhang,Leihong Zhang,Runchu Xu,Kaimin Wang,Dawei Zhang 한국광학회 2023 Current Optics and Photonics Vol.7 No.4
Optical information processing technology is characterized by high speed and parallelism, and the light features short wavelength and large information capacity; At the same time, it has various attributes including amplitude, phase, wavelength and polarization, and is a carrier of multi-dimensional information. Therefore, optical encryption is of great significance in the field of information security transmission, and is widely used in the field of image encryption. For multi-image encryption, this paper proposes a multi-image encryption algorithm based on a modified Gerchberg–Saxton algorithm (MGSA) in the Fresnel-transform domain and computational ghost imaging. First, MGSA is used to realize “one code, one key”; Second, phase function superposition and normalization are used to reduce the amount of ciphertext transmission; Finally, computational ghost imaging is used to improve the security of the whole encryption system. This method can encrypt multiple images simultaneously with high efficiency, simple calculation, safety and reliability, and less data transmission. The encryption effect of the method is evaluated by using correlation coefficient and structural similarity, and the effectiveness and security of the method are verified by simulation experiments.