scholarly journals Pupil function design for multifocal confocal, STED,and isoSTED microscopy

2021 ◽  
Author(s):  
Dong-Ryoung Lee ◽  
Joerg Bewersdorf
1989 ◽  
Vol 28 (8) ◽  
pp. 1474 ◽  
Author(s):  
Joseph N. Mait ◽  
William T. Rhodes

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


2021 ◽  
Vol 4 (2) ◽  
pp. 31
Author(s):  
Haoxuan Yu ◽  
Shuai Li

With the continuous development of the mining industry, the world’s major mines have gradually entered the intelligent stage. In intelligent underground mines, the operation roads of the underground transportation equipment are very complicated, and the monitoring and control of the underground traffic have become the problems to be solved in the intelligent underground mines. Therefore, on the basis of solving the practical problems of underground mines, the concept paper discusses the possibility of the communication-based train control (CBTC) system being applied to underground mines through the summary and induction of the related literature. As mining engineers, we have proposed the function design for the CBTC system to solve the problems in underground mine rail transportation, but we still need to continue to work hard for the future development of the underground mines. The concept paper serves as a guide to the Tossing out a brick to get a jade gem, and it has implications for the development and the future of underground mine transportation.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4011
Author(s):  
Chuanwei Yao ◽  
Yibing Shen

The image deconvolution technique can recover potential sharp images from blurred images affected by aberrations. Obtaining the point spread function (PSF) of the imaging system accurately is a prerequisite for robust deconvolution. In this paper, a computational imaging method based on wavefront coding is proposed to reconstruct the wavefront aberration of a photographic system. Firstly, a group of images affected by local aberration is obtained by applying wavefront coding on the optical system’s spectral plane. Then, the PSF is recovered accurately by pupil function synthesis, and finally, the aberration-affected images are recovered by image deconvolution. After aberration correction, the image’s coefficient of variation and mean relative deviation are improved by 60% and 30%, respectively, and the image can reach the limit of resolution of the sensor, as proved by the resolution test board. Meanwhile, the method’s robust anti-noise capability is confirmed through simulation experiments. Through the conversion of the complexity of optical design to a post-processing algorithm, this method offers an economical and efficient strategy for obtaining high-resolution and high-quality images using a simple large-field lens.


Sign in / Sign up

Export Citation Format

Share Document