期刊文献+
共找到41篇文章
< 1 2 3 >
每页显示 20 50 100
Observatory science with eXTP
1
作者 Jean J. M. in 't Zand Enrico Bozzo +103 位作者 JinLu Qu Xiang-Dong Li Lorenzo Amati Yang Chen Immacolata Donnarumma Victor Doroshenko Stephen A. Drake Margarita Hernanz Peter A. Jenke Thomas J. Maccarone Simin Mahmoodifar Domitilla de Martino Alessandra De Rosa Elena M. Rossi Antonia Rowlinson Gloria Sala Giulia Stratta Thomas M. Tauris Joern Wilms XueFeng Wu Ping Zhou Iván Agudo Diego Altamirano Jean-Luc Atteia Nils A. Andersson M. Cristina Baglio David R. Ballantyne Altan Baykal Ehud Behar Tomaso Belloni Sudip Bhattacharyya Stefano Bianchi Anna Bilous Pere Blay Jo ao Braga S?ren Brandt Edward F. Brown Niccolò Bucciantini Luciano Burderi Edward M. Cackett Riccardo Campana Sergio Campana Piergiorgio Casella Yuri Cavecchi Frank Chambers Liang Chen Yu-Peng Chen Jérome Chenevez Maria Chernyakova ChiChuan Jin Riccardo Ciolfi Elisa Costantini Andrew Cumming Antonino D'Aì Zi-Gao Dai Filippo D'Ammando Massimiliano De Pasquale Nathalie Degenaar Melania Del Santo Valerio D'Elia Tiziana Di Salvo Gerry Doyle Maurizio Falanga XiLong Fan Robert D. Ferdman Marco Feroci Federico Fraschetti Duncan K. Galloway Angelo F. Gambino Poshak Gandhi MingYu Ge Bruce Gendre Ramandeep Gill Diego Gotz Christian Gouiffès Paola Grandi Jonathan Granot Manuel Güdel Alexander Heger Craig O. Heinke Jeroen Homan Rosario Iaria Kazushi Iwasawa Luca Izzo Long Ji Peter G. Jonker Jordi José Jelle S. Kaastra Emrah Kalemci Oleg Kargaltsev Nobuyuki Kawai Laurens Keek Stefanie Komossa Ingo Kreykenbohm Lucien Kuiper Devaky Kunneriath Gang Li En-Wei Liang Manuel Linares Francesco Longo FangJun Lu Alexander A. Lutovinov Denys Malyshev Julien Malza 《中国科学:物理学、力学、天文学英文版》 SCIE EI CAS CSCD 2019年第2期97-138,共42页
In this White Paper we present the potential of the enhanced X-ray Timing and Polarimetry (eXTP) mission for studies related toObservatory Science targets. These include flaring stars, supernova remnants, accreting wh... In this White Paper we present the potential of the enhanced X-ray Timing and Polarimetry (eXTP) mission for studies related toObservatory Science targets. These include flaring stars, supernova remnants, accreting white dwarfs, low and high mass X-raybinaries, radio quiet and radio loud active galactic nuclei, tidal disruption events, and gamma-ray bursts. eXTP will be excellentlysuited to study one common aspect of these objects: their often transient nature. Developed by an international Consortium ledby the Institute of High Energy Physics of the Chinese Academy of Science, the eXTP mission is expected to be launched in themid 2020s. 展开更多
关键词 space research instruments nuclear ASTROPHYSICS flare stars ACCRETION and ACCRETION disks mass loss and stellar winds cataclysmic BINARIES X-RAY BINARIES supernova REMNANTS active galactic nuclei X-RAY BURSTS gamma-ray BURSTS gravitational waves
Using Imbalanced Triangle Synthetic Data for Machine Learning Anomaly Detection 预览
2
作者 Menghua Luo Ke Wang +3 位作者 Zhiping Cai Anfeng Liu Yangyang Li Chak Fong Cheang 《计算机、材料和连续体(英文)》 2019年第1期15-26,共12页
The extreme imbalanced data problem is the core issue in anomaly detection.The amount of abnormal data is so small that we cannot get adequate information to analyze it.The mainstream methods focus on taking fully adv... The extreme imbalanced data problem is the core issue in anomaly detection.The amount of abnormal data is so small that we cannot get adequate information to analyze it.The mainstream methods focus on taking fully advantages of the normal data,of which the discrimination method is that the data not belonging to normal data distribution is the anomaly.From the view of data science,we concentrate on the abnormal data and generate artificial abnormal samples by machine learning method.In this kind of technologies,Synthetic Minority Over-sampling Technique and its improved algorithms are representative milestones,which generate synthetic examples randomly in selected line segments.In our work,we break the limitation of line segment and propose an Imbalanced Triangle Synthetic Data method.In theory,our method covers a wider range.In experiment with real world data,our method performs better than the SMOTE and its meliorations. 展开更多
关键词 ANOMALY detection imbalanced DATA SYNTHETIC DATA machine learning
在线阅读 下载PDF
MoM?PO/SBR Algorithm Based on Collaborative Platform and Mixed Model 预览
3
作者 TANG Xiaobin FENG Yuan GONG Xiaoyan 《南京航空航天大学学报:英文版》 EI CSCD 2019年第4期589-598,共10页
For electromagnetic scattering of 3?D complex electrically large conducting targets,a new hybrid algorithm,MoM?PO/SBR algorithm,is presented to realize the interaction of information between method of moment(MoM)and p... For electromagnetic scattering of 3?D complex electrically large conducting targets,a new hybrid algorithm,MoM?PO/SBR algorithm,is presented to realize the interaction of information between method of moment(MoM)and physical optics(PO)/shooting and bouncing ray(SBR).In the algorithm,the COC file that based on the Huygens equivalent principle is introduced,and the conversion interface between the equivalent surface and the target is established.And then,the multi?task flow model presented in this paper is adopted to conduct CPU/graphics processing unit(GPU)tests of the algorithm under three modes,i.e.,MPI/OpenMP,MPI/compute unified device architecture(CUDA)and multi?task programming model(MTPM).Numerical results are presented and compared with reference solutions in order to illustrate the accuracy and the efficiency of the proposed algorithm. 展开更多
关键词 GRAPHICS processing unit(GPU) multi?task PROGRAMMING model(MTPM) physical optics(PO) method of moment(MoM)
在线阅读 下载PDF
RAIM Algorithm Based on Fuzzy Clustering Analysis 预览
4
作者 Shouzhou Gu Jinzhong Bei +4 位作者 Chuang Shi Yaming Dang Zuoya Zheng Congcong Cui 《工程与科学中的计算机建模(英文)》 2019年第5期281-293,共13页
With the development of various navigation systems(such as GLONASS,Galileo,BDS),there is a sharp increase in the number of visible satellites.Accordingly,the probability of multiply gross measurements will increase.Ho... With the development of various navigation systems(such as GLONASS,Galileo,BDS),there is a sharp increase in the number of visible satellites.Accordingly,the probability of multiply gross measurements will increase.However,the conventional RAIM methods are difficult to meet the demands of the navigation system.In order to solve the problem of checking and identify multiple gross errors of receiver autonomous integrity monitoring(RAIM),this paper designed full matrix of single point positioning by QR decomposition,and proposed a new RAIM algorithm based on fuzzy clustering analysis with fuzzy c-means(FCM).And on the condition of single or two gross errors,the performance of hard or fuzzy clustering analysis were compared.As the results of the experiments,the fuzzy clustering method based on FCM principle could detect multiple gross error effectively,also achieved the quality control of single point positioning and ensured better reliability results. 展开更多
关键词 INTEGRITY RAIM FCM single point positioning
在线阅读 下载PDF
Integrating yeast chemical genomics and mammalian cell pathway analysis
5
作者 Fu-lai Zhou Sheena C Li +15 位作者 Yue Zhu Wan-jing Guo Li-jun Shao Justin Nelson Scott Simpkins De-hua Yang Qing Liu Yoko Yashiroda Jin-biao Xu Yao-yue Fan Jian-min Yue Minoru Yoshida Tian Xia Chad L Myers Charles Boone Ming-wei Wang 《中国药理学报:英文版》 SCIE CAS CSCD 2019年第9期1245-1255,共11页
Chemical genomics has been applied extensively to evaluate small molecules that modulate biological processes in Saccharomyces cerevisiae. Here, we use yeast as a surrogate system for studying compounds that are activ... Chemical genomics has been applied extensively to evaluate small molecules that modulate biological processes in Saccharomyces cerevisiae. Here, we use yeast as a surrogate system for studying compounds that are active against metazoan targets. Large-scale chemical-genetic profiling of thousands of synthetic and natural compounds from the Chinese National Compound Library identi?ed those with high-confidence bioprocess target predictions. To discover compounds that have the potential to function like therapeutic agents with known targets, we also analyzed a reference library of approved drugs. Previously uncharacterized compounds with chemical-genetic pro?les resembling existing drugs that modulate autophagy and Wnt/β-catenin signal transduction were further examined in mammalian cells, and new modulators with specific modes of action were validated. This analysis exploits yeast as a general platform for predicting compound bioactivity in mammalian cells. 展开更多
关键词 YEAST chemical GENOMICS TUBULIN CYTOSKELETON assembly AUTOPHAGY WNT/Β-CATENIN signaling pathway
Digital Cancellation Scheme and Hardware Implementation for High-Order Passive Intermodulation Interference Based on Hammerstein Model 预览
6
作者 Xiaqing Miao Lu Tian 《中国通信:英文版》 SCIE CSCD 2019年第9期165-176,共12页
Passive intermodulation(PIM)interference urgently needs to be solved in the satellite communication system,owing to degrading the whole performance.Mainstream research contributions to the cancellation method for PIM ... Passive intermodulation(PIM)interference urgently needs to be solved in the satellite communication system,owing to degrading the whole performance.Mainstream research contributions to the cancellation method for PIM were focused on the analog domain,however,the PIM distortion cannot be eliminated completely with the approaches.Meanwhile,some researchers attempt to tackle the problem through digital signal processing,nevertheless,the proposed methods were not suitable for the practical satellite communication scenario.In this paper,we present a general scheme for the adaptive feedforward PIM cancellation.High-order PIM signals at baseband are estimated by modeling the PIM distortion with Hammerstein model in the digital domain.Based on the reconstructed PIM signal,we adopt the least mean square algorithm to adaptively mitigate the PIM interference for tracking the variation of PIM.The time and frequency synchronization of PIM are based on the correlation of the peak of received signals with the corresponding reconstructed PIM signal.Practical experimental results show that the scheme can effectively cancel the PIM interference,and achieve an interference suppression gain more than 20dB. 展开更多
关键词 SATELLITE communication passiveintermodulation INTERFERENCE DIGITAL CANCELLATION HAMMERSTEIN model
在线阅读 下载PDF
A Distributed ADMM Approach for Collaborative Regression Learning in Edge Computing 预览
7
作者 Yangyang Li Xue Wang +4 位作者 Weiwei Fang Feng Xue Hao Jin Yi Zhang Xianwei Li 《计算机、材料和连续体(英文)》 2019年第5期493-508,共16页
With the recent proliferation of Internet-of-Things(IoT),enormous amount of data are produced by wireless sensors and connected devices at the edge of network.Conventional cloud computing raises serious concerns on co... With the recent proliferation of Internet-of-Things(IoT),enormous amount of data are produced by wireless sensors and connected devices at the edge of network.Conventional cloud computing raises serious concerns on communication latency,bandwidth cost,and data privacy.To address these issues,edge computing has been introduced as a new paradigm that allows computation and analysis to be performed in close proximity with data sources.In this paper,we study how to conduct regression analysis when the training samples are kept private at source devices.Specifically,we consider the lasso regression model that has been widely adopted for prediction and forecasting based on information gathered from sensors.By adopting the Alternating Direction Method of Multipliers(ADMM),we decompose the original regression problem into a set of subproblems,each of which can be solved by an IoT device using its local data information.During the iterative solving process,the participating device only needs to provide some intermediate results to the edge server for lasso training.Extensive experiments based on two datasets are conducted to demonstrate the efficacy and efficiency of our proposed scheme. 展开更多
关键词 Internet-of-Things(IoT) edge computing ADMM lasso
在线阅读 下载PDF
Maximal Cohen-Macaulay modules over a noncommutative 2-dimensional singularity
8
作者 Xiaoshan QIN Yanhua WANG James ZHANG 《中国数学前沿:英文版》 SCIE CSCD 2019年第5期923-940,共18页
We study properties of graded maximal Cohen-Macaulay modules over an N-graded locally finite,Auslander Gorenstein,and Cohen-Macaulay algebra of dimension two.As a consequence,we extend a part of the McKay corresponden... We study properties of graded maximal Cohen-Macaulay modules over an N-graded locally finite,Auslander Gorenstein,and Cohen-Macaulay algebra of dimension two.As a consequence,we extend a part of the McKay correspondence in dimension two to a more general setting. 展开更多
关键词 NONCOMMUTATIVE quasi-resolution Artin-Schelter regular algebra MAXIMAL COHEN-MACAULAY module pretzeled QUIVERS
A revised CVSS-based system to improve the dispersion of vulnerability risk scores
9
作者 Chensi WU Tao WEN Yuqing ZHANG 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2019年第3期189-191,共3页
Dear editor,We propose a new vulnerability risk assessment system,CVSS.PCA,for improving CVSS based on principal component analysis(PCA)[1].With the increasing number of security vulnerabilities,vulnerability risk mea... Dear editor,We propose a new vulnerability risk assessment system,CVSS.PCA,for improving CVSS based on principal component analysis(PCA)[1].With the increasing number of security vulnerabilities,vulnerability risk measurement becomes more significant.For a qua nt itative evaluation system,vulnerability risk scores should be sufficiently subdivided.The process of quantitative security vulnerability assessment inchides:choosing metrics to reflect the impact of the vulnerability,assigning value to these metrics,and integrating these metrics in order to gain the risk score of vulnerability. 展开更多
关键词 EDITOR SYSTEM process
Micro-Scanning Error Correction Technique for an Optical Micro-Scanning Thermal Microscope Imaging System 预览
10
作者 Meijing Gao Ying Han +3 位作者 Qiushi Geng Yong Zhao Bozhi Zhang Liuzhu Wang 《北京理工大学学报:英文版》 EI CAS 2019年第3期510-518,共9页
An error correction technique for the micro-scanning instrument of the optical micro-scanning thermal microscope imaging system is proposed. The technique is based on micro-scanning technology combined with the propos... An error correction technique for the micro-scanning instrument of the optical micro-scanning thermal microscope imaging system is proposed. The technique is based on micro-scanning technology combined with the proposed second-order oversampling reconstruction algorithm and local gradient image reconstruction algorithm. In this paper, we describe the local gradient image reconstruction model, the error correction technique, down-sampling model and the error correction principle. In this paper, we use a Lena original image and four low-resolution images obtained from the standard half-pixel displacement to simulate and verify the effectiveness of the proposed technique. In order to verify the effectiveness of the proposed technique, two groups of low-resolution thermal microscope images are collected by the actual thermal microscope imaging system for experimental study. Simulations and experiments show that the proposed technique can reduce the optical micro-scanning errors, improve the imaging effect of the system and improve the system's spatial resolution. It can be applied to other electro-optical imaging systems to improve their resolution. 展开更多
关键词 thermal microscope imaging system OPTICAL micro-scanning local gradient image RECONSTRUCTION second-order OVERSAMPLING RECONSTRUCTION spatial resolution
在线阅读 免费下载
Trajectory optimization for RLV in TAEM phase using adaptive Gauss pseudospectral method
11
作者 Qi DONG Chaofan ZHANG 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2019年第1期55-57,共3页
Dear editor,With the development of space technology,the trajectory optimization for reusable launch vehicle(RLV) in terminal area energy management(TAEM)phase has aroused increasing attention among researchers becaus... Dear editor,With the development of space technology,the trajectory optimization for reusable launch vehicle(RLV) in terminal area energy management(TAEM)phase has aroused increasing attention among researchers because of its nonlinearity and complex path constraints.TAEM phase starts from the terminal entry point(TEP)with an altitude of 30 km and velocity of 3 Ma.and ends at the approach and landing interface(ALI)with an altitude of 3 km and velocity of 0.5 Ma [1]. 展开更多
关键词 RLV TAEM
Hollow-core fiber-based Raman probe extension kit for in situ and sensitive ultramicro-analysis
12
作者 蔡昊 喻杏涛 +3 位作者 储倩 金志强 蔺博 王光辉 《中国光学快报:英文版》 SCIE EI CAS CSCD 2019年第11期1-5,共5页
A metal-lined hollow-core fiber-based Raman probe extension kit is proposed in this Letter for in situ and sensitive ultramicro-analysis. A hollow-core fiber can confine light and fluid samples in its hollow core, wit... A metal-lined hollow-core fiber-based Raman probe extension kit is proposed in this Letter for in situ and sensitive ultramicro-analysis. A hollow-core fiber can confine light and fluid samples in its hollow core, with enhanced light–sample interaction. By using a homemade light coupling device with a glass window for liquid isolation, a 3.5-cm-long hollow-core fiber could mount on and connect to a Raman probe, with perfect light coupling efficiency. After full filling the hollow-core fiber chamber with a volume of 13 μL by using a syringe pump, it can act as an extension kit for an ordinary Raman probe and be used as a ultramicro-analysis tool for the sample of microfluidic chips. In order to enhance its sensitivity, a gold film coated fiber tip is inserted into the capillary, which can double the Raman signal received by reflecting pump light and Raman light. Finally, a detection limit of 5% for ethanol solution and an enhancement factor of two compared with direct detection of bulk sample volume are demonstrated. Above all, our device can be utilized as a Raman probe extension kit, which is suitable for rapid, sensitive, and in situ measurements for a few microliter level samples. 展开更多
关键词 fiber PUMP EXTENSION
Qualitative analysis for state/event fault trees using formal model checking 预览
13
作者 JIANG Quan ZHU Chunling WANG Siqi 《系统工程与电子技术:英文版》 SCIE EI CSCD 2019年第5期959-973,共15页
A state/event fault tree(SEFT)is a modeling technique for describing the causal chains of events leading to failure in software-controlled complex systems.Such systems are ubiquitous in all areas of everyday life,and ... A state/event fault tree(SEFT)is a modeling technique for describing the causal chains of events leading to failure in software-controlled complex systems.Such systems are ubiquitous in all areas of everyday life,and safety and reliability analyses are increasingly required for these systems.SEFTs combine elements from the traditional fault tree with elements from state-based techniques.In the context of the real-time safety-critical systems,SEFTs do not describe the time properties and important timedependent system behaviors that can lead to system failures.Further,SEFTs lack the precise semantics required for formally modeling time behaviors.In this paper,we present a qualitative analysis method for SEFTs based on transformation from SEFT to timed automata(TA),and use the model checker UPPAAL to verify system requirements’properties.The combination of SEFT and TA is an important step towards an integrated design and verification process for real-time safety-critical systems.Finally,we present a case study of a powerboat autopilot system to confirm our method is viable and valid after achieving the verification goal step by step. 展开更多
关键词 state/event fault tree (SEFT) TIMED AUTOMATA (TA) model transformation safety analysis
在线阅读 下载PDF
Securing Display Path for Security-Sensitive Applications on Mobile Devices 预览
14
作者 Jinhua Cui Yuanyuan Zhang +2 位作者 Zhiping Cai Anfeng Liu Yangyang Li 《计算机、材料和连续体(英文)》 2018年第4期17-35,共19页
While smart devices based on ARM processor bring us a lot of convenience,they also become an attractive target of cyber-attacks.The threat is exaggerated as commodity OSes usually have a large code base and suffer fro... While smart devices based on ARM processor bring us a lot of convenience,they also become an attractive target of cyber-attacks.The threat is exaggerated as commodity OSes usually have a large code base and suffer from various software vulnerabilities.Nowadays,adversaries prefer to steal sensitive data by leaking the content of display output by a security-sensitive application.A promising solution is to exploit the hardware visualization extensions provided by modern ARM processors to construct a secure display path between the applications and the display device.In this work,we present a scheme named SecDisplay for trusted display service,it protects sensitive data displayed from being stolen or tampered surreptitiously by a compromised OS.The TCB of SecDisplay mainly consists of a tiny hypervisor and a super light-weight rendering painter,and has only~1400 lines of code.We implemented a prototype of SecDisplay and evaluated its performance overhead.The results show that SecDisplay only incurs an average drop of 3.4%. 展开更多
关键词 Mobile device secure display VIRTUALIZATION trusted computing base display path trust anchor
在线阅读 下载PDF
Preliminary experimental study on applicability of Lorentz force velocimetry in an external magnetic field 预览
15
作者 Yan-Qing Tan Run-Cong Liu +6 位作者 Shang-Jun Dai Xiao-Dong Wang Ming-Jiu Ni Juan-Cheng Yang Nataliia Dubovikova Yurii Kolesnikov Christian Karcher 《核技术:英文版》 SCIE CAS CSCD 2018年第6期28-35,共8页
关键词 LORENTZ 外部磁场 试验性 适用性 学习 设备操作 永久磁铁 测量基
在线阅读 下载PDF
New Method for Computer Identification Through Electromagnetic Radiation 预览
16
作者 Jun Shi Zhujun Zhang +3 位作者 Yangyang Li Rui Wang Hao Shi Xile Li 《计算机、材料和连续体(英文)》 2018年第10期69-80,共12页
The electromagnetic waves emitted from devices can be a source of information leakage and can cause electromagnetic compatibility(EMC)problems.Electromagnetic radiation signals from computer displays can be a security... The electromagnetic waves emitted from devices can be a source of information leakage and can cause electromagnetic compatibility(EMC)problems.Electromagnetic radiation signals from computer displays can be a security risk if they are intercepted and reconstructed.In addition,the leaks may reveal the hardware information of the computer,which is more important for some attackers,protectors and security inspection workers.In this paper,we propose a statistical distribution based algorithm(SD algorithm)to extracted eigenvalues from electromagnetic radiate video signals,and then classified computers by using classifier based on Bayesian and SVM.We can identify computers automatically and accurately through electromagnetic radiation by using the algorithm in our experiment environment. 展开更多
关键词 COMPUTER HARDWARE ELECTROMAGNETIC
在线阅读 下载PDF
Coordinated Resource Allocation for Satellite-Terrestrial Coexistence Based on Radio Maps 预览
17
作者 Yanmin Wang Zhou Lu 《中国通信:英文版》 SCIE CSCD 2018年第3期149-156,共8页
关键词 卫星通讯系统 资源分配 收音机 陆上 共存 地图 无线通讯系统 天线系统
在线阅读 下载PDF
Joint Subcarrier and Power Allocation for DF-Based Multiuser Two-Way Relay Networks 预览
18
作者 Xiang Chen Fei He +1 位作者 Limin Xiao Shidong Zhou 《中国通信:英文版》 SCIE CSCD 2017年第6期179-188,共10页
Two-way decode-and-forward(DF) relay technique is an efficient method to improve system performance in 5G networks.However,traditional orthogonal frequency division multiplexing(OFDM) based two-way relay systems only ... Two-way decode-and-forward(DF) relay technique is an efficient method to improve system performance in 5G networks.However,traditional orthogonal frequency division multiplexing(OFDM) based two-way relay systems only consider a per-subcarrier relay strategy,which treats each subcarrier as a separate channel,which results in significant sum rate loss,especially in fading environments.In this paper,a joint coding scheme over multiple subcarriers is involved for multipair users in two-way relay systems to obtain multiuser diversity.A generalized subcarrier pairing strategy is proposed to permit each user-pair to occupy different subcarriers during the two transmission phases,i.e.,the multiple access and broadcast phases.Moreover,a low complexity joint resource allocation scheme is proposed to improve the spectrum efficiency with an additional multi-user diversity gain.Some numerical simulations are finally provided to verify the efficacy of our proposal. 展开更多
关键词 多用户分集 中继技术 网络系统 子载波 功率分配 正交频分复用 中继系统 高频谱效率
在线阅读 下载PDF
Wavefront reconstruction algorithm for wavefront sensing based on binary aberration modes
19
作者 庞博清 王帅 +3 位作者 程涛 孔庆峰 文良华 杨平 《中国物理B:英文版》 SCIE EI CAS CSCD 2017年第5期153-159,共7页
We propose a new algorithm for wavefront sensing based on binary intensity modulation. The algorithm is based on the fact that a wavefront can be expended with a series of orthogonal and binary functions, the Walsh se... We propose a new algorithm for wavefront sensing based on binary intensity modulation. The algorithm is based on the fact that a wavefront can be expended with a series of orthogonal and binary functions, the Walsh series. We use a spatial light modulator(SLM) to produce different binary-intensity-modulation patterns which are the simple linear transformation of the Walsh series. The optical fields under different binary-intensity-modulation patterns are detected with a photodiode.The relationships between the incident wavefront modulated with the patterns and their optical fields are built to determinate the coefficients of the Walsh series. More detailed and strict relationship equations are established with the algorithm by adding new modulation patterns according to the properties of the Walsh functions. An exact value can be acquired by solving the equations. Finally, with the help of phase unwrapping and smoothing, the wavefront can be reconstructed. The advantage of the algorithm is providing an analytical solution for the coefficients of the Walsh series to reconstruct the wavefront. The simulation experiments are presented and the effectiveness of the algorithm is demonstrated. 展开更多
关键词 波前检测 重建算法 沃尔什级数 沃尔什函数 调制模式 差模 二值 强度调制
Double-threshold technique for achieving denoising in compressive imaging applications
20
作者 王超 姚旭日 赵清 《中国光学快报:英文版》 SCIE EI CAS CSCD 2017年第12期38-42,共5页
上一页 1 2 3 下一页 到第
使用帮助 返回顶部 意见反馈