• Title/Summary/Keyword: Phase encoding

Search Result 157, Processing Time 0.024 seconds

Realization of the multi-phase level CGH according to the multi-channel encoding method using a PAL-SLM (PAL-SLM을 이용한 다채널 부호화 방법에 따른 다위상형 CGH의 광학적 구현)

  • Jung, Jong-Rae;Baek, Woon-Sik;Kim, Jung-Hoi;Kim, Nam
    • Korean Journal of Optics and Photonics
    • /
    • v.15 no.4
    • /
    • pp.299-308
    • /
    • 2004
  • We proposed more efficient encoding methods that can design a multi-channel multi-level phase only computer-generated hologram(CGH) that can reconstruct many objects simultaneously without a conjugate image. We used a fabrication technique for the pixel oriented CGH for designing the pattern of the proposed multi-channel CGH. We investigated the difference of the optical efficiency(η), mean square error(MSE) and signal-to-noise ratio(SNR) of multi-channel CGHs that were designed by three kinds of encoding methods according to the number of quantization phase levels, and we estimated the performance of the pattern of the proposed multi-channel CGH. Generally, as the number of input objects' reference patterns stored in the CGH is increased, the reconstruction quality of the CGH is degraded. But we observed through computer simulation that the diffraction efficiency of the 1-ch CGH is 70%, and those of the 2-ch, 4-ch, 8-ch CGHs are 62%, 62% and 63%. Therefore we found that the diffraction efficiencies of the multi-channel CGHs using the newly proposed encoding method are similar to that of 1-ch CGH. We implemented the CGH optically using a liquid crystal spatial light phase modulator that consisted of a PAL-SLM efficiently coupled with a XGA type LCD by an optical lens and an LD for illuminating the LCD. We discussed the output images that are reconstructed from the PAL-SLM.

Nrf2 and Keap1 Regulation of Antioxidant and Phase II Enzyme Genes

  • Yamamoto, M.
    • Proceedings of the Korean Society of Toxicology Conference
    • /
    • 2002.05a
    • /
    • pp.24-42
    • /
    • 2002
  • Antioxidant responsive element (ARE) mediates the transcriptional activation of the genes encoding phase II drug metabolizing enzymes and antioxidative stress genes. The ARE consensus sequence shows high similarity to NF-E2 binding sequence, a cisacting erythroid gene regulatory element.(omitted)

  • PDF

An Efficient Multicasting Algorithm and Its Performance Evaluation in Multistage Interconnection Networks (다단계 상호연결망에서 효율적인 멀티캐스팅 알고리즘과 성능 평가)

  • Kim, Jin-Soo;Chang, Jung-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.2
    • /
    • pp.84-92
    • /
    • 2006
  • In this paper, we propose an efficient multicasting algorithm in multistage interconnection networks (MIN's) employing the region encoding scheme. The proposed algorithm uses the recursive scheme to recycle a multicast message at most two times through MIN, in order to send it to its desired destinations. It is composed of two recycling phases which are the copying phase and the routing phase of the multicast message. In the first phase, a source sends the message to a region that contains the largest number of destination regions, and destinations in these regions receive and store the message in this phase. The remaining destinations can finally receive the message in the second phase. This method of the algorithm can improve its performance by reducing the delay of message and the volume of traffic. Moreover, we evaluate the performance of our algorithm in terms of the average number of recycling and the number of internal links used per destination, comparing with the previously proposed algorithm.

  • PDF

A NMF-Based Speech Enhancement Method Using a Prior Time Varying Information and Gain Function (시간 변화에 따른 사전 정보와 이득 함수를 적용한 NMF 기반 음성 향상 기법)

  • Kwon, Kisoo;Jin, Yu Gwang;Bae, Soo Hyun;Kim, Nam Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.6
    • /
    • pp.503-511
    • /
    • 2013
  • This paper presents a speech enhancement method using non-negative matrix factorization. In training phase, we can obtain each basis matrix from speech and specific noise database. After training phase, the noisy signal is separated from the speech and noise estimate using basis matrix in enhancement phase. In order to improve the performance, we model the change of encoding matrix from training phase to enhancement phase using independent Gaussian distribution models, and then use the constraint of the objective function almost same as that of the above Gaussian models. Also, we perform a smoothing operation to the encoding matrix by taking into account previous value. Last, we apply the Log-Spectral Amplitude type algorithm as gain function.

Encrypted holographic storage using double-phase encoding technique

  • Vu, Tien-Viet;Kim, Nam;Jeon, Seok-Hui
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2007.07a
    • /
    • pp.229-230
    • /
    • 2007
  • Several encryption techniques were successfully applied to secure holographic memory systems.[1,2] In these systems the reference beam, object beam, or both can be encoded optically. Optics provides many degrees of freedom with which the optical beam may be encoded, such as amplitude, phase, wavelength, and polarization.

  • PDF

Image Security and Personal Identification using CGH and Phase Mask (CGH와 위상 마스크를 이용한 영상 보안 및 개인 인증)

  • 김종윤;박세준;김종찬;김철수;조웅호;김수중
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.958-961
    • /
    • 1999
  • A new image encoding and identification scheme is proposed for security verification by using CGH(computer generated hologram), random phase mask, and correlation technique. The encrypted image, which is attached to the security product, is made by multiplying QPH(quadratic phase hologram) using SA(simulated annealing) algorithm with a random phase function. The random phase function plays a role of key when the encrypted image is decrypted. The encrypted image could be optically recovered by 2-f system and automatically verified for personal identification. Simulation results show the proposed method cand be used for the reconstruction and the recognition of the encrypted. Image.

  • PDF

Parabolic mirror test using Computer Generated Hologram (Computer Generated Hologram을 이용한 포물명경 형상측정)

  • 김성하;곽종훈;최옥신;송재봉;이윤우;이인원
    • Korean Journal of Optics and Photonics
    • /
    • v.11 no.2
    • /
    • pp.80-84
    • /
    • 2000
  • Parabolic almninium mlITOr of m.5('||'&'||'cent; 50 nun) was fabncated by a diamond tummg machine. Computer generated hologram (CGH) for the test of parabolic mirror was encoded by binary phase hologram Approximation of curved fringe to line was made by staircase encoding. After fringe data 1ransformed mto a Post Scnpt file. magnified master CGH was printed by a laser printer, and then it reduced to the photographIc film. Parabolic mirror was tested by Twyman-Green interferometer with CGH at VIewing arm. Its experimental result was compared with those of surface profile and auto-collimatIon test, and then the errors were analyzed.

  • PDF

Practical Encryption and Decryption System using Iterative Phase Wrapping Method (반복적인 위상 랩핑 방법을 이용한 실질적인 암호화 및 복호화 시스템)

  • Seo, Dong-Hoan;Lee, Sung-Geun;Kim, Yoon-Sik
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.32 no.6
    • /
    • pp.955-963
    • /
    • 2008
  • In this paper, we propose an improved practical encryption and fault-tolerance decryption method using a non-negative value key and random function obtained with a white noise by using iterative phase wrapping method. A phase wrapping operating key, which is generated by the product of arbitrary random phase images and an original phase image. is zero-padded and Fourier transformed. Fourier operating key is then obtained by taking the real-valued data from this Fourier transformed image. Also the random phase wrapping operating key is made from these arbitrary random phase images and the same iterative phase wrapping method. We obtain a Fourier random operating key through the same method in the encryption process. For practical transmission of encryption and decryption keys via Internet, these keys should be intensity maps with non-negative values. The encryption key and the decryption key to meet this requirement are generated by the addition of the absolute of its minimum value to each of Fourier keys, respectively. The decryption based on 2-f setup with spatial filter is simply performed by the inverse Fourier transform of the multiplication between the encryption key and the decryption key and also can be used as a current spatial light modulator technology by phase encoding of the non-negative values. Computer simulations show the validity of the encryption method and the robust decryption system in the proposed technique.

Image Authentication Using Only Partial Phase Information from a Double-Random-Phase-Encrypted Image in the Fresnel Domain

  • Zheng, Jiecai;Li, Xueqing
    • Journal of the Optical Society of Korea
    • /
    • v.19 no.3
    • /
    • pp.241-247
    • /
    • 2015
  • The double-random phase encryption (DRPE) algorithm is a robust technique for image encryption, due to its high speed and encoding a primary image to stationary white noise. Recently it was reported that DRPE in the Fresnel domain can achieve a better avalanche effect than that in Fourier domain, which means DRPE in the Fresnel domain is much safer, to some extent. Consequently, a method based on DRPE in the Fresnel domain would be a good choice. In this paper we present an image-authentication method which uses only partial phase information from a double-random-phase-encrypted image in the Fresnel domain. In this method, only part of the phase information of an image encrypted with DRPE in the Fresnel domain needs to be kept, while other information like amplitude values can be eliminated. Then, with the correct phase keys (we do not consider wavelength and distance as keys here) and a nonlinear correlation algorithm, the encrypted image can be authenticated. Experimental results demonstrate that the encrypted images can be successfully authenticated with this partial phase plus nonlinear correlation technique.