Results 11 to 20 of about 36,249 (243)

High-accuracy phase demodulation method compatible to closed fringes in a single-frame interferogram based on deep learning.

open access: yesOptics Express, 2021
Interferogram demodulation is a fundamental problem in optical interferometry. It is still challenging to obtain high-accuracy phases from a single-frame interferogram that contains closed fringes.
Shizhu Yuan   +3 more
semanticscholar   +1 more source

Automatic Interferogram Selection for SBAS-InSAR Based on Deep Convolutional Neural Networks

open access: yesRemote Sensing, 2021
The small baseline subset of spaceborne interferometric synthetic aperture radar (SBAS-InSAR) technology has become a classical method for monitoring slow deformations through time series analysis with an accuracy in the centimeter or even millimeter ...
Yufang He   +3 more
semanticscholar   +1 more source

Quantitative Determination of Surface Morphology of Red Blood Cell

open access: yesJournal of Advanced Research in Natural and Applied Sciences, 2023
In this study, the determination of the surface morphology of red blood cell (RBC) from interferogram image obtained by quantitative phase imaging (QPI) method is presented. QPI, is an optical measurement method frequently used in recent years, allows to
Özlem Kocahan Yılmaz
doaj   +1 more source

Optoelectronic Device for Measuring Radio Signal Samples and Evaluating Its Accuracy Characteristics

open access: yesEng, 2023
When using quadrature signals in radio channels, flat and selective fading, multipath radio reception, intersymbol interference, and jitter occur.
Olga A. Safaryan   +3 more
doaj   +1 more source

New Interferometric Phase Unwrapping Method Based on Energy Minimization From Contextual Modeling

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2020
Two-dimensional phase unwrapping is a critical processing procedure of synthetic aperture radar interferometry. This operation becomes even more difficult in the presence of noise.
Ayoub Tlili   +3 more
doaj   +1 more source

Photolithographic fabrication method of computer-generated holographic interferograms [PDF]

open access: yes, 1989
We consider the fabrication of high-quality interferogram-type diffractive optical elements with conventional photolithographic techniques and compare the results with those achievable with electron-beam lithography. The fringes associated with the phase
Byckling, Eero   +6 more
core   +1 more source

Wavelength-scale stationary-wave integrated Fourier-transform spectrometry [PDF]

open access: yes, 2007
Spectrometry is a general physical-analysis approach for investigating light-matter interactions. However, the complex designs of existing spectrometers render them resistant to simplification and miniaturization, both of which are vital for applications
A Bruyant   +28 more
core   +4 more sources

Three-Dimensional Modeling of Sound Field Holograms of a Moving Source in the Presence of Internal Waves Causing Horizontal Refraction

open access: yesJournal of Marine Science and Engineering, 2023
In this paper, we study the variations of holograms of a moving source in an inhomogeneous ocean waveguide. It is assumed that intense internal waves (internal solitons) are the reason for the inhomogeneities of the shallow water waveguide.
Sergey Pereselkov   +5 more
doaj   +1 more source

Some thoughts on the use of InSAR data to constrain models of surface deformation: Noise structure and data downsampling [PDF]

open access: yes, 2005
Repeat-pass Interferometric Synthetic Aperture Radar (InSAR) provides spatially dense maps of surface deformation with potentially tens of millions of data points. Here we estimate the actual covariance structure of noise in InSAR data.
Lohman, Rowena B., Simons, Mark
core   +2 more sources

Number of Pixel Change Rate and Unified Average Changing Intensity for Sensitivity Analysis of Encrypted inSAR Interferogram

open access: yesIngénierie des Systèmes d Inf., 2020
The transmission of images from satellites to earth is on the brink of many threats which can affect the confidentiality of the data as well as its quality. Several encryption algorithms are used to secure the transmitted images.
R. Saidi   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy