Diffuse reflection imaging at terahertz frequencies for security applications

Author(s):  
P. Dean ◽  
S. Khanna ◽  
S. Chakraborty ◽  
M. Lachab ◽  
A. G. Davies ◽  
...  
Author(s):  
Wanjun Li ◽  
Yujin Liu ◽  
Yuxin Gao ◽  
Zhong Ji ◽  
Yong Fu ◽  
...  

Lead-free perovskites exhibit low toxicity and have been investigated as new active materials for photoconversion applications.


2020 ◽  
Vol 65 (16) ◽  
pp. 1371-1379 ◽  
Author(s):  
Zhong Ji ◽  
Yujin Liu ◽  
Wanjun Li ◽  
Chuanxi Zhao ◽  
Wenjie Mai

2007 ◽  
Vol 17 (02) ◽  
pp. 431-443 ◽  
Author(s):  
ALEXANDER M SINYUKOV ◽  
APARAJITA BANDYOPADHYAY ◽  
AMARTYA SENGUPTA ◽  
ROBERT B BARAT ◽  
DALE E GARY ◽  
...  

Experimental results of homodyne terahertz interferometric 1-D and 2-D imaging are presented. The reconstructed images of a point source are in a good agreement with theoretical predictions. The performance of an N element detector array is imitated by only one detector placed at N positions. Continuous waves at 0.25-0.3 THz are used to detect a metal object behind a barrier. 1-D images of a C-4 sample have been obtained at several terahertz frequencies. Focusing issues of 2-D imaging have been demonstrated. The terahertz interferometric imaging method can be used in defense and security applications to detect concealed weapons, explosives as well as chemical and biological agents.


2008 ◽  
Vol 16 (9) ◽  
pp. 5997 ◽  
Author(s):  
Paul Dean ◽  
Muhammad U. Shaukat ◽  
Suraj P. Khanna ◽  
Subhasish Chakraborty ◽  
Mohammad Lachab ◽  
...  

2015 ◽  
Vol 14 (1) ◽  
Author(s):  
Chen Chen ◽  
Klämpfl Florian ◽  
Kanawade Rajesh ◽  
Riemann Max ◽  
Knipfer Christian ◽  
...  

2019 ◽  
Vol 52 (6) ◽  
pp. 496-502 ◽  
Author(s):  
Susan G. Brouwer de Koning ◽  
Pim Weijtmans ◽  
M. Baris Karakullukcu ◽  
Caifeng Shan ◽  
Elisabeth J. M. Baltussen ◽  
...  

2007 ◽  
Author(s):  
Martin J. Leahy ◽  
Jim O'Doherty ◽  
Paul McNamara ◽  
Joakim Henricson ◽  
Gert E. Nilsson ◽  
...  

2013 ◽  
Vol 5 (1) ◽  
pp. 36-41
Author(s):  
R. Ganesh ◽  
◽  
Ch. Sandeep Reddy ◽  

Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


Sign in / Sign up

Export Citation Format

Share Document