76 research outputs found
Holographic security
This chapter is concerned with the security applications of holographic techniques. Holograms are used in product authentication, product branding and brand protection, and personal and other documents. Serialization to ensure the uniqueness of each hologram for added security is briefly discussed. The theory of optical character recognition and joint transform correlation methods is outlined. Holographic recording using encrypted reference waves enables secure storage of information. Several methods are considered for encrypting optical data as well as holographic recording of encrypted images and their reconstruction and decryption. Millimeter and microwave holographic imaging techniques for the detection of hidden contraband, narcotics, firearms, and explosives are also discussed
An Inequality for the Ratios of the Arithmetic Means of Functions with a Positive Parameter
In the article, an integral inequality for the ratios of the arithmetic means of functions with a positive parameter are obtained, and an open problem, posed by B.-N. Guo and F. Qi in “An algebraic inequality, II, RGMIA Research Report Collection 4 (2001), no. 1, Article 8”, is resolved partially
Notes on Integral Inequalities
Sufficient conditions for an integral inequality posed as an open question by Feng Qi is given, and proof of previously known integral inequalities under weaker hypothesis are obtained
- …