76 research outputs found

    Holographic security

    Get PDF
    This chapter is concerned with the security applications of holographic techniques. Holograms are used in product authentication, product branding and brand protection, and personal and other documents. Serialization to ensure the uniqueness of each hologram for added security is briefly discussed. The theory of optical character recognition and joint transform correlation methods is outlined. Holographic recording using encrypted reference waves enables secure storage of information. Several methods are considered for encrypting optical data as well as holographic recording of encrypted images and their reconstruction and decryption. Millimeter and microwave holographic imaging techniques for the detection of hidden contraband, narcotics, firearms, and explosives are also discussed

    An Inequality for the Ratios of the Arithmetic Means of Functions with a Positive Parameter

    Get PDF
    In the article, an integral inequality for the ratios of the arithmetic means of functions with a positive parameter are obtained, and an open problem, posed by B.-N. Guo and F. Qi in “An algebraic inequality, II, RGMIA Research Report Collection 4 (2001), no. 1, Article 8”, is resolved partially

    Notes on Integral Inequalities

    No full text
    Sufficient conditions for an integral inequality posed as an open question by Feng Qi is given, and proof of previously known integral inequalities under weaker hypothesis are obtained

    HPV-Impfungen globalisieren: Mobile therapeutische Normen

    Full text link
    corecore