How to break the diffraction limit for infrared light

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Coupling light into optical fibres near the diffraction limit

The burgeoning field of astrophotonics explores the interface between astronomy and photonics. Important applications include photonic OH suppression at near-infrared wavelengths, and integrated photonic spectroscopy. These new photonic mechanisms are not well matched to conventional multi-mode fibre bundles, and are best fed with single or few-mode fibres. We envisage the largest gains in astr...

متن کامل

Superlenses to overcome the diffraction limit.

The imaging resolution of conventional lenses is limited by diffraction. Artificially engineered metamaterials now offer the possibility of building a superlens that overcomes this limit. We review the physics of such superlenses and the theoretical and experimental progress in this rapidly developing field. Superlenses have great potential in applications such as biomedical imaging, optical li...

متن کامل

On the Diffraction Limit for Lensless Imaging

Oakland, MD 21550 The diffraction limit for lensless imaging, defined as the sharpest possible point image obtainable with a pinhole aperture, is analyzed and compared to the corresponding limit for imaging with lenses by means of theoretical considerations and numerical computations using the FresnelLommel diffraction theory for circular apertures. The numerical result (u = p) obtained for the...

متن کامل

High Performance Sub-Diffraction Limit Three Channel Plasmonic Demultiplexer

We have proposed a new ultra-compact optical demultiplexer based on metal-insulator-metal plasmonic waveguides aperture-coupled to the ring resonators. Our proposed device has high performance, small footprint, and high potential for integration and development to more channels.

متن کامل

How to Break EAP-MD5

We propose an efficient attack to recover the passwords, used to authenticate the peer by EAP-MD5, in the IEEE 802.1X network. First, we recover the length of the used password through a method called length recovery attack by on-line queries. Second, we crack the known length password using a rainbow table pre-computed with a fixed challenge, which can be done efficiently with great probabilit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Optik & Photonik

سال: 2011

ISSN: 1863-1460

DOI: 10.1002/opph.201190340