How to break the diffraction limit for infrared light
نویسندگان
چکیده
منابع مشابه
Coupling light into optical fibres near the diffraction limit
The burgeoning field of astrophotonics explores the interface between astronomy and photonics. Important applications include photonic OH suppression at near-infrared wavelengths, and integrated photonic spectroscopy. These new photonic mechanisms are not well matched to conventional multi-mode fibre bundles, and are best fed with single or few-mode fibres. We envisage the largest gains in astr...
متن کاملSuperlenses to overcome the diffraction limit.
The imaging resolution of conventional lenses is limited by diffraction. Artificially engineered metamaterials now offer the possibility of building a superlens that overcomes this limit. We review the physics of such superlenses and the theoretical and experimental progress in this rapidly developing field. Superlenses have great potential in applications such as biomedical imaging, optical li...
متن کاملOn the Diffraction Limit for Lensless Imaging
Oakland, MD 21550 The diffraction limit for lensless imaging, defined as the sharpest possible point image obtainable with a pinhole aperture, is analyzed and compared to the corresponding limit for imaging with lenses by means of theoretical considerations and numerical computations using the FresnelLommel diffraction theory for circular apertures. The numerical result (u = p) obtained for the...
متن کاملHigh Performance Sub-Diffraction Limit Three Channel Plasmonic Demultiplexer
We have proposed a new ultra-compact optical demultiplexer based on metal-insulator-metal plasmonic waveguides aperture-coupled to the ring resonators. Our proposed device has high performance, small footprint, and high potential for integration and development to more channels.
متن کاملHow to Break EAP-MD5
We propose an efficient attack to recover the passwords, used to authenticate the peer by EAP-MD5, in the IEEE 802.1X network. First, we recover the length of the used password through a method called length recovery attack by on-line queries. Second, we crack the known length password using a rainbow table pre-computed with a fixed challenge, which can be done efficiently with great probabilit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Optik & Photonik
سال: 2011
ISSN: 1863-1460
DOI: 10.1002/opph.201190340