KEYWORDS: Solar energy, Holography, Lenses, Solar cells, Sunlight, Solar radiation, Photovoltaics, Gelatin, Solar thermal energy, Holographic materials
This paper provides a broad overview of historical and current developments of holographic lenses (HLs) in concentrating solar power. The review focuses on the recording material typically employed for HLs in concentrating solar photovoltaic and/or concentrating solar thermal collectors. This review shows that the use of HLs for energy transformation, achieves high performance efficiency in the designed physical systems, furthermore, some important elements to consider for future designs are presented, especially those related to the etching material of the HLs. Finally, the article outlines future recommendations, emphasizing potential research opportunities and challenges for researchers entering the field of photovoltaic and/or concentrating solar thermal collectors based on HLs.
The possibility of using lasers diodes and a fiber optic trifurcated for the evaluation of the power optic absorbed on coals samples is studied. The method is based on scanning of samples using lasers diodes with the wavelengths 632,8nm, 532nm, 405nm, and calibration plots of the reflected luminosity of the selection as function of the absorbance of coals. In this paper we showed the calibration plots and the colorimetric parameters of coals calculated from the absorption or diffuse-reflectance. The advantages of the method are its high performance for estimating the colorimetric parameters of coals samples, quality control of industrial processes and classification of coals.
We present several joint transform correlator (JTC) architectures for nonlinear images encryption, decryption and authentication systems. These JTC architectures are developed in different processing domains, such as Fourier, Fractional Fourier, Fresnel and Gyrator domains. Some of these processing domains can add new security keys in order to improve the security of the images encryption, decryption and authentication systems. In this work, we review and present recent nonlinear modifications of encryption decryption and authentication systems based on JTC architecture that allow to significantly increase the quality of the retrieved image after information decryption, and to achieve a high security level against a variety of system attacks.
We present the results of the noise and occlusion tests in the Gyrator domain (GD) for a joint transform correlator-based encryption system. This encryption system was recently proposed and it was implemented by using a fully phase nonzero-order joint transform correlator (JTC) and the Gyrator transform (GT). The decryption system was based on two successive GTs. In this paper, we make several numerical simulations in order to test the performance and robustness of the JTC-based encryption-decryption system in the GD when the encrypted image is corrupted by noise or occlusion. The encrypted image is affected by additive and multiplicative noise. We also test the effect of data loss due to partial occlusion of the encrypted information. Finally, we evaluate the performance and robustness of the encryption-decryption system in the GD by using the metric of the root mean square error (RMSE) between the original image and the decrypted image when the encrypted image is degraded by noise or modified by occlusion.
A new method for double image encryption based on the fractional Hartley transform (FrHT) and the Arnold transform (AT) is proposed in this work. The encryption method encodes the first input image in amplitude and the second input image is encoded in phase, in order to define a complex image. This complex image is successively four times transformed using FrHT and AT, and the resulting complex image represents the encrypted image. The decryption method is the same method as the encryption method applied in the inverse sense. The AT is a process of image shearing and stitching in which pixels of the image are rearranged. This AT is used in the encryption method with the purpose of spreading the information content of the two input images onto the encrypted image and to increase the security of the encrypted image. The fractional orders of the FrHTs and the parameters of the ATs correspond to the keys of the encryption-decryption method. Only when all of those keys are correct in the decryption method, the two original images can be recovered. We present digital results that confirm our approach.
In this work an image encryption-decryption system is developed using Gyrator transform (GT) and Jigsaw transform (JT). The encryption system uses two successive GTs and JTs, in order to convert a real image to a real noisy encrypted image. The decryption system is an inverse system with respect to the encryption system. The real image to be encrypted is preprocessed with the purpose of obtaining a real encrypted image, this real encrypted image has the same size as the original image to be encrypted and it is much more convenient for either its storage or transmission. The JT is applied to eliminate the random phase mask used in many encryption systems based on double random phase mask and to increase the security of the encryption-decryption system proposed in this work. Finally, in order to verify the performance of the encryption-decryption system, a digital algorithm was developed. There are four keys used in the encryption-decryption algorithm, which are constituted by the two GTs rotation angles and the two random permutations used in the JTs; all these keys have to be correct for a proper recovery of the original image in the decryption system.
A SLM has been experimentally characterized in terms of amplitude modulation versus the gray level distribution (input signal) electronically addressed to the pixelated display in two conditions: input constant with time, and time variant input with increasing frame rate. The SLM considered in this work was a twisted nematic liquid crystal display manufactured by CRL (XGA2 model) that operates on the transmitted light. The influence of some technical specifications such as gamma correction, brightness and contrast of this SLM have been considered as well.
A new optical security system for image encryption based on a nonlinear joint transform correlator (JTC) and Fresnel transform is proposed. A lensless optical encryption system, which is a simplified version of previous JTCbased encryption systems, produces a complex distribution in the Fresnel domain, whose intensity is captured by a power-law sensor and nonlinearly modified to yield the real-valued encrypted image. The nonlinearity plays an essential role in the decryption system which, in turn, contains an optical fractional Fourier transform to retrieve the primary image. The security system proposed in this work is a novel extension of the conventional JTC-based encryption system from the Fourier domain to the Fresnel domain. Additional advantages of the proposed system are: simplification of the optical setup, alleviated alignment requirements, and an additional key (the propagation distance) that improves security. Numerical simulations verify the validity of this new optical security system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.