• Aucun résultat trouvé

Thin Film-Based Optically Variable Security Devices : From Passive to Active

N/A
N/A
Protected

Academic year: 2021

Partager "Thin Film-Based Optically Variable Security Devices : From Passive to Active"

Copied!
249
0
0

Texte intégral

Loading

Figure

Figure 2.4 Color matching functions for a 2 degree angle of vision before (¯ r¯ g¯ b) and after conversion (¯ x¯ y ¯ z)
Figure 2.8 Relative intensities of three CIE illuminants (D65, A and F1). Note that they are all normalized by their intensity at 560 nm.
Table 2.2 Illuminants defined by the CIE. Illuminant xy coordinates T c [K] Description
Figure 2.11 xy color space with MacAdam ellipses of just noticeable color differences. Notice how the ellipses are much larger in the green region
+7

Références

Documents relatifs

The method is based on the computing of the amplitude of the transmitted zero-order antisymmetric Lamb mode in the far field as a function of the frequency after the wave

The first set of experiments is designed to understand the impact of the model type (and hence of the cost function used to train the neural network), of network topology and

In the context of the safety evaluation by EFSA of active or intelligent substances present in active and intelligent materials and articles intended to come into contact with

In comparison with the theoretical limit for a majority carrier trap according to Equation (5), black symbols in Figure 2 show a range of experimental values for the step height

In this section we first recall the concepts of power and interaction indexes in- troduced in cooperative game theory and how the Banzhaf index can be obtained from the solution of

Ahmed Zouinkhi, Eddy Bajic, Raja Zidi, Mohamed Ben Gayed, Eric Rondeau, Naceur Abdelkrim. To cite

Active products worked together and they exchange information on the environment and the security level in real time by a product that can manage asset safety and

In order to achieve this, the Authentication Manager utilizes two processing algorithms: the System Security (SS) Level Auto- matic Update Algorithm and the