ÁªÏµÍþÁ®williamhill
Ê×Ò³ > ÐÂÎÅÖÐÐÄ > ¹«Ë¾ÐÂÎÅ

WilliamÍþÁ®ÑÇÖÞ-ÉϺ£Àí¹¤´óѧ¹âµçѧԺ²©Ê¿Éú¹ù×ÓÇçÔÚ¡¶×ÔÈ»¡¤Í¨Ñ¶¡·ÉÏ·¢±íÑо¿½á¹û

  

½üÈÕ£¬ÓÚÉϺ£Àí¹¤ÄêҹѧׯËÉÁÖԺʿÒýµ¼Ï£¬Ì«ºÕ×ȼ¼ÊõÁ¢ÒìÍŶÓê°Ð¡·É½ÌÊÚ¡¢ÖìÒàÃù½ÌÊÚ½áºÏ¶«·½Àí¹¤Äêҹѧ¶¡·É½ÌÊÚ¿ÎÌâ×飬Ìá³öÁËÒ»ÖÖʵÏÖÆ«Õñ¿ÉÑ¡ÔñµÄÑÜÉäÉñ¾­ÊÕ¼¯£¨PS-DNNs£©ÐÂÒªÁì¡£¾­Óɹý·ï»Ë²ÊƱ¹ÙÍø³Ì½áºÏÏàλ¼°Æ«Õñ¶à×ÔÓɶȵ÷¿Ø£¬ÊµÏÖÁËÆ«Õñ¿É¿ØµÄµ¥ÏòÓëË«ÏòÊÕ¼¯¹¦Ð§Çл»£¬´Ó¶øÍ¬²½¸æ¿¢ÐÅÏ¢¼ÓÃÜÓëͬÏíµÄÄ¿µÄ¡£Ñо¿½á¹ûÒÔ¡°³¬¹¹ÍâòÑÜÉäÉñ¾­ÊÕ¼¯ÊµÏÖÈ«¹âÐÅÏ¢¼ÓÃܼ°Í¬Ïí¡±(¡°Polarization-selective unidirectional and bidirectional diffractive neural networks for information security and sharing¡±)ΪÌâ·¢±íÔÚ¡¶ÌìÈ»¡¤Í¨ÐÅ¡·£¨Nature CoÃÃÃÃunications£¬IF=14.7£¬ÖпÆÔºÒ»Çø£©ÉÏ£¬²©Ê¿Éú¹ù×ÓÇçΪµÚÒ»×÷Õߣ¬Ì·ÖªÓ격ʿΪÂÛÎĵÄÅäºÏÒ»×÷£¬ê°Ð¡·É½ÌÊÚ¡¢ÖìÒàÃù½ÌÊÚ ¡¢¶¡·É½ÌÊÚΪͨÐÅ×÷Õß¡£

±¾Ñо¿Õë¶ÔÓÚ´«Í³È«¹âÄêÒ¹ÈÝÁ¿ÐÅÏ¢´¦Öô¦·£ÖÐÐÅÏ¢Äþ¾²ÓëÊý¾ÝͬÏíµÄµÖêõ£¬Ìá³öÁ˼¶ÁªÐͳ¬¹¹ÍâòƫÕñ¿É¿ØµÄÑÜÉäÉñ¾­ÊÕ¼¯Ð¼ܹ¹£¬¾­ÓÉÀú³ÌÈÚ»áÏàλµ÷¿Ø¡¢Æ«Õñת»»ºÍ±êµÄÄ¿µÄ/Æ«ÕñÑ¡Ôñ¹¦Ð§£¬ÊµÏÖÁËÉñ¾­ÍøÂ·µÄµ¥ÏòÐÅÏ¢¼ÓÃܼ°Ë«ÏòÐÅϢͬÏí¹¦Ð§Çл»¡£Õë¶ÔÓÚ´«Í³3D´òÓ¡ÑÜÉäÍâò×ÔÓɶÈÊÜÏÞµÄÎÊÌ⣬Ñо¿ÍŶÓÁ¢ÒìÐԵؽ«ËÄ·ÖÖ®Ò»²¨Æ¬£¨QWP£©³¬¹¹Ô­×ÓÕóÁÐÓë½ðÊô¹âÕ¤¼¶Áª£¬ÊµÏÖÊý×Ö·ÖÀ༰ÎÞËð³ÉÏñµÄÆ«Õñ¿ÉÑ¡ÔñµÄµ¥Ïò-Ë«ÏòÑÜÉäÉñ¾­ÊÕ¼¯¡£½øÒ»²½£¬½«°ë²¨Æ¬£¨HWP£©³¬¹¹Ô­×ÓÕóÁм°½ðÊô¹âÕ¤¼¶ÁªÊµÏÖÁ˹¦Ð§Çл»¸üΪÖÜÈ«µÄµ¥Ïò-Ë«Ïò-µ¥ÏòDNNs¡£Ä©ÁË£¬»ùÔÚPS-DNNsÉè¼ÆÁËÒ»ÖÖ¸ßÄþ¾²ÐÔÄܵÄÐÅÏ¢´«Êä¼°Êý¾Ý½»Á÷мܹ¹¡£ÊÔÑé½á¹û×¢½â£¬¸Ã¼Ü¹¹¿ÉÒÔ»òÐíÓÚͳһÎïÀíÆ½Ì¨ÉÏʵÏÖº£Á¿Êý¾Ý´«ÊäµÄͬʱʵÏÖÌØ¶¨Êý¾ÝµÄ¼ÓÃܼ°Í¬Ïí¡£Ïà¸ÉÑо¿ÎªÈ«¹âÅÌË㣬ȫ¹âÐÅÏ¢´¦Öô¦·£¼°Í¨Ñ¶Äþ¾²ÌṩеÄ˼Ð÷¡£

»ùÔÚPS-DNNsµÄ¸ßÄþ¾²ÐÔÐÅÏ¢´«Êä¼°Êý¾Ý½»Á÷Ìåϵ

ÎÄÕÂÁ´½Ó£ºhttps://doi.org/10.1038/s41467-025-59763-6

-WilliamÍþÁ®ÑÇÖÞ-¡£