# Register now to access 7 million high quality study materials (What's Course Hero?) Course Hero is the premier provider of high quality online educational resources. With millions of study documents, online tutors, digital flashcards and free courseware, Course Hero is helping students learn more efficiently and effectively. Whether you're interested in exploring new subjects or mastering key topics for your next exam, Course Hero has the tools you need to achieve your goals.

4 Pages

### optics-outline

Course: EE 6328, Fall 2009
School: Dallas
Rating:

Word Count: 286

#### Document Preview

University The of Texas at Dallas Erik Jonsson School PhoTEC OPTICS OUTLINE (1) Maxwells equations Standard assumptions: Linear, homogeneous, isotropic medium; waves that can be described by a classical eld Vector boundary value problems; reciprocity Vector waves at interfaces: Fresnel formulas, Brewsters angle, etc. Polarization Vector interference and diraction theory Geometrical-optics limit of Maxwells...

Register Now

#### Unformatted Document Excerpt

Coursehero >> Texas >> Dallas >> EE 6328

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.
University The of Texas at Dallas Erik Jonsson School PhoTEC OPTICS OUTLINE (1) Maxwells equations Standard assumptions: Linear, homogeneous, isotropic medium; waves that can be described by a classical eld Vector boundary value problems; reciprocity Vector waves at interfaces: Fresnel formulas, Brewsters angle, etc. Polarization Vector interference and diraction theory Geometrical-optics limit of Maxwells equations Eikonal equation Ray optics Ray optics at interfaces: Snells law, etc. Geometrical computation of image formation Hamiltons formulation Geometrical computation of aberrations in imaging systems c C. D. Cantrell (01/2001) The University of Texas at Dallas Erik Jonsson School PhoTEC OPTICS OUTLINE (2) Physical optics Interference phenomena Interferometers Diraction Diraction gratings Diractive computation of image formation and aberrations Optical phenomena that break one or more of the standard assumptions Crystal optics (anisotropic media) Birefringence Optics of conned or guided waves (inhomogeneous media) Integrated optics, optics of small cavities, etc. bers, Nonlinear optics Quantum optics Photons c C. D. Cantrell (01/2001) The University of Texas at Dallas Erik Jonsson School PhoTEC OPTICS OUTLINE (3) Optical materials Glasses Metals Discrete crystals (example: LiNbO3, CaCO3) Materials with special properties (dichroism, photorefractivity) Materials grown by semiconductor-process techniques Optical manufacturing Surface forming Abrasives and laps Machine tools Fiber, ber-based devices, and connectors Optical system assembly from discrete components The big challenge: Alignment Optoelectronic integrated circuits c C. D. Cantrell (01/2001) The University of Texas at Dallas E...

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Yale - CS - 112
CS 112 Introduction to ProgrammingLecture #18:ArraysHttp:/zoo.cs.yale.edu/classes/cs112/OutlineAdmin. and review Arrays21Admin.Assignment 3due today: 11:59pm office hours:Assignment 4 Midterm 1 2-3 PM (AKW 202); 7-8 PM (DL 120); 8-10:30 PM (DL
Fayetteville State University - COP - 4342
COP4342 - 2006 Fall Assignment 5 Word IndexObjectives: Learn how to use explicit and automatic memory variables, the exists function, the substitution command, the string concatenation operator, pattern matching, and more experience with hashes, the sort
UMass (Amherst) - CS - 453
Chapter 1: IntroductionOur goal:get context, overview, &quot;feel&quot; of networking more depth, detail later in course approach: descriptive use Internet as exampleOverview:what's the Internet what's a protocol? network edge network core access net, physical
Washington University in St. Louis - CIS - 788
Wireless ATM - An OverviewWireless ATM - An OverviewXinri Cong, cong@cis.ohio-state.eduAbstractThis paper studies the concepts and architecture of Wireless ATM (WATM). Several key design issues are addressed. Other Reports on Recent Advances in Networ
Washington University in St. Louis - CSE - 573
Penn State - MIS - 230
Jason Beddingfield MIS 204 January27, 2006 3. Yes, I found available tickets. There were more tickets available than I thought. I think the bid prices are to high, because no one should pay that much money for tickets for anything. There were 9 bids on th
Yale - CS - 112
Outline CS 112 Introduction to ProgrammingLecture #15: Admin. and review Classes and objects Defining classesBasic syntax ExamplesDefining ClassesHttp:/zoo.cs.yale.edu/classes/cs112/2Admin.Assignment 3Due: Oct. 13 Two problems: Problem 1: Control
Auburn - CS - 122
Topological SortCS122 Algorithms and Data Structuresn n nMW 11:00 am - 12:15 pm, MSEC 101 Instructor: Xiao Qin Lecture 17: Graphs (4)1n nOrdering of vertices in a directed acyclic graph(DAG) If there is a path from u to v, then v appears after u in
SHSU - MATH - 142
Math 142 Fall 2007 Worksheet 11Name: Group members:1. Calculate the following limits: sin2 2x x0 x2 1 cos 3x (b) lim x0 x2 x (c) lim x0 1 sec x 1 + cot2 3x (d) lim x0 4x2 (a) lim (e) lim 1 sec x + x 6 3x 62(f) lim x 2cos x 2x 2. Calculate the f
University of Texas - LIN - 372
Handout #24Syllables and restrictions on distributionJavaneseNoun tSaNkIr tSukUr ketSap sbap kulIt My (Noun) This (Noun) Noun gloss tSaNkIrku tSukUrku ketSapku sbapku kulItku tSaNkire tSukure ketSape sbabe kulitecup haircut soy sauce (cf. Eng. ketchup
Evergreen - AMR - 0304
Atoms, Molecules and Research (2003/04) ATOMIC UNITS Quantity charge mass length velocity time energy e m or me a0 = h2/4 2me2 v0 = 2e2/h a0/v0 e2/a0 Unit Electron charge Electron mass Bohr radius Electron velocity in first Bohr orbit Time required for el
UMass (Amherst) - BE - 640
INTERNATIONAL PHYSICAL ACTIVITY QUESTIONNAIREWe are interested in finding out about the kinds of physical activities that people do as part of their everyday lives. The questions will ask you about the time you spent being physically active in the last 7
CSU Chico - WEEK - 223
AII:problemsolvingand searchLecturer:TomLenaerts SWITCH,VlaamsInteruniversitairInstituutvoorBiotechnologieOutline Problemsolvingagents Akindofgoalbasedagent Problemtypes Singlestate(fullyobservable) Searchwithpartialinformation Exampleproblems Uninf
San Diego State - BUS - 315
9103 E. Almeda Rd. Houston, TX 77054This form must accompany each new customer application.Serving Texas Contractors Since 1947Phone: Fax:713-799-1150 713-799-1060Condential Customer Information ProleEINDate Founded Shipping Name: Street State/Zip
Cal Poly Pomona - BOT - 125
BOT 125 - Plant Morphology Fall 1991 Second Midterm ExamName_Lab Section_ Answer all questions on the Scantron sheet. There is only one correct answer to each question. Please turn in this sheet as well as the Scantron, and indicate your lab section on e
Oregon State - BOT - 416
Characteristics Of Eukaryotic Algae Eukaryotic Algae I. General Characteristics II. Reproduction and Life History Patterns III. Photosynthetic Pigments IV. Chloroplast types V. Major Polysaccharide Reserves VI. Flagellated stages and Flagella types true n
Acton School of Business - ESCI - 446
week 11, 4/1Earth's Magnetic Fieldslide 1week 11, 4/1Earth's Magnetic Fieldslide 2GeomagnetismBasics Physics of Magnetism Magnetic Poles and Dipole Magnetic Potential and Magnetic FieldBasics of Magnetic FieldCoulombs Law for Magnetic PolesB=E
Canisius College - P - 222
Physics 222 Final 5/1/03 name_ 1eV = 1.6x1019J h= 6.602x1034 Js c= 3x108 m/s mp = 1.67x1027 kg q = 1.6x1019 1) Suppose the electric potential inside a smoke precipitator is given by V(x)= Ax2+B where A = 12 V/m2 , B = 5 V/m and x is the horizontal distanc
N. Illinois - PHYS - 571
UCLA - PEOPLE - 219
June 2, 2004 Class 18: Exemplars II To do for next time Project abstracts due Friday, June 4 (draft is OK). Read Blevins &amp; Garrett (Sameer will present).1Pierrehumbert: exemplar dynamics1 1. Background In exemplar theory, categories are represented ment
Western Washington - H - 370
AP09: Defeudalization: Border Peoples and Hegemon Kings9-1AP09: Defeudalization: Border Peoples and Hegemon-Kings(4/89, 12/90; 1/95, 9/96)A. Defeudalization9a. Under what circumstances, when, and with what differing results for lords and vassals did
Chaminade University - CS - 430
Software Engineering: A Practitioner's Approach, 6/eChapter 30 ComponentBased Software Engineeringcopyright 1996, 2001, 2005R.S. Pressman &amp; Associates, Inc. For University Use Only May be reproduced ONLY for student use at the university level when use
University of Florida - EEL - 4744
So You've Decided to Learn The 68HC12A documentation of the 4744v1.4 Development Kit Board12/10/01 University of Florida Scott KanowitzBackground The SKPO 4744v1.4 Development Kit board was developed by Scott Kanowitz and Patrick O'Malley at the Univer
SUNY Albany - M - 301
H w (7! 2 t i tq vx v q v b v ~ ~f apupRpeufweubyRpme!ym orpegeieefpdef H !ruiez q i h f d b i b v q s t q t f yRezRppuippyuvuipReEfcfw_wRyRywruiwReb wv v f x h t i t q hxq x s qvxvq t v q vx i b v q i f qvxvq t s f vq bx b h i i b vq f h eeufpwie!RyRywr
Minnesota - CEMS - 5751
CHAPTER 3. CENTRIFUGATIONv := 1m sec kg ( sec m)p := 1 Paviscosityl := 1 m := 1 deg := 1k := v Rc :=( p)cake resistance3l k = 1m2 -2k Pa = 1 kg msecl kA := 1 m2 filter area -1volume of filtrate accumulated V := 1 m kg solid mass per vol
U. Houston - CS - 3480
File OrganizationsChapter 8&quot;How indexlearning turns no student pale Yet holds the eel of science by the tail.&quot; Alexander Pope (16881744)Database Management Systems, R. Ramakrishnan and J. Gehrke1Files of RecordsPage or block is OK when doing I/O, bu
University of Toronto - ECE - 106
ECE106 - Homework Assignment 4Fill in the le a4.cc with the answers to the following questions and submit the le on ecf using the command submitece106s 8 a4.cc Please make sure that the le can be compiled on ecf. The number of marks for each question is
Auburn - CS - 122
CS122 Algorithms and Data StructuresWhat does it mean to balance trees?MW 11:00 am - 12:15 pm, MSEC 101 Instructor: Xiao Qin Lecture 13: Balancing TreesRule #14Rule #2435 6 126 3 5 7217Rule #1: Require that the left and right subtrees of the
UCF - COP - 3503
Deletion from an AVL TreeFirst we will do a normal binary search tree delete. Note that structurally speaking, all deletes from a binary search tree delete nodes with zero or one child. For deleted leaf nodes, clearly the heights of the children of the n
CUNY Baruch - MTH - 311
The test covers material in chapter 4 and chapter 5 that we covered in class. 4.1 Continuous RVs. 1. What is a density, give an example 2. How does a density answer a question about probability? Exercise 1 f (x) = 1. Find c 1 c = 3/2, asR21/2c(1 x2 ) 0
Minnesota - CS - 4061
OverviewAdministrative * HW 1 grades * HW 2 Due Topics * 5.1 What is a Signal? * 5.2-3 Dealing with Signals - masks, handlers * 5.4 Synchronization: pause(), sigsuspend() * 5.6 Interaction with other systems calls * problems with signals for communicat
Stanford - CS - 107
CS107 Autumn 2000Handout 30 October 30, 2000CS107 Thread Package DocumentationThread package and handout was written by JulieZelenski (zelenski@cs.stanford.edu)Threads We will do our concurrent programming work using a platform-specific thread package
Bryn Mawr - CS - 246
CS246 lab Notes #4 Files, Pipes, Redirection File functions o fopen ! The possible file open types: o r - Reading only. Start at beginning of file o r+ - Reading and writing. Note: all writing is overwriting, not inserting. o w - Writing only. In other wo
Penn State - MKTG - 585
QUESTIONS FOR CLASS DISCUSSION (Chapter 12 and Chapter 10) 1. Discuss rational for channels of distribution and its value in the b-to-b marketing. 2. Discuss the elements of business logistic management and channel design in the b-to-b market. 3. What are
Ill. Chicago - CS - 739
connectMLS - Connecting Your Real Estate Communityhttp:/mlsni.connectmls.com/common/PrintableView.jsp?ud=11787642.&lt; 1 of 9 &gt;Detached Single Status: PCHG MLS #: 06347021 Address: 739 EAGLE BROOK LN, NAPERVILLE, 60565 Bedrooms: 4 Price:\$489,000 Baths: 2.
Rose-Hulman - CSSE - 120
Alan Mathison Turing (1912 1954)British mathematician, logician, and British mathematician, logician, and cryptographer, cryptographer, One of the fathers of modern computer science. computer science.Fundamentals of Software Development 1Slide 1Some C
USF - NR - 32361
Hi All, I just wanted to let you all know about a new course being offered under the college of Medicine. Clinical Ethics: Cases, Consultation and Resolution will be taught in the fall on Thursdays from 6-8:50 PM. It should be a great course with a practi
La Sierra - M - 251
Math 251, Quiz 12, November 17, 2003 Names: 1. (Modified from p. 539 #17) A random sample of n1 = 153 people ages 16 to 19 was taken from the Island of Oahu and 12 were found to be high school dropouts. Another random sample of n2 = 128 people ages 16 to
Illinois Tech - CS - 560
CS440 Programming Languages and Translators Week 2Reading: 1) Prepared Online SlidesObjectives: 1) To learn what is Ocaml and how to apply it. 2) To learn the concept of recursive programming with suitable examples and applications.Concepts: 1) Introdu
Rowan - ECE - 242
General Purpose Processors: SoftwareThis Week In DIGII Chapter 3 General-Purpose Processors: Software Introduction Basic Architecture Operation Programmers view (that would be you !) Development environment Application specific instruction-Set Processor
Bethel VA - CS - 404
'\$Three time complexity functions Three time complexity functions The worse case time complexity of the algorithm is the function dened by the maximum number of operations performed, taken across all instances of size n. The best case time complexity o
University of Toronto - ECE - 1776
General topics in this Lecture Last lecture: Vulnerabilities and how they are exploited How to prevent buffer overflows Defensive programming Build all software with security in mind Reliability and Security have common goals Techniques to create secure
Acton School of Business - CHEM - 312
WWzi4d dwwT TzRiWYWPTTEf zdiTGPwEw PwWdwPWP!DdwfwdPfD wzdYDdTw Tzw zYwwwWYsT4wzPz4iznEdYzRz dRDdwPwwoRRE4R'dTTzWP!xW2qwWPqPWPXzd n PYfWs o TzTPz!R'zqWdiD WWBP6RTw TRnwwWzRz zGw'B &amp;wT~dWPdwTTRtRTdwPlzGwiw&amp;iPz4dzozodTPW PBWWwswzGPsdW Twwd
Portland - SBA - 441
Binomial Trees in PracticeChapter 16Fundamentals of Futures and Options Markets, 6th Edition, Copyright John C. Hull 200716.1Binomial TreesBinomial trees are frequently used to approximate the movements in the price of a stock or other asset In each
Texas San Antonio - INFS - 766
INFS 766 Internet Security Protocols Lecture 9 KerberosSYSTEM MODELWORKSTATIONS WS WS WS WS Ravi Sandhu 2000-2004SERVERS NFS GOPHER LIBRARY KERBEROS 2NETWORKProf. Ravi SandhuPHYSICAL SECURITYCLIENT WORKSTATIONSNone, so cannot be trustedKERBEROS
Michigan State University - PPT - 201
Analysis of Competitive MarketsIn this section, we examine the social welfare implications of competitive markets. The approach taken here (and not the only one possible), is to use the devices of Producer and Consumer Surplus. The social welfare from th
Purdue - EE - 612
EE-612: Lecture 25: SOI ElectrostaticsMark Lundstrom Electrical and Computer Engineering Purdue University West Lafayette, IN USA Fall 2008 NCNwww.nanohub.orgLundstrom EE-612 F08 1outline1. 2. 3. 4. 5. 6. 7. 8.Introduction General solution VTF vs. V
Washington - NY - 1002
High throughput, multiplex analysis of gene expression*David Goldman, Laboratory of Neurogenetics, NIH dgneuro@box-d.nih.gov*With special thanks to Chiara Mazzanti, Ph.D.Revolutions in the analysis of gene expressionProtein function Protein concentrat
IUPUI - C - 484
CHEMISTRY 533/484 Biological ChemistryFALL 2006, 3 credits 4:30-5:45 pm Tues. and Thurs. LE 103Dr. Brenda Blacklock Office: LD 326J E-mail: blacklock@chem.iupui.edu (this is the best way to contact me; please identify class in subject line) Phone: 278-8
Rochester - PHY - 141
Solutions Midterm Exam 3 Physics 141 Problem 1 (2.5 points)December 12, 2006 8.00 am - 9.30 am1234Match the above shown players of the best baseball team in the world with the following names:A. Derek Jeter B. Mariano Rivera C. Johnny Damon D. Jorg
CSU Fresno - MATH - 111
MATH 111Spring 2006Homework 5 - SolutionsQ.1. (a) xP (x) is true. For example, if x = -1, then P (x) is false, so P (x) is true. (b) x(P (x) Q(x) is false. For example, if x = 0, then both P (x) and Q(x) are false. (c) x(P (x) Q(x) is true. For example
Rose-Hulman - CS - 490
XSV Board 1.0 VHDL Interfaces and Example DesignsAudio ProjectSchool of Computer Science and Electrical Engineering University of Queensland, Brisbane, Australia. http:/www.csee.uq.edu.au/Last Modified: 23 February 2001Contents1.0 About this design.
Texas San Antonio - IT - 862
Presenter Mohamed K. KamaraPresentation Topic Improving the Granularity of Access Control for Windows 2000 Granularity: Relative fineness to which an access control mechanism can be adjustedAuthors of the Article Michael M. Swift and Anne Hopkins (U
Texas San Antonio - IT - 862
Access Control Hierarchies(best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu sandhu@gmu.edu 2005 Ravi Sandhu www.list.gmu.eduRBAC96 Model 2005 Ravi Sandhu www.list.gmu.e
Texas San Antonio - INFS - 767
Usage Control ArchitecturesINFS767, Oct. 23, 2003Ravi Sandhu and Jaehong Park(www.list.gmu.edu) Laboratory for Information Security Technology (LIST) George Mason UniversityUCON ArchitecturesPrivacy Protection Intellectual Property Rights Protection
Texas San Antonio - INFS - 767
INFS 767 Fall 2003The RBAC96 ModelProf. Ravi Sandhu George Mason UniversityAUTHORIZATION, TRUST AND RISKv Informationsecurity is fundamentally about managing authorization trustandso as to manage risk Ravi Sandhu2SOLUTIONSv OM-AM v RBAC v PKI
Texas San Antonio - INFS - 766
INFS 766Internet Security ProtocolsCRYPTOGRAPHYLectures 3 and 4 Cryptography in network protocolsProf. Ravi Sandhu2 Ravi Sandhu 2000-2004CRYPTOGRAPHIC TECHNOLOGYCRYPTOGRAPHIC TECHNOLOGYSecret-key encryption Public-key encryption Public-key digita
Texas San Antonio - IT - 962
OutlineCountering Trusting Trust through Diverse Double-CompilingDavid A. WheelerFebruary 28, 2006 (Minor update from December 2, 2005) http:/www.dwheeler.com/trusting-trustThis presentation contains the views of the author and does not necessarily in
Texas San Antonio - INFS - 767
INFS 767 Fall 2003ARBAC97 DECENTRALIZESv user-roleAdministrative RBAC ARBAC97assignment (URA97) v permission-role assignment (PRA97) v role-role hierarchy groups or user-only roles (extend URA97) abilities or permission-only roles (extend PRA97) UP-
Texas San Antonio - INFS - 766
INFS 766 Internet Security Protocols Lecture 9 KerberosProf. Ravi SandhuSYSTEM MODELWORKSTATIONS WS WS WS WS Ravi Sandhu 2000-2004SERVERS NFSNETWORKGOPHER LIBRARY KERBEROS 2PHYSICAL SECURITYCLIENT WORKSTATIONSNone, so cannot be trustedSERVERSM
Texas San Antonio - INFS - 766
INFS 766 Internet Security Protocols Lecture 9 KerberosProf. Ravi SandhuSYSTEM MODELWORKSTATIONS WS WS WS WS Ravi Sandhu 2001SERVERS NFSNETWORKGOPHER LIBRARY KERBEROS 2PHYSICAL SECURITYvCLIENT WORKSTATIONSNone, so cannot be trusted Moderately s