scispace - formally typeset
T

Thomas J. Naughton

Researcher at Maynooth University

Publications -  198
Citations -  6202

Thomas J. Naughton is an academic researcher from Maynooth University. The author has contributed to research in topics: Digital holography & Holography. The author has an hindex of 37, co-authored 190 publications receiving 5807 citations. Previous affiliations of Thomas J. Naughton include National University of Ireland & University of Oulu.

Papers
More filters
Journal ArticleDOI

Assessment of methods for amino acid matrix selection and their use on empirical data shows that ad hoc assumptions for choice of matrix are not justified

TL;DR: It is demonstrated that for two large datasets derived from the proteobacteria and archaea, one of the most favored models in both datasets is a model that was originally derived from retroviral Pol proteins.
Journal ArticleDOI

Resistance of the double random phase encryption against various attacks

TL;DR: A technique to recover the exact keys with only two known plain images is described, and this technique is compared to other attacks proposed in the literature.
Journal ArticleDOI

Compression of digital holograms for three-dimensional object reconstruction and recognition

TL;DR: This work quantifies the number of Fourier coefficients that can be removed from the hologram domain, and the lowest level of quantization achievable, without incurring significant loss in correlation performance or significant error in the reconstructed object domain.
Journal ArticleDOI

Real-time three-dimensional object reconstruction by use of a phase-encoded digital hologram.

TL;DR: It is demonstrated that it is possible to reconstruct optically 3D objects using only phase information of the optical field calculated from phase-shifting digital holograms.
Journal ArticleDOI

A known-plaintext heuristic attack on the Fourier plane encryption algorithm.

TL;DR: The Fourier plane encryption algorithm is subjected to a known-plaintext attack and the simulated annealing heuristic algorithm is used to estimate the key, using a known plaintext-ciphertext pair, which decrypts the ciphertext with arbitrarily low error.