上一条:Design and analysis of logic NOR, NAND and XNOR gates based on interference effect
下一条:Computational ghost imaging encryption based on fingerprint phase mask