Managing digital images with SEM viewer™

Author(s):  
Lauraine Denault ◽  
Robin de la Parra ◽  
Claude von Roesgen

In 1992 Millipore's Corporate SEM Lab made the transition from conventional analog recording of images to digital acquisition and archival. Commonly requested images could be easily and reliably retrieved, without significant loss of image quality or resolution.In theory, digital images could be sent over a network to desktop PC's for review, (rather than producing hard copy of all images). Using established wide area network system, the scope of incorporating digital images significantly broadened. A significant barrier appeared in that the images were acquired using two different hardware/software packages, by two different SEMs (ISI DS130-C and ElectroScan ESEM). Although both generate TIFF images the "flavors" are somewhat different. The TIFF formats were incompatible because the tags used for magnification, micron bar, and descriptor line data were different. As a result, only the image itself generated from one program could be read by the other program, as with all available TIFF readers. Our dilemma was how to enable a single program to recognize and display all necessary information i.e., magnification, descriptor line, and the micron bar with the image.


Author(s):  
Sudhir K. Routray ◽  
Sarath Anand

Narrowband internet of things (NBIoT) is a leaner and thinner version of the IoT which needs much less resources than the other forms of the IoTs. Therefore, it is considered as a low power wide area network (LPWAN) technology. It can connect with a large number of devices with a very small amount of power and bandwidth. It has potential to connect almost all the considerable objects with the internet. Thus, it is a very powerful technology to establish internet of everything (IoE), a framework consisting of data, processes, sensing, and follow up actions for an intelligent environment. In this chapter, the authors present the IoE friendly architecture of NBIoT, its LPWAN features, principles, and its common applications in different sectors to show its versatility toward IoE. They show the layered architecture of a typical NBIoT and the main protocols used in the narrowband scenarios. They show the general applications of NBIoT for IoE and how it can provide services with limited bandwidth and power. With all these wonderful features, NBIoT is certainly an attractive technology for IoE which can provide the accelerated innovation opportunities.



1983 ◽  
Vol 27 (1) ◽  
pp. 41-45 ◽  
Author(s):  
Robert J. Beaton

Fourteen image quality metrics were evaluated for hard-copy and soft-copy displays of digital images degraded by various levels of noise and blur. All quality metrics were formulated to include the displayed modulation spectrum of the image. The statistical analyses suggested that several of the metrics correlated strongly with performance, and, thus, support the proposed utility of image-dependent quality measures. An MTFA-type metric was shown to correlate highest with the average performance scores across noise and blur conditions.



Electronics ◽  
2019 ◽  
Vol 8 (8) ◽  
pp. 909 ◽  
Author(s):  
Zheng Zhang ◽  
Shouqi Cao ◽  
Yuntengyao Wang

Wireless communications for applications of inshore fishery and large area aquatic environmental monitoring are really challenging, due to the characteristics of a long monitoring period, large coverage area, and adverse transmission conditions. Recently, LPWAN (low-power wide-area network) became the new solution to address these challenges, due to its long transmission distance and low power consumption of end-nodes. In this paper, we designed a novel network system for aquatic environmental monitoring, based on long-range 2.4G technology, which consisted of a low cost dual-channel gateway and end-nodes. A DMSF (dual-channel multiple spreading factors)–TDMA (time division multiple access) MAC (medium access control) scheme for this system was proposed, which largely reduces the channel collision probability, and improves the real-time for urgent data and the average lifetime of end-nodes. We verified the applicability of the long-range 2.4G technology in an aquatic environment, by point-to-point communication experiments over lake water. The performance evaluation and analysis of DMSF–TDMA is presented through simulations, and comparison with other existing schemes. The results demonstrated the benefit of our proposed scheme, in terms of the packet delivery rate, delay, and energy consumption.



Author(s):  
Peng Su ◽  
Guanjun Wang

In this article, the reliability of network systems subject to probabilistic propagation failure and failure isolation effects is considered. Probabilistic propagation failure is the failure of some components in a system, which will cause other components to fail with certain probabilities. Probabilistic propagation failure exists in various network systems, such as computing network system and nuclear power generating network system. Failure isolation means that the failure of a trigger component will lead to its corresponding dependent components being isolated from the network system. Since the failure isolation effect is activated only when the failure of trigger components occurs before the occurrence of probabilistic propagation failure, there exists a competing failure in the time domain between the failure of a trigger component and the components with probabilistic propagation failure effect. If a trigger component failure occurs first, the system is insensitive to any failures of components being isolated. In this article, a combinatorial method based on binary decision diagram is proposed to analyze the reliability of the network systems subject to probabilistic propagation failure and failure isolation effects. The method can be applied to any network system and any type of lifetime distribution of the system components. As an example, a wide area network system is analyzed. Some numerical results about reliability indexes are provided to verify the feasibility and accuracy of the proposed method.



Sensors ◽  
2018 ◽  
Vol 19 (1) ◽  
pp. 21 ◽  
Author(s):  
Fan Wu ◽  
Taiyang Wu ◽  
Mehmet Yuce

This paper presents a hybrid wearable sensor network system towards the Internet of Things (IoT) connected safety and health monitoring applications. The system is aimed at improving safety in the outdoor workplace. The proposed system consists of a wearable body area network (WBAN) to collect user data and a low-power wide-area network (LPWAN) to connect the WBAN with the Internet. The wearable sensors in the WBAN are exerted to measure the environmental conditions around the subject using a Safe Node and monitor the vital signs of the subject using a Health Node. A standalone local server (gateway), which can process the raw sensor signals, display the environmental and physiological data, and trigger an alert if any emergency circumstance is detected, is designed within the proposed network. To connect the gateway with the Internet, an IoT cloud server is implemented to provide more functionalities, such as web monitoring and mobile applications.



1968 ◽  
Vol 59 (3) ◽  
pp. 479-486 ◽  
Author(s):  
Lars-Ake Idahl ◽  
Bo Hellman

ABSTRACT The combination of enzymatic cycling and fluorometry was used for measuring glucose and glucose-6-phosphate in pancreatic β-cells from obese-hyperglycaemic mice. The glucose level of the β-cells corresponded to that of serum over a wide concentration range. In the exocrine pancreas, on the other hand, a significant barrier to glucose diffusion across the cell membranes was demonstrated. During 5 min of ischaemia, the glucose level remained practically unchanged in the β-cells while it increased in the liver and decreased in the brain. The observation that the pancreatic β-cells are characterized by a relatively low ratio of glucose-6-phosphate to glucose may be attributed to the presence of a specific glucose-6-phosphatase.



2019 ◽  
Vol 7 (6) ◽  
pp. 1045-1050
Author(s):  
Amanze . ◽  
B.C. . ◽  
Nwoke . ◽  
B.C . ◽  
Agoha . ◽  
...  


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384



Author(s):  
Taghi Shahgholi ◽  
Amir Sheikhahmadi ◽  
Keyhan Khamforoosh ◽  
Sadoon Azizi

AbstractIncreased number of the vehicles on the streets around the world has led to several problems including traffic congestion, emissions, and huge fuel consumption in many regions. With advances in wireless and traffic technologies, the Intelligent Transportation System (ITS) has been introduced as a viable solution for solving these problems by implementing more efficient use of the current infrastructures. In this paper, the possibility of using cellular-based Low-Power Wide-Area Network (LPWAN) communications, LTE-M and NB-IoT, for ITS applications has been investigated. LTE-M and NB-IoT are designed to provide long range, low power and low cost communication infrastructures and can be a promising option which has the potential to be employed immediately in real systems. In this paper, we have proposed an architecture to employ the LPWAN as a backhaul infrastructure for ITS and to understand the feasibility of the proposed model, two applications with low and high delay requirements have been examined: road traffic monitoring and emergency vehicle management. Then, the performance of using LTE-M and NB-IoT for providing backhaul communication infrastructure has been evaluated in a realistic simulation environment and compared for these two scenarios in terms of end-to-end latency per user. Simulation of Urban MObility has been used for realistic traffic generation and a Python-based program has been developed for evaluation of the communication system. The simulation results demonstrate the feasibility of using LPWAN for ITS backhaul infrastructure mostly in favor of the LTE-M over NB-IoT.



Sign in / Sign up

Export Citation Format

Share Document