scholarly journals The combined mode of operation of a digital range-gated surveillance device for operating in low illumination conditions

2021 ◽  
Vol 2032 (1) ◽  
pp. 012094
Author(s):  
A A Golitsyn ◽  
N A Seyfi
Author(s):  
L. Gandolfi ◽  
J. Reiffel

Calculations have been performed on the contrast obtainable, using the Scanning Transmission Electron Microscope, in the observation of thick specimens. Recent research indicates a revival of an earlier interest in the observation of thin specimens with the view of comparing the attainable contrast using both types of specimens.Potential for biological applications of scanning transmission electron microscopy has led to a proliferation of the literature concerning specimen preparation methods and the controversy over “to stain or not to stain” in combination with the use of the dark field operating mode and the same choice of technique using bright field mode of operation has not yet been resolved.


Author(s):  
J. M. Cowley

The comparison of scanning transmission electron microscopy (STEM) with conventional transmission electron microscopy (CTEM) can best be made by means of the Reciprocity Theorem of wave optics. In Fig. 1 the intensity measured at a point A’ in the CTEM image due to emission from a point B’ in the electron source is equated to the intensity at a point of the detector, B, due to emission from a point A In the source In the STEM. On this basis it can be demonstrated that contrast effects In the two types of instrument will be similar. The reciprocity relationship can be carried further to include the Instrument design and experimental procedures required to obtain particular types of information. For any. mode of operation providing particular information with one type of microscope, the analagous type of operation giving the same information can be postulated for the other type of microscope. Then the choice between the two types of instrument depends on the practical convenience for obtaining the required Information.


Author(s):  
H. M. Thieringer

It has repeatedly been show that with conventional electron microscopes very fine electron probes can be produced, therefore allowing various micro-techniques such as micro recording, X-ray microanalysis and convergent beam diffraction. In this paper the function and performance of an SIEMENS ELMISKOP 101 used as a scanning transmission microscope (STEM) is described. This mode of operation has some advantages over the conventional transmission microscopy (CTEM) especially for the observation of thick specimen, in spite of somewhat longer image recording times.Fig.1 shows schematically the ray path and the additional electronics of an ELMISKOP 101 working as a STEM. With a point-cathode, and using condensor I and the objective lens as a demagnifying system, an electron probe with a half-width ob about 25 Å and a typical current of 5.10-11 amp at 100 kV can be obtained in the back focal plane of the objective lens.


2018 ◽  
Vol 11 (1) ◽  
pp. 39
Author(s):  
Vyacheslav Vavilov ◽  
Flur Ismagilov ◽  
Irek Khayrullin ◽  
Ruslan Dinarovich Karimov

2019 ◽  
Vol 5 (1) ◽  
pp. 8-12
Author(s):  
Matkarim Ibragimov ◽  
◽  
Gulnoz Ergasheva

2018 ◽  
Vol 2 (1) ◽  
pp. 1
Author(s):  
Dafirius Lombu ◽  
Siska Dame Tarihoran ◽  
Irwan Gulo

Generally, the database access of a website lies in the user login. When the login data is not accompanied by security techniques, it is very easily accessible by other parties. One effort that can be done to solve the problem is to encode the login data of website users based on cryptographic technique algorithm. Triangle Chain Cipher (TCC) is one of the classic cryptographic algorithms that encode data doubly and generate keys randomly along the plain. The process of encryption and decryption are interdependent to be one of the advantages of this algorithm. This algorithm will be more effective when combined with the Cipher Block Chaining (CBC) operation mode that is widely used in modern cryptographic algorithms today. The feedback mechanism between the blocks in this mode of operation is the operating advantage. This study describes how to combine the mode of operation of block chaining cipher with triangle chain cipher algorithm so that cipher data login website generated more random and difficult to find its original meaning.


Sign in / Sign up

Export Citation Format

Share Document