Exploring Electronics Laboratory Experiments Using Computer Software

2011 ◽  
Vol 8 (3) ◽  
pp. 34-44
Author(s):  
Y. B. Gandole ◽  
1999 ◽  
Vol 173 ◽  
pp. 365-370
Author(s):  
Kh.I. Ibadinov

AbstractFrom the established dependence of the brightness decrease of a short-period comet dependence on the perihelion distance of its orbit it follows that part of the surface of these cometary nuclei gradually covers by a refractory crust. The results of cometary nucleus simulation show that at constant insolation energy the crust thickness is proportional to the square root of the insolation time and the ice sublimation rate is inversely proportional to the crust thickness. From laboratory experiments resulted the thermal regime, the gas productivity of the nucleus, covering of the nucleus by the crust, and the tempo of evolution of a short-period comet into the asteroid-like body studied.


Author(s):  
G.Y. Fan ◽  
J.M. Cowley

In recent developments, the ASU HB5 has been modified so that the timing, positioning, and scanning of the finely focused electron probe can be entirely controlled by a host computer. This made the asynchronized handshake possible between the HB5 STEM and the image processing system which consists of host computer (PDP 11/34), DeAnza image processor (IP 5000) which is interfaced with a low-light level TV camera, array processor (AP 400) and various peripheral devices. This greatly facilitates the pattern recognition technique initiated by Monosmith and Cowley. Software called NANHB5 is under development which, instead of employing a set of photo-diodes to detect strong spots on a TV screen, uses various software techniques including on-line fast Fourier transform (FFT) to recognize patterns of greater complexity, taking advantage of the sophistication of our image processing system and the flexibility of computer software.


Author(s):  
F.A. Ponce ◽  
H. Hikashi

The determination of the atomic positions from HRTEM micrographs is only possible if the optical parameters are known to a certain accuracy, and reliable through-focus series are available to match the experimental images with calculated images of possible atomic models. The main limitation in interpreting images at the atomic level is the knowledge of the optical parameters such as beam alignment, astigmatism correction and defocus value. Under ordinary conditions, the uncertainty in these values is sufficiently large to prevent the accurate determination of the atomic positions. Therefore, in order to achieve the resolution power of the microscope (under 0.2nm) it is necessary to take extraordinary measures. The use of on line computers has been proposed [e.g.: 2-5] and used with certain amount of success.We have built a system that can perform operations in the range of one frame stored and analyzed per second. A schematic diagram of the system is shown in figure 1. A JEOL 4000EX microscope equipped with an external computer interface is directly linked to a SUN-3 computer. All electrical parameters in the microscope can be changed via this interface by the use of a set of commands. The image is received from a video camera. A commercial image processor improves the signal-to-noise ratio by recursively averaging with a time constant, usually set at 0.25 sec. The computer software is based on a multi-window system and is entirely mouse-driven. All operations can be performed by clicking the mouse on the appropiate windows and buttons. This capability leads to extreme friendliness, ease of operation, and high operator speeds. Image analysis can be done in various ways. Here, we have measured the image contrast and used it to optimize certain parameters. The system is designed to have instant access to: (a) x- and y- alignment coils, (b) x- and y- astigmatism correction coils, and (c) objective lens current. The algorithm is shown in figure 2. Figure 3 shows an example taken from a thin CdTe crystal. The image contrast is displayed for changing objective lens current (defocus value). The display is calibrated in angstroms. Images are stored on the disk and are accessible by clicking the data points in the graph. Some of the frame-store images are displayed in Fig. 4.


1997 ◽  
Vol 6 (3) ◽  
pp. 57-65 ◽  
Author(s):  
Lisa A. Wood ◽  
Joan L. Rankin ◽  
David R. Beukelman

Word prompt programs are computer software programs or program features that are used in addition to basic word processing. These programs provide word lists from which a user selects a desired word and inserts it into a line of text. This software is used to support individuals with severe speech, physical, and learning disabilities. This tutorial describes the features of a variety of word prompt programs and reviews the current literature on the use of these programs by people with oral and written language needs. In addition, a matrix that identifies the features contained in eight sample word prompt programs is provided. The descriptions of features and the matrix are designed to assist speech-language pathologists and teachers in evaluating and selecting word prompt programs to support their clients' oral and written communication.


Crisis ◽  
2016 ◽  
Vol 37 (2) ◽  
pp. 140-147 ◽  
Author(s):  
Michael J. Egnoto ◽  
Darrin J. Griffin

Abstract. Background: Identifying precursors that will aid in the discovery of individuals who may harm themselves or others has long been a focus of scholarly research. Aim: This work set out to determine if it is possible to use the legacy tokens of active shooters and notes left from individuals who completed suicide to uncover signals that foreshadow their behavior. Method: A total of 25 suicide notes and 21 legacy tokens were compared with a sample of over 20,000 student writings for a preliminary computer-assisted text analysis to determine what differences can be coded with existing computer software to better identify students who may commit self-harm or harm to others. Results: The results support that text analysis techniques with the Linguistic Inquiry and Word Count (LIWC) tool are effective for identifying suicidal or homicidal writings as distinct from each other and from a variety of student writings in an automated fashion. Conclusion: Findings indicate support for automated identification of writings that were associated with harm to self, harm to others, and various other student writing products. This work begins to uncover the viability or larger scale, low cost methods of automatic detection for individuals suffering from harmful ideation.


2010 ◽  
Vol 9 (2) ◽  
pp. 69-78 ◽  
Author(s):  
David De Cremer ◽  
Maarten Wubben

The present research examined how voice procedures and leader confidence affect participants’ negative emotions and willingness to withdraw. It was predicted that receiving voice would be valued out of instrumental concerns, but only when the enacting leader was high in confidence. Two laboratory experiments indeed showed an interaction between type of voice (pre-decisional vs. post-decisional) and leader’s confidence (low vs. high) on participants’ negative emotions and willingness to withdraw. In particular, post-decision voice only led to more negative responses than did pre-decision voice when the enacting leader was high in confidence. Negative emotions mediated this interaction effect of type of voice on willingness to withdraw. Implications for integrating the leadership and procedural justice literatures are discussed.


1968 ◽  
Vol 13 (10) ◽  
pp. 536-536
Author(s):  
Peter G. Polson

Sign in / Sign up

Export Citation Format

Share Document