scholarly journals Special mode of operation of office premises where security and defense forces are located.

Author(s):  
Yevhen Bardin ◽  
Andriy Tokar
Author(s):  
A. V. Kovalenko ◽  
F. F. Belyayev ◽  
V. V. Lazarev ◽  
V. V. Lupandin

The paper describes the history of design, development and 15 years’ sea-going experience of the MASHPROEKT combined cycle plants. Four R060 type ships powered by eight combined cycle plants each rated at. 25.000 h.p. and three naval ships with six cruise combined cycle plants each rated at. 10, 000 h.p. are in service now. Using of combined cycle permitted to increase their thermal efficiency by 20–30 per cent. To increase efficiency at a speed of 15…18 knots, a special mode of operation is used: the gas turbine and waste heat boiler operate at one board and steam generated by this waste heat boiler is used for a steam turbine of other board. Total operation life of all marine gas turbine units exceeds 330,000 hours.


Author(s):  
L. Gandolfi ◽  
J. Reiffel

Calculations have been performed on the contrast obtainable, using the Scanning Transmission Electron Microscope, in the observation of thick specimens. Recent research indicates a revival of an earlier interest in the observation of thin specimens with the view of comparing the attainable contrast using both types of specimens.Potential for biological applications of scanning transmission electron microscopy has led to a proliferation of the literature concerning specimen preparation methods and the controversy over “to stain or not to stain” in combination with the use of the dark field operating mode and the same choice of technique using bright field mode of operation has not yet been resolved.


Author(s):  
J. M. Cowley

The comparison of scanning transmission electron microscopy (STEM) with conventional transmission electron microscopy (CTEM) can best be made by means of the Reciprocity Theorem of wave optics. In Fig. 1 the intensity measured at a point A’ in the CTEM image due to emission from a point B’ in the electron source is equated to the intensity at a point of the detector, B, due to emission from a point A In the source In the STEM. On this basis it can be demonstrated that contrast effects In the two types of instrument will be similar. The reciprocity relationship can be carried further to include the Instrument design and experimental procedures required to obtain particular types of information. For any. mode of operation providing particular information with one type of microscope, the analagous type of operation giving the same information can be postulated for the other type of microscope. Then the choice between the two types of instrument depends on the practical convenience for obtaining the required Information.


Author(s):  
H. M. Thieringer

It has repeatedly been show that with conventional electron microscopes very fine electron probes can be produced, therefore allowing various micro-techniques such as micro recording, X-ray microanalysis and convergent beam diffraction. In this paper the function and performance of an SIEMENS ELMISKOP 101 used as a scanning transmission microscope (STEM) is described. This mode of operation has some advantages over the conventional transmission microscopy (CTEM) especially for the observation of thick specimen, in spite of somewhat longer image recording times.Fig.1 shows schematically the ray path and the additional electronics of an ELMISKOP 101 working as a STEM. With a point-cathode, and using condensor I and the objective lens as a demagnifying system, an electron probe with a half-width ob about 25 Å and a typical current of 5.10-11 amp at 100 kV can be obtained in the back focal plane of the objective lens.


2018 ◽  
Vol 11 (1) ◽  
pp. 39
Author(s):  
Vyacheslav Vavilov ◽  
Flur Ismagilov ◽  
Irek Khayrullin ◽  
Ruslan Dinarovich Karimov

2019 ◽  
Vol 5 (1) ◽  
pp. 8-12
Author(s):  
Matkarim Ibragimov ◽  
◽  
Gulnoz Ergasheva

2018 ◽  
Vol 2 (1) ◽  
pp. 1
Author(s):  
Dafirius Lombu ◽  
Siska Dame Tarihoran ◽  
Irwan Gulo

Generally, the database access of a website lies in the user login. When the login data is not accompanied by security techniques, it is very easily accessible by other parties. One effort that can be done to solve the problem is to encode the login data of website users based on cryptographic technique algorithm. Triangle Chain Cipher (TCC) is one of the classic cryptographic algorithms that encode data doubly and generate keys randomly along the plain. The process of encryption and decryption are interdependent to be one of the advantages of this algorithm. This algorithm will be more effective when combined with the Cipher Block Chaining (CBC) operation mode that is widely used in modern cryptographic algorithms today. The feedback mechanism between the blocks in this mode of operation is the operating advantage. This study describes how to combine the mode of operation of block chaining cipher with triangle chain cipher algorithm so that cipher data login website generated more random and difficult to find its original meaning.


Kerntechnik ◽  
2011 ◽  
Vol 76 (4) ◽  
pp. 237-243
Author(s):  
R. Kumar ◽  
A. J. Gaikwad ◽  
A. D. Contractor ◽  
A. Srivastava ◽  
H. G. Lele ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document