scholarly journals Website optimization for mobile devices

Author(s):  
P.A. Komarov ◽  
◽  
V.I. Stelletsky ◽  

The results of a research on the optimization of the site of the Central Scientific Agricultural Library for mobile devices are presented. A historical overview of the development of ‘mobile’ sites is given, various approaches to their creation are discussed. Specifications of various mobile devices, their features, methods for determining the fact of switching a user from a mobile version to a version for a personal computer and means for determining the characteristics of a particular device are analyzed. The changes in the process of adaptation for mobile devices of various sections of the library's website are revealed: the main site, search interfaces of databases, reference books, encyclopedias, and electronic libraries.

Author(s):  
Steve Brown

During the last several years a great deal has been written in academic and trade journals that has focused on security. There are several different terms often used, but the following—information security (InfoSec), computer security, and information assurance—are typically meant to be the same, that is, the protection of data, although information assurance is also expanded to include aspects such as personnel, plant, and equipment. While one main theme that has been written has been to improve the effectiveness and understanding of security, apply the various security concepts learned and understand the technologies developed, it is important to recognize that computer security may take on different meanings, dependent on the context that it is being discussed. Computer security is a very large field, and one that is often misunderstood. When we discuss computer security, are we discussing our personal computer at work or home? Are we discussing portable devices, such as mobile devices like Blackberries, PDAs, or laptops? Are we discussing security laws and regulations that might impact the safeguard of personal information, or could we be discussing, designing, and implementing, a risk-based security plan for an organization? It is therefore difficult to discuss computer security unless it is discussed in a frame of reference. Therefore, this paper will discuss some of the issues and concerns of computer security in different frames of reference, and the importance of teaching security with that focus in mind.


Author(s):  
Gianluigi Botton ◽  
Gilles L'espérance

As interest for parallel EELS spectrum imaging grows in laboratories equipped with commercial spectrometers, different approaches were used in recent years by a few research groups in the development of the technique of spectrum imaging as reported in the literature. Either by controlling, with a personal computer both the microsope and the spectrometer or using more powerful workstations interfaced to conventional multichannel analysers with commercially available programs to control the microscope and the spectrometer, spectrum images can now be obtained. Work on the limits of the technique, in terms of the quantitative performance was reported, however, by the present author where a systematic study of artifacts detection limits, statistical errors as a function of desired spatial resolution and range of chemical elements to be studied in a map was carried out The aim of the present paper is to show an application of quantitative parallel EELS spectrum imaging where statistical analysis is performed at each pixel and interpretation is carried out using criteria established from the statistical analysis and variations in composition are analyzed with the help of information retreived from t/γ maps so that artifacts are avoided.


Author(s):  
Stuart McKernan

For many years the concept of quantitative diffraction contrast experiments might have consisted of the determination of dislocation Burgers vectors using a g.b = 0 criterion from several different 2-beam images. Since the advent of the personal computer revolution, the available computing power for performing image-processing and image-simulation calculations is enormous and ubiquitous. Several programs now exist to perform simulations of diffraction contrast images using various approximations. The most common approximations are the use of only 2-beams or a single systematic row to calculate the image contrast, or calculating the image using a column approximation. The increasing amount of literature showing comparisons of experimental and simulated images shows that it is possible to obtain very close agreement between the two images; although the choice of parameters used, and the assumptions made, in performing the calculation must be properly dealt with. The simulation of the images of defects in materials has, in many cases, therefore become a tractable problem.


Author(s):  
F. Hosokawa ◽  
Y. Kondo ◽  
T. Honda ◽  
Y. Ishida ◽  
M. Kersker

High-resolution transmission electron microscopy must attain utmost accuracy in the alignment of incident beam direction and in astigmatism correction, and that, in the shortest possible time. As a method to eliminate this troublesome work, an automatic alignment system using the Slow-Scan CCD camera has been introduced recently. In this method, diffractograms of amorphous images are calculated and analyzed to detect misalignment and astigmatism automatically. In the present study, we also examined diffractogram analysis using a personal computer and digitized TV images, and found that TV images provided enough quality for the on-line alignment procedure of high-resolution work in TEM. Fig. 1 shows a block diagram of our system. The averaged image is digitized by a TV board and is transported to a computer memory, then a diffractogram is calculated using an FFT board, and the feedback parameters which are determined by diffractogram analysis are sent to the microscope(JEM- 2010) through the RS232C interface. The on-line correction system has the following three modes.


2006 ◽  
Author(s):  
David Schroeder ◽  
Larry Bailey ◽  
Julia Pounds ◽  
Carol Manning

Sign in / Sign up

Export Citation Format

Share Document