Portal Services for Collaborative Remote Instrument Control, Monitoring and Data Access

Author(s):  
Douglas du Boulay ◽  
Clinton Chee ◽  
Kenneth Chiu ◽  
Richard Leow ◽  
Donald F. McMullen ◽  
...  
Author(s):  
P. Hagemann

The use of computers in the analytical electron microscopy today shows three different trends (1) automated image analysis with dedicated computer systems, (2) instrument control by microprocessors and (3) data acquisition and processing e.g. X-ray or EEL Spectroscopy.While image analysis in the T.E.M. usually needs a television chain to get a sequential transmission suitable as computer input, the STEM system already has this necessary facility. For the EM400T-STEM system therefore an interface was developed, that allows external control of the beam deflection in TEM as well as the control of the STEM probe and video signal/beam brightness on the STEM screen.The interface sends and receives analogue signals so that the transmission rate is determined by the convertors in the actual computer periphery.


Author(s):  
James F. Mancuso

IBM PC compatible computers are widely used in microscopy for applications ranging from control to image acquisition and analysis. The choice of IBM-PC based systems over competing computer platforms can be based on technical merit alone or on a number of factors relating to economics, availability of peripherals, management dictum, or simple personal preference.IBM-PC got a strong “head start” by first dominating clerical, document processing and financial applications. The use of these computers spilled into the laboratory where the DOS based IBM-PC replaced mini-computers. Compared to minicomputer, the PC provided a more for cost-effective platform for applications in numerical analysis, engineering and design, instrument control, image acquisition and image processing. In addition, the sitewide use of a common PC platform could reduce the cost of training and support services relative to cases where many different computer platforms were used. This could be especially true for the microscopists who must use computers in both the laboratory and the office.


Author(s):  
N. D. Evans ◽  
M. K. Kundmann

Post-column energy-filtered transmission electron microscopy (EFTEM) is inherently challenging as it requires the researcher to setup, align, and control both the microscope and the energy-filter. The software behind an EFTEM system is therefore critical to efficient, day-to-day application of this technique. This is particularly the case in a multiple-user environment such as at the Shared Research Equipment (SHaRE) User Facility at Oak Ridge National Laboratory. Here, visiting researchers, who may oe unfamiliar with the details of EFTEM, need to accomplish as much as possible in a relatively short period of time.We describe here our work in extending the base software of a commercially available EFTEM system in order to automate and streamline particular EFTEM tasks. The EFTEM system used is a Philips CM30 fitted with a Gatan Imaging Filter (GIF). The base software supplied with this system consists primarily of two Macintosh programs and a collection of add-ons (plug-ins) which provide instrument control, imaging, and data analysis facilities needed to perform EFTEM.


Author(s):  
John Mansfield

Advances in camera technology and digital instrument control have meant that in modern microscopy, the image that was, in the past, typically recorded on a piece of film is now recorded directly into a computer. The transfer of the analog image seen in the microscope to the digitized picture in the computer does not mean, however, that the problems associated with recording images, analyzing them, and preparing them for publication, have all miraculously been solved. The steps involved in the recording an image to film remain largely intact in the digital world. The image is recorded, prepared for measurement in some way, analyzed, and then prepared for presentation.Digital image acquisition schemes are largely the realm of the microscope manufacturers, however, there are also a multitude of “homemade” acquisition systems in microscope laboratories around the world. It is not the mission of this tutorial to deal with the various acquisition systems, but rather to introduce the novice user to rudimentary image processing and measurement.


Author(s):  
Carl E. Henderson

Over the past few years it has become apparent in our multi-user facility that the computer system and software supplied in 1985 with our CAMECA CAMEBAX-MICRO electron microprobe analyzer has the greatest potential for improvement and updating of any component of the instrument. While the standard CAMECA software running on a DEC PDP-11/23+ computer under the RSX-11M operating system can perform almost any task required of the instrument, the commands are not always intuitive and can be difficult to remember for the casual user (of which our laboratory has many). Given the widespread and growing use of other microcomputers (such as PC’s and Macintoshes) by users of the microprobe, the PDP has become the “oddball” and has also fallen behind the state-of-the-art in terms of processing speed and disk storage capabilities. Upgrade paths within products available from DEC are considered to be too expensive for the benefits received. After using a Macintosh for other tasks in the laboratory, such as instrument use and billing records, word processing, and graphics display, its unique and “friendly” user interface suggested an easier-to-use system for computer control of the electron microprobe automation. Specifically a Macintosh IIx was chosen for its capacity for third-party add-on cards used in instrument control.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


2011 ◽  
Vol 34 (3) ◽  
pp. 473-481
Author(s):  
Guo-Fu XIE ◽  
Wen-Cheng WANG
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document