PIFA: An Intelligent Phase Identification and Frequency Adjustment Framework for Time-Sensitive Mobile Computing

Author(s):  
Xia Zhang ◽  
Xusheng Xiao ◽  
Liang He ◽  
Yun Ma ◽  
Yangyang Huang ◽  
...  
Author(s):  
Prakash Rao

Image shifts in out-of-focus dark field images have been used in the past to determine, for example, epitaxial relationships in thin films. A recent extension of the use of dark field image shifts has been to out-of-focus images in conjunction with stereoviewing to produce an artificial stereo image effect. The technique, called through-focus dark field electron microscopy or 2-1/2D microscopy, basically involves obtaining two beam-tilted dark field images such that one is slightly over-focus and the other slightly under-focus, followed by examination of the two images through a conventional stereoviewer. The elevation differences so produced are usually unrelated to object positions in the thin foil and no specimen tilting is required.In order to produce this artificial stereo effect for the purpose of phase separation and identification, it is first necessary to select a region of the diffraction pattern containing more than just one discrete spot, with the objective aperture.


Author(s):  
C.M. Sung ◽  
K.J. Ostreicher ◽  
M.L. Huckabee ◽  
S.T. Buljan

A series of binary oxides and SiC whisker reinforced composites both having a matrix composed of an α-(Al, R)2O3 solid solution (R: rare earth) have been studied by analytical electron microscopy (AEM). The mechanical properties of the composites as well as crystal structure, composition, and defects of both second phases and the matrix were investigated. The formation of various second phases, e.g. garnet, β-Alumina, or perovskite structures in the binary Al2O3-R2O3 and the ternary Al2O3-R2O3-SiC(w) systems are discussed.Sections of the materials having thicknesses of 100 μm - 300 μm were first diamond core drilled. The discs were then polished and dimpled. The final step was ion milling with Ar+ until breakthrough occurred. Samples prepared in this manner were then analyzed using the Philips EM400T AEM. The low-Z energy dispersive X-ray spectroscopy (EDXS) data were obtained and correlated with convergent beam electron diffraction (CBED) patterns to identify phase compositions and structures. The following EDXS parameters were maintained in the analyzed areas: accelerating voltage of 120 keV, sample tilt of 12° and 20% dead time.


Author(s):  
Arezki Tagnit-Hamou ◽  
Shondeep L. Sarkar

All the desired properties of cement primarily depend on the physicochemical characteristics of clinker from which the cement is produced. The mineralogical composition of the clinker forms the most important parameter influencing these properties.Optical microscopy provides reasonably accurate information pertaining to the thermal history of the clinker, while XRDA still remains the proven method of phase identification, and bulk chemical composition of the clinker can be readily obtained from XRFA. Nevertheless, all these microanalytical techniques are somewhat limited in their applications, and SEM/EDXA combination fills this gap uniquely by virtue of its high resolution imaging capability and possibility of instantaneous chemical analysis of individual phases.Inhomogeneities and impurities in the raw meal, influence of kiln conditions such as sintering and cooling rate being directly related to the microstructure can be effectively determined by SEM/EDXA. In addition, several physical characteristics of cement, such as rhcology, grindability and hydraulicity also depend on the clinker microstructure.


Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


Sign in / Sign up

Export Citation Format

Share Document