An approach to diagnostics for a digital data handling system

1969 ◽  
Author(s):  
T. HARDIN
2007 ◽  
Vol 7 (1) ◽  
pp. 306-315 ◽  
Author(s):  
Hakob P. Bezirganyan ◽  
Siranush E. Bezirganyan ◽  
Hayk H. Bezirganyan ◽  
Petros H. Bezirganyan

Most important aspect of nanotechnology applications in the information ultrahigh storage is the miniaturization of data carrier elements of the storage media with emphasis on the long-term stability. Proposed two-dimensional ultrahigh-density X-ray optical memory, named X-ROM, with long-term stability is an information carrier basically destined for digital data archiving. X-ROM is a semiconductor wafer, in which the high-reflectivity nanosized X-ray mirrors are embedded. Data are encoded due to certain positions of the mirrors. Ultrahigh-density data recording procedure can e.g., be performed via mask-less zone-plate-array lithography (ZPAL), spatial-phase-locked electron-beam lithography (SPLEBL), or focused ion-beam lithography (FIB). X-ROM manufactured by nanolithography technique is a write-once memory useful for terabit-scale memory applications, if the surface area of the smallest recording pits is less than 100 nm2. In this case the X-ROM surface-storage capacity of a square centimetre becomes by two orders of magnitude higher than the volumetric data density really achieved for three-dimensional optical data storage medium. Digital data read-out procedure from proposed X-ROM can e.g., be performed via glancing-angle incident X-ray micro beam (GIX) using the well-developed X-ray reflectometry technique. In presented theoretical paper the crystal-analyser operating like an image magnifier is added to the set-up of X-ROM data handling system for the purpose analogous to case of application the higher numerical aperture objective in optical data read-out system. We also propose the set-up of the X-ROM read-out system based on more the one incident X-ray micro beam. Presented scheme of two-beam data handling system, which operates on two mutually perpendicular well-collimated monochromatic incident X-ray micro beams, essentially increases the reliability of the digital information read-out procedure. According the graphs of characteristic functions presented in paper, one may choose optimally the incident radiation wavelength, as well as the angle of incidence of X-ray micro beams, appropriate for proposed digital data read-out procedure.


1982 ◽  
Vol 28 (6) ◽  
pp. 1370-1374 ◽  
Author(s):  
J Woo ◽  
M A Longley ◽  
D C Cannon

Abstract We evaluated a commercially available homogeneous enzyme immunoassay (EMIT, Syva Co.) for tobramycin against a reference radioimmunoassay (RIA) method. Between-assay precision (CV) was 2.9% at 6.2 mg/L and 3.0% for values in the range of 1.0-7.6 mg/L. Accuracy based on a recovery experiment (1.0-13.0 mg/L) yielded an analytical recovery of 88-112%. A correlation study with 75 sera from patients on tobramycin therapy showed that EMIT = 0.984 RIA - 0.0808, r = 0.993. Neither the EMIT nor the RIA procedure was affected by the presence of gentamicin, amikacin, and vancomycin. Absorbance data from the EMIT system calculated with the conventional RIA logit-log algorithm correlate well with results generated by the Syva data-handling system (logit-log = 1.077 Syva - 0.318, r = 0.998). A reagent stability study indicated that the EMIT reagents, once reconstituted, remain stable for at least 17 days when stored at refrigerated temperatures, or 11 days if stored at room temperature, thus enabling frequent "stat" assays without the need to prepare a calibration curve each time.


1983 ◽  
Vol 62 ◽  
pp. 60-62
Author(s):  
Nathaniel M. White

The systematic search for stellar multiplicity by observations of lunar occultations began in 1969. David Evans will review a large portion of the data collected since then in the second paper of this session. Here we will outline the historical development of the technique and comment on its limitations, contributions to double star research, and future improvements.Sir John Herschel (1865) may have been the first to suggest that “a double star, too close to be seen divided with any telescope, may yet be detected to be double by the mode of its disappearance.” However, the visual discovery of duplicity by occultation is not sufficient, for the observations are not subject to analysis after the fact. The power of the occultation technique was realized more than 100 years after the suggestion, with the application of photomultipliers and electronic digital data handling. Whitford (1939) took the first step in using a cesium photo tube, oscilloscope, and moving film to record the occultations of Beta Capricorni and Upsilon Aquarii. The resolution of the spectroscopic binary Beta Capricorni was discussed, but he concluded his data were not able to resolve it, an observation which was later accomplished at several observatories and summarized by Evans and Fekel (1979).


2020 ◽  
Vol 42 (5_suppl) ◽  
pp. 85S-91S
Author(s):  
Sandeep Grover ◽  
Siddharth Sarkar ◽  
Rahul Gupta

Digital psychiatry and e-mental health have proliferated and permeated vastly in the current landscape of mental health care provision. The COVID-19 crisis has accelerated this digital transformation, and changes that usually take many years to translate into clinical practice have been implemented in a matter of weeks. These have outpaced the checks and balances that would typically accompany such changes, which has brought into focus a need to have a proper approach for digital data handling. Health care data is sensitive, and is prone to hacking due to the lack of stringent protocols regarding its storage and access. Mental health care data need to be more secure due to the stigma associated with having a mental health condition. Thus, there is a need to emphasize proper data handling by mental health professionals, and policies to ensure safeguarding patient’s privacy are required. The aim of useful, free, and fair use of mental health care data for clinical, business, and research purposes should be balanced with the need to ensure the data is accessible to only those who are authorized. Systems and policies should be in place to ensure that data storage, access, and disposal are systematic and conform to data safety norms.


Author(s):  
Akshit Akhoury ◽  
Krishna Birla ◽  
Rohit Sarkar ◽  
Arun Ravi ◽  
Shaleen Kalsi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document