Scanning electron microscopy Sample Clauses

Scanning electron microscopy. The scanning electron microscope (SEM) was one of the first techniques described for assessing the structural changes of dental hard tissues (Xxxxx and Xxxxxx, 1967) and is a technique that is still widely used today in research into dental erosion (Xxxxxxxxx et al., 2003; Xxxxxxx et al., 1996). The SEM uses a very fine beam of electrons, which is scanned across the surface of the sample as a raster of parallel contiguous lines. Upon hitting the sample surface the electrons are either reflected as backscattered electrons or secondary electrons are generated by the interaction of the primary electrons with the sample surface. The number of secondary electrons depends on the surface topography or nature of the sample. These secondary electrons are collected, amplified and analysed before modulating the beam of a cathode ray, scanned in sympathy with the scanning beam. The resulting image resembles that seen through an optical lens but at a much higher resolution and a greater depth of field. The ultimate resolving power of a SEM is dependent on the dimensions of the probe beam which in turn is controlled by diffraction at the final aperture, chromatic aberration and the size of the electron source. A resolution of up to 1 nm is achievable with a field emission system and an in-lens detector. A typical SEM can achieve magnifications of x400000. The magnification is dependent on the excitation of the scan coils, as modified by any residual magnetic or stray fields. The magnification also depends sensitively upon the working distance between the lens and the sample (Xxxxxxx, 2008; Xxxxxxx et al., 2000). For conventional SEM, the sample surface must be coated with a material that is electrically conductive, in order to prevent a reduction in image quality due to accumulation of negative electrostatic charge. These so called charging effects result in artefacts which appear on microscope images as irregular, featureless bright patches, or streaks, and are generally accompanied by loss in resolution (Xxxxxxxx and Xxx Xxxx, 1971). The coating material is usually gold and therefore a disadvantage of this technique is that the samples will be irreversibly altered during the desiccation and sputtering process. Alternatively casts can be made from the samples if their loss/destruction is unacceptable, however the replication technique results in a degree of dimensional inaccuracies and loss of information (Xxxxx Xx Xxx - Xxxxxxxxx et al.; Xxxxx et al., 2010). This has ...
AutoNDA by SimpleDocs

Related to Scanning electron microscopy

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Images If applicable, the CONSULTANT is prohibited from capturing on any visual medium images of any property, logo, student, or employee of the DISTRICT, or any image that represents the DISTRICT without express written consent from the DISTRICT.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Searchable Whois Notwithstanding anything else in this Agreement, Registry Operator must offer a searchable Whois service compliant with the requirements described in Section 1.10 of Specification 4 of this Agreement. Registry Operator must make available the services only to authenticated users after they logged in by supplying proper credentials (i.e., user name and password). Registry Operator must issue such credentials exclusively to eligible users and institutions that supply sufficient proof of their legitimate interest in this feature (e.g., law enforcement agencies).

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

Time is Money Join Law Insider Premium to draft better contracts faster.