Scanning electron microscopy Sample Clauses

Scanning electron microscopy. The scanning electron microscope (SEM) was one of the first techniques described for assessing the structural changes of dental hard tissues (Xxxxx and Xxxxxx, 1967) and is a technique that is still widely used today in research into dental erosion (Xxxxxxxxx et al., 2003; Xxxxxxx et al., 1996). The SEM uses a very fine beam of electrons, which is scanned across the surface of the sample as a raster of parallel contiguous lines. Upon hitting the sample surface the electrons are either reflected as backscattered electrons or secondary electrons are generated by the interaction of the primary electrons with the sample surface. The number of secondary electrons depends on the surface topography or nature of the sample. These secondary electrons are collected, amplified and analysed before modulating the beam of a cathode ray, scanned in sympathy with the scanning beam. The resulting image resembles that seen through an optical lens but at a much higher resolution and a greater depth of field. The ultimate resolving power of a SEM is dependent on the dimensions of the probe beam which in turn is controlled by diffraction at the final aperture, chromatic aberration and the size of the electron source. A resolution of up to 1 nm is achievable with a field emission system and an in-lens detector. A typical SEM can achieve magnifications of x400000. The magnification is dependent on the excitation of the scan coils, as modified by any residual magnetic or stray fields. The magnification also depends sensitively upon the working distance between the lens and the sample (Xxxxxxx, 2008; Xxxxxxx et al., 2000). For conventional SEM, the sample surface must be coated with a material that is electrically conductive, in order to prevent a reduction in image quality due to accumulation of negative electrostatic charge. These so called charging effects result in artefacts which appear on microscope images as irregular, featureless bright patches, or streaks, and are generally accompanied by loss in resolution (Xxxxxxxx and Xxx Xxxx, 1971). The coating material is usually gold and therefore a disadvantage of this technique is that the samples will be irreversibly altered during the desiccation and sputtering process. Alternatively casts can be made from the samples if their loss/destruction is unacceptable, however the replication technique results in a degree of dimensional inaccuracies and loss of information (Xxxxx Xx Xxx - Xxxxxxxxx et al.; Xxxxx et al., 2010). This has ...
AutoNDA by SimpleDocs

Related to Scanning electron microscopy

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Electronic Record Search The Reporting Financial Institution must review electronically searchable data maintained by them for any of the following indicia:

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Network Interface Device (NID) 2.7.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the end user’s customer-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the end user each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Electronic Visit Verification ("EVV Provider shall cooperate with State requirements for electronic visit verification for personal care services and home health services, as applicable.

Time is Money Join Law Insider Premium to draft better contracts faster.