7,931 research outputs found
The study of crystals for space processing and the effect of o-gravity
The mechanism of crystal growth was studied by solution technique and how it was affected by space environment. Investigation was made as to how space processing methods are used to improve the promising candidate materials for different devices
A study of solution crystal growth in LOW-g (2-IML-1)
During the International Microgravity Laboratory-1 (IML-1) mission it is planned to grow triglycine sulfate (TGS) crystals from aqueous solution using the modified Fluids Experiment System (FES). A special cooled sting technique will be used for solution crystal growth. The objectives of the experiment are as follows: (1) to grow crystals of TGS using the modified FES; (2) to perform holographic interferometric tomography of the fluid field in three dimensions; (3) to study the fluid motion due to g-jitter by multiple exposure holography of tracer particles; and (4) to study the influence of g-jitter on the growth rate
A study of crystal growth by solution technique
The mechanism of crystal growth by solution technique was studied. A low temperature solution crystal growth setup was developed. Crystals of triglycine sulfate (TGS) were grown using this arrangement. Some additional tasks were performed toward fabrication of experiments for future space flight
The study of single crystals for space processing and the effect of zero gravity
A study was undertaken to analyze different growth techniques affected by a space environment. Literature on crystal growth from melt, vapor phase and float zone was reviewed and the physical phenomena important for crystal growth in zero-gravity environment was analyzed. Recommendations for potential areas of crystal growth feasible for space missions are presented and a bibliography of articles in the area of crystal growth in general is listed
Recommended from our members
Classification of information systems research revisited: A keyword analysis approach
A number of studies have previously been conducted on keyword analysis in order to provide a comprehensive scheme to classify information systems (IS) research. However, these studies appeared prior to 1994, and IS research has clearly developed substantially since then with the emergence of areas such as electronic commerce, electronic government, electronic health and numerous others. Furthermore, the majority of European IS outlets - such as the European Journal of Information Systems and Information Systems Journal - were founded in the early 1990s, and keywords from these journals were not included in any previous work. Given that a number of studies have raised the issue of differences in European and North American IS research topics and approaches, it is arguable that any such analysis must consider sources from both locations to provide a representative and balanced view of IS classification. Moreover, it has also been argued that there is a need for further work in order to create a comprehensive keyword classification scheme reflecting the current state of the art. Consequently, the aim of this paper is to present the results of a keyword analysis utilizing keywords appearing in major peer-reviewed IS publications after the year 1990 through to 2007. This aim is realized by means of the two following objectives: (1) collect all keywords appearing in 24 peer reviewed IS journals after 1990; and (2) identify keywords not included in the previous IS keyword classification scheme. This paper also describes further research required in order to place new keywords in appropriate IS research categories. The paper makes an incremental contribution toward a contemporary means of classifying IS research. This work is important and useful for researchers in understanding the area and evolution of the IS field and also has implications for improving information search and retrieval activities
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings
We present a proxy signature scheme using bilinear pairings that provides
effective proxy revocation. The scheme uses a binding-blinding technique to
avoid secure channel requirements in the key issuance stage. With this
technique, the signer receives a partial private key from a trusted authority
and unblinds it to get his private key, in turn, overcomes the key escrow
problem which is a constraint in most of the pairing-based proxy signature
schemes. The scheme fulfills the necessary security requirements of proxy
signature and resists other possible threats
- …