2 resultados para Image Processing in Molecular Biology Research

em Universitätsbibliothek Kassel, Universität Kassel, Germany


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The dynamics of molecular multiphoton ionization and fragmentation of a diatomic molecule (Na_2) have been studied in molecular beam experiments. Femtosecond laser pulses from an amplified colliding-pulse mode-locked (CPM) ring dye laser are employed to induce and probe the molecular transitions. The final continuum states are analyzed by photoelectron spectroscopy, by ion mass spectrometry and by measuring the kinetic energy of the formed ionic fragments. Pump-probe spectra employing 70-fs laser pulses have been measured to study the time dependence of molecular multiphoton ionization and fragmentation. The oscillatory structure of the transient spectra showing the dynamics on the femtosecond time scale can best be understood in terms of the motion of wave packets in bound molecular potentials. The transient Na_2^+ ionization and the transient Na^+ fragmentation spectra show that contributions from direct photoionization of a singly excited electronic state and from excitation and autoionization of a bound doubly excited molecular state determine the time evolution of molecular multiphoton ionization.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

About ten years ago, triadic contexts were presented by Lehmann and Wille as an extension of Formal Concept Analysis. However, they have rarely been used up to now, which may be due to the rather complex structure of the resulting diagrams. In this paper, we go one step back and discuss how traditional line diagrams of standard (dyadic) concept lattices can be used for exploring and navigating triadic data. Our approach is inspired by the slice & dice paradigm of On-Line-Analytical Processing (OLAP). We recall the basic ideas of OLAP, and show how they may be transferred to triadic contexts. For modeling the navigation patterns a user might follow, we use the formalisms of finite state machines. In order to present the benefits of our model, we show how it can be used for navigating the IT Baseline Protection Manual of the German Federal Office for Information Security.