Gwyddion User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Gwyddion User Guide Gwyddion user guide Petr Klapetek, David Necas,ˇ and Christopher Anderson This guide is a work in progress. ii Gwyddion user guide Copyright © 2004–2007, 2009–2011 Petr Klapetek, David Necas,ˇ Christopher Anderson Permission is granted to copy, distribute and/or modify this document under the terms of either • The GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled GNU Free Documentation License. • The GNU General Public License, Version 2 or any later version published by the Free Software Foundation. A copy of the license is included in the section entitled GNU General Public License. Contents iii Contents 1 Introduction 1 1.1 Motivation . .1 1.2 Licensing . .1 2 Installation 2 2.1 Linux/Unix Packages . .2 2.2 MS Windows Packages . .2 2.3 Build Dependencies . .3 2.4 Compilation on Linux/Unix . .4 Quick Instructions . .4 Source Unpacking . .4 Configuration . .5 Configuration tweaks . .5 Compilation . .6 Installation . .6 Running . .6 Deinstallation . .7 RPM Packages . .7 2.5 MacOSX.......................................................7 Preparation . .7 MacPorts . .7 Fink..........................................................8 Running . .8 2.6 Cross-Compiling for MS Windows . .8 Setup .........................................................9 Base MinGW32 Packages . .9 Wine .....................................................9 NSIS .....................................................9 Extra MinGW32 Packages . .9 Support scripts . 10 Compilation . 10 Running Under Wine . 10 2.7 Subversion Checkout, Development . 11 MSWindows ..................................................... 12 3 Getting Started 13 3.1 Main Window . 13 3.2 Data Browser . 14 Controlling the Browser . 14 Channels . 15 Graphs......................................................... 15 Spectra . 15 3.3 Managing Files . 15 File Loading . 16 File Merging . 16 File Saving . 16 Document History . 17 3.4 Data Window . 17 3.5 Graph Window . 18 3.6 Tools.......................................................... 18 iv Gwyddion user guide 3.7 False Color Mapping . 20 Color Range Tool . 20 Color Gradient Editor . 21 3.8 Presentations and Masks . 21 Presentations . 21 Masks......................................................... 21 Working with Masks . 22 Mask Editor Tool . 22 MarkWith....................................................... 23 3.9 Selections . 23 Selection Manager . 24 3.10 OpenGL 3D Data Display . 25 Basic Controls . 25 Full Controls . 25 Saving Images . 26 OpenGL Material Editor . 26 3.11 Single Point Spectra . 26 Point Spectroscopy Tool . 26 3.12 Metadata . 27 3.13 Raw Data File Import . 27 Information . 28 Data Format . 28 Presets . 29 3.14 Specific Data Import . 29 Graphics Formats . 29 Graph Curves . 29 XYZData....................................................... 29 3.15 Plug-ins . 30 4 Data Processing and Analysis 31 4.1 Basic Operations . 31 Basic 2D Data Operations . ..
Recommended publications
  • Design and Implementation of Image Processing and Compression Algorithms for a Miniature Embedded Eye Tracking System Pavel Morozkin
    Design and implementation of image processing and compression algorithms for a miniature embedded eye tracking system Pavel Morozkin To cite this version: Pavel Morozkin. Design and implementation of image processing and compression algorithms for a miniature embedded eye tracking system. Signal and Image processing. Sorbonne Université, 2018. English. NNT : 2018SORUS435. tel-02953072 HAL Id: tel-02953072 https://tel.archives-ouvertes.fr/tel-02953072 Submitted on 29 Sep 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Sorbonne Université Institut supérieur d’électronique de Paris (ISEP) École doctorale : « Informatique, télécommunications & électronique de Paris » Design and Implementation of Image Processing and Compression Algorithms for a Miniature Embedded Eye Tracking System Par Pavel MOROZKIN Thèse de doctorat de Traitement du signal et de l’image Présentée et soutenue publiquement le 29 juin 2018 Devant le jury composé de : M. Ales PROCHAZKA Rapporteur M. François-Xavier COUDOUX Rapporteur M. Basarab MATEI Examinateur M. Habib MEHREZ Examinateur Mme Maria TROCAN Directrice de thèse M. Marc Winoc SWYNGHEDAUW Encadrant Abstract Human-Machine Interaction (HMI) progressively becomes a part of coming future. Being an example of HMI, embedded eye tracking systems allow user to interact with objects placed in a known environment by using natural eye movements.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Metadefender Core V4.13.1
    MetaDefender Core v4.13.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Image Formats
    Image Formats Ioannis Rekleitis Many different file formats • JPEG/JFIF • Exif • JPEG 2000 • BMP • GIF • WebP • PNG • HDR raster formats • TIFF • HEIF • PPM, PGM, PBM, • BAT and PNM • BPG CSCE 590: Introduction to Image Processing https://en.wikipedia.org/wiki/Image_file_formats 2 Many different file formats • JPEG/JFIF (Joint Photographic Experts Group) is a lossy compression method; JPEG- compressed images are usually stored in the JFIF (JPEG File Interchange Format) >ile format. The JPEG/JFIF >ilename extension is JPG or JPEG. Nearly every digital camera can save images in the JPEG/JFIF format, which supports eight-bit grayscale images and 24-bit color images (eight bits each for red, green, and blue). JPEG applies lossy compression to images, which can result in a signi>icant reduction of the >ile size. Applications can determine the degree of compression to apply, and the amount of compression affects the visual quality of the result. When not too great, the compression does not noticeably affect or detract from the image's quality, but JPEG iles suffer generational degradation when repeatedly edited and saved. (JPEG also provides lossless image storage, but the lossless version is not widely supported.) • JPEG 2000 is a compression standard enabling both lossless and lossy storage. The compression methods used are different from the ones in standard JFIF/JPEG; they improve quality and compression ratios, but also require more computational power to process. JPEG 2000 also adds features that are missing in JPEG. It is not nearly as common as JPEG, but it is used currently in professional movie editing and distribution (some digital cinemas, for example, use JPEG 2000 for individual movie frames).
    [Show full text]
  • Developing New Afm Imaging Technique and Software for Dna Mismatch Repair
    DEVELOPING NEW AFM IMAGING TECHNIQUE AND SOFTWARE FOR DNA MISMATCH REPAIR Zimeng Li A dissertation submitted to the faulty at the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Physics and Astronomy. Chapel Hill 2019 Approved by: Dorothy Erie Tom Clegg Richard Superfine Wu Yue Tom Kunkel Paul Modrich ©2019 Zimeng Li ALL RIGHTS RESERVED ii ABSTRACT Zimeng Li: Developing New AFM Imaging Technique and Software for DNA Mismatch Repair (Under the direction of Dorothy Erie) Atomic Force Microscopy (AFM) is a powerful technique to study the assembly and function of multiprotein-DNA complexes, such as the MutS-MutL-DNA complex in DNA mismatch repair. As a high-resolution, single-molecule imaging technique, AFM has the advantage of directly visualizing individual protein-DNA complexes in their native conformations, but it has two severe limitations. First, it is unable to resolve the location of the DNA inside the protein. Second, it lacks a comprehensive software that is tailored for single- molecule studies and high-throughput analyses. To tackle these issues, we developed DREEM (Dual-Resonance-frequency-Enhanced Electrostatic Force Microscopy). DREEM is a new AFM imaging method that is capable of resolving DNA path inside the protein-DNA complex. With DREEM, we can reveal the path of the DNA wrapping around histones in nucleosomes and the path of DNA through multiprotein mismatch repair complexes. We also developed Image Metrics, a full-featured AFM software package that excels in high-throughput shape analysis and single-molecule analysis.
    [Show full text]
  • Forcepoint DLP Supported File Formats and Size Limits
    Forcepoint DLP Supported File Formats and Size Limits Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 This article provides a list of the file formats that can be analyzed by Forcepoint DLP, file formats from which content and meta data can be extracted, and the file size limits for network, endpoint, and discovery functions. See: ● Supported File Formats ● File Size Limits © 2021 Forcepoint LLC Supported File Formats Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 The following tables lists the file formats supported by Forcepoint DLP. File formats are in alphabetical order by format group. ● Archive For mats, page 3 ● Backup Formats, page 7 ● Business Intelligence (BI) and Analysis Formats, page 8 ● Computer-Aided Design Formats, page 9 ● Cryptography Formats, page 12 ● Database Formats, page 14 ● Desktop publishing formats, page 16 ● eBook/Audio book formats, page 17 ● Executable formats, page 18 ● Font formats, page 20 ● Graphics formats - general, page 21 ● Graphics formats - vector graphics, page 26 ● Library formats, page 29 ● Log formats, page 30 ● Mail formats, page 31 ● Multimedia formats, page 32 ● Object formats, page 37 ● Presentation formats, page 38 ● Project management formats, page 40 ● Spreadsheet formats, page 41 ● Text and markup formats, page 43 ● Word processing formats, page 45 ● Miscellaneous formats, page 53 Supported file formats are added and updated frequently. Key to support tables Symbol Description Y The format is supported N The format is not supported P Partial metadata
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Nanosurf Operating Instructions (Naio).Book
    Nanosurf NaioAFM Operating Instructions for Naio Control Software Version 3.6 “NANOSURF” AND THE NANOSURF LOGO ARE TRADEMARKS OF NANOSURF AG, REGISTERED AND/OR OTHERWISE PROTECTED IN VARIOUS COUNTRIES. COPYRIGHT © NOVEMBER 2015, NANOSURF AG, SWITZERLAND. OPERATING INSTRUCTIONS V3.6R0, BT05386-22. Table of contents Table of contents PART A: INTRODUCTION TO THE INSTRUMENT CHAPTER 1: The NaioAFM 15 1.1: Introduction.............................................................................................. 16 1.2: Components of the system...................................................................... 16 1.2.1: Contents of the tool set ..................................................................................17 1.3: Connectors, indicators and controls....................................................... 18 CHAPTER 2: Installing the NaioAFM 21 2.1: Installing the Naio control software ....................................................... 22 2.1.1: Preparation..........................................................................................................22 2.1.2: Installation...........................................................................................................22 2.2: Installing the hardware............................................................................ 23 CHAPTER 3: Preparing for measurement 25 3.1: Introduction.............................................................................................. 26 3.2: Initializing the NaioAFM system ...........................................................
    [Show full text]
  • A Robust Multilayer Image Steganography Method Based on a Randomized Lsb Algorithm
    International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 9, September 2018, pp. 272–284, Article ID: IJMET_09_09_031 Available online at https://iaeme.com/Home/issue/IJMET?Volume=9&Issue=9 ISSN Print: 0976-6340 and ISSN Online: 0976-6359 © IAEME Publication Scopus Indexed A ROBUST MULTILAYER IMAGE STEGANOGRAPHY METHOD BASED ON A RANDOMIZED LSB ALGORITHM Saad Almutairi Faculty of Computers and Information Technology, University of Tabuk, Tabuk City, Saudia Arabi Abdulgader Almutairi College of Sciences and arts in ArRass, Qassim University, Qassim, Kingdom of Saudi Arabia ABSTRACT Recently, the demand for the uses of the steganography techniques to exchange a hidden secret data throughout unsecure networks has increased substantially. Nonetheless, although there are many techniques and methods out there in steganography field, a further researches need to be conducted in order to come up with a new secure techniques and methods. Thus, our research proposes a new robust multilayer image steganography method called MITEGO method that is based on a randomized LSB algorithm to overcome the weaknesses of the previous related works in the field, and to provide more secure image steganography at different points. MITEGO method follows a set of rules to create a stego image object (stego file) to embed and extract a secret message based on two layers: Hardening Layer and Embed/Extract Layer. Subsequently, MiTEGOsoft software tool is developed based on MITEGO method. Finally, MITEGO method is evaluated based on experiments and analysis of corresponding results. The research calculated Peak Signal-to-Noise Ratio (PSNR) in decibel (dB) unit by using ImageMagick software tool for each generated stego file.
    [Show full text]
  • Metadefender Core V4.17.3
    MetaDefender Core v4.17.3 © 2020 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of MetaDefender Core 14 1. Quick Start with MetaDefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Process Files with MetaDefender Core 21 2. Installing or Upgrading MetaDefender Core 22 2.1. Recommended System Configuration 22 Microsoft Windows Deployments 22 Unix Based Deployments 24 Data Retention 26 Custom Engines 27 Browser Requirements for the Metadefender Core Management Console 27 2.2. Installing MetaDefender 27 Installation 27 Installation notes 27 2.2.1. Installing Metadefender Core using command line 28 2.2.2. Installing Metadefender Core using the Install Wizard 31 2.3. Upgrading MetaDefender Core 31 Upgrading from MetaDefender Core 3.x 31 Upgrading from MetaDefender Core 4.x 31 2.4. MetaDefender Core Licensing 32 2.4.1. Activating Metadefender Licenses 32 2.4.2. Checking Your Metadefender Core License 37 2.5. Performance and Load Estimation 38 What to know before reading the results: Some factors that affect performance 38 How test results are calculated 39 Test Reports 39 Performance Report - Multi-Scanning On Linux 39 Performance Report - Multi-Scanning On Windows 43 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3.
    [Show full text]
  • Metodi Per L'analisi Di Immagini
    Metodi per l’analisi di immagini AFM Prof. Claudio Rivetti Dipartimento di Biochimica e Biologia Molecolare Università degli Studi di Parma Corso di perfezionamento in TECNICHE DI MICROSCOPIA A FORZA ATOMICA - Parma 29 febbraio 2012 Sommario Che cosa è un’immagine e come viene rappresentata Tipi di immagine: RGB, Indexed, Grayscale, Black and white Formato dei file di immagini Filtri e trasformazioni per elaborare immagini AFM Riconoscimento e misura di oggetti Software disponibili Che cosa è un’immagine R G B R 79 R 141 R 112 G 46 G 109 G 78 B 16 B 21 B 20 R 112 R 248 R 241 G 80 G 216 G 184 B 48 B 104 B 104 R 56 R 207 R 241 G 24 G 116 G 148 B 8 B 60 B 48 2563 = 16.777.216 colori 256 colori Color Table Index R G B i 240 i 220 i 215 1 125 43 55 2 230 56 90 3 22 220 102 4 34 130 179 5 55 133 140 i 80 i 201 i 221 6 140 21 77 7 150 28 61 8 140 10 14 … … … … 254 8 89 98 i 4 i 208 i 180 255 220 100 199 256 11 202 251 I 54 I 114 I 85 I 87 I 219 I 195 I 33 I 141 I 172 0 1 0 0 11 0 1 0 Profondità del colore dell’immagine La profondità di colore (color depth) è la quantità di bit necessari per rappresentare il colore di un singolo pixel in un'immagine 1 bit 4 bit 1 bit 21 = 2 colori 2 bit 22 = 4 colori 4 bit 24 = 16 colori 8 bit 28 = 256 colori 12 bit 212 = 4096 colori 8 bit 24 bit 16 bit 216 = 65536 colori 24 bit 224 = 16.777.216 colori B G R I Un’immagine grayscale può essere resa a colori utilizzando una scala di falsi colori Salvare un immagine su disco in un file Contiene informazioni relative Header all’immagine Contiene la matrice o le matrici (nel caso di RGB) di numeri che rappresentano l’immagine Data La dimensione del file dipende, dalla dimensione dell’immagine, dal tipo di immagine (RGB, grayscale, indexed) dai byte utilizzati per rappresentare il valore dei pixel.
    [Show full text]
  • IDOL Keyview Viewing SDK 12.7 Programming Guide
    KeyView Software Version 12.7 Viewing SDK Programming Guide Document Release Date: October 2020 Software Release Date: October 2020 Viewing SDK Programming Guide Legal notices Copyright notice © Copyright 2016-2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To check for updated documentation, visit https://www.microfocus.com/support-and-services/documentation/. Support Visit the MySupport portal to access contact information and details about the products, services, and support that Micro Focus offers. This portal also provides customer self-solve capabilities. It gives you a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the MySupport portal to: l Search for knowledge documents of interest l Access product documentation l View software vulnerability alerts l Enter into discussions with other software customers l Download software patches l Manage software licenses, downloads, and support contracts l Submit and track service requests l Contact customer support l View information about all services that Support offers Many areas of the portal require you to sign in.
    [Show full text]