C2jm31273e 13365..13373
نویسندگان
چکیده
Gold clusters with controlled sizes have been prepared by controlled self-assembly of citrate stabilized gold nanoparticles (AuNPs) with temperature-responsive luminescent amphiphilic dendrimers (Den 40) of oligo(p-phenylene vinylene) core branches and oligo(ethylene oxide) terminal chains. The shape and size of the resultant gold clusters depend strongly on the molar ratio of Den 40 to AuNPs. These gold clusters can further assemble into hollow microfibers decorated with AuNPs, which can be used as a promising substrate for surface enhanced Raman spectroscopy (SERS). The formation of spherical gold clusters and hollow microfibers simply by self-assembly of AuNPs and luminescent amphiphilic dendrimers (Den 40) could not only provide some useful insights for producing multifunctional materials viamulticomponent self-assembly but also offer promise for potential applications of the selfassemblies in many systems, such as SERS and stimuli-responsive sensors.
منابع مشابه
Automated Reasoning in Deontic Logic
Deontic logic is a very well researched branch of mathematical logic and philosophy. Various kinds of deontic logics are discussed for different application domains like argumentation theory, legal reasoning, and acts in multi-agent systems. In this paper, we show how standard deontic logic can be stepwise transformed into description logic and DLclauses, such that it can be processed by Hyper,...
متن کاملHiding Data in JPEG Using in-DQT Technique
Steganography techniques are useful to convey hidden information using various types of typically-transmitted multimedia data as cover file to conceal communication. When using JPEG as a cover file, normally message is hidden in the AC values of quantized DCT coefficients. However, concealment of message in quantization table is yet to be done. In this paper, a novel in-DQT technique for messag...
متن کاملFault Attacks against the Miller's Algorithm in Edwards Coordinates
Initially, the use of pairings did not involve any secret entry. However in an Identity Based Cryptographic protocol, one of the two entries of the pairing is secret, so fault attack can be applied to Pairing Based Cryptography to nd it. In [18], the author shows that Pairing Based Cryptography in Weierstrass coordinates is vulnerable to a fault attack. The addition law in Edwards coordinates i...
متن کاملDual-Byte-Marker Algorithm for Detecting JFIF Header
The use of efficient algorithm to detect JPEG file is vital to reduce time taken for analyzing ever increasing data in hard drive or physical memory. In previous paper we proposed single-byte-marker algorithm for header detection. In this paper, we propose a novel algorithm so-called dual-byte-marker for header detection. It is based on a newly proposed FORHEADER model. Two experiments have bee...
متن کاملTOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to miti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012