C2jm31273e 13365..13373

نویسندگان

  • Dong Wook Chang
  • Hyun-Jung Choi
  • Sun-Min Jung
  • Liming Dai
  • Jong-Beom Baek
چکیده

Gold clusters with controlled sizes have been prepared by controlled self-assembly of citrate stabilized gold nanoparticles (AuNPs) with temperature-responsive luminescent amphiphilic dendrimers (Den 40) of oligo(p-phenylene vinylene) core branches and oligo(ethylene oxide) terminal chains. The shape and size of the resultant gold clusters depend strongly on the molar ratio of Den 40 to AuNPs. These gold clusters can further assemble into hollow microfibers decorated with AuNPs, which can be used as a promising substrate for surface enhanced Raman spectroscopy (SERS). The formation of spherical gold clusters and hollow microfibers simply by self-assembly of AuNPs and luminescent amphiphilic dendrimers (Den 40) could not only provide some useful insights for producing multifunctional materials viamulticomponent self-assembly but also offer promise for potential applications of the selfassemblies in many systems, such as SERS and stimuli-responsive sensors.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Reasoning in Deontic Logic

Deontic logic is a very well researched branch of mathematical logic and philosophy. Various kinds of deontic logics are discussed for different application domains like argumentation theory, legal reasoning, and acts in multi-agent systems. In this paper, we show how standard deontic logic can be stepwise transformed into description logic and DLclauses, such that it can be processed by Hyper,...

متن کامل

Hiding Data in JPEG Using in-DQT Technique

Steganography techniques are useful to convey hidden information using various types of typically-transmitted multimedia data as cover file to conceal communication. When using JPEG as a cover file, normally message is hidden in the AC values of quantized DCT coefficients. However, concealment of message in quantization table is yet to be done. In this paper, a novel in-DQT technique for messag...

متن کامل

Fault Attacks against the Miller's Algorithm in Edwards Coordinates

Initially, the use of pairings did not involve any secret entry. However in an Identity Based Cryptographic protocol, one of the two entries of the pairing is secret, so fault attack can be applied to Pairing Based Cryptography to nd it. In [18], the author shows that Pairing Based Cryptography in Weierstrass coordinates is vulnerable to a fault attack. The addition law in Edwards coordinates i...

متن کامل

Dual-Byte-Marker Algorithm for Detecting JFIF Header

The use of efficient algorithm to detect JPEG file is vital to reduce time taken for analyzing ever increasing data in hard drive or physical memory. In previous paper we proposed single-byte-marker algorithm for header detection. In this paper, we propose a novel algorithm so-called dual-byte-marker for header detection. It is based on a newly proposed FORHEADER model. Two experiments have bee...

متن کامل

TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones

Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to miti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012