نتایج جستجو برای: Nonezymatic sensor
تعداد نتایج: 188802 فیلتر نتایج به سال:
purified. Purified SOD was incubated with 1 M glucose at 37 •Ž for 14d under sterile conditions. Nonezymatic addition of glucose to SOD molecules increased linearly until 7 d, and then increased only slightly. The enzyme activity decreased to 88% after 7d and 60% after 14d. The glycated amino acid residue is not the N-terminal a-amino group but the s-amino group of lysine. It seems that lysine ...
wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...
abstract venlafaxine, 1–[2–(dimethylamino)–1–(4–methoxyphenyl) ethyl]cyclohexanol hydrochloride is a novel non-tricyclic antidepressant. venlafaxine is a second generation antidepressant drug, has a neuropharmacologic profile distinct from that of existing antidepressants including tricyclic compounds, selective serotonin reuptake inhibitors and monoamine oxidase inhibitors. venlafaxine impart...
a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...
Electrochemical production of Graphene Oxide and its application as a novel Hydrogen Peroxide sensor
Herein, graphene oxide is produced by electrochemical oxidation method from graphite rod to examine its hydrogen peroxide sensing ability. The electrochemically produced graphene oxide is characterized by SEM and XRD. A few layers of Graphene Oxide(GO) sheets and corrugations in graphene sheets appeared intensely crumpled and folded into a typical wrinkled structure after electrochemical oxidat...
adequate coverage is one of the main problems for distributed wireless sensor networks and the effectiveness of that highly depends on the sensor deployment scheme. given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location to adequate coverage. in this paper, we apply fuzzy logic system to...
پیشرفت های اخیر در زمینه ی سنسور، شبکه و تکنولوژی باعث بوجود آمدن مفهوم جدیدی شده که sensor web نامیده می شود.sensor web مجموعه ای از سنسورهای نامتشابه، هوشمند و توزیع شده در وب می باشد که برای کاوش و جستجوی محیط اطراف به کار می روند. یکی از موارد اساسی تاثیرگذار در تصمیم گیری مدیر بحران، دریافت بر خط داده از سنسور و نیز تعبیر درست از داده های دریافتی می باشد. به طور کلی، جنبه کلیدی مدیریت داده...
fluorescence chemical sensors for the highly sensitive and selective determination of pb2+ , hg2+, co2+ and fe3+ ions in aqueous solutions are described. the ion sensing system was prepared by incorporating lipophilic ligand (l) as a neutral ion-selective fluoroionophore in the plasticized pvc membrane containing sodium tetraphenylborate or potasium tetrakis (p-chlorophenyl) borate as a liphoph...
wireless sensor networks (wsns) have many applications in the areas of commercial, military and environmental requirements. regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. a basic approach for preparing a secure wireless communication in wsns, is to propose an efficient cryptographic key management protocol be...
sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید