Search results for " injection"

showing 10 items of 472 documents

In situ generation of Co(II) by use of a solid-phase reactor in an FIA assembly for the spectrophotometric determination of penicillamine

2005

[EN] A flow injection analysis (FIA) manifold for the determination of penicillamine in pharmaceutical preparations is proposed. The manifold includes a solid-phase reactor for the in situ production of the derivatizing reagent, Co(II) ion, which forms a coloured complex with penicillamine in an alkaline medium. The reactor is prepared by natural immobilization of cobalt carbonate on a polymer matrix, which endows it with a high mechanical and microbiological stability. The cobalt released by passage of a 5 x 10(-4) Mol l(-1) sulphuric acid stream at a flow-rate of 2.3 ml min(-1) is merged with a volume of 314 mu l of sample containing penicillamine in ammonium-ammonia buffer at pH 9.5 to m…

Clinical BiochemistryPharmaceutical Sciencechemistry.chemical_elementAnalytical ChemistryMatrix (chemical analysis)AbsorbanceFIAFlow injection analysisSpectrophotometryDrug DiscoveryQUIMICA ANALITICAmedicineSpectroscopyFlow injection analysisDetection limitChromatographymedicine.diagnostic_testChemistrySpectrum AnalysisPenicillaminePenicillamineReproducibility of ResultsCobaltSolid-phase reactorReagentPharmaceuticalsCobaltmedicine.drug
researchProduct

On bijections vs. unary functions

1996

A set of finite structures is in Binary NP if it can be characterized by existential second order formulas in which second order quantification is over relations of arity 2. In [DLS95] subclasses of Binary NP were considered, in which the second order quantifiers range only over certain classes of relations. It was shown that many of these subclasses coincide and that all of them can be ordered in a three-level linear hierarchy, the levels of which are represented by bijections, successor relations and unary functions respectively.

CombinatoricsSet (abstract data type)Range (mathematics)Unary operationHierarchy (mathematics)Computer Science::Logic in Computer ScienceOrder (group theory)Unary functionArityBijection injection and surjectionComputer Science::Formal Languages and Automata TheoryMathematics
researchProduct

Compression and injection molding of recycled polyethylene for greenhouses in presence of the natural fibres

2003

Compression and injection molding greenhouses natural fibres
researchProduct

Compression and injection molding of recycled polyethylene for greenhouses in presence of the natural fibers

2003

Compression and injection molding recycled polyethylene
researchProduct

Fault Injection into VHDL Models: Experimental Validation of a Fault-Tolerant Microcomputer System

1999

This work presents a campaign of fault injection to validate the dependability of a fault tolerant microcomputer system. The system is duplex with cold stand-by sparing, parity detection and a watchdog timer. The faults have been injected on a chip-level VHDL model, using an injection tool designed with this purpose. We have carried out a set of injection experiments (with 3000 injections each), injecting transient and permanent faults of types stuck-at, open-line and indetermination on both the signals and variables of the system, running a workload. We have analysed the pathology of the propagated errors, measured their latency, and calculated both detection and recovery coverage. We have…

Computer scienceMicrocomputer systemReal-time computingDuplex (telecommunications)Fault toleranceHardware_PERFORMANCEANDRELIABILITYFault injectionWatchdog timerFault coverageVHDLDependabilityhuman activitiescomputercomputer.programming_language
researchProduct

Security Challenges of IoT-Based Smart Home Appliances

2018

The Internet of Things, IoT, and the related security challenges are reaching homes in the form of smart appliances. If the appliances are compromised, they can be used in botnet attacks against Internet services and potentially cause harm to people and property through the local network, for example, by heating up too much or allowing unauthorized access. The aim of this study was to see how secure these devices are against remote and network attacks. Several devices were tested with attacks coming from the same Wi-Fi network to gain various levels of control of the devices. Their security against a Man-in-the-Middle attack was also studied to see differences in the susceptibility to conne…

Computer sciencebusiness.industryBotnetLocal area network020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreEvil twinHarmHome automation020204 information systems0202 electrical engineering electronic engineering information engineeringCode injectionThe InternetbusinesscomputerVulnerability (computing)
researchProduct

Control Flow Error Checking with ISIS

2005

The Interleaved Signature Instruction Stream (ISIS) is a signature embedding technique that allows signatures to co-exist with the main processor instruction stream with a minimal impact on processor performance, without sacrificing error detection coverage or latency. While ISIS incorporate some novel error detection mechanisms to assess the integrity of the program executed by the main processor, the limited number of bits available in the signature control word question if the detection mechanisms are effective detecting errors in the program execution flow. Increasing the signature size would negatively impact the memory requirements, so this option has been rejected. The effectiveness …

Control flowbusiness.industryComputer scienceReal-time computingSoftware developmentEmbeddingRetardFault injectionLatency (engineering)Error checkingError detection and correctionbusiness
researchProduct

Immunosurveillance of lung melanoma metastasis in EBI-3-deficient mice mediated by CD8+ T cells.

2008

Abstract EBV-induced gene 3 (EBI-3) codes for a soluble type I receptor homologous to the p40 subunit of IL-12 that is expressed by APCs following activation. In this study, we assessed the role of EBI-3 in a model of lung melanoma metastasis. Intravenous injection of the B16-F10 cell line resulted in a significant reduction of lung tumor metastasis in EBI-3−/− recipient mice compared with wild-type mice. The immunological finding accompanying this effect was the expansion of a newly described cell subset called IFN-γ producing killer dendritic cells associated with CD8+ T cell responses in the lung of EBI-3−/− mice including IFN-γ release and TNF-α-induced programmed tumor cell death. Depl…

Cytotoxicity ImmunologicAdoptive cell transferLung NeoplasmsT cellImmunologyMelanoma ExperimentalBiologyCD8-Positive T-LymphocytesArticleMetastasisMinor Histocompatibility AntigensGene Knockout TechniquesMiceCell Line TumormedicineImmunology and AllergyCytotoxic T cellAnimalsLung MelanomaReceptors CytokineImmunologic SurveillanceCell Line TransformedMice KnockoutMelanomamedicine.diseaseImmunosurveillanceMice Inbred C57BLmedicine.anatomical_structureCell Transformation NeoplasticImmunologyInjections IntravenousAnimals; CD8-Positive T-Lymphocytes; Cell Line Transformed; Cell Line Tumor; Cell Transformation Neoplastic; Cytotoxicity Immunologic; Gene Knockout Techniques; Immunologic Surveillance; Injections Intravenous; Lung Neoplasms; Melanoma Experimental; Mice; Mice Inbred C57BL; Mice Knockout; Neoplasm Transplantation; Receptors Cytokine; T-Box Domain ProteinsCancer researchT-Box Domain ProteinsCD8Neoplasm Transplantation
researchProduct

Sequential-injection determination of traces of disodium phenyl dibenzimidazole tetrasulphonate in urine from users of sunscreens by on-line solid-ph…

2005

Abstract A sensitive and selective method to determine disodium phenyl dibenzimidazole tetrasulphonate (PDT) in the urine of sunscreen users, which is suitable for studies on body accumulation/excretion is proposed. On-line solid-phase extraction allows the analyte to be retained and subsequentely eluted, using a strong anion exchange (SAX) microcolumn. Standard addition calibration was carried out with only one standard. The wavelengths of excitation and emission were 330 and 454 nm, respectively. The method allows PDT to be determined in both, spiked and unspiked human urine samples, without any pre-treatment. Results obtained for spiked urine samples (40–200 ng ml −1 ) showed the accurac…

Detection limitAnalyteChromatographyChemistryElutionAdministration TopicalSkin AbsorptionClinical BiochemistryFluorescence spectrometryReproducibility of ResultsPharmaceutical ScienceUrineHydrogen-Ion ConcentrationAnalytical ChemistryExcretionSpectrometry FluorescenceStandard additionFlow Injection AnalysisDrug DiscoveryHumansBenzimidazolesSolid phase extractionSunscreening AgentsSpectroscopyJournal of Pharmaceutical and Biomedical Analysis
researchProduct

Chemiluminometric determination of the pesticide 3-indolyl acetic acid by a flow injection analysis assembly

2005

Abstract A new method is proposed for the chemiluminescent determination of the pesticide 3-indolyl acetic acid by means of an flow injection analysis system. The chemiluminescence emission is obtained by oxidation of the analyte with Ce (IV) in nitric acid and presence of β-cyclodextrine. The continuous-flow method allows the determination of 159 samples h−1 of 3-indolyl acetic acid in an interval of concentrations over the range 0.5–15.0 mg l−1. The limit of detection was 0.1 μg l−1 and the R.S.D. (n, 17) at 2.0 mg l−1 of the pesticide level was 2.7%. The method was applied to water samples.

Detection limitFlow injection analysisAcetic acidchemistry.chemical_compoundAnalyteChromatographyChemistryNitric acidlawPesticideAnalytical ChemistryChemiluminescencelaw.inventionTalanta
researchProduct