Pixe analysis in subfossil bone samples: testing a preparation protocol
نویسندگان
چکیده
منابع مشابه
PIXE and XRF analysis of honey samples
The systematic determination of trace-element concentrations in honey samples was done by the PIXE method using a 2 MeV proton beam and by the total reflection XRF method. The different kinds of honey samples were collected in the period of spring–summer in three places of Poland: in the centre of Warsaw (a highly polluted region) and about 100 km east of Warsaw and 70 km southwest of Warsaw (a...
متن کاملPIXE Analysis of Bone Cut with Hacksaw Blades
Forensic anthropologists use various methods to determine the type of weapons used in cases involving a dismembered body. For this study PIXE (particle-induced x-ray emission) analysis was performed on samples taken from pieces of pig bone cut with three different hacksaw blades. The analysis was used to determine if the blades left any elemental residue on the bone. When the results of the PIX...
متن کاملLibCPIXE: a PIXE simulation open-source library for multilayered samples
Most Particle Induced X-ray Emission (PIXE) data analysis codes are not focused on handling multilayered samples. We have developed an open-source library called ”LibCPIXE”, for PIXE data analysis. It is written in standard C and implements functions for simulating X-ray yields of PIXE spectra taken from arbitrary samples, including multilayered targets. The library is designed to be fast, port...
متن کاملPreparation of Hair Samples for Drug Analysis.
Toxicological hair analysis has attracted substantial attention because of its promising diagnostic power. Analysis of drugs in hair, even though widely studied since 1970, is still not standardized; many different sample preparation and analytical procedures are practiced. To obtain reliable results, hair analysis requires preparation steps that are not necessary for conventional biological sa...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: digitAR - Revista Digital de Arqueologia, Arquitectura e Artes
سال: 2017
ISSN: 2182-844X
DOI: 10.14195/2182-844x_3_5