Pixe analysis in subfossil bone samples: testing a preparation protocol

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PIXE and XRF analysis of honey samples

The systematic determination of trace-element concentrations in honey samples was done by the PIXE method using a 2 MeV proton beam and by the total reflection XRF method. The different kinds of honey samples were collected in the period of spring–summer in three places of Poland: in the centre of Warsaw (a highly polluted region) and about 100 km east of Warsaw and 70 km southwest of Warsaw (a...

متن کامل

PIXE Analysis of Bone Cut with Hacksaw Blades

Forensic anthropologists use various methods to determine the type of weapons used in cases involving a dismembered body. For this study PIXE (particle-induced x-ray emission) analysis was performed on samples taken from pieces of pig bone cut with three different hacksaw blades. The analysis was used to determine if the blades left any elemental residue on the bone. When the results of the PIX...

متن کامل

LibCPIXE: a PIXE simulation open-source library for multilayered samples

Most Particle Induced X-ray Emission (PIXE) data analysis codes are not focused on handling multilayered samples. We have developed an open-source library called ”LibCPIXE”, for PIXE data analysis. It is written in standard C and implements functions for simulating X-ray yields of PIXE spectra taken from arbitrary samples, including multilayered targets. The library is designed to be fast, port...

متن کامل

Preparation of Hair Samples for Drug Analysis.

Toxicological hair analysis has attracted substantial attention because of its promising diagnostic power. Analysis of drugs in hair, even though widely studied since 1970, is still not standardized; many different sample preparation and analytical procedures are practiced. To obtain reliable results, hair analysis requires preparation steps that are not necessary for conventional biological sa...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: digitAR - Revista Digital de Arqueologia, Arquitectura e Artes

سال: 2017

ISSN: 2182-844X

DOI: 10.14195/2182-844x_3_5