Scalable Nanopillar Arrays with Layer-by-Layer Patterned Overt and Covert Images

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bio-inspired silicification on patterned surfaces generated by microcontact printing and layer-by-layer self-assembly.

Micropatterns of silica were generated under biocompatible conditions by a combination of microcontact printing (muCP), layer-by-layer (LbL) self-assembly, and biomimetic silicification. Quaternary amine-containing poly(diallyl dimethyl ammonium chloride) induced polycondensation of silicic acid, resulting in spatioselective formation of silica micropatterns. Scale bar: 10 microm.

متن کامل

Layer-by-layer deposition of hyaluronic acid and poly-L-lysine for patterned cell co-cultures.

A novel method for patterning cellular co-cultures that uses the layer-by-layer deposition of ionic biopolymers is described. Non-biofouling hyaluronic acid (HA) micropatterns were used to immobilize cells and proteins to glass substrates. Subsequent ionic adsorption of poly-L-lysine (PLL) to HA patterns was used to switch the HA surfaces from cell repulsive to adherent thereby facilitating the...

متن کامل

Protein and Lactose Separation by Modified Ultrafiltration Membrane using Layer by Layer Technique

Layer-by-Layer (LbL) is a method which can be used for nanoscale coating and surface functionalization of a material. LbL technique mainly uses the electrostatic attracting between charged materials (polyelectrolytes, nanoparticles, etc.) and an oppositely charged surface. In this study, protein separation (BSA) from lactose solution was carried out using the LbL self-assembly method, which was...

متن کامل

Covert Communications Versus Physical Layer Security

This letter studies and compares the physical-layer security approach and the covert communication approach for a wiretap channel with a transmitter, an intended receiver and an eavesdropper. In order to make the comparison, we investigate the power allocation problems for maximizing the secrecy/covert rate subject to the transmit power constraint. Simulation results illustrate that if the eave...

متن کامل

An 802.11 MAC layer covert channel

For extremely sensitive applications, it may be advantageous for users to transmit certain types of data covertly over the network. This provides an additional layer of security to that provided by the different layers of the protocol stack. In this paper we present a covert side channel that uses the 802.11 MAC rate switching protocol. The covert channel provides a general method to hide commu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advanced Materials

سال: 2014

ISSN: 0935-9648

DOI: 10.1002/adma.201401246