7 resultados para thermionic specific detection
em Digital Commons at Florida International University
Resumo:
Benzodiazepines are among the most prescribed compounds for anti-anxiety and are present in many toxicological screens. These drugs are also prominent in the commission of drug facilitated sexual assaults due their effects on the central nervous system. Due to their potency, a low dose of these compounds is often administered to victims; therefore, the target detection limit for these compounds in biological samples is 10 ng/mL. Currently these compounds are predominantly analyzed using immunoassay techniques; however more specific screening methods are needed. ^ The goal of this dissertation was to develop a rapid, specific screening technique for benzodiazepines in urine samples utilizing surface-enhanced Raman spectroscopy (SERS), which has previously been shown be capable of to detect trace quantities of pharmaceutical compounds in aqueous solutions. Surface enhanced Raman spectroscopy has the advantage of overcoming the low sensitivity and fluorescence effects seen with conventional Raman spectroscopy. The spectra are obtained by applying an analyte onto a SERS-active metal substrate such as colloidal metal particles. SERS signals can be further increased with the addition of aggregate solutions. These agents cause the nanoparticles to amass and form hot-spots which increase the signal intensity. ^ In this work, the colloidal particles are spherical gold nanoparticles in aqueous solution with an average size of approximately 30 nm. The optimum aggregating agent for the detection of benzodiazepines was determined to be 16.7 mM MgCl2, providing the highest signal intensities at the lowest drug concentrations with limits of detection between 0.5 and 127 ng/mL. A supported liquid extraction technique was utilized as a rapid clean extraction for benzodiazepines from urine at a pH of 5.0, allowing for clean extraction with limits of detection between 6 and 640 ng/mL. It was shown that at this pH other drugs that are prevalent in urine samples can be removed providing the selective detection of the benzodiazepine of interest. ^ This technique has been shown to provide rapid (less than twenty minutes), sensitive, and specific detection of benzodiazepines at low concentrations in urine. It provides the forensic community with a sensitive and specific screening technique for the detection of benzodiazepines in drug facilitated assault cases.^
Resumo:
Benzodiazepines are among the most prescribed compounds for anti-anxiety and are present in many toxicological screens. These drugs are also prominent in the commission of drug facilitated sexual assaults due their effects on the central nervous system. Due to their potency, a low dose of these compounds is often administered to victims; therefore, the target detection limit for these compounds in biological samples is 10 ng/mL. Currently these compounds are predominantly analyzed using immunoassay techniques; however more specific screening methods are needed. The goal of this dissertation was to develop a rapid, specific screening technique for benzodiazepines in urine samples utilizing surface-enhanced Raman spectroscopy (SERS), which has previously been shown be capable of to detect trace quantities of pharmaceutical compounds in aqueous solutions. Surface enhanced Raman spectroscopy has the advantage of overcoming the low sensitivity and fluorescence effects seen with conventional Raman spectroscopy. The spectra are obtained by applying an analyte onto a SERS-active metal substrate such as colloidal metal particles. SERS signals can be further increased with the addition of aggregate solutions. These agents cause the nanoparticles to amass and form hot-spots which increase the signal intensity. In this work, the colloidal particles are spherical gold nanoparticles in aqueous solution with an average size of approximately 30 nm. The optimum aggregating agent for the detection of benzodiazepines was determined to be 16.7 mM MgCl2, providing the highest signal intensities at the lowest drug concentrations with limits of detection between 0.5 and 127 ng/mL. A supported liquid extraction technique was utilized as a rapid clean extraction for benzodiazepines from urine at a pH of 5.0, allowing for clean extraction with limits of detection between 6 and 640 ng/mL. It was shown that at this pH other drugs that are prevalent in urine samples can be removed providing the selective detection of the benzodiazepine of interest. This technique has been shown to provide rapid (less than twenty minutes), sensitive, and specific detection of benzodiazepines at low concentrations in urine. It provides the forensic community with a sensitive and specific screening technique for the detection of benzodiazepines in drug facilitated assault cases.
Resumo:
Flow Cytometry analyzers have become trusted companions due to their ability to perform fast and accurate analyses of human blood. The aim of these analyses is to determine the possible existence of abnormalities in the blood that have been correlated with serious disease states, such as infectious mononucleosis, leukemia, and various cancers. Though these analyzers provide important feedback, it is always desired to improve the accuracy of the results. This is evidenced by the occurrences of misclassifications reported by some users of these devices. It is advantageous to provide a pattern interpretation framework that is able to provide better classification ability than is currently available. Toward this end, the purpose of this dissertation was to establish a feature extraction and pattern classification framework capable of providing improved accuracy for detecting specific hematological abnormalities in flow cytometric blood data. ^ This involved extracting a unique and powerful set of shift-invariant statistical features from the multi-dimensional flow cytometry data and then using these features as inputs to a pattern classification engine composed of an artificial neural network (ANN). The contribution of this method consisted of developing a descriptor matrix that can be used to reliably assess if a donor’s blood pattern exhibits a clinically abnormal level of variant lymphocytes, which are blood cells that are potentially indicative of disorders such as leukemia and infectious mononucleosis. ^ This study showed that the set of shift-and-rotation-invariant statistical features extracted from the eigensystem of the flow cytometric data pattern performs better than other commonly-used features in this type of disease detection, exhibiting an accuracy of 80.7%, a sensitivity of 72.3%, and a specificity of 89.2%. This performance represents a major improvement for this type of hematological classifier, which has historically been plagued by poor performance, with accuracies as low as 60% in some cases. This research ultimately shows that an improved feature space was developed that can deliver improved performance for the detection of variant lymphocytes in human blood, thus providing significant utility in the realm of suspect flagging algorithms for the detection of blood-related diseases.^
Resumo:
In this research the integration of nanostructures and micro-scale devices was investigated using silica nanowires to develop a simple yet robust nanomanufacturing technique for improving the detection parameters of chemical and biological sensors. This has been achieved with the use of a dielectric barrier layer, to restrict nanowire growth to site-specific locations which has removed the need for post growth processing, by making it possible to place nanostructures on pre-pattern substrates. Nanowires were synthesized using the Vapor-Liquid-Solid growth method. Process parameters (temperature and time) and manufacturing aspects (structural integrity and biocompatibility) were investigated. Silica nanowires were observed experimentally to determine how their physical and chemical properties could be tuned for integration into existing sensing structures. Growth kinetic experiments performed using gold and palladium catalysts at 1050°C for 60 minutes in an open-tube furnace yielded dense and consistent silica nanowire growth. This consistent growth led to the development of growth model fitting, through use of the Maximum Likelihood Estimation (MLE) and Bayesian hierarchical modeling. Transmission electron microscopy studies revealed the nanowires to be amorphous and X-ray diffraction confirmed the composition to be SiO2 . Silica nanowires were monitored in epithelial breast cancer media using Impedance spectroscopy, to test biocompatibility, due to potential in vivo use as a diagnostic aid. It was found that palladium catalyzed silica nanowires were toxic to breast cancer cells, however, nanowires were inert at 1μg/mL concentrations. Additionally a method for direct nanowire integration was developed that allowed for silica nanowires to be grown directly into interdigitated sensing structures. This technique eliminates the need for physical nanowire transfer thus preserving nanowire structure and performance integrity and further reduces fabrication cost. Successful nanowire integration was physically verified using Scanning electron microscopy and confirmed electrically using Electrochemical Impedance Spectroscopy of immobilized Prostate Specific Antigens (PSA). The experiments performed above serve as a guideline to addressing the metallurgic challenges in nanoscale integration of materials with varying composition and to understanding the effects of nanomaterials on biological structures that come in contact with the human body.
Resumo:
Understanding habitat selection and movement remains a key question in behavioral ecology. Yet, obtaining a sufficiently high spatiotemporal resolution of the movement paths of organisms remains a major challenge, despite recent technological advances. Observing fine-scale movement and habitat choice decisions in the field can prove to be difficult and expensive, particularly in expansive habitats such as wetlands. We describe the application of passive integrated transponder (PIT) systems to field enclosures for tracking detailed fish behaviors in an experimental setting. PIT systems have been applied to habitats with clear passageways, at fixed locations or in controlled laboratory and mesocosm settings, but their use in unconfined habitats and field-based experimental setups remains limited. In an Everglades enclosure, we continuously tracked the movement and habitat use of PIT-tagged centrarchids across three habitats of varying depth and complexity using multiple flatbed antennas for 14 days. Fish used all three habitats, with marked species-specific diel movement patterns across habitats, and short-lived movements that would be likely missed by other tracking techniques. Findings suggest that the application of PIT systems to field enclosures can be an insightful approach for gaining continuous, undisturbed and detailed movement data in unconfined habitats, and for experimentally manipulating both internal and external drivers of these behaviors.
Resumo:
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. ^ We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. ^ We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. ^ We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). ^ In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.^
Resumo:
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.