Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Accessibility method

Monoazathiazolocyanines (Tables 2171A.B). The same reactive intermediates and the same conditions as in the case of thiazolomethine dyes are used in the synthesis of this class of dyes, except that the CH group is replaced by a -NH group (Schemes 46 and 47). No j3-azatrimethine thiazolocyamne has been described, in spite of an access method applied with success to other rings (65). [Pg.58]

The most common and readily accessible methods are those based on ftir spectroscopy. Several of the more common of these are discussed here. [Pg.285]

The speed, graphics, memory and key/knob menu access methods take full advantage of Hewlett-Packard workstation facilities, a combination that is still hard to match four years since design. [Pg.463]

The hydrogen content Ch greatly influences structure and consequently electronic and optoelectronic properties. An accurate measurement of Ch can be made with several ion-beam-based methods see e.g. Arnold Bik et al. [54]. A much easier accessible method is Fourier-transform infrared transmittance (FTIR) spectroscopy. The absorption of IR radiation is different for different silicon-hydrogen bonding configurations. The observed absorption peaks have been indentified [55-57] (for an overview, see Luft and Tsuo [6]). The hydrogen content can be determined from the absorption peak at 630 cm , which includes... [Pg.5]

The amino acid sequences of the glutamate transporters show a high degree of similarity with between 40-60% of amino acid residues identical between subtypes. At present, the three-dimensional (3D) structure of the transporters is unknown and indirect methods based on amino acid sequence hydropathy plots and amino acid accessibility methods have been employed to predict the transmembrane topology of the transporters. Two similar models developed by the groups of Amara (12,13) and Kanner... [Pg.161]

Karlin, A. and Akabas, M. H. (1998) Substituted-cysteine accessibility method. Methods Enzymol. 293,123-145. [Pg.230]

Properties Object attributes that can be read and written by access methods... [Pg.421]

Therefore, you should avoid accessing variables outside your own class always go through access methods instead and try to provide higher-level services instead of only get and set methods. [Pg.658]

In Catalysis an attribute does not imply an access method you would have to explicitly add one (or use a framework as a shortcut). [Pg.715]

Several laboratories have replaced consecutive amino acids with cysteine residues as part of a technique called the substituted cysteine accessibility method (SCAM) (Akabas et al., 1992). In this technique, which is described elsewhere in this volume, the accessibihty of the inserted cysteine residues to an aqueous environment is measured by their accessibihty to covalent chemical modifying agents. The effects of the addition of these bulky agents can then be used to explore protein functional domains such as those that line ion channels or ligand binding sites. [Pg.437]

Javitch JA, Shi L, Liapkis G. 2002. Use of the substituted cysteine accessibility method to study the structure and function of G protein-coupled receptors. Methods Enzymol 343 137-156. [Pg.453]

These features provide for a less expensive and accessible method capable of revealing effect of biological agents suitable for both laboratory and field conditions. [Pg.107]

The interactions with use of various ligands, metals, and ammonium salts (ammonia method) are well developed [202,509,660 663] and represent a considerable contribution in the dissolution of metals in nonaqueous media. The basis of this simple and accessible method of obtaining complexes from bulk metals is the following reaction ... [Pg.275]

The reach of hydrophobicity in the model can severely complicate its synthesis. This criterion makes sense in the case of the task of achieving as close a correspondence as possible between the model and the simulated enzyme. However, a more particular objective is often assigned for the synthesis of mimics. It consists of synthesizing an effective catalyst simulating a definite (useful) enzyme property. Therefore, it seems more desirable to replace hydrophobic tub synthesis by more accessible methods, developed in chemical catalysis, particularly in coordination and heterogeneous catalysis. [Pg.231]

This is the main easily accessible method for direct prediction of a property from chemical structure alone. Fragment methods view a molecule as composed of specified parts, which contribute individually to the compound property. [Pg.58]

Ethernet and real-time applications. Because of the random access method used there is no guaranteed response time within an Ethernet LAN. All nodes have equal priority for getting access to the physical cable. Due to the Ethernet specifications the maximum uninterruptable length of a block of data on the cable is 1500 bytes, corresponding to a transfer time of 1.2 ms. If data, e.g. from an active experiment, is to be transferred in real-time, delays in the order of milliseconds must be tolerable. This should not be a problem, if data can be buffered in local memory of the nodes. If strict timing for the synchronization of processes on... [Pg.183]

In designing a complex parallel program, it is useful to think of any parallel computer in terms of a NUMA model in which all memory, anywhere in the system, can be accessed by any processor as needed. One can then focus independently on the questions of memory access methods (which determine coding style for an application) and memory access costs (which ultimately determine program efficiency). [Pg.213]

The choice of memory access methods, which is determined by the programming model and tools, is subject to great variation. This topic is discussed in a later section that deals with models and tools. Typical memory access... [Pg.213]

The 802.3 CSMA/CD model defines a bus topology network that uses a 50-ohm coaxial baseband cable and carries transmissions at 10Mbps. This standard groups data bits into frames and uses the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) cable access method to put data on the cable. [Pg.321]

The main advantage of the token-passing access method over contention (the 802.3 model) is that it eliminates collisions. Only workstations that have the token can transmit. It would seem that this technology has a lot of overhead and would be slow. But remember that this whole procedure takes place in a few milliseconds. This technology scales very well. It is not uncommon for Token Ring networks based on the IEEE 802.5 standard to reach hundreds of workstations on a single ring. [Pg.322]

You have put the network together in a topology. You have told the network how to communicate and send the data, and you have told it how to send the data to another computer. You also have the communications medium in place. The next problem you need to solve is how do you put the data on the cable. What you need now are the cable access methods, which define a set of rules for how computers put data on and retrieve it from a network cable. The four methods of data access are... [Pg.331]


See other pages where Accessibility method is mentioned: [Pg.287]    [Pg.396]    [Pg.126]    [Pg.266]    [Pg.193]    [Pg.198]    [Pg.207]    [Pg.219]    [Pg.506]    [Pg.440]    [Pg.440]    [Pg.440]    [Pg.177]    [Pg.41]    [Pg.215]    [Pg.365]    [Pg.24]    [Pg.49]    [Pg.157]    [Pg.331]    [Pg.336]   
See also in sourсe #XX -- [ Pg.264 ]




SEARCH



Accessibility bromine method

Accessible Rate Constants Using Rapid Reaction Methods

SCAM, Substituted-cystein accessibility method

Substituted cysteine accessibility method

Substituted cysteine accessibility method SCAM)

Substituted-cystein accessibility method

© 2024 chempedia.info