Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Computing: invasive

Nodular or halo-like lesions detected by high-resolution computed tomography (HRCT) scans are often the first indication of invasive pulmonary aspergillosis. [Pg.1212]

Fungal vascular invasion, thrombosis, and infarction seen in computer tomographic scan of lungs... [Pg.1226]

Because contrast studies are expensive, invasive, and technically difficult to perform and evaluate, noninvasive tests (e.g., ultrasonography, computed tomography scans, and the ventilation-perfusion scan) are used frequently for the initial evaluation of patients with suspected VTE. [Pg.178]

Selected entries from Methods in Enzymology [vol, page(s)] Chelation, 238, 74, 76, 297 buffers [for analysis of exocytosis, 221, 132 preparation, 219, 186 modulation of cytosolic buffering capacity with quin2, 221, 159] fluorescence assay, 240, 724-725, 740-742 fluorescence imaging, 225, 531 238, 303-304, 322-325, 334-335 free intracellular levels after bacterial invasion, 236, 482-489 free calcium in solutions for membrane fusion analysis, calculation and control, 221, 149 homeostasis mechanisms, 238, 80 hormonal elevation, 238, 79 inositol phosphate effect on release, 238, 207 determination of cytosolic levels [computer methods, 238, 73-75 with fura-2, 238, 73, 146 with indo-1, 238, 298, 316-317 with quin-2, 238, 297] hormone effects, 238, 79 ionomycin effects, 238, 79 membrane depolarization effects,... [Pg.107]

With single photon emission computed tomography (SPECT), an average difference from normal to abnormal regions of 30-50% is necessary before the abnormality is visually identifiable [17], as opposed to PET where differences of only 5-10% can be visually detected. Moreover, PET has the unique ability to non-invasively quantify relative or absolute coronary blood flow and metabolism... [Pg.15]

We can prepare ourselves for any invasions of 4-D creatures entering our world. Although it may be difficult for us to fully see higher dimensions, we can use computers to develop ways of responding to the intersections of higher-dimensional phenomena in our world. The computer also makes us gaze in awe at the beauty and complexity of higher dimensions. On this theme. Professor Thomas Banchoff of Brown University writes... [Pg.106]

In research conducted at the University of Groningen (Netherlands) over a 14-year period, scientists succeeded in developing a pure crystal of the cholera toxin. Over 25,000 diffraction measurements of pure crystals, it became possible to generate a computer image of the cholera toxin. It lias been observed that all bacterial toxins act in the same manner—one component is an enzyme that performs the invasive function and another component performs destruction once it enters the cell. [Pg.1377]

To overcome these problems, flow distribution in reactors with structured packing of a desired type needs to be quantitatively studied and understood over a desired range of operating conditions. The non-invasive computed tomography... [Pg.59]

S.B. Kumar, M.P. Dudukovic, Jamal Chaouki, Faical Larachi, Milorad P. Dudukovic, Computer assisted gamma and X-ray tomography applications to multiphase flow systems, in Non-Invasive Monit. Multiphase Flows, Elsevier, 1997, pp. 47-103. [Pg.70]

The Soviet Union s military invasion of Czechoslovakia in August 1968 had a significant impact on the development of computational and theoretical chemistry in Canada. The troubles in Czechoslovakia led to Jiri Cizek and Joe Paldus accepting appointments at the University of Waterloo in 1968. Their many achievements include the first ab initio study of the coupled cluster method.104... [Pg.250]

The the use of a computational approach provides a unique and non-invasive probe of matter. The computer is often a more cost-dfective and/or less hazardous probe. However, the complexity of the systems studied coupled with the complexity of the equations which describe them always necessitates the introduction of approximations and the construction of models. This limits the applicability of the computational approach, but, as we shall demonstrate in this report, this is a limitation which is continually being push back both by developments in computational quantum chemistry itself and advances in computing technology. [Pg.213]


See other pages where Computing: invasive is mentioned: [Pg.140]    [Pg.491]    [Pg.138]    [Pg.1226]    [Pg.1462]    [Pg.458]    [Pg.117]    [Pg.14]    [Pg.179]    [Pg.8]    [Pg.6]    [Pg.129]    [Pg.57]    [Pg.203]    [Pg.281]    [Pg.731]    [Pg.331]    [Pg.119]    [Pg.99]    [Pg.159]    [Pg.27]    [Pg.243]    [Pg.278]    [Pg.458]    [Pg.68]    [Pg.330]    [Pg.572]    [Pg.1089]    [Pg.177]    [Pg.366]    [Pg.16]    [Pg.180]    [Pg.352]    [Pg.429]    [Pg.743]    [Pg.779]    [Pg.429]   
See also in sourсe #XX -- [ Pg.393 ]




SEARCH



Invasion

Invasive

© 2024 chempedia.info