Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Applications Databases

Hash codes of molecules which are already pre-computed are suitable for use in fiill structure searches in database applications. The compression of the code of a chemical structure into only one number also makes it possible to compute in advance the transformation results for a whole catalog. The files can be stored and kept complete in the core memory during execution of the program, so that a search can be accomplished within seconds. [Pg.75]

Raw data is almost always incomplete, being highly dependent on the data production platform and often localized to a platform or regional database. Applications (and processes) generate data. However, applications often use proprietary data types and cannot parse data types from other third-party applications. It is important to consider that there are translation issues plus the host of reasons stated below in the requirements for data standards. [Pg.174]

The previous sections have summarized the basic techniques available for searching chemical databases for specific types of query. Another important database application is compound selection, the ability to select a subset of a database for submission to a biological testing program. The selection procedure can be applied to in-house databases, to externally available compound collections, or to virtual libraries, that is, sets of compounds that could potentially be synthesized. [Pg.198]

Implement user-friendly tools such as forms, software, or database applications that ease the burden of documenting and disseminating incident results. [Pg.71]

Searching through Databases Applications of network BLAST server, 266, 131 Entrez molecular biology database and retrieval system, 266, 141 applying motif and profile searches,... [Pg.436]

Chemoinformatics refers to the systems and scientific methods used to store, retrieve, and analyze the immense amount of molecular data that are generated in modern drug-discovery efforts. In general, these data fall into one of four categories structural, numerical, annotation/text, and graphical. However, it is fair to say that the molecular structure data are the most unique aspect that differentiate chemoinformatics from other database applications (1). Molecular structure refers to the 1-, 2-, or 3-D representations of molecules. Examples of numerical data include biological activity, p/C, log/5, or analytical results, to name a few. Annotation includes information such as experimental notes that are associated with a structure or data point. Finally, any structure... [Pg.65]

Procedure to issue calibration stickers (database application can be used to track the status of the instrument and help coordinate the calibration date)... [Pg.149]

Oracle is a database application software from Oracle (http //www.oracle.com/index.html)... [Pg.320]

Defines the steps necessary to validate and document spreadsheet and database applications... [Pg.135]

This example uses a small portion of a traceability matrix for validation of a database application, here named your CRS. ... [Pg.245]

Large database application on corrosion behavior of metals and nonmetals in over 700 chemical environments... [Pg.320]

Many chemists have been surprized to discover that their reagent database applications have not proved adequate for Combinatorial Chemistry. In some instances, the required search queries can not be answered. For example, list the 10 most similar reagents to a given... [Pg.182]

Enumerated databases contain the connection tables, 2D drawing coordinates and usually the 3D coordinates for the products. This information can be generated at any time and consequently, there is no requirement to store it permanently. Some companies do export these structures via SD fries into other database applications such as ISIS or RS3 [3], This allows faster searching but necessitates caution because the structures generated may not be present in the corresponding samples unless confirmed by analysis. It is also inevitable that for large libraries vast quantities of disk space are required. [Pg.187]

Some firms have adapted Y2K inventories that were originally established to manage millennium compliance. If the inventory is held on a spreadsheet or a database application, then it should be validated in its own right. However the inventory, paper based or automated, is managed, it is vital that the copy that is the master is established this typically means just a single list exists. [Pg.56]

Process Control or Monitoring System Spreadsheet and Database Applications Corporate Computer System... [Pg.411]

Software (e.g., operating system, database, application software modules, data sets, bespoke/custom/standard software modules, etc.)... [Pg.528]

Electronic records include data-storing memory cards used in embedded control systems such as steam sterilizers. These cards are used to transfer data (critical parameters, cycle times, etc.) from the control system to a main database application which is usually networked. A memory card is about the size of a credit card. Manual installation, removal, and transfer of the memory cards must be conducted in accordance with defined procedures. Reuse of cards must be carefully considered data must not be deleted until confirmation is received that it has been successfully downloaded to the database. The local operating enviromnent and the possibility of EMl/ESD damage to data integrity of the memory card must also be evaluated. [Pg.600]

Examples of recent FDA citations for noncompliance of database applications include comments regarding the deviation database currently maintained by the quality unit as an Excel spreadsheet file for monitoring the status of deviations and investigations ... [Pg.750]

When we speak of validating a database such as Oracle , we are talking about validating the database application, not the DBMS. The actual DBMS should be qualified as a Commercial Off-The-Shelf (COTS) software package. GAMP 4 recommends the following activities for this category of software ... [Pg.752]

Validation of the database application will typically be based on custom/bespoke software. GAMP 4 recommends the following activities for this category of software ... [Pg.752]

Validation test planning for a database application has the same two principal foundation blocks as for any other type of application the traceability matrix and a risk assessment process. The... [Pg.756]

Database applications can be installed on stand-alone PCs, host computers, or may have client server architecture. The hardware platform supporting the application requires qualification. Hardware testing (Installation Qualification) should include ... [Pg.757]

The trend toward database applications for more sophisticated data maiupulation, analysis, and reporting is therefore expected to continue and to offer the potential for flexibility and operating efficiency benefits to blood establishments without any increased risk to public health. [Pg.933]

KDD. Knowledge Discovery in Database application of analysis and data mining techniques to discover "knowledge" that may be implicit but undiscovered in large amounts of data. [Pg.406]

Linux. Microprocessor version of Unix developed by Linus Torvald. Linux is presently used mostly in network servers and in clusters of microcomputers used for large-scale parallel computation. It is gaining status as an alternative to Microsoft and to Unix, for database applications, because Oracle and other vendors provide Linux versions. [Pg.406]

Middle Tier. Large-scale database applications often consist of three "tiers" of programs (1 )the application tier, which interacts... [Pg.406]

Application - Database of expressed sequence tags. http //www.ncbi.nlm.nih.gov-Database/software - Unigene database Application - Database of expressed sequence tags. [Pg.285]

The Drug Information Framework enables developers to build healthcare solutions faster, using the time-tested NDDF Plus knowledge base and critical decision-support modules. The Framework gives developers a choice of technologies and access layers, so it can adapt to most platforms, operating systems, development tools, and relational databases. Application environments can include the Internet client/server networks stand-alone desktops and handheld wireless devices. [Pg.360]

In addition to relational databases, application tools, and other non-... [Pg.371]

CIM is subdivided into three layers, the core model, common models, and extension schemas. The core model consists of a small number of classes for a unique description of all components. Common models enhance this basic information for special domains like database, application, or networks. Extension schemas can be defined for adopting the descriptions of the common models to specific products. [Pg.415]

However, a unique enumeration does not solve the problem of substructure search. Superimposition of substructures on structures would require the mapping of any combination of molecular graphs to find a graph isomorphism this is a tedious and time-consuming process. Because the rate of search is always one of the most important limitations for database applications, substructure search should incorporate additional preprocessing steps that restrict the number of molecules to be compared in an atom-by-atom matching algorithm. [Pg.64]


See other pages where Applications Databases is mentioned: [Pg.606]    [Pg.1082]    [Pg.271]    [Pg.329]    [Pg.64]    [Pg.25]    [Pg.152]    [Pg.277]    [Pg.278]    [Pg.150]    [Pg.97]    [Pg.640]    [Pg.756]    [Pg.762]    [Pg.222]    [Pg.512]    [Pg.525]    [Pg.138]   
See also in sourсe #XX -- [ Pg.519 , Pg.520 ]




SEARCH



Application of Predictive QSAR Models to Database Mining

ChirBase Chiral Applications Databases

Chiral applications databases

Databases analytical application

LC-MS Applications Database

© 2024 chempedia.info