(1) We attribute this in part to early diagnosis by computed tomography (CT), but a contributory factor may be earlier referrals from country centres to a paediatric trauma centre and rapid transfer, by air or road, by medical retrieval teams.
(2) Since MIRD Committee has not published "S" values for Tl-200 and Tl-202, these have been calculated by a computer code and are reported.
(3) Theoretical computations are performed of the intercalative binding of the neocarzinostatin chromophore (NCS) with the double-stranded oligonucleotides d(CGCG)2, d(GCGC)2, d(TATA)2 and d(ATAT)2.
(4) This computer is connected to a fileserver via a local area network and is used exclusively for data acquisition.
(5) Twenty patients with non-small cell bronchogenic carcinoma were prospectively studied for intrathoracic lymphadenopathy using computed tomography (CT) and magnetic resonance imaging (MRI).
(6) Serially sectioned rabbit foliate taste buds were examined with high voltage electron microscopy (HVEM) and computer-assisted, three-dimensional reconstruction.
(7) Core biopsy with computed tomography (CT) or ultrasound (US) guidance may be such an alternative, particularly when a spring-loaded firing device is used.
(8) By means of computed tomography (CT) values related to bone density and mass were assessed in the femoral head, neck, trochanter, shaft, and condyles.
(9) We present a mathematical model that is suitable to reconcile this apparent contradiction in the interpretation of the epidemiological data: the observed parallel time series for the spread of AIDS in groups with different risk of infection can be realized by computer simulation, if one assumes that the outbreak of full-blown AIDS only occurs if HIV and a certain infectious coagent (cofactor) CO are present.
(10) Excellent correlations were observed between computer and manual methods for both systems.
(11) The programs are written in Fortran and are implemented on a Rank Xerox Sigma 6 computer.
(12) Blood gas variables produced from a computed in vivo oxygen dissociation curve, PaeO2, P95 and C(a-x)O2, were introduced in the University Hospital of Wales in 1986.
(13) Angus (A), Charolais (C), Hereford (H), Limousin (L), and Simmental (S) breeds were included in deterministic computer models simulating integrated cow-calf-feedlot production systems.
(14) The method is implemented with a digital non-causal (zero-phase shift) filter, based on the convolution with a finite impulse response, to make the computation time compatible with the use of low-cost microcomputers.
(15) Odds ratios were computed by multiple logistic regression analysis and revealed no additional relationships; however, there were suggested dose-response gradients for height, weight at age 20, and body surface area in the Japanese women and for breast size in the Caucasian women.
(16) DATA Modern football data analysis has its origins in a video-based system that used computer vision algorithms to automatically track players.
(17) The computer tomographic appearances of lesions of parenchymatous organs following blunt abdominal trauma are described in 13 patients (five liver, four renal, two splenic and two pancreatic injuries).
(18) 3 patients had complete disappearance of the symptoms but did not have a computed tomography scanning control, 3 patients had clinical and CT recovery.
(19) Second, is it possible - by combining the two technologies of endoscopy and computers - to provide an individual patient with a short-term prognostic prediction sufficiently accurate to affect patient management.
(20) Computed tomography does not allow differentiation between these lesions and surrounding normal tissues.
Steganography
Definition:
(n.) The art of writing in cipher, or in characters which are not intelligible except to persons who have the key; cryptography.
Example Sentences:
(1) Boyd uses the term "social steganography" to describe the practice of more than 50% of young people who use in-jokes and obscure references to effectively encode what they post.
(2) A determined person can get a message out in all sorts of ways: one of the smartest is to hide coded data inside the pixels of what looks like a perfectly innocent photograph, a method called steganography.
(3) Jihadists are also reported to conceal messages to each other inside pornographic imagery – a sort of X-rated steganography – though the contention has not been confirmed.