[PDF][PDF] Performance evaluation of a whole-body PET scanner using the NEMA protocol
…, ME Bellemann, H Ostertag, H Trojan… - Journal of Nuclear …, 1997 - Soc Nuclear Med
The scanner consists of four rings of 72 bismuth germanate block detectors each, covering
an axial field of view of 15.5 cm with a patient port of 56.2 cm. A single block detector is …
an axial field of view of 15.5 cm with a patient port of 56.2 cm. A single block detector is …
Performance evaluation of the whole-body PET scanner ECAT EXACT HR/sup+/following the IEC standard
LE Adam, J Zaers, H Ostertag, H Trojan… - … on Nuclear Science, 1997 - ieeexplore.ieee.org
The performance parameters of the whole-body PET scanner ECAT EXACT HR/sup +/ (CTI/Siemens,
Knoxville, TN) were determined following the standard proposed by the …
Knoxville, TN) were determined following the standard proposed by the …
FDG uptake, tumor proliferation and expression of glycolysis associated genes in animal tumor models
U Haberkorn, SI Ziegler, F Oberdorfer, H Trojan… - Nuclear medicine and …, 1994 - Elsevier
To determine the influence of tumor cell proliferation and changes in the genetic program in
malignant cells on the fluorodeoxyglucose (FDG) uptake we performed PET studies in …
malignant cells on the fluorodeoxyglucose (FDG) uptake we performed PET studies in …
Use of scanner characteristics in iterative image reconstruction for high-resolution positron emission tomography studies of small animals
G Brix, J Doll, ME Bellemann, H Trojan… - European journal of …, 1997 - Springer
The purpose of this work was to improve of the spatial resolution of a whole-body positron
emission tomography (PET) system for experimental studies of small animals by incorporation …
emission tomography (PET) system for experimental studies of small animals by incorporation …
Performance evaluation of the whole-body PET scanner ECAT EXACT HR/sup+
LE Adam, J Zaers, H Ostertag, H Trojan… - 1996 IEEE Nuclear …, 1996 - ieeexplore.ieee.org
The performance parameters of the whole-body PET scanner ECAT EXACT HR/sup +/ (CTI/Siemens,
Knoxville, TN) were determined following the standard proposed by the …
Knoxville, TN) were determined following the standard proposed by the …
A “Trojan horse” bispecific-antibody strategy for broad protection against ebolaviruses
There is an urgent need for monoclonal antibody (mAb) therapies that broadly protect
against Ebola virus and other filoviruses. The conserved, essential interaction between the …
against Ebola virus and other filoviruses. The conserved, essential interaction between the …
[HTML][HTML] Two distinct lysosomal targeting strategies afford Trojan horse antibodies with pan-filovirus activity
… To overcome this obstacle, we previously developed a ‘Trojan horse’ therapeutic approach
in … Here, we describe next-generation Trojan horse bsAbs that target the endo/lysosomal GP:…
in … Here, we describe next-generation Trojan horse bsAbs that target the endo/lysosomal GP:…
Siderophore-antibiotic conjugates used as trojan horses against Pseudomonas aeruginosa
H Budzikiewicz - Current topics in medicinal chemistry, 2001 - ingentaconnect.com
… The literature survey presented in this review shows that the Trojan Horse strategy against
resistant strains of Pseudomonas aeruginosa can be successful. The use of a siderophore …
resistant strains of Pseudomonas aeruginosa can be successful. The use of a siderophore …
A Trojan Horse for Sociology?: Preferences versus Evolution and Morality
G Hodgson - Review of Behavioral Economics, 2015 - researchprofiles.herts.ac.uk
Herbert Gintis and Dirk Helbing have developed a highly impressive, over-arching theoretical
framework, using rational choice theory, general equilibrium theory, and game theory. …
framework, using rational choice theory, general equilibrium theory, and game theory. …
Verification of untrusted chips using trusted layout and emission measurements
…, P Song, AJ Weger, J Culp, A Herbert… - … oriented security and …, 2014 - ieeexplore.ieee.org
… this paper presents a novel methodology for hardware security and trojan detection
applications for unsecured manufacturing. the method is based on our proposed testerY based …
applications for unsecured manufacturing. the method is based on our proposed testerY based …