Premium Essay

Grover's Presentation Summary

Submitted By
Words 806
Pages 4
In Dr. William Grover’s presentation, he generally explained his field of Bioengineering, the research that takes place in his lab, and the methods that are utilized in his research. He primarily deals with understanding how a cell’s density changes over time and in-reaction to substances and developing instrumentation. Grover Lab has a wide range of research going on that focuses primarily on Bioinstrumentation and technology. The lab that Dr. Groves runs focuses on the research and development of Bioinstrumentation in order to observe and get information from cells. This relates to the sector of bioengineering that seeks to utilize biology and chemistry to understand different methods of seeing change in the body through cells for medical use. In his own words, Dr. Groves explained how he viewed the physical properties of substances. He divides the characteristics of a cell into biological and chemical information. Biological information includes cell type, the growth rate of a cell, or whether the cell is reacting to anything around it. On the other hand, chemical information is primarily the chemical makeup of a cell and distinguishing different compounds. To gain a greater understanding of both these types of information, Dr. Groves examines …show more content…
Grover explained numerous terms, and their importance to his research. The resonance frequency of something occurs when it oscillates back and forth. In the SMR, the device oscillates at the resonance frequency of the cell in the device and is inversely proportional to the mass of the cell or particle. The SMR itself is an example of microfluidics, which utilizes fluids at the microscopic level to do preform functions, and examine occurrences. When applied to medicine, the device is able to give the density of a diseased cell compared to a healthy cell, effectively diagnosing the patient. Most diseases can be seen through cells, including those that affect the cells such as cancer and

Similar Documents

Free Essay

Magt

...i Computational Complexity: A Modern Approach Draft of a book: Dated January 2007 Comments welcome! Sanjeev Arora and Boaz Barak Princeton University complexitybook@gmail.com Not to be reproduced or distributed without the authors’ permission This is an Internet draft. Some chapters are more finished than others. References and attributions are very preliminary and we apologize in advance for any omissions (but hope you will nevertheless point them out to us). Please send us bugs, typos, missing references or general comments to complexitybook@gmail.com — Thank You!! DRAFT ii DRAFT About this book Computational complexity theory has developed rapidly in the past three decades. The list of surprising and fundamental results proved since 1990 alone could fill a book: these include new probabilistic definitions of classical complexity classes (IP = PSPACE and the PCP Theorems) and their implications for the field of approximation algorithms; Shor’s algorithm to factor integers using a quantum computer; an understanding of why current approaches to the famous P versus NP will not be successful; a theory of derandomization and pseudorandomness based upon computational hardness; and beautiful constructions of pseudorandom objects such as extractors and expanders. This book aims to describe such recent achievements of complexity theory in the context of the classical results. It is intended to both serve as a textbook as a reference for self-study. This means...

Words: 210134 - Pages: 841

Free Essay

Hacking the Art of Exploitation

...2nd Edition Hacking the art of exploitation jon erickson PRAISE FOR THE FIRST EDITION OF HACKING: THE ART OF EXPLOITATION “Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them.” —PHRACK “From all the books I’ve read so far, I would consider this the seminal hackers handbook.” —SECURITY FORUMS “I recommend this book for the programming section alone.” —UNIX REVIEW “I highly recommend this book. It is written by someone who knows of what he speaks, with usable code, tools and examples.” —IEEE CIPHER “Erickson’s book, a compact and no-nonsense guide for novice hackers, is filled with real code and hacking techniques and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher:...

Words: 139438 - Pages: 558