Title: APPLICATIONS OF SCIENCE AND TECHNOLOGY
1APPLICATIONS OF SCIENCE AND TECHNOLOGY
2Accelerating Growth
3(No Transcript)
4(No Transcript)
5(No Transcript)
6(No Transcript)
7(No Transcript)
8(No Transcript)
9Double exponential growth
- There's exponential growth even in the rate of
exponential growth. Computer speed (per unit
cost) doubled every three years between 1910 and
1950, doubled every two years between 1950 and
1966, and is now doubling every year - It took ninety years to achieve the first MIPS
(million instructions per second) per thousand
dollars, now we add one MIPS per thousand dollars
every day.
10- Every point on the exponential growth curves
represents an intense human drama of innovation
and competition. It is remarkable that these
chaotic processes result in such smooth and
predictable exponential trends. - For example, when the human genome scan started,
critics pointed out that given the speed with
which the genome could then be scanned, it would
take thousands of years to finish the project.
Yet the fifteen year project was nonetheless
completed slightly ahead of schedule.
11(No Transcript)
12(No Transcript)
13(No Transcript)
14Communications
- Exponential growth in communications technology
has been even more explosive than in computation
and is no less significant in its implications. - Again, this progression involves far more than
just shrinking transistors on an integrated
circuit, but includes accelerating advances in
fiber optics, optical switching, electromagnetic
technologies, and others.
15(No Transcript)
16(No Transcript)
17Internet
- The following two charts show the overall growth
of the Internet based on the number of hosts
18(No Transcript)
19(No Transcript)
20Wireless communication
- the power is doubling every 10 to 11 months.
21(No Transcript)
22- 1973 - Network Voice Protocol introduced
- 1980 - Internet Protocol came into existence
- 1989 - ISDN/Integrated Services Digital Network
came into existence - 1991 - The first GSM network was launched in 1991
by Radiolinja in Finland. - 1995 - First VoIP connection
- 2001 - Vonage founded
- 2002 - Skype founded
- December 2006 - Over 8 million concurrent users
on Skype - 2006 - 7 of all international US voice traffic
was sent through Skype
23Economy
- Virtually all of the economic models taught in
economics classes are fundamentally flawed
because they are based on the intuitive linear
view of history rather than the historically
based exponential view. - The reason that these linear models appear to
work for a while is for the same reason that most
people adopt the intuitive linear view in the
first place exponential trends appear to be
linear when viewed (and experienced) for a brief
period of time, particularly in the early stages
of an exponential trend when not much is
happening. - But once the "knee of the curve" is achieved and
the exponential growth explodes, the linear
models break down. - The economy (viewed either in total or per
capita) has been growing exponentially throughout
this century
24(No Transcript)
25Software Price-Performance
- has Also Improved at an Exponential Rate
- Example Automatic Speech Recognition Software
1985 1995 2000
Price 5 000 500 50
Vocabulary Size ( words) 1000 10 000 100 000
Continuous Speech? No No Yes
User Training Required (Minutes) 180 60 5
Accuracy Poor Fair Good
26(No Transcript)
27Diminishing returns - 1
- Diminishing returns (also diminishing marginal
returns, the law of diminishing returns, law of
increasing relative cost, or law of increasing
opportunity cost) in a production system with
fixed and variable inputs (say factory size and
labor), beyond some point, each additional unit
of variable input yields less and less additional
output. Conversely, producing one more unit of
output costs more and more in variable inputs. - Although ostensibly a purely economic concept,
diminishing marginal returns also implies a
technological relationship. Diminishing marginal
returns states that a firm's short run marginal
cost curve will eventually increase. It is
possibly among the best-known economic "laws."
28Diminishing returns - 2
- Suppose that one kilogram (kg) of seed applied to
a plot of land of a fixed size produces one ton
of harvestable crop. You might expect that an
additional kilogram of seed would produce an
additional ton of output. However, if there are
diminishing marginal returns, that additional
kilogram will produce less than one additional
ton of harvestable crop (on the same land, during
the same growing season, and with nothing else
but the amount of seeds planted changing). For
example, the second kilogram of seed may only
produce a half ton of extra output. Diminishing
marginal returns also implies that a third
kilogram of seed will produce an additional crop
that is even less than a half ton of additional
output. Assume that it is one quarter of a ton.
29Diminishing returns - 3
- A consequence of diminishing marginal returns is
that as total investment increases, the total
return on investment as a proportion of the total
investment (the average product or return) also
decreases. The return from investing the first
kilogram is 1 t/kg. The total return when 2 kg of
seed are invested is 1.5/2 0.75 t/kg, while the
total return when 3 kg are invested is 1.75/3
0.58 t/kg.
30Resources
- Ray Kurzweil The Law of Accelerating Returns,
http//www.kurzweilai.net/meme/frame.html?main/ar
ticles/art0134.html - http//en.wikipedia.org/wiki/Accelerating_change
31(No Transcript)
32iPod-iTunes-iPhone
33iPod
iPod shuffle iPod nano iPod classic iPod touch
34iPod
- launched in October 2001
- over 110 million units worldwide, as of September
2007 - iPod can play a variety of audio file formats
- The iPod photo introduced the ability to display
numerous image file formats.
35- Each time an iPod connects to its host computer,
iTunes can synchronize entire music libraries or
music playlists either automatically or manually.
Song ratings can be set on the iPod and
synchronized later to the iTunes library, and
vice versa
36iPod timeline
37iPod sales
38- Jan 2007 Apple reported record quarterly
earnings of US7.1 billion, of which 48 was made
from iPod sales. - On Apr 9, 2007, it was announced that Apple had
sold its one-hundred millionth iPod, making it
the biggest selling digital music player of all
time. - In April 2007, Apple reported second quarter
earnings of US5.2 billion, of which 32 was made
from iPod sales. - Apple and several industry analysts suggest that
iPod users are likely to purchase other Apple
products such as Mac computers. - On Sep 5, 2007, Apple announced that the iPod had
surpassed 110 million units sold.
39iTunes
- playing and organizing digital music and video
files - available as a free download
- users are able to organize their music into
playlists within one or more libraries, edit file
information, record CD, copy files, purchase
music and videos through its built-in music
store, download podcasts, back up songs onto a CD
or DVD, encode music into a number of different
audio formats. - 2005 support for purchasing and viewing of video
content from the iTunes Music Store
40iTunes Store
- opening Apr 2008, 2003
- Jul 31, 2007 over 3 billion downloads since
iTunes was first introduced - more than 80 of
worldwide online digital music sales
41Prices
- DRM versions of songs cost 0.99
- DRM-free versions of certain songs are
additionally available for US1.29 - European prices oscillate around 0.99
- Television episodes 1.99
- Feature-length movies 9.99 for older movies,
12.99 for new movies - games 4.99 each
42Contents
- more than 6,000,000 songs
- over 20,000 audiobooks
- Apr 11, 2007 over 500 movies
43DRM
- Apple's FairPlay digital rights management (DRM)
is integrated into iTunes, which manages songs
purchased from iTunes Store. iTunes relies on
FairPlay to implement two main restrictions - Users can make a maximum of seven CD copies of
any particular playlist containing songs
purchased from the iTunes Store. - Users can access their purchased songs on a
maximum of five computers. - There are no restrictions on number of iPods to
which a purchased song can be transferred nor the
number of times any individual song can be burned
to CD.
44iPhone
- introduced Jun 29, 2007 in the US, current price
is 399 for an 8 GB model - Nov 9, 2007
- UK O2 on the carrier
- Germany T-Mobile
- Czech Republic T-mobile
- iPhone users must use iTunes to select and
purchase a contract tariff before the phone
features may be used
45Technology
- the iPhone is manufactured on contract in the
Shenzhen factory of the Taiwanese company Hon Hai
- Storage 8 GB flash memory
- Quad band GSM
- Wi-Fi, EDGE and Bluetooth 2.0
- 2 megapixel camera
- more than 300 patents related to the technology
behind the iPhone
46Apple - Mission Statement
- Apple ignited the personal computer revolution in
the 1970s with the Apple II and reinvented the
personal computer in the 1980s with the
Macintosh. - Today, Apple continues to lead the industry in
innovation with its award-winning computers, OS X
operating system and iLife and professional
applications. - Apple is also spearheading the digital media
revolution with its iPod portable music and video
players and iTunes online store, and has entered
the mobile phone market this year with its
revolutionary iPhone
47Slogans
- Byte into an Apple
- iThink, therefore iMac
48Nanotechnology
49- technology whose unifying theme is the control of
matter on the atomic and molecular level in
scales from 1 to 100 nanometers (10-9 m), and the
fabrication of devices within that size range - bottom-up" approach materials and devices are
built from molecular components which assemble
themselves chemically by principles of molecular
recognition - "top-down" approach nano-objects are constructed
from larger entities without atomic-level control
50Links
How can you explain what is meant by
nanotechnology? Nanotechnology Innovation for
tomorrows world
51(No Transcript)
52Applications
http//en.wikipedia.org/wiki/List_of_nanotechnolog
y_applications
53Potential hazards
- Potential for some nanomaterials to be toxic to
humans or the environment - The smaller a particle, the greater its surface
area to volume ratio and the higher its chemical
reactivity and biological activity ? increased
production of reactive oxygen species (ROS),
including free radicals - ROS and free radical production is one of the
primary mechanisms of nanoparticle toxicity it
may result in oxidative stress, inflammation, and
consequent damage to proteins, membranes and DNA
54Nano optimists
- providing universal clean water supplies
- greater agricultural productivity with less
labour requirements, nutritionally enhanced
interactive smart foods - cheap and powerful energy generation
- clean and highly efficient manufacturing
- radically improved formulation of drugs,
diagnostics and organ replacement - much greater information storage and
communication capacities - interactive smart appliances and increased
human performance through convergent technologies
55Nano skeptics
- nanotechnology will simply exacerbate problems
stemming from existing socio-economic inequity
and unequal distributions of power, creating
greater inequities between rich and poor through
an inevitable nano-divide (the gap between those
who control the new nanotechnologies and those
whose products, services or labour are displaced
by them) - nanotechnology has the potential to destabilise
international relations through a nano arms race
and the increased potential for bioweaponry - might break down the barriers between life and
non-life through nanobiotechnology, redefining
even what it means to be human
56CryptographyDigital signatures
57Benefits of digital signatures
- Authentication When ownership of a digital
signature secret key is bound to a specific user,
a valid signature shows that the message was sent
by that user. The importance of high confidence
in sender authenticity is especially obvious in a
financial context. For example, suppose a bank's
branch office sends instructions to the central
office requesting a change in the balance of an
account. If the central office is not convinced
that such a message is truly sent from an
authorized source, acting on such a request could
be a grave mistake.
58Benefits of digital signatures
- Integrity confidence that the message has not
been altered during transmission. Although
encryption hides the contents of a message, it
may be possible to change an encrypted message
without understanding it. However, if a message
is digitally signed, any change in the message
will invalidate the signature.
59Create keys
A big random number is used to make a
public-key/private-key pair.
60Encrypt decrypt
Anyone can encrypt using the public key, but only
the holder of the private key can decrypt.
Secrecy depends on the secrecy of the private key
61Sign
Using a private key to encrypt (thus signing) a
message anyone can check the signature using the
public key. Validity depends on private key
security
62Share symmetric key
By combining your own private key with the other
user's public key, you can calculate a shared
secret that only the two of you know. The shared
secret can be used as the key for a symmetric
cipher.
63- Public key encryption a message encrypted with
a recipient's public key cannot be decrypted by
anyone except the recipient possessing the
corresponding private key. This is used to ensure
confidentiality. - Digital signatures a message signed with a
sender's private key can be verified by anyone
who has access to the sender's public key,
thereby proving that the sender signed it and
that the message has not been tampered with. This
is used to ensure authenticity.
64- An analogy for public-key encryption is that of a
locked mailbox with a mail slot. The mail slot is
exposed and accessible to the public its
location (the street address) is in essence the
public key. Anyone knowing the street address can
go to the door and drop a written message through
the slot however, only the person who possesses
the key can open the mailbox and read the
message. - An analogy for digital signatures is the sealing
of an envelope with a personal wax seal. The
message can be opened by anyone, but the presence
of the seal authenticates the sender.
65- For encryption, the sender encrypts the message
with a secret-key algorithm using a randomly
generated key, and that random key is then
encrypted with the recipient's public key. - For digital signatures, the sender hashes the
message (using a cryptographic hash function) and
then signs the resulting "hash value". - Before verifying the signature, the recipient
also computes the hash of the message, and
compares this hash value with the signed hash
value to check that the message has not been
tampered with.
66A postal analogy
- An analogy which can be used to understand the
advantages of an asymmetric system is to imagine
two people, Alice and Bob, sending a secret
message through the public mail. In this example,
Alice wants to send a secret message to Bob, and
expects a secret reply from Bob. - With a symmetric key system, Alice first puts the
secret message in a box, and locks the box using
a padlock to which she has a key. She then sends
the box to Bob through regular mail. When Bob
receives the box, he uses an identical copy of
Alice's key (which he has somehow obtained
previously, maybe by a face-to-face meeting) to
open the box, and reads the message. Bob can then
use the same padlock to send his secret reply.
67- In an asymmetric key system, Bob and Alice have
separate padlocks. First, Alice asks Bob to send
his open padlock to her through regular mail,
keeping his key to himself. When Alice receives
it she uses it to lock a box containing her
message, and sends the locked box to Bob. Bob can
then unlock the box with his key and read the
message from Alice. To reply, Bob must similarly
get Alice's open padlock to lock the box before
sending it back to her.
68- The critical advantage in an asymmetric key
system is that Bob and Alice never need to send a
copy of their keys to each other. This prevents a
third party (perhaps, in the example, a corrupt
postal worker) from copying a key while it is in
transit, allowing to spy on all future messages
sent between Alice and Bob. So in the public key
scenario, Alice and Bob need not trust the postal
service as much. In addition, if Bob were
careless and allowed someone else to copy his
key, Alice's messages to Bob would be
compromised, but Alice's messages to other people
would remain secret, since the other people would
be providing different padlocks for Alice to use.
69- all public key / private key cryptosystems depend
entirely on keeping the private key secret - store the private key on a smart card
70Brute force attack
- all public-key schemes are susceptible to brute
force key search attack - protection choosing key sizes large enough that
the best known attack would take so long that it
is not worth any adversary's time and money to
break the code - 128 bits is the suggested key length for
symmetric codes - 3072 bits is the suggested key length for systems
based on factoring - no efficient integer factorization algorithm is
publicly known a recent effort which factored a
200 digit number took eighteen months and used
over half a century of computer time.
71Man in the middle attack
- man in the middle attack, in which communication
of public keys is intercepted by a third party
and modified to provide different public keys
instead - certificate authority, a trusted third party who
is responsible for verifying the identity of a
user of the system and issuing a digital
certificate, which is a signed block of data
stating that this public key belongs to that
person, company or other entity
72Biotechnology
73- Biotechnology has contributed towards the
exploitation of biological organisms or
biological processes through modern techniques,
which could be profitably used in medicine,
agriculture, animal husbandry and environmental
cloning.
United Nations Convention on Biological Diversity
74Disciplines
- genetics
- molecular biology
- biochemistry
- embryology
- cell biology
75- the most practical uses cultivation of plants to
produce food suitable to humans, animal breeding - directed use of organisms for the manufacture of
organic products (beer and milk products), - early twentieth century manufacturing specific
products - 1917 corn starch
- bacterium capable of breaking down crude oil
- pharmacy
- genetic testing
- bioinformatics rapid organization and analysis
of biological data
76Pharmaceutical products
- genetically altered microorganisms for the
production of substances like insulin or
antibiotics - development of plant-made pharmaceuticals
- manufacture existing drugs more easily and
cheaply
77Genetic testing
- Can be used to
- Diagnose a disease.
- Confirm a diagnosis.
- Provide prognostic information about the course
of a disease. - Confirm the existence of a disease in
individuals. - With varying degrees of accuracy, predict the
risk of future disease
78Genetic testing current use
- Determining sex
- Carrier screening, or the identification of
unaffected individuals who carry one copy of a
gene for a disease that requires two copies for
the disease to manifest - Prenatal diagnostic screening
- Newborn screening
- Presymptomatic testing for predicting adult-onset
disorders - Presymptomatic testing for estimating the risk of
developing adult-onset cancers - Confirmational diagnosis of symptomatic
individuals - Forensic/identity testing
79Gene therapy
- treating, or even curing, genetic and acquired
diseases like cancer and AIDS by using normal
genes to supplement or replace defective genes or
to bolster a normal function such as immunity - somatic gene therapy the genome of the recipient
is changed, but this change is not passed along
to the next generation - germline gene therapy the egg and sperm cells of
the parents are changed for the purpose of
passing on the changes to their offspring. - June 2001 more than 500 clinical gene-therapy
trials involving about 3,500 patients, around 78
in the U.S., 18 in Europe
80Cloning
- Reproductive cloning
- Therapeutic cloning
- 1997 Dolly
81Ethical issues
- ethic reviews in research project proposals
- EU Framework Programme 7 does not allow funding
of research activities - aiming at human cloning for reproductive purposes
- intended to modify the genetic heritage of human
beings - intended to create human embryos solely for the
purpose of research or stem cell procurement
82(No Transcript)
83Technology to Market Mobile phone
V.Trommsdorff TU Berlin
Hygiene factors
Design
Weight
Sound quality
Stand-by-Zeit
Usability
Gesprächszeit
Antenne
Funkce
Purchase
Prestige
WAP-tauglich
Displej
Infraport
Readiness
Art des Akkus
Charging timet
User-friendly menu
Market factors
Goal
Technology factors
84(No Transcript)
85Medical Applications
- CT Computer Tomography - http//en.wikipedia.org/w
iki/Computer_tomography - NMR - Magnetic_resonance_imaging -
http//en.wikipedia.org/wiki/Magnetic_resonance_im
aging - PET - Positron_emission_tomography -
http//en.wikipedia.org/wiki/Positron_emission_tom
ography - Lithotripsy - http//en.wikipedia.org/wiki/Lithotr
ipsy - Medical ultrasonography - http//en.wikipedia.org/
wiki/Ultrasound_imaging
86CT - Computed Tomography
87Tomography
- medical imaging method employing tomography
created by computer processing. - tomos (slice) and graphein (to write)
- principle - early 1900s
88Digital processing
- Digital geometry processing is used to generate a
three-dimensional image of the inside of an
object from a large series of two-dimensional
X-ray images taken around a single axis of
rotation. - CT produces a volume of data which can be
processed in order to demonstrate various bodily
structures based on their ability to block the
X-ray/Röntgen beam.
89- The first commercially viable CT scanner was
invented by Sir Godfrey at EMI Central Research
Laboratories. Hounsfield conceived his idea in
1967, and it was publicly announced in 1972. - Allan McLeod Cormack of Tufts University in
Massachusetts independently invented a similar
process - Both Hounsfield and Cormack shared the 1979 Nobel
Prize in Medicine.
90- The original 1971 prototype took 160 parallel
readings through 180 angles, each 1 apart, with
each scan taking a little over five minutes. The
images from these scans took 2.5 hours to be
processed - Thanks to the success of The Beatles, EMI could
fund research and build early models for medical
use.
91Advantages
- completely eliminates the superimposition of
images of structures outside the area of interest - because of the inherent high-contrast resolution
of CT, differences between tissues that differ in
physical density by less than 1 can be
distinguished. Finally, data from a single CT
imaging procedure can be viewed in different
planes, depending on the diagnostic task.
92Risks
- The radiation dose for a particular study depends
on multiple factors volume scanned, patient
build, number and type of scan sequences, and
desired resolution and image quality - Increased CT usage has led to an overall rise in
the total amount of medical radiation used,
despite reductions in other areas
93Typical scan doses
Examination Typical effective dose (mSv)
Chest X-ray 0.1
Head CT 1.5
Screening mammography 3
Abdomen CT 5.3
Chest CT 5.8
Chest, Abdomen and Pelvis CT 9.9
CT colonography (virtual colonoscopy) 3.6 - 8.8
Cardiac CT angiogram 6.7-13
Barium enema 15
Neonatal abdominal CT 20
the average background exposure is 1-3 mSv per
annum
94NMR Magnetic resonance imaging
- Any nucleus that contains an odd number of
protons and/or of neutrons has an intrinsic
magnetic moment - The nucleus absorbs energy from the
electromagnetic (EM) pulse and radiate this
energy back out at a specific resonance frequency
This allows the observation of specific quantum
mechanical magnetic properties of an atomic
nucleus
95NMR physical basics
- Nuclear magnetic resonance was first described
and measured in molecular beams by Isidor Rabi in
1938. - Eight years later, in 1946, Felix Bloch and
Edward Mills Purcell refined the technique for
use on liquids and solids - Nobel Prize in physics in 1952
96Advantages
- MRI provides much greater contrast between the
different soft tissues of the body than CT does,
making it especially useful in neurological,
musculoskeletal, cardiovascular, and oncological
imaging. - Unlike CT, it uses no ionizing radiation, but
uses a powerful magnetic field to align the
nuclear magnetization of hydrogen atoms in water
in the body
97History
- relatively new technology.
- first MR image published in 1973
- first cross-sectional image of a living mouse
published in January 1974. - first studies performed on humans published in
1977. - By comparison, the first human X-ray image was
taken in 1895.
98Economics of MRI
- MRI equipment is expensive. 1.5 tesla scanners
often cost between 1 million and 1.5 million
USD. 3.0 tesla scanners often cost between 2
million and 2.3 million USD. Construction of MRI
suites can cost up to 500,000 USD, or more,
depending on project scope.
99Potential risks
- Pacemakers are generally considered an absolute
contraindication towards MRI - Medical or biostimulation implants
- Ferromagnetic foreign bodies (e.g. shell
fragments), or metallic implants - people with even mild claustrophobia are
sometimes unable to tolerate an MRI scan without
management
100- Paul Lauterbur (University of Illinois at
Urbana-Champaign) and Sir Peter Mansfield
(University of Nottingham) were awarded the 2003
Nobel Prize in Physiology or Medicine for their
"discoveries concerning magnetic resonance
imaging".
101PET Positron emission tomography
- The system detects pairs of gamma rays emitted
indirectly by a positron-emitting radionuclide
(tracer), which is introduced into the body on a
biologically active molecule. - Images of tracer concentration in 3-dimensional
space within the body are then reconstructed by
computer analysis.
102Combined scans
- In modern scanners, PET is often combined with CT
or NMR scan performed on the patient during the
same session, in the same machine. - As a result, the physician gets both anatomic and
metabolic information (i.e., what the structure
is, and what it is doing biochemically).
103Risks
- PET scanning is non-invasive, but it does involve
exposure to ionizing radiation. The total dose of
radiation is small, however, usually around 11 mSv
104Lithotripsy
- non-invasive treatment of kidney stones and
(stones in the gallbladder or in the liver). - Lithotripsy and the lithotriptor were developed
in the early 1980s in Germany by Dornier
Medizintechnik GmbH (now known as Dornier MedTech
Systems GmbH) - came into widespread use with the introduction
of the HM-3 lithotriptor in 1983
105- The lithotriptor attempts to break up the stone
with minimal collateral damage by using an
externally-applied, focused, high-intensity
acoustic pulse - The successive shock wave pressure pulses result
in direct shearing forces, as well as cavitations
bubbles surrounding the stone, which fragment the
stones into smaller pieces that then can easily
pass through the ureters or the cystic duct. - The process takes about an hour.
106Origins
- Dornier's early findings laid the cornerstone for
the evolution of metal aircraft. - During research performed in the Dornier
aerospace technology division, a previously
unexplained phenomenon was discovered. Pitting
was occurring on the surface of an aircraft as it
approached the sound barrier - a unique
phenomenon found to be caused by the shock wave
created in front of a droplet of moisture. - This finding, followed by the close collaboration
between hospitals and Dornier's development
laboratories, resulted in the invention of
extracorporeal shock wave lithotripsy
107Medical ultrasonography
- Diagnostic sonography (ultrasonography) is an
ultrasound-based diagnostic imaging technique
used to visualize subcutaneous body structures
including tendons, muscles, joints, vessels and
internal organs for possible pathology or
lesions. - Obstetric sonography is commonly used during
pregnancy and is widely recognized by the public.
There is a plethora of diagnostic and therapeutic
applications practiced in medicine. - In physics the term "ultrasound" applies to all
acoustic energy with a frequency above human
hearing (20 kHz).
108- Ultrasonic energy was first applied to the human
body for medical purposes by Dr. George Ludwig at
the Naval Medical Research Institute, Bethesda,
Maryland in the late 1940s.
109Therapeutic applications
- Therapeutic applications use ultrasound to bring
heat or agitation into the body. Much higher
energies are used than in diagnostics - Ultrasound may be used to clean teeth in dental
hygiene. - Ultrasound sources may be used to generate
regional heating and mechanical changes in
biological tissue. - Focused ultrasound may be used to generate highly
localized heating to treat cysts and tumors
(benign or malignant), treatment is often guided
by MRI. - Focused ultrasound may be used to break up kidney
stones by lithotripsy.
110Risks and side-effects
- Ultrasonography is generally considered a "safe"
imaging modality. However slight detrimental
effects have been occasionally observed (see
below). Diagnostic ultrasound studies of the
fetus are generally considered to be safe during
pregnancy. This diagnostic procedure should be
performed only when there is a valid medical
indication, and the lowest possible ultrasonic
exposure setting should be used to gain the
necessary diagnostic information under the "as
low as reasonably achievable" or ALARA principle.
111ALARA
As Low As Reasonably Achievable Also ALARP As
Low As Reasonably Practicable
112Providers
- Siemens Healthcare 49,000 employees, sales USD
17.2 billion - GE Healthcare 46,000 employees, sales USD16.997
billion - Philips - 33,000 employees
- Toshiba, Carestream Health, SAP Healthcare