Word: attacked
(lookup in dictionary)
(lookup stats)
Dates: during 1990-1999
Sort By: most recent first
(reverse)
...reports suggest that new non-invasive techniques can detect blocked arteries before a heart attack occurs. In one study, scientists used an ultrafast C.T. scan and computer technology to view and monitor plaque. In the other, researchers successfully used the scan with an injectable dye to see if arteries had actually narrowed. One conventional method, the stress test, isn't always reliable; in angiograms, the other technique, a catheter must be threaded to the heart...
Insurers make their money by spreading risk over as large a population as they can, calculating that the healthy will pay for the sick--and then some. Unless state law prohibits, they can discriminate--legally--by raising premiums for someone who, for example, has suffered a heart attack and is renewing an individual or small-group policy. Access to a growing body of predictive genetic information would permit insurers to weed out further the riskiest, hence costliest clients or at least make them pay more for their coverage even before illness strikes. Little wonder that insurers would like to know...
That trial, being conducted by GTI-Novartis in Gaithersburg, Md., uses an ingenious technique to attack brain tumors. After re-engineering a retrovirus--an RNA virus that invades only cells that are in the process of dividing--the doctors outfitted it with a gene from the herpes virus and injected it into the brain. Because virtually the only cells that divide in the brain are tumor cells, the retroviruses infected them alone, inserting the herpes gene into their nuclei. As this gene expressed itself, it made the tumor cells sensitive to the herpes drug ganciclovir. When the drug was then...
...would you make a gene chip? Let's say you want to identify which genes get turned on, or "expressed," by the immune system in the first few weeks after the AIDS virus begins its attack on the body. First you download the sequences of perhaps 10,000 genes--every A, C, G and T of the hereditary alphabet--into a computer. Then, still using the computer, you figure out what the mirror image of each sequence would be. (DNA can mirror itself as well as RNA.) The aim is to transform the mirror-sequence data into actual strands...
Kosovo?s warriors may not wait out the winter. The capture of eight Serb soldiers by ethnic Albanian fighters is threatening to end the cease-fire that stopped U.S. air strikes against the Serbs last year: Even as Serb forces gathered for an attack and Western observers scrambled to mediate Monday, guerrillas of the Kosovo Liberation Army (KLA) said they would release the soldiers only as part of a prisoner exchange. ?An exchange would legitimize the KLA as a political fighting force,? says TIME Central Europe reporter Dejan Anastasijevic. ?For the same reason, the Serbs can?t make a deal...