|
From: <Mar...@wa...> - 2004-12-17 14:12:58
|
Hi Mark, > (1) Is LCMS its own technique or does it reuse LC and MS=3F (do hybrid > techniques need their own individual definitions=3F) Let's assume LCMS reuses > LC and MS. As far as I remember, we decided that we build hyphenated techniques out of base techniques, so your assumption is correct. > If ExperimentStep is the application of a technique, then LC and MS Pages go > in differnt ExperimentSteps while UV214, UV254, ELS, NCLD all go in the same > ExperimentStep. This is the difficult point about chromatography: the multitude of different detectors. I think the cleanest approach would be to make each detector a different technique (or maybe technique extensions). This would require to put the UV, ELSm NCLD data into different ExperimentSteps. > If multi-detector data goes in multiple ExperimentSteps, then how do we hold > multiple instances of that hybrid analysis in one file=3F Each detector-specific ExperimentStep would have a Reference element pointing up the tree to the mother element, and would possibly sit in a subordinate ExperimentStepSet of the mother page. > Or perhaps they shoould all go in the same Exper ExperimentStep. Now we > have further possibilities - are these to be grouped together, entered > hierarchically in PageSet-Page-PageSet nests=3F What if you have LCUV and a > series of MS spectra with no parent chromatogram=3F etc. etc. Will each new > hybrid technique have to define its own way of nesting data. Perhaps you > begin to see why I suggest we do away with nesting and use clearly defined > categories and pointers to link them together (keyrefs). I see your point here. We need to put up guidelines for users how to structure hyphenated data. Maren. Mit freundlichen Gr=FC=DFen / Best regards Dr. Maren Fiege Product Manager -------------------------------------------------------------- Waters Informatics Europaallee 27, D-50226 Frechen, Germany Tel. +49 2234 9207 - 0 Fax. +49 2234 9207-99 Reply to: mar...@wa... http://www.creonlabcontrol.com http://www.watersinformatics.net -------------------------------------------------------------- =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D The information in this email is confidential, and is intended solely for = the addressee(s). Access to this email by anyone else is unauthorized and = therefore prohibited. If you are not the intended recipient you are = notified that disclosing, copying, distributing or taking any action in = reliance on the contents of this information is strictly prohibited and may= = be unlawful. =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D |