Abstract:
The present invention relates to compounds of formula where R5 is a sugar moiety. The compounds are useful in inhibiting fungal and parasitic activity and infections.
Abstract:
Generally disclosed is a device for simply and inexpensively tarping the payload of any truck bed without placing the tarper, the tarp, or the payload in danger of injury. In a preferred embodiment, the disclosed device generally comprises: (1) a rolled or bunched tarp that is installed on a first portable and adjustable riser; (2) a cable and cable crank installed on a second portable and adjustable riser; (3) wherein the cable may be attached to the tarp so that cranking the cable crank will unroll or unbunch the tarp and suspendedly draw the same toward the second riser; and (4) wherein the risers are removable from the truck bed.
Abstract:
Generally disclosed is a device for simply and inexpensively tarping the payload of any truck bed without placing the tarper, the tarp, or the payload in danger of injury. In a preferred embodiment, the disclosed device generally comprises: (1) a rolled or bunched tarp that is installed on a first portable and adjustable riser; (2) a cable and cable crank installed on a second portable and adjustable riser; (3) wherein the cable may be attached to the tarp so that cranking the cable crank will unroll or unbunch the tarp and suspendedly draw the same toward the second riser; and (4) wherein the risers are removable from the truck bed.
Abstract:
The present invention provides 6-substituted 2,3,4,5-tetrahydro-1H-benzo[d]azepines of Formula I as selective 5-HT2C receptor agonists for the treatment of 5-HT2C associated disorders including obesity, obsessive/compulsive disorder, depression, and anxiety: where: R6 is —S—R14; and other substituents are as defined in the specification.
Abstract:
Embodiments of this invention provide methods for detecting a denial of service attack (DoS) and isolating traffic that relates to the attack. The method may begin by collecting network traffic data by observing individual packets carried over the network. The data may then be compiled into a time series comprising network traffic data relating successive time-intervals. A difference value based upon the entry in the time series for a large time-window and for a small time-window. A deviation score may then be determined by calculating the ratio of the difference values. The deviation score may indicate whether an attack occurred. In an embodiment of the invention, an attack is deemed to occur if the deviation score is between 0.6 and 1.4.
Abstract:
One embodiment of the present invention relates to a method by which the imprint of a ferroelectric random access memory (FRAM) array is reduced. The method begins when an event that will cause imprint to the memory array is anticipated by an external agent to the device comprising the chip. The external agent sends a command to the control circuitry that the data states are to be written to a particular data state. Upon receiving a signal the control circuitry writes all of the ferroelectric memory cells in the FRAM array to a preferred memory data state. The memory data states are held in the preferred data state for the entire duration of the event to minimize imprint of the FRAM memory cells. When the event ends the external agent sends a command to the control circuitry to resume normal memory operation. Other methods and circuits are also disclosed.
Abstract:
One embodiment of the present invention relates to a method by which the imprint of a ferroelectric random access memory (FRAM) array is reduced. The method begins when an event that will cause imprint to the memory array is anticipated by an external agent to the device comprising the chip. The external agent sends a command to the control circuitry that the data states are to be written to a particular data state. Upon receiving a signal the control circuitry writes all of the ferroelectric memory cells in the FRAM array to a preferred memory data state. The memory data states are held in the preferred data state for the entire duration of the event to minimize imprint of the FRAM memory cells. When the event ends the external agent sends a command to the control circuitry to resume normal memory operation. Other methods and circuits are also disclosed.
Abstract:
An order scheduling system providing a method for distributing product orders to multiple fulfillers is described. This method, which solves the common business problem of scheduling order shipments, is optimal because it minimizes the number of orders across fulfillers, thus minimizing shipping costs. It is also fair because orders are distributed equally across fulfillers if that fulfiller has the product available. To schedule orders, a data structure is defined whose rows are represented by a hash table of Fulfillers (HF), where each column is a hash table of Products (HP) and where each index of HP is itself a bit vector (VPi). This gives a three-dimensional data structure. The method operates by performing bitwise ANDing (&) operations of the bit vectors, to generate an Order bit vector representing the optimized fulfillment (per system configuration/constraints) for a particular received order.
Abstract:
Apparatuses and methods for removing veins, usually varicose veins, rely on endoluminal capture of a distal end of the vein segment to be removed. In the illustrated embodiments, a shaft having reciprocatable penetrating elements is used to engage and capture the distal end of the vein. After rotating the shaft to pull the distal segment of the vein away from the connecting tissue, the shaft is withdrawn proximally, invaginating the segment back to the point of insertion.
Abstract:
An electric reciprocating file or polishing member held in a housing. The housing supports a motor for reciprocating an enclosure held within the housing. A spring is held within the enclosure and the file is shaped to be snapped in or pulled out of the spring for use.