Abstract:
A computerized system and method for supply chain order aids a manufacturer's production control departments in setting manufacturer production schedules and purchase schedules. A computerized production control system in communication with a computerized ordering system presents a consistent demand level to reduce changes to the purchase and delivery schedules. A next day production schedule is adjusted to keep total demand within the supply chain constant. At the end of a production day, actual production is compared to an original production plan to calculate an adjustment value. The adjustment value is applied to the next day's production schedule to revise the production schedule. If the actual number of units produced is lower than the planned number of units, units are added to the next day's purchase schedule to determine a revised purchase schedule. Other adjustments may be made if the actual number of units produced exceeds the planned number of units.
Abstract:
A welding apparatus includes a single weld head, a weld power supply, a conductive fixture plate, a data acquisition card, and a computer. The single weld head includes one or more electrodes, one or more actuating devices in operative communication with the electrodes, and one or more force control devices in operative communication with the actuating devices. The weld head is in communication with a weld power supply. The weld power supply welds articles in accordance with a computer program running on a computer. The computer is in communication with the weld power supply, the force control device, and the data acquisition card. The computer is capable of receiving, evaluating, and storing welding data received from the data acquisition card. The apparatus further includes a switch in communication with the weld power supply, the electrodes, the conductive fixture plate, and the data acquisition card.
Abstract:
The present invention includes an automated credit approval process that provides a pre-approval package based upon information gathered from a basic form of customer identification. A potential customer provides a basic form of personal information, such as a driver's license, to a vendor. The basic personal information is scanned into a data management system where it is subsequently transferred to a credit reporting agency through an automated credit server. The automated credit approval server includes a decisioning platform that compares at least one of a plurality of credit attributes contained within a credit file received from the credit reporting agency with a pre-determined set of creditworthiness criteria established by various lending institutions to generate a credit decision. This method of credit evaluation is conducted with only the basic information found on the driver's license and, as such, limits exposure of the potential customer's sensitive personal information, for example, their social security number and/or signature.
Abstract:
A background data synchronization process employs human-readable communication channels to contact a user and request resolution of synchronization conflicts as they arise.
Abstract:
Apparatus for extending and retracting a cover for a swimming pool includes a motor for selectively rotating a clutch in one direction or the other direction. A first pawl, extending within the clutch, drives a first cam to cause rotation of a set of pulleys for winding cords thereabout to extend the cover from about a roller and a second pawl, extending within the clutch, drives a second cam to cause rotation of the roller to wrap the cover thereabout. First and second lift arms lift the first and second pawls out of engagement with the first and second cams, respectively as a function of the direction of rotation of the clutch to ensure that only one of the first and second cams is rotated by the clutch. A cylinder mounted on a shaft in engagement with the armature of the motor is in frictional contact with spring loaded brakes within the clutch to transfer rotational movement of the armature to the clutch. A compensator in engagement with the cords, through pulleys therewithin and spools therewithout, compensates for changes in relative length of the cords over time and for lack of squareness of the pool.
Abstract:
Disclosed is a method for applying a yellow incandescent bugfoiler pigment coating comprising a fine-ground blend of praseodymium doped zirconium silicate and silica. This cadmium-free blend is preferably applied electrostatically in three coats to the interior of a bulb to diffuse the light and block the emitted UV wavelengths. The color of the blend will intensify with increasing heat and return to it's initial yellow color upon cooling.
Abstract:
The present invention is directed to a roll-up, flexible, sound-attenuating wall system. More particularly, this invention relates to a retractable wall system and its components which may be used to divide existing larger spaces into smaller spaces with sound-attenuating barriers. In each unit the flexible, sound-attenuating wall is attached to a receiver tube which, when turned on its axis, deploys or retracts the flexible, sound-attenuating wall. The flexible, sound-attenuating wall is guided by a guide roller to intersect with other flexible, sound-attenuating walls at various angles. The receiver tube and guide roller are attached at either end to independent support brackets. This invention discloses a plurality of interlocking connector systems for connecting a plurality of flexible, sound-attenuating walls at various angles. Further, this invention discloses a winding mechanism disposed in and attached to receiver tube which turns the receiver tube on its longitudinal axis to deploy or retract the flexible, sound-attenuating wall.
Abstract:
The present invention is a computer security system and method in which the various algorithms not only do not search for or detect the presence of a steganographic or other hidden image in a data file or across data files, but also includes at least one or more combined approaches for altering and neutralizing any hidden messages without significantly detracting from the underlying integrity of the data file or files thus treated.
Abstract:
The present invention is a computer security system and method in which the various algorithms not only do not search for or detect the presence of a steganographic or other hidden image in a data file or across data files, but also includes at least one or more combined approaches for altering and neutralizing any hidden messages without significantly detracting from the underlying integrity of the data file or files thus treated.
Abstract:
A system of interconnecting structural components for supporting and forming suspended concrete slabs that allow removal of form panels without disturbing the slab support posts (shores). Additional features of the system accommodate changes in suspended slab thickness, horizontal slab dimensions that are not multiples of the basic component dimensions, slab edge cantilevered form panels, attachment to walls and remote manipulation of form panels from the floor below using an erection staff. The primary system components are panels, support posts, telescopic beams, adjustable hanger connections, wall hangers, wall beams, raking shore assemblies and erection/stripping staffs. Form panels are directly supported by the shores without the use of an intermediate member (usually a beam) that is common practice in the concrete forming industry. The system reduces the number of required components that in turn reduces the capital cost to the user and improves his labor efficiency and quality of the concrete surface.