摘要:
A process for producing an acridine carboxamide of formula (I): ##STR1## wherein each of R.sup.1, R.sup.2, R.sup.5 and R.sup.6, which may be the same or different, is H or an organic subsituent, x is from 1 to 6 and Y is N(R)2 wherein R is C.sub.1 -C.sub.6 alkyl, or a pharmaceutically acceptable salt thereof.
摘要:
A high temperature rechargeable electrochemical cell which comprises a cell housing divided by a separator into an anode compartment and a cathode compartment. The anode compartment contains an active anode substance which is a molten alkali metal M, the separator being capable of conducting ions of the alkali metal of the anode therethrough. The cathode compartment contains a cathode comprising an electronically conductive electrolyte-permeable porous matrix having, dispersed therein, a solid active cathode substance the matrix being impregnated with a molten salt electrolyte. The cathode comprises also, in contact with the matrix, a porous, electrolyte-permeable reservoir of material which is electrochemically and chemically inert in the cathode environment, said reservoir having an ability to wick the molten salt electrolyte at the operating temperature of the cell which ability is less than the ability of the matrix to wick said molten salt electrolyte.
摘要:
A prescription management system is used by an orthodontic or dental lab and a plurality of prescribing users who send prescriptions for customized orthodontic or dental appliances to the lab. The prescriptions are stored in a database selectively accessible by the lab and plurality of prescribing users. A digital workspace is provided in the system in which the lab or prescribing users may create designs for the customized appliances. The designs of the appliances are stored in the database. A tracking record of fabrication of the appliances is stored in the database. A plurality of billings are simultaneously generated in response to the submissions and storage of the prescriptions, the designs of the customized appliances and the fabrication of the designed customized appliances.
摘要:
In but one embodiment of the present invention, there is provided a system having a display to indicate the amount of a material being added to a scale. The system includes tolerance indication software configured to indicate predefined ranged tolerances above and/or below the recommended amounts, such that a user is able to identify whether the amount added to the scale for a colorant and/or dye blending material is within the predefined ranged tolerances. In yet another aspect the memory includes instructions to recreate formulas based on a specific product brand. Software can be provided to permit a user to convert the formula, either a portion or the entire formula, to a second product brand.
摘要:
Techniques for routing a payload of a first network protocol, which includes header information for a second network protocol, include communicating a packet. In a circuit block, a first type for the first network protocol and a second type for the second network protocol are determined. The circuit block stores a classification that indicates a unique combination of the first type and the second type. A general purpose processor routes the packet based on the classification. Processor clock cycles are saved that would be consumed in determining the types. Furthermore, based on the classification, the processor can store an offset value for aligning the header relative to a cache line. The circuit block can store the packet shifted by the offset value. The processor can then retrieve from memory a single cache line to receive the header, thereby saving excess loading and ejecting of cache.
摘要:
An apparatus and method for deploying vivid notice to a first responder, wherein the deploying event is triggered by the vehicle crash motion or by signal from the vehicle's own crash detection system, and the vivid notice is coded to the particular hazard present at the vehicle crash site and includes at least one visual notice, auditory notice, or olfactory notice, and may include a combination of any of the three notices, or all three at once.
摘要:
A fluid handling device with an anisotropic wetting surface including a substrate with a multiplicity of asymmetric substantially uniformly shaped asperities thereon. Each asperity has a first asperity rise angle and a second asperity rise angle relative to the substrate. The asperities are structured to present a desired retentive force ratio (f1/f2) greater or less than unity caused by asymmetry between the first asperity rise angle and the second asperity rise angle according to the formula: f3/f2=sin(ω3+½Δθ0)/sin(ω2+½Δθ0).
摘要:
A controlled stent-graft deployment delivery system (10 50 or 900) includes a stent-graft (30 or 63), a retractable primary sheath (40) containing the stent-graft in a first constrained diameter configuration, an outer tube (18) within the retractable primary sheath and within the stent-graft, and an inner tube (20) within the outer tube, where the inner tube and the outer tube both axially move relative to the retractable primary sheath and to each other. The system further includes a cap (15) coupled to a distal end of the inner tube and configured to retain at least a portion of a proximal area of the stent-graft in a radially compressed configuration. A distal assembly (100) provides controlled relative axial movement between the outer tube and the inner tube enabling the release of the proximal end (65, 67, 68, and 69) of the stent-graft from the cap and from the radially compressed configuration.
摘要:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.