Abstract:
A database trigger generates a return code having the effect of inhibiting further executions of the trigger within a pre-defined scope of execution. Preferably, the pre-defined scope is a task or process executing on behalf of a particular user. Upon first encountering the applicable trigger condition, the corresponding trigger is fired normally. Internal logic within the trigger determines whether it is necessary to call the same trigger again within the same scope, and if not, generates corresponding return data. A database management system which manages the trigger and causes it to automatically fire intercepts the return data and disables further firing of the trigger for the pre-defined scope.
Abstract:
A method is provided for characterizing luminous celestial objects (e.g., stars) in celestial navigation of a missile system. The method includes segmenting, assigning, measuring, computing, ratioing, producing, scaling, and determining operations. Segmenting includes subdividing wavelength range into discrete contiguous bins. Assigning arranges each bin into a plurality of color bands. Establishing sets a transmissivity to each bin of each color band. Computing calculates broad-based fluxes for a reference value as a reference flux. Ratioing computes a ratio between the target flux to the library flux as a color scale for each band. Squaring determines the library flux for each band as a library flux squared. Producing sums a spectral scale over the color bands, a second multiplication of the color scale and the library flux squared as a first sum product, and sums over all the bands the library flux squared as a second sum product and dividing the sum products. Scaling factors each measured intensity of the measured intensities as a scaled intensity by multiplying each target intensity by the spectral scale for each bin. Determining sums a scaled broad-band flux for each band over the bins, a third multiplication of the transmissivity and the scaled intensity.
Abstract:
A database trigger generates a return code having the effect of inhibiting further executions of the trigger within a pre-defined scope of execution. Preferably, the pre-defined scope is a task or process executing on behalf of a particular user. Upon first encountering the applicable trigger condition, the corresponding trigger is fired normally. Internal logic within the trigger determines whether it is necessary to call the same trigger again within the same scope, and if not, generates corresponding return data. A database management system which manages the trigger and causes it to automatically fire intercepts the return data and disables further firing of the trigger for the pre-defined scope.
Abstract:
A security document that provides an indication it is a copy when copied by a photocopy machine has printed background pattern and warning printer matter interspersed with blank areas of a substrate to provide a distinct intermeshed pattern so that the warning printed matter is indistinguishable from the printed background by the human eye. The printed background comprises a number of parallel lines of a size such that they will be resolved by a photocopy machine, while the warning printed matter comprises geometric elements (typically circular dots) of a size less than that which can be resolved by a photocopy machine. The dots are disposed in a geometric continuation of at least some of the lines from the printed background, and are configured to form invalidating indicia of the document is copied by a photocopy machine. The printed background pattern and warning printed matter typically have a density of less than 20%, such as about 7-11%. The warning printed matter may be in the form of at least one outline letter configuration, in which case second lines, making an angle of about 20-70% with respect to the first lines, are provided within the outline letter configuration.
Abstract:
A key estimator estimates the number of keys over a key range defined by key endpoints in an index to a data space. The number of keys in the key range required to be processed for a particular operation is estimated as a function of the number of pages referenced during a range level limited search. Two keys defining range endpoint keys are searched down to their lowest level in the tree. The level limit is then calculated as a function of desired granularity or accuracy of the estimate. The entire range of keys in the desired key range is then searched down to the level limit and the number of pages referenced during the search is counted and multiplied by an average key density per page to calculate the number of keys in the range.
Abstract:
A process for reducing the amount of pyritic, organic and sulfate sulfur in coal and other carbonaceous materials by contacting sulfur-containing coal or carbonaceous material with hydrogen, transition metal salts and a buffer under increased temperature and pressure. Pyritic sulfides are reduced to ferrous sulfides and organic sulfides are converted to metal sulfides; the sulfides are, then, leached from the coal or carbonaceous material utilizing an acid solution. Alternatively, a metal compound may be added to the acid solution to promote the formation of hydrogen sulfide.