摘要:
The present invention provides methods for determining sequence similarity (conserved sequences) between nucleic acids from a first organism and nucleic acids from a second, different organism without having to know a priori the nucleic acid sequence from the second, different organism. The first nucleic acid can be from any organism where the sequence of the nucleic acid is known and the second nucleic acid can be from any organism. The method involves determining which bases from the second nucleic acid are identical to the first nucleic acid, and allows one to determine the sequence of portions of the second nucleic acid. The invention is useful for identifying putative functional regions or putative organism-sequences in a genome.
摘要:
Computer-implemented methods, data processing apparatus and computer program codes for characterizing an interrogation position, such as a SNP position, in a nucleic acid sequence are provided herein. Computer-implemented methods involving various statistical analyses are provided for characterizing an interrogation position as being associated with a phenotypic trait of interest.
摘要:
A method for controlling the interoperation of a plurality of software applications and resources includes intercepting communications from a first application to a second application or resource, directing the communication to a context management system, generating a candidate list of contexts for the communication, evaluating the candidate list according to at least one policy defined for these contexts to identify the resultant action and namespace for the communication, and performing the action as defined by the policies within the identified namespace. The method further includes tracking one or more versions of the second application, as well as tracking an evolution of application and/or resource names. The method further includes identifying one or more operations associated with a context on the candidate list, and executing the identified operations prior to a further communication.
摘要:
Embodiments are provided to create a virtual application or suite of virtual applications. In an embodiment, a system is configured to create a virtual package which includes information that can be used in a hosted virtual application environment. The system can provide bits of a virtual package based in part on user demand for an application or certain application functionality. In one embodiment, a system includes a sequencer component which can create a virtual package which includes information associated with setup-time and run-time changes made to a computing device. The sequencer component can use a number of extensible markup language (XML) files to create the virtual package. Other embodiments are available.
摘要:
Metal is melted in an induction-heated crucible (13) on which a mold (10) with a downward-facing filling opening (26) is located in the melting position. After melting the metal, the crucible (13) and the mold (10) are jointly rotated about a horizontal axis (A--A) into a tilting position in which the molten material flows from the crucible (13) into the mold (10). In order to melt reactive metals, melting is done in a crucible (13) that is surrounded by a vacuum, this crucible being surrounded by an induction coil (15) outside of the vacuum. The mold (10) is located in a vacuum-sealed casting chamber (6) which is evacuated together with the crucible (13) prior to melting and casting is carried out by a joint tilting of the crucible (13), casting chamber (6) and mold (10) by at least 180 degrees while the vacuum is maintained.
摘要:
A method for controlling the interoperation of a plurality of software applications and resources includes intercepting communications from a first application to a second application or resource, directing the communication to a context management system, generating a candidate list of contexts for the communication, evaluating the candidate list according to at least one policy defined for these contexts to identify the resultant action and namespace for the communication, and performing the action as defined by the policies within the identified namespace. The method further includes tracking one or more versions of the second application, as well as tracking an evolution of application and/or resource names. The method further includes identifying one or more operations associated with a context on the candidate list, and executing the identified operations prior to a further communication.
摘要:
The present invention relates to a grain buggy assembly. The grain buggy assembly includes a grain buggy and a conveyor for movably mounting to the buggy. In use, the conveyor can be moved from a retracted configuration in which the conveyor is retracted relative to the buggy to a grain loading configuration. In the grain loading configuration, the conveyor can extend from the buggy to receive grain for conveyance to the buggy. In one embodiment, the conveyor is pivotally mounted to the grain buggy.
摘要:
An extensible virtualization system provides an object model and manages a virtual application lifecycle in a way that allows new virtualization subsystems to be added to extend a virtualization product without reworking the product itself. Virtualizing an application generally involves three steps: metadata extraction, metadata storage and reconstitution, and runtime management of requests. The extensible virtualization system receives notification of an application preparation session and allows virtualization subsystems to monitor the session to collect configuration information specific to each subsystem that the application uses to run on a client. Each subsystem provides collected information to the extensible virtualization system, which stores the collected information until the application to be virtualized is deployed. When the application is deployed, the system invokes the same virtualization subsystem and provides the subsystem with the stored information.
摘要:
Disclosed are systems and methods for application streaming over HTTP. A virtual application running on a host computing device may detect the need for a page of memory that is not present on the host computing device. Accordingly, the virtual application may send a request to a virtual application server, seeking the absent memory page. The virtual application server may send to a web server an HTTP GET byte range request for the desired memory page. The web server may retrieve the requested block, which may be a portion of the virtual application image file. The requested data is returned to the host computing device via the virtual application server. The virtual application continues running on the host device using the requested data.