Abstract:
This invention discloses compositions and method for treating various types of skin disorders, based on topical cutaneous delivery of copper chemically bound with botanical pigments. Sodium-copper-chlorophyllin is used as an example, showing benefits in the treatment of rosacea, acne, oily skin, enlarged pores, and in relieving skin inflammation. Benefits are also disclosed in treatment of environmentally caused premature skin aging, via reductions in fine facial lines and wrinkles, increased tensile strength of the skin, and increased protection against sunlight via increased production of melanin. Therapeutic outcomes are improved when the copper-pigment complex is enclosed within submicron liposomes.
Abstract:
A method of assigning transaction timestamps for use with a database that includes temporal data and may include non-temporal data. In the method, a lock is placed on a resource accessed by a first transaction to prevent conflicts with concurrently executing transactions. An access record of the lock mode and a timestamp of the first transaction is created for the resource accessed by the first transaction. The access record is accessed to determine whether a resource that a subsequent transaction accesses conflicts with the resource accessed by the first transaction. A timestamp lower bound or floor is identified for the subsequent transaction when the subsequent transaction accesses a resource that conflicts with the resource access of the first transaction. A timestamp is assigned to the subsequent transaction that is greater than the lower bound. The access record of a lock mode and a transaction timestamp may be created each time a resource is accessed, may be created for resources accessed after a request for CURRENT TIME is made, and/or may be made for resources accessed after an end time of a time interval defined by a request for CURRENT TIME.
Abstract:
Compounds of the Formula I: wherein m, n, k, A, X, Y, Z, Ar, R1, R2, R3, and R4 are as defined herein. The compounds are useful as 5-HT6 receptor antagonists. Also provided are compositions comprising, methods of using, and methods of making the subject compounds.
Abstract:
The invention provides crystalline forms of a polypeptide corresponding to the catalytic domain of Aurora kinase. The active site ATP binding pocket is defined by its amino acid residues and their atomic coordinates. This structure may be used to select or design chemical modulators of Aurora kinase, particularly Aurora inhibitors. These modulators may be used to treat diseases of cell proliferation, e.g. cancer.
Abstract:
The present invention supports pairing a transmitter and a receiver that use the same power line and power module. The transmitter associates an identification number with a command message so that a receiver can ascertain that a command message is intended for the receiver. The transmitter uses the time from the power up to the first zero crossing of the AC signal to generate a matching seed for both transmitter and receiver. The transmitter generates an identification number by incrementing a counter each incremental time interval between power up and the occurrence of the first zero crossing of the AC signal and sends the generated identification number to the paired receiver after power up but before a predetermined time interval. The receiver stores the generated identification number and compares the stored identification number with a received identification number that is received in a subsequent command message.
Abstract:
A method of processing a communication signal may include computing a number of periodograms from the signal. Each of the periodograms may be generated from a portion of the signal. The number of periodograms may be combined in time sequence to form a spectrogram [510] containing the periodograms. A cepstrogram [520–540] may be generated by performing cepstrum processing on the spectrogram. The cepstrogram may be used to classify [330] the type of communication that produced the signal.
Abstract:
When a piece of network equipment is determined to be stolen or missing, a hardware tracing tool mounted within the network detects the distinctive hardware fingerprints of the missing hardware within Internet traffic and extracts the device's IP address to trace the location of the missing equipment. As Internet messages or data packets cross through servers containing the tracing tool, the data packets are decompiled to retrieve unique identifier indicia (hardware fingerprints), such as a computer's MAC address, for example. The extracted fingerprints are then compared with fingerprints stored in a database of missing hardware using a hashing or mapping function, and the server system is alerted to a match. The IP address of the device transmitting the matching indicia is then extracted to determine the location of the missing or stolen network hardware. In this way, a method of tracing missing network hardware is provided that does not increase the cost of network equipment or unnecessarily effect network bandwidth.
Abstract:
A method, a system, an apparatus, and a computer program product are presented for facilitating the customization, translation, or localization of messages, strings, or other program resources to be used by a locale-sensitive version of a Java™ program stored in a Java™ JAR file. After opening the JAR file, text strings within a resource bundle for a first locale can be determined through a particular process for inspecting the resource bundle. A resource bundle for a second locale containing translated versions of the text strings can be created through various means and then stored into the modified JAR file.
Abstract:
A method, computer program product and data processing system for identifying non-externalized strings that are not hard-coded. In one embodiment, a method comprises the step of scanning a code, e.g., Java, line by line until a pair of string delimiters is identified. Once a pair of string delimiters is identified, the method further comprises the step of determining whether the string within the pair of string delimiters identified is a path name to a resource file, e.g., resource bundle. If the string is a path name to the resource file, then the string is a non-externalized string that is not hard-coded. If the string is not a path name to the resource file, then the string may be identified as a possible hard-coded string.
Abstract:
This invention relates to compounds which are generally muscarinic M2/M3 receptor antagonists and which are represented by Formula I: wherein X, Y, and Z are O, S or NR5, and the other substituents are as defined in the specification; and prodrugs, individual isomers, racemic or non-racemic mixtures of isomers, and pharmaceutically acceptable salts or solvates thereof. The invention further relates to pharmaceutical compositions containing such compounds and methods for their use as therapeutic agents.