Abstract:
A seat back for a motor vehicle having a seat back panel that is forwardly rotated from an upright position to a generally horizontal position to enlarge the cargo carrying capacity of the vehicle by joining the trunk space rearward of the seat assembly with the seating area. The seat back panel is further equipped with an integral child seat assembly containing a restraint means for a child seat occupant including at least one belt attached to the vehicle structure rearward of the seat back at the upper end thereof. The belt is releasably attached to the vehicle structure and, to avoid use of the child seat assembly with the belt released from the vehicle structure, a lock-out mechanism is provided to prevent return of the seat back panel to its upright use position without first resecuring the belt to the vehicle structure.
Abstract:
The present invention provides a locking assembly for locking in place an upper support plate above a nuclear fuel bundle. The locking assembly includes several different components, including one rotatable member that is movable between a first position for locking the support plate in place and an unlocked position for releasing the support plate so that it can be removed from the guide tubes in the fuel bundle assembly. The rotatable member is resiliently maintained at its locked and released positions, and the entire locking assembly is an integral unit without any loose parts regardless of the position of the rotatable member.
Abstract:
An engineered lighting system for high speed video inspection includes an array of light emitting diodes including light emitting diodes for use in time delay integration (TDI) inspection of web materials. The light emitting diodes of the array are selectively controllable to accomplish sequential illumination and carefully controllable imaging of a specified section of a continuously moving specimen or specimens. The system also includes an array of optional backlighting elements to aid in illumination of semi-opaque specimens to accomplish inspection thereof.
Abstract:
An engineered lighting system for use in an inspection system is comprised of an array of light emitting diodes. A specimen is brought into the viewing area, and a current pulse is provided to the diodes of the array to selectively flash all or a portion of the diodes of the array. Reflected light from the specimen is sensed and a digitized image is generated therefrom. An illumination level of the digitized image is adjustable, in whole or in part, by varying the effective lighting intensity of one or more of the diodes of the array during a flash period. The digitized image of the specimen is compared to data indicative of acceptability of the specimen, and acceptance or rejection of the specimen is decided on a basis of a comparison therebetween.
Abstract:
A method is disclosed whereby individual members of a group of members or entities may be provided, under the control of a trusted member, referred to as the parent, with respective individual secret keys for use in public key cryptography, such that the matching public key can be readily derived, and group membership authenticated. The parent initially establishes a public key (e,N) where N=P.Q is the product of two primes. In response to a request from a group member, the parent selects two further primes R,S and communicates two values dependent thereon to the requesting member, which selects two more primes T and U for use in conjunction with the received values to establish the member's secret key.
Abstract:
An entity such as a smart card includes microprocessor means, input/output means, and PROM storage means which stores a set of transformations S.sub.i (i=1, . . . , n) of a corresponding set of public factors F.sub.1 (i=1, . . . , n), where S.sub.i =F.sub.i.sup.d (mod N), d being the secret key counterpart of a public key e associated with the modulus N, which is the product of two primes. An authentication device which stores the public factors F.sub.i and the values of N and e, generates an n bit random vector v=v.sub.i which is transmitted to the card where a product Y of the values S.sub.i selected according to the 1 bits of v is computed and transmitted to the authentication device which computes X.sub.act =Y.sup.e (mod N) and also computes X.sub.ref, the product of the F.sub.i selected according to the 1 bits of v. If X.sub.act and X.sub.ref are equal, then the card is authenticated to within a certain probability. An analogous method is disclosed for certifying messages to be transmitted. In further embodiments, a higher degree of security is achieved by arranging for the entity being authenticated, or the certifying entity, to select an additional secret factor or plurality of secret factors.
Abstract:
Wound healing compositions and formulations containing same are described, as well as the use of such compositions and formulations. The compositions are finely divided cephalopod skeletons, particularly those from cuttlefish and squid. The formulations include such compositions in a compatible carrier.
Abstract:
A method for controlling the anomer ratio in alkyl glycosides of amino sugars produced by heating an N-acylamino sugar with an alcohol in the presence of an acidic catalyst comprising the continuous removal of byproduct water from the reaction zone.
Abstract:
New compositions of matter comprising complexes of chitin with lower molecular weight alcohols, aldehydes and ketones have been discovered. These complexes are useful in the solution and purification of chitin and in the preparation of modified chitins for fibers, films and plastics, and for pharmaceutical purposes.