摘要:
The method of the present invention is useful in a computer system executing a Java application and a hierarchical database. The program executes a method for providing data access from the Java application to the hierarchical database. The method includes the steps of determining JDBC type, Java class name, and metadata values for the Java application to represent a given column in a result set on the hierarchical database. Next, there is a closing of all embedded result sets for the column.
摘要:
A current source using a bandgap voltage circuit includes a current gain circuit between the output of the bandgap circuit and the current output transistor. On-off control is provided by a switchable bias circuit providing an ON potential to start the bandgap and a clamping circuit opening the feedback loop.
摘要:
A method for making an electrically programmable and erasable memory cell is disclosed. Specifically, a method for creating a floating gate using shallow trench isolation-type techniques is utilized to provide a floating gate having sharply defined tip characteristics. A first insulating layer is formed over a substrate. A conductive material is formed over the first insulating layer. A trench is defined in the conductive layer. This trench is filled with an oxide which is used as a mask to define tips of the floating gate during an etching process which defines the edges of the floating gate. After the floating gate has been etched, a tunneling oxide deposited over the floating gate. A conductive material is then formed over the tunneling oxide.
摘要:
A mixer circuit is described having three transistors connected in series across the supply rails. Two of the transistors carry signals, and these are arranged to be close to but not in saturation so that the circuit can operate with very low supply voltages.
摘要:
A method and apparatus for using a hashing function to store data in a cache memory. Briefly, a method and apparatus is provided for using a hashing function to store data in a cache memory where the hashing function used is changed periodically. In one embodiment, the cache memory stores the data, an indicator of the hashing function used and the index value generated by the hashing function used. To retrieve data from the cache memory, the current hashing function is used to generate an index for the incoming data. The data at the index is checked to determine whether the stored data matches the incoming data. If the data at the index generated by the current hashing function does not match the incoming data, previous hashing functions are used to repeat the search.
摘要:
A human &mgr; opiate receptor cDNA has been identified from a cerebral cortical CDNA library using sequences from the rat &mgr; opiate receptor CDNA. The human &mgr; opiate receptor (h&mgr;OR1) shares 95% amino acid identity with the rat sequence. The expressed &mgr;OR1 recognizes tested opiate drugs and opioid peptides in a sodium- and GTP-sensitive fashion with affinities virtually identical to those displayed by the rat &mgr; opiate receptor. Effects on cyclic AMP are similar to those noted for the rat &mgr; opiate receptor. Overlapping genomic clones spanning 50 kilobasepairs and hybridizing with the h&mgr;OR1 cDNA contains exon sequences encoding the entire open reading frame of the human A opiate receptor are described. Analysis of hybridization to DNA prepared from human rodent hybrid cell lines and chromosomal in situ hybridization studies indicate localization to 6q24-25. An MspI polymorphism, producing a 3.7 kb band, is being used to assess this gene's involvement in neuropsychiatric disorders involving opiatergic systems.
摘要:
2-amino-N-(1,2-diphenyl-1-methylethyl) acetamide (remacemide) or a phamaceutically acceptable salt thereof, and L-dopa, are useful in conjunction with one another in the treatment of Parkinson's disease. Pharmaceutical products and formulations comprising these active agents are provided.
摘要:
Methods for forming and incorporating microparticles containing one or more active agents into adhesives are described. The methods involve spray drying a liquid of the one or more active agents and obtaining the active agent in a particulate form. The dry powder is then blended or otherwise incorporated with the adhesive of interest. Also described are various medical products utilizing the adhesive and one or more active agents in microparticle form, and related methods of use.
摘要:
Certain chemical entities are provided herein. Also provided are pharmaceutical compositions comprising at least one chemical entity and one or more pharmaceutically acceptable vehicle. Methods of treating patients suffering from certain diseases and disorders responsive to the inhibition of KMO activity are described, which comprise administering to such patients an amount of at least one chemical entity effective to reduce signs or symptoms of the disease or disorder are disclosed. These diseases include neurodegenerative disorders such as Huntington's disease. Also described are methods of treatment include administering at least one chemical entity as a single active agent or administering at least one chemical entity in combination with one or more other therapeutic agents. Also provided are methods for screening compounds capable of inhibiting KMO activity.
摘要:
Systems and methods for implementing an identity assertion framework to authenticate a user in a federation of security domains are provided. A first security token service (STS) is configured to receive a request for a first token from a consumer and to issue the first token to the consumer. The first STS is associated with a first security domain, and the first token is issued according to a first issuing policy of the first security domain. A service provider within a second security domain receives the first token and makes a determination whether the first token is invalid in the second security domain. A second STS receives the first token from the service provider, determines that the first token was issued by the first STS, and validates the first token according to a federation policy between the first security domain and the second security domain.