Abstract:
A method of treating a subterranean formation penetrated by a wellbore comprises introducing into the subterranean formation a treatment fluid comprising encapsulated particles having a core of a crosslinking agent and a shell of a chitosan encapsulant disposed on the core; releasing the crosslinking agent from the encapsulated particles with an acid; reacting the released crosslinking agent with the chitosan encapsulant or a derivative thereof forming a polymerized chitosan; and consolidating a plurality of particles in the subterranean formation with the polymerized chitosan.
Abstract:
A subterranean screen assembly comprises a base pipe with end connections to attach to a pipe string and a portion that is perforated or slotted; and a coated screen radially outwardly disposed of the base pipe. The coated screen comprises a screen substrate and a coating disposed on a surface of the screen substrate; the coating comprising an amorphous diamond like carbon doped with about 10 to about 30 atomic percent of silicon, about 10 to about 20 atomic percent of oxygen, or a combination comprising at least one of the foregoing dopants, or a polymer comprising a fluoropolymer, a silicone, or a combination comprising at least one of the foregoing.
Abstract:
A method and system for automatically identifying optimal meeting locations. The method includes receiving a plurality of meeting parameters associated with one or more participants. The method also includes identifying a list of optimal meeting locations relevant to one or more of the plurality of meeting parameters. The method further includes ranking the list of optimal meeting locations. Further, the method includes enabling a user to select an optimal meeting location from the list of optimal meeting locations. The system includes one or more electronic devices and a user electronic device. The user electronic device includes a communication interface, a memory, and a processor.
Abstract:
A method and system for updating a background picture of a web search results page for different search queries. The method includes receiving a search query from a user and determining one or more text search results for the search query. The method also includes determining one or more images for the search query by at least one of extracting the one or more images from webpages associated with the one or more text search results, and extracting the one or more images from an image web search. Further, the method includes assembling the one or more images to create the background picture. Moreover, the method includes rendering the one or more text search results, for the search query, in the web search results page along with the background picture. The system includes one or more electronic devices, a communication interface, a memory, and a processor.
Abstract:
Several methods and systems for facilitating multimedia data encoding are disclosed. In an embodiment, a plurality of picture buffers associated with multimedia data are received in an order of capture associated with the plurality of picture buffers. Buffer information is configured for each picture buffer from among the plurality of picture buffers comprising at least one of a metadata associated with the corresponding picture buffer and one or more encoding parameters for the corresponding picture buffer. A provision of picture buffers in an order of encoding is facilitated based on the configured buffer information.
Abstract:
A hybrid counter generates a multi-bit hybrid counter value. The hybrid counter includes two or more asynchronous counters, each configured to generate a subset of the bits of the multi-bit hybrid counter value. The asynchronous counters are interconnected by a logic gate and a clock gating circuit. The logic gate generates an asynchronous logic value based on the bits generated by the previous asynchronous counters. The clock gating circuit re-times the asynchronous logic value to generate a synchronous logic value that is used to toggle the next asynchronous counter. The hybrid counter functions more accurately than conventional asynchronous counters and with less power than conventional synchronous counters.
Abstract:
The present invention provides a bio-augmentation composition for improving the hydrocarbon degradation efficiency of effluent treatment plant for hydrocarbon degradation in wastewater generated from hydrocarbon processing industry and a method thereof. The composition comprises a synergistic combination of selective microorganisms to develop a consortium enabling effective degradation of hydrocarbons present in wastewater and converting thereof into harmless and environment friendly substances. The invention also provides for the said microorganisms and their isolations.
Abstract:
Generating an optimal power cap value includes steps of: analyzing power usage of a system for a specified period of time; computing a power consumption value for the system for the specified period of time; and generating the optimal power cap value for the system, using the computed power consumption value. The system should be coupled with a power meter and should support power regulation technology.
Abstract:
A system and method for detecting whether a user account has been compromised. A server computer determines, for a client device, a first identifier associated with the client device. The server computer analyzes an activity log associated with an account of a user to determine if an eavesdropping condition has been met during a given duration. The analysis includes: 1) determining that an eavesdropping activity has occurred during the given duration and determining that no normal activity has occurred during the given duration for the first identifier; 2) determining a second identifier associated with a second device used to access the user account; and 3) determining that a normal activity associated with the second identifier has occurred during the given duration.
Abstract:
Aspects of the disclosure provide a virtual memory management method that can reduce memory requirement and improve system performance. The method can include detecting a scenario, matching the detected scenario with a predefined scenario that includes a pre-set mapping relationship of a first module to a dynamic memory address within a first portion of a dynamic memory, and writing the first module from a static memory to the first portion of the dynamic memory at the dynamic memory address. Further, the method can include executing the first module from the dynamic memory. In addition, the method can include storing a second module at a second portion of the dynamic memory independent of the detected scenario.