Abstract:
A monitoring tool, including an obstructor portion operatively arranged to impede fluid flow past the monitoring tool when the obstructor is engaged with a corresponding seat member. A disintegrable portion is included formed from a material operatively arranged to disintegrate upon exposure to a selected fluid. A gauge is coupled with the obstructor portion and the disintegrable portion. The gauge is operatively arranged to monitor one or more parameters and released from the obstructor portion when the disintegrable portion is disintegrated by the selected fluid. A method of monitoring one or more parameters is also included.
Abstract:
A method of packaging food items, such as cupcake type food items, into a dispenser for future consumption. The dispenser includes a hollow vessel, such as a tube, with openings at both ends. The food items are placed within the hollow vessel and a cap is placed over one end and a dispensing mechanism is placed over the opposing end. By removing the cap and actuating the dispensing mechanism, the food items are forced out of the tube for consumption.
Abstract:
Embodiments of the invention provide an impeller and a method of producing the impeller. The impeller includes a first molded piece coupled to a second molded piece. The first molded piece includes impeller vanes, a motor hub, a nose, and an eye. The second molded piece includes a cover and a hole through the cover. The cover is coupled to the impeller vanes around the motor hub so that the motor hub extends through the hole.
Abstract:
A method and system for providing efficient repair of mining equipment includes providing an electronic device having a camera, a microphone and geolocation determining hardware and software. The method includes capturing an image and sound of the mining equipment in need of repair along with the geolocation of the mining equipment, and automatically dispatching an electronic message including the captured image, sound and geolocation data to an electronic address of a service center. The automatic dispatch of the electronic message occurs without need of further action by an operator of the electronic device, and the timing of the dispatch is instantly, or when a network connection becomes available. In one embodiment of the invention the electronic device is integrated in a wearable device such as a hard hat.
Abstract:
Wastegate assemblies and turbocharger assemblies including the wastegate assemblies are described. The wastegate assemblies include a housing enclosing both an actuator and a valve. The valve is operatively coupled to the actuator and the housing terminates with a crush seal. The housing also includes a mounting member connectable to a turbocharger to place the crush seal in sealing engagement with a wastegate opening in the turbocharger. The turbocharger assemblies include a housing enclosing a turbine and a compressor wheel that are operatively coupled together on a common shaft that defines an axis of rotation, and have a wastegate assembly removably mounted to an outlet end of the housing proximate the turbine and extending therefrom in a direction away from the turbine and the compressor wheel. Here, the wastegate assembly has a longitudinal axis that is parallel to the axis of rotation.
Abstract:
A Vital Text Analytics System (VTAS), incorporating a repository of enterprise terms or concepts, is one that improves the readability and fidelity of technical specifications, instructions, training manuals requirements engineering documents and other related engineering documents, typically from a single organization or workgroup. The system stresses ontological analysis of a corpus of related documents, and applies a suite of computational tools that supports the identification and assessment of risk in evaluating the content of the documents, as well as providing statistical measures reflecting the frequency and severity of document features that threaten comprehension.
Abstract:
A requirement for a versioned resource is fulfilled, particularly in light of compatibility constraints of the requirement. Versions of the versioned resource are associated with compatibility information, such as a feature version and a service version, for example. In fulfilling the requirement, compatibility logic may be applied to identify versions that are compatible with the requirement, and selection logic may be applied to select a preferred version from the compatible versions.
Abstract:
A method of splicing a power cable used to supply electricity to down hole submersible pumps uses a pair of annular armored seal members that are slid over the ends of an insulated electrical conductor being spliced together. Each armored seal member has a plurality of O-ring seals on one end thereof and a plurality of openings in the side thereof and are used to cover and protect a crimped conductor being spliced together. The method and apparatus allow a pair of spliced electrical cables to be used in an adverse environment.
Abstract:
This invention relates to the use of ADNF polypeptides in the treatment of neurotoxicity induced by chemical agents or by disease processes. The ADNF polypeptides include ADNF I and ADNF III (also referred to as ADNP) polypeptides, analogs, subsequences such as NAP and SAL, and D-amino acid versions (either wholly D-amino acid peptides or mixed D- and L-amino acid peptides), and combinations thereof which contain their respective active core sites.
Abstract:
This invention details systems, methods, and devices for providing a two-factor graphical password system to a user so that the user may obtain access to a restricted resource. A first previously selected image (previously selected by the user) is presented to the user to enter his password by sequentially selecting predetermined areas on the first image. The user's input is used to create an encryption/decryption key which is used for communicating between a user application and a device. If the user has entered the correct password, then the device can communicate with the user application. Once the device can communicate with the user application, a second previously selected image (previously selected by the user) is presented to the user from the device. The user enters his second password and the user's input is sent to the device. The device then creates the user's alphanumeric password or another encryption key from the user's input and sends this to the user application. The user application then transmits the password or key to the system which restricts access to the restricted resource.