Abstract:
A cable assembly (1) includes an insulated housing (2) having a base portion (21) and a mating portion (22) extending forwardly from the base portion; a plurality of terminals (3) received in the insulated housing; a retainer (214) formed on the base portion, said retainer defining a cavity (215) with a rear outlet; a sensor (7) accommodated in the cavity of the retainer; and a lid member (8) covering the rear outlet of the retainer.
Abstract:
An ADC and method comprises a hybrid-type sigma-delta modulator comprising a digital delta-stage and an analog sigma-stage, wherein the analog sigma-stage comprises an analog low-pass filter adapted to only pass a low frequency audio band between 0-20 khz of a PWM wave, and wherein the digital delta-stage comprises a PWM wave generator; a pair of MOSFETs; and a power supply unit outputting voltage to the pair of MOSFETs. The ADC comprises a comparator attached to the hybrid-type sigma-delta modulator; a low-pass filter configured in a digital domain and for receiving a signal output of the comparator and remove high-frequency components of the comparator output above the audio band; a PWM back converter adapted to receive the filtered signal output and translate the digital low-pass filtered signal output to a power supply transient value in a digital format; and a dither signal source for injecting a dither signal to the digital delta-stage.
Abstract:
The present invention relates to 3,4-disubstituted coumarin and quinolone derivatives and processes for their preparation. The invention also related to methods for treating infection of Hepatitis C virus by administering a 3,4-disubstituted coumarin or quinolone derivative.
Abstract:
A system for preventing accurate disassembly of computer code. Such code masking, referred to as “obfuscation,” is useful to prevent unwanted parties from making copies of an original author's software, obtaining valuable information from the software for purposes of breaking into a program, stealing secrets, making derivative works, etc. The present invention uses assembly-language instructions so as to confuse the disassembler to produce results that are not an accurate representation of the original assembly code. In one embodiment, a method is provided where an interrupt, or software exception instruction, is used to mask several subsequent instructions. The instruction used can be any instruction that causes the disassembler to assume that one or more subsequent words, or bytes, are associated with the instruction. The method, instead, jumps directly to the bytes assumed associated with the instruction and executes those bytes for a different purpose. A preferred embodiment works with a popular Microsoft “ASM” assembler language and “DASM” disassembler. The instructions used to achieve the obfuscation include “INT” instructions. Using this approach up to 17 bytes of obfuscation can be achieved with five instructions. Each instruction remains obfuscated until executed and returns to an obfuscated state afterwards.
Abstract:
A system for preventing accurate disassembly of computer code. Such code masking, referred to as “obfuscation,” is useful to prevent unwanted parties from making copies of an original author's software, obtaining valuable information from the software for purposes of breaking into a program, stealing secrets, making derivative works, etc. The present invention uses assembly-language instructions so as to confuse the disassembler to produce results that are not an accurate representation of the original assembly code. In one embodiment, a method is provided where an interrupt, or software exception instruction, is used to mask several subsequent instructions. The instruction used can be any instruction that causes the disassembler to assume that one or more subsequent words, or bytes, are associated with the instruction. The method, instead, jumps directly to the bytes assumed associated with the instruction and executes those bytes for a different purpose. A preferred embodiment works with a popular Microsoft “ASM” assembler language and “DASM” disassembler. The instructions used to achieve the obfuscation include “INT” instructions. Using this approach up to 17 bytes of obfuscation can be achieved with five instructions. Each instruction remains obfuscated until executed and returns to an obfuscated state afterwards.
Abstract:
A system for permitting offline content playback and for managing the rights to one or more digital content files within a computer network. The system manages these rights by encrypting the content files to prevent unauthorized access to the files. Encryption is accomplished by using one or more keys which are associated with one or more segments of the content file. These keys enable an authorized user to decrypt and playback the content files at a subsequent time. When the keys are received, a license which specifies the rights of the user regarding the content files, is obtained by the end user system, and verified locally to permit the content playback.
Abstract:
This invention discloses a method for controlling inter-frequency hard handoffs by using user equipment(UE) event-triggered reporting mode in a WCDMA system, being applicable to geographical cells covered by multiple frequency points. Its main technical feature is that the radio network controller (RNC), after receiving reported results from the UE, performs the decision and execution according to the specific events. This method has the advantages of a reasonable logic and high efficiency, being able to well ensure the realization of the inter-frequency handoffs required by a WCDMA system, improved communication quality, reduced transmission power of the UE, reduced interference to other cells, and increased system capacity, etc.
Abstract:
A communications apparatus configured to communicate with a sensor network, comprising a transmitter, a receiver, a processor coupled to the transmitter and the receiver, and a memory coupled to the processor, wherein the memory comprises instructions that when executed by the processor cause the apparatus to retrieve configuration data from the memory regarding the sensor network, wherein the configuration data is preloaded on the memory at a first physical location prior to installing the apparatus at a second physical location, select a wireless communication gateway from a plurality of communication gateways in the sensor network based at least in part on the configuration data, and wirelessly transmit data to the wireless communication gateway, wherein the data comprises information indicating a sensor reading.
Abstract:
A bamboo scrimber includes a plurality of pressure-pressed bamboo strips impregnated with an adhesive and modified through heat-treatment. Each of the bamboo strips is formed with a plurality of slots penetrating through the bamboo strip substantially in a direction of thickness defined by the bamboo strip. A substantially longitudinal direction defined by the slots is substantially consistent with a substantially longitudinal direction defined by fibers of the bamboo strip.
Abstract:
The invention discloses a method (600) for use in a wireless communications system (100) in which there is at least one node (110-115) which controls the traffic to and from all user terminals (130) in a cell (120) within the system. In the system (100), use is made of the TDD principle for communication between said controlling node (110-115) and its user terminals (130), and according to the method (600), the controlling node transmits (610) a beacon signal for use as a signal quality indicator by the user terminals, said beacon signal being transmitted in a first TDD time slot (232). The user terminals (130) measure (620) the signal quality of the beacon signal and the signal quality in at least a second TDD time slot (234), and report (630) measurements of the signal qualities in both said first and second time slots to the controlling node.