Abstract:
A radio frequency sclerotherapy system includes a needle assembly with a thin (26 to 32 gauge) solid conductive needle, about 1.25 inches long. A multilayer coating is applied over a proximal portion of the needle leaving an uncoated distal tip, about 0.10 inches long, exposed. The multilayer coating is an electric and thermal insulator. An electrical plug electrically coupled to the proximal end of the wire. The multilayer coating provides a palpable transition. A generator supplies voltages in the range of 300V to −100V, at frequencies of 1 MHz to 50 MHz, with voltage spikes having a time from rise to fall of up to 100 nS and a low voltage between voltage spikes for about twice the duration of the time from rise to fall of the voltage spikes.
Abstract:
A wireless mobile router (140) includes wireless network interfaces (202) and (218) attached to a network controller (142). The wireless network interface (202) communicates with a cellular network (110) to access cellular network services. The wireless network interface (218) and the network controller (142) comprise a WLAN (170) or PAN (180) and a network router hosting a plurality of client devices. Each client device may access a wide area network, WAN over the cellular network. The wireless mobile router (140) is configured to exchange various cellular network signals with various WLAN and PAN networks. The wireless mobile router (140) is particularly suitable for use in a vehicle or at locations where WAN access is not readily available.
Abstract:
The present invention relates generally to therapeutic molecules useful for inducing apoptosis of particular cells such as, but not limited to, cancer cells and methods for generating and/or selecting same. The present invention further provides methods for inducing apoptosis of cells such as cancer cells and pharmaceutical compositions useful for same. The present invention further provides methods for generating or selecting therapeutic agents capable of inducing apoptosis of particular cells by the selective inhibition of pro-survival proteins. The present invention further provides a computational approach to therapeutic molecule design based on structure-binding characteristics.
Abstract:
A remote download of microprocessor code for an irrigation controller is provided. A microprocessor, on an irrigation controller, is executing program code (in volatile memory) and receives a remote download of updated program code, which it stores into non-volatile random access memory, e.g., flash memory. The microprocessor is configured to receive the updated program code, via a communication port, and to store the updated program code into the non-volatile flash memory. Optionally, the updated program code is received at multiple controllers via a global transmission on a communication bus. The microprocessor receives a communication causing it to re-start. In response to the re-start communication, the microprocessor fetches the updated program code stored in the non-volatile flash memory into the program memory RAM to replace the original program code, and begins execution of the updated program code in the program memory RAM. A device is also provided for directing the download of program code to irrigation controllers. Options provide for global download of entirely new program code, global and/or individual download of particular pages of updated program code, and global downloads to controllers grouped by communication speed.
Abstract:
A controller (301), for example on a field interface of a resource management system (300), determines a location of a mobile object (303a, 303b, 303c) and controls an environment thereof. The controller (301) receives, via a first transceiver (307), a communication including information representative of the mobile object; receives a command via a second transceiver (317) and controls the environment outside of the mobile object responsive to the command and/or the communication. A controller, for example on the mobile object (303a, 303b, 303c), detects a location of the mobile object (303a, 303b, 303c) via device (305a, 305b, 305c). The controller collects information about the mobile object including location; transmits, to a controller via its transceiver, a communication including the information; receives a command via its transceiver; and controls operation of the mobile object responsive to the command.
Abstract:
A system and method for operating a distributed control network for irrigation management. The system incorporates several irrigation controllers wherein each of the controllers can transmit, receive and respond to commands initiated by any device or satellite controller on the network, a communication bus that is connected to the controllers, a central computer that is connected to the bus, several sensing devices that are connected to each controller, and several sprinkler valves that are connected to each controller. The controllers can be operated in local mode via a user interface and in a remote mode via a wireless connection. The controllers are capable of monitoring and acknowledging the commands that are transmitted on the bus.
Abstract:
A method, computer program product, and system for directly accessing URL data object requests in a proxy server array. A URL data object request is generated by an enabled client to request a URL data object that resides in the local cache of proxy server in an array of proxy servers configured as a distributed cache. The enabled client will deterministically identify the residing proxy server based on information residing thereon without resorting to expensive query-response transactions, such as those that occur in proxy server arrays using ICP, or routing the URL data object request through different proxy servers of the array. An array membership list containing array membership information is available at each and every proxy server as well as all enabled clients. This list is used in conjunction with the URL as the information for identifying the correct proxy server where the URL data object resides. First, a deterministic hash value is computed for each proxy server name and the URL. Next, a combined hash value is computed that combines the URL hash value with each proxy server hash value. Finally, the proxy server with the highest “score” or combined hash value is identified as the proxy server where the desired URL data object should reside in local cache storage. Since the array membership list, the URL, and the hashing algorithm are the same at all enabled clients, the same proxy server will be identified as having the URL data object regardless of which enabled client generated the URL data object request.
Abstract:
An enclosure for housing electronic controls and devices that provides exceptional access to all sides of the enclosure and is both secure and aesthetically pleasing. The enclosure has a frame, semi-cylindrical doors, a top assembly, and a mounting base. Each of the doors has a door retaining member on its inner lower surfaces which engages and is supported by a receiving member mounted to a lower portion of the frame. The doors may be pivoted open and closed about the retaining and receiving members or may be completely removed from the base by simply lifting the doors off of the frame. Removal of the doors allows unobstructed access to the interior of the enclosure. The top assembly mounts on top of the frame and moves between a closed position and an open position. The top assembly includes a rim which overlaps and engages the top surfaces of the doors to securely retain the doors in the closed position. An opening and closing system mounted on the frame supports the top assembly in the open position. The enclosure is further provided with a lock to secure the top and doors in the closed position and prevent tampering by unauthorized persons.
Abstract:
Just in time compiled code and other data within a runtime environment may be shared between multiple applications by identifying common data objects and allowing two or more applications to access the data objects. While at least one application is accessing the objects, the objects may remain in memory. When all applications have stopped accessing an object, the object may be removed from memory. One embodiment may use a server process to manage various operations to facilitate sharing between various applications, such as identifying objects that may be removed from memory and adding newly created data to a database of sharable data.