摘要:
A system and method for measuring streaming potential, conductivity and permeability of a porous sample, such as a plug of fibrous material, in which a test electrolytic solution, such as a neutral dilute salt solution, is flowed through a flow cell containing the sample. The test solution, and a treatment solution whose effect on the sample is to be measured, are flowed through the flow cell as a series of liquid spurts. The system includes a plurality of solenoid valves which are controlled by a computer in accordance with a software program.
摘要:
Methods and systems for processing uncalcined coke are provided. The methods and systems provide for combusting effluent gas from a refinery unit and a stream of uncalcined coke. The refinery unit effluent gas may be the offgas from a rotary kiln calciner. The refinery unit effluent gas and the uncalcined coke stream are combusted in an integrated gas/solids incinerator. Heat released during the combustion of these streams may be used to generate steam or electricity. The methods and systems disclosed provide low cost energy production at calciner effluent gas incinerator locations where uncalcined coke is available.
摘要:
Mobile clients can execute IPv6 applications in an IPv4 environment without the need for any specialized IPv6 hardware or upgrades to the network infrastructure. The architecture provides a seamless, disruption-free connectivity experience for mobile clients. Mobile clients are automatically connected to other mobile clients irrespective of their network connectively, whether wireless, wire line, IPv4, IPv6, public or private. Mobile clients communicate with other mobile clients using a secure, end-to-end IPv6 tunnel. This creates a persistent VPN connection between two clients using software.
摘要:
Mobile clients can execute IPv6 applications in an IPv4 environment without the need for any specialized IPv6 hardware or upgrades to the network infrastructure. The architecture provides a seamless, disruption-free connectivity experience for mobile clients. Mobile clients are automatically connected to other mobile clients irrespective of their network connectively, whether wireless, wire line, IPv4, IPv6, public or private. Mobile clients communicate with other mobile clients using a secure, end-to-end IPv6 tunnel. This creates a persistent VPN connection between two clients using software.
摘要:
The present invention provides network-layer authentication protocols for authenticating mobile client and access router to each other. The present invention uses Router Discovery as a carrier to implement the authentication protocols. In an embodiment of the present invention, a mobile client sends out a solicitation message to request connectivity service. The solicitation message contains a proof of identity of the mobile client. An access router that receives the solicitation message will not respond to it until the proof of the identity is verified. Only when the proof of identity of the mobile client is verified, will the access router respond and return an advertising message to the mobile client, thereby preventing unauthorized mobile clients from obtaining network access.
摘要:
Mobile clients can execute IPv6 applications in an IPv4 environment without the need for any specialized IPv6 hardware or upgrades to the network infrastructure. The architecture provides a seamless, disruption-free connectivity experience for mobile clients. Mobile clients are automatically connected to other mobile clients irrespective of their network connectively, whether wireless, wire line, IPv4, IPv6, public or private. Mobile clients communicate with other mobile clients using a secure, end-to-end IPv6 tunnel. This creates a persistent VPN connection between two clients using software.
摘要:
A document imaging and management system, including a device for imaging at least one document having at least one computer-readable identifier, a database including a plurality of rules for managing documents and tasks, a processor, software executing on the processor for reading the computer-readable identifier, software executing on the processor for routing the imaged document based on the identifier, and software executing on the processor for determining a task associated with the document based on the identifier and at least one of the plurality of rules.
摘要:
An electronic module securing assembly includes a cam lever and a latch lever. The cam lever cams the electronic module connectors in and out of their sockets. The latch clicks into a catch to secure the module in its enclosure. The latch and cam levers can be operated by the user's thumb in one motion. The latch and cam levers can be made narrow to maximize the usable space on the electronic module.
摘要:
A mobile IPv6 dual-stack node engages in IPv6 communication while roaming within an IPv4-only network, for example using ISATAP. First, the node determines that it has moved Bnd obtains a new IPv4 address. After determining that the visited network contains no IPv6-enabled components, the node uses an IPv6 connect agent to engage in IPv6 communication. The node configures its care-of address using the IPv6 connect agent's routing information and the node's newly-obtained IPv4 address. In one embodiment, the node and the connect agent optimize the handoff when the nodes has moved but still uses the same connect agent. The node sends a binding updates to the connect agents comprising the node's old care-of address and the node's new care-of address. When the connect agent receives a packet destined for the node's previous care-of address, it forwards the packet to the node's currents care-of address, thereby reducing packet loss.