摘要:
The invention concerns an intermediate layer (2) for enhancing comfort of a user wearing usual objects on or in the body. The intermediate layer comprises at least an element consisting of a heat-sensitive gel having a lower critical solution temperature (LCST). Under the influence of the user's body or skin temperature (T), the intermediate layer actively produces a constant modification of the contact point(s) between the usual object and the user's body (3).
摘要:
The invention relates to an animal shearing machine with a housing, a shearing head connected to the housing and a drive unit arranged in the housing. The drive unit comprises an electric motor and a reduction gear connected to the shaft of the electric motor. The shearing head of the animal shearing machine has a stationary shearing blade and a movable shearing blade. A planetary gear is used as reduction gear. The driven shaft of the planetary gear is arranged parallel, in particular coaxially to the shaft of the electric motor. If oscillatingly driven shearing heads are used, the drive unit comprises an eccentric connected to the driven shaft of the reduction gear and an oscillating lever. The oscillating lever is in engagement with the movable shearing blade via the first front end and with the eccentric via a sliding element in the area of the second rear end.
摘要:
In one embodiment, the present invention is a biomechanically advantageous patient transfer device. One embodiment of a patient transfer device includes a body configured for supporting a patient thereon, a plurality of flanges coupled to the body and extending outward therefrom, and a plurality of handles configured for allowing the patient transfer device to be lifted, at least one handle being formed in each flange.
摘要:
The invention concerns a bag to accommodate solid or fluid concentrate which is used to prepare dialysis fluid using a dialysis machine. The bag consists of a bag body and at least one opening, whereby the opening is sealingly surrounded by a plug component (220). In the coupled state with a second plug component (210), the plug component (220) forms a flow connection with the interior of the bag. The plug component also has coupling means (276, 278) which are suitable to be connected with a second complementary plug component (210), which is disposed on the dialysis machine. By means of the plug connector, in the coupled state, a first flow path is formed from the dialysis machine to the interior of the bag and a second flow path is formed back from the interior of the bag to the dialysis machine.
摘要:
The invention concerns a bag to accommodate solid or fluid concentrate which is used to prepare dialysis fluid using a dialysis machine. The bag consists of a bag body and at least one opening, whereby the opening is sealingly surrounded by a plug component (220). In the coupled state with a second plug component (210), the plug component (220) forms a flow connection with the interior of the bag. The plug component also has coupling means (276, 278) which are suitable to be connected with a second complementary plug component (210), which is disposed on the dialysis machine. By means of the plug connector, in the coupled state, a first flow path is formed from the dialysis machine to the interior of the bag and a second flow path is formed back from the interior of the bag to the dialysis machine.
摘要:
A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
摘要:
A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
摘要:
A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
摘要:
A method is provided for detecting intrusions to a computing environment. The method includes: monitoring system calls made to an operating system during a defined period of time; evaluating the system calls made during the defined time period in relation to system calls made during known intrusions; and evaluating the temporal sequence in which system calls were made during the defined time period when the system calls made match the system calls made during a known intrusion. If a potential intrusion is detected at this stage, then a more complicated detection scheme may be performed by a second detection scheme. For instance, the second detection scheme may assess the temporal sequence in which the system calls were made and/or the system files accessed by the system calls.