Abstract:
A container for a smokeless tobacco product is provided. A container for smokeless tobacco comprises a lid and a corresponding bottom piece having an outside wall and at least one dividing wall extending between opposite sides of the outside wall and dividing the bottom piece into a plurality of compartments. A seal is removably positioned over each compartment.
Abstract:
An assembled container for smoking articles includes an outer sleeve that includes a front wall, a rear wall, a right side wall, and a left side wall. Packets of cigarettes are positioned within the outer sleeve. For example, two packets, each containing ten cigarettes, are positioned within the outer sleeve. The packets, and the outer sleeve, include mechanisms that interact during movement of the individual packets within the outer sleeve. As such, a portion of each packet is maintained within the outer sleeve during conditions of normal use.
Abstract:
An assembled container for smoking articles includes an outer sleeve that includes a front wall, a rear wall, a right side wall, and a left side wall. Packets of cigarettes are positioned within the outer sleeve. For example, two packets, each containing ten cigarettes, are positioned within the outer sleeve. The packets, and the outer sleeve, include mechanisms that interact during movement of the individual packets within the outer sleeve. As such, a portion of each packet is maintained within the outer sleeve during conditions of normal use.
Abstract:
An endoscopically introducible expandable cautery device having a probe slidably received in a tube. The probe has a cauterizing end terminating in a balloon which is expandable upon inflation with fluid supplied through a first lumen in communication with a source of fluid such as a syringe. The surface of the balloon has at least one electrical contact that provides a cautery effect when in contact with tissue to be treated. The balloon is inflatable to a size larger than the bore of an endoscope though which it may be introduced.
Abstract:
The disclosure provides oral products, the oral products including a fleece material that includes fibers and a releasable component. In some embodiments, oral products as described herein may be in the form of a pouchless product including a fleece material having a releasable component associated therewith, or in the form of a pouched product including a fleece material having a releasable component associated therewith in the form of a pouch, containing a substrate material therein.
Abstract:
A key engine that performs route lookups for a plurality of keys may include a data processing portion configured to process one data item at a time and to request data when needed. A buffer may be configured to store a partial result from the data processing portion. A controller may be configured to load the partial result from the data processing portion into the buffer. The controller also may be configured to input another data item into the data processing portion for processing while requested data is obtained for a prior data item. A number of these key engines may be used by a routing unit to perform a large number of route lookups at the same time.
Abstract:
A bit coding method modifies the bit-steam information in such a way as to provide a very high compression during lossless symbol coding and may be used as a preprocessor for Huffman and arithmetic encodings or on its own. A bit rearrangement scheme (BRS) improves the run length within a data symbol set and achieves a more efficient data-to-symbol mapping. The BRS is implemented on the data symbol set in a column-by-column fashion. The BRS can be combined with any available lossless coding scheme, providing for a more efficient lossless bit coding scheme (ALBCS).
Abstract:
In many instances it is necessary to store and transfer information and data on a temporary basis. Typically this information and data is transient but is vulnerable to capture and piracy as it is not in an encrypted state. Therefore a unique method is disclosed that performs randomized scrambling of unprotected digital information that make it unreadable, or otherwise unusable, without the appropriate descrambling. In order to be effective and secure the method requires a large population of scrambling patterns, or codes, and assigns them index numbers. Scrambling patterns are randomly chosen for use in the scrambling of the information and data. Unique schemes for developing this large population of patterns and choosing at random the usable set at each interval or usage. In particular the method is useful in the protection of digital content.