Abstract:
An electric motor has an end cap assembly comprising: a base and a cover. The base has a first chamber configured to receive a commutator, a second chamber configured to receive electronic components, and brush boxes having passages configured to receive brushes. The first chamber and the second chamber are respectively formed on opposite sides of the base. The passages of the brush boxes open into the first chamber to allow the brushes to slidably contact a commutator disposed therein. The cover is fixed to the base and covers the second chamber.
Abstract:
Systems, methods, and apparatus are provided for vulnerability signature based Network Intrusion Detection and/or Prevention which achieves high throughput comparable to that of the state-of-the-art regex-based systems while offering improved accuracy. A candidate selection algorithm efficiently matches thousands of vulnerability signatures simultaneously using a small amount of memory. A parsing transition state machine achieves fast protocol parsing. Certain examples provide a computer-implemented method for network intrusion detection. The method includes capturing a data message and invoking a protocol parser to parse the data message. The method also includes matching the parsed data message against a plurality of vulnerability signatures in parallel using a candidate selection algorithm and detecting an unwanted network intrusion based on an outcome of the matching.
Abstract:
A digital to analog converter for converting a digital input signal provided by a host to an analog output signal includes a modulator receiving the digital input signal, modulating the digital input signal, and outputting a modulated signal, and a filtering circuit receiving the modulated signal, low pass filtering the modulated signal, and outputting the analog output signal to an output node. The filtering circuit includes a first switching circuit for adjusting the bandwidth of the filtering circuit according to a bandwidth switching signal.
Abstract:
A flaw scan system for detecting a location of first and second types of location specific anomalies on a storage disk of a hard disk drive comprising a write system, a read system, and first and second anomaly location systems. The write system writes a first set of bits to the storage disk in first and second data patterns. The read system reads the first set of bits from the storage disk. The first anomaly location system determines locations of the first type of location specific anomaly based on the first data pattern. The second anomaly location system determines locations of the second type of location specific anomaly based on the second data pattern.
Abstract:
An apparatus is used for testing an embedded device with identification information. The apparatus includes a storage device. A monitoring program and a testing program are installed in the storage device. The monitoring program receives the identification information from the embedded device through a serial connection formed between the apparatus and the embedded device after logging in to the embedded device through the serial connection. The testing program is copied to the embedded device to test the embedded device by the monitoring program through a network connection formed between the apparatus and the embedded device. A system and a method for testing the embedded device are also provided.
Abstract:
A communication system, an intelligent peripheral, a charging method, a service control point, and a service switching point are provided. The communication system includes a service switching point, a service control point and an intelligent peripheral. The service control point is adapted for sending an operation characteristic parameter identifying whether to charge for a service to the intelligent peripheral; the intelligent peripheral is adapted for judging whether to request the service switching point to charge for the service according to the operation characteristic parameter identifying whether to charge for the service, and instructing the intelligent peripheral not to send an answer charging message to the service switching point if a result of the judging is negative. Accurate and efficient charging is achieved in various situations of intelligent peripheral resource utilization in an intelligent network.
Abstract:
A testing device is provided to include a pre-boot execution environment (PXE) server, a dynamic host configuration protocol (DHCP) server, and a computer. The computer is connected to the PXE server and the DHCP server via a network. The PXE server includes an image file stored therein, a communicating module of server terminal and a communicating module of client terminal. The computer includes a network device for supporting PXE functions. A testing method is provided to include following steps: connecting the PXE server and the DHCP server to the computer via the network, the DHCP server assigning an IP address to the computer, the computer downloading the communicating module of client terminal from the PXE server, for communicating with the communicating module of server terminal, and the image file being run to test the computer.
Abstract:
The invention provides a family of proteins named PIAS which function as specific inhibitors of STAT proteins. Methods of using PIAS molecules are also provided to regulate STAT proteins.
Abstract:
Disclosed are embodiments of systems and methods to generate background and foreground images for a document, which enables high-quality and high-ratio document compression. In embodiments, high-accuracy layer processing enables text enhancement, paper color removal, and many other advanced image analysis and processing. Embodiments of the systems support several operation modes and its many parameters, such as layer compression ratios, image segmentation, and modulized image processing, may be adjusted to generate optimal compressed files for different purposes.