Abstract:
Various arrangements for remotely manipulating a wire may be presented. A wire pilot may be presented that is configured to be coupled with the wire and to move in response to a magnetic field created by a remote guide when the wire pilot is within a wall and the remote guide is external to the wall. The remote guide may include a magnetic field generator configured to create the magnetic field and a metal detector configured to detect wires through a wall.
Abstract:
Various arrangements for remotely manipulating a wire may be presented. A wire pilot may be presented that is configured to be coupled with the wire and to move in response to a magnetic field created by a remote guide when the wire pilot is within a wall and the remote guide is external to the wall. The remote guide may include a magnetic field generator configured to create the magnetic field and a metal detector configured to detect wires through a wall.
Abstract:
A M-bridge class-D audio amplifier for portable applications and a method of driving a three-wire audio output device comprises a stereo signal source producing first and second input stereo digital signals; circuitry adapted to receive the first and second input stereo digital signals and produce three stereo signals comprising a first, second, and third digital signal, wherein the three stereo signals generate PWM waves comprising a first, second, and third digital signal PWM wave; exactly three pairs of MOSFETs driven by the first, second, and third digital signal PWM waves respectively; and a three-wire speaker system comprising a first wire driven by the first digital signal PWM wave through the first pair of MOSFETs; a second wire driven by the second digital signal PWM wave through the second pair of MOSFETs; and a common wire driven by the third digital signal PWM wave through the third pair of MOSFETs.
Abstract:
The present invention relates to 3,4-disubstituted coumarin and quinolone derivatives and processes for their preparation. The invention also related to methods for treating infection of Hepatitis C virus by administering a 3,4-disubstituted coumarin or quinolone derivative.
Abstract:
A thermal power generation apparatus comprises a boiler (15) and multiple turbine sets for high, intermediate and lower steam pressure operation. Steam exhausted from the high pressure turbine (HP), and reduced in both pressure and temperature, is returned to a reheater (19) for reheating. The reheated steam is then passed to a intermediate pressure turbine (IP). It is desirable to control the temperature of steam entering the intermediate pressure turbine (IP). The invention provides a system for effecting temperature control of the reheater stream in a thermal power plant. The system includes a reheater conduit (10, 21) adapted to define at least a part of a reheat flow path for steam between an exhaust of a high pressure turbine system (HP) and an inlet of a reheater system (19). The system further includes an indirect water/steam heat exchanger (B) having a heat exchange portion within the reheat flow path and defining a water flow path means adapted to receive and circulate feed water. The feed water may be taken from take off points (A, D) in the primary feed water stream.
Abstract:
The present invention relates to a composite container floorboard having a structural strand-based board as the core material and its fabrication method thereof. It is characterized wherein the composite container floorboard, using a structural strand-based board as a core material, comprises 2 to 4 layers of wooden veneers coated or impregnated with resin, respectively, on a top and a bottom of the surface overlay materials; or comprises one piece of impregnated paper, one piece of resin-impregnated bamboo-woven mat, and 1 to 3 pieces of double-side resin-coated or resin-impregnated wooden veneers, respectively, from an exterior to an interior of the surface overlay materials; or comprises one Keruing or Apitong wooden veneer of Southeast Asia, or other wooden veneer with similar properties and 1 to 3 pieces of double-side resin-coated or resin-impregnated wooden veneers [or partially or entirely replacing wooden veneer(s) with resin-impregnated bamboo curtain(s) or bamboo-woven mat(s)], respectively, from an exterior to an interior of the surface overlay materials.
Abstract:
An ADC and method comprises a hybrid-type sigma-delta modulator comprising a digital delta-stage and an analog sigma-stage, wherein the analog sigma-stage comprises an analog low-pass filter adapted to only pass a low frequency audio band between 0-20 khz of a PWM wave, and wherein the digital delta-stage comprises a PWM wave generator; a pair of MOSFETs; and a power supply unit outputting voltage to the pair of MOSFETs. The ADC comprises a comparator attached to the hybrid-type sigma-delta modulator; a low-pass filter configured in a digital domain and for receiving a signal output of the comparator and remove high-frequency components of the comparator output above the audio band; a PWM back converter adapted to receive the filtered signal output and translate the digital low-pass filtered signal output to a power supply transient value in a digital format; and a dither signal source for injecting a dither signal to the digital delta-stage.
Abstract:
The present invention relates to 3,4-disubstituted coumarin and quinolone derivatives and processes for their preparation. The invention also related to methods for treating infection of Hepatitis C virus by administering a 3,4-disubstituted coumarin or quinolone derivative.
Abstract:
A system for preventing accurate disassembly of computer code. Such code masking, referred to as “obfuscation,” is useful to prevent unwanted parties from making copies of an original author's software, obtaining valuable information from the software for purposes of breaking into a program, stealing secrets, making derivative works, etc. The present invention uses assembly-language instructions so as to confuse the disassembler to produce results that are not an accurate representation of the original assembly code. In one embodiment, a method is provided where an interrupt, or software exception instruction, is used to mask several subsequent instructions. The instruction used can be any instruction that causes the disassembler to assume that one or more subsequent words, or bytes, are associated with the instruction. The method, instead, jumps directly to the bytes assumed associated with the instruction and executes those bytes for a different purpose. A preferred embodiment works with a popular Microsoft “ASM” assembler language and “DASM” disassembler. The instructions used to achieve the obfuscation include “INT” instructions. Using this approach up to 17 bytes of obfuscation can be achieved with five instructions. Each instruction remains obfuscated until executed and returns to an obfuscated state afterwards.
Abstract:
A system for preventing accurate disassembly of computer code. Such code masking, referred to as “obfuscation,” is useful to prevent unwanted parties from making copies of an original author's software, obtaining valuable information from the software for purposes of breaking into a program, stealing secrets, making derivative works, etc. The present invention uses assembly-language instructions so as to confuse the disassembler to produce results that are not an accurate representation of the original assembly code. In one embodiment, a method is provided where an interrupt, or software exception instruction, is used to mask several subsequent instructions. The instruction used can be any instruction that causes the disassembler to assume that one or more subsequent words, or bytes, are associated with the instruction. The method, instead, jumps directly to the bytes assumed associated with the instruction and executes those bytes for a different purpose. A preferred embodiment works with a popular Microsoft “ASM” assembler language and “DASM” disassembler. The instructions used to achieve the obfuscation include “INT” instructions. Using this approach up to 17 bytes of obfuscation can be achieved with five instructions. Each instruction remains obfuscated until executed and returns to an obfuscated state afterwards.