Abstract:
In semiconductor manufacturing, there are wafer fabrication processes in cluster tools that need a wafer to visit some processing steps for more than once, leading to a revisiting process. Also, wafers may be subject to wafer residency time constraints. By considering atomic layer deposition (ALD) as a typical wafer revisiting process, this invention studies the challenging scheduling problem of single-arm cluster tools for the ALD process with wafer residency time constraints. By recognizing that the key to this problem is to schedule the robot tasks, the present invention presents different robot task sequencing strategies. With these strategies for different cases, the present invention performs the schedulability analysis and derives the schedulability conditions for such tools for the first time. If schedulable, the present invention proposes scheduling algorithms to obtain an optimal schedule efficiently. Illustrative examples are given to show the application of the proposed concepts and approach.
Abstract:
The present invention discloses a method of treating Gefitinib-resistant non-small-cell lung cancer, comprising administering an effective amount of an alkaloid. A pharmaceutical composition comprising an alkaloid admixed with a pharmaceutical carrier for treating Gefitinib-resistant non-small-cell lung cancer is also disclosed therein.
Abstract:
A method of detecting an internet attack against a computing device is disclosed. The method of detecting an internet attack against a computing device comprising the steps of receiving a plurality of incoming network packets; extracting a plurality of incoming feature packets based on the plurality of incoming network packets; predicting a predicted incoming feature packet based on the plurality of incoming feature packets; obtaining a first classification data based on one of the incoming feature packets using a first classifier; obtaining a second classification data based on the predicted incoming feature packet by using a second classifier; and performing at least one remedy action if the first classification data or the second classification data identifies the internet intrusion attack; wherein each of the plurality of incoming feature packets and the predicted incoming feature packet comprise a plurality of incoming features and a plurality of predicted features respectively.
Abstract:
A method for a copy-paste tampered image detection, including: extracting, using a scale-invariant feature transformation algorithm, key points of an image and features corresponding to the key points; constructing, using a gradient hash matching algorithm, a hash table based on the features, and putting the key points into rows corresponding to serial numbers of the hash table; performing a matching operation, using a k-nearest neighbor algorithm, on the key points in each row of the hash table to obtain key point pairs; and clustering and grouping, using a distance clustering filtering algorithm, the key point pairs, and retaining the key point pairs in a cluster group whose number of the key point pairs is greater than a quantity threshold; and marking circles in the image with each key point, in the key point pairs that are retained, as a center and according to a specified radius.
Abstract:
The present disclosure relates to a method and system for multi-source algae image target detection, and relates to the field of monitoring of algal bloom events in fresh water. The method includes first crawling images of algae of a selected species by using a built automated algae crawling tool, where the images include all formats; classifying and labeling algae in the algae images, and forming a source domain dataset by using all the classified and labeled algae images; performing transfer learning by using a faster recurrent revolutional neural network (Faster RCNN) with reference to a target domain dataset, to obtain a multi-source algae image target detection model; and finally performing identification and classification by using the multi-source algae image target detection model.
Abstract:
A method for treating cancer by using an agent which is capable of inhibiting the functionality of the MCM complex, a heterohexameric ring formed from six subunits, in the process of DNA replication and a method of screening for such agents by detecting the locations and functions of the MCM subunits, such as hMcm2 and hMcm6, in cells treated with candidate compounds.
Abstract:
This invention discloses a medicinal composition includes a non-coding RNA molecule and an antibody targeting a tumor antigen for preventing and/or treating cancer. This invention uses the synergistic combination of a non-coding RNA molecule or its functional variant or homologue, and an antibody targeting a tumor antigen to prevent and/or treat cancer, thereby providing a novel and effective method in preventing and/or treating various cancers.
Abstract:
A system and method for scheduling at least one event includes a component module arranged to receive component data regarding a plurality of possible operation decisions, a modelling module arranged to utilise the plurality of operation decisions to construct a Petri net model to simulate a real world system, a scheduling module arranged to utilise the Petri net and variable data regarding the plurality of operation decisions to determine a schedule of events that is feasible subject to a set of predetermined constraints, and an operation module arranged to provide the schedule of events to at least one external device.
Abstract:
A method of treating a subject suffering from cancer comprising a step of administering an effective amount of a group of double-stranded RNA molecules to the subject, wherein the RNA molecule is isolated or derived from a bacteria of the genus Escherichia. A method of inhibiting growth or proliferation of cancer cells comprising a step of contacting said cells with said RNA molecule; and a pharmaceutical composition for treating cancer comprising said RNA molecule and a pharmaceutically tolerable excipient. Also a double-stranded RNA molecule and a recombinant vector comprising the double-stranded RNA molecule.
Abstract:
A method executed by a computer system that transmits a multimedia content through a negative-base number. The method includes generating a binary sequence for the multimedia content, converting the binary sequence into a negative-base number, receiving the negative-base number, retrieving a negative base of the negative base number, calculating the binary sequence based on the negative-base number and the negative base, and obtaining the multimedia content based on the binary sequence.