Abstract:
A sectional computer housing includes a plurality of frame posts and a plurality of sectional panels molded using aluminum extrusion. Each of the frame posts is provided with a screw groove at one side thereof and a track at two adjacent sides to the side having the screw groove, respectively. Each of the sectional panel having a turtledove tail-shaped protruding seat at one end thereof and a track at the other end thereof. A plurality of sectional panels is similarly fastened to one another using the protruding seats and the tracks at one side thereof for forming side, top or bottom panels. Outermost protruding seats and the tracks are coordinated with the tracks of the frame posts, and further positioned by longitudinally penetrating screws through the sectional panels and into the screw grooves of the frame posts, thereby assembling into a computer housing having any desired dimensions.
Abstract:
Systems and methods for sharing content over a collection of social networks are disclosed. In one embodiment, a system comprises a first social network, a second social network, and at least one sharing table. The at least one sharing table is configured to share a first content from the first social network with the second social network.
Abstract:
Embodiments are described in terms of selective methods of sealing separators and jellyroll electrode assemblies and cells made using such methods. More particularly, methods of selectively heat sealing separators to encapsulate one of two electrodes for nickel-zinc rechargeable cells having jellyroll assemblies are described. Selective heat sealing may be applied to both ends of a jellyroll electrode assembly in order to selectively seal one of two electrodes on each end of the jellyroll.
Abstract:
A method to crop image from an irregularly shaped region. A top-left corner of the best cropping rectangle are determined by sequentially scanning the rows of the irregularly shaped region to find out the largest bounding area. By rolling back the largest bonding area from the x or y direction, the bottom-right corner is determined.
Abstract:
A fluid consuming battery (10) is provided with a fluid regulating system (50) for regulating fluid entry into the battery. The battery (10) includes a fluid consuming cell (20) having a cell housing with fluid entry ports for the passage of a fluid into the cell housing. A first fluid consuming electrode and a second electrode are disposed within the cell housing. The fluid regulating system (50) includes a valve having a moving plate (66) disposed adjacent to a fixed plate (62). The moving plate and fixed plate both have fluid entry ports (68, 64) that align in an open valve position and are misaligned in a closed valve position. The fluid regulating system (50) also includes an actuator that may include one or more shape memory alloy (SMA) components (82a, 82b) for moving the moving plate (66) relative to the fixed plate (62) to open and close the valve.
Abstract:
A shower head assembly includes a hollow handle and a head. A base plate is engaged with the head and a rotatable member is connected to the head and a fixed plate is secured to the rotatable member. Two tubular members are located between the fixed plate and the base plate. Two springs are received in two respective interiors of the two tubular members and biased between the fixed plate and the base plate. A pattern plate having a plurality of pattern holes is fixed to the rotatable member. A filtering assembly including a cap, an adjusting member with a plurality of ribs, a first filter, a separation ring with a plurality of holes and a second filter. A bolt extends through the filtering assembly and connecting the filtering assembly to the pattern plate. A volume control device is engaged with a connection hole defined through a wall of the handle so as to control water volume through the handle.
Abstract:
A challenge-response authentication and picturized-text recognition method provides protection from sniffer. When a user ask to login, a server generate a string array and a lookup table corresponding to string array and password character. The lookup table is converted to a graph with noise-adding and distorting treatment. The graph is sent to display of user after decryption. The user can input authentication text according to the shown graph and the password thereof. According to another preferred embodiment of the present invention, the graphic data can also be built-in the memory of the server and a graphic data is randomly selected from the database.