Abstract:
Carboxylic acids produced by carbonylation and having iodide and oxidisable impurities are purified by contacting with hydrogen peroxide and recovering the purified acid by distillation or evaporation. Preferably a strong acid such as sulphuric acid is used as a catalyst. Product contamination by sulphur from sulphuric acid and by excess peroxide may be reduced by the use of metal salts in the recovery step.
Abstract:
Silicon carbide filaments are coated to protect them from attack by a titanium matrix material when incorporating them into a metal matrix composite. The coating method comprises coating the filaments firstly with a carbon layer and then with a titanium carbide or boride layer whose carbon or boron content decreases progressively from its interface with the carbon layer to its exterior surface. A layer of titanium or a titanium based alloy may be provided on the titanium carbide or boride layer to facilitate incorporation into a metal matrix. Preferably, the layers are applied by sputter ion plating.
Abstract:
Carboxylic acids having two or more carbon atoms than formic acid, or esters of such carboxylic acids are prepared by reacting either formic acid or an ester of formic acid with an olefin at elevated temperature in the presence of a Group VIB metal catalyst. The Group VIB metal which is chromium, molybdenum or tungsten is suitably added as a carbonyl or carbonyl halide. In addition to the catalyst a halide promoter and a phosphorus containing copromoter may optionally be added. The process can be used, for example to prepare propionic acid or a propionic acid ester from ethylene and either formic acid of an ester of formic acid.
Abstract:
This disclosure relates to a tool which is connected to a conventional air-powered chisel to remove old rivets and reapply new rivets, the tool including a collar secured by set screws to a chuck end portion of the power chisel and carrying a sleeve slidably receiving a rod which in turn has a support or arm transverse thereto, a handle is pivotally connected to the rod to move the rod relative to the sleeve for bringing the arm into intimate relationship to an associated rivet, the arm having a bore through which a rivet can pass when driven from the element by a punch associated with the power chisel, and an anvil housed relative to the bore and having a recess in an enlarged head for accommodating the head of a new rivet which is upset by a riveting bit carried by the power chisel.
Abstract:
Optimizing the operation of a hydraulically powered rotor and stator driven drill as it drills a wellbore into the earth is described. Drilling optimization is provided measuring a first set of rotor and stator operating parameters including the speed of rotation of the rotor and rotor torque for a first period of time, generating a first set of relationships from the first set of operating parameters to enable the rotor speed and rotor torque to be predicted over a range of operating parameter values, determining from the relationships a first more optimal mode of operation, and changing at least one operating parameter to move the operation of the rotor and stator towards the more optimal mode of operation.
Abstract:
The invention disclosed here is a moving headboard for use in connection with a reciprocating floor slat system. It is particularly well-suited for use in connection with load-hauling trailers that have built-in reciprocating floor slat conveyors for unloading the trailer. Trailers of this kind are used in lieu of hydraulic lifts and involve inching the load off the trailer. The moving headboard sweeps the trailer floor clean during the unloading process.
Abstract:
Embodiments are directed towards employing hidden secrets on a client device to detect and deter piracy of a computer application. The computer application is partitioned into components, where a subset of the components is initially provided to the client device. In one embodiment, the computer application is unable to execute properly within the removed or other set of components. The removed components not provided to the client device may then be modified based on hidden secrets information and a verification component and provided over a network to the client device. If the verification component is unable to locate an armed secret, or detects that an armed secret is modified, the computer application may be inhibited from installation and/or execution. In one embodiment, a secret might be unarmed, such that its presence, absence, and/or modification might be ignored.
Abstract:
Systems and methods are disclosed for accurately determining a pore pressure of a subsurface formation (20) penetrated by a wellbore (40). The systems and methods provide for measuring pressure and temperature at a measuring location proximal to the wellbore for a predetermined amount of time, storing the measurements, communicating the measurements and processing the pore pressure from the pressure and temperature measurements. The measuring location may be a location in a channel (50) drilled from the wellbore into the formation.
Abstract:
A munitions casing including an annulus of a shape memory alloy disposed around said casing where the shape memory alloy has been subjected to a combination of mechanical and thermal treatments so as to impart a memory, and a cutter located between the annulus and the casing wherein heating of the shape memory alloy to a predetermined temperature causes said annulus to contract radially inwardly and rupture the said munitions casing.
Abstract:
One embodiment in accordance with the present invention includes using a portable computing device to remotely control devices and/or systems wirelessly. Specifically, a software timer application operating on the portable computing device enables its user to predefine the time, date, and the operation(s) that one or more properly enabled devices and/or systems perform in the future. That is, the timer software operating on the portable computing device is able at some predefined time to wirelessly trigger an action or a sequence of actions from devices and/or systems. For example, a user of the portable computing device is able to utilize the timer software to program a predefined date and time that the portable computing device will turn on a favorite radio program and turn up the thermostat. The wireless communication of the portable computing device may occur using a radio frequency (RF) technology like Bluetooth, IEEE 802.11, or HomeRF.