摘要:
A color imaging element, a photosensor and a photoelectric transducer which use a protein and are capable of being stably used for a long time, and methods of manufacturing them are provided. A zinc-substituted cytochrome c552 is immobilized on a gold electrode with a self-assembled monolayer in between to form a blue-light photoelectric transducer. Alternatively, a cytochrome c552 is immobilized on a gold electrode with a self-assembled monolayer in between, and a fluorescent protein absorbing blue light is bonded to the cytochrome c552, thereby forming a blue-light photoelectric transducer. These photoelectric transducers each are used as a color imaging element or a blue-light photoelectric transducer of a photosensor.
摘要:
A method for implementing variable symbol rate, presetting counters M and N, and M=1, N=0, f being the preset output symbol rate, fs being the frequency of input clock, the method comprises: triggering to judge whether N×f is greater than M×fs at the rising edge of the input clock, if it is, letting the counter M add 1 and outputting a clock pulse; else further judging whether the value of the counter N is equal to fs−1; when N=fs−1, letting the counter N return to 0, and waiting for the next rising edge of the input clock; when N≠fs−1, waiting for the next rising edge of the input clock after letting the counter N add 1; letting the output clock pulse be the system clock, controlling the data to be output to set the symbol rate output.
摘要:
A type of sintered Nd—Fe—B permanent magnet with high corrosion resistance is produced by dual alloy method. The method comprises the following steps: preparing the powders of master phase alloy and intergranular phase alloy respectively, mixing the powders, compacting the powders in magnetic field, sintering the compacted body at 1050˜1125° C., and annealing at 920-1020° C. and 500-650° C. successively
摘要:
Aspects of a method and system for channel estimation for interference suppression are provided. In this regard, one or more circuits and/or processors of a mobile communication device may generate and/or receive a first set of channel estimates and a second set of channel estimates. The one or more circuits and/or processors may modify the second set of channel estimates based on a comparison of a measure of correlation between the first set of channel estimates and the second set of channel estimates with a threshold. The first set of channel estimates and/or the modified second set of channel estimates may be utilized for cancelling interference in received signals. The first set of channel estimates may be associated with a first transmit antenna of a base transceiver station and the second set of channel estimates may be associated with a second transmit antenna of the base transceiver station.
摘要:
Provided in the present invention are recombinant peptides and a method for using the peptides in stimulating an immune response against human high molecular weight-melanoma associated antigen (HMW-MAA). The peptides were designed from the identification of regions of structural and amino acid sequence homology between HMW-MAA and the mouse anti-idiotypic monoclonal antibody MK2-23. The method comprises the step of administering to an individual a peptide of the invention in an amount effective to elicit an immune response against HMW-MAA.
摘要:
A smart card enabled secure computing environment system locks the host computer system from user access and waits for a smart card to be inserted into an attached or co-resident smart card reader. When a smart card is inserted into the smart card reader, the invention asks the user to enter his smart card password which is compared to the password on the smart card. If the two passwords match, the invention looks up the user's username in an access file of valid users and finds its associated access times and/or cumulative time limits in the access file. if the current time is within any of the valid access times and the user's cumulative usage time is within the specified cumulative time limit, then access is granted and the system is unlocked. The invention periodically checks the current time while the user is using the computer. If a blocked time period is entered or a cumulative time limit is exceeded, the user is logged off the machine and the computer is locked from user access. If at any time the user's smart card is removed from the smart card reader the invention will shut down all of the user's programs and lock the system.
摘要:
The present invention provides an overpower-protection circuit and a power supply apparatus having the same. The power supply apparatus comprises a rectifier, a transformer and an overpower-protection circuit The overpower-protection circuit comprises a converter having a converter input electronically coupled to the rectifier and a converter output, a photo coupler having at least a first terminal coupled with the converter output, and having an output terminal, and a clipper electrically coupled across said terminals of the photo coupler for keeping the converter output below a predetermined voltage.
摘要:
A “Book of Business” (or Book) is a set of business domain data of one or more book types. This set of data is identified by a “driving condition” or quality. A driving condition typically arises from a business practice, and may be further qualified by local conditions. Accordingly, data may be organized based on local activities or conditions that may not be explicitly stored in a database. In one embodiment, a method for querying the database includes identifying data in a database. The data is organized into one or more segments. A book of business associated with a segment in the one or more segments is then generated. The book of business includes a set of references to the data organized into the segment. A query plan may be determined based on the book of business. A set of results may then be generated based on the query plan.
摘要:
A smart card enabled mobile personal computing environment system stores a user's personalized, fully functional, computing environment in a smart card. The user to specifies information required to configure the client to the user's preferred personal computing environment. The user's personal computing environment data is also used for interfacing with the user's Web browser. As the user browses the Web, the Web pages are analyzed to determine if the Web page is a logon or registration form. If the form is a registration form, the system fills in the form using the user's information from the user's personal computing environment data. If the form is a logon form, the system either captures the user's user name and password if the system has not recorded them, or inserts the user name and password in the form if the information for the Web page is in the user's personal computing environment data.
摘要:
A method and apparatus for configuring a network interface to support a virtual private network includes storing configuration data at a server on a host computer on the provider network. It is determined whether conditions are satisfied for sending the configuration data to a particular node at an edge of the provider network. If it is determined that conditions are satisfied, then the configuration data is sent to the particular node to cause the particular node to configure a particular interface for supporting a virtual private network over the provider network based on the configuration data without human intervention. The provider network is a packet-switched network and the particular virtual private network is a link layer virtual private network. The particular node is different from the host. The particular interface is for a direct communication link to a customer network node outside the provider network.