Abstract:
A control valve system for a multiple ratio automatic transmission having a reaction brake for forward drive and a reaction brake for reverse drive. A first clutch establishes a driving connection between an input gear element and a torque input shaft establishes a forward drive torque flow path when the forward drive brake is engaged. A second clutch connects a different torque input gear element of the transmission to the torque input member when the reverse reaction brake is applied. A pressurized valve circuit with three variable force solenoids, including one variable force solenoid, establishes a controlled circuit pressure, a second variable force solenoid is dedicated for reverse engagement control and a third variable force solenoid is dedicated for forward engagement control, whereby independent reverse engagement pressures and independent forward engagement pressures on the clutches and brakes, are established. A neutral idle characteristic conditions the clutches and the brakes for minimal threshold capacity, which effectively interrupts the torque delivery path through the transmission when the torque input shaft is driven at idle speeds.
Abstract:
A wet cyclone having a slender body with a truncated cone at an end thereof includes a heavy fraction outlet at an apex of the truncated cone and an immersion tube on the other end of the body. The immersion tube is cylindrical for withdrawal of a light non-gaseous fraction. A diffuser within the immersion tube deflects the flow within the tube for recovery of pressure head. The diffuser is disposed at a distance from the inlet end of the immersion tube of at least about half the inside diameter of the immersion tube.
Abstract:
A device and method of marking an elongated element for bending. A template is provided that has a body with a first end, an opposite second end, a first side edge, and a second side edge. The body also includes a concave surface that extends between the first end and the second end. Length indicia are disposed on the body adjacent the first straight side edge. Angle indicia are disposed on the body adjacent the first end. Utilizing a marker and the template, a start line and a finish line are marked onto the elongated element. Additionally, a guideline is marked on the elongated element that extends from the start line to the finish line. At least one bend is formed in the elongated element between the start line and the finish line. The bends progress along the marked guideline.
Abstract:
A method and apparatus for securely encrypting data is disclosed. Conventional protections against the loss or theft of sensitive data such as full disk encryption are not effective if the device is, or has recently been, running when captured or found because the keys used for full disk encryption will still be in memory and can be used to decrypt the data stored on the disk. Some devices, such as devices which gather sensitive data in use, must run in environments in which they might be captured by a person seeking access to the sensitive data already recorded by the device. An encryption method is proposed in which files on a recorder's persistent memory are initialised with pseudo-random masking data whilst the recorder is in a relatively secure environment. One or more parameters which can be used to re-create the pseudo-random masking data are encrypted with a public key using a public-key encryption algorithm and stored on the recorder. The device's memory is then purged to remove the one or more parameters. Later, when miming in a relatively insecure environment, the sensitive data is encrypted (414) using a symmetric encryption algorithm, and combined (418) with the masking data previously stored in the storage file. When the encrypted files are transferred to a reader device with access to the corresponding private key, the masking data can be recreated, the symmetric encryption reversed and the sensitive data recovered. However, an adversary without the private key cannot recreate the masking data, and is thus unable to recover the sensitive data even with the symmetric encryption key which he might successfully extract from the recorder's volatile memory.
Abstract:
In the present application, a method for installing a component into an oil field tree is described. The method includes installing a sealing device into a component to block a primary flow path through the component; coupling the component with the sealing device installed to an oil field tree in fluid communication with a wellbore; adjusting at least one valve in the oil field tree to provide an alternative flow path that bypasses the sealing device; and performing well operations, such as installation operations, via the alternative path. Further, in other embodiments, the oil field tree may be a production tree utilized to produce hydrocarbons from the wellbore or an injection tree utilized to injection fluids into the wellbore.
Abstract:
Three-way call detection is an important component of correctional facility telephone equipment because it helps restrict calling access by certain persons to certain restricted telephone numbers. Various three-way call detection methods exist, but all of these implementations suffer from one major limitation—the detection accuracy is not as high as is desired by the industry. The present invention improves detection accuracy, using “steganography.” Steganography involves hiding one set of data or signals within another signal or carrier in such a way that its presence is virtually imperceptible to the end recipient, and potential even the originator of the carrier signal. Television producers use steganographic methods to encode data in video signals for security, distribution monitoring, piracy-control, and other reasons. The present invention involves a device that connects to a telephone, either at the line or handset interfaces, and produces a known signal that is steganographically hidden within the user's normal voice signal. Detection equipment, residing at another location, monitors signals on telephone calls and tests for the presence of the hidden signal or data generated by the invention. Once detection is achieved, appropriate action, such as terminating or recording the call, may be taken. Improved accuracy is achieved by choosing the appropriate hidden signal(s)—ones that never occur in the course of normal conversation and never get generated by telephone company equipment. Once detected, the presence of the signal guarantees the call was made to the restricted party from a particular phone line.
Abstract:
A method for drilling and completing a gravel packed well is disclosed. The method comprises drilling a wellbore with a drilling fluid, conditioning the drilling fluid, running the gravel packing assembly tools to depth in the wellbore with the conditioned drilling-fluid, and gravel packing a wellbore interval with a completion-fluid. The completion fluid may be the same as the drilling-fluid. This method may be combined with alternate-path sand screen technology to ensure proper distribution of the gravel pack.
Abstract:
A business intelligence hardware sizing system automatically determines an initial hardware configuration for a database system running a business intelligence workload. The business intelligence hardware sizing system provides a structured approach for determining an initial configuration of a database tier of a business intelligence application. The business intelligence hardware sizing system comprises a formal model of a database system sizing process and an easy-to-use software tool to support the approach.
Abstract:
Compounds of the formula I, in which M, A1, A2, K1 and K2 have the meanings given in the description are novel effective tryptase inhibitors.
Abstract:
A material catching, repositioning, and waste reducing machine comprising a main frame (57) that is joined to inner arms (15) that extend and contract in and out of outer arm tubes (22). A material skirt (52) is immovably attached to the outer arm tubes (22). The main frame (57) is mounted on a tilting bearing support (16). A tilt cylinder arm (51) that is immovably installed to the main frame (57), is operated by a tilt cylinder (38), and thus provides a means for tilting the machine.