摘要:
A double-faced field emission display device includes two parallel fluorescent screens (10, 10′) and an electron emission structure (20) located between the fluorescent screens. Each fluorescent screen includes a transparent substrate (21, 21′) with an anode plate (12, 12′) and coplanar fluorescent layers (13, 13′) formed at an inner surface of the transparent substrate. The electron emission structure includes an opaque insulative substrate (28) with cathode plates (26, 26′), electron emitters (27, 27′) and grid plates (25, 25′) formed at each of opposite surfaces (281, 282) thereof. Symmetrically opposite pairs of same electrodes are electrically interconnected so that the fluorescent screens can simultaneous display a same image. Only a single driving system is needed to achieve the simultaneous display.
摘要:
A protection device is provided to protect connectors which are to be connected to electronic interfaces at a panel of a computer chassis (10). The protection device includes a bracket (30) secured to the panel, and a cover (50) pivotally attached to the bracket for shielding the connectors. The cover defines a plurality of slots for extension of cables of the connectors therethrough. The slots include a large assembly slot (59), a narrow accommodating slot (58), and a connecting slot communicating the assembly slot and the accommodating slot. The accommodating slot is in alignment with a zone disposed at the panel of the computer chassis having at least one electronic interface for collecting a cable of at least one connector, the assembly slot allowing entrance of the at least one connector is not in alignment with the zone.
摘要:
Exemplary methods, systems, and computer-readable media for developing, training and/or using models for online handwriting recognition of characters are described. An exemplary method for building a trainable radical-based HMM for use in character recognition includes defining radical nodes, where a radical node represents a structural element of an character, and defining connection nodes, where a connection node represents a spatial relationship between two or more radicals. Such a method may include determining a number of paths in the radical-based HMM using subsequence direction histogram vector (SDHV) clustering and determining a number of states in the radical-based HMM using curvature scale space-based (CSS) corner detection.
摘要:
A bootstrapping circuit capable of sampling input signals beyond a supply voltage is disclosed. In one embodiment, the bootstrapped circuit is implemented having a reduced area and/or power consumption requirement.
摘要:
A surface-conduction electron emitter includes a substrate, two electrodes disposed on the substrate and parallel to each other, and a plurality of line-shaped carbon nanotube elements fixed on at least one electrode. One end of each carbon nanotube element points to the other electrode. An electron source using the surface-conduction electron emitter includes a substrate, a plurality of electrodes disposed on the substrate and parallel to each other, and a plurality of line-shaped carbon nanotube elements fixed on at least one electrode. One end of each carbon nanotube element points to the other electrode.
摘要:
A field emission lamp includes: a transparent bulb (10) having a neck portion; a lamp head mated with the neck portion; an anode layer (20) formed on an inner surface of the bulb; a fluorescence layer (30) formed on the anode layer; a cathode electrode (43) and an anode electrode (23) located at the lamp head; an anode down-lead ring (24) located at the neck portion, the anode down-lead ring engaging with the anode layer and electrically connecting with the anode electrode via an anode down-lead pole (21) and a pair of down-leads (22); and an electron emitting cathode positioned in the bulb and engaging with the cathode electrode. The field emission lamp is safe for humans and environmentally friendly, provides a high electrical energy utilization ratio, and has a reduced cost.
摘要:
A reference leak includes a leak layer formed of one of a metallic material, a glass material, and a ceramic material. The metallic material is selected from the group consisting of copper, nickel, and molybdenum. The leak layer comprises a number of substantially parallel leak through holes defined therein. The leak through holes may be cylindrical holes or polyhedrical holes. A length of each of the leak through holes is preferably not less than 20 times a diameter thereof. A diameter of each of the leak through holes is generally in the range from 10 nm to 500 nm. A length of each of the leak through holes is generally in the range from 100 nm to 100 μm. A leak rate of the reference leak is in the range from 10−8 to 10−15 tor×l/s. The leak through holes have substantially same length and diameter.
摘要:
A concatenating speech synthesizer concatenates selected speech units to obtain the desired synthesized speech. When desired speech units of phonetic and/or prosodic context are not available, the synthesizer selects replacement speech units based on measures representative of the difference between the HMM acoustic models of the desired speech unit and available speech units.
摘要:
A real-time, signature-free, blocker prevents buffer overflow attacks. The system and method, called SigFree, can filter out code injection buffer overflow attack packets targeting at various Internet services such as web services. Motivated by the observation that buffer overflow attacks typically contain executables whereas legitimate client requests never contain executables in most Internet services, SigFree blocks attacks by checking, without any preknowledge of the real attacks, if “executable” instruction sequences can be blindly disassembled and extracted from a packet. Being signature-free, the invention can block new and unknown buffer overflow attacks. It is immunized from almost every attack-side code obfuscation method, and transparent to the servers being protected. The approach is therefore suited to economical Internet-wide deployment with very low deployment and maintenance costs. SigFree can also handle encrypted SSL packets. An experimental study shows that SigFree can block all types of code-injection attack packets without yielding any false positives or false negatives. Moreover, SigFree causes negligible throughput degradation to normal client requests.
摘要:
An embodiment of the invention is a method for proactive failover using user-defined rules. An event log of a first server node is monitored to check for user-specified application events. One of the user-specified application events corresponding to an impending failure in an application running on a first server node is detected. In automatic response to the detected impending failure, a proactive failover process is executed to transfer the application to a second server node for continued execution, the second server node being connected to the first server node in a cluster.