摘要:
A heat sink assembly for removing heat from an electronic device and comprising a base, a lid in spaced relationship with and parallel to the base, and an outer wall spiraling radially outwardly about an inlet axis from an inner exit position to an outer exit position to define a tangential outlet between said exit positions. Each of a plurality of curved fins presents a concave surface and a convex surface and extends from an inner circle with radius concentric with the inlet axis to an outer circle with radius concentric with the inlet axis to define a plurality of curved channels between adjacent fins for directing the flow of cooling fluid radially from the inlet axis. Each of the curved channels is disposed at a constant distance between next adjacent fins for a major length there along from the inner circle with radius toward the outer circle with radius. That substantially constant distance extends from the inner circle with radius to a perpendicular position where the convex surface of that fin is perpendicular to the intersection of the outer circle with radius with the next adjacent fin to the convex surface.
摘要:
The present invention relates to compositions and methods for the detection and characterization of nucleic acid sequences and variations in nucleic acid sequences present in multiple genomes. In particular, the present invention provides microarrays possessing two or more whole genomes and methods of making and using the same to detect the presence or absence of target sequences in the plurality of genomes.
摘要:
A compact thermosiphon assembly for dissipating heat generated by electronic components using a working fluid includes a tube having a first end and a second end and a flat cross section defining an elongated chamber is disclosed. The tube has an evaporation region for receiving heat to evaporate the working fluid into a vaporized working fluid within the chamber disposed between a first condensation region and a second condensation region opposite the first condensation region for condensing the vaporized working fluid back into a liquefied working fluid within the chamber. Each of the condensation regions have a first portion extending upwardly at a first angle from the evaporation region and a second portion extending upwardly at a second angle different than the first angle.
摘要:
A thermosiphon for cooling an electronic device having a mean width of dimension “b” comprises a boilerplate having a top surface and including a plurality of pyramid shaped fins projecting upwardly from the top surface. The boilerplate also has a bottom surface for receiving the electronic device to be cooled. A plurality of spaced apart condenser tubes is mounted above the boilerplate such that the boilerplate and the condenser tubes define a vapor chamber therebetween for receiving a working fluid therein. A plurality of convoluted fins extends between each adjacent pair of condenser tubes.
摘要:
Systems and methods for environmental adjustments using biometrics are described. A scanned biometric parameter of an individual may be received and a determination may be made as to whether the scanned biometric parameter of the individual matches a stored biometric parameter of a plurality of stored biometric parameters. Biometric parameters include retinal images, DNA, and voice samples. If a match exists, the individual may be identified based upon the stored biometric parameter. At least one adjustment to change on at least one device based upon the identified individual may be determined. The at least one device may be configured for modifying an environmental condition of the identified individual. At least one instruction to implement the determined at least one adjustment may be transmitted. The adjustment may be a physical adjustment to the device, such as the height level of a chair.
摘要:
Embodiments of the present invention relate to systems and methods for authenticating the identity of an authorized custodian of a physical item and activating a tracking device concealed in the physical item in the event the item is removed from a controlled area or accessed by an unauthorized individual. In particular, according to some embodiments, the identity of an authorized custodian of a physical item stored in a controlled area is authenticated by: recording an image of an iris of the authorized custodian in a database; capturing an image of an iris of an individual attempting to remove the physical item from the controlled area; and verifying, prior to allowing removal of the physical item, that the captured image of the iris of the individual attempting to the physical item matches the recorded image of the iris of the authorized custodian.
摘要:
Apparatus and methods for providing a trading recommendation. The apparatus and methods may involve using information about events and reactions to the events. The events and the reactions may be used to identify an expected impact of the event on a market. The expected impact may be used to recommend investment vehicle trades. The methods may include receiving an information item that relates to an event; receiving a sentiment indicator corresponding to the item; assigning to the item a market impact weighting index that is at least partially based on the sentiment indicator; and, based at least partially on the market impact weighting index, selecting the trading recommendation from a database of trading recommendations.
摘要:
Systems and methods for implementing a sequence of fingerprints for biometric authentication are provided. A sequence of fingerprints is more difficult to fraudulently circumvent than a single finger or thumb print. A sequence of fingerprints takes advantage of inexpensive fingerprint scanners and easily available fingerprints. A sequence of fingerprints may be used in conjunction with additional biometric authentications and/or confidential access sequences. The sequence of fingerprints may include prints of the digits of the foot. The sequence of fingerprints for biometric authentication may be system or user defined.
摘要:
Behavior associated with credit misuse is referred to herein as “intentional misuse of credit” (IMOC) behavior and individuals who exhibit IMOC behavior are referred to herein as IMOC individuals. Embodiments of the present invention provide systems, methods, and computer program products for reviewing, on a daily basis, financial-transaction data taken across a plurality of individual consumers, identifying individual consumers whose financial-transaction data indicates IMOC behavior, and flagging those individual consumers as IMOC individuals. To enhance financial institutions' ability to make accurate credit-approval decisions, other embodiments of the present invention provide systems, methods, and computer program products for reviewing a particular credit applicant's most recent financial-transaction data and, based thereon, determining whether that credit applicant, who otherwise has a good credit history, exhibits recent IMOC behavior and thereby possesses the propensity to misuse the applied-for credit.
摘要:
Embodiments of the invention relate to systems, methods, and computer program products for authenticating the identity of an authorized custodian of a dependent individual visiting a facility. In particular, the identity of an authorized custodian of a dependent individual visiting a facility is authenticated by: recording an image of an iris of the authorized custodian in a database; capturing an image of an iris of an individual attempting to accompany the dependent individual when the dependent individual exits the facility; and verifying, prior to allowing the dependent individual to exit the facility, that the captured image of the iris of the individual attempting to accompany the dependent individual matches the recorded image of the iris of the authorized custodian.