摘要:
A novel absorbent structure is disclosed in which an initially flat, dense structure becomes a three-dimensional, high bulk, channeled structure upon wetting. The structure offers unusually high directionality in fluid transport to improve the distribution of fluid in longitudinal articles. The self-bulking of the wetted article can also lead to improved fit in articles such as diapers and in general increases the void volume of the wetted article for high absorbent capacity.
摘要:
A method for improving the rush transfer of a web, such as a tissue web, is disclosed. The method provides for greater angles of convergence and divergence of the carrier fabric and the transfer fabric at the point of transfer by deflecting the carrier fabric toward the transfer fabric using a deflection element, such as a roll, positioned opposite the vacuum transfer head. The greater angles of convergence and divergence minimize the potential for undesirable macrofolds being formed in the web during transfer.
摘要:
Novel methods and compositions for treating textiles and other materials are disclosed in which persistent odor or other symptoms of biofilm presence can be reduced through the use of compositions comprising N-acetyl cysteine or other agents in combination with certain enzymes.
摘要:
Products and methods are disclosed relating cosmetic products, personal care products, and cleaning products comprising N-acetyl cysteine. Products for personal care, household use, and other purposes are described with compounds that reduce the odor of N-acetyl cysteine. Skin-care serums with N-acetyl cysteine and Vitamin C are described, as are a variety of other cosmetic and personal care products.
摘要:
Security systems for secured assets such as vehicles, are described in which facial recognition systems or other biometrics systems provide enhanced security for an authorized user. Subtle or covert cues provided by the user during authentication or subsequent monitoring of the user by the facial recognition system and other input systems are used to invoke user-editable personal security rules that respond to the cues to implement the user's desired responses for added security in various situations. Related security systems, methods, and devices are described to protect an asset such as an automobile or other vehicle or other secured asset through the use of biometrics and personal security rules. In such systems, a training module may provide periodic training and practice sessions to assist the user in being prepared to properly use the personal rules system in response to various scenarios and threats, and can guide adjustment of personal rules for better success.
摘要:
Providing quality management by validating a bill of materials in event-based product manufacturing. Some of the disclosed embodiments include a system and method for validating materials during manufacture of a product. Also disclosed are a method of validating that acceptable materials are being used on a machine during manufacture of a product, and one or more computer-readable media for storing a data structure representing a product specification in an event-based manufacturing system. The embodiments are operable in an intelligent manufacturing system including a process for converting raw materials to a product, a process control system including one or more sensors capable of generating an alarm in response to an event that results in one of waste, machine delay, or decrease product quality, a data logger associated with the process control system for obtaining event parameters associated with the event, a database on a server for recording event parameters obtained by the data logger, and a reporting system cooperatively associated with the database for reporting productivity parameters regarding the process derived at least in part from the event parameters.
摘要:
Absorbent paper products, such as paper towels, are disclosed which have a combination of high absorbent capacity and a moderate to low rate of absorbency for hand protection. These properties can be produced, for example, using a throughdried basesheet, such as an uncreped throughdried sheet, in which at least one surface of which has been printed with a patterned moisture barrier coating and creped. The presence of the moisture barrier coating on the surface retards the absorbent rate for that side of the sheet while allowing a significant amount of liquid to pass through to the center of the sheet.
摘要:
Facial tissue products can be customized by providing readers or customers of topical mediums, such as topical magazines or websites, with related graphics and tissue basesheet options through an advertisement in the magazine or website that directs the reader to a website. Through the website, the reader can select and order their customized products, which can be shipped directly to the reader.
摘要:
One embodiment of the present invention is an endless non-woven tissue making fabric having a three-dimensional texture suitable for use as a fabric for producing three-dimensional fibrous webs. The endless non-woven tissue making fabric comprises a plurality of substantially parallel adjoining sections of non-woven material. Each section of non-woven material has a width substantially less than the width of the non-woven tissue making fabric. Each section of non-woven material may be joined to at least one other adjoining section of non-woven material. The non-woven tissue making fabric has a machine direction, a cross-machine direction, a tissue contacting surface and a tissue machine contacting surface. The tissue contacting surface comprises solid matter at a plurality of heights such that the tissue contacting surface of the non-woven tissue making fabric has an Overall Surface Depth of at least 0.2 mm in regions of solid matter on the tissue contacting surface.
摘要:
Security systems for protecting assets are described, including password-based security systems that can provide different levels of access responsive to entry of a primary or secondary password. In some versions, user-configurable security rules can provide customized responses to entry of primary or secondary passwords, including feigned or limited access, security alerts, etc. Passwords comprising overt and covert components can be used to provide enhanced security and improved user control over system response. Improved security systems involving transactions between multiple parties are also considered, with options for user-customized security rules including primary and secondary passwords, and reverse challenge and response methods. Systems for Limited Use Credentials are also disclosed to reduce the risk of identity theft.