Abstract:
The present invention relates to novel human secreted proteins and isolated nucleic acids containing the coding regions of the genes encoding such proteins. Also provided are vectors, host cells, antibodies, and recombinant methods for producing human secreted proteins. The invention further relates to diagnostic and therapeutic methods useful for diagnosing and treating diseases, disorders, and/or conditions related to these novel human secreted proteins.
Abstract:
A system and method for improving the input return loss in RF amplifiers is disclosed. One embodiment of the present invention amplifies only one of the two output quadrature signals of 3 dB coupler in an amplifier module while substantially maintaining a constant impedance at the input to the 3 dB coupler. This removes one of the design constraints for designing the input network for an amplifier module thereby allowing for more flexible amplifier designs and ease of cascading amplifier modules. One embodiment of the present invention improves the input return loss of an RF amplifier pallet in a cascaded-stage power amplifier circuit for a television transmitter including a 3 dB coupler by replacing one of the two amplifiers connected to the output of the 3 dB coupler with an electrical circuit of substantially equivalent impedance to the input impedance of the non-replaced amplifier.
Abstract:
A spring tooth chisel plow has its upper shank secured within a channel retainer pivotally mounted adjacent the rear edge of the retainer to a mounting bracket secured to a tool bar. The shank of the chisel plow is held within the channel retainer by a transverse clamping bar positioned radially from the main pivot, the forward end of the shank being fixed to the channel retainer. The upper surface of the retainer normally abuts a complementary surface on the mounting bracket, which supports an upwardly extending compression spring assembly. A tension bolt pivotally connects the forward end of the retainer to the upper end of the compression spring assembly, whereby force exerted on the chisel point of the plow is resisted by the compression spring assembly.
Abstract:
A soil conditioner for use in combination with a cultivating implement drawn behind a tractor to break up the soil and leave a prepared seedbed in a single operation. The conditioner is mounted to a framework extending rearwardly behind the cultivator. It comprises a set of reels each mounted to the framework for free rotation about a transverse axis. Two sets of axial blade members are provided about each reel. The blades are equiangularly spaced about the axis and are arranged so that each blade of one set is angularly spaced midway between adjacent blades of the other set. The first set of blades include ground-engaging edges spaced a first radius from the axis. The corresponding edges of the remaining set of blades are spaced a second radius from the axis that is less than the first radius. The different radii of the two sets of blades enable the conditioner to be towed through a field, with the freely-rotating blades breaking up clods of dirt left by the cultivator, without the blades becoming clogged with dirt. The conditioner also includes an adjustment structure for elevationally adjusting the blade edges relative to the cultivator. This adjustment structure includes adjustment brackets each connecting two portions of the soil conditioner frame. Each of these brackets is provided with a plurality of apertures. These apertures are selectively aligned with a set of corresponding apertures on one of the two portions of the soil conditioner frame. By placing bolts through the aligned apertures, the elevation of the blade edges is selectively adjusted.
Abstract:
A latch assembly includes a chassis, a latch bolt moveably mounted on the chassis and having a closed position for retaining a striker and an open position for releasing the striker, a pawl having an engaged position at which the pawl is engaged with the latch bolt to hold the latch bolt in the closed position and a disengaged position at which the pawl is disengaged from the latch bolt, thereby allowing the latch bolt to move to the open position, an eccentric arrangement defining an eccentric axis and a pawl axis remote from the eccentric axis. The eccentric arrangement is rotatable about the eccentric axis, and the pawl is rotatable about the pawl axis. When the pawl moves from the engaged position to the disengaged position, the eccentric arrangement rotates in one of a clockwise and a counter-clockwise direction about the eccentric axis. With the pawl in the engaged position, a force applied to the pawl by the latch bolt creates a turning moment on the eccentric arrangement in the one of the clockwise and counter-clockwise direction, and the eccentric arrangement is prevented from rotating in said one of the clockwise and counter-clockwise direction by a moveable abutment.
Abstract:
A method of assigning the UNIX computers in a network to one of a plurality of groups called zones, of creating independent sets of UNIX identity information for each network entity (user or group) for separate zones, and of associating an entity's sets of UNIX entity information with a single global entity record for the entity in the network's identity resolver. A further method of allowing a UNIX computer to request entity information from the identity resolver, and of the identity resolver returning resolved entity information appropriate for the requesting computer's zone. A further method of managing sets of zone-specific UNIX identity information in the identity resolver to ensure that entity names and entity identification numbers are not duplicated within a zone and to all the same names and numbers to be duplicated across zones. Other embodiments are also described.
Abstract:
A virtual trusted platform module (VTPM) requests a security state from a virtual machine manager. The security state is indicative of the integrity of at least a portion of software and hardware configurations of the virtual machine manager. The VTPM then receives, from the virtual machine manager, a signed security state comprising trusted platform credentials, and communicates the security state with the authentication server. The VTPM also, based on a secret received from the authentication server, initializes a process using the secret.
Abstract:
The present invention provides a laterally diffused metal oxide semiconductor (LDMOS) transistor and a method for fabricating it. The LDMOS transistor includes an n-type epitaxial layer formed on a p-type substrate, and an asymmetric conductive spacer which acts as its gate. The LDMOS transistor also includes a source and a drain region on either side of the asymmetric conductive spacer, and a channel region formed by ion-implantation on the asymmetric conductive spacer. The height of the asymmetric conductive spacer increases from the source region to the drain region. The channel region is essentially completely under the asymmetric conductive spacer and has smaller length than that of the channel region of the prior art LDMOS transistors. The LDMOS transistor of the present invention also includes a field oxide layer surrounding the active region of the transistor, and a thin dielectric layer isolating the asymmetric conductive spacer from the n-type epitaxial layer.
Abstract:
Cluster aliasing is implemented for a cluster of a plurality of computer-based members. The aliased cluster supports secured communication with a non-member node. The cluster aliasing provides an appearance to the non-member node of a common network address for the plurality of members. In supporting the secured communication, a first of the plurality of members is assigned to process secure inbound data directed to the common network address from the non-member node, and a second, different of the plurality of members is assigned to send secure outbound data from the common network address to the non-member node.
Abstract:
A method of maintaining Network Information Service (NIS) maps where modifying information about any of the network entities described by the NIS maps requires only incremental update of the NIS maps instead of full NIS map regeneration. A further method of detecting when network entity records on a network directory server change so that NIS map updates are necessary.