摘要:
An ultrasound imaging system includes a beamformer (104) configured to beamform ultrasound signals. The beamformer includes input/output (110) configured to at least receive ultrasound signals. The ultrasound imaging system further includes a first ultrasound probe connector (128) and a second ultrasound probe connector (128). The ultrasound imaging system further includes a switch (134) that concurrently routes ultrasound signals concurrently received via the first ultrasound probe connector and the second ultrasound probe connector to the beamformer, which processes the ultrasound signals.
摘要:
An avatar behavior rule is customized within a virtual universe environment as a function of individual avatar data. It is determined whether the activity of an avatar is relevant to a behavior rule for a virtual universe. If the activity is determined to be relevant to the rule, the rule is customized for the avatar as a function of individual avatar data associated with the avatar, and it is determined whether the activity exceeds a violation threshold of the customized rule. If the activity is determined to exceed the customized rule violation threshold, an appropriate action is taken as specified by the customized rule.
摘要:
A string instrument includes a body portion having a first longitudinal axis, an elongate neck portion having a second longitudinal axis and first and second opposing ends located along the second longitudinal axis, and a fastener that secures one of the first or second ends to the body portion, wherein the first and second axes are misaligned from each other in a same plane.
摘要:
A cable fault detection component (168) receives input data indicative of a fault in an electrical power system. The component (168) analyzes the input data to determine if the fault is indicative of a self-clearing cable fault and generates corresponding output data (276). In one implementation, the cable fault detection component (168) is implemented as a software module which operates on a computer (105) of a substation intelligence system (104).
摘要:
A coaxial via structure is adapted to transmit high speed signals or high intensity current through conductive layers of an electronic device carrier. The coaxial via structure comprises a central conductive track and an external conductive track separated by a dielectric material and is positioned in a core of the electronic device carrier or in the full thickness of the electronic device. The coaxial via structure can be combined with a stacked via structure so as allow efficient transmission of high speed signals across the electronic device carrier when a manufacturing process limits the creation of a full coaxial via structure across the entire electronic device carrier.
摘要:
Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user.
摘要:
A new and distinct peach variety of Prunus persica named ‘NJF17’ is described. This variety is distinguished from other peach varieties by its unique combination of non-showy, light pink flowers, flat fruit that ripen in early mid-season, bright green-yellow to yellow fruit that are devoid of over color, clingstone fruit with a juicy, nonmelting texture and sweet, spicy flavor, and firm fruit that retain their firmness well.
摘要:
A magnetic resonance coil system 18 allows for the use of modular components and which in one embodiment is particularly well-suited for use with small animals and includes an animal receiving apparatus 202, a transmit coil module 204, and a receive coil module 206. The receive coil module 206 includes a cryogenic receive coil. The coil system 18 is selectively insertable in the bore of the gradient coil of a magnetic resonance examination system.
摘要:
An overall cyber security risk diagram is generated from a hierarchy of determined KPI's by combining a Procedures and Protocol KPI determined from values assigned to answers to questions presented to organization personnel implementing a control systems, with a Group Security Policies KPI that is determined from system-wide policy information and settings of the automation system by an automated processing device tool, and a Computer Settings KPI determined from device setting data collected from individual system devices by the automated processing device tool and relevant to cyber security. The device setting data comprises service areas unique to each device that are not assessable by review of the domain data collected and used to determine the Group Security Policies KPI. Each level of the hierarchy of determined KPI's may be used to generate a representation of relative risk of a cyber-security attribute.