摘要:
Movement of a graphical hand is constrained when the physical hand controlling the graphical hand does not have a similar physical constraint. An analysis of a revolute-joint-link-spring model in which an uncompressed/unextended spring position represents the corresponding measured joint angle or link position is used. Linear springs , non-linear springs, or the like may be employed to obtain the desired result of allowing a graphical joint or link to deviate from what the corresponding measured joint or link provides. If a graphical hand configuration causes a portion of the hand to penetrate a simulated graphical solid object, a mathematical determination is used to compute modified joint and link positions such that the graphical hand part will no longer penetrate the solid object. Such a constraint technique may include solving a spring model such that the various joint and link springs compress or extend to produce modified joint and link positions.
摘要:
Described herein are compositions and methods useful for the purification of water using dendritic macromolecules. The process involves using dendritic macromolecules (dendrimers) to bind to contaminants, and a filtration step to produce water from which contaminants have been removed or modified. Examples of dendrimers that may be used in the process include cation-binding dendrimers, anion-binding dendrimers, organic compound-binding dendrimers, redox-active dendrimers, biological compound-binding dendrimers, catalytic dendrimers, biocidal dendrimers, viral-binding dendrimers, multi-functional dendrimers, and combinations thereof. The process is readily scalable and provides many options for customization.
摘要:
A system and method are provided for decrypting a selected program. The system and method can receive at least one authorization message and at least one control message associated with a selected program. The system and method stores the at least one authorization message. The system and method transmits a first control signal if the at least one control message specifies a type of program that can be decrypted given the at least one authorization message and transmits a second control signal if the at least one control message specifies a type of program that can not be decrypted by the decryption device given the at least one authorization message.
摘要:
An apparatus which comprises a manipulandum that is configured as a surgical instrument; a closed loop linkage system which includes a first central member fixedly coupled to a first object coupling and a second central member fixedly coupled to a second object coupling, wherein the first and second object couplings are separately coupled to the manipulandum to allow the manipulandum to be moveable in a plurality of rotary degrees of freedom and an axial degree of freedom; a force feedback system is coupled to the linkage system, wherein the force feedback system selectively applies resistive forces to the manipulandum based on the position of the manipulandum with respect to one or more reference coordinates. In an embodiment, the force feedback system includes an actuator to provide a force to the manipulandum in at least one degree of freedom in response to signals received from a computer system.
摘要:
A global path identifier is assigned to each explicit route through a data communication network. The global path identifier is inserted into each packet as the packet enters a network and is used in selecting the next hop. When encountering a new selected path, an ingress router sends an explicit object to downstream nodes of the path to set up explicit routes by caching the next hop in an Explicit Forwarding Information Base (“EFIB”) table. Ingress routers maintain an Explicit Route Table (“ERT”) that tracks the global path identifier associated with each flow through the network. Multiple flows using the same path can be implemented by sharing the same global path identifier. In case of sudden network load changes, rerouting can be performed by changing the global path identifier associated with those flows that need to be rerouted and by then transmitting a new path object to downstream nodes.
摘要:
A polymeric chair having a rebar cradle and legs of a T-shaped cross-section diverging downwardly from the cradle. The outer surface portions of the legs are arcuate and define segments of a cone. Inwardly extending web portions reinforce the legs and provide feet at the distal ends of the legs disposed to the inside of the outer surface portions. A flat sand plate for the chair has radially extending slots formed therethrough which are proportioned for snug engagement with side surfaces of the feet. The slots are elongate to accommodate different sized chairs having feet spaced at varying radial dimensions. The web portions taper to optimize their reinforcing function and conserve material. In one embodiment, a ring is formed integrally with the legs intermediate the table and the distal ends of the legs. The chair is of a unitary construction and may have an integrally formed strap for extension over the cradle to secure a rebar in place.
摘要:
First and second cast-in-place concrete slabs are maintained in alignment by cutting a semi-circular groove in an edge surface of the first formed slab, positioning a flat rectangular dowel within the groove so that the dowel extends outwardly from the edge surface, and then casting the second slab against the edge surface to embed the dowel within the second slab. A gasket is engaged with the dowel to seal the groove against the intrusion of fluid concrete as the second cast-in-place. The gasket also serves to space the dowel from the groove to accommodate limited lateral movement of the dowel and groove relative to one another.
摘要:
A device is disclosed for locating and treating an infarct scar in a heart. The device includes a catheter, a collapsible heater and energizing means connected to the collapsible heater for energizing the collapsible heater to raise the temperature of the infarct scar to a temperature sufficient to reduce the surface area of the infarct scar.
摘要:
RFID readers, RFID tags, software, and methods decode a signal received in an RFID system. From received data, a decoder determines a number of possible test series for the output. In one embodiment, the decoder uses a memory of a previous sample to derive a subsequent sample in the test series, so as to ensure that all the test series are valid. A metric is then computed for how well each test series fits the received data. The metrics are compared to select for output the test series with the best fit. In a further embodiment, at least one of the metrics is further used to determine if a collision were present.