摘要:
A reaming bit designed to operate with low torque fluctuation when driven with a turbine at speeds in the order of 300-600 RPM and above features a profile that is arcuate from the gauge dimension to the nose area or alternatively has a blunt straight taper section but with a ratio of profile length (PL) to bit size (BS) of under 0.75. The blades extend into a concave cone and the cutting structure continues along the blades towards the center. The blades have a step near the gauge section to increase the exposure of the blade cutting structure. An array of protrusions are disposed parallel to and behind the cutting structure to increase high speed stability and adjacent the blade step transition to protect outer casing on run in.
摘要:
A reaming bit designed to operate with low torque fluctuation when driven with a turbine at speeds in the order of 300-600 RPM and above features a profile that is arcuate from the gauge dimension to the nose area or alternatively has a blunt straight taper section but with a ratio of profile length (PL) to bit size (BS) of under 0.75. The blades extend into a concave cone and the cutting structure continues along the blades towards the center. The blades have a step near the gauge section to increase the exposure of the blade cutting structure. An array of protrusions are disposed parallel to and behind the cutting structure to increase high speed stability and adjacent the blade step transition to protect outer casing on run in.
摘要:
A reaming bit designed to operate with low torque fluctuation when driven with a turbine at speeds in the order of 300-600 RPM and above features a profile that is arcuate from the gauge dimension to the nose area or alternatively has a blunt straight taper section but with a ratio of profile length (PL) to bit size (BS) of under 0.75. The blades extend into a concave cone and the cutting structure continues along the blades towards the center. The blades have a step near the gauge section to increase the exposure of the blade cutting structure. An array of protrusions are disposed parallel to and behind the cutting structure to increase high speed stability and adjacent the blade step transition to protect outer casing on run in.
摘要:
A plurality of security events is detected in a computing system, each security event based on at least one policy in a plurality of security policies. Respective interactive graphical representations are presented in a graphical user interface (GUI) of either or both of the security events or security policies. The representations include interactive graphical elements representing the respective security events or security policies. User selection of a particular event element via the interactive GUI causes a subset of the security policies to be identified, each security policy in the subset serving as a basis for at least one particular security event represented by the particular event element. User selection of a particular policy element via the interactive GUI causes a subset of the security policies to be identified, each security event in the subset based at least in part on a particular security policy represented by the particular policy element.
摘要:
A method and system for controlling a vehicle having an electric powertrain and an electric energy storage system. The electric energy storage system includes a capacitor, DC/DC converter, and a battery. The electric energy storage system is controlled to maximize use of the capacitor relative to use of the battery.
摘要:
There is disclosed a device for connecting a lead bicycle and a trailing bicycle into a tandem configuration consisting of first and second connectors attachable to, for example, the seat post of the lead bicycle and to the head post or frame of the trailing bicycle, respectively; a telescoping linking bar releaseably attachable to the two connectors, the linking bar having a section that allows a limited amount of flexing longitudinal travel; wherein the linking bar connections permit horizontal, vertical and torsional rotation and which release and de-couple the bicycles when rotation exceeds predetermined limits, which may occur when one bicycle falls or the trailing bicycle begins to pass the lead bicycle.
摘要:
A holder for lead pellets of the type shot from an air rifle and similar types of ammunition. The ammunition holder includes a base plate and at least one strap extending from the top and bottom of the base plate for attachment to a support such as the butt portion of an air rifle stock. A resilient block is affixed to the base plate. The block has a number of transverse apertures each being sized to snugly receive a pellet or other piece of ammunition.
摘要:
Methods and compositions for treating neurological damage or dysfunction are described, including methods implemented by administration of peptide inhibitors of AMPA receptor endocytosis.
摘要:
A computing system security dashboard is provided for presentation on a computer display device, the dashboard including a plurality of security view panes. Each security view pane, when expanded, presents a respective visualization of security conditions of a particular computing system. When the particular security view pane is collapsed it can hide at least a portion of particular visualizations of security conditions presented using the particular security view pane when expanded. The particular security view pane occupies a smaller area of the dashboard when collapsed than when expanded. A particular visual indicator is presented on the particular security view, at least when collapsed, summarizing at least a portion of the particular security conditions identified in the particular visualizations. A user interaction with the particular collapsed security view pane can prompt the particular security view pane to be expanded in area and present the particular visualizations.
摘要:
A method and system for batched remapping of virtual addresses for garbage collection in a large object area. A mapping from a table having a first set of virtual addresses and sizes of non-contiguous, page-aligned large objects in a large object area to a remapping table having a second set of virtual addresses is determined. In a single batch, a request is received that includes the second set of virtual addresses and requests a remapping of the large objects to the second set of virtual addresses. The second set of virtual memory addresses is validated. The large objects are remapped to the second set of virtual memory addresses according to the request. The remapping results in a compaction so that the large objects are contiguous in the large object area. The remapping does not require copying data in physical memory.