摘要:
According to aspects of the present invention, metal oxide powder, such as yttria and alumina powder (feed material), is processed using a plasma apparatus. The process generally consists of in-flight heating and melting of the feed material by the plasma apparatus. The plasma apparatus contains a plasma torch with required power supply and cooling systems, a powder feeder, a chamber to collect the powder and a dedusting system. The heated powder forms molten spherical droplets that are rapidly cooled under free fall conditions. The plasma densification process removes some impurity oxides, modifies the morphology of the particle and increases the apparent density of the powder.
摘要:
A method and apparatus for link promotion for a navigation system allows expansion of search in a lower layer to determine an optimum climbing point to an upper layer to search an optimum route. The link promotion procedure includes the steps of determining whether an upper link exists for a lower link, setting the upper link as a promoted link if such an upper link exists even if a climbing node point does not exist that connect the lower link and the upper link, and comparing a candidate normal route and a promoted route to find an optimum route.
摘要:
A method of renting out one or more rooms by a Provider is disclosed. The Provider acquires a block of one or more rooms from an overnight accommodations operator for a long term basis. The Provider then sets a price for a room in a geographic area at a consistent price. The Provider then rents the room to a Customer, wherein the proceeds from the room rental are payable to the Provider.
摘要:
A method for use in diverse networks that authenticates inter-network resource requests. A router in a first network receives a request for a resource from a second network. The router sends a query to an element in the second network to determine whether the request actually originated there. If the request did originate from the second network, the request is processed according to the procedure for the requested resource. If the request did not originate from the second network, then the first network terminates the request. Thus, no network resources are consumed unnecessarily by accidental or malicious requests.
摘要:
A pharmaceutical composition comprising modafinil in the form of particles, wherein greater than 5% to about 50% of the cumulative total of the modafinil particles in the composition have a particle size greater than about 200 microns as determined by a U.S. Sieve No. 75. The present inventors have unexpectedly determined that the pharmaceutical compositions of the invention exhibit comparable stability, dissolution, and bioavailability as compared to Provigil® which is a commercially-available modafinil formulation.
摘要:
A pharmaceutical composition comprising fexofenadine or a pharmaceutical acceptable salt thereof, about 10 wt. % to about 70 wt. % of lactose, and about 1 wt. % to about 40 wt. % of a low-substituted hydroxypropyl cellulose, wherein the weight percents are based on the total weight of the pharmaceutical composition. The fexofenadine compositions of the invention exhibit improved bioavailability as expressed as Cmax, the maximum amount of active ingredient found in the plasma, or as AUC, the area under the plasma concentration time curve.
摘要:
A system, method and computer readable medium for targeting messages delivered by wireless communication comprising determining at least one target space within at least one wireless communications network, determining a notification list comprising at least one recipient in said at least one target space, determining at least one notification message, and transmitting said at least one notification message through said at least one wireless communications network to at least one recipient on said notification list.
摘要:
A system and method that routes special number calls from communications devices, including VoIP communications devices, to an answering point that is selected based on a parameter. A peering network effects parameter-based routing of calls to a pre-assigned answering point, wherein the voice path and the signaling paths are set up simultaneously. A gateway in the peering network is connected to the service provider switch and receives special number calls. The gateway queries a pre-provisioned parameter server that determines call routing information for the particular communications device. The gateway then selects another gateway, or, optionally, a selective router access provider network, based on the routing information and delivers the call thereto. The other gateway or selective router access provider network is connected to a router in the destination network and delivers the call and the call parameters to the router.
摘要:
Methods, systems, and computer program products are provided herein for facilitating security in an information technology environment. Web application security vulnerabilities are discovered and addressed by means of virtual patches deployed to components of the information technology environment. An intelligent feedback loop is created to fill the void in the security of the web application when implemented in the specific information technology environment, thereby providing end-to-end security application management through dynamic, pre-emptive, and proactive security awareness and protection in the information technology environment. As new web application security vulnerabilities are discovered, the vulnerability is diagnosed and resolved to preemptively prevent exploitation of the security vulnerability.
摘要:
A computer implemented method, a data processing system, and a computer usable recordable-type medium having a computer usable program code monitor a black box web application security scan. A black box scan of a web application is initiated. The black box scan sends a test is sent to a plurality of web application inputs of the web application. A runtime analysis is performed on the black box scan of the web application. Based on the run time analysis of the black box scan, the black box scan is modified.