摘要:
A heavy truck tire is provided with a bead design that has a bead core and a reinforcement ply that wraps around a section of the bead core and has a return casing ply. Bead filler is present that has a portion radially outward from the bead core and axially inboard from the return casing ply. A stiffener layer is present that has a portion located outboard from the return casing ply. The bead has a first bead layer with a portion between the return casing ply and the stiffener layer, and a second bead layer that has a portion outboard from the stiffener layer. The stiffness of the first and second bead layers is 8 MPa to 14 MPa. The stiffness of the bead filler is less than the stiffness of the first and second bead layers.
摘要:
A common infrastructure for performing a wide variety of loop optimization transformations, and providing a set of high-level loop optimization related “building blocks” that considerably reduce the amount of code required for implementing loop optimizations. Compile-time performance is improved due to reducing the need to rebuild the control flow, where previously it was unavoidable. In addition, a system and method for implementing a wide variety of different loop optimizations using these loop optimization transformation tools is provided.
摘要:
A method of using a non-wooden material to manufacture a shipping base is disclosed. Preferably, the shipping base is made from a plurality of non-wooden boards, such as those made from recycled siding materials or a plurality of particles secured together by a resin, and assembled into a shipping base. The boards are then glued, nailed, screwed or otherwise secured together in a desired shape. Additional features, such as styrofoam pieces and securing holes can be added as needed. By using non-wooden materials to make the shipping base, import restrictions, fines and bans on the importation of wood can be avoided to minimize the cost and burden of shipping non-wooden materials.
摘要:
A system, method, and computer program product are provided for verifying an identification of program information as unwanted. In use, program information is identified as unwanted at a client. Furthermore, the identification of the program information as unwanted is verified, utilizing a communication between the client and a server.
摘要:
A system, method, and computer program product are provided for reacting based on a frequency in which a compromised source communicates unsolicited electronic messages. In use, a source of at least two unsolicited electronic messages is identified as compromised. Additionally, a frequency in which the source communicated the unsolicited electronic messages is calculated. Furthermore, a reaction is performed based on the calculated frequency.
摘要:
A method and system for provides a user with an ability to capture a sample of an experiential environment and deliver that sample to an interactive service to trigger one or more predetermined events. In exemplary embodiments of the invention such triggered events include the delivery of information and services to the user, the execution of tasks and instructions by the service on the user's behalf, communication events, surveillance events and other control-oriented events that are responsive to the user's wishes. In other exemplary embodiments of the invention, the triggered events include transaction-oriented events, entertainment events, and events associated with enhancements to human ability or function.
摘要:
A malware detection system seeking to identify computer viruses, worms, Trojans, banned files and the like acts to determine from the file name, file size and storage location of a computer file being tested, whether that computer file potentially matches a specific known malware free computer file stored within a list of such specific known malware free computer files. If a match occurs indicating that the candidate computer file is potentially the specific known malware free computer file, then this is confirmed by calculating a checksum of the candidate computer file and comparing this against a stored corresponding checksum of the specific known malware free computer file. If these checksums match, then the candidate computer file can be passed as clean without requiring further time consuming malware detection scanning.
摘要:
A pretreatment process is described for heavy hydrocarbon oil feedstock, such as oils extracted from tar sands. The feedstock is passed through a heated, continuous flow electron or x-ray treatment zone. The process is designed to allow the feedstock to be conditioned with ozone-containing air, steam or a hydrogen donor gas prior to electron/x-ray treatment. The ozone-containing air stream may be the stream produced in the electron treatment zone. After conditioning, the heavy oil is heated to a specified temperature and uniformly treated with high-energy beams of electrons or x-rays. A key feature of the invention is the electron/x-ray treatment zone may use multiple accelerators or a beam splitter to ensure acceptable dose distributions in the flowing feedstock. Another key feature is the recirculation of volatiles back into the feedstock. According to the novel feature, the process produces a treated feedstock having a lower average molecular weight and boiling point than the original feedstock, without significant coke formation. The fraction of gas oil collected during distillation is increased significantly.
摘要:
A method, apparatus, and computer program product for using debug streams to control the amount of trace outputs when debugging software. As debug streams extend on the use of regular output streams, debug streams are very easy to use and simple to implement, while providing a high level of control over the verbosity of traces. A debug stream is created that includes a debug level setting to control the verbosity of the trace outputs. A determination is made as to whether the debug level setting in the debug stream is greater than a specified threshold level. Responsive to a determination that the debug level setting is greater than the specified threshold level, trace outputs are emitted to the debug stream.
摘要:
A system, method, and computer program product are provided for verifying an identification of program information as unwanted. In use, program information is identified as unwanted at a client. Furthermore, the identification of the program information as unwanted is verified, utilizing a communication between the client and a server.