Abstract:
A method and system for extending the capabilities of resource-constrained embedded devices by leveraging the memory and processing resources of clients such as web browsers (“clients”) installed on host computational devices (“host computers”). The embedded device delegates computational tasks such as generation of content (e.g., user interfaces, reports, configuration files, etc.) to clients and acts as a simple file and data server. The embedded device provides static resource files to each client, including static template files and a client processing engine. The client processing engine: interprets processing instructions contained in static template files; utilizes managed communication channels to exchange dynamic data sets with the embedded device in real-time; generates various forms of content by processing, transforming, manipulating, and aggregating dynamic data sets and static resource files; and reads and writes arbitrarily large files from and to the host computer, overcoming resource limitations of the embedded device.
Abstract:
A mounting apparatus is configured for mounting a slide rail to a bracket. The bracket includes a flange with a plurality of mounting holes defined therein. A plurality of mounting rods is arranged on the slide rail for engaging in the corresponding mounting holes of the flange. The mounting apparatus includes a resisting member fixed to the slide rail, and an operating member pivotably attached to the resisting member. The resisting member includes a resisting portion configured for engaging with the flange. The operating member is capable of urging the resisting portion of the resisting member away from the flange.
Abstract:
The present invention discloses a user device for implementing direct penetrating communication between a user device under a NAT and another user device under a different NAT and a method for the same. Detection message is sent to an auxiliary detecting device in an external network through a selected local port. Then the reply message from said auxiliary detecting device will be received and the NAT-translated NAT source port of said detection message can be obtained. By comparing the NAT source ports of a plurality of detection messages, it can be determined whether or not the selected port is a penetrated port. After that, the corresponding NAT source address and NAT penetrated port will be informed to another user device under a different NAT (also, the NAT penetrated port and NAT source port determined by said another user device will be received via said external-network device). Therefore, said user device and the opposite-end user device directly communicating with each other through the determined local source port and with the received NAT external-network address and NAT port of the other party as the destination address and destination port.
Abstract:
It is disclosed a two-section type waste incinerator, wherein secondary air supplying holes (27e) are provided on a front arch and a back arch of an incinerator body (27), and an ignition combustion-supporting hole (27f) is provided on the back arch of the incinerator body. Grate inside the incinerator body (27) is divided into two sections from a high point to a low point, i.e., an upper section and a lower section, the upper section is a pusher type section (6) and the lower section is a reverse pusher type section (7), and an independent primary air chamber (26) is provided under each section. All heads of the grate-pieces (3, 5) on the pusher type section (6) face toward a low point of the grate, and all heads of the grate-pieces (3, 5) on the reverse pusher type section (7) face toward a high point of the grate. Each movable beam (4) on the same section of the grate is equipped with left and right levers (24, 25) disposed side by side, the left and right levers (24, 25) are supported by a supporting roller device respectively and are connected to the movable beam (4) to form a lever frame, and an end of the lever frame is connected to a front swing arm driving mechanism or a lateral swing arm driving mechanism or a front straight driving mechanism. The incinerator of the present invention can realize sufficient dryness, complete combustion and burnout of the whole waste layer, and ensure the desired waste incineration effect and ignition loss.
Abstract:
The present invention is to provide a method and apparatus for control on-demand play of media files based on P2P protocols, and its core idea lies in that, the download of the control information piece where the file control information is located is assigned with the highest priority when the on-demand play of streaming media files is implemented; while the download of the control information piece where the file control information is located and the index information piece where the index information is located are assigned with the highest priority, when the on-demand play of non-streaming media files is implemented, thereby playing while downloading of media files based on the P2P protocols.
Abstract:
A computer-readable storage medium having stored thereon computer-executable instructions which, when executed by a computer, cause the computer to implement an opinion search engine. The instructions to implement an opinion search engine cause the computer to collect opinion data about one or more objects from the Internet, extract metadata about the opinion data from the opinion data, remove duplicate metadata from the metadata to generate a resulting metadata, categorize the resulting metadata for similar objects according to one or more taxonomies from one or more websites on the Internet and rank the similar objects based on the categorized metadata.
Abstract:
The present invention discloses a user device for implementing direct penetrating communication between a user device under a NAT and another user device under a different NAT and a method for the same. Detection message is sent to an auxiliary detecting device in an external network through a selected local port. Then the reply message from said auxiliary detecting device will be received and the NAT-translated NAT source port of said detection message can be obtained. By comparing the NAT source ports of a plurality of detection messages, it can be determined whether or not the selected port is a penetrated port. After that, the corresponding NAT source address and NAT penetrated port will be informed to another user device under a different NAT (also, the NAT penetrated port and NAT source port determined by said another user device will be received via said external-network device).
Abstract:
A system and method are disclosed for providing documents related to a search request. The search request may include a search query of one or more keywords, or the search request may be a demographic search query including one or more demographic attributes. An index containing data crawled from publisher's websites, demographic information of registered users, along with the search history of the registered users can be created. Once a search request is received, the search request can be compared to the information stored in the index, and one or more documents related to the request can be provided.
Abstract:
A mounting apparatus is configured for mounting a slide rail to a bracket. The bracket includes a flange with a plurality of mounting holes defined therein. A plurality of mounting rods is arranged on the slide rail for engaging in the corresponding mounting holes of the flange. The mounting apparatus includes a resisting member fixed to the slide rail, and an operating member pivotably attached to the resisting member. The resisting member includes a resisting portion configured for engaging with the flange. The operating member is capable of urging the resisting portion of the resisting member away from the flange.
Abstract:
The invention provides a method of interactively crawling data records on a web page. Users may select various data records of interest on a web page to generate templates to search for similar data items on the same web page or on different web pages. A tree matching algorithm may be used to compare and extract data matching the generated template.