摘要:
A rotary tool accessory in one embodiment includes a base, a circular wall extending upwardly from the base about a central axis, the circular wall including an inner face, an outer face and a circular rim, a first cutting group including a first inwardly extending tooth extending from a location directly above the circular wall to a location closer to the central axis than the inner face, a first outwardly extending tooth extending from a location directly above the circular wall to a location farther from the central axis than the outer face, and a first gullet extending downwardly from the rim toward the base, a second cutting group including a second inwardly extending tooth, a second outwardly extending tooth, and a second gullet, and a toothless expanse of the rim extending between the first cutting group and the second cutting group.
摘要:
A system and method for measuring contact pressures between two surfaces, and especially, between the body and a device resting on the body, e.g., the skin and a breathable gas mask. A deformable, resilient probe having a flow passage therein is initially placed between the two surfaces such that the flow passage is blocked. Fluid pressure within the probe is then increased until the pressure in the probe overcomes the contact pressure between the two surfaces, such that fluid begins to flow through the flow passage in the probe. The pressure at which the fluid begins to flow through the flow passage in the probe is recorded as the contact pressure between the two surfaces. Contact pressure maps created using this apparatus and method may be used to create anthropometric models of the face and other body parts.
摘要:
A method of removing particulates from an ink ejection face of a printhead is provided. The method comprises the steps of: (i) flooding the face with ink from the printhead, thereby dispersing the particulates into the flooded ink; and (ii) transferring the flooded ink, including the particulates, onto a disposable sheet moving through a maintenance zone adjacent the face, wherein the sheet does not contact the face.
摘要:
A printhead maintenance assembly for maintaining a printhead in an operable condition is provided. The maintenance assembly comprises: (a) a printhead having an ink ejection face; (b) a first roller having an outer surface for receiving ink from the face; (c) a second roller engaged with said first roller, the second roller being configured for receiving ink from the first roller; (d) a cleaning pad in contact with the second roller; and (e) a mechanism for rotating the first and second rollers.
摘要:
A comfortable low-leak mask assembly for use with Non-Invasive Positive Pressure Ventilation (NIPPV) is provided to improve patient compliance and/or treatment. The mask system may include headgear having straps that are substantially inextensible and/or micro-adjustable; and/or a mask and/or cushion that includes various structures to allow enhanced/tailored sealing and/or fit at selected locations on the patient's face.
摘要:
Techniques are disclosed for capturing, storing, querying and analyzing provenance data for automatic discovery of enterprise process information. For example, a computer-implemented method for managing a process associated with an enterprise comprises the following steps. Data associated with an actual end-to-end execution of an enterprise process is collected. Provenance data is generated based on at least a portion of the collected data, wherein the provenance data is indicative of a lineage of one or more data items. A provenance graph that provides a visual representation of the generated provenance data is generated, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. The generated provenance graph is stored in a repository for use in analyzing the enterprise process.
摘要:
Techniques are disclosed for influencing behavior of enterprise operations during process enactment using provenance data. For example, a computer-implemented method of influencing a behavior of an enterprise process comprises the following steps. Provenance data is generated, wherein the provenance data is based on collected data associated with at least a partial actual execution of the enterprise process and is indicative of a lineage of one or more data items. A provenance graph is generated that provides a visual representation of the generated provenance data, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. At least a portion of the generated provenance data from the graph is analyzed to generate an execution pattern corresponding to the at least partial actual execution of the enterprise process. The execution pattern is compared to one or more previously stored patterns. A determination is made as to whether or not to alter the enterprise process based on a result of the comparison.
摘要:
Techniques are disclosed for influencing behavior of enterprise operations during process enactment using provenance data. For example, a computer-implemented method of influencing a behavior of an enterprise process comprises the following steps. Provenance data is generated, wherein the provenance data is based on collected data associated with at least a partial actual execution of the enterprise process and is indicative of a lineage of one or more data items. A provenance graph is generated that provides a visual representation of the generated provenance data, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. At least a portion of the generated provenance data from the graph is analyzed to generate an execution pattern corresponding to the at least partial actual execution of the enterprise process. The execution pattern is compared to one or more previously stored patterns. A determination is made as to whether or not to alter the enterprise process based on a result of the comparison.
摘要:
Techniques are disclosed for validating compliance with enterprise operations based on provenance data. For example, a computer-implemented method for validating that an enterprise process is in compliance with a rule comprises the following steps. Provenance data is generated, wherein the provenance data is based on collected data associated with an actual end-to-end execution of the enterprise process and is indicative of a lineage of one or more data items. A provenance graph is generated that provides a visual representation of the generated provenance data, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. A correlation is generated between one or more entities in the rule and one or more record types in the provenance data. One or more control points are generated in accordance with the generated correlation. A validation is performed as to whether the enterprise process is in compliance with the rule using the one or more control points.