摘要:
A process of accessing media resources on Android capable wireless devices running an i-jetty HTTP server from a personal Internet interface device such as the Sony Dash. Activating a servlet on the Android device to transmit an IP address to a Dash capable device and establishing a wireless communication connection from the Dash device to the Android device using the IP address. Operating a service on the Dash device that accesses multimedia resources on the Android device where the Android device dynamically generates multimedia metadata for extraction and display on the Dash device. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.
摘要:
Systems and methods to manage same-origin-policy (SOP) failures that occur in a computing environment are provided. In an illustrative implementation, an exemplary computing environment comprises a lockbox module, and an instruction set comprising at least one instruction directing the lockbox module to process data and/or computing application execution commands representative of and a request for a selected operation/feature according to a selected SOP management paradigm. In the illustrative implementation, the SOP management paradigm comprises one or more instructions to deploy a “lockbox” computing application element allowing for the management, monitoring, and control of computing application features/operations operable under a same origin policy.
摘要:
The invention discloses a wastewater processing method of hydrolysis-acidification enhanced by addition of zero-valent iron (ZVI), including the following steps: 3˜6 ZVI-filling layers are settled in the middle of an anaerobic hydrolysis-acidification reactor. Excess sludge taken from sewage treatment plant using as seed sludge is added into this anaerobic hydrolysis-acidification reactor for startup and domestication. In the present invention, ZVI are added into this anaerobic hydrolysis-acidification reactor to accelerate organic matters degradation and produce more acetic acids, accompanied with higher COD removal obtained. ZVI can be protected from rust in this anaerobic biological environment due to the air isolation. Also, ZVI can enhance anaerobic hydrolysis of wastewater through reducing refractory pollutants involved in wastewaters. This novel method made the effluent from the hydrolysis-acidification reactor present less COD concentration and simpler substrate form, benefiting for the following anaerobic methanogenesis or aerobic treatment.
摘要:
The invention, belongs to the field of wastewater treatment technology, is a two-phase anaerobic reactor enhanced by addition of zero valent iron (ZVI). In the reactor, 2˜4 ZVI-filling layers are settled in the middle of the anaerobic hydrolysis-acidification tank, the effluent of which is fed into the rear anaerobic methanogenic tank. The degradation of organics is effectively enhanced in the anaerobic hydrolysis-acidification tank with dosing of ZVI, which may produce more acetic acid that is a desired substrate for the subsequent methanogenesis. Meanwhile, the acidic environment of the hydrolysis-acidification tank is helpful for the dissolution of ZVI to maintain its activity. The reactor is reasonably designed with high performance and strong shock resistance in anaerobic treatment of various wastewaters. Tests in lab-scale showed that hydrolysis-acidification and methanogenesis in this combined system were significantly improved compared with a reference reactor without addition of ZVI.
摘要:
This invention relates to a tubular cracking furnace, especially an ethylene cracking furnace, which comprises a convection section and a or dual radiant section(s), at least one heat transfer intensifying member arranged in at least one pass each radiant tube in said radiant section, said at least one heat transfer intensifying member comprises a first heat transfer intensifying member, which is arranged at a location between 10D and 25D upstream of the extreme point of said at least one pass radiant tube metal temperature, wherein D is the inner diameter of the radiant tube having heat transfer intensifying members. The present invention could achieve the best enhanced heat transfer result with given number of heat transfer intensifying member, by optimizing the locations of heat transfer intensifying members in the radiant tube.
摘要:
A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.
摘要:
A method of insulating a coil of an electrical machine includes applying an insulating varnish to a coil of conductive wire. The varnish includes (i) a resin; (ii) a first catalyst having a first activation temperature, the first catalyst being active at room temperature; and (iii) a second catalyst with a second activation temperature substantially higher than the first activation temperature. The varnish is allowed to partially cure at room temperature. The coil is mounted to a yoke to form a rotor of the electrical machine. The rotor is operated so as to heat the coil and activate the second catalyst to complete curing of the varnish.
摘要:
An intelligent locking device comprises a microprocessor, a locking element and a control button electrically connected to the microprocessor respectively. The locking element locks a removable HDD to a computer. The control button generates trigger signals in response to manual push thereon. When receiving the trigger signal, the microprocessor detects whether there is data transferring between the removable HDD and the computer, if there is data transferring, the microprocessor terminates data transferring and then sends a driving signal to the locking element; if not, the microprocessor directly sends a driving signal to the locking element. When receiving the driving signal, the locking element releases the lock between the removable HDD and the computer to permit the removable HDD to be safely ejected. Meanwhile, a removable HDD receiving system with the locking device and a method for preventing the removable HDD from being wrongly ejected from the receiving system are disclosed.
摘要:
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic flaws in GUI implementation. The invention described here is a technology for uncovering these flaws using a systematic reasoning approach. Major steps in the technology include: (1) mapping a visual invariant to a program invariant; (2) formally modeling the program logic, the user actions and the execution context, and systematically exploring the possibilities of violations of the program invariant; (3) finding real spoofing attacks based on the exploration.
摘要:
Highly specific hammerhead ribozymes are provided that human target estrogen receptor mRNA. These ribozymes, designated RZ1 through RZ7 provide predictable mRNA cleavage products. Methods for inhibiting estrogen-dependent tumor growth, such as that characteristic of breast cancer, are also provided employing these ribozymes. One or both of the ribozymes may be used together or separately with equal efficiency. The ribozymes possess a sequence region with a catalytic core that provides the attributed catalytic activity to these ribozymes.