摘要:
Devices and methods are provided for performing a test to detect and/or quantify the presence of an analyte of interest within a sample using a portable instrument.
摘要:
The invention provides methods, kits, and apparatus for increasing the sensitivity of immunoassays performed on environmental samples by reducing sample matrix effects.
摘要:
Detection devices and methods associated therewith are provided. In some embodiments, the detection system can be adapted to measure one or more analytes of interest possibly present in a sample through the use of binding reactions.
摘要:
A detection system may include a moveable tray configured to hold a multi-cell container of one or more reagents and/or one or more samples. A driving mechanism may be configured to reciprocate the tray in the first linear direction to agitate contents of the container, and may be configured to conduct electrochemiluminescence or other measurements on samples located in the container. The system may include an apparatus for retaining a container, a device for detecting the presence of a container, an apparatus for training a probe to locate and aspirate one or more reagents and/or one or more samples, a latching mechanism for moving parts in the system, and/or a positive displacement pump. A controller may be configured to control linear reciprocation of the tray to have one of a piecewise constant velocity profile and piecewise constant acceleration profile in which the number of piecewise constants does not exceed 24.
摘要:
A composition for deposition as a coating includes a matrix material having a molten fraction of between about 33% and about 90% by volume and a filler material interspersed within the matrix.
摘要:
This invention discloses a system for determining whether a purported or alleged authorized user is in fact the authorized user, by comparing new data on a real-time basis against probability distribution representations including an authorized user probability distribution representation and a global or wide population probability distribution representation, to provide a probability as to whether the purported authorized user is the authorized user. This invention may utilize keyboard dynamics, data, X-Y device data, or other data from similar measurable characteristics, to determine the probability that the new data from the purported authorized user indicates or identifies that user as the authorized user.
摘要:
A method of noninvasively obtaining a physiological parameter of a fluid vessel. A series of pressure values are applied to a region of the vessel to adjust the transmural pressure of the vessel wall. At each of the pressure values at least one of a pulse transit time and a pulse wave velocity through the region of the vessel is measured. At least one of vessel compliance and vessel segmentation is determined as a function of the pulse transit time or pulse wave velocity and the applied pressure.
摘要:
A torque-limiting driver includes a housing, a shaft carried by the housing for rotation relative thereto and having a workpiece-engaging tip projecting from the housing, a torque-limiting mechanism coupled between the housing and the shaft and responsive to rotation of the housing in a predetermined direction to rotate the shaft at torques below a predetermined torque and accommodating rotation of the housing relative to the shaft at said predetermined torque and above, a torque-determining structure disposed in the housing and movable relative to the torque-limiting mechanism for adjusting the predetermined torque, and the housing including a stop portion engageable with the torque-determining structure for preventing torque-adjusting movement thereof.
摘要:
A countermeasure for a computer security threat to a computer system is administered by establishing a baseline identification of an operating or application system type and an operating or application system release level for the computer system that is compatible with a Threat Management Vector (TMV). A TMV is then received, including therein a first field that provides identification of at least one operating system type that is affected by a computer security threat, a second field that provides identification of an operating system release level for the operating system type, and a third field that provides identification of a set of possible countermeasures for an operating system type and an operating system release level. Countermeasures that are identified in the TMV are processed if the TMV identifies the operating system type and operating system release level for the computer system as being affected by the computer security threat. The received TMV may be mutated to a format for processing of the countermeasure.
摘要:
A separation chamber comprising a solid walled container vessel having a removably sealable top which contains an inlet port, the chamber having an inner perforated screen wall with an outlet port positioned in the side of the vessel extending into the interior of the perforated screen inner wall, a static vacuum line communicating with the outlet line and the annular space between the solid outer container wall and the inner perforated screen wall, and a self-contained disposal bag having an inlet sleeve and an outlet sleeve, said bag design to conform to the contours of the inner perforated screen wall and said inlet sleeve for extending through the inlet port and the outlet sleeve for extending outwardly through said outlet port, both sleeves having a means for securing the sleeves in a closed and secure position once the disposal bag has become filled with particulate matter, the bag, complying with disposal requirements, then being deposited in an appropriate disposal area.