摘要:
T cells are profiled with respect to their expression of antigen receptor. The cells are arrayed on a planar or three-dimensional substrate through binding to immobilized or partially diffused MHC-antigen complexes. The cells may further be characterized with respect to their ability to respond to external stimulus in the microenvironment. External stimuli include cell-cell interactions, response to factors, and the like.
摘要:
Cells are profiled with respect to their expression of cell surface molecules, and ability to respond to external stimulus in the microenvironment. External stimuli include cell-cell interactions, response to factors, and the like. The cells are arrayed on a planar or three-dimensional substrate through binding to immobilized or partially diffused probes. Probes of interest include specific binding partners for cell surface molecules, signaling cues that act to regulate cell responses, differentiation factors, etc., which may be arrayed as one or a combination of molecules.
摘要:
T cells are profiled with respect to their expression of antigen receptor. The cells are arrayed on a planar or three-dimensional substrate through binding to immobilized or partially diffused MHC-antigen complexes. The cells may further be characterized with respect to their ability to respond to external stimulus in the microenvironment. External stimuli include cell-cell interactions, response to factors, and the like.
摘要:
Ruggedized voice and data communication systems are disclosed having ruggedized enclosures for housing a communications board with at least one transceiver and a plurality of interfaces. The system has a power supply configured to receive a first voltage and convert the first voltage to a second voltage and provide the second voltage to the communications board.
摘要:
A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be submitted at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries.
摘要:
A system and methodology for visually representing user activity associated with an information resource is described. User activities are associated with symbolic representations of those user activities. To visually convey selected aspects of the user activity, the activity is mapped to visual attributes that alter the appearance of the symbolic representation. The result is a dynamic and universal representation of user activities that aide online users to efficiently discern the relevancy and popularity of an information resource.
摘要:
A node card includes a substrate having a connector that communicates a plurality of signals between the substrate and an outside entity. One or more nodes are connected to the substrate, and the one or more nodes receive power from one or more signals communicated over the connector. The one or more nodes also communicate with the outside entity using the one or more signals communicated over the connector.
摘要:
A security system includes at least one audio sensor and an alarm panel that transmits alarm report data through a communications network to at least one alarm receiver located at a central station remote from the premises that receives the alarm report data transmitted from the alarm panel through the communications network. A line card receives the alarm report data. An alarm receiver processor receives and processes regulated alarm report data in accordance with Underwriter Laboratories 1610 requirements. The line card is operable for receiving non-regulated alarm report data that is not regulated in accordance with Underwriter Laboratories 1610 requirements. The line card includes a secondary communications channel interfaced to a central station automation system and routes the regulated alarm report data to the central station automation system over the secondary communications channel and bypasses the alarm receiver processor.
摘要:
The present invention relates to novel compositions of therapeutic cyclodextrin containing polymeric compounds designed as a carrier for small molecule therapeutics delivery and pharmaceutical compositions thereof. These cyclodextrin-containing polymers improve drug stability and solubility, and reduce toxicity of the small molecule therapeutic when used in vivo. Furthermore, by selecting from a variety of linker groups and targeting ligands the polymers present methods for controlled delivery of the therapeutic agents. The invention also relates to methods of treating subjects with the therapeutic compositions described herein. The invention further relates to methods for conducting pharmaceutical business comprising manufacturing, licensing, or distributing kits containing or relating to the polymeric compounds described herein.
摘要:
A system and method are provided that support a routing using a tree-like or graph topology that supports multiple links per node, where each link is designated as an Up, Down, or Lateral link, or both, within the topology. The system may use a segmented MAC architecture which may have a method of re-purposing MAC IP addresses for inside MACs and outside MACs, and leveraging what would normally be the physical signaling for the MAC to feed into the switch.