摘要:
Direct-write lithography apparatus and methods are disclosed in which a transducer image and an image of crossed interference fringe patterns are superimposed on a photoresist layer supported by a substrate. The transducer image has an exposure wavelength and contains bright spots, each corresponding to an activated pixel. The interference image has an inhibition wavelength and contains dark spots where the null points in the crossed interference fringes coincide. The dark spots are aligned with and trim the peripheries of the corresponding bright spot to form sub-resolution photoresist pixels having a size smaller than would be formed in the absence of the dark spots.
摘要:
Direct-write lithography apparatus and methods are disclosed in which a transducer image and an image of crossed interference fringe patterns are superimposed on a photoresist layer supported by a substrate. The transducer image has an exposure wavelength and contains bright spots, each corresponding to an activated pixel. The interference image has an inhibition wavelength and contains dark spots where the null points in the crossed interference fringes coincide. The dark spots are aligned with and trim the peripheries of the corresponding bright spot to form sub-resolution photoresist pixels having a size smaller than would be formed in the absence of the dark spots.
摘要:
Direct-write lithography apparatus and methods are disclosed in which a transducer image and an image of crossed interference fringe patterns are superimposed on a photoresist layer supported by a substrate. The transducer image has an exposure wavelength and contains bright spots, each corresponding to an activated pixel. The interference image has an inhibition wavelength and contains dark spots where the null points in the crossed interference fringes coincide. The dark spots are aligned with and trim the peripheries of the corresponding bright spot to form sub-resolution photoresist pixels having a size smaller than would be formed in the absence of the dark spots.
摘要:
Direct-write lithography apparatus and methods are disclosed in which a transducer image and an image of crossed interference fringe patterns are superimposed on a photoresist layer supported by a substrate. The transducer image has an exposure wavelength and contains bright spots, each corresponding to an activated pixel. The interference image has an inhibition wavelength and contains dark spots where the null points in the crossed interference fringes coincide. The dark spots are aligned with and trim the peripheries of the corresponding bright spot to form sub-resolution photoresist pixels having a size smaller than would be formed in the absence of the dark spots.
摘要:
Systems and methods for enabling a viewer of a motion art form to select an object of interest from within the motion art form are disclosed. The system includes a computing device configured to: receive at least one selection signal from at least one viewer; synchronize the at least one selection signal with an elapse time of the motion art form; and transmit the at least one selection signal to a destination.
摘要:
Systems and methods for protecting against cyber threats are disclosed. The system includes an external network accessing layer (ENAL) and a core computing asset overlaid by the ENAL. The ENAL comprises at least one external network access cell (ENAC), wherein the at least one ENAC contains at least one communications port, one or more processors, working and storage memories and is configured to be connectable to an external network and to inspect data received from the external network. The core computing asset is overlaid by the ENAL and comprises at least one core computer configured to not be connected to the external network but to be capable of being connected to the ENAL. The core computing asset contains data and software that are to be protected from cyber threat.
摘要:
Systems and methods for protecting against cyber threats are disclosed. The system includes an external network accessing layer (ENAL) and a core computing asset overlaid by the ENAL. The ENAL comprises at least one external network access cell (ENAC), wherein the at least one ENAC contains at least one communications port, one or more processors, working and storage memories and is configured to be connectable to an external network and to inspect data received from the external network. The core computing asset is overlaid by the ENAL and comprises at least one core computer configured to not be connected to the external network but to be capable of being connected to the ENAL. The core computing asset contains data and software that are to be protected from cyber threat.
摘要:
A sealable pipe adaptor is mounted directly on a hydrocarbon well head. A central branch is used for a drilling operation. The central branch has a first valve that is normally open and controllable during the drilling operation. The first valve contains a first sensor that is a shut-off sensor that shuts the first valve when a gush of oil or gas flow above a first preset safety threshold is detected. A first side branch has a second valve that is controllable during the drilling operation and during a production mode. The first side branch valve has a second sensor that opens the second valve when detecting a rogue hydrocarbon flow so that the rogue hydrocarbon flow is directed through the first side branch. The first side branch is connected to storage. A second side branch is connected to a production pipe. The first side branch has a third valve controllable from a production collection terminal. The third valve is normally closed during the drilling operation and is normally open during the production mode. The third valve contains a third sensor that is a shut-off sensor that shuts the third valve when a gush of oil or gas flow that is above a second preset safety threshold is detected.
摘要:
A sealable pipe adaptor is mounted directly on a hydrocarbon well head. A central branch is used for a drilling operation. The central branch has a first valve that is normally open and controllable during the drilling operation. The first valve contains a first sensor that is a shut-off sensor that shuts the first valve when a gush of oil or gas flow above a first preset safety threshold is detected. A first side branch has a second valve that is controllable during the drilling operation and during a production mode. The first side branch valve has a second sensor that opens the second valve when detecting a rogue hydrocarbon flow so that the rogue hydrocarbon flow is directed through the first side branch. The first side branch is connected to storage. A second side branch is connected to a production pipe. The first side branch has a third valve controllable from a production collection terminal. The third valve is normally closed during the drilling operation and is normally open during the production mode. The third valve contains a third sensor that is a shut-off sensor that shuts the third valve when a gush of oil or gas flow that is above a second preset safety threshold is detected.
摘要:
Systems and methods for protecting against cyber threats are disclosed. The system includes an external network accessing layer (ENAL) and a core computing asset overlaid by the ENAL. The ENAL comprises at least one external network access cell (ENAC), wherein the at least one ENAC contains at least one communications port, one or more processors, working and storage memories and is configured to be connectable to an external network and to inspect data received from the external network. The core computing asset is overlaid by the ENAL and comprises at least one core computer configured to not be connected to the external network but to be capable of being connected to the ENAL. The core computing asset contains data and software that are to be protected from cyber threat.