摘要:
The A pile-driving apparatus includes a pile, a shoe tip coupled to a toe of the pile, and a drill string disposed within the pile. The drill string includes a gripping device coupling the drill string to the pile and a hammer deployed into the pile such that the hammer is capable of transmitting a force to the shoe tip. A method, includes positioning a hammer in a pile such that the hammer is capable of transmitting a force to a shoe tip; positioning, in the pile, a portion of drill pipe having a gripping device to engage the pile; and deploying the pile beneath the surface of a body of water.
摘要:
A method and apparatus for driving a pile are disclosed. The pile-driving apparatus comprises a pile, a shoe tip coupled to a toe of the pile, and a drill string disposed within the pile. The drill string comprises a gripping device coupling the drill string to the pile and a hammer deployed into the pile such that the hammer is capable of transmitting a force to the shoe tip. The method, comprises positioning a hammer in a pile such that the hammer is capable of transmitting a force to a shoe tip; positioning, in the pile, a portion of drill pipe having a gripping device to engage the pile; and deploying the pile beneath the surface of a body of water.
摘要:
A method and system is provided by which unauthorized changes to the registry may be detected and that provides the capability to verify whether registry, or other system configuration data, changes that occur on a computer system are undesirable or related to possible malware attack before the changes become effective or are saved on the system. A method for verifying changes to system configuration data in a computer system comprises generating an identifier representing an entry in the system configuration data, packaging the identifier, and sending the packaged identifier to a client for verification. The identifier may be generated by hashing the first portion of the entry and the second portion of the entry to generate the identifier, or by filtering the first portion of the entry and hashing the filtered first portion of the entry and the second portion of the entry to generate the identifier.
摘要:
Methods and apparatuses are provided for deterring animals from entering or remaining in an area, comprising a motor which twists a twistable member, causing a noise generating member to generate noise by contacting the surface of a container, or a number of objects in the container. A method is also provided for deterring animals by generating randomly varying noises at randomly varying and aperiodic intervals. The method may further be implemented by causing an accumulation of torque in a twistable member, which at aperiodic or randomly varying intervals causes a noise generating member to move against a surface or against objects to produce randomly varying noises.
摘要:
Methods and devices for determining the concentration of a constituent in a physiological sample are provided. The blood sample is introduced into a test strip with portions of the blood sample being directed to both a first capillary and a second capillary. The first capillary configured to electrochemically determine a concentration of a first analyte in a blood sample by measuring a signal across a set of electrodes. The second capillary is configured to determine a hematocrit value of the blood sample by measuring a signal across a second set of electrodes.
摘要:
A magnetic swimmer restraint device including a magnetic cone assembly, a strap assembly, a bracelet remote assembly, and a pool assembly is disclosed. These assemblies in conjunction with one another provide a user with a portable restraining system for increased resistance swimming. A wearable strap assembly interacts with magnetic cone assembly that can be located on the lateral sides of a pool or in the pool itself. As a user swims past the magnetic cone assembly the wearable strap assembly becomes magnetically attracted to the magnetic cone assembly. The magnetic attraction of the strap assembly worn by the user to the magnetic cone assembly pulls the user towards the magnetic cone assembly. Thereby increasing swimming resistance. The magnet of the magnetic cone assembly may be an electromagnetic system to be turned on and off via a bracelet remote assembly.
摘要:
There is disclosed apparatus and processes for increasing fluidity of a flowing fluid. The apparatus may have a number of treatment chambers adapted to receive and pass the flowing fluid. In each treatment chamber a field is applied to the fluid. The fields may be parallel to the fluid's direction of flow, and may alternate in sequence. The fluidity of the fluid is increased through exposure to the fields.
摘要:
A drive apparatus having an axle and drive gear for the axle mounted within a housing, the drive gear capable of being drivingly coupled to a worm gear formed on an input shaft. An actuator extending into the housing and cooperating with the input shaft, where the actuator may rotate the input shaft about a point along the longitudinal axis of the input shaft between the first and second ends thereof to move the worm gear from a first position where it is engaged to and drives the drive gear and a second position where the worm gear does not contact the drive gear.
摘要:
A method and system is provided by which unauthorized changes to the registry may be detected and that provides the capability to verify whether registry, or other system configuration data, changes that occur on a computer system are undesirable or related to possible malware attack before the changes become effective or are saved on the system. A method for verifying changes to system configuration data in a computer system includes generating an identifier representing an entry in the system configuration data, packaging the identifier, and sending the packaged identifier to a client for verification. The identifier may be generated by hashing the first portion of the entry and the second portion of the entry to generate the identifier, or by filtering the first portion of the entry and hashing the filtered first portion of the entry and the second portion of the entry to generate the identifier.
摘要:
A method and system is provided by which unauthorized changes to the registry may be detected and that provides the capability to verify whether registry, or other system configuration data, changes that occur on a computer system are undesirable or related to possible malware attack before the changes become effective or are saved on the system. A method for verifying changes to system configuration data in a computer system comprises generating an identifier representing an entry in the system configuration data, packaging the identifier, and sending the packaged identifier to a client for verification. The identifier may be generated by hashing the first portion of the entry and the second portion of the entry to generate the identifier, or by filtering the first portion of the entry and hashing the filtered first portion of the entry and the second portion of the entry to generate the identifier.