摘要:
The invention belongs to the field of medical detection and discloses a method and device for fast detecting nucleic acid. The pathogenic microorganism nucleic acid is carried out with amplification reaction by LAMP technology in a temperature-controlled reaction tube comprising at least a sealing layer, and after the reaction is completed, the temperature of the reaction tube is raised without opening the tube to dissolve the sealing layer to release the fluorescent dye for the fluorescence detection. The method can carry out the amplification reaction and fluorescence detection directly in the instrument without taking out the reaction tube. The device has advantages of simple structure, low cost and simple operation, and can be used as a fast detecting device for the pathogenic microorganism nucleic acid.
摘要:
A white-light LED red phosphor and method of manufacturing the same are provided. The luminescent materials are represented by the general formula: Ca1-y-m-e-rYyMmXx-pPpZzNn:Eue, Rf, wherein M is at least one selected from Sr, Ba, Sc, Li, Na and K; X is at least one selected from B, Al and Ga, and Al must be contained; Z is at least one selected from Si, V and Nb, and Si must be contained; R is at least one selected from Dy, Er, Tm and Lu, and Dy must be contained; 0.001≦y≦0.2, 0.001≦m≦0.2, 0.5≦x,z≦1.5, 0.001≦p≦0.1, 2≦n≦4, 0.001≦e≦0.2 and 0.001≦r≦0.1. The phosphor according to the present invention has features such as good chemical stability, high luminous efficiency, and good anti-luminous attenuation performance, etc.
摘要翻译:提供白光LED红色荧光体及其制造方法。 发光材料由以下通式表示:Ca1-y-m-e-rYyMmXx-pPpZzNn:Eue,Rf,其中M是选自Sr,Ba,Sc,Li,Na和K中的至少一种; X是选自B,Al和Ga中的至少一种,并且必须含有Al; Z是选自Si,V和Nb中的至少一种,必须含有Si; R是选自Dy,Er,Tm和Lu中的至少一种,并且必须含有Dy; 0.001 @ y @ 0.2,0.001 @ m @ 0.2,0.5 @ x,z @ 1.5,0.001 @ p @ 0.1,2 @ n @ 4,0.001 @ e @ 0.2和0.001 @ r @ 0.1。 本发明的荧光体具有化学稳定性好,发光效率高,防发光衰减性能好等特点。
摘要:
Techniques for migrating duration trees from a source database server (or instance) to a destination database server (or instance) are provided. A duration is a memory management construct that allows database components to group related areas of memory together. A source duration tree is captured at the source database server and combined with a destination duration tree at the destination database server. Any duration identifiers in the source duration tree that conflict with (i.e., are the same as) a duration identifier in the destination duration tree are mapped to new duration identifiers.
摘要:
An exemplary backlight module (300) includes a frame (350) and a bottom plate (370). One of the frame and the bottom plate includes a plurality of elastically deformable buckling structures (358), and the other of the frame and the bottom plate includes a plurality of protrusions (204, 374) corresponding to the buckling structures. When the bottom plate is attached to the frame, the bottom plate and the frame are pressed together along a first axis, and the buckling structures elastically deform and then elastically rebound such that the buckling structures are engaged with the protrusions and the bottom plate is fixed to the frame.
摘要:
An exemplary backlight module (300) includes a frame (350) and a bottom plate (370). One of the frame and the bottom plate includes a plurality of elastically deformable buckling structures (358), and the other of the frame and the bottom plate includes a plurality of protrusions (204, 374) corresponding to the buckling structures. When the bottom plate is attached to the frame, the bottom plate and the frame are pressed together along a first axis, and the buckling structures elastically deform and then elastically rebound such that the buckling structures are engaged with the protrusions and the bottom plate is fixed to the frame.
摘要:
A vaporization system and control method are provided. Liquid cryogen is provided to first ambient air vaporizer (AAV) units. When an output superheated vapor temperature is less than a threshold, the liquid cryogen is provided to second AAV units. When greater than or equal to the threshold, it is determined whether the second AAV units are defrosted. When defrosted, the liquid cryogen is provided to the second AAV units. When not defrosted, it is determined whether ice has formed on the first AAV units. When not formed, it is again determined whether the superheated vapor temperature is less than the threshold. When formed, it is determined whether a current ambient condition is favorable to defrosting the second AAV units. When not favorable, the liquid cryogen is provided to the second bank of AAV units. When favorable, it is again determined whether the superheated vapor temperature is less than the threshold.
摘要:
A method of validating timing issues in a gate-level simulation (GLS) of an integrated circuit design including multiple cells includes running a simulation routine of a behavioral model of the design and obtaining a first simulation result. If there is a possible timing violation at a cell corresponding to a forcing indeterminate value, the simulated output of the cell is forced to a first value and a second simulation result obtained. If this result is negative, a report of apparent timing violations at the cell is generated. If the second simulation result is positive, the output of the cell is then forced to a second value and a third simulation result is obtained. If this result is negative, a report of apparent timing violations at the cell is generated but, if it is positive, a report of no apparent timing violation is generated.
摘要:
Techniques are provided for a database server to identify a query that comprises an access check operator specifying a data access control policy, and if so, to re-write the query to produce an optimized query execution plan. A first technique rewrites a query comprising an access check operator based on the privileges associated with the database principal requesting the query. The rewritten query exposes the access predicates relevant to the requesting principal to subsequent database optimization processes. A second technique rewrites a query comprising an access check operator that specifies a data security policy that does not include a denied privilege. A third technique rewrites a query that comprises an access check operator specifying one or more database table columns that store row-specific access control lists. The rewritten queries are used to generate a query execution plan that provides for several query execution optimizations.
摘要:
A method and apparatus are described for scheduling content delivery in a peer-to-peer network, including receiving a message from a peer, classifying the received message, storing the classified message in one of a plurality of queues based on the classification, generating responses to messages based on a priority of the queue in which the classified message is stored and transmitting content to all peers in the peer-to-peer network. Also described are a method and apparatus for scheduling content delivery in a peer-to-peer network, including receiving one of a message and content from one of a content source server and a peer, classifying the received message, storing the classified message in one of a plurality of queues based on the classification, storing the received content, generating responses to messages based on a priority of the queue in which the classified message is stored and transmitting content to all other peers in the peer-to-peer network.