摘要:
Aerodynamic seals for use with control surfaces on aircraft are described herein. In one embodiment, a seal assembly for use with an aircraft includes a first seal member and a second seal member. The first seal member has a first proximal portion configured to be attached to a fixed airfoil portion of the aircraft, and a first distal portion configured to extend outwardly from the fixed airfoil portion toward a movable control surface. The second seal member has a second proximal portion configured to be attached to the movable control surface, and a second distal portion configured to extend outwardly from the control surface toward the fixed airfoil portion. In this embodiment, the second distal portion is further configured to movably contact the first distal portion to at least partially seal the gap between the fixed airfoil portion and the movable control surface as the control surface moves relative to the fixed airfoil portion.
摘要:
Small and medium sized enterprises are often in need of short-term financing, such as via invoice financing. However, peer-to-peer invoice financing platforms are vulnerable to fraud, and in particular duplication in the selling of invoices. The present invention allows the ledger of prior art blockchains to be decoupled to improve operational efficiency.
摘要:
A first security processing stage performs a first multitude of tasks and a second security processing stage performs a second multitude of tasks. The first and second multitude of tasks may include common tasks. The first security processing stage is a prefilter to the second security processing stage. The input data received as a data stream is first processed by the first security processing stage, which in response, generates one or more first processed data streams. The first processed data streams may be further processed by the second security processing stage or may bypass the second security processing stage. The first security processing stage operates at a speed greater than the speed of the second security processing stage.
摘要:
A programmable finite state machine (FSM) includes, in part, first and second memories, and a selection circuit coupled to each of the memories. Upon receiving a (k+m)-bit word representative of the k-bit input symbol and the m-bit current state, the first memory supplies one ore more matching transition rules stored therein. The selection circuit selects the most specific of the supplied rules. The transition rules are stored in the first memory in a ranking order of generality. The second memory receives the selected transition rule and supplies the next state of the FSM. The first memory may be a ternary content addressable memory and the second memory may be a static random access memory. The contents of both the content addressable memory and the static random memory is determined by an algorithm which minimizes the number of terms required to represent the next-state transition functions.
摘要:
A programmable finite state machine (FSM) includes, in part, first and second memories, and a selection circuit coupled to each of the memories. Upon receiving a (k+m)-bit word representative of the k-bit input symbol and the m-bit current state, the first memory supplies one ore more matching transition rules stored therein. The selection circuit selects the most specific of the supplied rules. The transition rules are stored in the first memory in a ranking order of generality. The second memory receives the selected transition rule and supplies the next state of the FSM. The first memory may be a ternary content addressable memory and the second memory may be a static random access memory. The contents of both the content addressable memory and the static random memory is determined by an algorithm which minimizes the number of terms required to represent the next-state transition functions.
摘要:
The present invention relates to a pharmaceutical composition comprising compound for induction of apoptosis, a method for inducing cancer cell apoptosis, a method to suppress lymphocyte activation, a method to improve intracellular trafficking of misfolded mutants and a screening method to identify additional compounds useful for inducing apoptosis, and more specifically, it relates to pharmaceutical compositions comprising imidazole derivatives as active gradients for induction of apoptosis to treat various diseases including cancers and immune-related diseases, the method of inducing apoptosis by treating cancer cells with the pharmaceutical composition, the method of inactivating human lymphocytes by treating lymphocytes with the pharmaceutical composition, the method of improving intracellular trafficking of misfolded mutants by treating cells containing the mutants with the pharmaceutical composition, and the screening method for identifying additional compound useful for inducing apoptosis, wherein cells are incubated with the said pharmaceutical composition and detected.
摘要:
A programmable finite state machine (FSM) includes, in part, first and second memories, and a selection circuit coupled to each of the memories. Upon receiving a (k+m)-bit word representative of the k-bit input symbol and the m-bit current state, the first memory supplies one ore more matching transition rules stored therein. The selection circuit selects the most specific of the supplied rules. The transition rules are stored in the first memory in a ranking order of generality. The second memory receives the selected transition rule and supplies the next state of the FSM. The first memory may be a ternary content addressable memory and the second memory may be a static random access memory. The contents of both the content addressable memory and the static random memory is determined by an algorithm which minimizes the number of terms required to represent the next-state transition functions.
摘要:
An accelerated network intrusion detection and prevention system includes, in part, first, second and third processing stages. The first processing stage receives incoming packets and generates, in response, first and second processed data streams using a first set of rules. The first processing stage optionally detects whether the received packets are suspected of attacking the network and places the received data packets in the first processed data stream. The second processing stage receives the first processed data stream and generates, in response, a third processed data stream using a second set of rules. The second processing stage optionally classifies the first processed data stream, that is suspected of launching a network attack, as either attacks or benign network traffic. A third processing stage receives and processes the second and third processed data streams.
摘要:
A programmable finite state machine (FSM) includes, in part, first and second memories, and a selection circuit coupled to each of the memories. Upon receiving a (k+m)-bit word representative of the k-bit input symbol and the m-bit current state, the first memory supplies one ore more matching transition rules stored therein. The selection circuit selects the most specific of the supplied rules. The transition rules are stored in the first memory in a ranking order of generality. The second memory receives the selected transition rule and supplies the next state of the FSM. The first memory may be a ternary content addressable memory and the second memory may be a static random access memory. The contents of both the content addressable memory and the static random memory is determined by an algorithm which minimizes the number of terms required to represent the next-state transition functions.