摘要:
A compound of Formula I, or an isomer, pharmaceutically acceptable salt or solvate thereof, is provided. Also, a composition containing a compound of Formula I, or an isomer, pharmaceutically acceptable salt or solvate thereof, and a pharmaceutically acceptable carrier, excipient or diluents, is provided. Further, use of a compound of Formula I, or an isomer, pharmaceutically acceptable salt or solvate thereof for anti-apoptosis is provided, preventing or treating a disease or disorder associated with apoptosis; especially for protecting cardiomyocyte, preventing or treating a disease or disorder associated with cardiomyocyte apoptosis.
摘要:
A compound of Formula I, or an isomer, pharmaceutically acceptable salt or solvate thereof, is provided. Also, a composition containing a compound of Formula I, or an isomer, pharmaceutically acceptable salt or solvate thereof, and a pharmaceutically acceptable carrier, excipient or diluents, is provided. Further, use of a compound of Formula I, or an isomer, pharmaceutically acceptable salt or solvate thereof for anti-apoptosis is provided, preventing or treating a disease or disorder associated with apoptosis; especially for protecting cardiomyocyte, preventing or treating a disease or disorder associated with cardiomyocyte apoptosis.
摘要:
A method for identifying unknown virus program, includes: getting the behavior data of the program that would be tested, determining whether the said program is a virus program or not based on the behavior data of said program and the behavior data of pre-setting typical virus program. A method for deleting the virus program, according to the behavior of the virus program, sets and performs an anti-operation which is in reversed to the virus program, and gets back the destroyed data.
摘要:
The present invention discloses a method of recovering data corrupted by a virus program, comprising: obtaining a devastating behavior operation step that can be performed by the virus program; establishing a reverse behavior operation step corresponding to the devastating behavior operation step; performing the corresponding reverse behavior operation step in response to the devastating behavior operation step that can be performed by the virus program. The present invention further provides a method of removing a virus program, comprising: establishing reverse behavior operation steps corresponding to operation steps of the virus program, executing the reverse behavior operation steps and removing the program to be checked. The method of the present invention employs different reverse behavior operation steps for different virus programs, recovering data corrupted by a virus program, eliminates the defect that existing methods of removing a virus perform a identical processing step for any virus program, enabling the computer removed of the virus program to recover as far as possible to its previous state before infected by the virus program.
摘要:
Methods and structures are provided for formation of devices on substrates including, e.g., lattice-mismatched materials, by the use of aspect ratio trapping and epitaxial layer overgrowth. A method includes forming an opening in a masking layer disposed over a substrate that includes a first semiconductor material. A first layer, which includes a second semiconductor material lattice-mismatched to the first semiconductor material, is formed within the opening. The first layer has a thickness sufficient to extend above a top surface of the masking layer. A second layer, which includes the second semiconductor material, is formed on the first layer and over at least a portion of the masking layer. A vertical growth rate of the first layer is greater than a lateral growth rate of the first layer and a lateral growth rate of the second layer is greater than a vertical growth rate of the second layer.
摘要:
The invention relates to a technique of improving a contrast of a lower-layer pattern in a multi layer by synthesizing detected signals from a plurality of detectors by using an appropriate allocation ratio in accordance with pattern arrangement. In a charged particle beam device capable of improving image quality by using detected images obtained from a plurality of detectors and in a method of improving the image quality, a method of generating one or more output images from detected images corresponding to respective outputs of the detectors that are arranged at different locations is controlled by using information of a pattern direction, an edge strength, or others calculated from a design data or the detected image. In this manner, a detection area of the detected signals can be expanded by using the plurality of detectors, and the image quality such as the contrast can be improved by synthesizing the detected signals by using the pattern direction or the edge strength calculated from the design data or the detected images.
摘要:
Methods and structures are provided for formation of devices on substrates including, e.g., lattice-mismatched materials, by the use of aspect ratio trapping and epitaxial layer overgrowth. A method includes forming an opening in a masking layer disposed over a substrate that includes a first semiconductor material. A first layer, which includes a second semiconductor material lattice-mismatched to the first semiconductor material, is formed within the opening. The first layer has a thickness sufficient to extend above a top surface of the masking layer. A second layer, which includes the second semiconductor material, is formed on the first layer and over at least a portion of the masking layer. A vertical growth rate of the first layer is greater than a lateral growth rate of the first layer and a lateral growth rate of the second layer is greater than a vertical growth rate of the second layer.
摘要:
A method for detecting the operation behavior of the program includes: obtaining the destructive operation behavior of the known virus program; setting the corresponding control and process program according to the destructive operation behavior; making the control and process program get the control right of destructive operation behavior; the destructive operation behavior of the program to be detected calling the corresponding control and process program, the corresponding control and process program recording the operation behavior of the said program to be detected. The method can also return the success response information by the control and process program, so as to induce the program to be detected to perform the next behavior, but the program to be detected don't perform in practicality. That is, the present invention can provide a virtual environment for the program to be detected in order to record a series behavior of it. A method for clearing the virus program setup and perform the adverse behavior operation of the program based on the behavior of the virus program to realize the recovery of the demolished data by the virus.
摘要:
Lattice-mismatched epitaxial films formed proximate non-crystalline sidewalls. Embodiments of the invention include formation of facets that direct dislocations in the films to the sidewalls.
摘要:
In order to occur a collision warning to prevent the collision in accurate by detecting the preceding vehicle or target, a vehicle lane position estimation device comprising a means for measuring a distance between said host vehicle and said preceding vehicle or a oncoming vehicle, a direction angle from said host vehicle, an angular velocity and a velocity of said host vehicle, a means for calculating lateral and longitudinal distance between said host vehicle and said preceding vehicle or said oncoming vehicle, a means for capturing a front stationary object, a means for obtaining movement of the preceding vehicle or position of the oncoming vehicle, and a means to estimate a lane position of said front stationary object from a relationship of the stationary object being captured and the preceding vehicle being obtained and a positional relationship with the oncoming vehicle.