摘要:
A method for expanding a tubular member in a wellbore includes applying a downward force to an expansion cone through a work string to anchor the tubular member in the wellbore and pulling upwards on the expansion cone with the work string to expand the tubular member. The expansion cone is disposed in a launcher portion connected to the tubular member being expanded.
摘要:
A method for expanding a tubular member in a wellbore includes applying a downward force to an expansion cone through a work string to anchor the tubular member in the wellbore and pulling upwards on the expansion cone with the work string to expand the tubular member. The expansion cone is disposed in a launcher portion connected to the tubular member being expanded.
摘要:
An expandable tubular includes a tubular body and a sealing arrangement disposed on an external surface of the tubular body. The sealing arrangement includes a plurality of seals having a corrugation. A method of manufacturing a sealing arrangement for an expandable tubular includes arranging a plurality of seals about the circumference of an expandable tubular and forming corrugations in the plurality of seals such that the effective length of the plurality of seals is at least 5 percent greater than the circumference of the expandable tubular.
摘要:
A system and method to perform a system-wide file system image without time smear in a distributed object-based data storage system. A realm manager is elected as an image master using the Distributed Consensus Algorithm to execute image-taking. All pending write capabilities are invalidated prior to taking the system-wide file system image so as to quiesce the realm and prepare the storage system for the system-wide image. Once the system is quiesced, the image master instructs each storage manager in the system to clone each live object group contained therein without explicitly cloning any objects contained in such object group. In one embodiment, a file manager copies an object in the system before a write operation is performed on that object after the image is taken. Neither the cloning operation nor the copying operation update any directory objects in the system. At run time, a client application may use a mapping scheme to access objects contained in the system-wide image.
摘要:
Various embodiments provide systems for registering a user with one or more websites. Such systems comprise at least one processor configured to: receive an IP address for a computing device being used by the user; and after receiving the IP address: (1) obtain a location associated with the IP address; and (2) identify whether the user is in a jurisdiction that permits the user to register with a website. The systems may then receive one or more parameters obtained from the user, upon which the systems verify an age of the user; determine which of the one or more types of transaction activities the user is permitted to conduct; query one or more registration attempts over a predetermined previous time period to identify duplicate or similar parameters; and verify the user's identity based at least on one of the one or more parameters. Associated methods are also provided.
摘要:
A method for detecting multi-user signals including conducting a first energy burst detection detecting a first plurality of user signals as a first energy burst, attempting to decode a user signal from the first plurality of signals within the first energy burst, cancelling out a first user signal from the first energy burst if the first user signal is successfully decoded from the first energy burst, determining a second user signal to be discarded if the second user signal is not successfully decoded from the first energy burst, conducting a second energy burst detection detecting a second plurality of signals as a second burst, and iteratively cancelling out the first user signal successfully decoded from the first energy burst from the second energy burst, wherein the second energy burst detection is conducted when all user signals within the first energy burst are either cancelled out or determined to be discarded.
摘要:
Various embodiments provide systems and methods for monitoring a user over at least two websites. The systems and methods are configured to: (a) receive self-exclusion information from the user; (b) after receiving the self-exclusion information: (1) associate a unique user identifier that identifies the user with the self-exclusion information; and (2) store the unique user identifier and the self-exclusion information; (c) receive a first request from a first website to validate whether the user can engage in one or more first types of transaction activities; (d) after receiving the first request: (1) query the memory based on the unique user identifier; and (2) in response, send the first website a first indication that the user is excluded from engaging in the at least one of the first types of transaction activities. Second requests for a second website are then handled analogously. Associated methods are likewise provided.
摘要:
A method of drilling and lining a wellbore includes operably coupling a support member to a drilling device, an expansion cone configured to expand a tubular member, an actuator configured to pull the expansion cone through the tubular member, a releasable locking device configured to limit displacement of the tubular member relative to the actuator during actuation. The drilling device is disposed below the expansion cone and the expansion cone is disposed at a lower end of the tubular member. The method further includes locking the locking device. After locking the locking device, a wellbore is drilled to have a diameter greater than an outside diameter of the tubular member. After the drilling, the actuator is actuated to pull the expansion cone towards the locking device to expand at least a portion of the tubular member into contact with the drilled wellbore. The method further includes releasing the locking device and removing the drilling device through the expanded tubular member.
摘要:
Various embodiments of the invention provide a more secure financial transaction system for e-commerce sectors that (1) more securely processes payment transactions, (2) helps to protect merchants and banks against fraudulent transactions, money laundering, and underage gambling, and (3) helps to limit other abuses in areas of e-commerce that are perceived to pose special risks, such as Internet gaming, travel, and consumer purchasing of electronic goods. To accomplish the above goals, various embodiments of the financial transaction system (1) establish operating and transaction processing protocols for merchants, Internet payment service providers, acquiring banks, and card schemes and (2) provide automated systems for monitoring and securely processing payment and financial transactions.
摘要:
The invention is related to a method of altering the metabolism of a plant by carrying out the steps of treating seeds of the plant with non-genetically engineered selected mutant pink-pigmented facultative methylotroph having a plant altering capability, and growing the plants from the treated seeds, wherein the plants that grow from such treated seeds exhibit an altered characteristic relative to non-treated plants.