摘要:
The present invention relates to a compound represented by the following formula: (I) or a pharmaceutically acceptable salt thereof, or a pharmaceutically acceptable solvate thereof, or a combination thereof, wherein Ro, R1, R1′, R2, R2′, R3 and n are defined herein. The present invention further relates to a method of treating a patient from endometreosis or uterine fibroids.
摘要:
A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.
摘要:
An inflatable container for housing fragile articles, such as bottles and the like, for protecting the enclosed article from breakage during shipping or transit. The container comprises a generally cylindrical inflatable housing shaped to conform to a specific bottle shape and having an inflation device for enabling user inflation. The housing has an open bottom end for receiving a bottle type article therein. An inflatable base is sized for mating engagement with said bottom end thereby covering said opening. A fastening apparatus is provided for securing the base to the housing, and a seal is provided between said housing bottom and said base thereby forming a hermetic seal for preventing escape of any solid, liquid, or vapor contents enclosed within the housing in the event of breakage.
摘要:
An improved method and apparatus of producing Ferrograms in which centrifugal force is used to facilitate the spread of a deposit of magnetically or electrically polarized or polarizable particles onto a substrate to facilitate subsequent analysis of the particles.
摘要:
The present invention relates to novel indazole derivatives having pharmacological activity, processes for their preparation, compositions containing them and uses of these compounds in the treatment of estrogen receptor beta mediated diseases.
摘要:
An improved method of producing a deposit of particles from a liquid medium carrier on a substrate for subsequent optical analysis of the particles, involves feeding the liquid medium carrying the particles to the substrate via a flexible tube which is not subjected to fluctuating lateral compressions. The invention has particular relevance to the making of Ferrograms from wear debris in a sample of machine lubricant.
摘要:
A clock has a clock face in the form of an axially symmetric solid, e.g. a sphere, a cone or a cylinder. Clock hands extend around the clock face following a helical path, and time-indicating markings are arranged on all the surfaces of the face. It is therefore possible for a complete set of these markings to be seen from any direction relative to the clock face. The hands are normally driven by a conventional clock movement, there being an hour hand and a minute hand. However, it would be possible in some applications to have only a single hand, e.g. a minute hand, and to drive the clock face relative to the hand. The markings are arranged along helical paths, corresponding to the helical shape of the hands.
摘要:
A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.
摘要:
A method for tracking machines on a network of computers. The method includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host.
摘要:
The present invention relates to novel indole derivatives having pharmacological activity, processes for their preparation, compositions containing them and the use of these compounds in the treatment of estrogen receptor beta mediated diseases.