摘要:
The subject invention concerns methods for interrogating a surface using scanning ion conductance microscopy (SICM). In one embodiment, a method of the invention comprises the steps of: a) repeatedly bringing a SICM probe into proximity with the surface at discrete, spaced locations in a region of the surface and measuring surface height at each location; b) estimating surface roughness or other characteristic for the region based upon the surface height measurements; and c) repeatedly bringing the probe into proximity with the surface at discrete, spaced locations in the region, the number and location of which is based upon the estimated surface roughness or other characteristic in the region, and obtaining an image of the region with a resolution adapted to the surface roughness or other characteristic.
摘要:
A magnetic levitation imitation flame device includes a mounting base, a flame member, a positioning bracket, a first magnet, and a second magnet. The positioning bracket is fixed in the mounting base. The first magnet is disposed on the flame member. The flame member is disposed on the positioning bracket and protrudes outwards from the mounting base. The second magnet is fixed at a lower end of the positioning bracket. The first magnet and the second magnet are arranged up and down. Magnetic poles thereof facing each other have same polarity so that the flame member is levitated relative to the positioning bracket under a repulsive force of the first magnet and the second magnet. Thus, the flame member swings with big angle, naturally and realistically, and saves electric energy. In addition, an imitation flame lamp is also provided.
摘要:
Various examples are provided for renewable energy control. In one example, among others, a system includes a PV source, a multi-core processor load, and a solar power manager configured to adjust an operating point of the PV source about a maximum power point by dynamically adjusting a transfer ratio and a load level. In another example, a method includes sensing an output current supplied to a multi-core processor load by a power converter at a first transfer ratio, sensing another output current supplied at a second transfer ratio, and determining an operating point of the PV source with respect to a maximum power point based upon the output currents. In another example, a system includes a power manager configured to switch servers between a renewable energy supply and a utility energy supply based at least in part upon a budget level and the load power consumption.
摘要:
Various examples are provided for renewable energy control. In one example, among others, a system includes a PV source, a multi-core processor load, and a solar power manager configured to adjust an operating point of the PV source about a maximum power point by dynamically adjusting a transfer ratio and a load level. In another example, a method includes sensing an output current supplied to a multi-core processor load by a power converter at a first transfer ratio, sensing another output current supplied at a second transfer ratio, and determining an operating point of the PV source with respect to a maximum power point based upon the output currents. In another example, a system includes a power manager configured to switch servers between a renewable energy supply and a utility energy supply based at least in part upon a budget level and the load power consumption.
摘要:
The invention discloses a method for authenticating in end-to-end communications based on a mobile network, applied to a system including a first service entity requesting a service, a second service entity providing the service and an entity authentication center, EAC; respectively performing a mutual authentication between the first service entity and the EAC and that between the second service entity and the EAC according to the negotiated authentication mode; if the first service entity requests the second service entity to provide the service, the EAC providing authentication inquiring for the first service entity and the second service entity according to the negotiated authentication mode, and generating a shared derived key according to the negotiated authentication mode; and the first service entity and the second service entity authenticating each other according to the shared derived key and the negotiated authentication mode, and generating a session key for protecting the service.
摘要:
An endless electrophotographic member, such as a developer roller, which indicates an improved resistance to nip banding. The improvement to nip banding may be provided by the use of an organic salt within a roller surface region. The roller may provide, at a nip location, a resistive surface layer having an electrical resistance that avoids the development of nip banding and relatively dark regions on printed media.
摘要:
The claimed subject matter provides a system and/or a method that facilitates rendering a portion of an image from a server on a client. A portion of an image can be hosted by a server. A client can utilize a device to interact with the portion of an image via a network. The client can established two or more TCP/IP connections with the server in order to interact with the portion of the image. A pipe component can enforce an isolated pipeline and a processing thread for each of a user manipulation of the portion of the image, a transmission of a user request to manipulate the portion of the image via the network, a rendering of the portion of the image on the server, a compression of the portion of the image on the server, a transmission of the compressed portion of the image via the network, a decompression of the portion of the image on the client, and a display of the portion of the image on the client.
摘要:
The invention discloses a method for authenticating in end-to-end communications based on a mobile network, applied to a system including a first service entity requesting a service, a second service entity providing the service and an entity authentication centre, EAC; respectively performing a mutual authentication between the first service entity and the EAC and that between the second service entity and the EAC according to the negotiated authentication mode; if the first service entity requests the second service entity to provide the service, the EAC providing authentication inquiring for the first service entity and the second service entity according to the negotiated authentication mode, and generating a shared derived key according to the negotiated authentication mode; and the first service entity and the second service entity authenticating each other according to the shared derived key and the negotiated authentication mode, and generating a session key for protecting the service.
摘要:
A system and a method for security authentication, in which a biometric authentication subsystem in the security authentication system receives a biometric certificate held by the user and the user's biometric information from a user terminal; the biometric certificate contains the user's biometric template or the storage address of the biometric template; next, the biometric authentication subsystem authenticates the biometric certificate, performs matching between the biometric information and the biometric template, and generates the identity authentication result. The invention can also combine biometric authentication with PMI privilege authentication, so as to enhance security of identity authentication in PMI and widen applicability of biometric authentication.