摘要:
The reliability of mechanical testing of the hardness of cigarettes with one or more pivotable weights is enhanced by modifying the results of such testing on the basis of signals which are obtained by optically scanning the diameters of successive cigarettes prior to mechanically induced deformation. Optical scanning is carried out by triangulation with a fixedly mounted measuring head. The signals which are obtained with mechanical testing can be further influenced by taking into consideration the moisture content and/or the temperature of tobacco in tested cigarettes.
摘要:
The distributor of a cigarette rod making machine employs a zig-zag sifter which receives a mixture of tobacco ribs and shreds from a reservoir by way of a duct or an elevator conveyor. The shreds leave the uppermost stage of the sifter and are conveyed, by a Coanda separator, into an upright gathering duct which discharges shreds for delivery onto the concave surface(s) of one or more guides serving to direct one or more streams of shreds against the underside(s) of one or more foraminous belt conveyors which advance the stream(s) past one or more trimming devices serving to remove the surplus and to thus convert each stream into a rod-like filler which is ready to be draped into a web of cigarette paper. The removed surplus is returned into the reservoir or directly into the zig-zag sifter.
摘要:
The carding at the periphery of a driven wheel in the distributor of a cigarette rod making machine receives tobacco particles from the lower portion of a substantially upright duct the upper portion of which can receive tobacco particles from a magazine by way of an elevator conveyor. At least the lower portion of the duct is vibrated (e.g., at an amplitude of approximately 6 mm and at a frequency of 15-25 Hertz) in directions at right angles to the horizontal rotational axis of the wheel to thus enhance the homogeneousness of the carpet of particles being transported by the carding beyond the discharge end of the lower portion of the duct.
摘要:
A shower of tobacco particles is fed into the upper end of a downwardly sloping and downwardly tapering funnel-shaped part of a conveyor wherein the particles gather into a flow of interlaced particles. Successive increments of the flow are acted upon by one or more jets of air issuing from at least one nozzle which loosens successive foremost increments of the flow prior to admission into a tobacco filler rod forming unit in a cigarette rod making machine.
摘要:
The diameters of rod-shaped articles of the tobacco processing industry are ascertained while the articles are transported past a measuring station in the flutes of a drum-shaped conveyor moving along a range finder which measures the distance of each article of a series of articles from a reference point and transmits appropriate signals to an evaluating circuit wherein the diameters of successive articles are determined on the basis of comparison with a fixed reference distance of the bottoms of the flutes from the reference point. The beam of radiation which is emitted by the radiation source of the range finder is reflected by successive articles, and the intensity of reflected radiation is used to generate second signals which are processed into signals denoting a second diameter of each article. A third diameter of each article can be ascertained downstream of the range finder by an optoelectronic detector.
摘要:
A system, apparatus, method, and machine readable medium are described for implementing privacy classes within an authentication framework. For example, one embodiment of a method comprises: transmitting a query for client information from a server to a client, the client information including information related to authentication devices coupled to the client; analyzing the query to determine an appropriate privacy class to be used for providing client information to the server; providing a subset of client information selected based on the determined privacy class, the subset of client information including the information related to the authentication devices coupled to the client; and using the subset of client information within an authentication framework to provide user authentication services over a network.
摘要:
A system, apparatus, method, and machine readable medium are described for performing eye tracking during authentication. For example, one embodiment of a method comprises: receiving a request to authenticate a user; presenting one or more screen layouts to the user; capturing a sequence of images which include the user's eyes as the one or more screen layouts are displayed; and (a) performing eye movement detection across the sequence of images to identify a correlation between motion of the user's eyes as the one or more screen layouts are presented and an expected motion of the user's eyes as the one or more screen layouts are presented and/or (b) measuring the eye's pupil size to identify a correlation between the effective light intensity of the screen and its effect on the user's eye pupil size.
摘要:
Sifting arrangement for sifting a product stream. The sifting arrangement includes a zigzag sifter having at least one access opening and a sifting chamber that is divided into at least two compartments. The zigzag sifter is substantially vertically oriented. This Abstract is not intended to define the invention disclosed in the specification, nor intended to limit the scope of the invention in any way.
摘要:
A system, apparatus, method, and machine readable medium are described for implementing a composite authenticator. For example, an apparatus in accordance with one embodiment comprises: an authenticator for authenticating a user of the apparatus with a relying party, the authenticator comprising a plurality of authentication components; and component authentication logic to attest to the model and/or integrity of at least one authentication component to one or more of the other authentication components prior to allowing the authentication components to form the authenticator.
摘要:
A system, apparatus, method, and machine readable medium are described for performing advanced authentication techniques and associated applications. For example, one embodiment of a method comprises: receiving a policy identifying a set of acceptable authentication capabilities; determining a set of client authentication capabilities; and filtering the set of acceptable authentication capabilities based on the determined set of client authentication capabilities to arrive at a filtered set of one or more authentication capabilities for authenticating a user of the client.