Abstract:
The present invention relate to an autoantigen screening method by combining immunoaffinity chromatography, disease-related cell lines, and mass spectrometry technology, which offers greater screening efficiency and speed than known technologies. The method for screening autoantigen by using autoantibodies in patient's body by utilizing the chromatographic column packed with autoantibodies, through the affinity between autoantibody and autoantigen, and the extract of disease-related cell lines or pathological tissues, whereby an autoantigen screening platform is established.
Abstract:
The invention relates to an electrically-energized device for the rapid generation of steam or other vapors. The high-speed steam generator includes a wicked evaporator, a liquid reservoir, a liquid supply pipe, and a vapor transport tube. The evaporator consists of a low-thermal-conductivity porous wick, heated from a downward-facing grooved heating block that is in intimate contact with the upper surface of the wick structure. The grooved heating block is made of a copper block in which electric cartridge heaters are installed. As a heat load is applied on the heating block, an extremely steep temperature gradient is established immediately at the upper surface of the wick so that water from the saturated wick evaporates rapidly adjacent to the heated surface. Subsequently, menisci are formed at the vapor/liquid interface to develop a capillary force to pump subcooled liquid into the wick from the liquid reservoir. A plurality of grooves in the heating block allow the resulting vapor to instantaneously escape from the heated surface so that a high heat transfer rate from the heating block to the saturated wick can be maintained at all time.
Abstract:
The present disclosure is directed to a method for sending and receiving an encrypted message and a system thereof. The method includes steps of encrypting a message, transforming the encrypted message into network address, sending the network address to a receiver, and accessing a server according to the network address by the receiver, and a server decrypting the message, presenting the decrypted message to the receiver, and thereafter preventing the message from being accessed. Advantages include that any mobile phone capable of connection to a wireless network can read an encrypted message without installation of a decryption software on a mobile phone of a receiver.
Abstract:
The present disclosure relates to method and system for agenda management. A method for agenda management includes creating an agenda event and details of the agenda event by an initiator, configuring privacy attributes for the agenda event, and viewing by a receiver the details of the agenda event and a list of all participants of the event based on the privacy attributes. The method for agenda management further includes creating or editing agenda through web pages and sending the agenda or the updates of the agenda to participants as a file or a message. Participants may also view, download and/or forward the agenda through web pages. With privacy attributes, it could be easier for a user to search the agenda, sharing agendas having tertian privacy attributes with others, which balances the efficiency and privacy. In addition, the attributes can be manually amended by users.
Abstract:
The present disclosure is directed to a method for sending and receiving an encrypted message and a system thereof. The method includes steps of encrypting a message, transforming the encrypted message into network address, sending the network address to a receiver, and accessing a server according to the network address by the receiver, and a server decrypting the message, presenting the decrypted message to the receiver, and thereafter preventing the message from being accessed. Advantages include that any mobile phone capable of connection to a wireless network can read an encrypted message without installation of a decryption software on a mobile phone of a receiver.
Abstract:
Methods and systems for intelligently creating agenda events are disclosed. A method includes receiving a message, analyzing the received message, determining whether the received message is an agenda-type message based on a data format of the received message, and if it is determined as an agenda-type message, creating a first new agenda event. The method further includes determining message type based on a semantic analysis of the received message, and if it is determined as an agenda-type message, creating a second new agenda event. The method and the system for intelligently creating of agenda events create agenda events automatically, based on the characteristics of the received messages, thereby improving the efficiency of the agenda.
Abstract:
A method and system for detecting a source-related risk and generating an alert concerning the source-related risk are disclosed. Criteria of the source-related risk are defined. Thresholds associated with the source-related risk are defined. Every operation on an object is detected. If an operation on an object satisfies a criterion among the criteria or if the operation causes to exceed a threshold among the thresholds, an alert is generated for the operation.
Abstract:
A method and system for detecting a source-related risk and generating an alert concerning the source-related risk are disclosed. Criteria of the source-related risk are defined. Thresholds associated with the source-related risk are defined. Every operation on an object is detected. If an operation on an object satisfies a criterion among the criteria or if the operation causes to exceed a threshold among the thresholds, an alert is generated for the operation.
Abstract:
A display method that is used for a security device installed with a camera module and a display module includes A. when the security device captured a preset image by the camera module, the security device displaying an interface for entering a password by the display module, and B. when the password is successfully matched, the security device displaying a predetermined object by the display module. By hiding the interface for entering a password, the invention improves the security capability of the device and meets the requirement of information security at present.
Abstract:
An in-situ compressed specimen of copper interconnection micro column, which is a circular metal column formed in a PDMS hole, includes: a specimen part and a fixed end part for fixing the specimen; wherein the fixed end part is a circular or square plate structure, the specimen part is an upper part of the fixed end part; a main body of the present invention is of micron order, a forced direction of the specimen is consistent with a growth direction of the metal column. A method of electroplating copper column by adopting PDMS as template substrate is applied to overcome a problem that TSV is corrosive to the copper column during a silicon etching process so as to affect a mechanical property accuracy test, the method is advanced in shortening test process period, achieving good reproducibility and high yield.