摘要:
A label assembly for application on a piece of process equipment is provided. The label assembly includes a label positioned on the piece of process equipment. A layer of generally transparent silicone coats the process equipment over the label. At least one layer of generally transparent tape covers the layer of silicone over the label. A method for providing a label assembly is also provided.
摘要:
A method, apparatus, and article of manufacture for a transformation lineage model. Data stored on a data storage device connected to a computer is navigated. In response to receiving user input, a target object in an information catalog is selected. Then, information about a source from which the target object was derived is provided.
摘要:
The present invention provides a digital content production system which appropriately arranges information in a blank region present in a layout area in an easy-to-read layout without destroying layout consistency. The present invention can include a content delivery terminal that lays out a digital content by selecting the digital contents in a content registration data base based on user information, and by arranging a variety of pieces of information forming the selected digital contents into a predetermined frame in a layout area. When a blank region is present in the layout area after information forming the digital contents is arranged in the layout area, one of the information arrangement processes for arranging information into the blank region through respective different methods is searched for and retrieved based on the size of the blank region, and the information is arranged into the blank region by using the retrieved information arrangement process.
摘要:
A method is provided for describing a multimedia scene comprising a set of objects that can be animated. This method provides at least one item of information of optimization, provided for permitting, in a terminal, a selection of a scene rendering algorithm among a set of at least two available algorithms according to at least one criterion of optimization of an allocation of resources used for carrying out the scene rendering algorithm.
摘要:
The invention relates to methods and systems for predicting or estimating the melting temperature of duplex nucleic acids, in the presence of divalent cations, particularly duplexes of oligonucleotides which may be used as, for example, but not limited to primers or probes in PCR and/or hybridization assays. The methods and algorithms use novel formulas, having terms and coefficients that are functions of the particular nucleotide sequence, to estimate the effect of divalent cation salt conditions on the melting temperature.
摘要:
A digital mixer includes a plurality of channel strips respectively having rotary encoders in a console, stores a plurality of layers that determine assignments of a channel to each of the channel strips, and assigns a channel to each of the channel strips in accordance with a layer selected among the plurality of layers. Further, the digital mixer is configured to be able to assign to each of the rotary encoder a parameter of a channel assigned to a channel strip to which the rotary encoder belongs in a reverse layer of a selected layer, assuming that there is an obverse-reverse correspondence between a (2n−1)-th and a 2n-th layer among the plurality of layers for a natural number n, and to change the value of the parameter in accordance with operation of the rotary encoder.
摘要:
A computer user interface system and method arranges a set of information hosted on a computer into a set of books, where each book includes a subset of the set of information, labels each book with a respective portion of the subset of the set of information, and selects a book from the set of books. Selecting the book from the set of books includes steps of displaying the respective portions of the books as a book document image that includes pages which correspond to the respective portions of the books, generating a command for moving through the pages, displaying an animated image of the pages of the book document being at least one of flipped, scrolled, slid and flashed images, and selecting the book when a selected one of the pages containing a selection portion of the book is earlier displayed.
摘要:
The technique of the present invention intermediates between an arbitrary client and an arbitrary printer connecting with a network to actualize practical printing works. A print portal system utilizing a server connected to the network intermediates between the client and the printer to execute a printing operation. The client outputs a printing requirement, which specifies print data of interest and a printer as an output resource, to the print portal system. The print portal system converts the input print data into data of a general purpose format, which does not depend upon the type of the printer, and transfers the converted print data to the specified printer.
摘要:
Information is entered into a data record which utilizes a virtual environment. A user can direct an avatar in this environment and at least one location in the virtual environment is associated with a field of the data record and with one or more selectable information options for inclusion in the field. The user is provided with representations of the selectable information options distributed around the location and the position of the avatar in the virtual environment is monitored. In the event that the avatar moves into a predefined proximity with one of the representations of the selectable options, the selection of that one of the selectable options is detected and that selected one option is then stored in the associated field of the data record.
摘要:
A method and data processing system assesses the security vulnerability of a network by creating a system object model database representing a network. The system object model database supports the information data requirements of disparate network vulnerability analysis programs. The system object model database is exported to the disparate network vulnerability analysis programs. The network is analyzed with each network vulnerability analysis program to produce data results from each program. Data results are correlated to determine the security posture of the network.