application_number
stringlengths 8
8
| year
int64 2k
2.02k
| title
stringlengths 4
324
| abstract
stringlengths 23
2.99k
| background
stringlengths 0
40k
| problem_source
stringlengths 142
40.2k
|
|---|---|---|---|---|---|
10990306
| 2,004
|
Card sheet construction
|
A card sheet including a top material having punched lines, the front side of the top material being printable. A carrier material of at least one polymer layer is directly applied as by extruding to the back side of the top material. The polymer has a stress-at-break in the range of 10 to 30 MPa and an elongation at break in the range of 10 to 120%. From the card sheet individual cards may be broken out to form high quality calling (business) cards, photograph cards, post cards or the like.
|
BACKGROUND OF THE INVENTION The present invention relates to sheets of calling or business cards, photograph cards, post cards and the like, methods of making them and methods of using them. The design of calling or business cards by simply printing them with commercially available laser or inkjet printers is of interest. Small size printable media, such as calling or business cards, cannot be individually printed with conventional laser or ink-jet printers due to their small format. For this reason, for printing calling cards by means of a laser printer or an inkjet printer, card sheets are usually initially used, from which the calling cards are separated after having been printed, leaving a residual “matrix” of the card sheet. In these card sheets a supporting structure is provided for the cards and a wide variety of embodiments are known for such card sheets and carriers. In a first class of card sheets, the matrix of the card sheet, or a portion of that matrix, itself acts as the carrier for the cards. Thus, there are calling card sheets in which the material is microperforated and the card is broken out along the microperforations to separate the cards from the matrix. The cards to be separated and having a microperforation are connected to the card sheet by material bridges. When the cards are separated from the card sheet, these bridges partially remain at the edges of the cards. These separation residues are unsightly and not desired especially for high-quality products, such as calling cards. In one variation of this first class of card sheet product, instead of microperforations, the card sheet includes die cut lines penetrating much but not all of the card sheets (“substantially cut” lines), and cards are separated from the surrounding matrix by severing the uncut portions of the substantially cut lines. Another variation uses a multi-layer structure for the card sheet, wherein one of the layers acts as the carrier material. In these variations, the same problem mentioned above may occur, i.e., unsightly residual material after separation of cards. Patent publications illustrating this first class of card products include: U.S. Pat. No. 5,853,837 (Popat, commonly assigned herewith; substantially cut lines); see also U.S. Patent Application 2001/0036525 A1 (Yokokawa; multilayer card structure). (The entire contents of all patents and other publications mentioned anywhere in this disclosure are hereby incorporated herein by reference.) In a second class of card product designs, the cards are completely cut from the surrounding matrix by cut punching, and one or more additional structures are used as a carrier for the cut cards. The structure of such cut-punched calling card sheets results from a printable top material and a carrier material applied to one side of the top material, the carrier material being bonded to the cards and to the matrix to support the cards within the matrix. One example of this second class of card products uses relatively narrow carrier strips or tapes, which are applied to the punched lines along the short side of the (A4) sheet, from which the printed card may be drawn off. The adhesive remains on the self-sealing tapes when the card is drawn off. A disadvantage of this construction is that the top material/carrier connection is relatively unstable, which impairs the feeding and transportation behavior in the printer. In addition, there is the danger that tape fibers are torn-off by the action of removing the cards from the adhesive tape. This embodiment is shown in U.S. Pat. No. 5,702,789 (Fernandez-Kirchberger et al.). Other versions of this second class of card sheet products use a “liner” sheet as the carrier, wherein the liner may be a full sheet corresponding to the top sheet, or may have sections removed from a full sheet. In so-called “dry-peel” constructions, the bond between the liner and the top sheet is created using an extruded polymer with a debondable interface to the top sheet or to the liner sheet. In removable or ultra-removable adhesive constructions, the bond is created using a removable adhesive between the top sheet and the liner sheet. When the cards are drawn off from the carrier, the adhesive remains on the reverse side of the card, which leads to a tangible and visible change as well as to a limited writeability of the reverse side of the card, which is judged to be of inferior quality. Alternatively, a method is known in which a calling card sheet, which initially was coated on the reverse side with a silicon layer, is fastened onto a carrier material with an adhesive. The calling card sheet is cut-punched and, after having been printed, the individual calling cards can be drawn-off from the carrier material. Due to the silicon layer, the adhesive remaining on the reverse side of the calling card can be avoided. These calling cards, however, have an altered smooth reverse side, which is undesirable. In addition, such a reverse side has the disadvantage that its writeability is inferior. A further disadvantage is that the card is easily bent when it is drawn off from the adhesive carrier. Examples of this second class of card sheet products and dry peel laminates are shown in U.S. Pat. No. 4,863,772 (Cross, commonly assigned herewith), and PCT Publication Nos. WO 00/16978 and WO 00/46316 (both of Avery Dennison Corporation).
|
Title:
Card sheet construction
Abstract:
A card sheet including a top material having punched lines, the front side of the top material being printable. A carrier material of at least one polymer layer is directly applied as by extruding to the back side of the top material. The polymer has a stress-at-break in the range of 10 to 30 MPa and an elongation at break in the range of 10 to 120%. From the card sheet individual cards may be broken out to form high quality calling (business) cards, photograph cards, post cards or the like.
Background:
BACKGROUND OF THE INVENTION The present invention relates to sheets of calling or business cards, photograph cards, post cards and the like, methods of making them and methods of using them. The design of calling or business cards by simply printing them with commercially available laser or inkjet printers is of interest. Small size printable media, such as calling or business cards, cannot be individually printed with conventional laser or ink-jet printers due to their small format. For this reason, for printing calling cards by means of a laser printer or an inkjet printer, card sheets are usually initially used, from which the calling cards are separated after having been printed, leaving a residual “matrix” of the card sheet. In these card sheets a supporting structure is provided for the cards and a wide variety of embodiments are known for such card sheets and carriers. In a first class of card sheets, the matrix of the card sheet, or a portion of that matrix, itself acts as the carrier for the cards. Thus, there are calling card sheets in which the material is microperforated and the card is broken out along the microperforations to separate the cards from the matrix. The cards to be separated and having a microperforation are connected to the card sheet by material bridges. When the cards are separated from the card sheet, these bridges partially remain at the edges of the cards. These separation residues are unsightly and not desired especially for high-quality products, such as calling cards. In one variation of this first class of card sheet product, instead of microperforations, the card sheet includes die cut lines penetrating much but not all of the card sheets (“substantially cut” lines), and cards are separated from the surrounding matrix by severing the uncut portions of the substantially cut lines. Another variation uses a multi-layer structure for the card sheet, wherein one of the layers acts as the carrier material. In these variations, the same problem mentioned above may occur, i.e., unsightly residual material after separation of cards. Patent publications illustrating this first class of card products include: U.S. Pat. No. 5,853,837 (Popat, commonly assigned herewith; substantially cut lines); see also U.S. Patent Application 2001/0036525 A1 (Yokokawa; multilayer card structure). (The entire contents of all patents and other publications mentioned anywhere in this disclosure are hereby incorporated herein by reference.) In a second class of card product designs, the cards are completely cut from the surrounding matrix by cut punching, and one or more additional structures are used as a carrier for the cut cards. The structure of such cut-punched calling card sheets results from a printable top material and a carrier material applied to one side of the top material, the carrier material being bonded to the cards and to the matrix to support the cards within the matrix. One example of this second class of card products uses relatively narrow carrier strips or tapes, which are applied to the punched lines along the short side of the (A4) sheet, from which the printed card may be drawn off. The adhesive remains on the self-sealing tapes when the card is drawn off. A disadvantage of this construction is that the top material/carrier connection is relatively unstable, which impairs the feeding and transportation behavior in the printer. In addition, there is the danger that tape fibers are torn-off by the action of removing the cards from the adhesive tape. This embodiment is shown in U.S. Pat. No. 5,702,789 (Fernandez-Kirchberger et al.). Other versions of this second class of card sheet products use a “liner” sheet as the carrier, wherein the liner may be a full sheet corresponding to the top sheet, or may have sections removed from a full sheet. In so-called “dry-peel” constructions, the bond between the liner and the top sheet is created using an extruded polymer with a debondable interface to the top sheet or to the liner sheet. In removable or ultra-removable adhesive constructions, the bond is created using a removable adhesive between the top sheet and the liner sheet. When the cards are drawn off from the carrier, the adhesive remains on the reverse side of the card, which leads to a tangible and visible change as well as to a limited writeability of the reverse side of the card, which is judged to be of inferior quality. Alternatively, a method is known in which a calling card sheet, which initially was coated on the reverse side with a silicon layer, is fastened onto a carrier material with an adhesive. The calling card sheet is cut-punched and, after having been printed, the individual calling cards can be drawn-off from the carrier material. Due to the silicon layer, the adhesive remaining on the reverse side of the calling card can be avoided. These calling cards, however, have an altered smooth reverse side, which is undesirable. In addition, such a reverse side has the disadvantage that its writeability is inferior. A further disadvantage is that the card is easily bent when it is drawn off from the adhesive carrier. Examples of this second class of card sheet products and dry peel laminates are shown in U.S. Pat. No. 4,863,772 (Cross, commonly assigned herewith), and PCT Publication Nos. WO 00/16978 and WO 00/46316 (both of Avery Dennison Corporation).
|
10954017
| 2,004
|
Semiconducting device that includes wirebonds
|
Some embodiments relate to a semiconducting device that includes a substrate, a die and an interconnect device. The die and interconnect device are attached to an upper surface of the substrate. The semiconducting device further includes a first wire that is bonded to the substrate and to the interconnect device and a second wire that is bonded to the interconnect device and to the die. Other example embodiments include a stack of dice that has a bottom die attached to the upper surface of the substrate and a top die stacked onto the other dice in the stack of dice. The interconnect device is attached to an upper surface of any die in the stack of dice such that a first wire is bonded to the substrate and to the interconnect device and a second wire is bonded to the interconnect device and to the top die.
|
TECHNICAL FIELD Some embodiments of the present invention relate to a semiconducting device, and in particular, to a semiconducting device that includes wire bonds. BACKGROUND High performance semiconducting devices are continually being redesigned in order to increase processing speed and/or power. Each increase in processing speed and power generally carries a cost of increased size such that additional innovations must be made in order to minimize the size of the semiconducting devices. Manufacturers of semiconducting devices continually try to improve product performance and reduce product size while minimizing production costs. Several methods have been employed to improve the speed of semiconducting devices while minimizing the overall size of semiconducting devices. One method includes stacking multiple dice onto a substrate that electrically connects one or more of the stacked dice to other electronic components which make up part of an electronic system. One drawback with stacking dice in this manner is that there are often problems associated with wire-bonding one or more of the stacked dice to the substrate. In some instances the wires may be inadvertently swept away from their intended location as the stack of dice is encapsulated. In addition, as the number of dice in a stack increases, the drawbacks that are associated with wire-bonding may be exacerbated because many of the wires need to be relatively long in order to reach some of the dice in the stack. The drawbacks associated with wire-bonding may be present when even just one die is placed onto a substrate. As an example, the wires that are used to bond the substrate to the die may be problematically long depending on the design of the substrate and/or die.
|
Title:
Semiconducting device that includes wirebonds
Abstract:
Some embodiments relate to a semiconducting device that includes a substrate, a die and an interconnect device. The die and interconnect device are attached to an upper surface of the substrate. The semiconducting device further includes a first wire that is bonded to the substrate and to the interconnect device and a second wire that is bonded to the interconnect device and to the die. Other example embodiments include a stack of dice that has a bottom die attached to the upper surface of the substrate and a top die stacked onto the other dice in the stack of dice. The interconnect device is attached to an upper surface of any die in the stack of dice such that a first wire is bonded to the substrate and to the interconnect device and a second wire is bonded to the interconnect device and to the top die.
Background:
TECHNICAL FIELD Some embodiments of the present invention relate to a semiconducting device, and in particular, to a semiconducting device that includes wire bonds. BACKGROUND High performance semiconducting devices are continually being redesigned in order to increase processing speed and/or power. Each increase in processing speed and power generally carries a cost of increased size such that additional innovations must be made in order to minimize the size of the semiconducting devices. Manufacturers of semiconducting devices continually try to improve product performance and reduce product size while minimizing production costs. Several methods have been employed to improve the speed of semiconducting devices while minimizing the overall size of semiconducting devices. One method includes stacking multiple dice onto a substrate that electrically connects one or more of the stacked dice to other electronic components which make up part of an electronic system. One drawback with stacking dice in this manner is that there are often problems associated with wire-bonding one or more of the stacked dice to the substrate. In some instances the wires may be inadvertently swept away from their intended location as the stack of dice is encapsulated. In addition, as the number of dice in a stack increases, the drawbacks that are associated with wire-bonding may be exacerbated because many of the wires need to be relatively long in order to reach some of the dice in the stack. The drawbacks associated with wire-bonding may be present when even just one die is placed onto a substrate. As an example, the wires that are used to bond the substrate to the die may be problematically long depending on the design of the substrate and/or die.
|
10708537
| 2,004
|
MULTIMEDIA DISK BOX
|
A multimedia disk box has a housing and a chip used to input, output, and save a signal such as speech or multimedia data. In addition to the function of holding a multimedia disk, the multi-media disk box provides other functions of added value, including recording, playing, and providing encryption/decryption.
|
BACKGROUND OF INVENTION 1. Field of the Invention The present invention relates to a multimedia disk box, and more particularly, to a multimedia disk box with a chip. 2. Description of the Prior Art With development of multimedia processing technology, digital multimedia provides users with access to widespread applications. For example, Compact Disks (CDs), Video Compact Disks (VCDs), and Digital Video/Versatile Disks (DVDs) are used to record and store music, software, images, and video. Digital versatile disks have multiple formats such as SACD, DVD-Audio, DVD-Video, DVD-ROM (Read Only Memory), DVD-RAM (Random Access Memory), and DVD-R. Multimedia disks not only reduce physical storage space for selling disks effectively but also allow users to exchange and enjoy plentiful audiovisual information conveniently. Many companies design all kinds of multimedia disk boxes to appeal to consumers, and such designs typically address the style, the structure and the capacity of a box. Please refer to FIG. 1 . FIG. 1 shows a diagram of a prior art multimedia disk box 10 . The multimedia disk box 10 comprises a recess 12 for holding a multimedia disk 18 . However, the multimedia disk box 10 only serves the functions of storage and disk preservation, and does not provide other functions of added value. In addition, the proliferation of recording devices intensifies the problems of multimedia copyright. Thus, how to develop an effective mechanism to manage information and protect copyright is a most important issue.
|
Title:
MULTIMEDIA DISK BOX
Abstract:
A multimedia disk box has a housing and a chip used to input, output, and save a signal such as speech or multimedia data. In addition to the function of holding a multimedia disk, the multi-media disk box provides other functions of added value, including recording, playing, and providing encryption/decryption.
Background:
BACKGROUND OF INVENTION 1. Field of the Invention The present invention relates to a multimedia disk box, and more particularly, to a multimedia disk box with a chip. 2. Description of the Prior Art With development of multimedia processing technology, digital multimedia provides users with access to widespread applications. For example, Compact Disks (CDs), Video Compact Disks (VCDs), and Digital Video/Versatile Disks (DVDs) are used to record and store music, software, images, and video. Digital versatile disks have multiple formats such as SACD, DVD-Audio, DVD-Video, DVD-ROM (Read Only Memory), DVD-RAM (Random Access Memory), and DVD-R. Multimedia disks not only reduce physical storage space for selling disks effectively but also allow users to exchange and enjoy plentiful audiovisual information conveniently. Many companies design all kinds of multimedia disk boxes to appeal to consumers, and such designs typically address the style, the structure and the capacity of a box. Please refer to FIG. 1 . FIG. 1 shows a diagram of a prior art multimedia disk box 10 . The multimedia disk box 10 comprises a recess 12 for holding a multimedia disk 18 . However, the multimedia disk box 10 only serves the functions of storage and disk preservation, and does not provide other functions of added value. In addition, the proliferation of recording devices intensifies the problems of multimedia copyright. Thus, how to develop an effective mechanism to manage information and protect copyright is a most important issue.
|
10962141
| 2,004
|
Method and device for processing digital data
|
The invention relates to a method of processing digital data constituting a signal in a distributed communication network comprising a plurality of communication apparatuses, the signal being identified by a unique identifier (ID), characterized in that the method comprises the following steps: storing one or more parts of the signal, termed exploitable parts of the signal, at one at least given address of a memory location and in a format readable by an application, associating the unique identifier of the signal with each exploitable part of the signal, storing in at least one communication apparatus a data structure establishing a link between each exploitable part of the signal and the unique identifier of that signal.
|
Title:
Method and device for processing digital data
Abstract:
The invention relates to a method of processing digital data constituting a signal in a distributed communication network comprising a plurality of communication apparatuses, the signal being identified by a unique identifier (ID), characterized in that the method comprises the following steps: storing one or more parts of the signal, termed exploitable parts of the signal, at one at least given address of a memory location and in a format readable by an application, associating the unique identifier of the signal with each exploitable part of the signal, storing in at least one communication apparatus a data structure establishing a link between each exploitable part of the signal and the unique identifier of that signal.
Background:
|
|
10966724
| 2,004
|
Gastrostomy feeding tube cushion device
|
The invention is directed to a cushion device for a user having a gastrostomy tube or gastrostomy button protruding from an anterior region of the user's torso, and a method of using such a device with a individual to increase comfort and tolerance with regard to the tube and/or button when placed on the anterior torso and a method to encourage the physical development of a child having such a tube and/or button. By way of example, the cushion device includes an elongated body having opposing end sections, the end sections releasably securable to one another when the body is placed around the user, wherein the body includes a padding having a thickness at least as great as the button or the gastrostomy tube, and wherein the padding further includes an open area to accommodate the button or the gastrostomy tube.
|
BACKGROUND Forty to seventy percent of infants born prematurely or infants with chronic medical conditions show evidence of feeding problems. One common way of dealing with these problems is through the use of feeding tubes. One type of feeding tube, a gastrostomy feeding tube (g-tube), is a tube that is surgically placed into the stomach through the abdominal wall. The surgery involves cutting a hole (stoma) in the skin and into the stomach. Then the stomach is gently attached to the abdominal wall and the g-tube is fitted into the stoma. The g-tube is typically held in place by a disc or water filled balloon that has a one-way valve to keep stomach contents in and air, etc., out. Once the gastrostomy site is well healed and the tube has been in place for a minimum of eight weeks, it is possible to change to a skin level feeding device commonly known as a “button”. A button sits directly on the skin and has a connector valve for the attachment of a removable tube used during feeding time. The feedings are in liquid form and there are several ways to feed through the tube. One common way is by bolus, which is a larger amount of feeding given three-six times per day. Sometimes it is tube. After feeding, the tube can be disconnected from the button or stay connected with the end closed off by another valve that looks similar to the valve used to inflate a beach ball. There are several types of buttons, including those that may have a disc, clamp, or crossbar on the outside to keep them in place. The most common are the Button made by Bard and the MIC-key made by Medical Innovations Corporation. Most buttons protrude from the skin approximately ½ inch and are approximately an inch in width. There are a variety of reasons why children may require a g-tube/button. The primary indication for gastrostomy is the child's inability to take adequate nutrition or liquids by mouth for growth and development. In some cases, tube feedings accompany oral feedings to ensure nutritional needs are being met. A g-tube/button will reduce the stress level associated with trying to provide the nutrition needed for growth and development by providing nourishment directly through the tube to the stomach. Severe feeding and swallowing problems in infants and children are rarely seen as isolated disorders. The majority of the time it is related to neurologic, respiratory, gastrointestinal (digestive), mechanical and/or structural problems. Disorders which may be associated with feeding and swallowing difficulties, include but are not limited to: cerebral palsy, muscular dystrophy, encephalopathies (brain disorders), traumatic brain injuries, neoplasms, “failure to thrive”, congenital or acquired anatomic and structural problems (cleft palate), Down Syndrome, prematurity, genetic disorders, gastrointestinal illness, and congenital cardiac anomalies. Depending on the severity of the disorder and feeding/swallowing difficulties, a child may need tube feedings for short term, long term (several years) or for a lifetime. Children with g-tubes/buttons usually have difficulty lying on their stomach. The button is usually located on the left side of the body. It typically protrudes approximately ½ inch from the skin. Since the “button” protrudes approximately ½ inch from the body and is located on the left side of the anterior aspect of the trunk, when a child is placed on his/her stomach, the child's body weight provides an uneven pressure to the “button”. The increased pressure at the “button” site commonly causes discomfort and pain. The pressure may even cause the “button” to shift in position, which may increase the risk of dislodging. This difficulty with stomach placement can cause problems with achieving developmental milestones because the child will avoid lying on his/her stomach. It also interferes with positioning during therapy and playtime. Children need to lie on their stomach to learn how to roll, transition in/out of positions, pivot on their stomach, and crawl to explore their environment. During playtime, lying on their stomach can assist with improving head control and strengthening their trunk and extremities. Many children who are born prematurely don't have the opportunity to develop flexor patterns of movement (which develops the last couple of months within the womb). These children often present with excessive extensor tone (arching their back and keeping their arms and legs extended) because the flexor tone has not been fully developed. The flexion pattern allows an infant to bring extremities towards the midline of the body and assists with flexion of the trunk and extremities for mobility. Therefore, these children need to develop this pattern of movement outside the womb. There needs to be a balance between the extensor and flexor tone to promote mobility and function. Lying on their stomach is crucial for this to occur. Children with abnormal muscle tone (hypotonic-decreased muscle tone and hypertonic-increased muscle tone) therapeutically would benefit from weight bearing activities to assist with “normalizing” muscle tone. Lying on their stomach promotes weight bearing through extremities when attempting to push up onto arms, pivoting on stomach and crawling. All of these activities are difficult to do for a child who experiences pain or discomfort when placed on his or her stomach as a result of the protruding g-tube/button. Hence, there is a need for a system which would minimize this discomfort and allow children and others to comfortably interact and play on their stomach despite the presence of a g-tube/button.
|
Title:
Gastrostomy feeding tube cushion device
Abstract:
The invention is directed to a cushion device for a user having a gastrostomy tube or gastrostomy button protruding from an anterior region of the user's torso, and a method of using such a device with a individual to increase comfort and tolerance with regard to the tube and/or button when placed on the anterior torso and a method to encourage the physical development of a child having such a tube and/or button. By way of example, the cushion device includes an elongated body having opposing end sections, the end sections releasably securable to one another when the body is placed around the user, wherein the body includes a padding having a thickness at least as great as the button or the gastrostomy tube, and wherein the padding further includes an open area to accommodate the button or the gastrostomy tube.
Background:
BACKGROUND Forty to seventy percent of infants born prematurely or infants with chronic medical conditions show evidence of feeding problems. One common way of dealing with these problems is through the use of feeding tubes. One type of feeding tube, a gastrostomy feeding tube (g-tube), is a tube that is surgically placed into the stomach through the abdominal wall. The surgery involves cutting a hole (stoma) in the skin and into the stomach. Then the stomach is gently attached to the abdominal wall and the g-tube is fitted into the stoma. The g-tube is typically held in place by a disc or water filled balloon that has a one-way valve to keep stomach contents in and air, etc., out. Once the gastrostomy site is well healed and the tube has been in place for a minimum of eight weeks, it is possible to change to a skin level feeding device commonly known as a “button”. A button sits directly on the skin and has a connector valve for the attachment of a removable tube used during feeding time. The feedings are in liquid form and there are several ways to feed through the tube. One common way is by bolus, which is a larger amount of feeding given three-six times per day. Sometimes it is tube. After feeding, the tube can be disconnected from the button or stay connected with the end closed off by another valve that looks similar to the valve used to inflate a beach ball. There are several types of buttons, including those that may have a disc, clamp, or crossbar on the outside to keep them in place. The most common are the Button made by Bard and the MIC-key made by Medical Innovations Corporation. Most buttons protrude from the skin approximately ½ inch and are approximately an inch in width. There are a variety of reasons why children may require a g-tube/button. The primary indication for gastrostomy is the child's inability to take adequate nutrition or liquids by mouth for growth and development. In some cases, tube feedings accompany oral feedings to ensure nutritional needs are being met. A g-tube/button will reduce the stress level associated with trying to provide the nutrition needed for growth and development by providing nourishment directly through the tube to the stomach. Severe feeding and swallowing problems in infants and children are rarely seen as isolated disorders. The majority of the time it is related to neurologic, respiratory, gastrointestinal (digestive), mechanical and/or structural problems. Disorders which may be associated with feeding and swallowing difficulties, include but are not limited to: cerebral palsy, muscular dystrophy, encephalopathies (brain disorders), traumatic brain injuries, neoplasms, “failure to thrive”, congenital or acquired anatomic and structural problems (cleft palate), Down Syndrome, prematurity, genetic disorders, gastrointestinal illness, and congenital cardiac anomalies. Depending on the severity of the disorder and feeding/swallowing difficulties, a child may need tube feedings for short term, long term (several years) or for a lifetime. Children with g-tubes/buttons usually have difficulty lying on their stomach. The button is usually located on the left side of the body. It typically protrudes approximately ½ inch from the skin. Since the “button” protrudes approximately ½ inch from the body and is located on the left side of the anterior aspect of the trunk, when a child is placed on his/her stomach, the child's body weight provides an uneven pressure to the “button”. The increased pressure at the “button” site commonly causes discomfort and pain. The pressure may even cause the “button” to shift in position, which may increase the risk of dislodging. This difficulty with stomach placement can cause problems with achieving developmental milestones because the child will avoid lying on his/her stomach. It also interferes with positioning during therapy and playtime. Children need to lie on their stomach to learn how to roll, transition in/out of positions, pivot on their stomach, and crawl to explore their environment. During playtime, lying on their stomach can assist with improving head control and strengthening their trunk and extremities. Many children who are born prematurely don't have the opportunity to develop flexor patterns of movement (which develops the last couple of months within the womb). These children often present with excessive extensor tone (arching their back and keeping their arms and legs extended) because the flexor tone has not been fully developed. The flexion pattern allows an infant to bring extremities towards the midline of the body and assists with flexion of the trunk and extremities for mobility. Therefore, these children need to develop this pattern of movement outside the womb. There needs to be a balance between the extensor and flexor tone to promote mobility and function. Lying on their stomach is crucial for this to occur. Children with abnormal muscle tone (hypotonic-decreased muscle tone and hypertonic-increased muscle tone) therapeutically would benefit from weight bearing activities to assist with “normalizing” muscle tone. Lying on their stomach promotes weight bearing through extremities when attempting to push up onto arms, pivoting on stomach and crawling. All of these activities are difficult to do for a child who experiences pain or discomfort when placed on his or her stomach as a result of the protruding g-tube/button. Hence, there is a need for a system which would minimize this discomfort and allow children and others to comfortably interact and play on their stomach despite the presence of a g-tube/button.
|
10795147
| 2,004
|
Method and system for transmission and processing of authenticated electronic mail
|
Embodiments of the present invention may provide a method, systems and/or computer program products for an e-mail messaging system. This may involve providing multiple authenticated e-mail systems each controlled by programmed instructions. E-mail messages may be digitally signed and signatures may be validated. Conformance to rules may be enforced and errant accounts deactivated. Non-conforming messages may be slow tracked and abuse may be reported to a certificate authority.
|
BACKGROUND OF THE INVENTION By some current estimates (end of 2003), there are approximately 500 million e-mail inboxes worldwide and roughly 45 million e-mail domains. E-mail has all but replaced the conventional post and to a lesser extent the telephone, as the communication vehicle of choice at least among the growing ranks of the digerati. With the proliferation of e-mail has come a host of, at the least annoying, and at the worst, highly destructive scourges. Almost any user who has participated in an online newsgroup, posted their email address as required by a merchant web site, or placed their e-mail address on their business card, is probably receiving anywhere from a handful to hundreds of unsolicited advertising e-mails (also known as spam) every day. Such deluges are now considered routine and for the most part, an annoyance that accompanies the privilege of e-mail. While spam may be time consuming on an individual basis, the losses in worker productivity, wasted storage and Internet bandwidth required by mail servers to carry the extra traffic add up to billions of dollars per annum. In addition, consumers, most notably parents of young children, are becoming increasingly upset with the volume and content of spam and have begun to disengage from e-mail, presenting a problem to those ISPs (Internet Service Providers) who depend on consumers for their business. Finally, beyond the problems posed by spam, malevolent software viruses, computer worms, and computer Trojans are also wreaking havoc with Internet computer systems costing lots of money annually. The cost to spammers (entities that create spam) for executing their bulk mailing is negligible relative to the return—dramatically cheaper and faster than postal mail. Legislation passed to curb spam has quickly proven ineffective, since the anonymity of spam, not to mention its increasingly offshore nature, makes it extremely difficult to prosecute. Virus writers also benefit from the anonymity of the Internet to launch their attacks, typically to an initial distribution list from which propagation can accelerate at a geometric or exponential level. A root problem that enables spammers and virus developers to succeed is the promiscuous nature of SMTP (simple mail transfer protocol); no authentication is required to send an e-mail to millions of addresses, so there is no mechanism to enforce accountability. SMTP is well known in the Internet ails. Spammers direct their prospective customers to web sites and phone numbers and do not respond to reply e-mails. Therefore, they may make up as many unique and bogus return e-mail addresses as they wish, and the current Internet mail specifications do not prevent this. Much current anti-spam technology relies on message filtering—attempting to detect patterns in the message after it has been received that would strongly suggest spam, possibly combined with some rudimentary test that the e-mail domain from which the e-mail ostensibly originated actually exists. Such approaches may be relatively effective on a temporary basis, but spammers adapt quickly with so much at stake, thus perpetuating a cat and mouse game that offers insufficient lasting relief to ordinary users. Another area of art in attempting to combat spam is what is known as challenge/response. Upon receipt of a message from an unknown sender, the system may automatically generate a challenge to the sender to confirm that a human being sent it. The message is not delivered until the sender responds, at which point not only is the message delivered, but the sender is added to a trusted list of senders. While challenge/response is ostensibly effective at curbing spam, it has disadvantages. For example: (a) it proves an imposition on ordinary users attempting to interact via e-mail, forcing them to add a potentially time consuming step to the process (consider a time-critical e-mail that is now held waiting for the response to the challenge). (b) Spammers, sufficiently motivated to keep up their trade, will in time find ways to defeat challenge/response, for example by providing potentially valid return addresses from which they may automate responses. There are also legitimate bulk marketers who are willing to conform to rules and guidelines that enable end-consumers to avoid the annoyance and costs of spam through art implementing such capabilities. Such rules and guidelines include for example implementation of “opt-in” lists and special tags on Subject lines rendering it possible for intelligent filtering to succeed easily.
|
Title:
Method and system for transmission and processing of authenticated electronic mail
Abstract:
Embodiments of the present invention may provide a method, systems and/or computer program products for an e-mail messaging system. This may involve providing multiple authenticated e-mail systems each controlled by programmed instructions. E-mail messages may be digitally signed and signatures may be validated. Conformance to rules may be enforced and errant accounts deactivated. Non-conforming messages may be slow tracked and abuse may be reported to a certificate authority.
Background:
BACKGROUND OF THE INVENTION By some current estimates (end of 2003), there are approximately 500 million e-mail inboxes worldwide and roughly 45 million e-mail domains. E-mail has all but replaced the conventional post and to a lesser extent the telephone, as the communication vehicle of choice at least among the growing ranks of the digerati. With the proliferation of e-mail has come a host of, at the least annoying, and at the worst, highly destructive scourges. Almost any user who has participated in an online newsgroup, posted their email address as required by a merchant web site, or placed their e-mail address on their business card, is probably receiving anywhere from a handful to hundreds of unsolicited advertising e-mails (also known as spam) every day. Such deluges are now considered routine and for the most part, an annoyance that accompanies the privilege of e-mail. While spam may be time consuming on an individual basis, the losses in worker productivity, wasted storage and Internet bandwidth required by mail servers to carry the extra traffic add up to billions of dollars per annum. In addition, consumers, most notably parents of young children, are becoming increasingly upset with the volume and content of spam and have begun to disengage from e-mail, presenting a problem to those ISPs (Internet Service Providers) who depend on consumers for their business. Finally, beyond the problems posed by spam, malevolent software viruses, computer worms, and computer Trojans are also wreaking havoc with Internet computer systems costing lots of money annually. The cost to spammers (entities that create spam) for executing their bulk mailing is negligible relative to the return—dramatically cheaper and faster than postal mail. Legislation passed to curb spam has quickly proven ineffective, since the anonymity of spam, not to mention its increasingly offshore nature, makes it extremely difficult to prosecute. Virus writers also benefit from the anonymity of the Internet to launch their attacks, typically to an initial distribution list from which propagation can accelerate at a geometric or exponential level. A root problem that enables spammers and virus developers to succeed is the promiscuous nature of SMTP (simple mail transfer protocol); no authentication is required to send an e-mail to millions of addresses, so there is no mechanism to enforce accountability. SMTP is well known in the Internet ails. Spammers direct their prospective customers to web sites and phone numbers and do not respond to reply e-mails. Therefore, they may make up as many unique and bogus return e-mail addresses as they wish, and the current Internet mail specifications do not prevent this. Much current anti-spam technology relies on message filtering—attempting to detect patterns in the message after it has been received that would strongly suggest spam, possibly combined with some rudimentary test that the e-mail domain from which the e-mail ostensibly originated actually exists. Such approaches may be relatively effective on a temporary basis, but spammers adapt quickly with so much at stake, thus perpetuating a cat and mouse game that offers insufficient lasting relief to ordinary users. Another area of art in attempting to combat spam is what is known as challenge/response. Upon receipt of a message from an unknown sender, the system may automatically generate a challenge to the sender to confirm that a human being sent it. The message is not delivered until the sender responds, at which point not only is the message delivered, but the sender is added to a trusted list of senders. While challenge/response is ostensibly effective at curbing spam, it has disadvantages. For example: (a) it proves an imposition on ordinary users attempting to interact via e-mail, forcing them to add a potentially time consuming step to the process (consider a time-critical e-mail that is now held waiting for the response to the challenge). (b) Spammers, sufficiently motivated to keep up their trade, will in time find ways to defeat challenge/response, for example by providing potentially valid return addresses from which they may automate responses. There are also legitimate bulk marketers who are willing to conform to rules and guidelines that enable end-consumers to avoid the annoyance and costs of spam through art implementing such capabilities. Such rules and guidelines include for example implementation of “opt-in” lists and special tags on Subject lines rendering it possible for intelligent filtering to succeed easily.
|
10918339
| 2,004
|
Light emitting device and illuminator using the same
|
An object of the present invention is to provide a light emitting device having a high emission intensity, and a light emitting device having a high emission intensity and a good color rendering property. The present invention provides a light emitting device which comprises: a first light emitter emitting light of from 350 to 415 nm and a second light emitter emitting visible light by exposure to the light from the first light emitter, wherein said second light emitter comprises a phosphor capable of satisfying any one of the following conditions (i) to (iv): (i) the phosphor comprises: (a) a crystal phase whose Eu concentration providing the maximum emission intensity at any one of excitation wavelengths of from 350 to 415 nm is higher than that providing the maximum emission intensity at an excitation wavelength of 254 nm; and (b) a crystal phase which is activated by Eu having at least 1.1 times the concentration providing the maximum emission intensity at an excitation wavelength of 254 nm and 0.5 to 9 times the concentration providing the maximum emission intensity at an excitation frequency of 400 nm: (ii) the phosphor comprises a crystal phase having an Eu—Eu mean distance, as calculated from the Eu concentration in a crystal matrix, of 4 Å or greater but not greater than 11 Å: (iii) the phosphor has a quantum absorption efficiency αq of 0.8 or greater: (iv) the phosphor has a product αq·ηi of a quantum absorption efficiency αq and an internal quantum efficiency ηi of 0.55 or greater.
|
BACKGROUND ART With a view to generating various colors including white uniformly with a good color rendering property by mixing blue, red and green colors, a light emitting device which radiates colored light from a first light emitter such as LED or LD to a phosphor as a second light emitter to cause color conversion is proposed. For example, in Japanese Patent Publication No. Sho 49-1221, proposed is a method of forming a display by exposing a phosphor (Y 3-x-y Ce x Gd y M 5-z Ga z O 12 (in which Y represents Y, Lu or La, and M represents Al, Al—In or Al—Sc) to the beam of a laser (first light emitter) which radiates a beam with wavelengths of from 300 to 530 nm and thereby causing its light emission. In recent days, a white-light emitting device having, as a first light emitter, a gallium nitride (GaN) LED or LD which has attracted attentions as a blue light emitting semiconductor light emitting element and having a high emission efficiency and, as a second light emitter, a variety of phosphors is proposed as a radiation source for an image display device or illuminator by making use of its features such as low power consumption and long life. For example, described in Japanese Patent Application Laid-Open No. Hei 10-24513 is a light emitting device having, as a first light emitter, a nitride semiconductor LED or LD chip and, as a second light emitter, a yttrium-aluminum-garnet phosphor. In U.S. Pat. No. 6,294,800, a substance having a green-light emitter containing Ca 8 Mg(SiO 4 ) 4 Cl 2 :Eu 2+ ,Mn 2+ , a red light emitting phosphor and a blue light emitting phosphor in combination is disclosed as a substance capable of generating white light when exposed to light in a range of from 330 to 420 nm, that is, typified by light from LED. As an example of the blue light emitting phosphor, (Sr,Ba,Ca) 5 (PO 4 ) 3 Cl:Eu 2+ is mentioned. In U.S. Pat. No. 6,278,135, described is a light emitting device which emits visible light when a phosphor is exposed to ultraviolet light from LED. As the phosphor, BaMg 7 Al 16 O 27 :Eu 2+ is given. The above-described light emitting devices using such phosphors have not emission intensity enough for use as a light emitting source for displays, backlight sources or traffic signals. There is accordingly a demand for further improvement. When a light emitting device using a first light emitter and a second emitter in combination is employed as a light emitting source for displays, backlight sources and traffic signals, it is required to have high emission intensity and at the same time, to be excellent in a color rendering property which serves as a measure for showing how the appearance of an object exposed to white light from a light emitting device resembles to that exposed to sunlight. For example, as described in Japanese Patent Application Laid-Open No. Hei 10-242513, when a blue LED or blue laser as a first light emitter is used in combination with a cerium-activated yttrium aluminum garnet phosphor as a second light emitter, a white color is generated by mixing the blue light generated from the first light emitter with a yellow color generated by the second light emitter. When the emission spectrum produced by this combination is compared with the spectrum of sunlight, emission intensity is considerably low in an intermediate region (470 nm to 540 nm) between the blue light emission peak top (near 450 nm) and yellow light emission peak top (near 550 nm), and in a long wavelength region (580 to 700 nm) of a yellow peak. A blue-yellow mixed color system light emitting device has, in its emission spectrum, a low emission intensity portion different from the spectrum of a sunlight, so that its color rendering property is very low. On the other hand, a white light emitting device using, as a second light emitter, a mixture of blue, green and red phosphors is expected to have an improved color rendering property, because three peaks overlap each other different from the conventional blue-yellow mixing system in which two peaks overlap and a low emission intensity portion between peaks is narrowed. Even this blue-green-red mixed system, however, has a low emission intensity portion when half-width of each emission peak is small so that the problem of a low color rendering property still remains unsolved. [Patent Document 1] Japanese Patent Publication No. Sho 49-1221 [Patent Document 2] Japanese Patent Application Laid-Open No. Hei 10-242513 [Patent Document 3] U.S. Pat. No. 6,294,800 [Patent Document 4] U.S. Pat. No. 6,278,135 With the above-described background art in view, the present invention has been made to develop a light emitting device having a considerably high emission intensity and good color rendering property. An object of the present invention is therefore to provide a double light emitter type light emitting device which can be manufactured easily, has a high emission intensity and has improved color rendering property.
|
Title:
Light emitting device and illuminator using the same
Abstract:
An object of the present invention is to provide a light emitting device having a high emission intensity, and a light emitting device having a high emission intensity and a good color rendering property. The present invention provides a light emitting device which comprises: a first light emitter emitting light of from 350 to 415 nm and a second light emitter emitting visible light by exposure to the light from the first light emitter, wherein said second light emitter comprises a phosphor capable of satisfying any one of the following conditions (i) to (iv): (i) the phosphor comprises: (a) a crystal phase whose Eu concentration providing the maximum emission intensity at any one of excitation wavelengths of from 350 to 415 nm is higher than that providing the maximum emission intensity at an excitation wavelength of 254 nm; and (b) a crystal phase which is activated by Eu having at least 1.1 times the concentration providing the maximum emission intensity at an excitation wavelength of 254 nm and 0.5 to 9 times the concentration providing the maximum emission intensity at an excitation frequency of 400 nm: (ii) the phosphor comprises a crystal phase having an Eu—Eu mean distance, as calculated from the Eu concentration in a crystal matrix, of 4 Å or greater but not greater than 11 Å: (iii) the phosphor has a quantum absorption efficiency αq of 0.8 or greater: (iv) the phosphor has a product αq·ηi of a quantum absorption efficiency αq and an internal quantum efficiency ηi of 0.55 or greater.
Background:
BACKGROUND ART With a view to generating various colors including white uniformly with a good color rendering property by mixing blue, red and green colors, a light emitting device which radiates colored light from a first light emitter such as LED or LD to a phosphor as a second light emitter to cause color conversion is proposed. For example, in Japanese Patent Publication No. Sho 49-1221, proposed is a method of forming a display by exposing a phosphor (Y 3-x-y Ce x Gd y M 5-z Ga z O 12 (in which Y represents Y, Lu or La, and M represents Al, Al—In or Al—Sc) to the beam of a laser (first light emitter) which radiates a beam with wavelengths of from 300 to 530 nm and thereby causing its light emission. In recent days, a white-light emitting device having, as a first light emitter, a gallium nitride (GaN) LED or LD which has attracted attentions as a blue light emitting semiconductor light emitting element and having a high emission efficiency and, as a second light emitter, a variety of phosphors is proposed as a radiation source for an image display device or illuminator by making use of its features such as low power consumption and long life. For example, described in Japanese Patent Application Laid-Open No. Hei 10-24513 is a light emitting device having, as a first light emitter, a nitride semiconductor LED or LD chip and, as a second light emitter, a yttrium-aluminum-garnet phosphor. In U.S. Pat. No. 6,294,800, a substance having a green-light emitter containing Ca 8 Mg(SiO 4 ) 4 Cl 2 :Eu 2+ ,Mn 2+ , a red light emitting phosphor and a blue light emitting phosphor in combination is disclosed as a substance capable of generating white light when exposed to light in a range of from 330 to 420 nm, that is, typified by light from LED. As an example of the blue light emitting phosphor, (Sr,Ba,Ca) 5 (PO 4 ) 3 Cl:Eu 2+ is mentioned. In U.S. Pat. No. 6,278,135, described is a light emitting device which emits visible light when a phosphor is exposed to ultraviolet light from LED. As the phosphor, BaMg 7 Al 16 O 27 :Eu 2+ is given. The above-described light emitting devices using such phosphors have not emission intensity enough for use as a light emitting source for displays, backlight sources or traffic signals. There is accordingly a demand for further improvement. When a light emitting device using a first light emitter and a second emitter in combination is employed as a light emitting source for displays, backlight sources and traffic signals, it is required to have high emission intensity and at the same time, to be excellent in a color rendering property which serves as a measure for showing how the appearance of an object exposed to white light from a light emitting device resembles to that exposed to sunlight. For example, as described in Japanese Patent Application Laid-Open No. Hei 10-242513, when a blue LED or blue laser as a first light emitter is used in combination with a cerium-activated yttrium aluminum garnet phosphor as a second light emitter, a white color is generated by mixing the blue light generated from the first light emitter with a yellow color generated by the second light emitter. When the emission spectrum produced by this combination is compared with the spectrum of sunlight, emission intensity is considerably low in an intermediate region (470 nm to 540 nm) between the blue light emission peak top (near 450 nm) and yellow light emission peak top (near 550 nm), and in a long wavelength region (580 to 700 nm) of a yellow peak. A blue-yellow mixed color system light emitting device has, in its emission spectrum, a low emission intensity portion different from the spectrum of a sunlight, so that its color rendering property is very low. On the other hand, a white light emitting device using, as a second light emitter, a mixture of blue, green and red phosphors is expected to have an improved color rendering property, because three peaks overlap each other different from the conventional blue-yellow mixing system in which two peaks overlap and a low emission intensity portion between peaks is narrowed. Even this blue-green-red mixed system, however, has a low emission intensity portion when half-width of each emission peak is small so that the problem of a low color rendering property still remains unsolved. [Patent Document 1] Japanese Patent Publication No. Sho 49-1221 [Patent Document 2] Japanese Patent Application Laid-Open No. Hei 10-242513 [Patent Document 3] U.S. Pat. No. 6,294,800 [Patent Document 4] U.S. Pat. No. 6,278,135 With the above-described background art in view, the present invention has been made to develop a light emitting device having a considerably high emission intensity and good color rendering property. An object of the present invention is therefore to provide a double light emitter type light emitting device which can be manufactured easily, has a high emission intensity and has improved color rendering property.
|
10973704
| 2,004
|
Method for processing an integrated circuit
|
Methods for processing at least one die which comprises an integrated circuit. In one example of a method of the invention, an identification code is applied to a carrier. A singulated die is deposited into the carrier which holds the singulated die. The singulated die comprises an integrated circuit. The identification code may be applied to the carrier before or after depositing the singulated die into the carrier. The carrier may be used in testing the singulated die and may include a plurality of singulated die or just one singulated die. In another example of a method of the invention, an identification code is applied to a die. The die is deposited into a carrier which holds the die. The die comprises an integrated circuit, and the carrier holds the die in singulated form. Typically the die is placed in the carrier without any packaging which may protect the die. The identification code may be applied to the die before or after it is deposited into the carrier.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates in general to electronic assemblies and the testing thereof. More specifically, the present invention relates to a method and apparatus for the transport and handling of die from an original wafer to a test board, a printed circuit board, and/or a final product substrate. 2. Description of Related Art The subject of chip scale packaging has been the focus of intense study in the industry for many years. One very promising technology involves securing small, resilient members onto a suitable substrate and using these members to effect contact between an active device and other circuitry. Methods are known for making such resilient interconnection elements used for microelectronics, and for fabricating spring contact elements directly on semiconductor devices. A particularly useful resilient interconnection element comprises a free standing spring contact element secured at one end to an electronic device and having a free end standing away from the electronic device so as to readily contact a second electronic device. See, for example, U.S. Pat. No. 5,476,211, entitled “Method for Manufacturing Electrical Contacts, Using a Sacrificial Member.” A semiconductor device having spring contact elements mounted thereto is termed a springed semiconductor device. A springed semiconductor device may be interconnected to an interconnection substrate in one of two principal ways. It may be permanently connected, such as by soldering the free ends of the spring contact elements to corresponding terminals on an interconnection substrate such as a printed circuit board. Alternatively, it may be reversibly connected to the terminals simply by urging the springed semiconductor device against the interconnection substrate so that a pressure connection is made between the terminals and contact portions of the spring contact elements. Such a reversible pressure connection can be described as self-socketing for the springed semiconductor device. A discussion of making semiconductors with spring packaging (MicroSpring™ contacts) is found in U.S. Pat. No. 5,829,128, issued Nov. 3, 1998, entitled “Method of Mounting Resilient Contact Structures to Semiconductor Devices.” A discussion of using and testing semiconductors with MicroSpring™ contacts is disclosed in U.S. patent application Ser. No. 09/205,502, filed Dec. 4, 1998, entitled “Socket for Mating with Electronic Component, Particularly Semiconductor Device with Spring Packaging, for Fixturing, Testing, Burning-In or Operating Such a Component”, and assigned to the assignee of the present invention. The ability to remove a springed semiconductor device from a pressure connection with an interconnection substrate would be useful in the context of replacing or upgrading the springed semiconductor device. A very useful object is achieved simply by making reversible connections to a springed semiconductor device. This is also useful for mounting, temporarily or permanently, to an interconnection substrate of a system to burn-in the springed semiconductor device or to ascertain whether the springed semiconductor device is measuring up to its specifications. As a general proposition, this can be accomplished by making pressure connections with the spring contact elements. Such contact may have relaxed constraints on contact force and the like. In a typical manufacturing process, a wafer is subjected to limited testing to identify gross functionality or non-functionality of individual components on the wafer. The functional individual semiconductor components or die are then packaged for further burn-in and more comprehensive testing. The packaging process is both expensive and time consuming. Using the MicroSpring contacts for interconnects provides fully testable die while still on the wafer. One preferred method of testing the die is to singulate them, then move them through a more or less typical test flow as is currently performed on packaged devices. A key difference is that the die are already packaged once singulated from the wafer, but current testing equipment is not adapted for use with such devices. To achieve this, a chip level part or IC die could be placed into a carrier once it is diced from the original wafer. The carrier could then transport the die to the test board for burn-in tests, for example. Once all die in the carrier pass inspection, the carrier could then be used to transport and mount the die onto the printed circuit board or final product substrate. Such a carrier would be particularly useful for die which include MicroSpring contacts, or similar contacts. Such a carrier also would be useful for traditional die for making contact with a test apparatus or final product that includes a suitable connection mechanism. A test apparatus or final product including MicroSpring contacts would be particularly useful for connecting to traditional die. A chip level carrier would provide several advantages over the art. First, an individual die would be tested and could be replaced if it failed testing. Second, a chip level carrier could incorporate a tracking mechanism that could track each individual die, storing relevant information on the carrier for monitoring and tracking. Third, a chip level carrier allows for easy handling of numerous dies and protects the dies and their spring contacts during transportation, storage and use. Further, a carrier could limit the amount of compression the spring contacts on the die under test underwent, which may be less than the compression allowed during subsequent primary use of the die. The limitation of the compression could be achieved through design decisions to determine a maximum allowable compression for the spring contacts during the testing phase. Then, different limits can be adopted for actual use. This feature would increase the “travel” life of the spring.
|
Title:
Method for processing an integrated circuit
Abstract:
Methods for processing at least one die which comprises an integrated circuit. In one example of a method of the invention, an identification code is applied to a carrier. A singulated die is deposited into the carrier which holds the singulated die. The singulated die comprises an integrated circuit. The identification code may be applied to the carrier before or after depositing the singulated die into the carrier. The carrier may be used in testing the singulated die and may include a plurality of singulated die or just one singulated die. In another example of a method of the invention, an identification code is applied to a die. The die is deposited into a carrier which holds the die. The die comprises an integrated circuit, and the carrier holds the die in singulated form. Typically the die is placed in the carrier without any packaging which may protect the die. The identification code may be applied to the die before or after it is deposited into the carrier.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates in general to electronic assemblies and the testing thereof. More specifically, the present invention relates to a method and apparatus for the transport and handling of die from an original wafer to a test board, a printed circuit board, and/or a final product substrate. 2. Description of Related Art The subject of chip scale packaging has been the focus of intense study in the industry for many years. One very promising technology involves securing small, resilient members onto a suitable substrate and using these members to effect contact between an active device and other circuitry. Methods are known for making such resilient interconnection elements used for microelectronics, and for fabricating spring contact elements directly on semiconductor devices. A particularly useful resilient interconnection element comprises a free standing spring contact element secured at one end to an electronic device and having a free end standing away from the electronic device so as to readily contact a second electronic device. See, for example, U.S. Pat. No. 5,476,211, entitled “Method for Manufacturing Electrical Contacts, Using a Sacrificial Member.” A semiconductor device having spring contact elements mounted thereto is termed a springed semiconductor device. A springed semiconductor device may be interconnected to an interconnection substrate in one of two principal ways. It may be permanently connected, such as by soldering the free ends of the spring contact elements to corresponding terminals on an interconnection substrate such as a printed circuit board. Alternatively, it may be reversibly connected to the terminals simply by urging the springed semiconductor device against the interconnection substrate so that a pressure connection is made between the terminals and contact portions of the spring contact elements. Such a reversible pressure connection can be described as self-socketing for the springed semiconductor device. A discussion of making semiconductors with spring packaging (MicroSpring™ contacts) is found in U.S. Pat. No. 5,829,128, issued Nov. 3, 1998, entitled “Method of Mounting Resilient Contact Structures to Semiconductor Devices.” A discussion of using and testing semiconductors with MicroSpring™ contacts is disclosed in U.S. patent application Ser. No. 09/205,502, filed Dec. 4, 1998, entitled “Socket for Mating with Electronic Component, Particularly Semiconductor Device with Spring Packaging, for Fixturing, Testing, Burning-In or Operating Such a Component”, and assigned to the assignee of the present invention. The ability to remove a springed semiconductor device from a pressure connection with an interconnection substrate would be useful in the context of replacing or upgrading the springed semiconductor device. A very useful object is achieved simply by making reversible connections to a springed semiconductor device. This is also useful for mounting, temporarily or permanently, to an interconnection substrate of a system to burn-in the springed semiconductor device or to ascertain whether the springed semiconductor device is measuring up to its specifications. As a general proposition, this can be accomplished by making pressure connections with the spring contact elements. Such contact may have relaxed constraints on contact force and the like. In a typical manufacturing process, a wafer is subjected to limited testing to identify gross functionality or non-functionality of individual components on the wafer. The functional individual semiconductor components or die are then packaged for further burn-in and more comprehensive testing. The packaging process is both expensive and time consuming. Using the MicroSpring contacts for interconnects provides fully testable die while still on the wafer. One preferred method of testing the die is to singulate them, then move them through a more or less typical test flow as is currently performed on packaged devices. A key difference is that the die are already packaged once singulated from the wafer, but current testing equipment is not adapted for use with such devices. To achieve this, a chip level part or IC die could be placed into a carrier once it is diced from the original wafer. The carrier could then transport the die to the test board for burn-in tests, for example. Once all die in the carrier pass inspection, the carrier could then be used to transport and mount the die onto the printed circuit board or final product substrate. Such a carrier would be particularly useful for die which include MicroSpring contacts, or similar contacts. Such a carrier also would be useful for traditional die for making contact with a test apparatus or final product that includes a suitable connection mechanism. A test apparatus or final product including MicroSpring contacts would be particularly useful for connecting to traditional die. A chip level carrier would provide several advantages over the art. First, an individual die would be tested and could be replaced if it failed testing. Second, a chip level carrier could incorporate a tracking mechanism that could track each individual die, storing relevant information on the carrier for monitoring and tracking. Third, a chip level carrier allows for easy handling of numerous dies and protects the dies and their spring contacts during transportation, storage and use. Further, a carrier could limit the amount of compression the spring contacts on the die under test underwent, which may be less than the compression allowed during subsequent primary use of the die. The limitation of the compression could be achieved through design decisions to determine a maximum allowable compression for the spring contacts during the testing phase. Then, different limits can be adopted for actual use. This feature would increase the “travel” life of the spring.
|
11000578
| 2,004
|
Two-component mixing and despensing device
|
A device for preparing and ejecting polymeric cement made from at least two pre-packaged components comprises a tubular vessel including a first axial end wall having a closed outlet, and a second axial end wall having an aperture. A first starting component of the polymeric cement is present inside said tubular vessel near the first axial end wall. A shaft extends through said aperture of the second axial end wall. A piston element comprises a closed container filled with a second starting component of the polymeric cement. The piston element is selectively lockable to the shaft. The container has a bore and is slidingly engaged upon said shaft. An agitator element is secured to one end of the shaft. Furthermore opening means for providing an opening in the closed container are provided.
|
TECHNICAL FIELD The invention relates to a device for preparing and delivering polymeric cement made from at least two pre-packaged components, in particular polymeric cement for use in vertebroplasty. Such polymeric cement is prepared by mixing starting components, most frequently a solid, e.g. powdered polymeric component and a liquid monomer component. After mixing the cement is applied to the location to be treated and allowed to cure. This invention allows the preparation and delivery of polymeric cement in situ, in particular in an operating room environment.
|
Title:
Two-component mixing and despensing device
Abstract:
A device for preparing and ejecting polymeric cement made from at least two pre-packaged components comprises a tubular vessel including a first axial end wall having a closed outlet, and a second axial end wall having an aperture. A first starting component of the polymeric cement is present inside said tubular vessel near the first axial end wall. A shaft extends through said aperture of the second axial end wall. A piston element comprises a closed container filled with a second starting component of the polymeric cement. The piston element is selectively lockable to the shaft. The container has a bore and is slidingly engaged upon said shaft. An agitator element is secured to one end of the shaft. Furthermore opening means for providing an opening in the closed container are provided.
Background:
TECHNICAL FIELD The invention relates to a device for preparing and delivering polymeric cement made from at least two pre-packaged components, in particular polymeric cement for use in vertebroplasty. Such polymeric cement is prepared by mixing starting components, most frequently a solid, e.g. powdered polymeric component and a liquid monomer component. After mixing the cement is applied to the location to be treated and allowed to cure. This invention allows the preparation and delivery of polymeric cement in situ, in particular in an operating room environment.
|
10836693
| 2,004
|
Persistent data management with different isolation levels
|
A method is described for managing an application's cached persistent data with different isolation levels. The different isolation levels include: 1) requesting a lock for a first item of database data in response to the first item of database data not being cached and not yet having been used by the application; 2) requesting a lock for a second item of cached database data in response to the second item of database data being updated for a first time by the application; and, 3) requesting a lock for a third item of cached database data in response to it being confirmed that the third item of database data will need to be updated in its database.
|
BACKGROUND
|
Title:
Persistent data management with different isolation levels
Abstract:
A method is described for managing an application's cached persistent data with different isolation levels. The different isolation levels include: 1) requesting a lock for a first item of database data in response to the first item of database data not being cached and not yet having been used by the application; 2) requesting a lock for a second item of cached database data in response to the second item of database data being updated for a first time by the application; and, 3) requesting a lock for a third item of cached database data in response to it being confirmed that the third item of database data will need to be updated in its database.
Background:
BACKGROUND
|
10951621
| 2,004
|
Reinforcing and/or process fibers based on vegetable fibers and production thereof
|
The present invention relates to reinforcing and/or process fibres based on vegetable fibres whose elementary fibres are fibrillated and to a process for their production. The reinforcing and/or process fibres are characterized in that the elementary fibres have a fibril content greater than 3 area percent and less than 50 area percent. The process is characterized in that the fibre material is ground in an eddied air grinder.
|
Title:
Reinforcing and/or process fibers based on vegetable fibers and production thereof
Abstract:
The present invention relates to reinforcing and/or process fibres based on vegetable fibres whose elementary fibres are fibrillated and to a process for their production. The reinforcing and/or process fibres are characterized in that the elementary fibres have a fibril content greater than 3 area percent and less than 50 area percent. The process is characterized in that the fibre material is ground in an eddied air grinder.
Background:
|
|
10936787
| 2,004
|
Locking mechanism for recreational vehicle baggage door
|
A recreational vehicle (RV) with a central actuator that controls locking and unlocking of a plurality of access doors. Each of the access doors has a locking member that is interconnected to the central actuator. Thus, the central actuator may be configured to lock or unlock selected group of doors simultaneously. The central actuator is located inside the RV, and controlling input to the central actuator may be from a remote transmitter, or by direct manipulation of the central actuator. The locking members and the central actuator may be linked mechanically, electromagnetically, hydraulically, pneumatically, or in any number of ways. The central actuator advantageously permits an RV user to lock or unlock groups or all of the access doors simultaneously while inside the RV, or by using the remote transmitter.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to recreational vehicles (RVs) and more specifically, to RV door locking mechanisms that enable multiple baggage doors to lock and unlock as a result of a single activation. 2. Description of the Related Art Recreational vehicles (RVs) have become an increasingly popular and common means of recreation. RVs are mobile vehicles that include a living space inside and can be either self-propelled, as in a motorhome, or can depend on another vehicle for their motive power, as in a trailer such as a fifth wheel trailer. A typical RV comprises a ladder frame mounted on a plurality of wheels adapted for rolling movement across the ground. A floor is mounted atop the frame, a plurality of walls is built atop the floor, and a ceiling is built atop the plurality of walls in order to define an interior living space for the RV users. RV users will typically use the RV to travel to a recreational area and live in the RV for some period of time. Some RV owners even use their RV as their primary residence. Thus, since an RV will often be used for extended periods of time, RV customers will usually desire storage areas where luggage, supplies, appliances, equipment, and the like can be stowed. To address this need, RV manufactures often include hollow compartments to be used as storage areas. These storage areas are usually accessible from outside of the RV, through openings cut in the side of the storage area of the RV, and movable storage area doors usually cover these openings so that cargo will not fall out of the storage areas during travel. Since cargo inside the storage areas is often valuable to the RV owner, the RV owner usually desires to secure the storage area from unauthorized access. To address this concern, RV manufacturers often include securing members on the storage area doors. In a typical embodiment, a RV has multiple storage area doors, and each door comprises at least one securing member. Each securing member can move between a locked position, in which the securing member fixes the storage area door in place over the openings in the storage area, and an unlocked position, in which the storage area door can be moved and the RV can access the interior of the storage area through the opening. Typically, each securing mechanism is coupled to a lock, widely known in the art, such that a key is required for moving the securing mechanism between its locked position and unlocked positions. As such, the RV user can lock the storage area to thereby prevent unauthorized access to the cargo. When the user wants to lock or unlock the lockable storage area doors, the RV owner must perform the act on each of the lockable doors. Unfortunately, having to spend time walking around the RV locking or unlocking the lockable storage area doors prolongs an already time-consuming loading and unloading process. Also, when the RV user wants to drive the RV somewhere, it is preferable to secure every door; however, the user can easily forget to lock one of the doors. Thus, the RV user sometimes spends additional time double checking each and every lock, or sometimes, the user might drive off with the contents of the unlocked storage area compromised. Furthermore, if the storage area doors have uncommon locks, an additional problem arises; namely, each lock requires a different key, and as such, the user becomes encumbered with multiple keys and must often spend time at each lock trying multiple keys until the correct one is found. Therefore, current multi-lock designs can inconvenience the user of the RV in a number of ways. Furthermore, the locks of the storage area doors are almost always located on the outside surface of the RV, requiring the user to get out of the RV to lock and unlock the storage area doors. This can be quite an inconvenience, especially during inclement weather because the user will be exposed to the elements or will have to spend time putting on protective gear to avoid exposure. This is also an inconvenience during the nighttime hours because the darkness often requires the user to awkwardly fumble with a flashlight and the keys as the user tries to find the locks, find the correct key, and guide the key into the lock. Hence from the foregoing, there is an ongoing problem with current RVs in that RV users ordinarily must individually lock and unlock the storage area doors, which is exacerbated because the RV user must do so from outside the vehicle. It will be appreciated that there is need to eliminate these inconveniences.
|
Title:
Locking mechanism for recreational vehicle baggage door
Abstract:
A recreational vehicle (RV) with a central actuator that controls locking and unlocking of a plurality of access doors. Each of the access doors has a locking member that is interconnected to the central actuator. Thus, the central actuator may be configured to lock or unlock selected group of doors simultaneously. The central actuator is located inside the RV, and controlling input to the central actuator may be from a remote transmitter, or by direct manipulation of the central actuator. The locking members and the central actuator may be linked mechanically, electromagnetically, hydraulically, pneumatically, or in any number of ways. The central actuator advantageously permits an RV user to lock or unlock groups or all of the access doors simultaneously while inside the RV, or by using the remote transmitter.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to recreational vehicles (RVs) and more specifically, to RV door locking mechanisms that enable multiple baggage doors to lock and unlock as a result of a single activation. 2. Description of the Related Art Recreational vehicles (RVs) have become an increasingly popular and common means of recreation. RVs are mobile vehicles that include a living space inside and can be either self-propelled, as in a motorhome, or can depend on another vehicle for their motive power, as in a trailer such as a fifth wheel trailer. A typical RV comprises a ladder frame mounted on a plurality of wheels adapted for rolling movement across the ground. A floor is mounted atop the frame, a plurality of walls is built atop the floor, and a ceiling is built atop the plurality of walls in order to define an interior living space for the RV users. RV users will typically use the RV to travel to a recreational area and live in the RV for some period of time. Some RV owners even use their RV as their primary residence. Thus, since an RV will often be used for extended periods of time, RV customers will usually desire storage areas where luggage, supplies, appliances, equipment, and the like can be stowed. To address this need, RV manufactures often include hollow compartments to be used as storage areas. These storage areas are usually accessible from outside of the RV, through openings cut in the side of the storage area of the RV, and movable storage area doors usually cover these openings so that cargo will not fall out of the storage areas during travel. Since cargo inside the storage areas is often valuable to the RV owner, the RV owner usually desires to secure the storage area from unauthorized access. To address this concern, RV manufacturers often include securing members on the storage area doors. In a typical embodiment, a RV has multiple storage area doors, and each door comprises at least one securing member. Each securing member can move between a locked position, in which the securing member fixes the storage area door in place over the openings in the storage area, and an unlocked position, in which the storage area door can be moved and the RV can access the interior of the storage area through the opening. Typically, each securing mechanism is coupled to a lock, widely known in the art, such that a key is required for moving the securing mechanism between its locked position and unlocked positions. As such, the RV user can lock the storage area to thereby prevent unauthorized access to the cargo. When the user wants to lock or unlock the lockable storage area doors, the RV owner must perform the act on each of the lockable doors. Unfortunately, having to spend time walking around the RV locking or unlocking the lockable storage area doors prolongs an already time-consuming loading and unloading process. Also, when the RV user wants to drive the RV somewhere, it is preferable to secure every door; however, the user can easily forget to lock one of the doors. Thus, the RV user sometimes spends additional time double checking each and every lock, or sometimes, the user might drive off with the contents of the unlocked storage area compromised. Furthermore, if the storage area doors have uncommon locks, an additional problem arises; namely, each lock requires a different key, and as such, the user becomes encumbered with multiple keys and must often spend time at each lock trying multiple keys until the correct one is found. Therefore, current multi-lock designs can inconvenience the user of the RV in a number of ways. Furthermore, the locks of the storage area doors are almost always located on the outside surface of the RV, requiring the user to get out of the RV to lock and unlock the storage area doors. This can be quite an inconvenience, especially during inclement weather because the user will be exposed to the elements or will have to spend time putting on protective gear to avoid exposure. This is also an inconvenience during the nighttime hours because the darkness often requires the user to awkwardly fumble with a flashlight and the keys as the user tries to find the locks, find the correct key, and guide the key into the lock. Hence from the foregoing, there is an ongoing problem with current RVs in that RV users ordinarily must individually lock and unlock the storage area doors, which is exacerbated because the RV user must do so from outside the vehicle. It will be appreciated that there is need to eliminate these inconveniences.
|
11009745
| 2,004
|
Dynamic surgical table system
|
A dynamic surgical table system includes any one or combination of a head support system, support systems for each arm, a torso support system, and a leg support system mounted to a frame system to support a patient during surgery. Any one or combination of the support systems is movable relative to the other and to the frame system to facilitate patient repositioning during surgery. Such repositioning may be desirable, for example, to create flexion, extension or rotation of the spine to facilitate access to and surgical treatment of one or more vertebral bodies, disc spaces between vertebral bodies, or other anatomical structures adjacent the spine of the patient. Furthermore, individual support members of any one of the support systems can articulate to conform to the patient anatomy and facilitate repositioning of the particular portion of the patient's body being support thereon while minimizing stress on the patient.
|
BACKGROUND Surgical tables are employed during surgery to support the patient in a position that provides access to internal portions of the patient's body to be subject to surgical procedures. The ability to manipulate the patient's limbs, head and/or torso during the surgery can be limited by the design and functioning of the surgical table. Furthermore, the contact areas between the table and the patient can create pressure points on the patient. During long procedures, these pressure points can create post-operative sores and irritation for the patient. It is sometimes necessary to reposition the patient during surgery. Such repositioning may involve time-consuming lifting and movement of the patient and placement of pads between the patient and the surgical table. In addition, the areas of contact between the table and the patient may create sores and irritation through friction or rubbing the skin of the patient as the patient is repositioned during surgery.
|
Title:
Dynamic surgical table system
Abstract:
A dynamic surgical table system includes any one or combination of a head support system, support systems for each arm, a torso support system, and a leg support system mounted to a frame system to support a patient during surgery. Any one or combination of the support systems is movable relative to the other and to the frame system to facilitate patient repositioning during surgery. Such repositioning may be desirable, for example, to create flexion, extension or rotation of the spine to facilitate access to and surgical treatment of one or more vertebral bodies, disc spaces between vertebral bodies, or other anatomical structures adjacent the spine of the patient. Furthermore, individual support members of any one of the support systems can articulate to conform to the patient anatomy and facilitate repositioning of the particular portion of the patient's body being support thereon while minimizing stress on the patient.
Background:
BACKGROUND Surgical tables are employed during surgery to support the patient in a position that provides access to internal portions of the patient's body to be subject to surgical procedures. The ability to manipulate the patient's limbs, head and/or torso during the surgery can be limited by the design and functioning of the surgical table. Furthermore, the contact areas between the table and the patient can create pressure points on the patient. During long procedures, these pressure points can create post-operative sores and irritation for the patient. It is sometimes necessary to reposition the patient during surgery. Such repositioning may involve time-consuming lifting and movement of the patient and placement of pads between the patient and the surgical table. In addition, the areas of contact between the table and the patient may create sores and irritation through friction or rubbing the skin of the patient as the patient is repositioned during surgery.
|
10864323
| 2,004
|
Pigment composition and use thereof in plastic
|
A pigment composition composed of 50 to 95% by weight of a phthalocyanine, 1 to 45% by weight of a halogenated phthalocyanine of which the number of substituents of a halogen atom is 1 to 9 and the average number of the substituents is 2.0 to 4.0 and 0.1 to 10% by weight of a phthalocyanine derivative of the formula (1) or a phthalimide methylated phthalocyanine derivative, a colorant containing the above pigment composition and a molded article obtained from a plastic containing the above colorant, P-(X)m (1) wherein P represents a phthalocyanine structure, X represents an alkyl group having 12 to 18 carbon atoms, an alkoxy group having 12 to 18 carbon atoms, —SO2NHR, —SO2NR2, —NR2, —CONR2, —CONHR or —SR (wherein R represents an alkyl group or an alkenyl group which has 12 to 18 carbon atoms), and m is an integer of 1 to 4.
|
FIELD OF THE INVENTION The present invention relates to a pigment composition for coloring. Specifically, it relates to a colorant formed of a phthalocyanine pigment as a main coloring ingredient and a plastic molded article which is colored with the above colorant and is small in warpage or deformation.
|
Title:
Pigment composition and use thereof in plastic
Abstract:
A pigment composition composed of 50 to 95% by weight of a phthalocyanine, 1 to 45% by weight of a halogenated phthalocyanine of which the number of substituents of a halogen atom is 1 to 9 and the average number of the substituents is 2.0 to 4.0 and 0.1 to 10% by weight of a phthalocyanine derivative of the formula (1) or a phthalimide methylated phthalocyanine derivative, a colorant containing the above pigment composition and a molded article obtained from a plastic containing the above colorant, P-(X)m (1) wherein P represents a phthalocyanine structure, X represents an alkyl group having 12 to 18 carbon atoms, an alkoxy group having 12 to 18 carbon atoms, —SO2NHR, —SO2NR2, —NR2, —CONR2, —CONHR or —SR (wherein R represents an alkyl group or an alkenyl group which has 12 to 18 carbon atoms), and m is an integer of 1 to 4.
Background:
FIELD OF THE INVENTION The present invention relates to a pigment composition for coloring. Specifically, it relates to a colorant formed of a phthalocyanine pigment as a main coloring ingredient and a plastic molded article which is colored with the above colorant and is small in warpage or deformation.
|
10804935
| 2,004
|
In-line annular seal-based pressure device
|
A pressure sensor for measuring a pressure of a process fluid includes a vessel, an electrode and a diaphragm. The vessel receives the process fluid. The electrode is integral with an inner wall of the vessel. The diaphragm extends at least partially over the electrode and is configured to move relative to the electrode in response to the pressure of the process fluid. An electrical capacitance between the electrode and the diaphragm is related to the pressure of the process fluid.
|
BACKGROUND OF THE INVENTION The present invention relates to a pressure sensor for measuring a pressure or a differential pressure related to a fluid flow. More particularly, the present invention relates to a pressure sensor using capacitive annular elements to measure pressure or the direction and flow rate of a fluid flow. Pressure and fluid flow sensors can be used in many different applications. In industrial process control environments, for example, pressure sensors can be utilized to measure gauge pressure, absolute pressure and the like. Additionally, fluid flow sensors, for example, can be used to measure flow rates of process fluids and provide flow signals for flow indicators, controls, and flow volume metering. The term “fluid” as it is used herein refers to both liquids and gases, and their combination. Differential pressure flow sensors measure the fluid flow rate in a pipe, vessel or conduit by measuring a pressure drop across a discontinuity within the pipe. One way to form the discontinuity is to place a flow restriction member or primary element within the pipe to produce the desired pressure drop. One such flow restriction member is an orifice plate that restricts the fluid flow and produces the measured pressure drop. Typical flow rate measuring systems tap the pipe containing the fluid flow on either side of the flow restriction member, measure the pressure at each tap, and use an external pressure sensor to obtain the pressure drop. Impulse or gauge lines filled with fluid communicate the pressure at each tap to the external pressure sensor. Such systems have relatively high installation costs due to the need to attach an external pressure sensor to the pipe. Moreover, it is necessary in such systems to provide additional leakage protection at the locations where the pipe is tapped, adding to the installation costs both in terms of installation time and material costs. In some instances, the process fluid or gas being sensed by the pressure sensor may require a highly pure or ultra-pure environment. One technique to address such installation requirements is to separate the pressure sensor from the process fluid using an isolation diaphragm. Typically, an oil fill couples the pressure sensor to the isolation diaphragm such that pressure applied to the diaphragm is applied to the pressure sensor. However, this isolation technique can introduce errors in pressure measurements. Additionally, in highly pure process environments, if the diaphragm were to become damaged or the seal were to become damaged (either through corrosion or through collisions with particulate matter within the fluid flow), the entire process could become contaminated by the oil fill. In the case of silicon wafer fabrication, the flow meter must be dry, that is, with no fill fluid to transport the pressure signal.
|
Title:
In-line annular seal-based pressure device
Abstract:
A pressure sensor for measuring a pressure of a process fluid includes a vessel, an electrode and a diaphragm. The vessel receives the process fluid. The electrode is integral with an inner wall of the vessel. The diaphragm extends at least partially over the electrode and is configured to move relative to the electrode in response to the pressure of the process fluid. An electrical capacitance between the electrode and the diaphragm is related to the pressure of the process fluid.
Background:
BACKGROUND OF THE INVENTION The present invention relates to a pressure sensor for measuring a pressure or a differential pressure related to a fluid flow. More particularly, the present invention relates to a pressure sensor using capacitive annular elements to measure pressure or the direction and flow rate of a fluid flow. Pressure and fluid flow sensors can be used in many different applications. In industrial process control environments, for example, pressure sensors can be utilized to measure gauge pressure, absolute pressure and the like. Additionally, fluid flow sensors, for example, can be used to measure flow rates of process fluids and provide flow signals for flow indicators, controls, and flow volume metering. The term “fluid” as it is used herein refers to both liquids and gases, and their combination. Differential pressure flow sensors measure the fluid flow rate in a pipe, vessel or conduit by measuring a pressure drop across a discontinuity within the pipe. One way to form the discontinuity is to place a flow restriction member or primary element within the pipe to produce the desired pressure drop. One such flow restriction member is an orifice plate that restricts the fluid flow and produces the measured pressure drop. Typical flow rate measuring systems tap the pipe containing the fluid flow on either side of the flow restriction member, measure the pressure at each tap, and use an external pressure sensor to obtain the pressure drop. Impulse or gauge lines filled with fluid communicate the pressure at each tap to the external pressure sensor. Such systems have relatively high installation costs due to the need to attach an external pressure sensor to the pipe. Moreover, it is necessary in such systems to provide additional leakage protection at the locations where the pipe is tapped, adding to the installation costs both in terms of installation time and material costs. In some instances, the process fluid or gas being sensed by the pressure sensor may require a highly pure or ultra-pure environment. One technique to address such installation requirements is to separate the pressure sensor from the process fluid using an isolation diaphragm. Typically, an oil fill couples the pressure sensor to the isolation diaphragm such that pressure applied to the diaphragm is applied to the pressure sensor. However, this isolation technique can introduce errors in pressure measurements. Additionally, in highly pure process environments, if the diaphragm were to become damaged or the seal were to become damaged (either through corrosion or through collisions with particulate matter within the fluid flow), the entire process could become contaminated by the oil fill. In the case of silicon wafer fabrication, the flow meter must be dry, that is, with no fill fluid to transport the pressure signal.
|
11009420
| 2,004
|
Reliable one-way messaging over request-response transport protocols
|
Example embodiments provide for a binding mechanism between RM protocols and request-response transport protocols (e.g., HTTP) in a one-way message exchange pattern. The present invention leverages existing network characteristics of request-response transport protocols without reconfiguration or deployment of new infrastructure services. A request-response transport model is asymmetrical in nature and provides two data-flows; a request flow and a reply flow. When an initiator is not addressable and/or when communication requires a request-response transport, the present invention allows infrastructure and application messages to be sent on the request flow, while acknowledgments and other infrastructure messages may be sent back across the reply flow of the transport.
|
BACKGROUND OF THE INVENTION 1. The Field of the Invention The present invention is generally related to Reliable Messaging protocols for distributed systems, e.g., Web Services. More specifically, the present invention provides for a binding of Reliable Messing protocols for distributed systems to request-response transport protocols (e.g., HTTP) in a one-way message exchange pattern environment. 2. Background and Related Art Computer networks have enhanced our ability to communicate and access information by allowing one computer or device to communicate over a network with another computing system using electronic messages. When transferring an electronic message between computing systems, the electronic message will often pass through a protocol stack that performs operations on the data within the electronic message (e.g., parsing, routing, flow control, etc.). The Open System Interconnect (OSI) model is an example of a network framework for implementing a protocol stack. The OSI model breaks down the operations for transferring an electronic message into seven distinct layers, each designated to perform certain operations in the data transfer process. While protocol stacks can potentially implement each of the layers, many protocol stacks implement only selective layers for use in transferring data across a network. When data is transmitted from a computing system, it originates at the application layer and is passed down to intermediate lower layers and then onto a network. When data is received from a network it enters the physical layer and is passed up to the higher intermediate layers and then is eventually received at that application layer. The application layer—the upper most layer—is responsible for supporting application and end-user processing. Further, within the application layer there may reside several other layers (e.g., the Simple Open Access Protocol (SOAP) layer). Another layer incorporated by most protocol stacks is the transport layer. An example of a transport layer is the Transmission Control Protocol (TCP). Web Services (WS) have been a driving force in advancing communications between computing systems and are turning the way we build and use software inside-out. Web Services let applications share data and—more powerfully—invoke capabilities from other applications without regard to how these applications where built; what operating systems or platform they run on; and what devices are used to access them. Web Services are invoked over the Internet by means of industry-standard protocols including SOAP, XML (eXtensible Markup Language), UDDI (Universal, Description, Discovery and Integration), WSDL (Web Service Description Language), etc. Although Web Services remain independent of each other, they can loosely link themselves into a collaborating group that performs a particular task. Current WS technologies offer direct SOAP-message communication between an initiator (e.g., a client) and an acceptor (e.g., a service). In the common bi-directional messaging case, a SOAP request message is sent from the initiator to the acceptor and a SOAP reply message is sent in response thereto. Another communication variant between endpoints is unidirectional message, where the initiator sends a message to the acceptor with no response. A key benefit of the emerging WS architecture is the ability to deliver integrated, interoperable solutions. Because, however, Web Services provide various services from different business, originations, and other service providers via unreliable communication channels such as the Internet, reliability of WS becomes an increasing important factor. Reliability of WS is impacted by several factors including but not limited to, the reliability of the Web Service endpoints; reliability characteristics of the communication channel over which the Web Services are accessed; performance and fault-tolerance characteristics; and the extent to which Web Services can handle concurrent client access. There have been attempts at accomplishing reliable messaging of Web Services by choosing a reliable transport protocol over which the messages (e.g., SOAP messages) are exchanged between endpoints. For example, a reliable messaging transport such as message-queues can be used to deliver messages reliably between initiators and acceptors. Message-queuing communication technologies enable applications on different systems to communicate with each other by sending messages to queues and reading messages from queues that are persisted across failures for reliability. Although queuing systems offer a transport that can be used to carry SOAP messages reliably, there are several drawbacks to such systems. For instance, these systems offer solutions for an asynchronous operation where the requests (and possibly their responses) are transferred and processed with isolation. Accordingly, these systems are typically heavyweight in terms of resources; involving multiple intermediaries with durable transacted message stores and with considerably more complexity in deployment, programming model and management. All of this is unnecessary for reliable direct communication, and detracts from the goal of minimizing latency. Further, the program model does not directly support request-response style programming or sessions. Accordingly, the queued communication model is different from the current “interactive” Web Services model, and does not address critical “connected” scenarios and “interactive” applications. For example, it is not well suited for cases where a response is expected in a timely manner, or for cases where distributed-transaction-context need to be shared between initiator and acceptor. There have also been attempts at defining reliable transfer layers over fundamentally unreliable transport protocols, e.g., reliable HTTP or HTTPR. A common problem, however, that plagues this solution—as well as the queuing solution—is that reliable messaging can be achieved only if the specific reliable transport protocol is used for communication between the initiator and the acceptor. The fundamental nature of Web Services calls for independence from specific vender platform, implementation languages and specific transport protocols. In a generic case, an initiator may not be able to transmit a message directly to an acceptor using a particular protocol (e.g., acceptor does not support the protocol) or the message may need to pass through multiple hops after leaving the sending node prior to arriving at that destination node. Depending on the nature of the connectivity between the two nodes involved in a particular hop, a suitable transport protocol that does not offer reliable messaging characteristics may have to be chosen. Intermediaries may also exist at different levels in the protocol stack; and therefore, not offer full end-to-end reliability. For example, transport protocols may offer reliability across lower level intermediaries (e.g., IP level intermediaries—e.g., IP routers). The transport protocol may end, however, at a SOAP intermediary or application layer (e.g. an HTTP Proxy). Accordingly, the transport protocol may not be able to offer reliability across that intermediary, i.e., no end-to-end reliability across the application layer. More recently, various Reliable Messaging protocols for distributed systems (hereinafter referred to as “RM protocols”), offer solutions to the above identified-deficiencies of current reliable messaging systems. These protocols (e.g., RM protocols for Web Services (WS), which include WS-ReliableMessaging, WS-Reliability, etc.) are transport agnostic connected protocols that allow messages to be delivered reliably between endpoint applications in presences of software component, system or network failures. Accordingly, RM protocols offer solutions for reliable, end-to-end, and potentially session-oriented communication between an initiator and an acceptor. These RM protocols are akin to TCP in that TCP offers reliable, exactly-once, in-order delivery of a stream of bytes from a TCP sender to TCP receiver across Internet Protocol (IP) routers and multiple networks. Reliable Messaging protocols for distributed systems offer the same and more for messages (note: the unit of transfer is a message, not a byte) across multiple intermediaries (including transport and SOAP level intermediaries), transports and connections. Although TCP and RM protocols are both “reliable” protocols, because RM protocols (and, more generally, the SOAP layer) reside at the application in the OSI model, RM protocols provide for reliable messaging regardless of the transport protocol used to transfer the data. Accordingly, RM protocols are not tied to a particular transport or other protocol used to transfer message between endpoints. Although a few RM protocols have been around for some time there are still several drawbacks and deficiencies of these protocol specs. For example, Reliable Messaging protocols for distributed systems typically require bi-directional message exchange; i.e., application messages go in one direction and infrastructure acknowledgments go in the other direction. Further, there are cases where unsolicited acceptor-to-initiator communication is not possible; for instance, when the initiator is behind a firewall and uses a request-response transport protocol (e.g., HTTP) connection (by, e.g., tunneling through a HTTP proxy) to communicate with the acceptor. A problem arises, however, in being able to send acknowledgments and other infrastructure messages to the initiator since the initiator is typically not addressable and/or communication is restricted to a request-response transport protocol. Accordingly, a need arises for orchestrating the reliable sending of application-level messages in a one-way message exchange pattern from an initiator to the acceptor—and RM infrastructure messages in both directions—over a transport that offers a request-response messaging pattern.
|
Title:
Reliable one-way messaging over request-response transport protocols
Abstract:
Example embodiments provide for a binding mechanism between RM protocols and request-response transport protocols (e.g., HTTP) in a one-way message exchange pattern. The present invention leverages existing network characteristics of request-response transport protocols without reconfiguration or deployment of new infrastructure services. A request-response transport model is asymmetrical in nature and provides two data-flows; a request flow and a reply flow. When an initiator is not addressable and/or when communication requires a request-response transport, the present invention allows infrastructure and application messages to be sent on the request flow, while acknowledgments and other infrastructure messages may be sent back across the reply flow of the transport.
Background:
BACKGROUND OF THE INVENTION 1. The Field of the Invention The present invention is generally related to Reliable Messaging protocols for distributed systems, e.g., Web Services. More specifically, the present invention provides for a binding of Reliable Messing protocols for distributed systems to request-response transport protocols (e.g., HTTP) in a one-way message exchange pattern environment. 2. Background and Related Art Computer networks have enhanced our ability to communicate and access information by allowing one computer or device to communicate over a network with another computing system using electronic messages. When transferring an electronic message between computing systems, the electronic message will often pass through a protocol stack that performs operations on the data within the electronic message (e.g., parsing, routing, flow control, etc.). The Open System Interconnect (OSI) model is an example of a network framework for implementing a protocol stack. The OSI model breaks down the operations for transferring an electronic message into seven distinct layers, each designated to perform certain operations in the data transfer process. While protocol stacks can potentially implement each of the layers, many protocol stacks implement only selective layers for use in transferring data across a network. When data is transmitted from a computing system, it originates at the application layer and is passed down to intermediate lower layers and then onto a network. When data is received from a network it enters the physical layer and is passed up to the higher intermediate layers and then is eventually received at that application layer. The application layer—the upper most layer—is responsible for supporting application and end-user processing. Further, within the application layer there may reside several other layers (e.g., the Simple Open Access Protocol (SOAP) layer). Another layer incorporated by most protocol stacks is the transport layer. An example of a transport layer is the Transmission Control Protocol (TCP). Web Services (WS) have been a driving force in advancing communications between computing systems and are turning the way we build and use software inside-out. Web Services let applications share data and—more powerfully—invoke capabilities from other applications without regard to how these applications where built; what operating systems or platform they run on; and what devices are used to access them. Web Services are invoked over the Internet by means of industry-standard protocols including SOAP, XML (eXtensible Markup Language), UDDI (Universal, Description, Discovery and Integration), WSDL (Web Service Description Language), etc. Although Web Services remain independent of each other, they can loosely link themselves into a collaborating group that performs a particular task. Current WS technologies offer direct SOAP-message communication between an initiator (e.g., a client) and an acceptor (e.g., a service). In the common bi-directional messaging case, a SOAP request message is sent from the initiator to the acceptor and a SOAP reply message is sent in response thereto. Another communication variant between endpoints is unidirectional message, where the initiator sends a message to the acceptor with no response. A key benefit of the emerging WS architecture is the ability to deliver integrated, interoperable solutions. Because, however, Web Services provide various services from different business, originations, and other service providers via unreliable communication channels such as the Internet, reliability of WS becomes an increasing important factor. Reliability of WS is impacted by several factors including but not limited to, the reliability of the Web Service endpoints; reliability characteristics of the communication channel over which the Web Services are accessed; performance and fault-tolerance characteristics; and the extent to which Web Services can handle concurrent client access. There have been attempts at accomplishing reliable messaging of Web Services by choosing a reliable transport protocol over which the messages (e.g., SOAP messages) are exchanged between endpoints. For example, a reliable messaging transport such as message-queues can be used to deliver messages reliably between initiators and acceptors. Message-queuing communication technologies enable applications on different systems to communicate with each other by sending messages to queues and reading messages from queues that are persisted across failures for reliability. Although queuing systems offer a transport that can be used to carry SOAP messages reliably, there are several drawbacks to such systems. For instance, these systems offer solutions for an asynchronous operation where the requests (and possibly their responses) are transferred and processed with isolation. Accordingly, these systems are typically heavyweight in terms of resources; involving multiple intermediaries with durable transacted message stores and with considerably more complexity in deployment, programming model and management. All of this is unnecessary for reliable direct communication, and detracts from the goal of minimizing latency. Further, the program model does not directly support request-response style programming or sessions. Accordingly, the queued communication model is different from the current “interactive” Web Services model, and does not address critical “connected” scenarios and “interactive” applications. For example, it is not well suited for cases where a response is expected in a timely manner, or for cases where distributed-transaction-context need to be shared between initiator and acceptor. There have also been attempts at defining reliable transfer layers over fundamentally unreliable transport protocols, e.g., reliable HTTP or HTTPR. A common problem, however, that plagues this solution—as well as the queuing solution—is that reliable messaging can be achieved only if the specific reliable transport protocol is used for communication between the initiator and the acceptor. The fundamental nature of Web Services calls for independence from specific vender platform, implementation languages and specific transport protocols. In a generic case, an initiator may not be able to transmit a message directly to an acceptor using a particular protocol (e.g., acceptor does not support the protocol) or the message may need to pass through multiple hops after leaving the sending node prior to arriving at that destination node. Depending on the nature of the connectivity between the two nodes involved in a particular hop, a suitable transport protocol that does not offer reliable messaging characteristics may have to be chosen. Intermediaries may also exist at different levels in the protocol stack; and therefore, not offer full end-to-end reliability. For example, transport protocols may offer reliability across lower level intermediaries (e.g., IP level intermediaries—e.g., IP routers). The transport protocol may end, however, at a SOAP intermediary or application layer (e.g. an HTTP Proxy). Accordingly, the transport protocol may not be able to offer reliability across that intermediary, i.e., no end-to-end reliability across the application layer. More recently, various Reliable Messaging protocols for distributed systems (hereinafter referred to as “RM protocols”), offer solutions to the above identified-deficiencies of current reliable messaging systems. These protocols (e.g., RM protocols for Web Services (WS), which include WS-ReliableMessaging, WS-Reliability, etc.) are transport agnostic connected protocols that allow messages to be delivered reliably between endpoint applications in presences of software component, system or network failures. Accordingly, RM protocols offer solutions for reliable, end-to-end, and potentially session-oriented communication between an initiator and an acceptor. These RM protocols are akin to TCP in that TCP offers reliable, exactly-once, in-order delivery of a stream of bytes from a TCP sender to TCP receiver across Internet Protocol (IP) routers and multiple networks. Reliable Messaging protocols for distributed systems offer the same and more for messages (note: the unit of transfer is a message, not a byte) across multiple intermediaries (including transport and SOAP level intermediaries), transports and connections. Although TCP and RM protocols are both “reliable” protocols, because RM protocols (and, more generally, the SOAP layer) reside at the application in the OSI model, RM protocols provide for reliable messaging regardless of the transport protocol used to transfer the data. Accordingly, RM protocols are not tied to a particular transport or other protocol used to transfer message between endpoints. Although a few RM protocols have been around for some time there are still several drawbacks and deficiencies of these protocol specs. For example, Reliable Messaging protocols for distributed systems typically require bi-directional message exchange; i.e., application messages go in one direction and infrastructure acknowledgments go in the other direction. Further, there are cases where unsolicited acceptor-to-initiator communication is not possible; for instance, when the initiator is behind a firewall and uses a request-response transport protocol (e.g., HTTP) connection (by, e.g., tunneling through a HTTP proxy) to communicate with the acceptor. A problem arises, however, in being able to send acknowledgments and other infrastructure messages to the initiator since the initiator is typically not addressable and/or communication is restricted to a request-response transport protocol. Accordingly, a need arises for orchestrating the reliable sending of application-level messages in a one-way message exchange pattern from an initiator to the acceptor—and RM infrastructure messages in both directions—over a transport that offers a request-response messaging pattern.
|
10774982
| 2,004
|
Angularly adjustable post mount
|
An adjustable post mount includes a stationary portion that provides an attachment rod secured to a substructure such as the ground and which extends therefrom in a direction defining a first axis, and an adjustable post base that rests on the stationary portion. The post base includes a curved bottom bearing surface with a slotted aperture through which the attachment rod extends. A spacer having a curved surface corresponding to the bottom surface of the post base and a center aperture through which the attachment rod extends is interposed between the post base and the stationary potion and lies in engagement with the bottom surface of the post base so as to form a joint that enables angular adjustment of the post base with respect to the first axis to offset a vertical misalignment in the stationary potion within a predetermined range. The adjustable post mount can be releasably locked into position and can be readjusted as necessary to offset misalignment in the stationary portion from shifting ground conditions and the like. The adjustable post mount also provides a post and/or post mount break away capability in response to the force of a vehicle impact.
|
BACKGROUND A variety of road signs, markers, and traffic delineators include a post or other support that is set in a substructure such as the ground. For example, marker posts are often made from a domed, round cedar post approximately 4 to 6 inches in diameter that is painted, equipped with reflectors and set in a post hole. While the post materials are relatively inexpensive, installation is labor intensive and time consuming. To set a marker post properly, the post hole must be dug to a depth of approximately 24 to 30 inches and the post must be held in alignment while the hole is carefully backfilled with sand, gravel or cement, so that the post is tight, upright and secure. Unfortunately, no amount of care in setting a post will prevent it from becoming misalignment over time due to shifting ground conditions and normal freeze/thaw cycles, not to mention misalignment or destruction that can result from vehicle impacts. Setting the post in cement may retard the natural processes somewhat, but eventually nature (and human nature) will prevail and the post, together with the cement, will shift in the ground and become crooked, or be sheared off the mount by an errant driver, sending the post dangerously into the air and leaving a stub securely and permanently embedded in cement. Even costly spring-type mountings and posts which are designed to survive being run over, will, at best, only return a post or marker to the position it was in before being hit, a position that inevitably will shift out of alignment over time. Resetting or replacing a post is a time consuming project and realignment can be as time-consuming as setting a new post. It generally involves excavating around the post and/or the post mount until enough earth is removed to allow the post to be moved followed by careful backfilling to ensure the post or post mount is securely set in proper alignment. This process may need to be repeated every few years, depending on the environment. Moreover, a significant number of posts are struck or run over and require replacement. Some must be maintained, repaired or replaced for safety reasons as soon as possible. If the ground is frozen hard, a fire may need to be built and maintained over the excavation site until the ground has been thawed sufficiently to begin digging. In times of shrinking budgets, it becomes increasingly difficult to keep up with the labor intensive, costly, and never ending process of post realignment, and general maintenance related to appearance and or replacement. What is needed is a simple, safe, inexpensive, low maintenance apparatus for mounting and anchoring a post that will enable the post to be easily realigned or replaced without costly and time consuming excavation. The apparatus should stand up well to the elements, be easy to install and be capable of mounting an inexpensive and easily replaceable post that is also durable and pleasing in appearance. It would also be desirable that the post have the capability of breaking away from the mounting if it is hit by a vehicle without causing significant damage to the mounting or to the vehicle.
|
Title:
Angularly adjustable post mount
Abstract:
An adjustable post mount includes a stationary portion that provides an attachment rod secured to a substructure such as the ground and which extends therefrom in a direction defining a first axis, and an adjustable post base that rests on the stationary portion. The post base includes a curved bottom bearing surface with a slotted aperture through which the attachment rod extends. A spacer having a curved surface corresponding to the bottom surface of the post base and a center aperture through which the attachment rod extends is interposed between the post base and the stationary potion and lies in engagement with the bottom surface of the post base so as to form a joint that enables angular adjustment of the post base with respect to the first axis to offset a vertical misalignment in the stationary potion within a predetermined range. The adjustable post mount can be releasably locked into position and can be readjusted as necessary to offset misalignment in the stationary portion from shifting ground conditions and the like. The adjustable post mount also provides a post and/or post mount break away capability in response to the force of a vehicle impact.
Background:
BACKGROUND A variety of road signs, markers, and traffic delineators include a post or other support that is set in a substructure such as the ground. For example, marker posts are often made from a domed, round cedar post approximately 4 to 6 inches in diameter that is painted, equipped with reflectors and set in a post hole. While the post materials are relatively inexpensive, installation is labor intensive and time consuming. To set a marker post properly, the post hole must be dug to a depth of approximately 24 to 30 inches and the post must be held in alignment while the hole is carefully backfilled with sand, gravel or cement, so that the post is tight, upright and secure. Unfortunately, no amount of care in setting a post will prevent it from becoming misalignment over time due to shifting ground conditions and normal freeze/thaw cycles, not to mention misalignment or destruction that can result from vehicle impacts. Setting the post in cement may retard the natural processes somewhat, but eventually nature (and human nature) will prevail and the post, together with the cement, will shift in the ground and become crooked, or be sheared off the mount by an errant driver, sending the post dangerously into the air and leaving a stub securely and permanently embedded in cement. Even costly spring-type mountings and posts which are designed to survive being run over, will, at best, only return a post or marker to the position it was in before being hit, a position that inevitably will shift out of alignment over time. Resetting or replacing a post is a time consuming project and realignment can be as time-consuming as setting a new post. It generally involves excavating around the post and/or the post mount until enough earth is removed to allow the post to be moved followed by careful backfilling to ensure the post or post mount is securely set in proper alignment. This process may need to be repeated every few years, depending on the environment. Moreover, a significant number of posts are struck or run over and require replacement. Some must be maintained, repaired or replaced for safety reasons as soon as possible. If the ground is frozen hard, a fire may need to be built and maintained over the excavation site until the ground has been thawed sufficiently to begin digging. In times of shrinking budgets, it becomes increasingly difficult to keep up with the labor intensive, costly, and never ending process of post realignment, and general maintenance related to appearance and or replacement. What is needed is a simple, safe, inexpensive, low maintenance apparatus for mounting and anchoring a post that will enable the post to be easily realigned or replaced without costly and time consuming excavation. The apparatus should stand up well to the elements, be easy to install and be capable of mounting an inexpensive and easily replaceable post that is also durable and pleasing in appearance. It would also be desirable that the post have the capability of breaking away from the mounting if it is hit by a vehicle without causing significant damage to the mounting or to the vehicle.
|
10844433
| 2,004
|
Apparatus for moving shelving
|
An apparatus for moving shelving, comprising an elongated housing, a locking pin, a first hollow shaft, a second hollow shaft, an elongated push member, a nut member, an elongated threaded rod, a drive shaft, and a base plate. The drive shaft is adapted to be rotated by a drive mechanism such as a power drill, wherein rotation in the drive shaft causes rotation in the threaded rod to push the push member away from the housing to move shelving.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to moving devices. Specifically, the invention is a moving device adapted to move aisle shelving. 2. Description of the Related Art Retail outlets such as discount stores and supermarkets make use of shelving to hold merchandise intended for sale to the public. Shelving is often installed in rows or “runs” and is sometimes referred to as “gondolas”. The rows or runs create aisles or passages. Specifically, each aisle is defined by opposite rows of shelving. A shopper typically walks along an aisle with a shopping trolley and scans both sides of the aisle, stopping intermittently to select and remove merchandise off one of the opposite rows of shelving. The shopper moves the selected merchandise to a checkout station where the shopper purchases the merchandise. Rows of shelving are found in other types of buildings such as public libraries where books are stored on rows of shelves. A library member typically walks along a row of books, stopping to select a book. Once the library member has selected one or more books the member typically heads for a library check out desk. Sometimes it is necessary to move shelving. For example, a remodeling design for a retail store that calls for rearranging the shopping aisles. Significant labor is involved in moving shelves, particularly shelves full of items such as merchandise or books. Typically the shelves are emptied of their contents, dismantled, and reassembled at a new position and the contents returned to the shelves. Some shelving is adapted to be lifted and moved using mechanical lifting apparatus. Sometimes it is only necessary to move shelving a few inches or by a foot or so. However, moving shelving just a short distance still entails emptying or using lifting apparatus to move the shelving over a short distance. Thus, there has been a long felt and unmet need for an apparatus that can move shelving over a relatively short distance without requiring awkward and expensive lifting apparatus or the emptying and reloading of shelves. A review of the prior art follows. U.S. Pat. No. 3,879,053, issued Apr. 22, 1975 to W. J. Chvala, describes a mobile display cart with a kick plate mounted to the bottom of the cart for anchoring the cart. The '053 patent does not teach or suggest an apparatus as claimed in the present invention to move otherwise non-mobile shelving or gondolas. U.S. Pat. No. 5,012,879 issued May 7, 1991 to Bienek et al., describes a self propelled jacking apparatus for transporting loads and adjusting the height of the load. The '879 patent does not teach or suggest an apparatus for horizontally pushing or nudging a permanent or otherwise non-mobile shelving or gondolas. U.S. Pat. No. 6,238,159 B1 issued May 29, 2001 to S. Pappas, describes an installation device that provides controlled vertical movement of materials with a hydraulic jack modified to accept the chuck of a power drill. The '159 patent does not teach or suggest an apparatus for horizontally pushing or nudging a permanent or otherwise non-mobile shelving or gondolas. U.S. Pat. No. 6,460,827 issued Oct. 8, 2002 to D. A. Baucom describes a lifting and movement system for lifting a complete run of shelving having a plurality of shelf units and for moving the shelving along a floor surface to a desired location. First and second frame structures are defined by interconnected modular frame assemblies so as to have sufficient length to extend along the entire length of a run of shelving. Wheels such as casters are mounted to the first frame to provide for movement of the lifting system and the run of shelving along the floor surface to a desired location. A second, movable frame is in vertically movable assembly with the first frame and has shelving engaging components for lifting engagement with the run of shelving. A plurality of lift elements is supported by the first frame and provides support for the second frame and the shelving engaged thereby. A power system, which is preferably a pneumatic pressure supply, is in controllable relation with each of the lift elements and is selectively operable for simultaneously activating each of the lift elements for simultaneous lifting or lowering of all of the modular sections of the second frame relative to the first frame to thereby provide for selective lifting or lowering of the shelving. The '827 patent expressly teaches away from the present invention. Specifically, the '827 patent does not teach or suggest an apparatus for horizontally pushing or nudging a permanent or otherwise non-mobile shelving or gondolas. None of the above inventions and patents, taken either singly or in combination, is seen to describe the instant invention as claimed. Thus an apparatus for moving shelving solving the aforementioned problems is desired.
|
Title:
Apparatus for moving shelving
Abstract:
An apparatus for moving shelving, comprising an elongated housing, a locking pin, a first hollow shaft, a second hollow shaft, an elongated push member, a nut member, an elongated threaded rod, a drive shaft, and a base plate. The drive shaft is adapted to be rotated by a drive mechanism such as a power drill, wherein rotation in the drive shaft causes rotation in the threaded rod to push the push member away from the housing to move shelving.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to moving devices. Specifically, the invention is a moving device adapted to move aisle shelving. 2. Description of the Related Art Retail outlets such as discount stores and supermarkets make use of shelving to hold merchandise intended for sale to the public. Shelving is often installed in rows or “runs” and is sometimes referred to as “gondolas”. The rows or runs create aisles or passages. Specifically, each aisle is defined by opposite rows of shelving. A shopper typically walks along an aisle with a shopping trolley and scans both sides of the aisle, stopping intermittently to select and remove merchandise off one of the opposite rows of shelving. The shopper moves the selected merchandise to a checkout station where the shopper purchases the merchandise. Rows of shelving are found in other types of buildings such as public libraries where books are stored on rows of shelves. A library member typically walks along a row of books, stopping to select a book. Once the library member has selected one or more books the member typically heads for a library check out desk. Sometimes it is necessary to move shelving. For example, a remodeling design for a retail store that calls for rearranging the shopping aisles. Significant labor is involved in moving shelves, particularly shelves full of items such as merchandise or books. Typically the shelves are emptied of their contents, dismantled, and reassembled at a new position and the contents returned to the shelves. Some shelving is adapted to be lifted and moved using mechanical lifting apparatus. Sometimes it is only necessary to move shelving a few inches or by a foot or so. However, moving shelving just a short distance still entails emptying or using lifting apparatus to move the shelving over a short distance. Thus, there has been a long felt and unmet need for an apparatus that can move shelving over a relatively short distance without requiring awkward and expensive lifting apparatus or the emptying and reloading of shelves. A review of the prior art follows. U.S. Pat. No. 3,879,053, issued Apr. 22, 1975 to W. J. Chvala, describes a mobile display cart with a kick plate mounted to the bottom of the cart for anchoring the cart. The '053 patent does not teach or suggest an apparatus as claimed in the present invention to move otherwise non-mobile shelving or gondolas. U.S. Pat. No. 5,012,879 issued May 7, 1991 to Bienek et al., describes a self propelled jacking apparatus for transporting loads and adjusting the height of the load. The '879 patent does not teach or suggest an apparatus for horizontally pushing or nudging a permanent or otherwise non-mobile shelving or gondolas. U.S. Pat. No. 6,238,159 B1 issued May 29, 2001 to S. Pappas, describes an installation device that provides controlled vertical movement of materials with a hydraulic jack modified to accept the chuck of a power drill. The '159 patent does not teach or suggest an apparatus for horizontally pushing or nudging a permanent or otherwise non-mobile shelving or gondolas. U.S. Pat. No. 6,460,827 issued Oct. 8, 2002 to D. A. Baucom describes a lifting and movement system for lifting a complete run of shelving having a plurality of shelf units and for moving the shelving along a floor surface to a desired location. First and second frame structures are defined by interconnected modular frame assemblies so as to have sufficient length to extend along the entire length of a run of shelving. Wheels such as casters are mounted to the first frame to provide for movement of the lifting system and the run of shelving along the floor surface to a desired location. A second, movable frame is in vertically movable assembly with the first frame and has shelving engaging components for lifting engagement with the run of shelving. A plurality of lift elements is supported by the first frame and provides support for the second frame and the shelving engaged thereby. A power system, which is preferably a pneumatic pressure supply, is in controllable relation with each of the lift elements and is selectively operable for simultaneously activating each of the lift elements for simultaneous lifting or lowering of all of the modular sections of the second frame relative to the first frame to thereby provide for selective lifting or lowering of the shelving. The '827 patent expressly teaches away from the present invention. Specifically, the '827 patent does not teach or suggest an apparatus for horizontally pushing or nudging a permanent or otherwise non-mobile shelving or gondolas. None of the above inventions and patents, taken either singly or in combination, is seen to describe the instant invention as claimed. Thus an apparatus for moving shelving solving the aforementioned problems is desired.
|
10875528
| 2,004
|
Treatment of chronic human viral hepatitis
|
The use of Fgl2 inhibitors to treat and control the progression of human Hepatitis B virus-induced hepatitis is described. Inhibitors of Fgl2 include antibodies to Fgl2.
|
BACKGROUND TO THE INVENTION Many of the viral pathogens known to cause liver disease are not directly cytopathic for the hepatocyte. For instance, the acute and chronic liver diseases caused by the hepatitis B virus reflect hepatocellular injury believed to be induced by an immune response to the virus rather than by direct viral-induced hepatocellular necrosis. For example, interferon gamma derived from activated T-cells within the liver figures prominently in viral-induced liver disease in humans as well as in animal models (1). Another especially important effector phase in the immune response to viral infection of the liver is fibrin deposition and thrombosis within the microvasculature (2). Tissue factor (TF), the transmembrane receptor for Factor VII, is the major procoagulant for the classical pathway and is known to initiate the extrinsic pathway of coagulation in response to lipopolysaccharide (LPS) (3, 4). In the presence of calcium, the TF/Factor VIIa complex activates the zymogen precursor Factor X. Factor Xa is a serine protease that is the classically known physiological activator of prothrombin. Efficient thrombin generation by Factor Xa requires calcium, an electronegative phospholipid surface, and the nonenzymatic cofactor, factor Va. Current evidence indicates that the pathways by which vascular thrombosis are elicited in viral hepatitis are mechanistically distinct from the classical pathways of coagulation induced by mechanical trauma or endotoxin (LPS). The in vitro induction of a procoagulant response in mononuclear cells by murine hepatitis virus type 3 (MHV-3) correlates with the disease susceptibility in strains of mice (5). MHV-3 is a member of the Coronoviridae, a group of positive-stranded, enveloped RNA viruses. Peritoneal macrophages from BALB/c or C57Bl/6 mice, strains in which MHV-3 infection results in fatal acute fulminant hepatitis, respond to the virus with a robust procoagulant response. In contrast, peritoneal macrophages from A/J mice, a strain fully resistant to MHV-3, generate no increase in procoagulant above control levels. This procoagulant response represented a functional marker for susceptibility to MHV-3 infection in inbred strains of mice suggesting that this response is important in the pathogenesis of coronavirus MHV-3-induced disease. Activated endothelial cells and macrophages express distinct cell-surface procoagulants important for both the initiation and localization of fibrin deposition in viral-induced liver disease. The cloning and characterization of a novel procoagulant induced by MHV-3 infection of murine macrophages has been reported (6). Fgl2/fibroleukin is an immune coagulant with the ability to directly cleave prothrombin to thrombin (6-10). Initially cloned from CD8 + cytotoxic T cells, Fgl2/fibroleukin protein shares homology of its carboxyl terminus with fibrinogen β and γ chains (11). Fgl2/fibroleukin protein generated in a baculovirus expression system exhibits no measurable prothrombinase activity until reconstituted into negatively charged phospholipids vesicles (e.g. phosphatidyl-L-serine containing) (10). As with Factor Xa, catalytic activity is dependent on calcium and is enhanced by factor Va. Site-directed mutagenesis of Ser89 of the murine protein indicated that Fgl2/fibroleukin has the characteristics of a serine protease and that Ser89 was critical for the prothrombinase activity of Fgl2. In contrast to Factor Xa, the Fgl2/fibroleukin prothrombinase activity is not inhibited by antithrombin III. The human and murine genes for the Fgl2/fibroleukin prothrombinase have been cloned and characterized and localized to chromosomes 7 and 5, respectively (8, 12). Of note, expression of the Fgl2/fibroleukin prothrombinase mRNA is subject to transcriptional regulation, exhibiting both constitutive and inducible expression. For example, steady-state mRNA expression of Fgl2/fibroleukin prothrombinase is markedly upregulated by interferon-gamma (13, 14). In vivo studies indicate robust expression of the Fgl2/fibroleukin prothrombinase in hepatic macrophages and endothelial cells in MHV-3 murine hepatitis models and patients with fulminant hepatic failure (7, 15). Given that the Fgl2/fibroleukin may be important for both the initiation and localization of fibrin deposition in viral hepatitis the inventors generated an Fgl2/fibroleukin-deficient mouse. It has been reported that fibrin deposition and liver necrosis were markedly reduced and survival was increased in mice infected with the murine hepatitis virus strain 3 (MHV-3) Coronavirus. It remains to be determined whether, however, there is any nexus between the human conditions that result from infection with human hepatitis virus, and the condition of fulminant hepatitis that results in mice infected with the MHV-3 Coronavirus.
|
Title:
Treatment of chronic human viral hepatitis
Abstract:
The use of Fgl2 inhibitors to treat and control the progression of human Hepatitis B virus-induced hepatitis is described. Inhibitors of Fgl2 include antibodies to Fgl2.
Background:
BACKGROUND TO THE INVENTION Many of the viral pathogens known to cause liver disease are not directly cytopathic for the hepatocyte. For instance, the acute and chronic liver diseases caused by the hepatitis B virus reflect hepatocellular injury believed to be induced by an immune response to the virus rather than by direct viral-induced hepatocellular necrosis. For example, interferon gamma derived from activated T-cells within the liver figures prominently in viral-induced liver disease in humans as well as in animal models (1). Another especially important effector phase in the immune response to viral infection of the liver is fibrin deposition and thrombosis within the microvasculature (2). Tissue factor (TF), the transmembrane receptor for Factor VII, is the major procoagulant for the classical pathway and is known to initiate the extrinsic pathway of coagulation in response to lipopolysaccharide (LPS) (3, 4). In the presence of calcium, the TF/Factor VIIa complex activates the zymogen precursor Factor X. Factor Xa is a serine protease that is the classically known physiological activator of prothrombin. Efficient thrombin generation by Factor Xa requires calcium, an electronegative phospholipid surface, and the nonenzymatic cofactor, factor Va. Current evidence indicates that the pathways by which vascular thrombosis are elicited in viral hepatitis are mechanistically distinct from the classical pathways of coagulation induced by mechanical trauma or endotoxin (LPS). The in vitro induction of a procoagulant response in mononuclear cells by murine hepatitis virus type 3 (MHV-3) correlates with the disease susceptibility in strains of mice (5). MHV-3 is a member of the Coronoviridae, a group of positive-stranded, enveloped RNA viruses. Peritoneal macrophages from BALB/c or C57Bl/6 mice, strains in which MHV-3 infection results in fatal acute fulminant hepatitis, respond to the virus with a robust procoagulant response. In contrast, peritoneal macrophages from A/J mice, a strain fully resistant to MHV-3, generate no increase in procoagulant above control levels. This procoagulant response represented a functional marker for susceptibility to MHV-3 infection in inbred strains of mice suggesting that this response is important in the pathogenesis of coronavirus MHV-3-induced disease. Activated endothelial cells and macrophages express distinct cell-surface procoagulants important for both the initiation and localization of fibrin deposition in viral-induced liver disease. The cloning and characterization of a novel procoagulant induced by MHV-3 infection of murine macrophages has been reported (6). Fgl2/fibroleukin is an immune coagulant with the ability to directly cleave prothrombin to thrombin (6-10). Initially cloned from CD8 + cytotoxic T cells, Fgl2/fibroleukin protein shares homology of its carboxyl terminus with fibrinogen β and γ chains (11). Fgl2/fibroleukin protein generated in a baculovirus expression system exhibits no measurable prothrombinase activity until reconstituted into negatively charged phospholipids vesicles (e.g. phosphatidyl-L-serine containing) (10). As with Factor Xa, catalytic activity is dependent on calcium and is enhanced by factor Va. Site-directed mutagenesis of Ser89 of the murine protein indicated that Fgl2/fibroleukin has the characteristics of a serine protease and that Ser89 was critical for the prothrombinase activity of Fgl2. In contrast to Factor Xa, the Fgl2/fibroleukin prothrombinase activity is not inhibited by antithrombin III. The human and murine genes for the Fgl2/fibroleukin prothrombinase have been cloned and characterized and localized to chromosomes 7 and 5, respectively (8, 12). Of note, expression of the Fgl2/fibroleukin prothrombinase mRNA is subject to transcriptional regulation, exhibiting both constitutive and inducible expression. For example, steady-state mRNA expression of Fgl2/fibroleukin prothrombinase is markedly upregulated by interferon-gamma (13, 14). In vivo studies indicate robust expression of the Fgl2/fibroleukin prothrombinase in hepatic macrophages and endothelial cells in MHV-3 murine hepatitis models and patients with fulminant hepatic failure (7, 15). Given that the Fgl2/fibroleukin may be important for both the initiation and localization of fibrin deposition in viral hepatitis the inventors generated an Fgl2/fibroleukin-deficient mouse. It has been reported that fibrin deposition and liver necrosis were markedly reduced and survival was increased in mice infected with the murine hepatitis virus strain 3 (MHV-3) Coronavirus. It remains to be determined whether, however, there is any nexus between the human conditions that result from infection with human hepatitis virus, and the condition of fulminant hepatitis that results in mice infected with the MHV-3 Coronavirus.
|
10971218
| 2,004
|
Substrate-to-mask alignment and securing system with temperature control for use in an automated shadow mask vacuum deposition process
|
The present invention is a substrate holder system for and method of providing a substrate-to-mask alignment mechanism, securing mechanism and temperature control mechanism. The substrate holder system is suitable for use in an automated shadow mask vacuum deposition process. The substrate holder system includes a system controller, and a substrate arranged between a magnetic chuck assembly and a mask holder assembly. The magnetic chuck assembly includes a magnetic chuck, a thermoelectric device, a plurality of thermal sensors and a plurality of light sources. The mask holder assembly includes a shadow mask, a mask holder, a motion control system and a plurality of cameras. The substrate holder system of the present invention provides close contact between the substrate and the shadow mask thereby avoiding the possibility of evaporant material entering into a gap therebetween.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to shadow mask vacuum deposition and, more particularly, to a substrate holder system for use with a shadow mask vacuum deposition system. 2. Description of Related Art Thin-film display panels, such as liquid crystal displays or electroluminescent displays, are used for displaying information. Such displays include thin-film devices, such as electrodes and contact pads, deposited on a substrate in a manner to form a matrix display panel having individually energizable pixels. One of the challenges encountered in the manufacture of such display panels is the development of improved processes that pattern the thin-film electrode structures while they are in an in-line deposition system. Thin-film devices of such displays are typically formed by photolithography or by shadow masking. Photolithography includes depositing a photosensitive material on a substrate, coating the photosensitive material with light-sensitive material, which is then exposed to a negative or positive pattern and developed and later stripped in various corrosive developing solutions. A disadvantage of this process includes its numerous labor intensive steps, each of which is subject to failure or possible contamination of the thin-film device. Shadow masking is usually performed over small substrates with stiff masks that are manually clamped to ensure even contact with a particular substrate. Shadow masking is a relatively slow process and usually requires breaking vacuum in the deposition chamber which may result in some thin-film contamination. When using a large-area shadow mask in a deposition process, it is common that the substrate is not perfectly flat or not level with respect to its surrounding substrate holder. Additionally, most shadow masking processes required manually dropping each shadow mask over pins located on a substrate carrier. In a shadow mask vacuum deposition process, each shadow mask is desirably in close contact with the corresponding substrate so that there is little or no gap between the shadow mask and the substrate whereupon the inadvertent deposition of material on undesirable area(s) of the substrate is avoided. Furthermore, in a shadow mask vacuum deposition process, it is desirable to have a uniform temperature across the area of the shadow mask in order to avoid misregistration caused by non-uniform expansion. For example, non-uniform expansion may cause the mask to be non-planar. Any such non-uniformity caused by expansion increases the possibility for inaccuracies in the deposition process. Therefore, what is needed, and not disclosed in the prior art is a method and apparatus for use in a shadow mask vacuum deposition process that avoids material from being deposited in area(s) not defined by aperture(s) in the shadow mask and which also avoids temperature variations across the full area of the shadow mask in order to avoid misregistration between the substrate and the aperture(s) in the shadow mask.
|
Title:
Substrate-to-mask alignment and securing system with temperature control for use in an automated shadow mask vacuum deposition process
Abstract:
The present invention is a substrate holder system for and method of providing a substrate-to-mask alignment mechanism, securing mechanism and temperature control mechanism. The substrate holder system is suitable for use in an automated shadow mask vacuum deposition process. The substrate holder system includes a system controller, and a substrate arranged between a magnetic chuck assembly and a mask holder assembly. The magnetic chuck assembly includes a magnetic chuck, a thermoelectric device, a plurality of thermal sensors and a plurality of light sources. The mask holder assembly includes a shadow mask, a mask holder, a motion control system and a plurality of cameras. The substrate holder system of the present invention provides close contact between the substrate and the shadow mask thereby avoiding the possibility of evaporant material entering into a gap therebetween.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to shadow mask vacuum deposition and, more particularly, to a substrate holder system for use with a shadow mask vacuum deposition system. 2. Description of Related Art Thin-film display panels, such as liquid crystal displays or electroluminescent displays, are used for displaying information. Such displays include thin-film devices, such as electrodes and contact pads, deposited on a substrate in a manner to form a matrix display panel having individually energizable pixels. One of the challenges encountered in the manufacture of such display panels is the development of improved processes that pattern the thin-film electrode structures while they are in an in-line deposition system. Thin-film devices of such displays are typically formed by photolithography or by shadow masking. Photolithography includes depositing a photosensitive material on a substrate, coating the photosensitive material with light-sensitive material, which is then exposed to a negative or positive pattern and developed and later stripped in various corrosive developing solutions. A disadvantage of this process includes its numerous labor intensive steps, each of which is subject to failure or possible contamination of the thin-film device. Shadow masking is usually performed over small substrates with stiff masks that are manually clamped to ensure even contact with a particular substrate. Shadow masking is a relatively slow process and usually requires breaking vacuum in the deposition chamber which may result in some thin-film contamination. When using a large-area shadow mask in a deposition process, it is common that the substrate is not perfectly flat or not level with respect to its surrounding substrate holder. Additionally, most shadow masking processes required manually dropping each shadow mask over pins located on a substrate carrier. In a shadow mask vacuum deposition process, each shadow mask is desirably in close contact with the corresponding substrate so that there is little or no gap between the shadow mask and the substrate whereupon the inadvertent deposition of material on undesirable area(s) of the substrate is avoided. Furthermore, in a shadow mask vacuum deposition process, it is desirable to have a uniform temperature across the area of the shadow mask in order to avoid misregistration caused by non-uniform expansion. For example, non-uniform expansion may cause the mask to be non-planar. Any such non-uniformity caused by expansion increases the possibility for inaccuracies in the deposition process. Therefore, what is needed, and not disclosed in the prior art is a method and apparatus for use in a shadow mask vacuum deposition process that avoids material from being deposited in area(s) not defined by aperture(s) in the shadow mask and which also avoids temperature variations across the full area of the shadow mask in order to avoid misregistration between the substrate and the aperture(s) in the shadow mask.
|
10934744
| 2,004
|
Waterproof audio player
|
A waterproof audio player comprises a body having a casing and a lid closing the casing in a sealed manner, the casing and the lid including respective inner walls confronting each other. An audio playing module in the casing includes a phone jack located on the inner wall of the casing. There is also an earphone including an electrical plug fixed inside the lid. The plug has an electrical connector which projects from the inner wall of the lid and is aligned with the phone jack for insertion into the phone jack upon the lid closing the casing.
|
BACKGROUND OF THE INVENTION Audio players that are waterproof or splash-proof are not new, which normally utilize earphones instead of built-in speakers for audio output as speakers are vulnerable to damage by water and/or are difficult to protect. Such earphones are usually permanently wired to avoid a loose connection that is leakage-prone and this hampers output flexibility. The invention seeks to obviate or at least alleviate such a shortcoming by providing a new or improved waterproof audio player.
|
Title:
Waterproof audio player
Abstract:
A waterproof audio player comprises a body having a casing and a lid closing the casing in a sealed manner, the casing and the lid including respective inner walls confronting each other. An audio playing module in the casing includes a phone jack located on the inner wall of the casing. There is also an earphone including an electrical plug fixed inside the lid. The plug has an electrical connector which projects from the inner wall of the lid and is aligned with the phone jack for insertion into the phone jack upon the lid closing the casing.
Background:
BACKGROUND OF THE INVENTION Audio players that are waterproof or splash-proof are not new, which normally utilize earphones instead of built-in speakers for audio output as speakers are vulnerable to damage by water and/or are difficult to protect. Such earphones are usually permanently wired to avoid a loose connection that is leakage-prone and this hampers output flexibility. The invention seeks to obviate or at least alleviate such a shortcoming by providing a new or improved waterproof audio player.
|
11000252
| 2,004
|
Performance test board
|
Performance Test Board for connecting at least one device under test (DUT) to a test system which has internal power supply sources (IPS) wherein said Performance Test Board (PTB) comprises at least one DC-DC-converter having an input terminal to which several internal power supply sources of said test system are connected in parallel, an output terminal to which a power supply terminal of said device under test (DUT) is connected and a control terminal to which a further internal power supply source of said test system is connected.
|
Title:
Performance test board
Abstract:
Performance Test Board for connecting at least one device under test (DUT) to a test system which has internal power supply sources (IPS) wherein said Performance Test Board (PTB) comprises at least one DC-DC-converter having an input terminal to which several internal power supply sources of said test system are connected in parallel, an output terminal to which a power supply terminal of said device under test (DUT) is connected and a control terminal to which a further internal power supply source of said test system is connected.
Background:
|
|
10965872
| 2,004
|
Communication terminal device adapted to physical characteristics of telecommunication network and method for adapting communication terminal device to physical characteristics of telecommunication network
|
The communication terminal device includes a handset, a central controller, a telephone network adaptor unit for converting analog signals transmitted/received between telecommunication network and the communication terminal device into digital signals, an interface unit physically isolating the central controller from the telephone network adaptor unit, and transmitting/receiving the converted digital signals between the central controller and the telephone network adaptor unit, and a telephone circuit unit which transmits the voice signals generated by processing the digital signals received from the telephone network adaptor unit to a handset through the interface unit and transmits the digital signals generated by processing the voice signals received from the handset to the telephone network adaptor unit through the interface unit. The telephone network adaptor unit is controlled by the central controller and changes the physical characteristics of the analog signals to be adapted to the physical characteristics of the telecommunication network.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a communication terminal device. More particularly, the present invention relates to a communication terminal device adapted to the physical characteristics of a telecommunication network and a method for adapting the communication terminal device to the physical characteristics of the telecommunication network. 2. Description of the Related Art A communication terminal device, which transmits and receives voice signals or facsimile signals, which is connected to a telecommunication network such as a Public Switched Telephone Network (PSTN) has been widely used. Telecommunication terminal devices embedding various functions are also widely used. Particularly, facsimile devices, which include a facsimile unit to embody facsimile functions and a telephone circuit unit to embody telephone functions, respectively, are widely used. FIG. 1 is a block diagram for depicting operation of a facsimile device having telephone functions according to the conventional art. The communication terminal device in FIG. 1 includes a modular jack 10 for connecting to a telecommunication network, a facsimile unit 20 , a telephone circuit unit 30 , and a switch 15 for connecting to a telephone network, such as a public switched telephone network (PSTN), to the facsimile unit 20 or the telephone circuit unit 30 . The PSTN is connected to the communication terminal device through the modular jack 10 . When the PSTN is connected to the telephone circuit unit 30 by the switch 15 , a loop current of the PSTN flows into the telephone circuit unit 30 , and telephone functions are activated. Meanwhile, the facsimile unit 20 is disconnected from PSTN. A bridge diode (BD) 35 steadily supplies a voltage of a uniform polarity to the telephone circuit unit, regardless of the voltage polarity of the signals from PSTN. The reason that a voltage of uniform polarity has to be supplied steadily to a telephone circuit unit 30 is to keep biasing the transistor elements constituting the telephone circuit unit 30 . Each of the telephone circuit unit 30 and the facsimile unit 20 further includes a DC feeding circuit (not shown) for supplying a DC voltage. The DC feeding circuit maintains the telephone line connection by continuously supplying a DC voltage to keep the connection between the communication terminal device and PSTN from being disconnected. A ring detector 25 delivers ring signals incoming from the PSTN to a Central Processing Unit (CPU) 24 , and notifies the CPU 24 of calls from the PSTN. After determining that there is a ring signal, the CPU 24 distinguishes whether the signal delivered from the PSTN is a telephone signal or a facsimile signal, and then conveys it to the respective components. The telephone circuit unit 34 processes voice signals incoming from the PSTN and delivers them to a handset 36 . The telephone circuit 34 also processes the voice signals, which are input from the handset 36 , and delivers them to the PSTN. And, the telephone circuit 34 controls the magnitudes of the side-tone signals, which are fed back to the handset 36 among the signals input from the handset 36 and transmitted to the PSTN. A modem 26 decodes the facsimile signals delivered from the PSTN. An impedance matching unit 28 includes a transformer element and a capacitor to match the impedances of the PSTN and the modem 26 . Therefore, when the PSTN is connected to the facsimile unit, it enables the facsimile signals and the like to be transmitted and received between the PSTN and the modem 26 . The capacitor included in the impedance matching unit 28 prevents the transformer element from being damaged by an excessive DC current and transmits AC signals only. As integrated circuit techniques develop, the facsimile unit, the telephone circuit unit, and the like, which are mentioned above, can be integrated in a single element. The telephone circuit unit offered in a single element form includes a microphone terminal for receiving voice signals from the handset and a receiving terminal for receiving voice signals from the PSTN. As noted above, a part of the voice signals, which is received from the microphone terminal and transmitted to the PSTN, is fed back to be delivered again to the handset by the receiving terminal. The physical characteristics of the PSTN in respective countries all over the world are different. Therefore, each country's PSTN requires a communication terminal device to meet a certain specification, which matches the terminal device to the physical characteristics of the local PSTN. The physical characteristics of public telephone networks of each nation are, for example, the magnitude and frequency characteristics of the voice signals transmitted from the handset to the PSTN, the magnitude and frequency characteristics signals of voice signals, and the magnitude of side-tone signals delivered from PSTN to the handset. Since these specifications are different in every country, the specifications of the communication terminal devices such as telephone sets must be set differently, corresponding to each and every nation where the devices are exported. That is, in order to export the communication terminal devices according to the conventional art, circuit element values are set differently for each respective country to constitute a separate telephone circuit unit satisfying the requirements related to the telephone characteristics of each country. Although the communication terminal device has the same functions, different telephone circuit units must be provided to let the telephone set operate in each country. Therefore, production costs rise. Furthermore, when a malfunction of the communication terminal device occurs in a certain country, standardized repair service after sales is impossible since a repair is only possible after understanding each nations' specification for the telephone circuit unit. Therefore, using the unified telephone circuit unit, a communication terminal device adapted to the physical characteristics of the different telecommunication networks in all nations is required.
|
Title:
Communication terminal device adapted to physical characteristics of telecommunication network and method for adapting communication terminal device to physical characteristics of telecommunication network
Abstract:
The communication terminal device includes a handset, a central controller, a telephone network adaptor unit for converting analog signals transmitted/received between telecommunication network and the communication terminal device into digital signals, an interface unit physically isolating the central controller from the telephone network adaptor unit, and transmitting/receiving the converted digital signals between the central controller and the telephone network adaptor unit, and a telephone circuit unit which transmits the voice signals generated by processing the digital signals received from the telephone network adaptor unit to a handset through the interface unit and transmits the digital signals generated by processing the voice signals received from the handset to the telephone network adaptor unit through the interface unit. The telephone network adaptor unit is controlled by the central controller and changes the physical characteristics of the analog signals to be adapted to the physical characteristics of the telecommunication network.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a communication terminal device. More particularly, the present invention relates to a communication terminal device adapted to the physical characteristics of a telecommunication network and a method for adapting the communication terminal device to the physical characteristics of the telecommunication network. 2. Description of the Related Art A communication terminal device, which transmits and receives voice signals or facsimile signals, which is connected to a telecommunication network such as a Public Switched Telephone Network (PSTN) has been widely used. Telecommunication terminal devices embedding various functions are also widely used. Particularly, facsimile devices, which include a facsimile unit to embody facsimile functions and a telephone circuit unit to embody telephone functions, respectively, are widely used. FIG. 1 is a block diagram for depicting operation of a facsimile device having telephone functions according to the conventional art. The communication terminal device in FIG. 1 includes a modular jack 10 for connecting to a telecommunication network, a facsimile unit 20 , a telephone circuit unit 30 , and a switch 15 for connecting to a telephone network, such as a public switched telephone network (PSTN), to the facsimile unit 20 or the telephone circuit unit 30 . The PSTN is connected to the communication terminal device through the modular jack 10 . When the PSTN is connected to the telephone circuit unit 30 by the switch 15 , a loop current of the PSTN flows into the telephone circuit unit 30 , and telephone functions are activated. Meanwhile, the facsimile unit 20 is disconnected from PSTN. A bridge diode (BD) 35 steadily supplies a voltage of a uniform polarity to the telephone circuit unit, regardless of the voltage polarity of the signals from PSTN. The reason that a voltage of uniform polarity has to be supplied steadily to a telephone circuit unit 30 is to keep biasing the transistor elements constituting the telephone circuit unit 30 . Each of the telephone circuit unit 30 and the facsimile unit 20 further includes a DC feeding circuit (not shown) for supplying a DC voltage. The DC feeding circuit maintains the telephone line connection by continuously supplying a DC voltage to keep the connection between the communication terminal device and PSTN from being disconnected. A ring detector 25 delivers ring signals incoming from the PSTN to a Central Processing Unit (CPU) 24 , and notifies the CPU 24 of calls from the PSTN. After determining that there is a ring signal, the CPU 24 distinguishes whether the signal delivered from the PSTN is a telephone signal or a facsimile signal, and then conveys it to the respective components. The telephone circuit unit 34 processes voice signals incoming from the PSTN and delivers them to a handset 36 . The telephone circuit 34 also processes the voice signals, which are input from the handset 36 , and delivers them to the PSTN. And, the telephone circuit 34 controls the magnitudes of the side-tone signals, which are fed back to the handset 36 among the signals input from the handset 36 and transmitted to the PSTN. A modem 26 decodes the facsimile signals delivered from the PSTN. An impedance matching unit 28 includes a transformer element and a capacitor to match the impedances of the PSTN and the modem 26 . Therefore, when the PSTN is connected to the facsimile unit, it enables the facsimile signals and the like to be transmitted and received between the PSTN and the modem 26 . The capacitor included in the impedance matching unit 28 prevents the transformer element from being damaged by an excessive DC current and transmits AC signals only. As integrated circuit techniques develop, the facsimile unit, the telephone circuit unit, and the like, which are mentioned above, can be integrated in a single element. The telephone circuit unit offered in a single element form includes a microphone terminal for receiving voice signals from the handset and a receiving terminal for receiving voice signals from the PSTN. As noted above, a part of the voice signals, which is received from the microphone terminal and transmitted to the PSTN, is fed back to be delivered again to the handset by the receiving terminal. The physical characteristics of the PSTN in respective countries all over the world are different. Therefore, each country's PSTN requires a communication terminal device to meet a certain specification, which matches the terminal device to the physical characteristics of the local PSTN. The physical characteristics of public telephone networks of each nation are, for example, the magnitude and frequency characteristics of the voice signals transmitted from the handset to the PSTN, the magnitude and frequency characteristics signals of voice signals, and the magnitude of side-tone signals delivered from PSTN to the handset. Since these specifications are different in every country, the specifications of the communication terminal devices such as telephone sets must be set differently, corresponding to each and every nation where the devices are exported. That is, in order to export the communication terminal devices according to the conventional art, circuit element values are set differently for each respective country to constitute a separate telephone circuit unit satisfying the requirements related to the telephone characteristics of each country. Although the communication terminal device has the same functions, different telephone circuit units must be provided to let the telephone set operate in each country. Therefore, production costs rise. Furthermore, when a malfunction of the communication terminal device occurs in a certain country, standardized repair service after sales is impossible since a repair is only possible after understanding each nations' specification for the telephone circuit unit. Therefore, using the unified telephone circuit unit, a communication terminal device adapted to the physical characteristics of the different telecommunication networks in all nations is required.
|
10841620
| 2,004
|
Photoreceptor unit
|
A photoreceptor unit includes a photoconductive drum assembly, a housing to enclose the photoconductive drum assembly to be rotatable therein, a handgrip rotatably formed on the housing, and a stopper to prevent the housing with the photoconductive drum assembly from becoming lopsided toward its preponderant side of the housing with respect to a center of rotation of the handgrip when the housing is lifted up by the handgrip.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a photoreceptor unit to form an image to be transferred onto a transfer medium. 2. Description of the Related Art As is generally known in the art, a printing machine, such as a laser printer or a photocopier, comprises a photoreceptor unit for the development of images. A photoreceptor unit is valid during a limited period of time and is required to be replaced at the end of its life cycle in order to develop and produce clean images. For the facilitation of the replacement, a photoreceptor unit is generally modularized to be replaced as a whole with a new one. A modularized photoreceptor unit may include a photoconductive drum assembly, a housing for enclosing and protecting part of the photoconductive drum assembly and a handgrip. The photoreceptor unit may additionally include a charging unit, a cleaning unit and a used toner recovering unit. The photoreceptor unit should expose a photoconductive drum to face a developer unit for the development of toner images. The other units, such as the charging unit, the cleaning unit and the used toner recovering unit, should be placed on an opposite side of the photoconductive drum with respect to the developer unit not to face the developer unit. Accordingly, the photoreceptor unit has a center of gravity displaced from a center of rotation of the photoconductive drum. The handgrip is provided to be used when the modularized photoreceptor unit is mounted into or separated from a printer mainframe. A user can mount the photoreceptor unit into the printer mainframe using the handgrip. Also, the user can pull out the photoreceptor unit from the printer mainframe using the handgrip. However, if the handgrip is not provided at the center of gravity of the photoreceptor unit, it will be difficult for the user to lift up or move the photoreceptor unit with one hand. If the handgrip is rotatably formed, the photoreceptor unit will be lopsided toward its center of gravity. Thus, the user has to hold the photoreceptor unit with both hands. It is also likely that the photoreceptor unit may be mounted into the printer mainframe in a lopsided condition. As a result, the photoconductive drum or the printer mainframe may be damaged during the mounting of the photoreceptor unit.
|
Title:
Photoreceptor unit
Abstract:
A photoreceptor unit includes a photoconductive drum assembly, a housing to enclose the photoconductive drum assembly to be rotatable therein, a handgrip rotatably formed on the housing, and a stopper to prevent the housing with the photoconductive drum assembly from becoming lopsided toward its preponderant side of the housing with respect to a center of rotation of the handgrip when the housing is lifted up by the handgrip.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a photoreceptor unit to form an image to be transferred onto a transfer medium. 2. Description of the Related Art As is generally known in the art, a printing machine, such as a laser printer or a photocopier, comprises a photoreceptor unit for the development of images. A photoreceptor unit is valid during a limited period of time and is required to be replaced at the end of its life cycle in order to develop and produce clean images. For the facilitation of the replacement, a photoreceptor unit is generally modularized to be replaced as a whole with a new one. A modularized photoreceptor unit may include a photoconductive drum assembly, a housing for enclosing and protecting part of the photoconductive drum assembly and a handgrip. The photoreceptor unit may additionally include a charging unit, a cleaning unit and a used toner recovering unit. The photoreceptor unit should expose a photoconductive drum to face a developer unit for the development of toner images. The other units, such as the charging unit, the cleaning unit and the used toner recovering unit, should be placed on an opposite side of the photoconductive drum with respect to the developer unit not to face the developer unit. Accordingly, the photoreceptor unit has a center of gravity displaced from a center of rotation of the photoconductive drum. The handgrip is provided to be used when the modularized photoreceptor unit is mounted into or separated from a printer mainframe. A user can mount the photoreceptor unit into the printer mainframe using the handgrip. Also, the user can pull out the photoreceptor unit from the printer mainframe using the handgrip. However, if the handgrip is not provided at the center of gravity of the photoreceptor unit, it will be difficult for the user to lift up or move the photoreceptor unit with one hand. If the handgrip is rotatably formed, the photoreceptor unit will be lopsided toward its center of gravity. Thus, the user has to hold the photoreceptor unit with both hands. It is also likely that the photoreceptor unit may be mounted into the printer mainframe in a lopsided condition. As a result, the photoconductive drum or the printer mainframe may be damaged during the mounting of the photoreceptor unit.
|
10899523
| 2,004
|
Digital camera assembly with spacer
|
A digital camera assembly (9) includes a base member (1), a lens module (2), a spacer (7), and an image sensor (4). The lens module includes a tubular body (5), and an objective lens system (6) retained in the tubular body. The lens module, the spacer and the image sensor are located in the base member in that order from top to bottom. In assembly, the tubular body is rotated down into a threaded hole of the base member until the spacer contacts supporting arms (12) of the base member. An axial length of the spacer is predetermined such that when the spacer contacts the supporting arms, an imaging plane of the image sensor is positioned at a focal distance of the objective lens system. The imaging plane is thus quickly and accurately positioned at the focal distance. The digital camera assembly is simple to assemble and reduces manufacturing time.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to digital cameras, and particularly to a digital camera assembly used in a portable electronic device such as a mobile phone or a PDA (Personal Digital Assistant). 2. Description of the Prior Art Conventionally, a digital camera assembly used in a portable electronic device such as a mobile phone or a PDA is configured to-have only a single focal distance because of miniaturization constraints of the assembly. FIG. 2 shows a conventional digital camera assembly 90 with a fixed focus. The digital camera assembly 90 includes a base member 10 , an image sensor 40 , a tubular body 50 , an objective lens system 60 , and a mounting ring 80 . The objective lens system 60 is for projecting and focusing an image of an object onto the image sensor 40 , and is mounted in a front end of the tubular body 50 by means of the mounting ring 80 . The tubular body 50 is screwingly connected to the base member 10 . In particular, an inner screw thread 30 A is formed in an inner periphery of the base member 10 , and an outer screw thread 30 B is formed on an outer periphery of the tubular body 50 . The tubular body 50 is rotated downwardly into the base member 10 , with the outer screw thread 30 B engaging with the inner screw thread 30 A. During such rotation, the tubular body 50 is moved downwardly (or adjusted back upwardly) according to a predetermined pitch of the screw threads 30 A, 30 B. The image sensor 40 is mounted in a bottom of the base member 10 , and is for receiving image data and transforming the image data into electronic signals. To enable high quality photos to be taken, the imaging plane of the image sensor 40 should be positioned at the focal distance of the objective lens system 60 . In assembling the digital camera assembly 90 , a focalizing procedure is needed. The tubular body 50 is rotated so that it moves downwardly or upwardly, thereby adjusting the relative distance between the tubular body 50 and the base member 10 . This is done until the image sensor 40 is located at the focus plane of the objective lens system 60 . However, the focalizing procedure is laborious, and consumes much manufacturing time. A new digital camera assembly which overcomes the above-described shortcomings is desired.
|
Title:
Digital camera assembly with spacer
Abstract:
A digital camera assembly (9) includes a base member (1), a lens module (2), a spacer (7), and an image sensor (4). The lens module includes a tubular body (5), and an objective lens system (6) retained in the tubular body. The lens module, the spacer and the image sensor are located in the base member in that order from top to bottom. In assembly, the tubular body is rotated down into a threaded hole of the base member until the spacer contacts supporting arms (12) of the base member. An axial length of the spacer is predetermined such that when the spacer contacts the supporting arms, an imaging plane of the image sensor is positioned at a focal distance of the objective lens system. The imaging plane is thus quickly and accurately positioned at the focal distance. The digital camera assembly is simple to assemble and reduces manufacturing time.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to digital cameras, and particularly to a digital camera assembly used in a portable electronic device such as a mobile phone or a PDA (Personal Digital Assistant). 2. Description of the Prior Art Conventionally, a digital camera assembly used in a portable electronic device such as a mobile phone or a PDA is configured to-have only a single focal distance because of miniaturization constraints of the assembly. FIG. 2 shows a conventional digital camera assembly 90 with a fixed focus. The digital camera assembly 90 includes a base member 10 , an image sensor 40 , a tubular body 50 , an objective lens system 60 , and a mounting ring 80 . The objective lens system 60 is for projecting and focusing an image of an object onto the image sensor 40 , and is mounted in a front end of the tubular body 50 by means of the mounting ring 80 . The tubular body 50 is screwingly connected to the base member 10 . In particular, an inner screw thread 30 A is formed in an inner periphery of the base member 10 , and an outer screw thread 30 B is formed on an outer periphery of the tubular body 50 . The tubular body 50 is rotated downwardly into the base member 10 , with the outer screw thread 30 B engaging with the inner screw thread 30 A. During such rotation, the tubular body 50 is moved downwardly (or adjusted back upwardly) according to a predetermined pitch of the screw threads 30 A, 30 B. The image sensor 40 is mounted in a bottom of the base member 10 , and is for receiving image data and transforming the image data into electronic signals. To enable high quality photos to be taken, the imaging plane of the image sensor 40 should be positioned at the focal distance of the objective lens system 60 . In assembling the digital camera assembly 90 , a focalizing procedure is needed. The tubular body 50 is rotated so that it moves downwardly or upwardly, thereby adjusting the relative distance between the tubular body 50 and the base member 10 . This is done until the image sensor 40 is located at the focus plane of the objective lens system 60 . However, the focalizing procedure is laborious, and consumes much manufacturing time. A new digital camera assembly which overcomes the above-described shortcomings is desired.
|
10926579
| 2,004
|
Access systems and methods for minimally invasive surgery
|
A device for retracting tissue provides access to a spinal location within a patient. The device includes an elongate body and a passage. The elongate body has a proximal portion and a distal portion. The elongate body defines a length between the proximal and distal portions along a longitudinal axis such that the distal portion can be positioned inside the patient adjacent the spinal location while the proximal portion is accessible. A transverse cross-section of the elongate body in the proximal portion has a first dimension that is longer than a second dimension. The first dimension is perpendicular to the second dimension. The passage extends through the elongate body between the proximal and distal portions. The elongate body is configured such that the proximal portion may be tilted with respect to the distal portion in a first direction generally aligned with the first dimension and in a second direction generally aligned with the second dimension.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention This application relates to surgical systems and assemblies that include an access device for minimally invasive surgery, and in particular relates to systems and devices that provide access to a surgical location, e.g. adjacent a spine, for one or more instruments to perform a procedure at the surgical location. 2. Description of the Related Art Spinal surgery presents significant difficulties to the physician attempting to reduce chronic back pain or correct spinal deformities without introducing additional trauma due to the surgical procedure itself. In order to access the vertebrae to perform spinal procedures, the physician is typically required to make large incisions and cut or strip muscle tissue surrounding the spine. In addition, care must be taken not to injure nerve tissue in the area. Consequently, traditional surgical procedures of this type carry high risks of scarring, pain, significant blood loss, and extended recovery times. Apparatuses for performing minimally invasive techniques have been proposed to reduce the trauma of posterior spinal surgery by reducing the size of the incision and the degree of muscle stripping in order to access the vertebrae. One such apparatus provides a constant diameter cannula that is made narrow in order to provide a small entry profile. As a result, the cannula provides minimal space for the physician to observe the body structures and manipulate surgical instruments in order to perform the required procedures. A narrow cannula is typically insufficient to perform one level spinal fixation procedures, which requires visualization of two vertebrae and introduction of screws, rods, as well as other large spinal fixation devices.
|
Title:
Access systems and methods for minimally invasive surgery
Abstract:
A device for retracting tissue provides access to a spinal location within a patient. The device includes an elongate body and a passage. The elongate body has a proximal portion and a distal portion. The elongate body defines a length between the proximal and distal portions along a longitudinal axis such that the distal portion can be positioned inside the patient adjacent the spinal location while the proximal portion is accessible. A transverse cross-section of the elongate body in the proximal portion has a first dimension that is longer than a second dimension. The first dimension is perpendicular to the second dimension. The passage extends through the elongate body between the proximal and distal portions. The elongate body is configured such that the proximal portion may be tilted with respect to the distal portion in a first direction generally aligned with the first dimension and in a second direction generally aligned with the second dimension.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention This application relates to surgical systems and assemblies that include an access device for minimally invasive surgery, and in particular relates to systems and devices that provide access to a surgical location, e.g. adjacent a spine, for one or more instruments to perform a procedure at the surgical location. 2. Description of the Related Art Spinal surgery presents significant difficulties to the physician attempting to reduce chronic back pain or correct spinal deformities without introducing additional trauma due to the surgical procedure itself. In order to access the vertebrae to perform spinal procedures, the physician is typically required to make large incisions and cut or strip muscle tissue surrounding the spine. In addition, care must be taken not to injure nerve tissue in the area. Consequently, traditional surgical procedures of this type carry high risks of scarring, pain, significant blood loss, and extended recovery times. Apparatuses for performing minimally invasive techniques have been proposed to reduce the trauma of posterior spinal surgery by reducing the size of the incision and the degree of muscle stripping in order to access the vertebrae. One such apparatus provides a constant diameter cannula that is made narrow in order to provide a small entry profile. As a result, the cannula provides minimal space for the physician to observe the body structures and manipulate surgical instruments in order to perform the required procedures. A narrow cannula is typically insufficient to perform one level spinal fixation procedures, which requires visualization of two vertebrae and introduction of screws, rods, as well as other large spinal fixation devices.
|
10958821
| 2,004
|
In-vehicle battery monitor
|
An apparatus and a method of monitoring a battery in an automotive vehicle are provided. An output is provided which can be a relative output as a function of minimum and maximum parameters of the battery.
|
BACKGROUND OF THE INVENTION The present invention relates to vehicles. More specifically, the present invention relates to battery monitors used to monitor batteries used in vehicles. Vehicles, both automotive and electric, typically include a storage battery. For example, automotive vehicles powered by combustion engines typically include a battery. The battery is used to power the electrical system when the engine is not running. Additionally, the engine is used to charge the battery. The engine is also used to power electrical components of the vehicle when the engine is running. It has typically been difficult to monitor the condition of the storage battery used in such vehicles. This difficulty relates to all of the variables which are factors in determining the condition of the battery, as well as the electrical connections which are made to the battery during its use. Attempts have been made to characterize the operation of a battery and use “characterization curves” to determine battery condition. However, this technique is often quite difficult to implement because it is difficult to determine which particular characterization curve the battery may be following as well as precisely where on a particular characterization curve a battery may lie at a given moment. This has made it difficult for a vehicle operator to accurately and in real time determine the condition of the vehicle's battery. For example, a battery at a particular moment may have just sufficient output to start the engine of a vehicle but provide no outward indication to the operator that the vehicle will not be capable of starting a second time. Further, a battery that is capable of providing sufficient power at one temperature, may fail the next morning if the temperature drops over night. Some attempts have been made to monitor the condition of a battery using “coulomb counting” in which the amount of charge accepted by the battery or removed from the battery is monitored. However, such techniques have required a starting point (i.e., an initial value) in order to begin any attempt to monitor battery condition. Further, such techniques may not account for situations in which the battery is fully charged and any additional current going into the battery is simply lost as heat or a situation in which the battery charge decreases during periods on non-use. Thus, it would be desirable to have a battery monitor which is capable of monitoring the condition of a battery in a vehicle. Various aspects of battering testing and related technologies have been pioneered by Midtronics, Inc. of Willowbrook, Ill. and Dr. Keith S. Champlin as shown and described in: U.S. Pat. No. 3,873,911, issued Mar. 25, 1975, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE; U.S. Pat. No. 3,909,708, issued Sep. 30, 1975, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE; U.S. Pat. No. 4,816,768, issued Mar. 28, 1989, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE; U.S. Pat. No. 4,825,170, issued Apr. 25, 1989, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE WITH AUTOMATIC VOLTAGE SCALING; U.S. Pat. No. 4,881,038, issued Nov. 14, 1989, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE WITH AUTOMATIC VOLTAGE SCALING TO DETERMINE DYNAMIC CONDUCTANCE; U.S. Pat. No. 4,912,416, issued Mar. 27, 1990, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE WITH STATE-OF-CHARGE COMPENSATION; U.S. Pat. No. 5,140,269, issued Aug. 18, 1992, to Champlin, entitled ELECTRONIC TESTER FOR ASSESSING BATTERY/CELL CAPACITY; U.S. Pat. No. 5,343,380, issued Aug. 30, 1994, entitled METHOD AND APPARATUS FOR SUPPRESSING TIME VARYING SIGNALS IN BATTERIES UNDERGOING CHARGING OR DISCHARGING; U.S. Pat. No. 5,572,136, issued Nov. 5, 1996, entitled ELECTRONIC BATTERY TESTER WITH AUTOMATIC COMPENSATION FOR LOW STATE-OF-CHARGE; U.S. Pat. No. 5,574,355, issued Nov. 12, 1996, entitled METHOD AND APPARATUS FOR DETECTION AND CONTROL OF THERMAL RUNAWAY IN A BATTERY UNDER CHARGE; U.S. Pat. No. 5,585,416, issued Dec. 10, 1996, entitled APPARATUS AND METHOD FOR STEP-CHARGING BATTERIES TO OPTIMIZE CHARGE ACCEPTANCE; U.S. Pat. No. 5,585,728, issued Dec. 17, 1996, entitled ELECTRONIC BATTERY TESTER WITH AUTOMATIC COMPENSATION FOR LOW STATE-OF-CHARGE; U.S. Pat. No. 5,589,757, issued Dec. 31, 1996, entitled APPARATUS AND METHOD FOR STEP-CHARGING BATTERIES TO OPTIMIZE CHARGE ACCEPTANCE; U.S. Pat. No. 5,592,093, issued Jan. 7, 1997, entitled ELECTRONIC BATTERY TESTING DEVICE LOOSE TERMINAL CONNECTION DETECTION VIA A COMPARISON CIRCUIT; U.S. Pat. No. 5,598,098, issued Jan. 28, 1997, entitled ELECTRONIC BATTERY TESTER WITH VERY HIGH NOISE IMMUNITY; U.S. Pat. No. 5,656,920, issued Aug. 12, 1997, entitled METHOD FOR OPTIMIZING THE CHARGING LEAD-ACID BATTERIES AND AN INTERACTIVE CHARGER; U.S. Pat. No. 5,757,192, issued May 26, 1998, entitled METHOD AND APPARATUS FOR DETECTING A BAD CELL IN A STORAGE BATTERY; U.S. Pat. No. 5,821,756, issued Oct. 13, 1998, entitled ELECTRONIC BATTERY TESTER WITH TAILORED COMPENSATION FOR LOW STATE-OF-CHARGE; U.S. Pat. No. 5,831,435, issued Nov. 3, 1998, entitled BATTERY TESTER FOR JIS STANDARD; U.S. Pat. No. 5,914,605, issued Jun. 22, 1999, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 5,945,829, issued Aug. 31, 1999, entitled MIDPOINT BATTERY MONITORING; U.S. Pat. No. 6,002,238, issued Dec. 14, 1999, entitled METHOD AND APPARATUS FOR MEASURING COMPLEX IMPEDANCE OF CELLS AND BATTERIES; U.S. Pat. No. 6,037,751, issued Mar. 14, 2000, entitled APPARATUS FOR CHARGING BATTERIES; U.S. Pat. No. 6,037,777, issued Mar. 14, 2000, entitled METHOD AND APPARATUS FOR DETERMINING BATTERY PROPERTIES FROM COMPLEX IMPEDANCE/ADMITTANCE; U.S. Pat. No. 6,051,976, issued Apr. 18, 2000, entitled METHOD AND APPARATUS FOR AUDITING A BATTERY TEST; U.S. Pat. No. 6,081,098, issued Jun. 27, 2000, entitled METHOD AND APPARATUS FOR CHARGING A BATTERY; U.S. Pat. No. 6,091,245, issued Jul. 18, 2000, entitled METHOD AND APPARATUS FOR AUDITING A BATTERY TEST; U.S. Pat. No. 6,104,167, issued Aug. 15, 2000, entitled METHOD AND APPARATUS FOR CHARGING A BATTERY; U.S. Pat. No. 6,137,269, issued Oct. 24, 2000, entitled METHOD AND APPARATUS FOR ELECTRONICALLY EVALUATING THE INTERNAL TEMPERATURE OF AN ELECTROCHEMICAL CELL OR BATTERY; U.S. Pat. No. 6,163,156, issued Dec. 19, 2000, entitled ELECTRICAL CONNECTION FOR ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,172,483, issued Jan. 9, 2001, entitled METHOD AND APPARATUS FOR MEASURING COMPLEX IMPEDANCE OF CELL AND BATTERIES; U.S. Pat. No. 6,172,505, issued Jan. 9, 2001, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,222,369, issued Apr. 24, 2001, entitled METHOD AND APPARATUS FOR DETERMINING BATTERY PROPERTIES FROM COMPLEX IMPEDANCE/ADMITTANCE; U.S. Pat. No. 6,225,808, issued May 1, 2001, entitled TEST COUNTER FOR ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,249,124, issued Jun. 19, 2001, entitled ELECTRONIC BATTERY TESTER WITH INTERNAL BATTERY; U.S. Pat. No. 6,259,254, issued Jul. 10, 2001, entitled APPARATUS AND METHOD FOR CARRYING OUT DIAGNOSTIC TESTS ON BATTERIES AND FOR RAPIDLY CHARGING BATTERIES; U.S. Pat. No. 6,262,563, issued Jul. 17, 2001, entitled METHOD AND APPARATUS FOR MEASURING COMPLEX ADMITTANCE OF CELLS AND BATTERIES; U.S. Pat. No. 6,294,896, issued Sep. 25, 2001; entitled METHOD AND APPARATUS FOR MEASURING COMPLEX SELF-IMMITANCE OF A GENERAL ELECTRICAL ELEMENT; U.S. Pat. No. 6,294,897, issued Sep. 25, 2001, entitled METHOD AND APPARATUS FOR ELECTRONICALLY EVALUATING THE INTERNAL TEMPERATURE OF AN ELECTROCHEMICAL CELL OR BATTERY; U.S. Pat. No. 6,304,087, issued Oct. 16, 2001, entitled APPARATUS FOR CALIBRATING ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,310,481, issued Oct. 30, 2001, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,313,607, issued Nov. 6, 2001, entitled METHOD AND APPARATUS FOR EVALUATING STORED CHARGE IN AN ELECTROCHEMICAL CELL OR BATTERY; U.S. Pat. No. 6,313,608, issued Nov. 6, 2001, entitled METHOD AND APPARATUS FOR CHARGING A BATTERY; U.S. Pat. No. 6,316,914, issued Nov. 13, 2001, entitled TESTING PARALLEL STRINGS OF STORAGE BATTERIES; U.S. Pat. No. 6,323,650, issued Nov. 27, 2001, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,329,793, issued Dec. 11, 2001, entitled METHOD AND APPARATUS FOR CHARGING A BATTERY; U.S. Pat. No. 6,331,762, issued Dec. 18, 2001, entitled ENERGY MANAGEMENT SYSTEM FOR AUTOMOTIVE VEHICLE; U.S. Pat. No. 6,332,113, issued Dec. 18, 2001, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,351,102, issued Feb. 26, 2002, entitled AUTOMOTIVE BATTERY CHARGING SYSTEM TESTER; U.S. Pat. No. 6,359,441, issued Mar. 19, 2002, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,363,303, issued Mar. 26, 2002, entitled ALTERNATOR DIAGNOSTIC SYSTEM, U.S. Pat. No. 6,392,414, issued May 21, 2002, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,417,669, issued Jul. 9, 2002, entitled SUPPRESSING INTERFERENCE IN AC MEASUREMENTS OF CELLS, BATTERIES AND OTHER ELECTRICAL ELEMENTS; U.S. Pat. No. 6,424,158, issued Jul. 23, 2002, entitled APPARATUS AND METHOD FOR CARRYING OUT DIAGNOSTIC TESTS ON BATTERIES AND FOR RAPIDLY CHARGING BATTERIES; U.S. Pat. No. 6,441,585, issued Aug. 17, 2002, entitled APPARATUS AND METHOD FOR TESTING RECHARGEABLE ENERGY STORAGE BATTERIES; U.S. Pat. No. 6,445,158, issued Sep. 3, 2002, entitled VEHICLE ELECTRICAL SYSTEM TESTER WITH ENCODED OUTPUT; U.S. Pat. No. 6,456,045, issued Sep. 24, 2002, entitled INTEGRATED CONDUCTANCE AND LOAD TEST BASED ELECTRONIC BATTERY TESTER; U.S. Ser. No. 09/703,270, filed Oct. 31, 2000, entitled ELECTRONIC BATTERY TESTER; U.S. Ser. No. 09/780,146, filed Feb. 9, 2001, entitled STORAGE BATTERY WITH INTEGRAL BATTERY TESTER; U.S. Ser. No. 09/816,768, filed Mar. 23, 2001, entitled MODULAR BATTERY TESTER; U.S. Ser. No. 09/756,638, filed Jan. 8, 2001, entitled METHOD AND APPARATUS FOR DETERMINING BATTERY PROPERTIES FROM COMPLEX IMPEDANCE/ADMITTANCE; U.S. Ser. No. 09/862,783, filed May 21, 2001, entitled METHOD AND APPARATUS FOR TESTING CELLS AND BATTERIES EMBEDDED IN SERIES/PARALLEL SYSTEMS; U.S. Ser. No. 09/483,623, filed Jan. 13, 2000, entitled ALTERNATOR TESTER; U.S. Ser. No. 09/960,117, filed Sep. 20, 2001, entitled IN-VEHICLE BATTERY MONITOR; U.S. Ser. No. 09/908,389, filed Jul. 18, 2001, entitled BATTERY CLAMP WITH INTEGRATED CIRCUIT SENSOR; U.S. Ser. No. 09/908,278, filed Jul. 18, 2001, entitled BATTERY CLAMP WITH EMBEDDED ENVIRONMENT SENSOR; U.S. Ser. No. 09/880,473, filed Jun. 13, 2001; entitled BATTERY TEST MODULE; U.S. Ser. No. 09/940,684, filed Aug. 27, 2001, entitled METHOD AND APPARATUS FOR EVALUATING STORED CHARGE IN AN ELECTROCHEMICAL CELL OR BATTERY; U.S. Ser. No. 09/977,049, filed Oct. 12, 2001, entitled PROGRAMMABLE CURRENT EXCITER FOR MEASURING AC IMMITTANCE OF CELLS AND BATTERIES; U.S. Ser. No. 60/330,441, filed Oct. 17, 2001, entitled ELECTRONIC BATTERY TESTER WITH RELATIVE TEST OUTPUT; U.S. Ser. No. 60/348,479, filed Oct. 29, 2001, entitled CONCEPT FOR TESTING HIGH POWER VRLA BATTERIES; U.S. Ser. No. 10/046,659, filed Oct. 29, 2001, entitled ENERGY MANAGEMENT SYSTEM FOR AUTOMOTIVE VEHICLE; U.S. Ser. No. 09/993,468, filed Nov. 14, 2001, entitled KELVIN CONNECTOR FOR A BATTERY POST; U.S. Ser. No. 09/992,350, filed Nov. 26, 2001, entitled ELECTRONIC BATTERY TESTER, U.S. Ser. No. 60/341,902, filed Dec. 19, 2001, entitled BATTERY TESTER MODULE; U.S. Ser. No. 10/042,451, filed Jan. 8, 2002, entitled BATTERY CHARGE CONTROL DEVICE, U.S. Ser. No. 10/073,378, filed Feb. 8, 2002, entitled METHOD AND APPARATUS USING A CIRCUIT MODEL TO EVALUATE CELL/BATTERY PARAMETERS; U.S. Ser. No. 10/093,853, filed Mar. 7, 2002, entitled ELECTRONIC BATTERY TESTER WITH NETWORK COMMUNICATION; U.S. Ser. No. 60/364,656, filed Mar. 14, 2002, entitled ELECTRONIC BATTERY TESTER WITH LOW TEMPERATURE RATING DETERMINATION; U.S. Ser. No. 10/098,741, filed Mar. 14, 2002, entitled METHOD AND APPARATUS FOR AUDITING A BATTERY TEST; U.S. Ser. No. 10/101,543, filed Mar. 19, 2002, entitled ELECTRONIC BATTERY TESTER; U.S. Ser. No. 10/112,114, filed Mar. 28, 2002; U.S. Ser. No. 10/109,734, filed Mar. 28, 2002; U.S. Ser. No. 10/112,105, filed Mar. 28, 2002, entitled CHARGE CONTROL SYSTEM FOR A VEHICLE BATTERY; U.S. Ser. No. 10/112,998, filed Mar. 29, 2002, entitled BATTERY TESTER WITH BATTERY REPLACEMENT OUTPUT; U.S. Ser. No. 10/119,297, filed Apr. 9, 2002, entitled METHOD AND APPARATUS FOR TESTING CELLS AND BATTERIES EMBEDDED IN SERIES/PARALLEL SYSTEMS; U.S. Ser. No. 10/128,790, filed Apr. 22, 2002, entitled METHOD OF DISTRIBUTING JUMP-START BOOSTER PACKS; U.S. Ser. No. 60/379,281, filed May 8, 2002, entitled METHOD FOR DETERMINING BATTERY STATE OF CHARGE; U.S. Ser. No. 10/143,307, filed May 10, 2002, entitled ELECTRONIC BATTERY TESTER; U.S. Ser. No. 60/387,046, filed Jun. 7, 2002, entitled METHOD AND APPARATUS FOR INCREASING THE LIFE OF A STORAGE BATTERY; U.S. Serial No. 10/177,635, filed Jun. 21, 2002, entitled BATTERY CHARGER WITH BOOSTER PACK; U.S. Ser. No. 10/207,495, filed Jul. 29, 2002, entitled KELVIN CLAMP FOR ELECTRICALLY COUPLING TO A BATTERY CONTACT; U.S. Ser. No. 10/200,041, filed Jul. 19, 2002, entitled AUTOMOTIVE VEHICLE ELECTRICAL SYSTEM DIAGNOSTIC DEVICE; U.S. Ser. No. 10/217,913, filed Aug. 13, 2002, entitled, BATTERY TEST MODULE; U.S. Ser. No. 60/408,542, filed Sep. 5, 2002, entitled BATTERY TEST OUTPUTS ADJUSTED BASED UPON TEMPERATURE; U.S. Ser. No. 10/______, (C382.12-0124), filed Sep. 18, 2002, entitled BATTERY TESTER UPGRADE USING SOFTWARE KEY; U.S. Ser. No. 60/______, (C382.12-0137), filed Oct. 2, 2002, entitled QUERY BASED ELECTRONIC BATTERY TESTER; and U.S. Serial No. 10/______, (C382.12-0101), filed Oct. 2, 2002, entitled ELECTRONIC BATTERY TESTER WITH RELATIVE TEST OUTPUT, which are incorporated herein in their entirety.
|
Title:
In-vehicle battery monitor
Abstract:
An apparatus and a method of monitoring a battery in an automotive vehicle are provided. An output is provided which can be a relative output as a function of minimum and maximum parameters of the battery.
Background:
BACKGROUND OF THE INVENTION The present invention relates to vehicles. More specifically, the present invention relates to battery monitors used to monitor batteries used in vehicles. Vehicles, both automotive and electric, typically include a storage battery. For example, automotive vehicles powered by combustion engines typically include a battery. The battery is used to power the electrical system when the engine is not running. Additionally, the engine is used to charge the battery. The engine is also used to power electrical components of the vehicle when the engine is running. It has typically been difficult to monitor the condition of the storage battery used in such vehicles. This difficulty relates to all of the variables which are factors in determining the condition of the battery, as well as the electrical connections which are made to the battery during its use. Attempts have been made to characterize the operation of a battery and use “characterization curves” to determine battery condition. However, this technique is often quite difficult to implement because it is difficult to determine which particular characterization curve the battery may be following as well as precisely where on a particular characterization curve a battery may lie at a given moment. This has made it difficult for a vehicle operator to accurately and in real time determine the condition of the vehicle's battery. For example, a battery at a particular moment may have just sufficient output to start the engine of a vehicle but provide no outward indication to the operator that the vehicle will not be capable of starting a second time. Further, a battery that is capable of providing sufficient power at one temperature, may fail the next morning if the temperature drops over night. Some attempts have been made to monitor the condition of a battery using “coulomb counting” in which the amount of charge accepted by the battery or removed from the battery is monitored. However, such techniques have required a starting point (i.e., an initial value) in order to begin any attempt to monitor battery condition. Further, such techniques may not account for situations in which the battery is fully charged and any additional current going into the battery is simply lost as heat or a situation in which the battery charge decreases during periods on non-use. Thus, it would be desirable to have a battery monitor which is capable of monitoring the condition of a battery in a vehicle. Various aspects of battering testing and related technologies have been pioneered by Midtronics, Inc. of Willowbrook, Ill. and Dr. Keith S. Champlin as shown and described in: U.S. Pat. No. 3,873,911, issued Mar. 25, 1975, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE; U.S. Pat. No. 3,909,708, issued Sep. 30, 1975, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE; U.S. Pat. No. 4,816,768, issued Mar. 28, 1989, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE; U.S. Pat. No. 4,825,170, issued Apr. 25, 1989, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE WITH AUTOMATIC VOLTAGE SCALING; U.S. Pat. No. 4,881,038, issued Nov. 14, 1989, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE WITH AUTOMATIC VOLTAGE SCALING TO DETERMINE DYNAMIC CONDUCTANCE; U.S. Pat. No. 4,912,416, issued Mar. 27, 1990, to Champlin, entitled ELECTRONIC BATTERY TESTING DEVICE WITH STATE-OF-CHARGE COMPENSATION; U.S. Pat. No. 5,140,269, issued Aug. 18, 1992, to Champlin, entitled ELECTRONIC TESTER FOR ASSESSING BATTERY/CELL CAPACITY; U.S. Pat. No. 5,343,380, issued Aug. 30, 1994, entitled METHOD AND APPARATUS FOR SUPPRESSING TIME VARYING SIGNALS IN BATTERIES UNDERGOING CHARGING OR DISCHARGING; U.S. Pat. No. 5,572,136, issued Nov. 5, 1996, entitled ELECTRONIC BATTERY TESTER WITH AUTOMATIC COMPENSATION FOR LOW STATE-OF-CHARGE; U.S. Pat. No. 5,574,355, issued Nov. 12, 1996, entitled METHOD AND APPARATUS FOR DETECTION AND CONTROL OF THERMAL RUNAWAY IN A BATTERY UNDER CHARGE; U.S. Pat. No. 5,585,416, issued Dec. 10, 1996, entitled APPARATUS AND METHOD FOR STEP-CHARGING BATTERIES TO OPTIMIZE CHARGE ACCEPTANCE; U.S. Pat. No. 5,585,728, issued Dec. 17, 1996, entitled ELECTRONIC BATTERY TESTER WITH AUTOMATIC COMPENSATION FOR LOW STATE-OF-CHARGE; U.S. Pat. No. 5,589,757, issued Dec. 31, 1996, entitled APPARATUS AND METHOD FOR STEP-CHARGING BATTERIES TO OPTIMIZE CHARGE ACCEPTANCE; U.S. Pat. No. 5,592,093, issued Jan. 7, 1997, entitled ELECTRONIC BATTERY TESTING DEVICE LOOSE TERMINAL CONNECTION DETECTION VIA A COMPARISON CIRCUIT; U.S. Pat. No. 5,598,098, issued Jan. 28, 1997, entitled ELECTRONIC BATTERY TESTER WITH VERY HIGH NOISE IMMUNITY; U.S. Pat. No. 5,656,920, issued Aug. 12, 1997, entitled METHOD FOR OPTIMIZING THE CHARGING LEAD-ACID BATTERIES AND AN INTERACTIVE CHARGER; U.S. Pat. No. 5,757,192, issued May 26, 1998, entitled METHOD AND APPARATUS FOR DETECTING A BAD CELL IN A STORAGE BATTERY; U.S. Pat. No. 5,821,756, issued Oct. 13, 1998, entitled ELECTRONIC BATTERY TESTER WITH TAILORED COMPENSATION FOR LOW STATE-OF-CHARGE; U.S. Pat. No. 5,831,435, issued Nov. 3, 1998, entitled BATTERY TESTER FOR JIS STANDARD; U.S. Pat. No. 5,914,605, issued Jun. 22, 1999, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 5,945,829, issued Aug. 31, 1999, entitled MIDPOINT BATTERY MONITORING; U.S. Pat. No. 6,002,238, issued Dec. 14, 1999, entitled METHOD AND APPARATUS FOR MEASURING COMPLEX IMPEDANCE OF CELLS AND BATTERIES; U.S. Pat. No. 6,037,751, issued Mar. 14, 2000, entitled APPARATUS FOR CHARGING BATTERIES; U.S. Pat. No. 6,037,777, issued Mar. 14, 2000, entitled METHOD AND APPARATUS FOR DETERMINING BATTERY PROPERTIES FROM COMPLEX IMPEDANCE/ADMITTANCE; U.S. Pat. No. 6,051,976, issued Apr. 18, 2000, entitled METHOD AND APPARATUS FOR AUDITING A BATTERY TEST; U.S. Pat. No. 6,081,098, issued Jun. 27, 2000, entitled METHOD AND APPARATUS FOR CHARGING A BATTERY; U.S. Pat. No. 6,091,245, issued Jul. 18, 2000, entitled METHOD AND APPARATUS FOR AUDITING A BATTERY TEST; U.S. Pat. No. 6,104,167, issued Aug. 15, 2000, entitled METHOD AND APPARATUS FOR CHARGING A BATTERY; U.S. Pat. No. 6,137,269, issued Oct. 24, 2000, entitled METHOD AND APPARATUS FOR ELECTRONICALLY EVALUATING THE INTERNAL TEMPERATURE OF AN ELECTROCHEMICAL CELL OR BATTERY; U.S. Pat. No. 6,163,156, issued Dec. 19, 2000, entitled ELECTRICAL CONNECTION FOR ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,172,483, issued Jan. 9, 2001, entitled METHOD AND APPARATUS FOR MEASURING COMPLEX IMPEDANCE OF CELL AND BATTERIES; U.S. Pat. No. 6,172,505, issued Jan. 9, 2001, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,222,369, issued Apr. 24, 2001, entitled METHOD AND APPARATUS FOR DETERMINING BATTERY PROPERTIES FROM COMPLEX IMPEDANCE/ADMITTANCE; U.S. Pat. No. 6,225,808, issued May 1, 2001, entitled TEST COUNTER FOR ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,249,124, issued Jun. 19, 2001, entitled ELECTRONIC BATTERY TESTER WITH INTERNAL BATTERY; U.S. Pat. No. 6,259,254, issued Jul. 10, 2001, entitled APPARATUS AND METHOD FOR CARRYING OUT DIAGNOSTIC TESTS ON BATTERIES AND FOR RAPIDLY CHARGING BATTERIES; U.S. Pat. No. 6,262,563, issued Jul. 17, 2001, entitled METHOD AND APPARATUS FOR MEASURING COMPLEX ADMITTANCE OF CELLS AND BATTERIES; U.S. Pat. No. 6,294,896, issued Sep. 25, 2001; entitled METHOD AND APPARATUS FOR MEASURING COMPLEX SELF-IMMITANCE OF A GENERAL ELECTRICAL ELEMENT; U.S. Pat. No. 6,294,897, issued Sep. 25, 2001, entitled METHOD AND APPARATUS FOR ELECTRONICALLY EVALUATING THE INTERNAL TEMPERATURE OF AN ELECTROCHEMICAL CELL OR BATTERY; U.S. Pat. No. 6,304,087, issued Oct. 16, 2001, entitled APPARATUS FOR CALIBRATING ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,310,481, issued Oct. 30, 2001, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,313,607, issued Nov. 6, 2001, entitled METHOD AND APPARATUS FOR EVALUATING STORED CHARGE IN AN ELECTROCHEMICAL CELL OR BATTERY; U.S. Pat. No. 6,313,608, issued Nov. 6, 2001, entitled METHOD AND APPARATUS FOR CHARGING A BATTERY; U.S. Pat. No. 6,316,914, issued Nov. 13, 2001, entitled TESTING PARALLEL STRINGS OF STORAGE BATTERIES; U.S. Pat. No. 6,323,650, issued Nov. 27, 2001, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,329,793, issued Dec. 11, 2001, entitled METHOD AND APPARATUS FOR CHARGING A BATTERY; U.S. Pat. No. 6,331,762, issued Dec. 18, 2001, entitled ENERGY MANAGEMENT SYSTEM FOR AUTOMOTIVE VEHICLE; U.S. Pat. No. 6,332,113, issued Dec. 18, 2001, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,351,102, issued Feb. 26, 2002, entitled AUTOMOTIVE BATTERY CHARGING SYSTEM TESTER; U.S. Pat. No. 6,359,441, issued Mar. 19, 2002, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,363,303, issued Mar. 26, 2002, entitled ALTERNATOR DIAGNOSTIC SYSTEM, U.S. Pat. No. 6,392,414, issued May 21, 2002, entitled ELECTRONIC BATTERY TESTER; U.S. Pat. No. 6,417,669, issued Jul. 9, 2002, entitled SUPPRESSING INTERFERENCE IN AC MEASUREMENTS OF CELLS, BATTERIES AND OTHER ELECTRICAL ELEMENTS; U.S. Pat. No. 6,424,158, issued Jul. 23, 2002, entitled APPARATUS AND METHOD FOR CARRYING OUT DIAGNOSTIC TESTS ON BATTERIES AND FOR RAPIDLY CHARGING BATTERIES; U.S. Pat. No. 6,441,585, issued Aug. 17, 2002, entitled APPARATUS AND METHOD FOR TESTING RECHARGEABLE ENERGY STORAGE BATTERIES; U.S. Pat. No. 6,445,158, issued Sep. 3, 2002, entitled VEHICLE ELECTRICAL SYSTEM TESTER WITH ENCODED OUTPUT; U.S. Pat. No. 6,456,045, issued Sep. 24, 2002, entitled INTEGRATED CONDUCTANCE AND LOAD TEST BASED ELECTRONIC BATTERY TESTER; U.S. Ser. No. 09/703,270, filed Oct. 31, 2000, entitled ELECTRONIC BATTERY TESTER; U.S. Ser. No. 09/780,146, filed Feb. 9, 2001, entitled STORAGE BATTERY WITH INTEGRAL BATTERY TESTER; U.S. Ser. No. 09/816,768, filed Mar. 23, 2001, entitled MODULAR BATTERY TESTER; U.S. Ser. No. 09/756,638, filed Jan. 8, 2001, entitled METHOD AND APPARATUS FOR DETERMINING BATTERY PROPERTIES FROM COMPLEX IMPEDANCE/ADMITTANCE; U.S. Ser. No. 09/862,783, filed May 21, 2001, entitled METHOD AND APPARATUS FOR TESTING CELLS AND BATTERIES EMBEDDED IN SERIES/PARALLEL SYSTEMS; U.S. Ser. No. 09/483,623, filed Jan. 13, 2000, entitled ALTERNATOR TESTER; U.S. Ser. No. 09/960,117, filed Sep. 20, 2001, entitled IN-VEHICLE BATTERY MONITOR; U.S. Ser. No. 09/908,389, filed Jul. 18, 2001, entitled BATTERY CLAMP WITH INTEGRATED CIRCUIT SENSOR; U.S. Ser. No. 09/908,278, filed Jul. 18, 2001, entitled BATTERY CLAMP WITH EMBEDDED ENVIRONMENT SENSOR; U.S. Ser. No. 09/880,473, filed Jun. 13, 2001; entitled BATTERY TEST MODULE; U.S. Ser. No. 09/940,684, filed Aug. 27, 2001, entitled METHOD AND APPARATUS FOR EVALUATING STORED CHARGE IN AN ELECTROCHEMICAL CELL OR BATTERY; U.S. Ser. No. 09/977,049, filed Oct. 12, 2001, entitled PROGRAMMABLE CURRENT EXCITER FOR MEASURING AC IMMITTANCE OF CELLS AND BATTERIES; U.S. Ser. No. 60/330,441, filed Oct. 17, 2001, entitled ELECTRONIC BATTERY TESTER WITH RELATIVE TEST OUTPUT; U.S. Ser. No. 60/348,479, filed Oct. 29, 2001, entitled CONCEPT FOR TESTING HIGH POWER VRLA BATTERIES; U.S. Ser. No. 10/046,659, filed Oct. 29, 2001, entitled ENERGY MANAGEMENT SYSTEM FOR AUTOMOTIVE VEHICLE; U.S. Ser. No. 09/993,468, filed Nov. 14, 2001, entitled KELVIN CONNECTOR FOR A BATTERY POST; U.S. Ser. No. 09/992,350, filed Nov. 26, 2001, entitled ELECTRONIC BATTERY TESTER, U.S. Ser. No. 60/341,902, filed Dec. 19, 2001, entitled BATTERY TESTER MODULE; U.S. Ser. No. 10/042,451, filed Jan. 8, 2002, entitled BATTERY CHARGE CONTROL DEVICE, U.S. Ser. No. 10/073,378, filed Feb. 8, 2002, entitled METHOD AND APPARATUS USING A CIRCUIT MODEL TO EVALUATE CELL/BATTERY PARAMETERS; U.S. Ser. No. 10/093,853, filed Mar. 7, 2002, entitled ELECTRONIC BATTERY TESTER WITH NETWORK COMMUNICATION; U.S. Ser. No. 60/364,656, filed Mar. 14, 2002, entitled ELECTRONIC BATTERY TESTER WITH LOW TEMPERATURE RATING DETERMINATION; U.S. Ser. No. 10/098,741, filed Mar. 14, 2002, entitled METHOD AND APPARATUS FOR AUDITING A BATTERY TEST; U.S. Ser. No. 10/101,543, filed Mar. 19, 2002, entitled ELECTRONIC BATTERY TESTER; U.S. Ser. No. 10/112,114, filed Mar. 28, 2002; U.S. Ser. No. 10/109,734, filed Mar. 28, 2002; U.S. Ser. No. 10/112,105, filed Mar. 28, 2002, entitled CHARGE CONTROL SYSTEM FOR A VEHICLE BATTERY; U.S. Ser. No. 10/112,998, filed Mar. 29, 2002, entitled BATTERY TESTER WITH BATTERY REPLACEMENT OUTPUT; U.S. Ser. No. 10/119,297, filed Apr. 9, 2002, entitled METHOD AND APPARATUS FOR TESTING CELLS AND BATTERIES EMBEDDED IN SERIES/PARALLEL SYSTEMS; U.S. Ser. No. 10/128,790, filed Apr. 22, 2002, entitled METHOD OF DISTRIBUTING JUMP-START BOOSTER PACKS; U.S. Ser. No. 60/379,281, filed May 8, 2002, entitled METHOD FOR DETERMINING BATTERY STATE OF CHARGE; U.S. Ser. No. 10/143,307, filed May 10, 2002, entitled ELECTRONIC BATTERY TESTER; U.S. Ser. No. 60/387,046, filed Jun. 7, 2002, entitled METHOD AND APPARATUS FOR INCREASING THE LIFE OF A STORAGE BATTERY; U.S. Serial No. 10/177,635, filed Jun. 21, 2002, entitled BATTERY CHARGER WITH BOOSTER PACK; U.S. Ser. No. 10/207,495, filed Jul. 29, 2002, entitled KELVIN CLAMP FOR ELECTRICALLY COUPLING TO A BATTERY CONTACT; U.S. Ser. No. 10/200,041, filed Jul. 19, 2002, entitled AUTOMOTIVE VEHICLE ELECTRICAL SYSTEM DIAGNOSTIC DEVICE; U.S. Ser. No. 10/217,913, filed Aug. 13, 2002, entitled, BATTERY TEST MODULE; U.S. Ser. No. 60/408,542, filed Sep. 5, 2002, entitled BATTERY TEST OUTPUTS ADJUSTED BASED UPON TEMPERATURE; U.S. Ser. No. 10/______, (C382.12-0124), filed Sep. 18, 2002, entitled BATTERY TESTER UPGRADE USING SOFTWARE KEY; U.S. Ser. No. 60/______, (C382.12-0137), filed Oct. 2, 2002, entitled QUERY BASED ELECTRONIC BATTERY TESTER; and U.S. Serial No. 10/______, (C382.12-0101), filed Oct. 2, 2002, entitled ELECTRONIC BATTERY TESTER WITH RELATIVE TEST OUTPUT, which are incorporated herein in their entirety.
|
10509996
| 2,004
|
Diagonally layered multi-antenna transmission for frequency selective channels
|
A method and a system are disclosed for avoiding inter-layer inter-symbol interference. Diagonally layered multi-antenna transmissions are utilised by the proposed method and system. Known symbols are inserted at the borders between different layers to avoid inter-layer inter-symbol interference. The system relies on an improved method to transmit multiple data-streams (layers). The invention describes a method for transmitting data-streams over multiple antennas in an effective and smart way when having frequency selective channels. By utilising a system using the present method problems with inter-layer inter-symbol interference between different data-streams can be avoided when changing transmit antenna for the data-streams. The invention utilises that a diagonal layered multi-antenna transmission will not create inter-symbol interference, ISI, between different layers.
|
BACKGROUND Mobile cellular communication networks employ multiple access schemes in which inter-symbol interference (ISI) needs to be combated through equalisation. Obvious embodiments are the TDMA (Time Division Multiple Access) based GSM (Global System for Mobile Telecommunications), now evolving into the enhanced data rates for GSM, GSM/EDGE Radio Access Network (GERAN), and the TD-CDMA (Time Division Code Division Multiple Access) based UTRA-TDD (UMTS Terrestrial Radio Access Time Division Duplex) network. The description below uses GSM terminology to exemplify the invention. The invention particularly relates to encoding and decoding of multi-layered signals transmitted over a Multiple-Input Multiple-Output (MIMO) frequency selective channel. Spectrum has become a limited and expensive resource in mobile cellular radio communication networks. Therefore, much attention is given to improving the spectral efficiency. One method of increasing capacity without an increased bandwidth is to exploit multiple antennas at both transmitter and receiver. The channel between transmitter and receiver is a MIMO channel. Such a MIMO channel does offer a much greater channel capacity compared to a channel with one transmitting and one receiving antenna [1]. There exist several proposed techniques in which the MIMO channel is exploited to increase capacity. Some of the more attractive techniques for exploiting the MIMO channel are techniques in which data is divided into separate layers being transmitted simultaneously, and where each layer may in the receiver be demodulated and decoded separately from all other layers. A layered space-time architecture for multi-element antenna arrays proposed by G. J. Foschini [2] is now often referred to as BLAST (Bell-Labs Layered Space-Time Architecture), designed for systems with flat fading channels. The BLAST method can be divided into two sub-classes: Diagonal BLAST (D-BLAST) [3] and Vertical BLAST (V-BLAST) [4], which are shown in FIG. 1 for a transmission system with two transmit antennas. In another paper by Foschini et al, [5] it was mentioned that “with diagonal layering, some space-time is wasted at the start and end of each burst.” However this does not relate to avoiding problems with ISI when changing transmit antenna for the different layers. Instead they conclude that in the beginning and end of a radio burst there will be a decreased capacity with the coding algorithm and the receiver algorithm they apply. In D-BLAST a stream of data is de-multiplexed into several sub-streams, or layers of data, each of which may be encoded and mapped onto symbols independently. At a given time each layer is transmitted by a separate antenna. In the transmitter the antenna to which a layer is coupled changes at regular intervals. A position in a burst, where a layer changes transmit antenna, will for simplicity be referred to as a border between two layers. The transmitting antenna of a layer is switched in a cyclic fashion so that each layer is in total transmitted an equal length of time from all antennas. The layers could switch antennas as slowly as is shown in FIG. 1 , or as fast as every symbol. This serves to ensure that none of the layers experiences the worst transmission path for a complete burst. If one of the transmission paths is lost due to fading it could still be possible, thanks to the transmission from multiple antennas, to recover the layer through use of an error correcting channel code such as e.g. a convolutional code. Also for V-BLAST a stream of data is de-multiplexed into several layers of data, each of which may be encoded and modulated independently. As opposed to D-BLAST, each layer is associated to one transmit antenna for the complete burst. This means that, if one transmit antenna is lost due to e.g. fading, a complete layer transmitted from that antenna will be lost. In the receiver a staged demodulation and decoding is typically considered, where each layer is demodulated and decoded separately. In practice this requires multiple antennas also for the receiver. Typically the number of receive antennas should be at least as large as the number of transmit antennas. This allows the receiver to suppress all layers, except for the desired layer, from the received signals. After a layer has been demodulated and decoded it is cancelled from the received signal. Alternatively, a layer may be cancelled from the received signal directly after demodulation and before decoding. This may be preferable, either if a code with high code rate has been used, or if a layer has been encoded over several transmission bursts, in which case the receiver would need to receive all bursts, over which the layers have been encoded, before demodulation and decoding is to begin. In a recent U.S. patent [6] a receiver algorithm is described where multiple receiver antennas are utilised to suppress co-channel interference (CCI) and then using a “Viterbi-equalizer” to take care of ISI. However this only relates to a specific receiver algorithm but not any method for the transmission. For V-BLAST performance is improved if the receiver determines which layer had the best transmission quality, and then demodulates and decodes, alternatively only demodulates, that layer first.
|
Title:
Diagonally layered multi-antenna transmission for frequency selective channels
Abstract:
A method and a system are disclosed for avoiding inter-layer inter-symbol interference. Diagonally layered multi-antenna transmissions are utilised by the proposed method and system. Known symbols are inserted at the borders between different layers to avoid inter-layer inter-symbol interference. The system relies on an improved method to transmit multiple data-streams (layers). The invention describes a method for transmitting data-streams over multiple antennas in an effective and smart way when having frequency selective channels. By utilising a system using the present method problems with inter-layer inter-symbol interference between different data-streams can be avoided when changing transmit antenna for the data-streams. The invention utilises that a diagonal layered multi-antenna transmission will not create inter-symbol interference, ISI, between different layers.
Background:
BACKGROUND Mobile cellular communication networks employ multiple access schemes in which inter-symbol interference (ISI) needs to be combated through equalisation. Obvious embodiments are the TDMA (Time Division Multiple Access) based GSM (Global System for Mobile Telecommunications), now evolving into the enhanced data rates for GSM, GSM/EDGE Radio Access Network (GERAN), and the TD-CDMA (Time Division Code Division Multiple Access) based UTRA-TDD (UMTS Terrestrial Radio Access Time Division Duplex) network. The description below uses GSM terminology to exemplify the invention. The invention particularly relates to encoding and decoding of multi-layered signals transmitted over a Multiple-Input Multiple-Output (MIMO) frequency selective channel. Spectrum has become a limited and expensive resource in mobile cellular radio communication networks. Therefore, much attention is given to improving the spectral efficiency. One method of increasing capacity without an increased bandwidth is to exploit multiple antennas at both transmitter and receiver. The channel between transmitter and receiver is a MIMO channel. Such a MIMO channel does offer a much greater channel capacity compared to a channel with one transmitting and one receiving antenna [1]. There exist several proposed techniques in which the MIMO channel is exploited to increase capacity. Some of the more attractive techniques for exploiting the MIMO channel are techniques in which data is divided into separate layers being transmitted simultaneously, and where each layer may in the receiver be demodulated and decoded separately from all other layers. A layered space-time architecture for multi-element antenna arrays proposed by G. J. Foschini [2] is now often referred to as BLAST (Bell-Labs Layered Space-Time Architecture), designed for systems with flat fading channels. The BLAST method can be divided into two sub-classes: Diagonal BLAST (D-BLAST) [3] and Vertical BLAST (V-BLAST) [4], which are shown in FIG. 1 for a transmission system with two transmit antennas. In another paper by Foschini et al, [5] it was mentioned that “with diagonal layering, some space-time is wasted at the start and end of each burst.” However this does not relate to avoiding problems with ISI when changing transmit antenna for the different layers. Instead they conclude that in the beginning and end of a radio burst there will be a decreased capacity with the coding algorithm and the receiver algorithm they apply. In D-BLAST a stream of data is de-multiplexed into several sub-streams, or layers of data, each of which may be encoded and mapped onto symbols independently. At a given time each layer is transmitted by a separate antenna. In the transmitter the antenna to which a layer is coupled changes at regular intervals. A position in a burst, where a layer changes transmit antenna, will for simplicity be referred to as a border between two layers. The transmitting antenna of a layer is switched in a cyclic fashion so that each layer is in total transmitted an equal length of time from all antennas. The layers could switch antennas as slowly as is shown in FIG. 1 , or as fast as every symbol. This serves to ensure that none of the layers experiences the worst transmission path for a complete burst. If one of the transmission paths is lost due to fading it could still be possible, thanks to the transmission from multiple antennas, to recover the layer through use of an error correcting channel code such as e.g. a convolutional code. Also for V-BLAST a stream of data is de-multiplexed into several layers of data, each of which may be encoded and modulated independently. As opposed to D-BLAST, each layer is associated to one transmit antenna for the complete burst. This means that, if one transmit antenna is lost due to e.g. fading, a complete layer transmitted from that antenna will be lost. In the receiver a staged demodulation and decoding is typically considered, where each layer is demodulated and decoded separately. In practice this requires multiple antennas also for the receiver. Typically the number of receive antennas should be at least as large as the number of transmit antennas. This allows the receiver to suppress all layers, except for the desired layer, from the received signals. After a layer has been demodulated and decoded it is cancelled from the received signal. Alternatively, a layer may be cancelled from the received signal directly after demodulation and before decoding. This may be preferable, either if a code with high code rate has been used, or if a layer has been encoded over several transmission bursts, in which case the receiver would need to receive all bursts, over which the layers have been encoded, before demodulation and decoding is to begin. In a recent U.S. patent [6] a receiver algorithm is described where multiple receiver antennas are utilised to suppress co-channel interference (CCI) and then using a “Viterbi-equalizer” to take care of ISI. However this only relates to a specific receiver algorithm but not any method for the transmission. For V-BLAST performance is improved if the receiver determines which layer had the best transmission quality, and then demodulates and decodes, alternatively only demodulates, that layer first.
|
10951930
| 2,004
|
System and method for prioritizing a store-and-forward message
|
Systems and methods are disclosed for prioritizing a store-and-forward message in a store-and-forward data communication system. A store-and-forward data communication system is provided according to an embodiment of the invention. The store-and-forward data communication system includes a priority system configured to generate a priority level for a store-and-forward message. The store-and-forward data communication system further includes a store-and-forward network that is configured to receive a request that requests priority processing and transmitting of the store-and-forward message, obtain the priority level from the priority system in response to the message request, and transmit the store-and-forward message according to the priority level.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The invention is related to the field of communications, and in particular, to systems and methods for store-and-forward messages. 2. Statement of the Problem Many types of communication networks exist. A voice network, such as the telephone network, is designed to efficiently and reliably conduct voice communications, generally over switched links. Similarly, a data network is designed to efficiently and reliably conduct data communications through transmission of data packets, for example. Some examples of such data networks are paging networks and computer networks (such as the Internet). These communication networks are very useful and widespread. However, there has been a need to send data messages over voice networks. For example, data networks usually require some manner of sign-on and verification process and local equipment availability in order to send or receive data messages, no matter how small the data message may be. This is inconvenient and in some situations it is totally unworkable. In addition, there is often a need to simultaneously transfer data between persons who are communicating over a voice network. In response to this need, the Short Message Service (SMS) protocol was developed. The SMS protocol is one store-and-forward network, and it was designed primarily for text messaging over wireless voice communication networks. SMS allows the transmission of short, non-voice messages over a voice communication network. An SMS message comprises digital data, such as text, and is usually limited to no more than 160 text characters. In addition, an SMS message can be used to transmit digital data and can even be used, in a limited manner, to transmit graphics and video. An SMS message is commonly transmitted using out-of-band signaling, such as by using the Signaling System 7 (SS7) network. The SMS operates on a store-and-forward basis, wherein an SMS message is transmitted to a Short Message Service Center (SMSC), which stores the SMS message and attempts to deliver the SMS message to the destination. Advantageously, a mobile telephone or mobile device can send or receive an SMS message at any time, even when a voice call is currently in progress. FIG. 1 shows a prior art SMS system. The prior art SMS system includes a communication device, a Short Message Service Center (SMSC), an SMS Gateway/Interworking Mobile Switching Center (SMS G/IWMSC), an SS7 network, a Home Location Register (HLR), a Visitor Location Register (VLR), a Mobile Switching Center (MSC), and a Base-Station System (BSS). The communication device can comprise a portable or mobile communication device that is initiating and sending an SMS message. The SMSC receives the SMS message and stores and forwards the SMS message. The SMS G/IWMSC is an MSC that is capable of receiving an SMS message from the SMSC, querying the HLR and/or VLR for information regarding the location of the SMS message destination, and delivering the SMS message to a MSC corresponding to the destination communication device. The SS7 network is used to transport signaling messages for querying the HLR and/or the VLR. The MSC transfers the SMS message to the BSS (or other appropriate wireless network device), and the BSS relays the SMS message to the destination communication device. A drawback of the SMS system of the prior art is that all SMS messages have the same priority. In the prior art, there is no allowance for emergency or high priority messages. There is provision in the SMS system for re-trying message transmission in the event of delivery failure. However, the delivery can be greatly delayed as a result. Therefore, during periods of high traffic, an SMS message may not get through to the destination or may be unacceptably delayed.
|
Title:
System and method for prioritizing a store-and-forward message
Abstract:
Systems and methods are disclosed for prioritizing a store-and-forward message in a store-and-forward data communication system. A store-and-forward data communication system is provided according to an embodiment of the invention. The store-and-forward data communication system includes a priority system configured to generate a priority level for a store-and-forward message. The store-and-forward data communication system further includes a store-and-forward network that is configured to receive a request that requests priority processing and transmitting of the store-and-forward message, obtain the priority level from the priority system in response to the message request, and transmit the store-and-forward message according to the priority level.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The invention is related to the field of communications, and in particular, to systems and methods for store-and-forward messages. 2. Statement of the Problem Many types of communication networks exist. A voice network, such as the telephone network, is designed to efficiently and reliably conduct voice communications, generally over switched links. Similarly, a data network is designed to efficiently and reliably conduct data communications through transmission of data packets, for example. Some examples of such data networks are paging networks and computer networks (such as the Internet). These communication networks are very useful and widespread. However, there has been a need to send data messages over voice networks. For example, data networks usually require some manner of sign-on and verification process and local equipment availability in order to send or receive data messages, no matter how small the data message may be. This is inconvenient and in some situations it is totally unworkable. In addition, there is often a need to simultaneously transfer data between persons who are communicating over a voice network. In response to this need, the Short Message Service (SMS) protocol was developed. The SMS protocol is one store-and-forward network, and it was designed primarily for text messaging over wireless voice communication networks. SMS allows the transmission of short, non-voice messages over a voice communication network. An SMS message comprises digital data, such as text, and is usually limited to no more than 160 text characters. In addition, an SMS message can be used to transmit digital data and can even be used, in a limited manner, to transmit graphics and video. An SMS message is commonly transmitted using out-of-band signaling, such as by using the Signaling System 7 (SS7) network. The SMS operates on a store-and-forward basis, wherein an SMS message is transmitted to a Short Message Service Center (SMSC), which stores the SMS message and attempts to deliver the SMS message to the destination. Advantageously, a mobile telephone or mobile device can send or receive an SMS message at any time, even when a voice call is currently in progress. FIG. 1 shows a prior art SMS system. The prior art SMS system includes a communication device, a Short Message Service Center (SMSC), an SMS Gateway/Interworking Mobile Switching Center (SMS G/IWMSC), an SS7 network, a Home Location Register (HLR), a Visitor Location Register (VLR), a Mobile Switching Center (MSC), and a Base-Station System (BSS). The communication device can comprise a portable or mobile communication device that is initiating and sending an SMS message. The SMSC receives the SMS message and stores and forwards the SMS message. The SMS G/IWMSC is an MSC that is capable of receiving an SMS message from the SMSC, querying the HLR and/or VLR for information regarding the location of the SMS message destination, and delivering the SMS message to a MSC corresponding to the destination communication device. The SS7 network is used to transport signaling messages for querying the HLR and/or the VLR. The MSC transfers the SMS message to the BSS (or other appropriate wireless network device), and the BSS relays the SMS message to the destination communication device. A drawback of the SMS system of the prior art is that all SMS messages have the same priority. In the prior art, there is no allowance for emergency or high priority messages. There is provision in the SMS system for re-trying message transmission in the event of delivery failure. However, the delivery can be greatly delayed as a result. Therefore, during periods of high traffic, an SMS message may not get through to the destination or may be unacceptably delayed.
|
10899204
| 2,004
|
Closure device of a second-stage regulator for scuba divers
|
A closure device of a second-stage regulator for scuba divers, the regulator comprising a regulator body with an inlet conduit for connection to a first-stage regulator which supplies a breathable gaseous mixture at relatively constant pressure, an outlet conduit for connection to a mouthpiece of the users, and an opening closed by a deformable diaphragm. The device comprises a locking frame connected jointedly to the regulator body to lock the diaphragm in the opening, and a member for fastening the frame to the regulator body.
|
Title:
Closure device of a second-stage regulator for scuba divers
Abstract:
A closure device of a second-stage regulator for scuba divers, the regulator comprising a regulator body with an inlet conduit for connection to a first-stage regulator which supplies a breathable gaseous mixture at relatively constant pressure, an outlet conduit for connection to a mouthpiece of the users, and an opening closed by a deformable diaphragm. The device comprises a locking frame connected jointedly to the regulator body to lock the diaphragm in the opening, and a member for fastening the frame to the regulator body.
Background:
|
|
10861430
| 2,004
|
3-B-D-ribofuranosylthiazolo [4,5-d] pyridimine nucleosides and uses thereof
|
The invention is directed to 3-β-D-ribofuranosylthiazolo[4,5-d]pyridimine nucleosides and pharmaceutical compositions containing such compounds that have immunomodulatory activity. The invention is also directed to the therapeutic or prophylactic use of such compounds and compositions, and to methods of treating diseases and disorders described herein, by administering effective amounts of such compounds.
|
BACKGROUND OF THE INVENTION The last few decades have seen significant efforts expended in exploring possible therapeutic uses of D- and L-purine nucleoside analogs. A number of nucleoside analogs are currently being marketed as antiviral drugs, including the HIV reverse transcriptase inhibitors (AZT, ddI, ddC, d4T, and 3TC). A variety of D- and L-purine nucleoside analogs have also been explored in search of immunomodulators. Guanosine analogs having substituents at the 7-and/or 8-positions, for example, have been shown to stimulate the immune system. See Reitz et al, J. Med. Chem., 37, 3561-78 (1994); Michael et al., J. Med. Chem., 36, 3431-36 (1993). In other research, U.S. Pat. No. 5,821,236 to Krenitsky et al. discloses 6-alkoxy derivatives of arabinofuranosyl purine derivatives that are useful for tumor therapy. Also reported in U.S. Pat. No. 5,539,098 to Krenitsky et al. are inhibitors of varicella zoster virus, including 5′-O-proprionyl and 5′-O-butyryl esters of 2-amino-6-methoxy-9-(β-D-arabinofuranosyl)-9H-purine. 7-Deazaguanosine and analogs have been shown to exhibit antiviral activity in mice against a variety of RNA viruses, even though the compound lacks antiviral properties in cell culture. 3-Deazaguanine nucleosides and nucleotides have also demonstrated significant broad spectrum antiviral activity against certain DNA and RNA viruses. Revankar et al., J. Med. Chem., 27, 1489-96 (1984). Certain 7- and 9-deazaguanine C-nucleosides exhibit the ability to protect against a lethal challenge of Semliki Forest virus. Girgis et al., J. Med. Chem., 33, 2750-55 (1990). Selected 6-sulfinamide and 6-sulfinamide purine nucleosides are disclosed in U.S. Pat. No. 4,328,336 to Robins et al. as having demonstrated significant antitumor activity. Certain pyrimido[4,5-d]pyrimidine nucleosides are disclosed in U.S. Pat. No. 5,041,542 to Robins et al. as being effective in treatment against L1210 in BDF1 mice. These particular nucleosides were suggested to be as a result of their role as immunomodulators. See Bonnet et al., J. Med. Chem., 36, 635-53 (1993). Also, Wang et al. (WIPO International Publication No. WO 98/16184) report that purine L-nucleoside compounds and analogs thereof were used to treat an infection, infestation, a neoplasm, an autoimmune disease, or to modulate aspects of the immune system. In addition, 3-β-D-ribofuranosylthiazolo[4,5-d]pyrimidines demonstrating significant immunoactivity, including murine spleen cell proliferation and in vivo activity against Semliki Forest virus, are disclosed U.S. Pat. Nos. 5,041,426 and 4,880,784 to Robins et al. One possible target of immunomodulation involves stimulation or suppression of Th1 and Th2 lymphokines. Type I (Th1) cells produce interleukin 2 (IL-2), tumor necrosis factor (TNFα) and interferon gamma (IFNγ) and they are responsible primarily for cell-mediated immunity such as delayed type hypersensitivity and antiviral immunity. Type 2 (Th2) cells produce interleukins, IL-4, IL-5, IL-6, IL-9, IL-10, and IL-13 and are primarily involved in assisting humoral immune responses such as those seen in response to allergens. See, e.g., Mosmann, Annu. Rev. Immunol, 7, 145-73 (1989). D-guanosine analogs have been shown to elicit various effects on lymphokines IL-1, IL-6, INFα and TNFα (indirectly) in vitro (Goodman, Int. J. Immunopharmacol, 10, 579-88 (1988); U.S. Pat. No. 4,746,651 to Goodman) and in vivo (Smee et al., Antiviral Res., 15, 229 (1991); Smee et al., Antimicrobial Agents and Chemotherapy, 33, 1487-92 (1989)). However, the ability of the D-guanosine analogs such as 7- thio-8-oxoguanosine to modulate Type 1 or Type 2 cytokines directly in T cells was ineffective or had not been described. Moreover, it is known that the oral administration of many purine nucleoside analogs are subject to difficulties arising from poor absorption, poor solubility, or degradation in the digestive tract as a result of acidic or alkaline conditions or the action of enzymes, and/or combinations of these phenomena. Thus there remains a need for purine nucleoside analogs with improved oral availability, tolerability, and administration that are used to modulate aspects of the immune system.
|
Title:
3-B-D-ribofuranosylthiazolo [4,5-d] pyridimine nucleosides and uses thereof
Abstract:
The invention is directed to 3-β-D-ribofuranosylthiazolo[4,5-d]pyridimine nucleosides and pharmaceutical compositions containing such compounds that have immunomodulatory activity. The invention is also directed to the therapeutic or prophylactic use of such compounds and compositions, and to methods of treating diseases and disorders described herein, by administering effective amounts of such compounds.
Background:
BACKGROUND OF THE INVENTION The last few decades have seen significant efforts expended in exploring possible therapeutic uses of D- and L-purine nucleoside analogs. A number of nucleoside analogs are currently being marketed as antiviral drugs, including the HIV reverse transcriptase inhibitors (AZT, ddI, ddC, d4T, and 3TC). A variety of D- and L-purine nucleoside analogs have also been explored in search of immunomodulators. Guanosine analogs having substituents at the 7-and/or 8-positions, for example, have been shown to stimulate the immune system. See Reitz et al, J. Med. Chem., 37, 3561-78 (1994); Michael et al., J. Med. Chem., 36, 3431-36 (1993). In other research, U.S. Pat. No. 5,821,236 to Krenitsky et al. discloses 6-alkoxy derivatives of arabinofuranosyl purine derivatives that are useful for tumor therapy. Also reported in U.S. Pat. No. 5,539,098 to Krenitsky et al. are inhibitors of varicella zoster virus, including 5′-O-proprionyl and 5′-O-butyryl esters of 2-amino-6-methoxy-9-(β-D-arabinofuranosyl)-9H-purine. 7-Deazaguanosine and analogs have been shown to exhibit antiviral activity in mice against a variety of RNA viruses, even though the compound lacks antiviral properties in cell culture. 3-Deazaguanine nucleosides and nucleotides have also demonstrated significant broad spectrum antiviral activity against certain DNA and RNA viruses. Revankar et al., J. Med. Chem., 27, 1489-96 (1984). Certain 7- and 9-deazaguanine C-nucleosides exhibit the ability to protect against a lethal challenge of Semliki Forest virus. Girgis et al., J. Med. Chem., 33, 2750-55 (1990). Selected 6-sulfinamide and 6-sulfinamide purine nucleosides are disclosed in U.S. Pat. No. 4,328,336 to Robins et al. as having demonstrated significant antitumor activity. Certain pyrimido[4,5-d]pyrimidine nucleosides are disclosed in U.S. Pat. No. 5,041,542 to Robins et al. as being effective in treatment against L1210 in BDF1 mice. These particular nucleosides were suggested to be as a result of their role as immunomodulators. See Bonnet et al., J. Med. Chem., 36, 635-53 (1993). Also, Wang et al. (WIPO International Publication No. WO 98/16184) report that purine L-nucleoside compounds and analogs thereof were used to treat an infection, infestation, a neoplasm, an autoimmune disease, or to modulate aspects of the immune system. In addition, 3-β-D-ribofuranosylthiazolo[4,5-d]pyrimidines demonstrating significant immunoactivity, including murine spleen cell proliferation and in vivo activity against Semliki Forest virus, are disclosed U.S. Pat. Nos. 5,041,426 and 4,880,784 to Robins et al. One possible target of immunomodulation involves stimulation or suppression of Th1 and Th2 lymphokines. Type I (Th1) cells produce interleukin 2 (IL-2), tumor necrosis factor (TNFα) and interferon gamma (IFNγ) and they are responsible primarily for cell-mediated immunity such as delayed type hypersensitivity and antiviral immunity. Type 2 (Th2) cells produce interleukins, IL-4, IL-5, IL-6, IL-9, IL-10, and IL-13 and are primarily involved in assisting humoral immune responses such as those seen in response to allergens. See, e.g., Mosmann, Annu. Rev. Immunol, 7, 145-73 (1989). D-guanosine analogs have been shown to elicit various effects on lymphokines IL-1, IL-6, INFα and TNFα (indirectly) in vitro (Goodman, Int. J. Immunopharmacol, 10, 579-88 (1988); U.S. Pat. No. 4,746,651 to Goodman) and in vivo (Smee et al., Antiviral Res., 15, 229 (1991); Smee et al., Antimicrobial Agents and Chemotherapy, 33, 1487-92 (1989)). However, the ability of the D-guanosine analogs such as 7- thio-8-oxoguanosine to modulate Type 1 or Type 2 cytokines directly in T cells was ineffective or had not been described. Moreover, it is known that the oral administration of many purine nucleoside analogs are subject to difficulties arising from poor absorption, poor solubility, or degradation in the digestive tract as a result of acidic or alkaline conditions or the action of enzymes, and/or combinations of these phenomena. Thus there remains a need for purine nucleoside analogs with improved oral availability, tolerability, and administration that are used to modulate aspects of the immune system.
|
10990298
| 2,004
|
Methods and compositions for diagnosing or monitoring autoimmune and chronic inflammatory diseases
|
Methods of diagnosing or monitoring an autoimmune or chronic inflammatory disease, particularly SLE in a patient by detecting the expression level of one or more genes or surrogates derived therefrom in the patient are described. Diagnostic oligonucleotides for diagnosing or monitoring chronic inflammatory disease, particularly SLE infection and kits or systems containing the same are also described.
|
BACKGROUND OF THE INVENTION Many of the current shortcomings in diagnosis, prognosis, risk stratification and treatment of disease can be approached through the identification of the molecular mechanisms underlying a disease and through the discovery of nucleotide sequences (or sets of nucleotide sequences) whose expression patterns predict the occurrence or progression of disease states, or predict a patient's response to a particular therapeutic intervention. In particular, identification of nucleotide sequences and sets of nucleotide sequences with such predictive value from cells and tissues that are readily accessible would be extremely valuable. For example, peripheral blood is attainable from all patients and can easily be obtained at multiple time points at low cost. This is a desirable contrast to most other cell and tissue types, which are less readily accessible, or accessible only through invasive and aversive procedures. In addition, the various cell types present in circulating blood are ideal for expression profiling experiments as the many cell types in the blood specimen can be easily separated if desired prior to analysis of gene expression. While blood provides a very attractive substrate for the study of diseases using expression profiling techniques, and for the development of diagnostic technologies and the identification of therapeutic targets, the value of expression profiling in blood samples rests on the degree to which changes in gene expression in these cell types are associated with a predisposition to, and pathogenesis and progression of a disease. There is an extensive literature supporting the role of leukocytes, e.g., T-and B-lymphocytes, monocytes and granulocytes, including neutrophils, in a wide range of disease processes, including such broad classes as cardiovascular diseases, inflammatory, autoimmune and rheumatic diseases, infectious diseases, transplant rejection, cancer and malignancy, and endocrine diseases. Of particular interest is the role of leukocytes and leukocyte gene expression in chronic inflammatory diseases such as Systemic Lupus Erythematosis and Rheumatoid Arthritis. Systemic lupus erythematosis (SLE) and Rheumatoid Arthritis (RA) are chonic autoimmune and inflammatory disorders characterized by dysregulation of the immune system, which causes damage to a variety of organs. These diseases clearly involve differential expression of genes in leukocytes. Diagnostic and disease monitoring tools are severly lacking for these patients and their physicians. Leukocyte expression profiling can be applied to discover expression markers for SLE and RA and apply them as patient management tools in the clinical setting. In addition, osteoarthirtis is a degenerative joint disease that can be confused with RA. This disease also involves leukocytes and expression profiling of leukocytes associated with osteoarthritis may lead to the discovery of new diagnostic and therapeutic approaches to the disease. The accuracy of technologies based on expression profiling for the diagnosis, prognosis, and monitoring of disease would be dramatically increased if numerous differentially expressed nucleotide sequences, each with a measure of sensitivity and specificity for a disease in question, could be identified and assayed in a concerted manner. Using the expression of multiple genes (gene sets) for diagnostic applications helps overcome assay and population variability. In order to achieve this improved accuracy, the appropriate sets of nucleotide sequences need to be identified and validated against numerous samples in combination with relevant clinical data.
|
Title:
Methods and compositions for diagnosing or monitoring autoimmune and chronic inflammatory diseases
Abstract:
Methods of diagnosing or monitoring an autoimmune or chronic inflammatory disease, particularly SLE in a patient by detecting the expression level of one or more genes or surrogates derived therefrom in the patient are described. Diagnostic oligonucleotides for diagnosing or monitoring chronic inflammatory disease, particularly SLE infection and kits or systems containing the same are also described.
Background:
BACKGROUND OF THE INVENTION Many of the current shortcomings in diagnosis, prognosis, risk stratification and treatment of disease can be approached through the identification of the molecular mechanisms underlying a disease and through the discovery of nucleotide sequences (or sets of nucleotide sequences) whose expression patterns predict the occurrence or progression of disease states, or predict a patient's response to a particular therapeutic intervention. In particular, identification of nucleotide sequences and sets of nucleotide sequences with such predictive value from cells and tissues that are readily accessible would be extremely valuable. For example, peripheral blood is attainable from all patients and can easily be obtained at multiple time points at low cost. This is a desirable contrast to most other cell and tissue types, which are less readily accessible, or accessible only through invasive and aversive procedures. In addition, the various cell types present in circulating blood are ideal for expression profiling experiments as the many cell types in the blood specimen can be easily separated if desired prior to analysis of gene expression. While blood provides a very attractive substrate for the study of diseases using expression profiling techniques, and for the development of diagnostic technologies and the identification of therapeutic targets, the value of expression profiling in blood samples rests on the degree to which changes in gene expression in these cell types are associated with a predisposition to, and pathogenesis and progression of a disease. There is an extensive literature supporting the role of leukocytes, e.g., T-and B-lymphocytes, monocytes and granulocytes, including neutrophils, in a wide range of disease processes, including such broad classes as cardiovascular diseases, inflammatory, autoimmune and rheumatic diseases, infectious diseases, transplant rejection, cancer and malignancy, and endocrine diseases. Of particular interest is the role of leukocytes and leukocyte gene expression in chronic inflammatory diseases such as Systemic Lupus Erythematosis and Rheumatoid Arthritis. Systemic lupus erythematosis (SLE) and Rheumatoid Arthritis (RA) are chonic autoimmune and inflammatory disorders characterized by dysregulation of the immune system, which causes damage to a variety of organs. These diseases clearly involve differential expression of genes in leukocytes. Diagnostic and disease monitoring tools are severly lacking for these patients and their physicians. Leukocyte expression profiling can be applied to discover expression markers for SLE and RA and apply them as patient management tools in the clinical setting. In addition, osteoarthirtis is a degenerative joint disease that can be confused with RA. This disease also involves leukocytes and expression profiling of leukocytes associated with osteoarthritis may lead to the discovery of new diagnostic and therapeutic approaches to the disease. The accuracy of technologies based on expression profiling for the diagnosis, prognosis, and monitoring of disease would be dramatically increased if numerous differentially expressed nucleotide sequences, each with a measure of sensitivity and specificity for a disease in question, could be identified and assayed in a concerted manner. Using the expression of multiple genes (gene sets) for diagnostic applications helps overcome assay and population variability. In order to achieve this improved accuracy, the appropriate sets of nucleotide sequences need to be identified and validated against numerous samples in combination with relevant clinical data.
|
10770766
| 2,004
|
Remotely controllable fluid control valve
|
A remotely controllable fluid control valve includes a solenoid valve body with an inlet, an outlet, a solenoid mechanism and a power source, a wireless control receiver, and a wireless control transmitter. The solenoid mechanism is oriented to controllably interrupt the fluid connection between the inlet and the outlet. The power source is attached to the solenoid mechanism and the wireless control receiver to permit a user to control the position of the solenoid mechanism and the flow of water through the valve with the wireless control transmitter.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to valves for controlling the flow of fluids, and more particularly to a remotely controllable fluid control valve. 2. Description of the Related Art Water and fluid control valves are well known. They have been around as long as plumbing has existed. Several different control mechanisms are used, depending upon the application. In household and most commercial applications, valves are manually controlled. Irrigation systems or automatic sprinklers systems use electrically controlled valves that are hardwired to a timer. In industrial and chemical processing facilities, many of the water and chemical control valves are electrically controlled via a hardwired control system. Actuation is usually computer controlled to meet the needs of the industrial or chemical process. Wireless control is unacceptable in many of these applications for many reasons. One reason is that tremendous number of valves would require a tremendous number of discrete frequencies, as well as personnel and resources to manage those frequencies. In addition, there may be a great potential for signal interference or signal loss due to structural materials or other equipment. Further, there may be unacceptable risks from outside signals interfering with equipment. In a household environment, there are few critical operations involving the use of plumbing. Usually, household plumbing provides only water. Household water is directed toward the kitchen, laundry, bathroom, and exterior hose bibs, spigots and irrigation systems. For most of these uses, the water flow is easily controlled by a user because the water use is in close proximity to the control valve. This includes the kitchen sink, bathrooms and laundry facilities. However, exterior water spigots introduce a unique element to water use—distance from the control valve. Users are quite often situated remotely from a spigot or control valve due to the use of a garden hose or other water conduit. When using a garden hose, the user must physically move to the spigot or control valve to control water pressure and flow in the hose. The user may attach a nozzle or other manual shutoff to the hose, but these would not be effective where the user wants to operate a sprinkler or similar device and wants to avoid getting wet. The user would need to turn off the water at the spigot before moving or adjusting the sprinkler. Another use for a water hose is to supply water for washing a car, construction or home improvement projects. For example, water is necessary when mixing concrete, but it is not practical to use the water right from the spigot. It is preferable to mix concrete close to the work site, to minimize the movement of heavy concrete and to avoid a mess close to the house or other building. A nozzle could be used, but is not necessarily a good choice. A nozzle delivers very high velocity water that could cause the concrete to splash or spill. Modern garden hoses are very tough, but leaving them pressurized for long periods wears them out quickly. A better option would be to depressurize the hose at the spigot. Water would still be instantly available, and the wear and tear on the hose is negligible. Thus, what is needed is a water control valve that does not interfere with the normal use of a spigot or other water control valve, and that permits a user to control the valve and the flow of water from a distance. U.S. Pat. No. 6,374,846, issued to Charles R. DeSmet on Apr. 23, 2002, describes a system for excercising the control valve for a water shut-off valve. However, it operates automatically and requires a flow sensor. U.S. Pat. No. 5,971,011, issued to Stephen Jeffery Price on Oct. 26, 1999, teaches a water shut-off valve and leak detection system. However, the device operates automatically and requires a flow sensor. U.S. Pat. No. 4,589,435, issued to Donald C. Aldrich on May 20, 1986, describes a water shutoff valve. However, the device operates automatically and requires a flow sensor. U.S. Pat. No. 4,736,763, issued to George L. Britton et al. on Apr. 12, 1988, teaches an automatic device for the detection and shutoff of unwanted liquid flow in pipes. However, the device operates automatically and requires a flow sensor. None of the above inventions and patents, taken either singularly or in combination, is seen to describe the instant invention as claimed. Thus a remotely controllable fluid control valve solving the aforementioned problems is desired.
|
Title:
Remotely controllable fluid control valve
Abstract:
A remotely controllable fluid control valve includes a solenoid valve body with an inlet, an outlet, a solenoid mechanism and a power source, a wireless control receiver, and a wireless control transmitter. The solenoid mechanism is oriented to controllably interrupt the fluid connection between the inlet and the outlet. The power source is attached to the solenoid mechanism and the wireless control receiver to permit a user to control the position of the solenoid mechanism and the flow of water through the valve with the wireless control transmitter.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to valves for controlling the flow of fluids, and more particularly to a remotely controllable fluid control valve. 2. Description of the Related Art Water and fluid control valves are well known. They have been around as long as plumbing has existed. Several different control mechanisms are used, depending upon the application. In household and most commercial applications, valves are manually controlled. Irrigation systems or automatic sprinklers systems use electrically controlled valves that are hardwired to a timer. In industrial and chemical processing facilities, many of the water and chemical control valves are electrically controlled via a hardwired control system. Actuation is usually computer controlled to meet the needs of the industrial or chemical process. Wireless control is unacceptable in many of these applications for many reasons. One reason is that tremendous number of valves would require a tremendous number of discrete frequencies, as well as personnel and resources to manage those frequencies. In addition, there may be a great potential for signal interference or signal loss due to structural materials or other equipment. Further, there may be unacceptable risks from outside signals interfering with equipment. In a household environment, there are few critical operations involving the use of plumbing. Usually, household plumbing provides only water. Household water is directed toward the kitchen, laundry, bathroom, and exterior hose bibs, spigots and irrigation systems. For most of these uses, the water flow is easily controlled by a user because the water use is in close proximity to the control valve. This includes the kitchen sink, bathrooms and laundry facilities. However, exterior water spigots introduce a unique element to water use—distance from the control valve. Users are quite often situated remotely from a spigot or control valve due to the use of a garden hose or other water conduit. When using a garden hose, the user must physically move to the spigot or control valve to control water pressure and flow in the hose. The user may attach a nozzle or other manual shutoff to the hose, but these would not be effective where the user wants to operate a sprinkler or similar device and wants to avoid getting wet. The user would need to turn off the water at the spigot before moving or adjusting the sprinkler. Another use for a water hose is to supply water for washing a car, construction or home improvement projects. For example, water is necessary when mixing concrete, but it is not practical to use the water right from the spigot. It is preferable to mix concrete close to the work site, to minimize the movement of heavy concrete and to avoid a mess close to the house or other building. A nozzle could be used, but is not necessarily a good choice. A nozzle delivers very high velocity water that could cause the concrete to splash or spill. Modern garden hoses are very tough, but leaving them pressurized for long periods wears them out quickly. A better option would be to depressurize the hose at the spigot. Water would still be instantly available, and the wear and tear on the hose is negligible. Thus, what is needed is a water control valve that does not interfere with the normal use of a spigot or other water control valve, and that permits a user to control the valve and the flow of water from a distance. U.S. Pat. No. 6,374,846, issued to Charles R. DeSmet on Apr. 23, 2002, describes a system for excercising the control valve for a water shut-off valve. However, it operates automatically and requires a flow sensor. U.S. Pat. No. 5,971,011, issued to Stephen Jeffery Price on Oct. 26, 1999, teaches a water shut-off valve and leak detection system. However, the device operates automatically and requires a flow sensor. U.S. Pat. No. 4,589,435, issued to Donald C. Aldrich on May 20, 1986, describes a water shutoff valve. However, the device operates automatically and requires a flow sensor. U.S. Pat. No. 4,736,763, issued to George L. Britton et al. on Apr. 12, 1988, teaches an automatic device for the detection and shutoff of unwanted liquid flow in pipes. However, the device operates automatically and requires a flow sensor. None of the above inventions and patents, taken either singularly or in combination, is seen to describe the instant invention as claimed. Thus a remotely controllable fluid control valve solving the aforementioned problems is desired.
|
10893833
| 2,004
|
Apparatus and method for cleaning airfoil internal cavities
|
The present invention relates to a method and a device for cleaning internal passageways within a component, such as a component to be used in an engine. The device for cleaning the internal passageway includes a first probe having a longitudinal axis and at least one nozzle oriented at an angle, preferably perpendicular, to the longitudinal axis. In a preferred embodiment, the first probe has two nozzles, both oriented perpendicular to the longitudinal axis, and offset 180 degrees from each other. The device further includes a second probe having a longitudinal axis and a nozzle in a tip end, which nozzle is oriented along the longitudinal axis. Preferably, the first and second probes are connected to a common manifold.
|
BACKGROUND OF THE INVENTION The present invention relates to a device and a method for cleaning internal cavities within an airfoil portion of an engine component. Current processes for internally cleaning engine components having internal passageways involves the use of an autoclave process and a high pressure wash. The high pressure wash uses a manifold with probes introduced into a corresponding number of root openings of the internal passageways being cleaned. High pressure water is then pumped through the manifold and the probes. Depending on the configuration of the internal passageways, as shown in FIG. 1 , this can create turbulence at locations 10 and 12 , thus reducing the free flow. The internal flow of the high pressure wash also misses a “dead zone” area 14 which can not be cleaned effectively. This is due in large part to the fact that each of the probes has a nozzle at its tip.
|
Title:
Apparatus and method for cleaning airfoil internal cavities
Abstract:
The present invention relates to a method and a device for cleaning internal passageways within a component, such as a component to be used in an engine. The device for cleaning the internal passageway includes a first probe having a longitudinal axis and at least one nozzle oriented at an angle, preferably perpendicular, to the longitudinal axis. In a preferred embodiment, the first probe has two nozzles, both oriented perpendicular to the longitudinal axis, and offset 180 degrees from each other. The device further includes a second probe having a longitudinal axis and a nozzle in a tip end, which nozzle is oriented along the longitudinal axis. Preferably, the first and second probes are connected to a common manifold.
Background:
BACKGROUND OF THE INVENTION The present invention relates to a device and a method for cleaning internal cavities within an airfoil portion of an engine component. Current processes for internally cleaning engine components having internal passageways involves the use of an autoclave process and a high pressure wash. The high pressure wash uses a manifold with probes introduced into a corresponding number of root openings of the internal passageways being cleaned. High pressure water is then pumped through the manifold and the probes. Depending on the configuration of the internal passageways, as shown in FIG. 1 , this can create turbulence at locations 10 and 12 , thus reducing the free flow. The internal flow of the high pressure wash also misses a “dead zone” area 14 which can not be cleaned effectively. This is due in large part to the fact that each of the probes has a nozzle at its tip.
|
10963728
| 2,004
|
Electrophotographic toner, method for producing the same, electrophotographic developer, and image forming method
|
An electrophotographic toner having a core-shell structure including a crystalline resin in its core region or a sea-island structure including a crystalline resin in its island region, wherein the toner has 1) a resistance of 5.0×1012 Ω·cm or higher, 2) a dynamic viscosity coefficient of 3×103 Pa·s or higher at a temperature which is 50° C. higher than a melting point of the crystalline resin, and 3) a dynamic viscosity coefficient of 1×105 Pa·s or lower at a temperature which is 10° C. higher than the melting point of the crystalline resin.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an electrophotographic toner, an electrophotographic developer, and an image forming method. More specifically, the invention relates to an electrophotographic toner used in an instrument using an electrophotographic method, such as a copying machine, a printer or a facsimile, in particular, a color copying machine; a method for producing the toner; an electrophotographic developer; and an image forming method using the developer. 2. Description of the Related Art In recent years, the electrophotographic method has widely been used not only in copying machines but also in printers, such as network printers in offices, printers for personal computers and printers for on-demand printing, as information instruments have been developing and communication networks have been making progress in information society. Such characteristics are more strongly requested as high image quality, high speed, high reliability, compactness, lightness, and energy-saving in both fields of monochromic and color electrophotographic processes. In the electrophotographic method, a fixed image is usually formed through a process comprising: forming an electrostatic latent image on a photoreceptor comprising a photoconductive material by means of various units; using a toner to develop this latent image; transferring the toner image on the photoreceptor, through an intermediate body or without an intermediate body, onto a image receiving body such as a sheet; and then fixing this transferred image onto the image receiving body. In general, the contact type fixing method, which is widely used as a toner-fixing method, is a method in which heat and pressure are used when a toner image is fixed (hereinafter referred to as the “heating and pressing method”). In the case of this heating and pressing method, the surface of a fixing member and a toner image on a image receiving body contact each other under pressure. Accordingly, the method gives a very high heat efficiency and makes rapid fixation possible. In particular, the method is very useful for high-speed electrophotographic image forming devices. In recent years, energy-saving performance has been increasingly required. Thus, investigation on low-temperature fixation has been advanced in order to decrease power consumption when a toner is fixed. As a result, several documents report toners comprising a crystalline resin as a binder resin. For example, Japanese Patent Application Laid-Open (JP-A) Nos. 2002-082485, 2000-352839 and 2001-42568 each report a toner comprising a crystalline polyester resin. However, in the case that a crystalline resin is used as a binder resin, there is caused a problem that the electrification quantity of the toner becomes low so that a sufficient developing performance cannot be obtained. Into fixing devices, the following control is introduced for energy saving: a control which stops power supply to fixing device during standby period; or a control which maintains the fixing device at a lower temperature than a fixing temperature during standby period. Accordingly, at the time of printing, it is necessary to raise the temperature of the devices to the fixing temperature rapidly. Thus, various modifications are made in order to control the temperature of a fixing device or the temperature distribution thereof (JP-A No. 8-220932). Further, suggested is a method of using a material having a high thermal conductivity as the surface material of a fixing device in order to lower fixing temperature (JP-A No. 5-210330). However, in a fixing device which involves rapid temperature-rising, as described above, temperature is raised at a rate of 10 to 20° C./second. Consequently, printing starts before the surface temperature of the fixing device becomes even. For this reason, the fixing device has a broad temperature distribution and the temperature difference between the highest temperature region and the lowest temperature region becomes about 50 to 100° C. However, toner is designed to have a narrow fixable temperature range, which is a temperature range between the lowest fixable temperature of the toner to the hot offset temperature. Thus, no toner having a broad fixable temperature range (a broad fixing latitude) has been obtained. If the surface of a fixing device has a high thermal conductivity, the fixing temperature thereof can be lowered. However, the releasing properties thereof become poor so that the fixing temperature range becomes narrow since fixing devices which are good in both of thermal conductivity and releasing properties have not yet been developed (conventional fixing device surfaces made of fluororesin or silicone resin are poor in thermal conductivity, and fixing device surfaces made of alumina, which has a high thermal conductivity, are poor in releasing properties). For energy saving, the low-temperature fixing toners including a crystalline resin as a binder resin are effective. However, crystalline-resin-containing toners which have been reported hitherto cannot attain a broad fixable temperature range. Thus, the crystalline-resin-containing toners are unsuitable for forming an image by use of a fixing member having a high thermal conductivity, such image formation requiring a broad fixable temperature range of toners. Accordingly, a toner which has a sufficient image-forming properties and which can be used to form an image by use of a fixing member having a high thermal conductivity has not yet been obtained.
|
Title:
Electrophotographic toner, method for producing the same, electrophotographic developer, and image forming method
Abstract:
An electrophotographic toner having a core-shell structure including a crystalline resin in its core region or a sea-island structure including a crystalline resin in its island region, wherein the toner has 1) a resistance of 5.0×1012 Ω·cm or higher, 2) a dynamic viscosity coefficient of 3×103 Pa·s or higher at a temperature which is 50° C. higher than a melting point of the crystalline resin, and 3) a dynamic viscosity coefficient of 1×105 Pa·s or lower at a temperature which is 10° C. higher than the melting point of the crystalline resin.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an electrophotographic toner, an electrophotographic developer, and an image forming method. More specifically, the invention relates to an electrophotographic toner used in an instrument using an electrophotographic method, such as a copying machine, a printer or a facsimile, in particular, a color copying machine; a method for producing the toner; an electrophotographic developer; and an image forming method using the developer. 2. Description of the Related Art In recent years, the electrophotographic method has widely been used not only in copying machines but also in printers, such as network printers in offices, printers for personal computers and printers for on-demand printing, as information instruments have been developing and communication networks have been making progress in information society. Such characteristics are more strongly requested as high image quality, high speed, high reliability, compactness, lightness, and energy-saving in both fields of monochromic and color electrophotographic processes. In the electrophotographic method, a fixed image is usually formed through a process comprising: forming an electrostatic latent image on a photoreceptor comprising a photoconductive material by means of various units; using a toner to develop this latent image; transferring the toner image on the photoreceptor, through an intermediate body or without an intermediate body, onto a image receiving body such as a sheet; and then fixing this transferred image onto the image receiving body. In general, the contact type fixing method, which is widely used as a toner-fixing method, is a method in which heat and pressure are used when a toner image is fixed (hereinafter referred to as the “heating and pressing method”). In the case of this heating and pressing method, the surface of a fixing member and a toner image on a image receiving body contact each other under pressure. Accordingly, the method gives a very high heat efficiency and makes rapid fixation possible. In particular, the method is very useful for high-speed electrophotographic image forming devices. In recent years, energy-saving performance has been increasingly required. Thus, investigation on low-temperature fixation has been advanced in order to decrease power consumption when a toner is fixed. As a result, several documents report toners comprising a crystalline resin as a binder resin. For example, Japanese Patent Application Laid-Open (JP-A) Nos. 2002-082485, 2000-352839 and 2001-42568 each report a toner comprising a crystalline polyester resin. However, in the case that a crystalline resin is used as a binder resin, there is caused a problem that the electrification quantity of the toner becomes low so that a sufficient developing performance cannot be obtained. Into fixing devices, the following control is introduced for energy saving: a control which stops power supply to fixing device during standby period; or a control which maintains the fixing device at a lower temperature than a fixing temperature during standby period. Accordingly, at the time of printing, it is necessary to raise the temperature of the devices to the fixing temperature rapidly. Thus, various modifications are made in order to control the temperature of a fixing device or the temperature distribution thereof (JP-A No. 8-220932). Further, suggested is a method of using a material having a high thermal conductivity as the surface material of a fixing device in order to lower fixing temperature (JP-A No. 5-210330). However, in a fixing device which involves rapid temperature-rising, as described above, temperature is raised at a rate of 10 to 20° C./second. Consequently, printing starts before the surface temperature of the fixing device becomes even. For this reason, the fixing device has a broad temperature distribution and the temperature difference between the highest temperature region and the lowest temperature region becomes about 50 to 100° C. However, toner is designed to have a narrow fixable temperature range, which is a temperature range between the lowest fixable temperature of the toner to the hot offset temperature. Thus, no toner having a broad fixable temperature range (a broad fixing latitude) has been obtained. If the surface of a fixing device has a high thermal conductivity, the fixing temperature thereof can be lowered. However, the releasing properties thereof become poor so that the fixing temperature range becomes narrow since fixing devices which are good in both of thermal conductivity and releasing properties have not yet been developed (conventional fixing device surfaces made of fluororesin or silicone resin are poor in thermal conductivity, and fixing device surfaces made of alumina, which has a high thermal conductivity, are poor in releasing properties). For energy saving, the low-temperature fixing toners including a crystalline resin as a binder resin are effective. However, crystalline-resin-containing toners which have been reported hitherto cannot attain a broad fixable temperature range. Thus, the crystalline-resin-containing toners are unsuitable for forming an image by use of a fixing member having a high thermal conductivity, such image formation requiring a broad fixable temperature range of toners. Accordingly, a toner which has a sufficient image-forming properties and which can be used to form an image by use of a fixing member having a high thermal conductivity has not yet been obtained.
|
10978203
| 2,004
|
Tumor necrosis factor related ligand
|
Tumor necrosis factor related ligand (TRELL), a novel member of the tumor necrosis factor family (TNF), modified TRELL, and pharmaceutical compositions comprising them.
|
BACKGROUND OF THE INVENTION The tumor-necrosis factor (TNF)-related cytokines are mediators of host defense and immune regulation. Members of this family exist in membrane-anchored forms, acting locally through cell-to-cell contact, or as secreted proteins capable of diffusing to more distant targets. A parallel family of receptors signals the presence of these molecules leading to the initiation of cell death or cellular proliferation and differentiation in the target tissue. Presently, the TNF family of ligands and receptors has at least 9 recognized receptor-ligand pairs, including: TNF:TNF-R; LT-α:TNF-R; LT-α/β:LT-β-R; FasL:Fas; CD40L:CD40; CD3OL:CD3O; CD27L:CD27; OX40L:OX40 and 4-1BBL:4-1BB. The DNA sequences encoding these ligands have only about 25% to about 30% identity in even the most related cases, although the amino acid relatedness is about 50%. The defining feature of this family of cytokine receptors is found in the cysteine rich extracellular domain initially revealed by the molecular cloning of two distinct TNF receptors. i This family of genes encodes glycoproteins characteristic of Type I transmembrane proteins with an extracellular ligand binding domain, a single membrane spanning region and a cytoplasmic region involved in activating cellular functions. The cysteine-rich ligand binding region exhibits a tightly knit disulfide linked core domain, which, depending upon the particular family member, is repeated multiple times. Most receptors have four domains, although there may be as few as three, or as many as six. Proteins in the TNF family of ligands are characterized by a short N-terminal stretch of normally short hydrophilic amino acids, often containing several lysine or arginine residues thought to serve as stop transfer sequences. Next follows a transmembrane region and an extracellular region of variable length, that separates the C-terminal receptor binding domain from the membrane. This region is sometimes referred to as the “stalk”. The C-terminal binding region comprises the bulk of the protein, and often, but not always, contains glycosylation sites. These genes lack the classic signal sequences characteristic of type I membrane proteins, having type II membrane proteins with the C terminus lying outside the cell, and the short N-terminus residing in the cytoplasm. In some cases, e.g., TNF and LT-α, cleavage in the stalk region can occur early during protein processing and the ligand is then found primarily in secreted form. Most ligands, however, exist in a membrane form, mediating localized signalling. The structure of these ligands has been well-defined by crystallographic analyses of TNF, LT-α, and CD40L. TNF and lymphotoxin-α (LT-α) are both structured into a sandwich of two anti-parallel β-pleated sheets with the “jelly roll” or Greek key topology. ii The rms deviation between the Cα and β-strand residues is 0.61 C, suggesting a high degree of similarity in their molecular topography. A structural feature emerging from molecular studies of CD40L, TNF and LT-α is the propensity to assemble into oligomeric complexes. Intrinsic to the oligomeric structure is the formation of the receptor binding site at the junction between the neighboring subunits creating a multivalent ligand. The quaternary structures of TNF, CD40L and LT-α have been shown to exist as trimers by analysis of their crystal structures. Many of the amino acids conserved between the different ligands are in stretches of the scaffold β-sheet. It is likely that the basic sandwich structure is preserved in all of these molecules, since portions of these scaffold sequences are conserved across the various family members. The quaternary structure may also be maintained since the subunit conformation is likely to remain similar. TNF family members can best be described as master switches in the immune system controlling both cell survival and differentiation. Only TNF and LTα are currently recognized as secreted cytokines contrasting with the other predominantly membrane anchored members of the TNF family. While a membrane form of TNF has been well-characterized and is likely to have unique biological roles, secreted TNF functions as a general alarm signaling to cells more distant from the site of the triggering event. Thus TNF secretion can amplify an event leading to the well-described changes in the vasculature lining and the inflammatory state of cells. In contrast, the membrane bound members of the family send signals though the TNF type receptors only to cells in direct contact For example T cells provide CD40 mediated “help” only to those B cells brought into direct contact via cognate TCR interactions. Similar cell-cell contact limitations on the ability to induce cell death apply to the well-studied Fas system. The ability to induce programmed cell death is an important and well-studied feature of several members of the TNF family. Fas mediated apoptosis appears to play a role in the regulation of autoreactive lymphocytes in the periphery and possibly the thymus (Castro et al., 1996) and recent work has also implicated the TNF and CD30 systems in the survival of T cells and large cell anaplastic lymphoma lines (Amakawa et al., 1996; Gruss et al., 1994; Sytwu et al., 1996; Zheng et al., 1995). We and others had previously shown the death of this line in response to TNF, Fas or LTb receptor signaling to have features of apoptosis (Abreu-Martin et al., 1995; Browning et al., 1996). It appears that one can segregate the TNF ligands into three groups based on their ability to induce cell death (Table III). First, TNF, Fas ligand and TRAIL can efficiently induce cell death in many lines and their receptors mostly likely have good canonical death domains. Presumably the ligand to DR-3 (TRAMP/WSL-1) would also all into this category. Next there are those ligands which trigger a weaker death signal limited to few cell types and TRELL, CD30 ligand and LTalb2 are examples of this class. How this group can trigger cell death in the absence of a canonical death domain is an interesting question and suggests that a separate weaker death signaling mechanism exists. Lastly, there those members that cannot efficiently deliver a death signal. Probably all groups can have antiproliferative effects on some cell types consequent to inducing cell differentiation e.g. CD40 (Funakoshi et al., 1994). The TNF family has grown dramatically in recent years to encompass at least 11 different signaling pathways involving regulation of the immune system. The expression patterns of TRELL and TRAIL indicate that there is still more functional variety to be uncovered in this family. This aspect has been especially highlighted in recent the discovery of two receptors that affect the ability of rous sacroma and herpes simplex virus to replicate as well as the historical observations that TNF has anti-viral activity and pox viruses encode for decoy TNF receptors (Brojatsch et al., 1996; Montgomery et al., 1996; Smith, 1994; Vassalli, 1992). The generation soluble TRELL and the identification of the TRELL receptor should provide the tools to elucidate the biological function of this interesting protein. TNF is a mediator of septic shock and cachexia iii , and is involved in the regulation of hematopoietic cell development. iv It appears to play a major role as a mediator of inflammation and defense against bacterial, viral and parasitic infections v as well as having antitumor activity. vi TNF is also involved in different autoimmune diseases. vii TNF may be produced by several types of cells, including macrophages, fibroblasts, T cells and natural killer cells. viii TNF binds to two different receptors, each acting through specific intracellular signaling molecules, thus resulting in different effects of TNF. ix TNF can exist either as a membrane bound form or as a soluble secreted cytokine. x LT-α shares many activities with TNF, i.e. binding to the TNF receptors, xi but unlike TNF, appears to be secreted primarily by activated T cells and some β-lymphoblastoid tumors. xii The heteromeric complex of LT-α and LT-β is a membrane bound complex which binds to the LT-β receptor. xiii The LT system (LTs and LT-R) appears to be involved in the development of peripheral lymphoid organs since genetic disruption of LT-β leads to disorganization of T and B cells in the spleen and an absence of lymph nodes. xiv The LT-β system is also involved in cell death of some adenocarcinoma cell lines. xv Fas-L, another member of the TNF family, is expressed predominantly on activated T cells. xvi It induces the death of cells bearing its receptor, including tumor cells and HTV-infected cells, by a mechanism known as programmed cell death or apoptosis. xvii Furthermore, deficiencies in either Fas or Fas-L may lead to lymphoproliferative disorders, confirming the role of the Fas system in the regulation of immune responses. The Fas system is also involved in liver damage resulting from hepatitis chronic infection xix and in autoimmunity in HIV-infected patients. xx The Fas system is also involved in T-cell destruction in HIV patients. xxi TRAIL, another member of this family, also seems to be involved in the death of a wide variety of transformed cell lines of diverse origin. xxii CD40-L, another member of the TNF family, is expressed on T cells and induces the regulation of CD40-bearing B cells. xxiii Furthermore, alterations in the CD40-L gene result in a disease known as X-linked hyper-IgM syndrome. xiv The CD40 system is also involved in different autoimmune diseases xxv and CD40-L is known to have antiviral properties. xxvi Although the CD40 system is involved in the rescue of apoptotic B cells, xxvii in non-immune cells it induces apoptosis xxviii . Many additional lymphocyte members of the TNF family are also involved in costimulation. xxix Generally, the members of the TNF family have fundamental regulatory roles in controlling the immune system and activating acute host defense systems. Given the current progress in manipulating members of the TNF family for therapeutic benefit, it is likely that members of this family may provide unique means to control disease. Some of the ligands of this family can directly induce the apoptotic death of many transformed cells eg. LT, TNF, Fas ligand and TRAIL (Nagata, 1997). Fas and possibly TNF and CD30 receptor activation can induce cell death in nontransformed lymphocytes which may play an immunoregulatory function (Amakawa et al., 1996; Nagata, 1997; Sytwu et al., 1996; Zheng et al., 1995). In general, death is triggered following the aggregation of death domains which reside on the cytoplasmic side of the TNF receptors. The death domain orchestrates the assembly of various signal transduction components which result in the activation of the caspase cascade (Nagata, 1997). Some receptors lack canonical death domains, e.g. LTb receptor and CD30 (Browning et al., 1996; Lee et al., 1996) yet can induce cell death, albeit more weakly. It is likely that these receptors function primarily to induce cell differentiation and the death is an aberrant consequence in some transformed cell lines, although this picture is unclear as studies on the CD30 null mouse suggest a death role in negative selection in the thymus (Amakawa et al., 1996). Conversely, signaling through other pathways such as CD40 is required to maintain cell survival. Thus, there is a need to identify and characterize additional molecules which are members of the TNF family thereby providing additional means of controlling disease and manipulating the immune system.
|
Title:
Tumor necrosis factor related ligand
Abstract:
Tumor necrosis factor related ligand (TRELL), a novel member of the tumor necrosis factor family (TNF), modified TRELL, and pharmaceutical compositions comprising them.
Background:
BACKGROUND OF THE INVENTION The tumor-necrosis factor (TNF)-related cytokines are mediators of host defense and immune regulation. Members of this family exist in membrane-anchored forms, acting locally through cell-to-cell contact, or as secreted proteins capable of diffusing to more distant targets. A parallel family of receptors signals the presence of these molecules leading to the initiation of cell death or cellular proliferation and differentiation in the target tissue. Presently, the TNF family of ligands and receptors has at least 9 recognized receptor-ligand pairs, including: TNF:TNF-R; LT-α:TNF-R; LT-α/β:LT-β-R; FasL:Fas; CD40L:CD40; CD3OL:CD3O; CD27L:CD27; OX40L:OX40 and 4-1BBL:4-1BB. The DNA sequences encoding these ligands have only about 25% to about 30% identity in even the most related cases, although the amino acid relatedness is about 50%. The defining feature of this family of cytokine receptors is found in the cysteine rich extracellular domain initially revealed by the molecular cloning of two distinct TNF receptors. i This family of genes encodes glycoproteins characteristic of Type I transmembrane proteins with an extracellular ligand binding domain, a single membrane spanning region and a cytoplasmic region involved in activating cellular functions. The cysteine-rich ligand binding region exhibits a tightly knit disulfide linked core domain, which, depending upon the particular family member, is repeated multiple times. Most receptors have four domains, although there may be as few as three, or as many as six. Proteins in the TNF family of ligands are characterized by a short N-terminal stretch of normally short hydrophilic amino acids, often containing several lysine or arginine residues thought to serve as stop transfer sequences. Next follows a transmembrane region and an extracellular region of variable length, that separates the C-terminal receptor binding domain from the membrane. This region is sometimes referred to as the “stalk”. The C-terminal binding region comprises the bulk of the protein, and often, but not always, contains glycosylation sites. These genes lack the classic signal sequences characteristic of type I membrane proteins, having type II membrane proteins with the C terminus lying outside the cell, and the short N-terminus residing in the cytoplasm. In some cases, e.g., TNF and LT-α, cleavage in the stalk region can occur early during protein processing and the ligand is then found primarily in secreted form. Most ligands, however, exist in a membrane form, mediating localized signalling. The structure of these ligands has been well-defined by crystallographic analyses of TNF, LT-α, and CD40L. TNF and lymphotoxin-α (LT-α) are both structured into a sandwich of two anti-parallel β-pleated sheets with the “jelly roll” or Greek key topology. ii The rms deviation between the Cα and β-strand residues is 0.61 C, suggesting a high degree of similarity in their molecular topography. A structural feature emerging from molecular studies of CD40L, TNF and LT-α is the propensity to assemble into oligomeric complexes. Intrinsic to the oligomeric structure is the formation of the receptor binding site at the junction between the neighboring subunits creating a multivalent ligand. The quaternary structures of TNF, CD40L and LT-α have been shown to exist as trimers by analysis of their crystal structures. Many of the amino acids conserved between the different ligands are in stretches of the scaffold β-sheet. It is likely that the basic sandwich structure is preserved in all of these molecules, since portions of these scaffold sequences are conserved across the various family members. The quaternary structure may also be maintained since the subunit conformation is likely to remain similar. TNF family members can best be described as master switches in the immune system controlling both cell survival and differentiation. Only TNF and LTα are currently recognized as secreted cytokines contrasting with the other predominantly membrane anchored members of the TNF family. While a membrane form of TNF has been well-characterized and is likely to have unique biological roles, secreted TNF functions as a general alarm signaling to cells more distant from the site of the triggering event. Thus TNF secretion can amplify an event leading to the well-described changes in the vasculature lining and the inflammatory state of cells. In contrast, the membrane bound members of the family send signals though the TNF type receptors only to cells in direct contact For example T cells provide CD40 mediated “help” only to those B cells brought into direct contact via cognate TCR interactions. Similar cell-cell contact limitations on the ability to induce cell death apply to the well-studied Fas system. The ability to induce programmed cell death is an important and well-studied feature of several members of the TNF family. Fas mediated apoptosis appears to play a role in the regulation of autoreactive lymphocytes in the periphery and possibly the thymus (Castro et al., 1996) and recent work has also implicated the TNF and CD30 systems in the survival of T cells and large cell anaplastic lymphoma lines (Amakawa et al., 1996; Gruss et al., 1994; Sytwu et al., 1996; Zheng et al., 1995). We and others had previously shown the death of this line in response to TNF, Fas or LTb receptor signaling to have features of apoptosis (Abreu-Martin et al., 1995; Browning et al., 1996). It appears that one can segregate the TNF ligands into three groups based on their ability to induce cell death (Table III). First, TNF, Fas ligand and TRAIL can efficiently induce cell death in many lines and their receptors mostly likely have good canonical death domains. Presumably the ligand to DR-3 (TRAMP/WSL-1) would also all into this category. Next there are those ligands which trigger a weaker death signal limited to few cell types and TRELL, CD30 ligand and LTalb2 are examples of this class. How this group can trigger cell death in the absence of a canonical death domain is an interesting question and suggests that a separate weaker death signaling mechanism exists. Lastly, there those members that cannot efficiently deliver a death signal. Probably all groups can have antiproliferative effects on some cell types consequent to inducing cell differentiation e.g. CD40 (Funakoshi et al., 1994). The TNF family has grown dramatically in recent years to encompass at least 11 different signaling pathways involving regulation of the immune system. The expression patterns of TRELL and TRAIL indicate that there is still more functional variety to be uncovered in this family. This aspect has been especially highlighted in recent the discovery of two receptors that affect the ability of rous sacroma and herpes simplex virus to replicate as well as the historical observations that TNF has anti-viral activity and pox viruses encode for decoy TNF receptors (Brojatsch et al., 1996; Montgomery et al., 1996; Smith, 1994; Vassalli, 1992). The generation soluble TRELL and the identification of the TRELL receptor should provide the tools to elucidate the biological function of this interesting protein. TNF is a mediator of septic shock and cachexia iii , and is involved in the regulation of hematopoietic cell development. iv It appears to play a major role as a mediator of inflammation and defense against bacterial, viral and parasitic infections v as well as having antitumor activity. vi TNF is also involved in different autoimmune diseases. vii TNF may be produced by several types of cells, including macrophages, fibroblasts, T cells and natural killer cells. viii TNF binds to two different receptors, each acting through specific intracellular signaling molecules, thus resulting in different effects of TNF. ix TNF can exist either as a membrane bound form or as a soluble secreted cytokine. x LT-α shares many activities with TNF, i.e. binding to the TNF receptors, xi but unlike TNF, appears to be secreted primarily by activated T cells and some β-lymphoblastoid tumors. xii The heteromeric complex of LT-α and LT-β is a membrane bound complex which binds to the LT-β receptor. xiii The LT system (LTs and LT-R) appears to be involved in the development of peripheral lymphoid organs since genetic disruption of LT-β leads to disorganization of T and B cells in the spleen and an absence of lymph nodes. xiv The LT-β system is also involved in cell death of some adenocarcinoma cell lines. xv Fas-L, another member of the TNF family, is expressed predominantly on activated T cells. xvi It induces the death of cells bearing its receptor, including tumor cells and HTV-infected cells, by a mechanism known as programmed cell death or apoptosis. xvii Furthermore, deficiencies in either Fas or Fas-L may lead to lymphoproliferative disorders, confirming the role of the Fas system in the regulation of immune responses. The Fas system is also involved in liver damage resulting from hepatitis chronic infection xix and in autoimmunity in HIV-infected patients. xx The Fas system is also involved in T-cell destruction in HIV patients. xxi TRAIL, another member of this family, also seems to be involved in the death of a wide variety of transformed cell lines of diverse origin. xxii CD40-L, another member of the TNF family, is expressed on T cells and induces the regulation of CD40-bearing B cells. xxiii Furthermore, alterations in the CD40-L gene result in a disease known as X-linked hyper-IgM syndrome. xiv The CD40 system is also involved in different autoimmune diseases xxv and CD40-L is known to have antiviral properties. xxvi Although the CD40 system is involved in the rescue of apoptotic B cells, xxvii in non-immune cells it induces apoptosis xxviii . Many additional lymphocyte members of the TNF family are also involved in costimulation. xxix Generally, the members of the TNF family have fundamental regulatory roles in controlling the immune system and activating acute host defense systems. Given the current progress in manipulating members of the TNF family for therapeutic benefit, it is likely that members of this family may provide unique means to control disease. Some of the ligands of this family can directly induce the apoptotic death of many transformed cells eg. LT, TNF, Fas ligand and TRAIL (Nagata, 1997). Fas and possibly TNF and CD30 receptor activation can induce cell death in nontransformed lymphocytes which may play an immunoregulatory function (Amakawa et al., 1996; Nagata, 1997; Sytwu et al., 1996; Zheng et al., 1995). In general, death is triggered following the aggregation of death domains which reside on the cytoplasmic side of the TNF receptors. The death domain orchestrates the assembly of various signal transduction components which result in the activation of the caspase cascade (Nagata, 1997). Some receptors lack canonical death domains, e.g. LTb receptor and CD30 (Browning et al., 1996; Lee et al., 1996) yet can induce cell death, albeit more weakly. It is likely that these receptors function primarily to induce cell differentiation and the death is an aberrant consequence in some transformed cell lines, although this picture is unclear as studies on the CD30 null mouse suggest a death role in negative selection in the thymus (Amakawa et al., 1996). Conversely, signaling through other pathways such as CD40 is required to maintain cell survival. Thus, there is a need to identify and characterize additional molecules which are members of the TNF family thereby providing additional means of controlling disease and manipulating the immune system.
|
11014420
| 2,004
|
Light emitting panel assemblies
|
Light emitting panel assemblies include a light emitting panel member having at least one light transition area having one or more light sources associated therewith that emit light of multiple colors that are mixed within the light transition area to produce a substantially homogeneous light color distribution within the panel member. A pattern of relatively small individual optical elements on or in at least one of the panel surfaces cause a desired light output distribution to be emitted therefrom.
|
BACKGROUND OF THE INVENTION This invention relates generally, as indicated, to light emitting panel assemblies each including a transparent panel member for efficiently conducting light, and controlling the light conducted by the panel member to be emitted from one or more light output areas along the length thereof. Light emitting panel assemblies are generally known. However, the present invention relates to several different light emitting panel assembly configurations which provide for better control of the light output from the panel assemblies and for more efficient utilization of light, which results in greater light output from the panel assemblies.
|
Title:
Light emitting panel assemblies
Abstract:
Light emitting panel assemblies include a light emitting panel member having at least one light transition area having one or more light sources associated therewith that emit light of multiple colors that are mixed within the light transition area to produce a substantially homogeneous light color distribution within the panel member. A pattern of relatively small individual optical elements on or in at least one of the panel surfaces cause a desired light output distribution to be emitted therefrom.
Background:
BACKGROUND OF THE INVENTION This invention relates generally, as indicated, to light emitting panel assemblies each including a transparent panel member for efficiently conducting light, and controlling the light conducted by the panel member to be emitted from one or more light output areas along the length thereof. Light emitting panel assemblies are generally known. However, the present invention relates to several different light emitting panel assembly configurations which provide for better control of the light output from the panel assemblies and for more efficient utilization of light, which results in greater light output from the panel assemblies.
|
10817028
| 2,004
|
Microelectromechanical device with reset electrode
|
A microelectromechanical device having a reset electrode for use in various devices including display devices such as those employing spatial light modulators. The device includes an optically transmissive substrate, a semiconductor substrate, and a member deflectable between a rest position and an operative position supported by one of the substrates. The deflectable member returns to an undeflected position by operation of the reset electrode.
|
BACKGROUND The present invention relates to projection systems having micromirrors and micromirror arrays. The present invention also relates to integrated circuits having at least one deflectable element. Various technologies have been proposed for projection and display systems such as those utilizing spatial light modulation employing various materials. Among these are silicon-based micromechanical spatial light modulation (SLM) devices in which a large portion of the device is optically active. In such systems, micromirrors may deflect in one or more directions. For instance, in architectures that rely on a passive drive scheme, a voltage bias is accomplished by an address electrode. Once the mirror rotates, the electrode floats and the mirror maintains its deflected position. As the bias is reset, the mirror rotates back to the flat state at a rate that is limited by the hinge spring constant of the micromirror device. The hinge spring constant typically results in a reset cycle that is slower than the drive cycle. This limits the ability of the micromirror device to twitch at high frequencies. Thus, it would be desirable to provide a micromirror architecture that could facilitate high reset frequencies, while providing high efficiency and operational integrity.
|
Title:
Microelectromechanical device with reset electrode
Abstract:
A microelectromechanical device having a reset electrode for use in various devices including display devices such as those employing spatial light modulators. The device includes an optically transmissive substrate, a semiconductor substrate, and a member deflectable between a rest position and an operative position supported by one of the substrates. The deflectable member returns to an undeflected position by operation of the reset electrode.
Background:
BACKGROUND The present invention relates to projection systems having micromirrors and micromirror arrays. The present invention also relates to integrated circuits having at least one deflectable element. Various technologies have been proposed for projection and display systems such as those utilizing spatial light modulation employing various materials. Among these are silicon-based micromechanical spatial light modulation (SLM) devices in which a large portion of the device is optically active. In such systems, micromirrors may deflect in one or more directions. For instance, in architectures that rely on a passive drive scheme, a voltage bias is accomplished by an address electrode. Once the mirror rotates, the electrode floats and the mirror maintains its deflected position. As the bias is reset, the mirror rotates back to the flat state at a rate that is limited by the hinge spring constant of the micromirror device. The hinge spring constant typically results in a reset cycle that is slower than the drive cycle. This limits the ability of the micromirror device to twitch at high frequencies. Thus, it would be desirable to provide a micromirror architecture that could facilitate high reset frequencies, while providing high efficiency and operational integrity.
|
10954888
| 2,004
|
Adjustable ergonomic scissors
|
An adjustable ergonomic scissors has a thumb ring shank, finger ring shank and longitudinal axis along the scissor blade direction. The scissors includes a thumb ring both slidable and rotatable along the thumb ring shank. A finger ring shaft is offset approximately between 15° and 45° from the longitudinal axis of the scissor blades and a connector is positioned along the finger ring shank that allows a finger ring to be adjustably positioned in relation to the finger ring shank. When in the closed position, the thumb ring and finger ring offset form each other to ergonomically fit in a user's hand. The scissors thereby adjusts to a user's hand to improve use.
|
BACKGROUND OF THE INVENTION This invention relates generally to the field of hand operated scissors and more particularly to an adjustable ergonomic scissors. Scissors are a cutting instrument with two blades, the edges of which slide past each other. The blades are attached by a common fulcrum in the form of a screw or a pin, and they operate simultaneously by lever action when the handles are pushed together. Different types of scissors are designed for specific uses, but they are all based on the same lever principle. In addition to their household use, specially designed scissors are used in surgery, embroidery, manicuring and by professional dressmakers and hairdressers, including pet groomers, among others. FIG. 7 shows a view of the traditional shear or scissor design wherein the thumb of the operator is protruding too far through the thumb ring and the thumb 27 is overextended, misaligned and straining to conform to the tool. The index finger 28 is overextended, misaligned and unable to properly support the tool, while the middle finger 29 is overextended, misaligned and unable to assist the index finger in support of the tool. The ring finger 30 is overextended, and unable to stabilize the rolling movement of the shear while straining to align with the finger ring of the scissor or shear and the little finger 31 is overextended, and straining to assist the ring finger to stabilize the rolling and pitching movements of the shear blades as shown by line 32 . An example of a scissor design can be found in U.S. Pat. No. 5,109,608, which discloses a scissor with an offset thumbhole. Another example of a design can be found in U.S. Pat. No. 5,722,171, which is an ergonomic scissor with adjustable shanks that rotate outward, permitting pivoting in the plane of the handles. The two handles can be locked in various positions, but are limited to one general direction of adjustment. The '171 patent design allows adjustment only between the finger and thumbholes—an increase of space between the two, which is limited to the change of angle in one direction only. Prior attempts at scissor design have not successfully addressed the need for a scissor to conform to the natural way in which the human hand operates os as to reduce strain and stress while operating the scissors.
|
Title:
Adjustable ergonomic scissors
Abstract:
An adjustable ergonomic scissors has a thumb ring shank, finger ring shank and longitudinal axis along the scissor blade direction. The scissors includes a thumb ring both slidable and rotatable along the thumb ring shank. A finger ring shaft is offset approximately between 15° and 45° from the longitudinal axis of the scissor blades and a connector is positioned along the finger ring shank that allows a finger ring to be adjustably positioned in relation to the finger ring shank. When in the closed position, the thumb ring and finger ring offset form each other to ergonomically fit in a user's hand. The scissors thereby adjusts to a user's hand to improve use.
Background:
BACKGROUND OF THE INVENTION This invention relates generally to the field of hand operated scissors and more particularly to an adjustable ergonomic scissors. Scissors are a cutting instrument with two blades, the edges of which slide past each other. The blades are attached by a common fulcrum in the form of a screw or a pin, and they operate simultaneously by lever action when the handles are pushed together. Different types of scissors are designed for specific uses, but they are all based on the same lever principle. In addition to their household use, specially designed scissors are used in surgery, embroidery, manicuring and by professional dressmakers and hairdressers, including pet groomers, among others. FIG. 7 shows a view of the traditional shear or scissor design wherein the thumb of the operator is protruding too far through the thumb ring and the thumb 27 is overextended, misaligned and straining to conform to the tool. The index finger 28 is overextended, misaligned and unable to properly support the tool, while the middle finger 29 is overextended, misaligned and unable to assist the index finger in support of the tool. The ring finger 30 is overextended, and unable to stabilize the rolling movement of the shear while straining to align with the finger ring of the scissor or shear and the little finger 31 is overextended, and straining to assist the ring finger to stabilize the rolling and pitching movements of the shear blades as shown by line 32 . An example of a scissor design can be found in U.S. Pat. No. 5,109,608, which discloses a scissor with an offset thumbhole. Another example of a design can be found in U.S. Pat. No. 5,722,171, which is an ergonomic scissor with adjustable shanks that rotate outward, permitting pivoting in the plane of the handles. The two handles can be locked in various positions, but are limited to one general direction of adjustment. The '171 patent design allows adjustment only between the finger and thumbholes—an increase of space between the two, which is limited to the change of angle in one direction only. Prior attempts at scissor design have not successfully addressed the need for a scissor to conform to the natural way in which the human hand operates os as to reduce strain and stress while operating the scissors.
|
10959176
| 2,004
|
Method and structure for autonomic application differentiation/specialization
|
A method (and structure) of at least one of implementing, for deploying, an enterprise application, includes, for the set of instructions defining the enterprise application, a mechanism that allows the enterprise application to autonomously exercise at least one of a node differentiation and a task specialization.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention generally relates to development, deployment, and management of enterprise tiered applications in which multiple instances of the same code and configuration are deployed, typically on separate machines connected on a network. More specifically, an agreed-upon election process, extensible configuration capability, and task allocation message format allow autonomic application differentiation for leader election, which leader thereinafter assigns configuration(s) and tasks among the multiple instances of currently-deployed code modules. 2. Description of the Related Art Modern application architectures and frameworks have provided some common development, deployment, and management capabilities. However, enterprise applications, in particular, have challenges to provide a consistent level of service to a specified number of users at an acceptable level of performance. Java 2 Enterprise Edition (J2EE)™ is a Java™ runtime environment primarily designed, developed and supported by Sun Microsystems. It was specifically architected to support enterprise tiered application development, deployment, and management. For purposes of the discussion hereinbelow, “enterprise application” or “enterprise-capable application” refers to an application designed to be distributed so that potentially a plurality of such identical modules are simultaneously deployed. Enterprise applications might be deployed to multiple machines but a single machine can also have multiple deployments at the same time. An enterprise application typically serves a large audience of consumers, users, machines or potentially other applications, although the actual size of an audience at any one time is not to be considered a limitation of the present invention. As implemented on a computer or computer network, an enterprise application can be considered as a look-alike software module. FIG. 1 shows an exemplary functional diagram of a conventional enterprise application deployment 100 relating to, for example, one or more data sources 101 , as interconnected functionally by the dotted lines 102 , 103 . The components 104 - 107 might be hardware components, such as servers, but more typically for purpose of this discussion, would be software enterprise applications respectively located in separate physical component or even a single component, such as a server 104 . Server 104 might, for example, serve as an entry for users into the data sources 101 via a computer network (not shown), such as the Internet. Messaging hub 107 serves as a communication center that appropriately forwards messages between the nodes. Assuming application servers 105 , 106 as being enterprise applications, then it can be seen that each application server 105 , 106 could be further comprised of submodules, such as a web application module 108 , a web service 109 , and an EJB module 110 . Enterprise JavaBeans™ (EJB) technology is the server-side component architecture for the Java 2 Platform, Enterprise Edition (J2EE) platform. EJB technology enables rapid and simplified development of distributed, transactional, secure and portable applications based on Java™ technology. Therefore, as exemplarily shown in FIG. 1 , there are at least two implemented enterprise applications 105 , 106 at the same time in this example. Typically, an enterprise application will have a primary function, but is often exposed to other secondary functions and to other applications. For example, each enterprise application 105 , 106 might have a primary function to provide a single point of access to manage telephone contacts and/or other emergency contacts for employees of a company. However, this same enterprise application 105 , 106 might also be used to provide other services or functions that allow other applications to leverage the information and/or software code used to support the primary function. For example, a secondary function of enterprise application modules 105 , 106 might be exposing the telephone and emergency contact information to another application residing on application servers 105 , 106 that defines emergency procedures to be followed as predefined company policy for handling emergencies. The emergency procedure application on application servers 105 , 106 consumes data via a web service, remote EJB, or other communication from the emergency contact management application also on application servers 105 , 106 . Both the first application and the second application can be considered as an enterprise application for purpose of this discussion. In general, enterprise applications require architectures that support two main types of scaling, vertical and horizontal. Vertical scaling is when an application is deployed on the same hardware to maximize utilization of available resources. Horizontal scaling, which is more popular, is more often used to achieve redundancy and higher performance for overall reliability. In both cases of scaling, application components are typically literally deployed on multiple machines. Each copy represents a set piece of function designed to operate exactly like each other. This architecture is currently exemplified by Java J2EET™. J2EE™ web applications provide a single manageable bundle for development and deployment, and this feature has simplified both development and deployment of application components. Applications are often deployed in layers to provide more options for scalability. For example, there might be a need to have more web servers (serving static content) than web application servers (dynamic content). Legacy and maintenance components are often deployed as one-off solutions. These components often fail to leverage the benefits of a single bundle development and deploy architecture like J2EE™. Although modular application architecture, development and deployment provide efficiencies over past systems, there are often several components managed outside of the application design. This divergence will continue to grow over time. That is, enterprise applications often require dedicated independent components which are managed apart from the main application. Currently, skilled human involvement is usually required to manage and maintain such systems. Without some method of oversight, the multiple instances can work against each other, causing problems such as data corruption or poor performance. The multiple instances might, for example, poise the risk of task collision and might introduce additional unwanted network traffic or database activity. Therefore, for application architecture, scalability is often addressed by creating layered architecture and employing the use of horizontal scaling, that is, essentially throwing hardware at the problem. There are components that do not fit within these frameworks. Specifically, legacy systems and maintenance applications are two areas that architectures and frameworks tend to ignore. These items are often deployed as one-off solutions without much care to scalability and reliability. It is not uncommon for this approach to introduce unsynchronized code branches, duplication of effort, etc., everything that one might expect by introducing multiple work streams to address an overall solution. One of the reasons they are deployed as stand-alone applications has to do with there being no common way to scale horizontally and automatically have parts of the deployment perform specialized tasks (e.g., without human intervention, such as using configuration files). This problem is compounded should it be necessary or desirable to modify or redefine the specialized task to be performed. Thus, a need continues to exist for improvement in the implementation of modular application architecture.
|
Title:
Method and structure for autonomic application differentiation/specialization
Abstract:
A method (and structure) of at least one of implementing, for deploying, an enterprise application, includes, for the set of instructions defining the enterprise application, a mechanism that allows the enterprise application to autonomously exercise at least one of a node differentiation and a task specialization.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention generally relates to development, deployment, and management of enterprise tiered applications in which multiple instances of the same code and configuration are deployed, typically on separate machines connected on a network. More specifically, an agreed-upon election process, extensible configuration capability, and task allocation message format allow autonomic application differentiation for leader election, which leader thereinafter assigns configuration(s) and tasks among the multiple instances of currently-deployed code modules. 2. Description of the Related Art Modern application architectures and frameworks have provided some common development, deployment, and management capabilities. However, enterprise applications, in particular, have challenges to provide a consistent level of service to a specified number of users at an acceptable level of performance. Java 2 Enterprise Edition (J2EE)™ is a Java™ runtime environment primarily designed, developed and supported by Sun Microsystems. It was specifically architected to support enterprise tiered application development, deployment, and management. For purposes of the discussion hereinbelow, “enterprise application” or “enterprise-capable application” refers to an application designed to be distributed so that potentially a plurality of such identical modules are simultaneously deployed. Enterprise applications might be deployed to multiple machines but a single machine can also have multiple deployments at the same time. An enterprise application typically serves a large audience of consumers, users, machines or potentially other applications, although the actual size of an audience at any one time is not to be considered a limitation of the present invention. As implemented on a computer or computer network, an enterprise application can be considered as a look-alike software module. FIG. 1 shows an exemplary functional diagram of a conventional enterprise application deployment 100 relating to, for example, one or more data sources 101 , as interconnected functionally by the dotted lines 102 , 103 . The components 104 - 107 might be hardware components, such as servers, but more typically for purpose of this discussion, would be software enterprise applications respectively located in separate physical component or even a single component, such as a server 104 . Server 104 might, for example, serve as an entry for users into the data sources 101 via a computer network (not shown), such as the Internet. Messaging hub 107 serves as a communication center that appropriately forwards messages between the nodes. Assuming application servers 105 , 106 as being enterprise applications, then it can be seen that each application server 105 , 106 could be further comprised of submodules, such as a web application module 108 , a web service 109 , and an EJB module 110 . Enterprise JavaBeans™ (EJB) technology is the server-side component architecture for the Java 2 Platform, Enterprise Edition (J2EE) platform. EJB technology enables rapid and simplified development of distributed, transactional, secure and portable applications based on Java™ technology. Therefore, as exemplarily shown in FIG. 1 , there are at least two implemented enterprise applications 105 , 106 at the same time in this example. Typically, an enterprise application will have a primary function, but is often exposed to other secondary functions and to other applications. For example, each enterprise application 105 , 106 might have a primary function to provide a single point of access to manage telephone contacts and/or other emergency contacts for employees of a company. However, this same enterprise application 105 , 106 might also be used to provide other services or functions that allow other applications to leverage the information and/or software code used to support the primary function. For example, a secondary function of enterprise application modules 105 , 106 might be exposing the telephone and emergency contact information to another application residing on application servers 105 , 106 that defines emergency procedures to be followed as predefined company policy for handling emergencies. The emergency procedure application on application servers 105 , 106 consumes data via a web service, remote EJB, or other communication from the emergency contact management application also on application servers 105 , 106 . Both the first application and the second application can be considered as an enterprise application for purpose of this discussion. In general, enterprise applications require architectures that support two main types of scaling, vertical and horizontal. Vertical scaling is when an application is deployed on the same hardware to maximize utilization of available resources. Horizontal scaling, which is more popular, is more often used to achieve redundancy and higher performance for overall reliability. In both cases of scaling, application components are typically literally deployed on multiple machines. Each copy represents a set piece of function designed to operate exactly like each other. This architecture is currently exemplified by Java J2EET™. J2EE™ web applications provide a single manageable bundle for development and deployment, and this feature has simplified both development and deployment of application components. Applications are often deployed in layers to provide more options for scalability. For example, there might be a need to have more web servers (serving static content) than web application servers (dynamic content). Legacy and maintenance components are often deployed as one-off solutions. These components often fail to leverage the benefits of a single bundle development and deploy architecture like J2EE™. Although modular application architecture, development and deployment provide efficiencies over past systems, there are often several components managed outside of the application design. This divergence will continue to grow over time. That is, enterprise applications often require dedicated independent components which are managed apart from the main application. Currently, skilled human involvement is usually required to manage and maintain such systems. Without some method of oversight, the multiple instances can work against each other, causing problems such as data corruption or poor performance. The multiple instances might, for example, poise the risk of task collision and might introduce additional unwanted network traffic or database activity. Therefore, for application architecture, scalability is often addressed by creating layered architecture and employing the use of horizontal scaling, that is, essentially throwing hardware at the problem. There are components that do not fit within these frameworks. Specifically, legacy systems and maintenance applications are two areas that architectures and frameworks tend to ignore. These items are often deployed as one-off solutions without much care to scalability and reliability. It is not uncommon for this approach to introduce unsynchronized code branches, duplication of effort, etc., everything that one might expect by introducing multiple work streams to address an overall solution. One of the reasons they are deployed as stand-alone applications has to do with there being no common way to scale horizontally and automatically have parts of the deployment perform specialized tasks (e.g., without human intervention, such as using configuration files). This problem is compounded should it be necessary or desirable to modify or redefine the specialized task to be performed. Thus, a need continues to exist for improvement in the implementation of modular application architecture.
|
10975578
| 2,004
|
Method of growing a thin film onto a substrate
|
The present invention relates to the production of thin films. In particular, the invention concerns a method of growing a thin film onto a substrate, in which method the substrate is placed in a reaction chamber and is subjected to surface reactions of a plurality of vapor-phase reactants according to the ALD method. The present invention is based on replacing the mechanical valves conventionally used for regulating the pulsing of the reactants, which valves tend to wear and intrude metallic particles into the process flow, with an improved precursor dosing system. The invention is characterized by choking the reactant flow between the vapour-phase pulses while still allowing a minimum flow of said reactant, and redirecting the reactant at these times to an other destination than the reaction chamber. The redirection is performed with an inactive gas, which is also used for ventilating the reaction chamber between the vapour-phase pulses.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to the production of thin films. In particular, the invention concerns a method of growing a thin film onto a substrate, in which method the substrate is placed in a reaction chamber and it is subjected to surface reactions of a plurality of vapor-phase reactants according to the ALD method to form a thin film. 2. Description of Related Art Conventionally, thin films are grown out using vacuum evaporation deposition, Molecular Beam Epitaxy (MBE) and other similar vacuum deposition techniques, different variants of Chemical Vapor Deposition (CVD) (including low-pressure and metallo-organic CVD and plasma-enhanced CVD) or, alternatively, the above-mentioned deposition process based on alternate surface reactions, known in the art as the Atomic Layer Deposition, in the following abbreviated ALD, formerly also called Atomic Layer Epitaxy or “ALE”. Commercially available equipment and processes are supplied by ASM Microchemistry, Espoo, Finland, under the trade mark ALCVD™. In the MBE and CVD processes, besides other variables, the thin film growth rate is also affected by the concentrations of the starting material inflows. To achieve a uniform surface smoothness of the thin films manufactured using these methods, the concentrations and reactivities of the starting materials must be kept equal on one side of the substrate. If the different starting materials are allowed to mix with each other prior to reaching the substrate surface as is the case in the CVD method, the possibility of mutual reactions between the reagents is always imminent. Herein arises a risk of microparticle formation already in the in feed lines of the gaseous reactants. Such microparticles generally have a deteriorating effect on the quality of the deposited thin film. However, the occurrence of premature reactions in MBE and CVD reactors can be avoided, e.g., by heating the reactants not earlier than only at the substrates. In addition to heating, the desired reaction can be initiated with the help of, e.g., plasma or other similar activating means. In MBE and CVD processes, the growth rate of thin films is primarily adjusted by controlling the inflow rates of starting materials impinging on the substrate. By contrast, the thin film growth rate in the ALD process is controlled by the substrate surface properties, rather than by the concentrations or other qualities of the starting material inflows. In the ALD process, the only prerequisite is that the starting material is provided in a sufficient concentration for film growth on the substrate. The ALD method is described, e.g., in FI Patents Nos. 52,359 and 57,975 as well as in U.S. Pat. Nos. 4,058,430 and 4,389,973. Also in FI Patents Nos. 97,730, 97,731 and 100,409 are disclosed some apparatus constructions suited for implementing the method. Equipment for thin film deposition are further described in publications Material Science Report 4(7), 1989, p. 261, and Tyhjiötekniikka (title in English: Vacuum Techniques), ISBN 951-794-422-5, pp. 253-261. In the ALD method, atoms or molecules sweep over the substrates thus continuously impinging on their surface so that a fully saturated molecular layer is formed thereon. According to the conventional techniques known from FI Patent Specification No. 57,975, the saturation step is followed by a protective gas pulse forming a diffusion barrier that sweeps away the excess starting material and the gaseous reaction products from the substrate. Intermixing of the successive reactant pulses must be avoided. The successive pulses of different starting materials and the protective gas pulses forming diffusion barriers that separate the successive starting materials pulses from each other accomplish the growth of the thin film at a rate controlled by the surface chemistry properties of the different materials. As known in the state of the art, dosing of precursors with a high vapor pressure, e.g. TMA and H 2 O, makes it possible to use valves, which are operated at ambient temperature. As explained in our earlier patents the “inert gas valving”, comprising a diffusion barrier and a drain operated at ambient conditions, has made it possible to use the ALD process with these high vapor pressure materials. In the following, inert gas valving will be also referred to in the abbreviated form “IGV”. It is disclosed and discussed in more detail in our co-pending U.S. patent application Ser. No. 09/835,931 filed on 16 Apr. 2001, the content of which is herewith incorporated by reference. Today there is a growing interest for the use of low vapor pressure solid precursors. The source temperatures can rise up to above 500° C. This is the case for, e.g., MnCl doping of ZnS phosphors. This puts stringent demands on the valves employed for controlling the dosing. Also the use of the IGV is somewhat complicated due to solid condensation of the precursor in the ambient operated drain capillary, which can become blocked and by that ending the proper function of the IGV, causing failure of the process. In single wafer cluster systems, down time for cleaning of drain capillaries and replacing source tubes after each run is not acceptable, contrary to the situation for batch type multi layer processing of thin film displays. Due to the cyclic nature of ALD processing conventional valves cannot be solo adapted for this kind of a process. The aggressive source media destroy the valve rapidly at such conditions. In the low vapor pressure dosing system for ALD systems, the cyclic injection of a precursor into an ALD process requires a valve controlling the dosing. A mean time between failure of 2040 million cycles would be preferable for such a valve for production reasons. In the earliest ALD reactor constructions, solenoid-type valves were mainly used employing valve seal materials of different kinds of elastomers or polymers. Later on, pneumatic valves with metal membranes and metal seats have been used. When aggressive precursors are used at elevated temperatures, involving continuous closing actions, the result is rapid wear of the valve seal. Even pneumatically activated metal membrane valves release metallic particles into the process flow at such conditions. A solenoid valve often creates abrasive products as a result of the steam grinding the solenoid housing. For purity and safety reasons small, convenient sized solenoids are not preferred in chemical vapor deposition equipment. Mass Flow Controllers (in the following abbreviated “MFC”) are widely used for controlling the precursor dosing into conventional (not pulsing) CVD systems but they cannot be used for fast pulsing ALD systems due to their slow response (long response times). At ambient conditions, pneumatic valves can tolerate only 0.2-4 million cycles due to wear out of actuator seals and deformation of the valve steam and valve seat. This is because of forces acting on the valve. At elevated temperatures the tolerance is close to zero. This is particularly disadvantageous for ALD processing where the valve operates 100 to 10,000 times during one process. The heat produced by the friction of the actuator piston movement increases quickly because of rapid pulsing. By contrast, in conventional chemical vapor deposition the precursor valve operates only twice during one process. Thus, as explained in earlier ALD patents and will have become apparent to a person skilled in the art from the above description, a fast acting dosing (pulsing) system with non-wear valves (low-particle level) characteristics would be essential for improved ALD processing.
|
Title:
Method of growing a thin film onto a substrate
Abstract:
The present invention relates to the production of thin films. In particular, the invention concerns a method of growing a thin film onto a substrate, in which method the substrate is placed in a reaction chamber and is subjected to surface reactions of a plurality of vapor-phase reactants according to the ALD method. The present invention is based on replacing the mechanical valves conventionally used for regulating the pulsing of the reactants, which valves tend to wear and intrude metallic particles into the process flow, with an improved precursor dosing system. The invention is characterized by choking the reactant flow between the vapour-phase pulses while still allowing a minimum flow of said reactant, and redirecting the reactant at these times to an other destination than the reaction chamber. The redirection is performed with an inactive gas, which is also used for ventilating the reaction chamber between the vapour-phase pulses.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to the production of thin films. In particular, the invention concerns a method of growing a thin film onto a substrate, in which method the substrate is placed in a reaction chamber and it is subjected to surface reactions of a plurality of vapor-phase reactants according to the ALD method to form a thin film. 2. Description of Related Art Conventionally, thin films are grown out using vacuum evaporation deposition, Molecular Beam Epitaxy (MBE) and other similar vacuum deposition techniques, different variants of Chemical Vapor Deposition (CVD) (including low-pressure and metallo-organic CVD and plasma-enhanced CVD) or, alternatively, the above-mentioned deposition process based on alternate surface reactions, known in the art as the Atomic Layer Deposition, in the following abbreviated ALD, formerly also called Atomic Layer Epitaxy or “ALE”. Commercially available equipment and processes are supplied by ASM Microchemistry, Espoo, Finland, under the trade mark ALCVD™. In the MBE and CVD processes, besides other variables, the thin film growth rate is also affected by the concentrations of the starting material inflows. To achieve a uniform surface smoothness of the thin films manufactured using these methods, the concentrations and reactivities of the starting materials must be kept equal on one side of the substrate. If the different starting materials are allowed to mix with each other prior to reaching the substrate surface as is the case in the CVD method, the possibility of mutual reactions between the reagents is always imminent. Herein arises a risk of microparticle formation already in the in feed lines of the gaseous reactants. Such microparticles generally have a deteriorating effect on the quality of the deposited thin film. However, the occurrence of premature reactions in MBE and CVD reactors can be avoided, e.g., by heating the reactants not earlier than only at the substrates. In addition to heating, the desired reaction can be initiated with the help of, e.g., plasma or other similar activating means. In MBE and CVD processes, the growth rate of thin films is primarily adjusted by controlling the inflow rates of starting materials impinging on the substrate. By contrast, the thin film growth rate in the ALD process is controlled by the substrate surface properties, rather than by the concentrations or other qualities of the starting material inflows. In the ALD process, the only prerequisite is that the starting material is provided in a sufficient concentration for film growth on the substrate. The ALD method is described, e.g., in FI Patents Nos. 52,359 and 57,975 as well as in U.S. Pat. Nos. 4,058,430 and 4,389,973. Also in FI Patents Nos. 97,730, 97,731 and 100,409 are disclosed some apparatus constructions suited for implementing the method. Equipment for thin film deposition are further described in publications Material Science Report 4(7), 1989, p. 261, and Tyhjiötekniikka (title in English: Vacuum Techniques), ISBN 951-794-422-5, pp. 253-261. In the ALD method, atoms or molecules sweep over the substrates thus continuously impinging on their surface so that a fully saturated molecular layer is formed thereon. According to the conventional techniques known from FI Patent Specification No. 57,975, the saturation step is followed by a protective gas pulse forming a diffusion barrier that sweeps away the excess starting material and the gaseous reaction products from the substrate. Intermixing of the successive reactant pulses must be avoided. The successive pulses of different starting materials and the protective gas pulses forming diffusion barriers that separate the successive starting materials pulses from each other accomplish the growth of the thin film at a rate controlled by the surface chemistry properties of the different materials. As known in the state of the art, dosing of precursors with a high vapor pressure, e.g. TMA and H 2 O, makes it possible to use valves, which are operated at ambient temperature. As explained in our earlier patents the “inert gas valving”, comprising a diffusion barrier and a drain operated at ambient conditions, has made it possible to use the ALD process with these high vapor pressure materials. In the following, inert gas valving will be also referred to in the abbreviated form “IGV”. It is disclosed and discussed in more detail in our co-pending U.S. patent application Ser. No. 09/835,931 filed on 16 Apr. 2001, the content of which is herewith incorporated by reference. Today there is a growing interest for the use of low vapor pressure solid precursors. The source temperatures can rise up to above 500° C. This is the case for, e.g., MnCl doping of ZnS phosphors. This puts stringent demands on the valves employed for controlling the dosing. Also the use of the IGV is somewhat complicated due to solid condensation of the precursor in the ambient operated drain capillary, which can become blocked and by that ending the proper function of the IGV, causing failure of the process. In single wafer cluster systems, down time for cleaning of drain capillaries and replacing source tubes after each run is not acceptable, contrary to the situation for batch type multi layer processing of thin film displays. Due to the cyclic nature of ALD processing conventional valves cannot be solo adapted for this kind of a process. The aggressive source media destroy the valve rapidly at such conditions. In the low vapor pressure dosing system for ALD systems, the cyclic injection of a precursor into an ALD process requires a valve controlling the dosing. A mean time between failure of 2040 million cycles would be preferable for such a valve for production reasons. In the earliest ALD reactor constructions, solenoid-type valves were mainly used employing valve seal materials of different kinds of elastomers or polymers. Later on, pneumatic valves with metal membranes and metal seats have been used. When aggressive precursors are used at elevated temperatures, involving continuous closing actions, the result is rapid wear of the valve seal. Even pneumatically activated metal membrane valves release metallic particles into the process flow at such conditions. A solenoid valve often creates abrasive products as a result of the steam grinding the solenoid housing. For purity and safety reasons small, convenient sized solenoids are not preferred in chemical vapor deposition equipment. Mass Flow Controllers (in the following abbreviated “MFC”) are widely used for controlling the precursor dosing into conventional (not pulsing) CVD systems but they cannot be used for fast pulsing ALD systems due to their slow response (long response times). At ambient conditions, pneumatic valves can tolerate only 0.2-4 million cycles due to wear out of actuator seals and deformation of the valve steam and valve seat. This is because of forces acting on the valve. At elevated temperatures the tolerance is close to zero. This is particularly disadvantageous for ALD processing where the valve operates 100 to 10,000 times during one process. The heat produced by the friction of the actuator piston movement increases quickly because of rapid pulsing. By contrast, in conventional chemical vapor deposition the precursor valve operates only twice during one process. Thus, as explained in earlier ALD patents and will have become apparent to a person skilled in the art from the above description, a fast acting dosing (pulsing) system with non-wear valves (low-particle level) characteristics would be essential for improved ALD processing.
|
10754574
| 2,004
|
Fibre optic communications network
|
A security system for controlling access to an enclosed conduit along which runs fibre optic cable, the conduit having a cover for access to the cable, the system having a communications receiver and a modulator responsive to an output of the receiver for coupling non-intrusively to the fibre optic cable adjacent the cover, the communications receiver being responsive to the presence or absence of an access authorisation signal from an operator to cause the modulator to introduce a signal to the fibre optic cable indicative of the authorisation status.
|
BACKGROUND OF THE INVENTION There has been increasing concern over the security of access manholes for conduits containing the optic fibre cables used in telecommunications networks. Access for maintenance and repair is required at spaced locations along the conduit which is buried beneath the ground, but access to these conduits has to be restricted to authorised personnel. There is concern for example that terrorists may disable key routes in order to disrupt business and critical government communications, or that they may use manholes to place remotely controlled or timed explosive devices in open locations. By way of example, in urban environments, optical fibres often share the routes of copper telephone wires and the manholes are located every 150 metres or so in city duct structures: in the AT&T network in the USA, there are over 50,000 such manholes. Security has conventionally been applied by the use of locking arrangements such as security bolts, requiring keys to open them, but this offers no security against a prepared intruder. Also, barriers tend to jam in icy conditions and are prone to dirt ingress. The purpose of the invention is to provide an appropriate level of security governing manhole cover access, in a way which provides reliability and minimises installation cost. It is a further objective of the invention to allow such security to be provided with existing manhole cover installations.
|
Title:
Fibre optic communications network
Abstract:
A security system for controlling access to an enclosed conduit along which runs fibre optic cable, the conduit having a cover for access to the cable, the system having a communications receiver and a modulator responsive to an output of the receiver for coupling non-intrusively to the fibre optic cable adjacent the cover, the communications receiver being responsive to the presence or absence of an access authorisation signal from an operator to cause the modulator to introduce a signal to the fibre optic cable indicative of the authorisation status.
Background:
BACKGROUND OF THE INVENTION There has been increasing concern over the security of access manholes for conduits containing the optic fibre cables used in telecommunications networks. Access for maintenance and repair is required at spaced locations along the conduit which is buried beneath the ground, but access to these conduits has to be restricted to authorised personnel. There is concern for example that terrorists may disable key routes in order to disrupt business and critical government communications, or that they may use manholes to place remotely controlled or timed explosive devices in open locations. By way of example, in urban environments, optical fibres often share the routes of copper telephone wires and the manholes are located every 150 metres or so in city duct structures: in the AT&T network in the USA, there are over 50,000 such manholes. Security has conventionally been applied by the use of locking arrangements such as security bolts, requiring keys to open them, but this offers no security against a prepared intruder. Also, barriers tend to jam in icy conditions and are prone to dirt ingress. The purpose of the invention is to provide an appropriate level of security governing manhole cover access, in a way which provides reliability and minimises installation cost. It is a further objective of the invention to allow such security to be provided with existing manhole cover installations.
|
10952078
| 2,004
|
Method for making and treating wall blocks
|
An apparatus and a method for treating the surfaces and edges of a block to mimic the appearance of natural stone. The apparatus and method can treat up to four sides of a block, can be adjusted to provide varying degrees of surface and edge treatment, and useful in high volume block production equipment. Blocks are produced having a natural, weathered appearance without the damage, breakage, dust, or expense associated with conventional splitting and tumbling methods.
|
BACKGROUND OF THE INVENTION Retaining walls are used in various landscaping projects and are available in a wide variety of styles. Numerous methods and materials exist for the construction of retaining walls. Such methods include the use of natural stone, poured concrete, precast panels, masonry, and landscape timbers or railroad ties. In recent years, segmental concrete retaining wall units, which are dry stacked (i.e., built without the use of mortar), have become widely accepted in the construction of retaining walls. One such unit is described in U.S. Pat. No. Re 34,314 (Forsberg) and another is described in U.S. Pat. No. 6,149,352 (MacDonald). Such retaining wall units have gained popularity because they are mass produced and, consequently, relatively inexpensive. They are structurally sound, easy and relatively inexpensive to install, and couple the durability of concrete with the attractiveness of various architectural finishes. Successful wall systems include, among other design elements, a pinning system that interlocks and aligns the retaining wall units, thereby providing structural strength and allowing efficient installation. Such systems are advantageous in the construction of larger walls, when combined with the use of geogrids hooked over the pins, as described in U.S. Pat. No. 4,914,876 (Forsberg). Another important feature of retaining wall blocks is the appearance of the block. The look of weathered natural stone is very appealing for retaining walls. There are several methods in the art to produce concrete retaining wall blocks that mimic the look of natural stone. One well known method is to split the block during the manufacturing process so that the front face of the block has a fractured concrete surface that looks like a natural split rock. This method produces blocks with a vertical split face, but cannot produce a rounded or fractured top and bottom edge which may be a key feature of natural or quarried stone. Another method is to form blocks individually in a mold and texture the surfaces by removal of the mold. Additional machine texturing processes can then be applied. Because of the natural variation in size of the stones used in stone retaining walls, the wall surface has variations in width from stone to stone. A wall block system capable of duplicating the appearance of natural stone walls is described in U.S. Pat. No. 6,149,352 (MacDonald), hereby incorporated herein by reference in its entirety. This system uses blocks of different widths and a connection system comprising a channel on each block and multiple pin receiving cavities to align the blocks. Thus this system can be used to produce a wall having random variations in face width and high structural integrity of the wall structure. Another method to create a weathered stone appearance is to tumble the blocks together with other blocks in a large rotating canister. The collisions of the blocks in the tumbler chips off random pieces of the blocks, rounding the edges and creating a look that can be quite close to the appearance of a natural stone. This is a labor-intensive undertaking that also can result in undesirable damage to the blocks, blocks covered with dust, the environmental aspect of dealing with the dust by-product of tumbling and the high overall costs of production. Another method to make naturally appearing blocks has been described in U.S. Pat. Nos. 5,078,940 and 5,217,630 (both to Sayles). These patents describe a method and an apparatus for manufacturing a concrete block having an irregular surface. The irregular surface can be made to look similar to split stone, and thus is very desirable. The process involves filling a mold cavity that has a plurality of projections with uncured block material (e.g., concrete) and causing a portion of the material, in the area designated to be the finished face(s), to be retained in place relative to the cavity walls when the block is removed from the cavity. This results in a split appearance for the surface, without having to perform the splitting operation. This is an advantage because the expense and time of conventional block splitting is avoided. Other methods of molding to produce textured surfaces for a block include, for example, U.S. Pat. No. 6,224,815 (LaCroix et al.), in which a block mold is used to produce two blocks having a roughened or textured face. The mold has two cavities separated by a grate. The surfaces that face the grate have a roughened texture upon removal of material from the mold. The advantage to this arrangement is stated to be that the mold is self-cleaning. Another mold for producing a textured block surface is described in U.S. Pat. No. 6,138,983 (Sievert). This mold has upper and lower lips along at least one side wall. A lip or lips serve to strip material from the block as it is being removed from the mold, thus producing a roughened, or split, appearance to the block. Typically, retaining wall blocks are manufactured to have the desired appearance on the front face (i.e., the outer face of a wall) only. In the patents described above, the pattern or design is typically provided only to the front face because that is the only portion of the retaining wall block that is visible after the wall is constructed. Sometimes a portion of a side surface may be provided with a desired pattern or texture. In the Sayles' patents described above, a natural or split look is obtained for only the front face. Such blocks do not allow the user the option to use either the front, side, or back faces of the block interchangeability as the exposed “front face”. To create a wall block that has a roughened texture on the front, side and back surfaces poses certain problems. If a splitting method is used, multiple splits and two orientations for the splits are required to create a quadrilateral block with texture on three sides. In addition, when two opposing block units are split apart, there is typically little waste. However, when more than two sides are split, a waste slab is required. This adds to the expense and labor of processing the block. Tumbling methods are also used to texture a block's surfaces. However, tumbling cannot be used when a block has a lip (often used for connecting and stabilizing blocks in a wall) or if the block has large voids (e.g., cores) or other elements that would be knocked off or destroyed by tumbling. In addition, if a tumbling method is used, substantial portions of the block faces will be ground smooth and not necessarily natural looking. Tumbling also is an expensive production method because blocks must be formed, cured sufficiently to withstand a tumbling process (e.g., typically for a minimum of 7 days and then transported to a tumbler for treatment. If the method combines both splitting and tumbling, the production costs, and thus the cost to the consumer, can be undesirably high. It would be desirable to provide a way to produce a block with an overall weathered appearance as well as rounded edges which avoids the need for tumbling, and thus potentially damaging, a block. In addition, a method is needed to produce the desired appearance on at least three sides of a block that would avoid the need for tumbling the block.
|
Title:
Method for making and treating wall blocks
Abstract:
An apparatus and a method for treating the surfaces and edges of a block to mimic the appearance of natural stone. The apparatus and method can treat up to four sides of a block, can be adjusted to provide varying degrees of surface and edge treatment, and useful in high volume block production equipment. Blocks are produced having a natural, weathered appearance without the damage, breakage, dust, or expense associated with conventional splitting and tumbling methods.
Background:
BACKGROUND OF THE INVENTION Retaining walls are used in various landscaping projects and are available in a wide variety of styles. Numerous methods and materials exist for the construction of retaining walls. Such methods include the use of natural stone, poured concrete, precast panels, masonry, and landscape timbers or railroad ties. In recent years, segmental concrete retaining wall units, which are dry stacked (i.e., built without the use of mortar), have become widely accepted in the construction of retaining walls. One such unit is described in U.S. Pat. No. Re 34,314 (Forsberg) and another is described in U.S. Pat. No. 6,149,352 (MacDonald). Such retaining wall units have gained popularity because they are mass produced and, consequently, relatively inexpensive. They are structurally sound, easy and relatively inexpensive to install, and couple the durability of concrete with the attractiveness of various architectural finishes. Successful wall systems include, among other design elements, a pinning system that interlocks and aligns the retaining wall units, thereby providing structural strength and allowing efficient installation. Such systems are advantageous in the construction of larger walls, when combined with the use of geogrids hooked over the pins, as described in U.S. Pat. No. 4,914,876 (Forsberg). Another important feature of retaining wall blocks is the appearance of the block. The look of weathered natural stone is very appealing for retaining walls. There are several methods in the art to produce concrete retaining wall blocks that mimic the look of natural stone. One well known method is to split the block during the manufacturing process so that the front face of the block has a fractured concrete surface that looks like a natural split rock. This method produces blocks with a vertical split face, but cannot produce a rounded or fractured top and bottom edge which may be a key feature of natural or quarried stone. Another method is to form blocks individually in a mold and texture the surfaces by removal of the mold. Additional machine texturing processes can then be applied. Because of the natural variation in size of the stones used in stone retaining walls, the wall surface has variations in width from stone to stone. A wall block system capable of duplicating the appearance of natural stone walls is described in U.S. Pat. No. 6,149,352 (MacDonald), hereby incorporated herein by reference in its entirety. This system uses blocks of different widths and a connection system comprising a channel on each block and multiple pin receiving cavities to align the blocks. Thus this system can be used to produce a wall having random variations in face width and high structural integrity of the wall structure. Another method to create a weathered stone appearance is to tumble the blocks together with other blocks in a large rotating canister. The collisions of the blocks in the tumbler chips off random pieces of the blocks, rounding the edges and creating a look that can be quite close to the appearance of a natural stone. This is a labor-intensive undertaking that also can result in undesirable damage to the blocks, blocks covered with dust, the environmental aspect of dealing with the dust by-product of tumbling and the high overall costs of production. Another method to make naturally appearing blocks has been described in U.S. Pat. Nos. 5,078,940 and 5,217,630 (both to Sayles). These patents describe a method and an apparatus for manufacturing a concrete block having an irregular surface. The irregular surface can be made to look similar to split stone, and thus is very desirable. The process involves filling a mold cavity that has a plurality of projections with uncured block material (e.g., concrete) and causing a portion of the material, in the area designated to be the finished face(s), to be retained in place relative to the cavity walls when the block is removed from the cavity. This results in a split appearance for the surface, without having to perform the splitting operation. This is an advantage because the expense and time of conventional block splitting is avoided. Other methods of molding to produce textured surfaces for a block include, for example, U.S. Pat. No. 6,224,815 (LaCroix et al.), in which a block mold is used to produce two blocks having a roughened or textured face. The mold has two cavities separated by a grate. The surfaces that face the grate have a roughened texture upon removal of material from the mold. The advantage to this arrangement is stated to be that the mold is self-cleaning. Another mold for producing a textured block surface is described in U.S. Pat. No. 6,138,983 (Sievert). This mold has upper and lower lips along at least one side wall. A lip or lips serve to strip material from the block as it is being removed from the mold, thus producing a roughened, or split, appearance to the block. Typically, retaining wall blocks are manufactured to have the desired appearance on the front face (i.e., the outer face of a wall) only. In the patents described above, the pattern or design is typically provided only to the front face because that is the only portion of the retaining wall block that is visible after the wall is constructed. Sometimes a portion of a side surface may be provided with a desired pattern or texture. In the Sayles' patents described above, a natural or split look is obtained for only the front face. Such blocks do not allow the user the option to use either the front, side, or back faces of the block interchangeability as the exposed “front face”. To create a wall block that has a roughened texture on the front, side and back surfaces poses certain problems. If a splitting method is used, multiple splits and two orientations for the splits are required to create a quadrilateral block with texture on three sides. In addition, when two opposing block units are split apart, there is typically little waste. However, when more than two sides are split, a waste slab is required. This adds to the expense and labor of processing the block. Tumbling methods are also used to texture a block's surfaces. However, tumbling cannot be used when a block has a lip (often used for connecting and stabilizing blocks in a wall) or if the block has large voids (e.g., cores) or other elements that would be knocked off or destroyed by tumbling. In addition, if a tumbling method is used, substantial portions of the block faces will be ground smooth and not necessarily natural looking. Tumbling also is an expensive production method because blocks must be formed, cured sufficiently to withstand a tumbling process (e.g., typically for a minimum of 7 days and then transported to a tumbler for treatment. If the method combines both splitting and tumbling, the production costs, and thus the cost to the consumer, can be undesirably high. It would be desirable to provide a way to produce a block with an overall weathered appearance as well as rounded edges which avoids the need for tumbling, and thus potentially damaging, a block. In addition, a method is needed to produce the desired appearance on at least three sides of a block that would avoid the need for tumbling the block.
|
10873320
| 2,004
|
IR absorbing photosensitive optically variable ink compositions and process
|
Water-soluble, photosensitive, optically variable (POV) inks exhibit improved OCR readability due to improved infrared absorption properties. The inks can produce images that can be viewed with both visible and ultraviolet light to have physically coincident positive and negative images. The new inks contain at least two types of colorants in addition to the IR absorber and other suitable ingredients. The first colorant comprises a fluorescent dye or pigment emitting light within a characteristic emission band when excited by fluorescent-exciting radiation. The second colorant comprises a carbon black infrared radiation absorbing composition alone or with one or more dyes or pigments having a light absorption band at longer wavelengths than the characteristic emission band of the first colorant or also overlapping the emission wavelength of the first colorant in such a way as to result in a dark color. The inks are formulated to provide higher contrast in the presence of IR radiation while retaining a strong negative correlation between the visible and fluorescent images.
|
BACKGROUND OF THE INVENTION The invention relates to new photosensitive optically variable (POV) inks, and more particularly, to water soluble POV inks capable of printing images having improved OCR readability due to improved infrared absorption properties. The POV inks of the invention are effective for use with inkjet printing and have a range of security applications. They can produce security markings of a type which set them apart from other inks. POV inks present a significant challenge to counterfeiting when available from a secure source or licensed supplier, and are often required to be read by OCR readers which suffer in accuracy due to infrared light. The invention provides inkjet inks having the security features of POV inks while having improved OCR processing by laser-based systems widely in use. The inks of the invention are photosensitive optically variable, meaning that they can provide a printed visually black or dark gray machine-readable information-bearing marking that fluoresces in a specific wavelength range when excited with a shorter wavelength light. The printed images exhibit visual light absorption throughout the entire visual spectrum including the red region of the visible spectrum where red inks are invisible to typical automatic scanning systems. Inks of this type are described, for example by U.S. patent Publication No. 2003/0041774, U.S. patent Publication No. 2002/0195586, commonly-assigned, copending U.S. patent application Ser. No. (Attorney's Docket No. F-704) entitled, Photosensitive Optically Variable Ink Compositions Useful for Ink Jet Printing, filed on equal date with this application, in the name of Judith D. Auslander, and commonly-assigned, copending U.S. patent application Ser. No. (Attorney's Docket No. F-738) entitled, Signature Protected Photosensitive Optically Variable Ink Compositions and Process, filed on equal date with this application, in the name of J. D. Auslander and M. Chen. These inks will achieve acceptable PCS (Print Contrast Signal) on virtually all conventional substrates, including dark papers such as Kraft or Manila. The term PCS refers to the ratio of the Print Reflectance Difference (PRD) and the substrate reflectance, and the PRD is the difference between the paper reflectance and ink reflectance. These and other postal terms are given their meanings as defined by the United States Postal Service (USPS). These inks can be used with automated detectors of various types of information-bearing tickets, tags, labels, postage indicia and similar security markings. There is a need for additional POV inks that provide effective security with improved OCR readability due to improved infrared absorption properties.
|
Title:
IR absorbing photosensitive optically variable ink compositions and process
Abstract:
Water-soluble, photosensitive, optically variable (POV) inks exhibit improved OCR readability due to improved infrared absorption properties. The inks can produce images that can be viewed with both visible and ultraviolet light to have physically coincident positive and negative images. The new inks contain at least two types of colorants in addition to the IR absorber and other suitable ingredients. The first colorant comprises a fluorescent dye or pigment emitting light within a characteristic emission band when excited by fluorescent-exciting radiation. The second colorant comprises a carbon black infrared radiation absorbing composition alone or with one or more dyes or pigments having a light absorption band at longer wavelengths than the characteristic emission band of the first colorant or also overlapping the emission wavelength of the first colorant in such a way as to result in a dark color. The inks are formulated to provide higher contrast in the presence of IR radiation while retaining a strong negative correlation between the visible and fluorescent images.
Background:
BACKGROUND OF THE INVENTION The invention relates to new photosensitive optically variable (POV) inks, and more particularly, to water soluble POV inks capable of printing images having improved OCR readability due to improved infrared absorption properties. The POV inks of the invention are effective for use with inkjet printing and have a range of security applications. They can produce security markings of a type which set them apart from other inks. POV inks present a significant challenge to counterfeiting when available from a secure source or licensed supplier, and are often required to be read by OCR readers which suffer in accuracy due to infrared light. The invention provides inkjet inks having the security features of POV inks while having improved OCR processing by laser-based systems widely in use. The inks of the invention are photosensitive optically variable, meaning that they can provide a printed visually black or dark gray machine-readable information-bearing marking that fluoresces in a specific wavelength range when excited with a shorter wavelength light. The printed images exhibit visual light absorption throughout the entire visual spectrum including the red region of the visible spectrum where red inks are invisible to typical automatic scanning systems. Inks of this type are described, for example by U.S. patent Publication No. 2003/0041774, U.S. patent Publication No. 2002/0195586, commonly-assigned, copending U.S. patent application Ser. No. (Attorney's Docket No. F-704) entitled, Photosensitive Optically Variable Ink Compositions Useful for Ink Jet Printing, filed on equal date with this application, in the name of Judith D. Auslander, and commonly-assigned, copending U.S. patent application Ser. No. (Attorney's Docket No. F-738) entitled, Signature Protected Photosensitive Optically Variable Ink Compositions and Process, filed on equal date with this application, in the name of J. D. Auslander and M. Chen. These inks will achieve acceptable PCS (Print Contrast Signal) on virtually all conventional substrates, including dark papers such as Kraft or Manila. The term PCS refers to the ratio of the Print Reflectance Difference (PRD) and the substrate reflectance, and the PRD is the difference between the paper reflectance and ink reflectance. These and other postal terms are given their meanings as defined by the United States Postal Service (USPS). These inks can be used with automated detectors of various types of information-bearing tickets, tags, labels, postage indicia and similar security markings. There is a need for additional POV inks that provide effective security with improved OCR readability due to improved infrared absorption properties.
|
11006500
| 2,004
|
EMI air filter
|
The present invention provides electromagnetic interference filters and gaskets. In exemplary embodiments, the filters and gaskets are made from conductively coated reticulated foam having a pore density varying from 10 to 40 pores per inch (PPI). The filters can be used to cover ventilation openings in an electronics enclosure to shield electrical components, equipment and devices from EMI, electrostatic discharge (ESD) and radio frequency interference (RFI) while still providing adequate airflow to enter and cool the system. The filter material may also help prevent dust and dirt from entering the enclosure. The filters of the present invention are also well suited to conductively bridge gaps between mating features of electronic enclosures. The reticulated foam to fabricate the filters allow for excellent compression (generally 20%-50% of the original thickness) under low compressive forces, while easily recovering from the compressive load without noticeable compression set (permanent deflection).
|
BACKGROUND OF THE INVENTION EMI filters are commonly found in personal computers, networking equipment, cellular telephones, and other similar electronic devices. These EMI filters can further act as a conductive grounding interface between mating features of enclosures used to house a printed circuit board (PCB) or similar devices. This is desirable since electronic components commonly found on PCB's, or similar devices, both emit, and are susceptible to electromagnetic interference (EMI), electrostatic discharge (ESD), and radiofrequency interference (RFI). The proper design of an electronic system and corresponding enclosure will both minimize system emissions as well as protect the system from outside noise created by external devices allowing all devices in close proximity to one another to function as intended. A properly designed electronic enclosure is commonly achieved by providing a continuous conductive barrier around an electronic system thereby creating what is known as a “Faraday Cage.” The Faraday Cage principle is the concept that a continuous, conductive enclosure will either reflect incident radiation or transmit electrical interference to ground, rendering the emissions less troublesome. One of the ways such an enclosure is reduced in effectiveness is from required apertures for ventilation or from inadvertent gaps from the fabrication process that occur between the mating surfaces of the metalized parts that form the enclosure. These apertures and gaps can reduce the shielding effectiveness of an enclosure by creating openings that allow radiant energy to pass through or enter the system. These gaps or openings can even intensify EMI radiation by acting as a slot antenna that can help to radiate emissions. Additionally, these gaps are a source of ground discontinuity, thereby reducing the EMI reflection and absorption capabilities of the enclosure. To solve such EMI/RFI problems, several products have been proposed. U.S. Pat. No. 6,384,325 proposes the use honeycomb like structures as a wave-guide to prevent EMI from passing into and out of an enclosure. Some other proposed gasketing solutions used between mating enclosure features utilize a resilient core in a variety of shapes and sizes coated by a conductive wire mesh or sheath (U.S. Pat. No. 5,902,956). Also commonly used is a “form in place” gasket consisting mainly of an elastomer resin filled with conductive fillers (U.S. Pat. Nos. 6,096,413 and 5,641,438). While the methods listed above are relatively effective, they all have various disadvantages. Honeycomb EMI filters are generally very thick dimensionally and are neither compressible nor recoverable under compressive loads. In addition, such honeycomb filters are relatively heavy. With today's electronics enclosures becoming constantly smaller and lighter, a bulky EMI filter that is unable to conform to complex shapes limits the number of applications where these types of filters would be suitable. Sheathed resilient core EMI gaskets are typically formed in a linear fashion from a non-conductive foamed elastomer thermoplastic such as a polyethylene, polypropylene, butadiene, styrene-butadiene, or similar materials. These resilient cores can be either formed or molded inside a conductive mesh or sheath. Alternatively, the cores can be wrapped after the molding or forming process in a similar type of mesh, sheath or foil. Occasionally, adhesives are introduced to act as a bonding agent between the core and the mesh. The mesh or sheath can typically be made entirely from common metals such as copper, aluminum, tin, gold, silver, nickel or similar alloys. In addition, a composite fiber mesh or sheath can be made by coating or plating synthetic fibers such as nylon, polyester, polyethylene, cotton, wool or the like in common conductive metals. This type of linear gasket does have its limitations with mechanically and electrically securing the gasket when used in enclosures with irregular or non-linear contours. In order to match an irregular contour of an enclosure or boundary interface to be sealed, such linear gaskets are often sectioned in an effort to facilitate securing the gasket to the enclosure. Sectioning or cutting the sheathed gasket has adverse effects. Typically when cut, the ends of the mesh or sheath portion of the gasket have a tendency to fray or unravel thereby compromising the conductivity of the gasket and possibly depositing flakes or bits of conductive material into the system introducing the possibility of electrically shorting the system. When adhesives are used, the adhesive will have a tendency to coat the conductive mesh fibers with non-conductive adhesives. This often reduces the mesh fibers' shielding effectiveness by insulating their conductive properties causing grounding discontinuities. Form in place gaskets are typically comprised of a foamed, gelled or unfoamed elastomer resin(s), such as silicone urethane or other similar polymers and are used as a carrier for conductive fillers. The filled resin is lined onto one or more mating surfaces of an enclosure to provide an EMI shielding gasket. Alternatively, an unfilled elastomer resin can be lined onto the enclosure and then coated with a conductive outer layer, such as silver, or other similar alloy. While these types of gaskets are quite common and can be applied with the proper machinery to most contours and mating surface patterns, they do have some disadvantages. Form in place gaskets are only partially filled with conductive materials and are not 100% conductive material. Therefore, these gaskets typically require high compressive forces between the mating enclosure surfaces to ensure that adequate grounding contact is made with the conductive particles contained within the elastomer resin. With today's electronic enclosures becoming both smaller and being designed with increasingly thinner wall thickness, achieving the necessary compressive forces without flexing or damaging the enclosure becomes more difficult. Additionally, with the inclusion of conductive particles, the elastic compressions recovery properties of the elastomer resin can be diminished, thereby reducing the ability to open and close the enclosure if access to the internal electronics is necessary for rework or maintenance. In an attempt to solve some of the drawbacks of the aforementioned methods, U.S. Pat. No. 6,309,742 to Clupper et al. proposes the use of a metalized reticulated and elastomeric foam that has a pore density in the 80-240 PPI range. Clupper et al. cites an improved rigidity, resiliency to compression set, and improved electrical conductivity as justification for utilizing a high pore density material. However, the high foam pore density has been found to decrease the shielding effectiveness of the EMI shield. This is most likely attributed to the higher pore density preventing the filter from being metalized completely throughout the entire thickness of foam. As a result the filter has poor three dimensional or “XYZ” universal conductivity throughout the thickness. As such, the EMI shield has the tendency to be only conductive on the outside surfaces and not in the center. Thus, any post-processing (die cutting, shearing etc.) done to metalized high-density reticulated foam would further expose the unmetalized internal areas and potentially reduce the shielding effectiveness even further. For the above reasons, what is needed are improved methods and EMI filters.
|
Title:
EMI air filter
Abstract:
The present invention provides electromagnetic interference filters and gaskets. In exemplary embodiments, the filters and gaskets are made from conductively coated reticulated foam having a pore density varying from 10 to 40 pores per inch (PPI). The filters can be used to cover ventilation openings in an electronics enclosure to shield electrical components, equipment and devices from EMI, electrostatic discharge (ESD) and radio frequency interference (RFI) while still providing adequate airflow to enter and cool the system. The filter material may also help prevent dust and dirt from entering the enclosure. The filters of the present invention are also well suited to conductively bridge gaps between mating features of electronic enclosures. The reticulated foam to fabricate the filters allow for excellent compression (generally 20%-50% of the original thickness) under low compressive forces, while easily recovering from the compressive load without noticeable compression set (permanent deflection).
Background:
BACKGROUND OF THE INVENTION EMI filters are commonly found in personal computers, networking equipment, cellular telephones, and other similar electronic devices. These EMI filters can further act as a conductive grounding interface between mating features of enclosures used to house a printed circuit board (PCB) or similar devices. This is desirable since electronic components commonly found on PCB's, or similar devices, both emit, and are susceptible to electromagnetic interference (EMI), electrostatic discharge (ESD), and radiofrequency interference (RFI). The proper design of an electronic system and corresponding enclosure will both minimize system emissions as well as protect the system from outside noise created by external devices allowing all devices in close proximity to one another to function as intended. A properly designed electronic enclosure is commonly achieved by providing a continuous conductive barrier around an electronic system thereby creating what is known as a “Faraday Cage.” The Faraday Cage principle is the concept that a continuous, conductive enclosure will either reflect incident radiation or transmit electrical interference to ground, rendering the emissions less troublesome. One of the ways such an enclosure is reduced in effectiveness is from required apertures for ventilation or from inadvertent gaps from the fabrication process that occur between the mating surfaces of the metalized parts that form the enclosure. These apertures and gaps can reduce the shielding effectiveness of an enclosure by creating openings that allow radiant energy to pass through or enter the system. These gaps or openings can even intensify EMI radiation by acting as a slot antenna that can help to radiate emissions. Additionally, these gaps are a source of ground discontinuity, thereby reducing the EMI reflection and absorption capabilities of the enclosure. To solve such EMI/RFI problems, several products have been proposed. U.S. Pat. No. 6,384,325 proposes the use honeycomb like structures as a wave-guide to prevent EMI from passing into and out of an enclosure. Some other proposed gasketing solutions used between mating enclosure features utilize a resilient core in a variety of shapes and sizes coated by a conductive wire mesh or sheath (U.S. Pat. No. 5,902,956). Also commonly used is a “form in place” gasket consisting mainly of an elastomer resin filled with conductive fillers (U.S. Pat. Nos. 6,096,413 and 5,641,438). While the methods listed above are relatively effective, they all have various disadvantages. Honeycomb EMI filters are generally very thick dimensionally and are neither compressible nor recoverable under compressive loads. In addition, such honeycomb filters are relatively heavy. With today's electronics enclosures becoming constantly smaller and lighter, a bulky EMI filter that is unable to conform to complex shapes limits the number of applications where these types of filters would be suitable. Sheathed resilient core EMI gaskets are typically formed in a linear fashion from a non-conductive foamed elastomer thermoplastic such as a polyethylene, polypropylene, butadiene, styrene-butadiene, or similar materials. These resilient cores can be either formed or molded inside a conductive mesh or sheath. Alternatively, the cores can be wrapped after the molding or forming process in a similar type of mesh, sheath or foil. Occasionally, adhesives are introduced to act as a bonding agent between the core and the mesh. The mesh or sheath can typically be made entirely from common metals such as copper, aluminum, tin, gold, silver, nickel or similar alloys. In addition, a composite fiber mesh or sheath can be made by coating or plating synthetic fibers such as nylon, polyester, polyethylene, cotton, wool or the like in common conductive metals. This type of linear gasket does have its limitations with mechanically and electrically securing the gasket when used in enclosures with irregular or non-linear contours. In order to match an irregular contour of an enclosure or boundary interface to be sealed, such linear gaskets are often sectioned in an effort to facilitate securing the gasket to the enclosure. Sectioning or cutting the sheathed gasket has adverse effects. Typically when cut, the ends of the mesh or sheath portion of the gasket have a tendency to fray or unravel thereby compromising the conductivity of the gasket and possibly depositing flakes or bits of conductive material into the system introducing the possibility of electrically shorting the system. When adhesives are used, the adhesive will have a tendency to coat the conductive mesh fibers with non-conductive adhesives. This often reduces the mesh fibers' shielding effectiveness by insulating their conductive properties causing grounding discontinuities. Form in place gaskets are typically comprised of a foamed, gelled or unfoamed elastomer resin(s), such as silicone urethane or other similar polymers and are used as a carrier for conductive fillers. The filled resin is lined onto one or more mating surfaces of an enclosure to provide an EMI shielding gasket. Alternatively, an unfilled elastomer resin can be lined onto the enclosure and then coated with a conductive outer layer, such as silver, or other similar alloy. While these types of gaskets are quite common and can be applied with the proper machinery to most contours and mating surface patterns, they do have some disadvantages. Form in place gaskets are only partially filled with conductive materials and are not 100% conductive material. Therefore, these gaskets typically require high compressive forces between the mating enclosure surfaces to ensure that adequate grounding contact is made with the conductive particles contained within the elastomer resin. With today's electronic enclosures becoming both smaller and being designed with increasingly thinner wall thickness, achieving the necessary compressive forces without flexing or damaging the enclosure becomes more difficult. Additionally, with the inclusion of conductive particles, the elastic compressions recovery properties of the elastomer resin can be diminished, thereby reducing the ability to open and close the enclosure if access to the internal electronics is necessary for rework or maintenance. In an attempt to solve some of the drawbacks of the aforementioned methods, U.S. Pat. No. 6,309,742 to Clupper et al. proposes the use of a metalized reticulated and elastomeric foam that has a pore density in the 80-240 PPI range. Clupper et al. cites an improved rigidity, resiliency to compression set, and improved electrical conductivity as justification for utilizing a high pore density material. However, the high foam pore density has been found to decrease the shielding effectiveness of the EMI shield. This is most likely attributed to the higher pore density preventing the filter from being metalized completely throughout the entire thickness of foam. As a result the filter has poor three dimensional or “XYZ” universal conductivity throughout the thickness. As such, the EMI shield has the tendency to be only conductive on the outside surfaces and not in the center. Thus, any post-processing (die cutting, shearing etc.) done to metalized high-density reticulated foam would further expose the unmetalized internal areas and potentially reduce the shielding effectiveness even further. For the above reasons, what is needed are improved methods and EMI filters.
|
10708949
| 2,004
|
Network lock method and related apparatus with ciphered network lock and inerasable deciphering key
|
The method includes: associating different cell phones to different enciphering and deciphering keys of an asymmetric encryption algorithm. Access information of the network lock corresponding to the cell phone is enciphered by the corresponding enciphering key. Then, the enciphered network lock is stored in the cell phone, and the corresponding deciphering key is recorded in an inerasable memory of the cell phone. The original plaintext access information of the network lock and the enciphering key is stored only in a service provider of the communication network. When the cell phone tries to access the communication network, it deciphers the enciphered network lock using the deciphering key stored in the inerasable memory to verify the network lock of the cell phone.
|
BACKGROUND OF INVENTION 1. Field of the Invention The present invention relates to a network lock method and a related apparatus, and more particularly, to a network lock method and a related apparatus by ciphered network lock and inerasable deciphering key. 2. Description of the Prior Art In modern society, wireless communication networks have become one of the most important ways of communicating with people and exchanging information. Everyone can take advantage of the service of a wireless communication network easily and enjoy the power of accessing worldwide information anywhere and anytime via a convenient cell phone. For permanently maintaining the market and managing communication networks, it has become important to the information industry to improve the quality of communication services, maintain the communication order of communication networks, and ensure the rights of the subscribers of communication networks. In general, service of wireless communication is provided by a service provider. Cell phone subscribers pay fees for rights of access to the communication service. To protect the rights of legal subscribers, when a cell phone user uses the communication service, the cell phone determines whether the user is a legal subscriber by a network lock determination mechanism. If the user is not a legal subscriber, the cell phone is restricted to access the communication network directly. Please refer to FIG. 1 . FIG. 1 is a block diagram of a conventional communication network comprising communication devices 12 and 13 , and a service provider 28 . The cell phone 12 is taken for example to illustrate the communication device in a conventional communication system 10 . There are a wireless signal transceiver module 14 , a processor 16 controlling functions of cell phone 12 , a data memory 20 (a non-volatile memory such as a flash memory), a subscriber identification module card (SIM card) 24 capable of identifying the subscriber, a microphone 18 A capable of transforming acoustic waves to electronic signals, a speaker 18 B, and a man machine interface (MMI) 21 . The man machine interface 21 may comprise a keypad, a display, a vibrator, etc., so that the user of the cell phone 12 is able to control the cell phone 12 and monitor the operation of the cell phone 12 via the man machine interface 21 . For the service provider 28 , there is a base station 29 capable of providing communication service by transmitting and receiving wireless signals among cell phones. For instance, the acoustic waves of the users voice at the cell phone 12 are received and transformed into electronic signals by the microphone 18 A, encoded appropriately by the processor 16 , then modulated into radio frequency (RF) signals in the transceiver module 14 and wirelessly emitted to the base station 29 . The base station 29 wirelessly transmits the signals received from the cell phone 12 to the cell phone 13 , so that the user of the cell phone 13 is able to receive the message from the user of the cell phone 12 . For the acoustic message transmitted by the cell phone 13 to the cell phone 12 , the base station 29 receives it from the cell phone 13 and then wirelessly transmits it to the cell phone 12 . The cell phone 12 receives the wireless signals at the transceiver module 14 and demodulates them to a base band signal, then decodes them appropriately with the processor 16 and transmits them to the speaker 18 B to transform them into acoustic waves so that the user of the cell phone 12 can hear them. In this manner, the user of the cell phone 12 and the user of the cell phone 13 are able to communicate via the communication service provided by the service provider 28 . However, as mentioned, to protect the rights of legal subscribers, verification of the network lock is carried out automatically in the cell phone 12 to determine whether the user of the cell phone 12 is permitted to use the service of the communication network 10 . Typically, there is a subscriber identification number 26 stored in the SIM card 24 in the cell phone 12 to represent the identification of the user of the cell phone 12 . Generally speaking, the SIM card 24 is detachably connected to the cell phone 12 . When a user proposes to use the service of the communication network 10 via the cell phone 12 , he inserts the SIM card 24 to the cell phone 12 so that the cell phone 12 is able to identify the subscriber. Corresponding to the subscriber identification number 26 stored in the SIM card 24 , there are a device identification number 23 and access information 22 of the verification procedure stored in the data memory 20 . The device identification number 23 is a unique identification number of the cell phone (such as an IMEI, International Mobile Equipment Identity). In other words, the device identification numbers of different cell phones are different. Access information 22 is adapted to record the status of the network lock of the cell phone 12 . The network lock is adapted for defining what subscriber identification numbers are permitted to utilize the service of the communication network 10 . The status of the network lock of the cell phone 12 and the permitted subscriber identification numbers are stored in access information 22 . For example, when values of some fields of the subscriber identification number 26 are within a predetermined range, the cell phone 12 accepts the subscriber identification number 26 as a legal subscriber identification number. The predetermined range is recorded in the access information 22 . In the prior art, when the verification is carried out in the cell phone 12 , the processor 16 loads and reads the access information 22 in the data memory 20 , and determines whether the network lock of the cell phone 12 is turned on accordingly. If the status of the network lock is recorded as on in the access information 22 , the processor 16 further checks whether the subscriber identification number 26 recorded in the SIM card 24 is among the legal subscriber identification numbers recorded in the access information 22 . If the subscriber identification number 26 is recognized as a legal subscriber identification number, for example, as previously mentioned, the values of some fields of the subscriber identification number 26 are within the recorded predetermined range, the processor 16 determines the owner of the SIM card 24 is a legal subscriber of the communication network 10 , and allows the cell phone 12 to proceed with following procedures so that the user of the cell phone 12 , that is, the owner of the SIM card 24 , is able to utilize the service of the communication network 10 via the cell phone 12 . On the contrary, if the processor 16 finds the subscriber identification number 26 in the SIM card 24 is beyond the range of legal subscriber identification numbers recorded in the access information 22 , the processor 16 determines the owner of the SIM card 24 is not a legal subscriber of the communication network 10 , and prevents access by the cell phone 12 to the communication network 10 . On the other hand, if the processor 16 finds the status of the network lock stored in the access information 22 is off when proceeding with the verification, the processor 16 does not check the subscriber identification number 26 , but allows the owner of the SIM card 24 to utilize the service of the communication network 10 via the cell phone 12 directly. To sum up, the network lock of the prior art determines whether the owner of the SIM card 24 is permitted to utilize the service of the communication network 10 via the cell phone 12 according to the access information 22 stored in the data memory 20 . However, the conventional method carries the risk that the network lock be broken by illegal users. For example, when an illegal user wants to break the network lock of the cell phone 12 , the illegal user can obtain the access information of another cell phone of which the network lock is turned off. Since the network lock is off in this cell phone, the status of the network lock is stored as off in the access information. Therefore, the access information can be utilized to break the network lock. For example, even when the network lock of the cell phone 12 is recorded as on in the access information 22 , the illegal user can overwrite the original access information 22 with unsanctioned access information in the data memory 20 , replacing the original access information 22 with the unsanctioned access information. When the cell phone 12 proceeds with the verification, it follows the unsanctioned access information and does not turn on the network lock, and hence the network lock of the cell phone 12 is broken. Even in the situation that the subscriber identification number 26 on the SIM card 24 is not a legal subscriber identification number, the owner of the SIM card 24 is able to access the service of the communication network 10 via the cell phone 12 illegally. For the convenience in maintenance and testing, there are predetermined maintenance junctions in the data memory 20 of the cell phone 12 . Illegal users can take advantage of these predetermined maintenance junctions to write the breaking access information into the data memory 20 and overwrite the original access information 22 with a special data tool, such as JTAG tool, breaking the network lock of the cell phone 12 . More seriously, illegal users can rewrite the access information 22 directly. For example, one can break the network lock of the cell phone 12 by rewriting the status of the network lock in the access information 22 to off. In addition, illegal users can delete the access information 22 . Generally, in the cell phone 12 of the prior art, when the processor 16 finds that there is no access information in the data memory 20 , the processor 16 proceeds with the network lock verification according to a predetermined access information, and the network lock usually is not turned on in this predetermined access information. Therefore, the network lock of the cell phone 12 is broken by the illegal users. Once the network lock is illegally broken, operations of the communication network 10 and the rights of the service provider and the legal subscribers (the owners of legal SIM cards) are affected.
|
Title:
Network lock method and related apparatus with ciphered network lock and inerasable deciphering key
Abstract:
The method includes: associating different cell phones to different enciphering and deciphering keys of an asymmetric encryption algorithm. Access information of the network lock corresponding to the cell phone is enciphered by the corresponding enciphering key. Then, the enciphered network lock is stored in the cell phone, and the corresponding deciphering key is recorded in an inerasable memory of the cell phone. The original plaintext access information of the network lock and the enciphering key is stored only in a service provider of the communication network. When the cell phone tries to access the communication network, it deciphers the enciphered network lock using the deciphering key stored in the inerasable memory to verify the network lock of the cell phone.
Background:
BACKGROUND OF INVENTION 1. Field of the Invention The present invention relates to a network lock method and a related apparatus, and more particularly, to a network lock method and a related apparatus by ciphered network lock and inerasable deciphering key. 2. Description of the Prior Art In modern society, wireless communication networks have become one of the most important ways of communicating with people and exchanging information. Everyone can take advantage of the service of a wireless communication network easily and enjoy the power of accessing worldwide information anywhere and anytime via a convenient cell phone. For permanently maintaining the market and managing communication networks, it has become important to the information industry to improve the quality of communication services, maintain the communication order of communication networks, and ensure the rights of the subscribers of communication networks. In general, service of wireless communication is provided by a service provider. Cell phone subscribers pay fees for rights of access to the communication service. To protect the rights of legal subscribers, when a cell phone user uses the communication service, the cell phone determines whether the user is a legal subscriber by a network lock determination mechanism. If the user is not a legal subscriber, the cell phone is restricted to access the communication network directly. Please refer to FIG. 1 . FIG. 1 is a block diagram of a conventional communication network comprising communication devices 12 and 13 , and a service provider 28 . The cell phone 12 is taken for example to illustrate the communication device in a conventional communication system 10 . There are a wireless signal transceiver module 14 , a processor 16 controlling functions of cell phone 12 , a data memory 20 (a non-volatile memory such as a flash memory), a subscriber identification module card (SIM card) 24 capable of identifying the subscriber, a microphone 18 A capable of transforming acoustic waves to electronic signals, a speaker 18 B, and a man machine interface (MMI) 21 . The man machine interface 21 may comprise a keypad, a display, a vibrator, etc., so that the user of the cell phone 12 is able to control the cell phone 12 and monitor the operation of the cell phone 12 via the man machine interface 21 . For the service provider 28 , there is a base station 29 capable of providing communication service by transmitting and receiving wireless signals among cell phones. For instance, the acoustic waves of the users voice at the cell phone 12 are received and transformed into electronic signals by the microphone 18 A, encoded appropriately by the processor 16 , then modulated into radio frequency (RF) signals in the transceiver module 14 and wirelessly emitted to the base station 29 . The base station 29 wirelessly transmits the signals received from the cell phone 12 to the cell phone 13 , so that the user of the cell phone 13 is able to receive the message from the user of the cell phone 12 . For the acoustic message transmitted by the cell phone 13 to the cell phone 12 , the base station 29 receives it from the cell phone 13 and then wirelessly transmits it to the cell phone 12 . The cell phone 12 receives the wireless signals at the transceiver module 14 and demodulates them to a base band signal, then decodes them appropriately with the processor 16 and transmits them to the speaker 18 B to transform them into acoustic waves so that the user of the cell phone 12 can hear them. In this manner, the user of the cell phone 12 and the user of the cell phone 13 are able to communicate via the communication service provided by the service provider 28 . However, as mentioned, to protect the rights of legal subscribers, verification of the network lock is carried out automatically in the cell phone 12 to determine whether the user of the cell phone 12 is permitted to use the service of the communication network 10 . Typically, there is a subscriber identification number 26 stored in the SIM card 24 in the cell phone 12 to represent the identification of the user of the cell phone 12 . Generally speaking, the SIM card 24 is detachably connected to the cell phone 12 . When a user proposes to use the service of the communication network 10 via the cell phone 12 , he inserts the SIM card 24 to the cell phone 12 so that the cell phone 12 is able to identify the subscriber. Corresponding to the subscriber identification number 26 stored in the SIM card 24 , there are a device identification number 23 and access information 22 of the verification procedure stored in the data memory 20 . The device identification number 23 is a unique identification number of the cell phone (such as an IMEI, International Mobile Equipment Identity). In other words, the device identification numbers of different cell phones are different. Access information 22 is adapted to record the status of the network lock of the cell phone 12 . The network lock is adapted for defining what subscriber identification numbers are permitted to utilize the service of the communication network 10 . The status of the network lock of the cell phone 12 and the permitted subscriber identification numbers are stored in access information 22 . For example, when values of some fields of the subscriber identification number 26 are within a predetermined range, the cell phone 12 accepts the subscriber identification number 26 as a legal subscriber identification number. The predetermined range is recorded in the access information 22 . In the prior art, when the verification is carried out in the cell phone 12 , the processor 16 loads and reads the access information 22 in the data memory 20 , and determines whether the network lock of the cell phone 12 is turned on accordingly. If the status of the network lock is recorded as on in the access information 22 , the processor 16 further checks whether the subscriber identification number 26 recorded in the SIM card 24 is among the legal subscriber identification numbers recorded in the access information 22 . If the subscriber identification number 26 is recognized as a legal subscriber identification number, for example, as previously mentioned, the values of some fields of the subscriber identification number 26 are within the recorded predetermined range, the processor 16 determines the owner of the SIM card 24 is a legal subscriber of the communication network 10 , and allows the cell phone 12 to proceed with following procedures so that the user of the cell phone 12 , that is, the owner of the SIM card 24 , is able to utilize the service of the communication network 10 via the cell phone 12 . On the contrary, if the processor 16 finds the subscriber identification number 26 in the SIM card 24 is beyond the range of legal subscriber identification numbers recorded in the access information 22 , the processor 16 determines the owner of the SIM card 24 is not a legal subscriber of the communication network 10 , and prevents access by the cell phone 12 to the communication network 10 . On the other hand, if the processor 16 finds the status of the network lock stored in the access information 22 is off when proceeding with the verification, the processor 16 does not check the subscriber identification number 26 , but allows the owner of the SIM card 24 to utilize the service of the communication network 10 via the cell phone 12 directly. To sum up, the network lock of the prior art determines whether the owner of the SIM card 24 is permitted to utilize the service of the communication network 10 via the cell phone 12 according to the access information 22 stored in the data memory 20 . However, the conventional method carries the risk that the network lock be broken by illegal users. For example, when an illegal user wants to break the network lock of the cell phone 12 , the illegal user can obtain the access information of another cell phone of which the network lock is turned off. Since the network lock is off in this cell phone, the status of the network lock is stored as off in the access information. Therefore, the access information can be utilized to break the network lock. For example, even when the network lock of the cell phone 12 is recorded as on in the access information 22 , the illegal user can overwrite the original access information 22 with unsanctioned access information in the data memory 20 , replacing the original access information 22 with the unsanctioned access information. When the cell phone 12 proceeds with the verification, it follows the unsanctioned access information and does not turn on the network lock, and hence the network lock of the cell phone 12 is broken. Even in the situation that the subscriber identification number 26 on the SIM card 24 is not a legal subscriber identification number, the owner of the SIM card 24 is able to access the service of the communication network 10 via the cell phone 12 illegally. For the convenience in maintenance and testing, there are predetermined maintenance junctions in the data memory 20 of the cell phone 12 . Illegal users can take advantage of these predetermined maintenance junctions to write the breaking access information into the data memory 20 and overwrite the original access information 22 with a special data tool, such as JTAG tool, breaking the network lock of the cell phone 12 . More seriously, illegal users can rewrite the access information 22 directly. For example, one can break the network lock of the cell phone 12 by rewriting the status of the network lock in the access information 22 to off. In addition, illegal users can delete the access information 22 . Generally, in the cell phone 12 of the prior art, when the processor 16 finds that there is no access information in the data memory 20 , the processor 16 proceeds with the network lock verification according to a predetermined access information, and the network lock usually is not turned on in this predetermined access information. Therefore, the network lock of the cell phone 12 is broken by the illegal users. Once the network lock is illegally broken, operations of the communication network 10 and the rights of the service provider and the legal subscribers (the owners of legal SIM cards) are affected.
|
10754485
| 2,004
|
Methods of treating lung diseases
|
The present invention discloses compositions and methods for treating lung diseases. In preferred embodiments the methods involve administering to the subject via a pulmonary, oropharyngeal, or nasopharyngeal route a compound or composition that contains a therapeutic agent and a targeting element directed to a ligand. The ligand is preferably an epitope on pIgR receptor.
|
BACKGROUND OF THE INVENTION The following description of the background of the invention is provided simply as an aid in understanding the invention and is not admitted to describe or constitute prior art to the invention. Lung diseases comprise a spectrum of manifestations and etiologies, and may be particularly difficult to treat with systemic administration of potential therapeutics. Broad categories of disease classifications exemplify this spectrum of lung diseases. Over 150 diseases of the interstitium are recognized, including many types of fibrosis. Another category includes disorders of gas exchange and blood circulation. Disorders of the airways and disorders of the pleura constitute two additional categories. Lung cancers include both primary lung cancers and metastases from primary cancers of various other organs or tissues. Infectious diseases include viral, bacterial, and fungal infectious agents. Pulmonary administration of therapeutic compositions comprised of low molecular weight drugs has been observed, for example, beta-androgenic antagonists to treat asthma. Other therapeutic agents that are active in the lungs have been administered systemically and targeted via pulmonary absorption. However, not all low molecular weight drugs can be efficaciously administered through the lung. Moreover, pulmonary delivery of higher molecular weight therapeutics, such as polypeptides or proteins, is much more difficult. The anatomy and physiology of the lung presents several barriers to pulmonary administration. Initially, after passing through the nose or mouth, inhaled air (and any particles contained therein) moves into the respiratory tree, which is composed of numerous dichotomous branches between the trachea and the alveoli. Bronchi, bronchioles, and terminal bronchioles comprise the conducting zone. The epithelium of these conducting airways is pseudo stratified and largely ciliated. The more distal levels of branching form the transitional and respiratory zones, comprised of respiratory bronchioles, alveolar ducts, and alveoli, is where gas exchange and pulmonary absorption occur. The respiratory zone, in contrast to the conducting zone, is non-ciliated and comprised of a single cell layer. The air-blood barrier is comprised of the alveolar epithelium, the capillary endothelium, and the lymph-filled interstitial space separating these two cell layers. In the alveolar epithelium, adjacent cells overlap and are bound by non-leaky tight junctions, which, in conjunction with the non-leaky single cell layer comprising the capillary endothelium, limits the movement of fluids, cells, salts, proteins, and numerous other macromolecules from the blood and intercellular spaces into the lumen of the alveoli. Most molecules, including proteins and polypeptides, must be actively or passively transported across this barrier in the absence of lung injury. Also, mucosal secretions from epithelial cells and cilia provide additional physical barriers to the delivery of a potential therapeutic. Other cell types present in the alveolar lumen and in the interstitial space separating the alveolar epithelium from the capillary endothelium may also serve as barriers for delivery. Alveolar macrophages migrate from the blood across the air-blood barrier. Additionally, other cell types, such as neutrophils and lymphocytes, can move into the alveoli from the blood in response to infection. Immunotherapy directed to tumor-associated or tumor-specific antigens has long been considered an attractive method for safe, nontoxic treatment of tumors. Translating such methods into clinical benefit, however, has been somewhat less successful than might have been hoped. While many tumors express antigens that could be used to generate an in vitro or in vivo immune response, direct targeting of such antigens may not be the most effective mode of providing immunotherapy. Cytokines, such as interleukin-2 (“IL-2”), have also been employed to stimulate immune response to tumors. Such therapies, either alone or with conventional therapies, may provide a more attractive means for achieving clinical benefit in malignant and non-malignant diseases. See, e.g., Xu et al., Cancer Res. 60: 4475-84 (2000); Christ et al., Clinical Cancer Res. 7: 1385-97 (2001); Steven A. Rosenberg, The Transformed Cell: Unlocking the Mysteries of Cancer , Putnam Group, 1992. Experimental treatment of certain tumors with cytokines has been performed by various artisans. Cytokines, such as IL-2, have been administered systemically (e.g., by intravenous infusion and/or subcutaneous administration), with the demonstration of some antitumor response. However, serious side effects have also been observed in such treatments, including fever, pulmonary vascular leakage, weight gain, malaise, rigor, anemia, and thrombocytopenia. See, e.g., Heinzer et al., J. Clin. Oncol. 17: 3612-20 (1999). More recently, aerosol delivery of cytokines such as IL-2 have been shown to provide reduced toxicity coupled with modest therapeutic benefit. See, e.g., Lorenz et al., Clin. Cancer. Res. 2: 1115-22 (1996); Zissel et al., Cancer Immunol. Immunother. 42: 122-26 (1996); Khanna et al., J. Pharm. Pharmacol. 49: 960-71 (1997). Acute respiratory infections can affect both the upper or lower respiratory systems. An upper respiratory infection typically involves the ears, nose, throat or sinuses. Examples of upper respiratory tract infections include the common cold (typically viral); the flu (influenza virus); otitis media, pharyngitis, acute sinusitis or chronic sinusitis, and tonsillitis, which involve inflammation of the middle ear, throat, sinuses, and tonsils, respectively. Lower respiratory infections typically involve the trachea, bronchial tubes and the lungs themselves. Examples of lower respiratory tract infections include bronchitis and pneumonia. In a single infection, one or both of the upper and lower respiratory systems can be affected. Respiratory tract infections are primarily of bacterial, viral, or fungal origin; although there are also rarer types, such as parasitic infections. Pulmonary tuberculosis (TB) is an example of a contagious bacterial infection caused by Mycobacterium tuberculosis . The lungs are primarily involved, but the infection can spread to other organs. TB is one of the most clinically significant infections worldwide, with an incidence of 3 million deaths and 10 million new cases each year. With improved sanitary conditions and the advent of antimicrobial drugs, the incidence of mortality had been steadily declining. However, in most developed countries, there has been a resurgence of TB infection, in part due to immunocompromised individuals (e.g., HIV-positive) and the emergence of multidrug-resistant (MDR) strains of M. tuberculosis. Severe acute respiratory syndrome (SARS) is a newly recognized viral respiratory tract infection, first detected in China in late 2002. The viral agent has been identified as a previously unrecognized human coronavirus, called SARS-associated coronavirus (SARS-CoV). SARS is also an example of both upper and lower respiratory tract involvement caused by infection with a single organism. Early symptoms include runny nose and sore throat, which are then followed by dyspnea and dry cough, and may develop into adult respiratory distress syndrome requiring intervention with mechanical ventilation. Pneumonia is an example of a respiratory tract that may be caused by either bacteria, viruses, or parasites. It is generally defined as an inflammation of the lung tissue, whereby white cells in the lungs prevent the alveoli from functioning properly. This condition is potentially life-threatening. Candida and Aspergillus are the most common fungal respiratory tract infections, tending to appear in immunocompromised subjects, such as transplant recipients. While Candida mainly infests the upper tracheobronchial tree with only an occasional chance of dissemination, Aspergillus has the potential to involve the deeper parenchyma. Other potential fungal pathogens include Cryptococcus, Pseudallerscheria and Coccidioides. Experimental treatment of certain infections with cytokines has also been performed by various artisans. Cytokines have been used to treat serious bacterial and viral infections (particularly, those caused by drug resistant organisms), either alone or in combination therapies with known treatments or vaccines. For a review of immune modulation in the treatment of respiratory infection, the reader is referred to Kolls and Nelson, Resp. Res. 1:9-11, 2000. For example, tuberculosis, the seventh leading cause or morbidity and mortality in the world, has been successfully treated with recombinant interferon-γ in aerosol form (Condos et al., Lancet 349:1513-5, 1997). As another example, intranasal interferon-α 2b has been shown to prevent rhinovirus infection, and to lessen symptoms associated with parainfluenza infections (Monto et al., J. Infect. Dis. 154:128-133, 1986). Other examples of therapeutic molecules for the treatment of infections include chemokines such as gamma-interferon-inducible protein 10 (IP-10), interferon-inducible T cell alpha chemoattractant (I-TAC) and MIG (monokine induced by interferon-gamma). Antibodies directed against a variety of epitopes of infectious agents causing infection are also known in the art, for both treatment and prevention (e.g., vaccines) of infection. To achieve maximum therapeutic impact in the treatment of any lung disease, potential therapeutic agents should be optimally directly delivered to the respiratory tract. A number of general methods have been described for delivering medically important molecules, including small molecules, nucleic acids, and/or protein or peptide compositions, in an effort to improve bioavailability and/or to target delivery to particular locations within the body. Such methods include the use of prodrugs, encapsulation into liposomes or other particles, co-administration in uptake enhancing formulations, and targeting to specific tissues. For review see, e.g., Critical Reviews in Therapeutic Drug Carrier Systems , Stephen D. Bruck, ed., CRC Press, 1991. In the case of cytokines such as IL-2, pulmonary delivery has relied upon both inhalation of free cytokine (either alone or in combination with intravenous delivery of additional cytokine), and inhalation of liposomal formulations. See, e.g., Enk et al., Cancer 88: 2042-46 (2000); Khanna et al., J. Pharm. Pharmacol. 49: 960-71 (1997). Such delivery modes can provide high cytokine levels within the lung, but relatively modest systemic cytokine levels. Certain modes for delivering medically important molecules (e.g., oral, nasopharyngeal, oropharyngeal, pulmonary, buccal, sublingual, mucosal, vaginal, or rectal delivery modes) require that the molecule(s) of interest be delivered across “polarized” cells (e.g., epithelial cells) that have two distinct surfaces. In the case of pulmonary epithelium, these surfaces are referred to as the apical surface, which is exposed to the aqueous or gaseous medium in which the molecule(s) of interest is delivered to the subject; and the opposing basolateral (also known as basal lateral) side that rests upon and is supported by an underlying basement membrane, and that can provide access to the interstitial spaces and the general circulation. Tight junctions between adjacent epithelial cells separate the apical and basolateral sides of an individual epithelial cell. The biological methods that provide and maintain such cellular polarity can also act to limit bioavailability of molecules delivered by these modes. Molecules are trafficked into, out of, and within a cell by various means, and it is typically these means that are believed to confer bioavailability to a molecule delivered by oral, nasopharyngeal, oropharyngeal, pulmonary, buccal, sublingual, mucosal, vaginal, or rectal delivery modes. “Active transport” is a general term for the energy-dependent carriage of substances across a cell membrane. “Endocytosis” is a general term for the process of cellular internalization of molecules, i.e., processes in which cells take in molecules from their environment, either passively or actively. “Exocytosis” is a general term for processes in which molecules are passively or actively moved from the interior of a cell into the medium surrounding the cell. “Transcytosis” is a general term for processes in which molecules are transported from one surface of a cell to another. “Paracytosis” is a general term for processes in which molecules are transferred through the interstices between cells, often past tight junctions. “Receptor mediated endocytosis” refers to a particular type of trafficking event by which cells internalize molecules, viruses, bacteria, etc. As its name implies, it depends on the interaction of that molecule with a specific binding protein in the cell membrane called a “receptor.” “Forward transport” refers to transport in a basolateral to apical direction, while “reverse transport” refers to transport in an apical to basolateral direction. Each publication and patent application in the foregoing Background section is hereby incorporated by reference in its entirety, including all tables, figures, and claims.
|
Title:
Methods of treating lung diseases
Abstract:
The present invention discloses compositions and methods for treating lung diseases. In preferred embodiments the methods involve administering to the subject via a pulmonary, oropharyngeal, or nasopharyngeal route a compound or composition that contains a therapeutic agent and a targeting element directed to a ligand. The ligand is preferably an epitope on pIgR receptor.
Background:
BACKGROUND OF THE INVENTION The following description of the background of the invention is provided simply as an aid in understanding the invention and is not admitted to describe or constitute prior art to the invention. Lung diseases comprise a spectrum of manifestations and etiologies, and may be particularly difficult to treat with systemic administration of potential therapeutics. Broad categories of disease classifications exemplify this spectrum of lung diseases. Over 150 diseases of the interstitium are recognized, including many types of fibrosis. Another category includes disorders of gas exchange and blood circulation. Disorders of the airways and disorders of the pleura constitute two additional categories. Lung cancers include both primary lung cancers and metastases from primary cancers of various other organs or tissues. Infectious diseases include viral, bacterial, and fungal infectious agents. Pulmonary administration of therapeutic compositions comprised of low molecular weight drugs has been observed, for example, beta-androgenic antagonists to treat asthma. Other therapeutic agents that are active in the lungs have been administered systemically and targeted via pulmonary absorption. However, not all low molecular weight drugs can be efficaciously administered through the lung. Moreover, pulmonary delivery of higher molecular weight therapeutics, such as polypeptides or proteins, is much more difficult. The anatomy and physiology of the lung presents several barriers to pulmonary administration. Initially, after passing through the nose or mouth, inhaled air (and any particles contained therein) moves into the respiratory tree, which is composed of numerous dichotomous branches between the trachea and the alveoli. Bronchi, bronchioles, and terminal bronchioles comprise the conducting zone. The epithelium of these conducting airways is pseudo stratified and largely ciliated. The more distal levels of branching form the transitional and respiratory zones, comprised of respiratory bronchioles, alveolar ducts, and alveoli, is where gas exchange and pulmonary absorption occur. The respiratory zone, in contrast to the conducting zone, is non-ciliated and comprised of a single cell layer. The air-blood barrier is comprised of the alveolar epithelium, the capillary endothelium, and the lymph-filled interstitial space separating these two cell layers. In the alveolar epithelium, adjacent cells overlap and are bound by non-leaky tight junctions, which, in conjunction with the non-leaky single cell layer comprising the capillary endothelium, limits the movement of fluids, cells, salts, proteins, and numerous other macromolecules from the blood and intercellular spaces into the lumen of the alveoli. Most molecules, including proteins and polypeptides, must be actively or passively transported across this barrier in the absence of lung injury. Also, mucosal secretions from epithelial cells and cilia provide additional physical barriers to the delivery of a potential therapeutic. Other cell types present in the alveolar lumen and in the interstitial space separating the alveolar epithelium from the capillary endothelium may also serve as barriers for delivery. Alveolar macrophages migrate from the blood across the air-blood barrier. Additionally, other cell types, such as neutrophils and lymphocytes, can move into the alveoli from the blood in response to infection. Immunotherapy directed to tumor-associated or tumor-specific antigens has long been considered an attractive method for safe, nontoxic treatment of tumors. Translating such methods into clinical benefit, however, has been somewhat less successful than might have been hoped. While many tumors express antigens that could be used to generate an in vitro or in vivo immune response, direct targeting of such antigens may not be the most effective mode of providing immunotherapy. Cytokines, such as interleukin-2 (“IL-2”), have also been employed to stimulate immune response to tumors. Such therapies, either alone or with conventional therapies, may provide a more attractive means for achieving clinical benefit in malignant and non-malignant diseases. See, e.g., Xu et al., Cancer Res. 60: 4475-84 (2000); Christ et al., Clinical Cancer Res. 7: 1385-97 (2001); Steven A. Rosenberg, The Transformed Cell: Unlocking the Mysteries of Cancer , Putnam Group, 1992. Experimental treatment of certain tumors with cytokines has been performed by various artisans. Cytokines, such as IL-2, have been administered systemically (e.g., by intravenous infusion and/or subcutaneous administration), with the demonstration of some antitumor response. However, serious side effects have also been observed in such treatments, including fever, pulmonary vascular leakage, weight gain, malaise, rigor, anemia, and thrombocytopenia. See, e.g., Heinzer et al., J. Clin. Oncol. 17: 3612-20 (1999). More recently, aerosol delivery of cytokines such as IL-2 have been shown to provide reduced toxicity coupled with modest therapeutic benefit. See, e.g., Lorenz et al., Clin. Cancer. Res. 2: 1115-22 (1996); Zissel et al., Cancer Immunol. Immunother. 42: 122-26 (1996); Khanna et al., J. Pharm. Pharmacol. 49: 960-71 (1997). Acute respiratory infections can affect both the upper or lower respiratory systems. An upper respiratory infection typically involves the ears, nose, throat or sinuses. Examples of upper respiratory tract infections include the common cold (typically viral); the flu (influenza virus); otitis media, pharyngitis, acute sinusitis or chronic sinusitis, and tonsillitis, which involve inflammation of the middle ear, throat, sinuses, and tonsils, respectively. Lower respiratory infections typically involve the trachea, bronchial tubes and the lungs themselves. Examples of lower respiratory tract infections include bronchitis and pneumonia. In a single infection, one or both of the upper and lower respiratory systems can be affected. Respiratory tract infections are primarily of bacterial, viral, or fungal origin; although there are also rarer types, such as parasitic infections. Pulmonary tuberculosis (TB) is an example of a contagious bacterial infection caused by Mycobacterium tuberculosis . The lungs are primarily involved, but the infection can spread to other organs. TB is one of the most clinically significant infections worldwide, with an incidence of 3 million deaths and 10 million new cases each year. With improved sanitary conditions and the advent of antimicrobial drugs, the incidence of mortality had been steadily declining. However, in most developed countries, there has been a resurgence of TB infection, in part due to immunocompromised individuals (e.g., HIV-positive) and the emergence of multidrug-resistant (MDR) strains of M. tuberculosis. Severe acute respiratory syndrome (SARS) is a newly recognized viral respiratory tract infection, first detected in China in late 2002. The viral agent has been identified as a previously unrecognized human coronavirus, called SARS-associated coronavirus (SARS-CoV). SARS is also an example of both upper and lower respiratory tract involvement caused by infection with a single organism. Early symptoms include runny nose and sore throat, which are then followed by dyspnea and dry cough, and may develop into adult respiratory distress syndrome requiring intervention with mechanical ventilation. Pneumonia is an example of a respiratory tract that may be caused by either bacteria, viruses, or parasites. It is generally defined as an inflammation of the lung tissue, whereby white cells in the lungs prevent the alveoli from functioning properly. This condition is potentially life-threatening. Candida and Aspergillus are the most common fungal respiratory tract infections, tending to appear in immunocompromised subjects, such as transplant recipients. While Candida mainly infests the upper tracheobronchial tree with only an occasional chance of dissemination, Aspergillus has the potential to involve the deeper parenchyma. Other potential fungal pathogens include Cryptococcus, Pseudallerscheria and Coccidioides. Experimental treatment of certain infections with cytokines has also been performed by various artisans. Cytokines have been used to treat serious bacterial and viral infections (particularly, those caused by drug resistant organisms), either alone or in combination therapies with known treatments or vaccines. For a review of immune modulation in the treatment of respiratory infection, the reader is referred to Kolls and Nelson, Resp. Res. 1:9-11, 2000. For example, tuberculosis, the seventh leading cause or morbidity and mortality in the world, has been successfully treated with recombinant interferon-γ in aerosol form (Condos et al., Lancet 349:1513-5, 1997). As another example, intranasal interferon-α 2b has been shown to prevent rhinovirus infection, and to lessen symptoms associated with parainfluenza infections (Monto et al., J. Infect. Dis. 154:128-133, 1986). Other examples of therapeutic molecules for the treatment of infections include chemokines such as gamma-interferon-inducible protein 10 (IP-10), interferon-inducible T cell alpha chemoattractant (I-TAC) and MIG (monokine induced by interferon-gamma). Antibodies directed against a variety of epitopes of infectious agents causing infection are also known in the art, for both treatment and prevention (e.g., vaccines) of infection. To achieve maximum therapeutic impact in the treatment of any lung disease, potential therapeutic agents should be optimally directly delivered to the respiratory tract. A number of general methods have been described for delivering medically important molecules, including small molecules, nucleic acids, and/or protein or peptide compositions, in an effort to improve bioavailability and/or to target delivery to particular locations within the body. Such methods include the use of prodrugs, encapsulation into liposomes or other particles, co-administration in uptake enhancing formulations, and targeting to specific tissues. For review see, e.g., Critical Reviews in Therapeutic Drug Carrier Systems , Stephen D. Bruck, ed., CRC Press, 1991. In the case of cytokines such as IL-2, pulmonary delivery has relied upon both inhalation of free cytokine (either alone or in combination with intravenous delivery of additional cytokine), and inhalation of liposomal formulations. See, e.g., Enk et al., Cancer 88: 2042-46 (2000); Khanna et al., J. Pharm. Pharmacol. 49: 960-71 (1997). Such delivery modes can provide high cytokine levels within the lung, but relatively modest systemic cytokine levels. Certain modes for delivering medically important molecules (e.g., oral, nasopharyngeal, oropharyngeal, pulmonary, buccal, sublingual, mucosal, vaginal, or rectal delivery modes) require that the molecule(s) of interest be delivered across “polarized” cells (e.g., epithelial cells) that have two distinct surfaces. In the case of pulmonary epithelium, these surfaces are referred to as the apical surface, which is exposed to the aqueous or gaseous medium in which the molecule(s) of interest is delivered to the subject; and the opposing basolateral (also known as basal lateral) side that rests upon and is supported by an underlying basement membrane, and that can provide access to the interstitial spaces and the general circulation. Tight junctions between adjacent epithelial cells separate the apical and basolateral sides of an individual epithelial cell. The biological methods that provide and maintain such cellular polarity can also act to limit bioavailability of molecules delivered by these modes. Molecules are trafficked into, out of, and within a cell by various means, and it is typically these means that are believed to confer bioavailability to a molecule delivered by oral, nasopharyngeal, oropharyngeal, pulmonary, buccal, sublingual, mucosal, vaginal, or rectal delivery modes. “Active transport” is a general term for the energy-dependent carriage of substances across a cell membrane. “Endocytosis” is a general term for the process of cellular internalization of molecules, i.e., processes in which cells take in molecules from their environment, either passively or actively. “Exocytosis” is a general term for processes in which molecules are passively or actively moved from the interior of a cell into the medium surrounding the cell. “Transcytosis” is a general term for processes in which molecules are transported from one surface of a cell to another. “Paracytosis” is a general term for processes in which molecules are transferred through the interstices between cells, often past tight junctions. “Receptor mediated endocytosis” refers to a particular type of trafficking event by which cells internalize molecules, viruses, bacteria, etc. As its name implies, it depends on the interaction of that molecule with a specific binding protein in the cell membrane called a “receptor.” “Forward transport” refers to transport in a basolateral to apical direction, while “reverse transport” refers to transport in an apical to basolateral direction. Each publication and patent application in the foregoing Background section is hereby incorporated by reference in its entirety, including all tables, figures, and claims.
|
10486503
| 2,004
|
Pteridinone derivatives as modulators of chemokine receptor activity
|
The invention provides certain pteridinone compounds of formula (I), processes and intermediates used in their preparation, pharmaceutical compositions containing them and their use in therapy.
|
Title:
Pteridinone derivatives as modulators of chemokine receptor activity
Abstract:
The invention provides certain pteridinone compounds of formula (I), processes and intermediates used in their preparation, pharmaceutical compositions containing them and their use in therapy.
Background:
|
|
10968848
| 2,004
|
Multigene profiling in the kidney to tailor drug therapy
|
Provided are compositions, transgenic animals and methods for screening and analyzing drugs for toxicity and clearance. Such methods include creating a transgenic animal that lacks expression of two or more slc22 family member—organic ion transporters. Further disclosed are methods useful in determining a subjects sensitivity and a drugs efficacy based upon single nucleotide length polymorphisms in organic ion transport genes.
|
BACKGROUND Multiple drug transporters are present in various organs of the body including the kidney, the intestinal epithelium, the brain microvessel endothelium, and the liver. Humans are highly variable in their ability to metabolize and excrete drugs. This variability underlies a great deal of morbidity and mortality as standardized doses of medications can produce drug levels that range from sub-therapeutic to toxic. Organic anion and cation transporters (OATs and OCTs, respectively) a family of transmembrane proteins largely expressed in excretory organs such as kidney and liver are a major component of the human xenobiotic excretion machinery. These proteins interact with many commonly used drugs including antibiotics, anti-hypertensives, and anti-inflammatories among others. As such it is probable that variations in either the coding or regulatory sequences of OAT and OCT genes contribute significantly to differences in drug-handling capability. Delineation of the genomic structure and critical cis-regulatory elements of these genes will be an essential step in correlating such variations with clinical phenotypes.
|
Title:
Multigene profiling in the kidney to tailor drug therapy
Abstract:
Provided are compositions, transgenic animals and methods for screening and analyzing drugs for toxicity and clearance. Such methods include creating a transgenic animal that lacks expression of two or more slc22 family member—organic ion transporters. Further disclosed are methods useful in determining a subjects sensitivity and a drugs efficacy based upon single nucleotide length polymorphisms in organic ion transport genes.
Background:
BACKGROUND Multiple drug transporters are present in various organs of the body including the kidney, the intestinal epithelium, the brain microvessel endothelium, and the liver. Humans are highly variable in their ability to metabolize and excrete drugs. This variability underlies a great deal of morbidity and mortality as standardized doses of medications can produce drug levels that range from sub-therapeutic to toxic. Organic anion and cation transporters (OATs and OCTs, respectively) a family of transmembrane proteins largely expressed in excretory organs such as kidney and liver are a major component of the human xenobiotic excretion machinery. These proteins interact with many commonly used drugs including antibiotics, anti-hypertensives, and anti-inflammatories among others. As such it is probable that variations in either the coding or regulatory sequences of OAT and OCT genes contribute significantly to differences in drug-handling capability. Delineation of the genomic structure and critical cis-regulatory elements of these genes will be an essential step in correlating such variations with clinical phenotypes.
|
10889967
| 2,004
|
Dual beam system
|
A dual beam system includes an ion beam system and a scanning electron microscope with a magnetic objective lens. The ion beam system is adapted to operate optimally in the presence of the magnetic field from the SEM objective lens, so that the objective lens is not turned off during operation of the ion beam. An optional secondary particle detector and an optional charge neutralization flood gun are adapted to operate in the presence of the magnetic field. The magnetic objective lens is designed to have a constant heat signature, regardless of the strength of magnetic field being produced, so that the system does not need time to stabilize when the magnetic field is changed.
|
BACKGROUND OF THE INVENTION Charged particle beam systems are used in a variety of applications, including the manufacturing, repair, and inspection of miniature devices, such as integrated circuits, magnetic recording heads, and photolithography masks. Dual beam systems often include a scanning electron microscope (SEM) that can provide a high-resolution image with minimal damage to the target, and an ion beam system, such as a focused or shaped beam system, that can be used to alter substrates and to form images. One common application for a dual beam system is to expose a buried portion of a substrate and then to form an image of the exposed surface. For example, a focused or shaped ion beam can be used to make a vertical cut in a substrate to expose a cross sectional surface, and then an electron beam can be scanned over the newly exposed surface to form an image of it. One difficulty with such systems is that the final lens of the scanning electron microscope produces a magnetic field, which alters the trajectory of the ion beam and also interferes with various other functions of the dual beam system. For example, an image or information about the composition of the substrate can be obtained by collecting secondary particles ejected as the primary ion beam strikes target. The magnetic field of the SEM, however, changes the path of the secondary particles and makes them difficult to collect. When a work piece in a charged particle beam system is composed of an insulating material, such as quartz, the work piece tends to accumulate electrical charge that adversely affects the primary beams and secondary particles. One method of neutralizing the change entails the use of an electron flood gun that directs electrons to the work piece to neutralize positive charge. An electron flood gun differs from an electron microscope in that the flood gun lack precise optics options and produces a relatively broad beam of low energy electrons. The magnetic field of the SEM changes the path of the neutralizing electrons from the flood gun and makes it difficult to direct them accurately toward the work piece. A common solution to this problem of the magnetic field interference is to turn off the SEM when using the ion beam or when using certain functions of the ion beam system. For example, the SEM can be switched off to allow collection of the ion beam induced secondary particles or when using a charge neutralization flood gun. Turning the SEM lens on and off creates its own set of problems. The magnetic objective lens of an SEM uses a significant electrical current and therefore generates a significant amount of heat, the heat being proportional to the square of the current. The heat dissipated by an SEM causes components of the dual beam system to expand. The resolution of an SEM, being on the order of magnitude of nanometers requires a very stable physical platform, and the system therefore requires a significant amount of time after being turned on to reach thermal equilibrium and become stable. As the resolution of systems has increased, stability has become more important, and longer waits are required. Charged particle beam systems were originally used only in laboratories to analyze samples, and the time to reach thermal equilibrium was acceptable. Systems are now being used as production equipment and such delays are unacceptable. U.S. Pat. No. 4,345,152 for a “Magnetic Lens” describes an electron lens that uses two coils having equal numbers of turns wound in opposite directions. By altering the allocation of current between the two coils, the magnetic field could be adjusted to focus the electron beam while maintaining a constant total current, and therefore a constant heat output. Using two lenses of equal turns allows the magnetic field to be varied or even cancelled without changing the total electrical current in the lens. Thus, the magnetic field could be eliminated without changing the heat output of the lens. The surface viewed by the SEM is often oriented at a non-perpendicular angle to the SEM axis, so one part of the work piece is closer to the lens than another part. To compensate for the difference in distance, some SEMs change the focus of the objective lens during the scan and can therefore produce a clearer image. This is often referred to as “dynamic focusing.” Dynamic focusing requires the ability to rapidly change the magnetic field, which requires rapidly changing the electrical current in the objective lens coils. The coil inductance, which is related to the number of turns of the coil, resists a current change. The two equal coils in U.S. Pat. No. 4,345,152 have high inductance and cannot be changed rapidly. It is also known to use a separate, small lens for dynamic focusing. Such lenses have low inductance, but changing the lens current changes the power dissipation of the lens, which can upset the thermal equilibrium of the system, thereby reducing resolution. If one designed a dual beam system to compensate for the effects of a constant magnetic field from the SEM objective lens, the problem would not be solved completely, because the magnetic field is not constant. To keep the SEM in focus, the magnetic field of the objective lens is changed depending upon the height of the work piece, the magnification, and the electron energy. In some system, it is possible to reduce the operating variation in the magnetic field by using “retarding field optics,” that is, changing the voltage of the work piece to change the focus of the electron beam, rather than changing the magnetic field in the objective lens. In many dual beam systems, the FIB is mounted vertically and the SEM is mounted at an angle to view to vertical cross section cut by the FIB. A system in which the SEM is tilted cannot easily use retarding field options, since the tilt eliminates the symmetry of the retarding electric field and causes undesirable aberrations in the primary electron beam and difficulty in the collection of secondary electrons.
|
Title:
Dual beam system
Abstract:
A dual beam system includes an ion beam system and a scanning electron microscope with a magnetic objective lens. The ion beam system is adapted to operate optimally in the presence of the magnetic field from the SEM objective lens, so that the objective lens is not turned off during operation of the ion beam. An optional secondary particle detector and an optional charge neutralization flood gun are adapted to operate in the presence of the magnetic field. The magnetic objective lens is designed to have a constant heat signature, regardless of the strength of magnetic field being produced, so that the system does not need time to stabilize when the magnetic field is changed.
Background:
BACKGROUND OF THE INVENTION Charged particle beam systems are used in a variety of applications, including the manufacturing, repair, and inspection of miniature devices, such as integrated circuits, magnetic recording heads, and photolithography masks. Dual beam systems often include a scanning electron microscope (SEM) that can provide a high-resolution image with minimal damage to the target, and an ion beam system, such as a focused or shaped beam system, that can be used to alter substrates and to form images. One common application for a dual beam system is to expose a buried portion of a substrate and then to form an image of the exposed surface. For example, a focused or shaped ion beam can be used to make a vertical cut in a substrate to expose a cross sectional surface, and then an electron beam can be scanned over the newly exposed surface to form an image of it. One difficulty with such systems is that the final lens of the scanning electron microscope produces a magnetic field, which alters the trajectory of the ion beam and also interferes with various other functions of the dual beam system. For example, an image or information about the composition of the substrate can be obtained by collecting secondary particles ejected as the primary ion beam strikes target. The magnetic field of the SEM, however, changes the path of the secondary particles and makes them difficult to collect. When a work piece in a charged particle beam system is composed of an insulating material, such as quartz, the work piece tends to accumulate electrical charge that adversely affects the primary beams and secondary particles. One method of neutralizing the change entails the use of an electron flood gun that directs electrons to the work piece to neutralize positive charge. An electron flood gun differs from an electron microscope in that the flood gun lack precise optics options and produces a relatively broad beam of low energy electrons. The magnetic field of the SEM changes the path of the neutralizing electrons from the flood gun and makes it difficult to direct them accurately toward the work piece. A common solution to this problem of the magnetic field interference is to turn off the SEM when using the ion beam or when using certain functions of the ion beam system. For example, the SEM can be switched off to allow collection of the ion beam induced secondary particles or when using a charge neutralization flood gun. Turning the SEM lens on and off creates its own set of problems. The magnetic objective lens of an SEM uses a significant electrical current and therefore generates a significant amount of heat, the heat being proportional to the square of the current. The heat dissipated by an SEM causes components of the dual beam system to expand. The resolution of an SEM, being on the order of magnitude of nanometers requires a very stable physical platform, and the system therefore requires a significant amount of time after being turned on to reach thermal equilibrium and become stable. As the resolution of systems has increased, stability has become more important, and longer waits are required. Charged particle beam systems were originally used only in laboratories to analyze samples, and the time to reach thermal equilibrium was acceptable. Systems are now being used as production equipment and such delays are unacceptable. U.S. Pat. No. 4,345,152 for a “Magnetic Lens” describes an electron lens that uses two coils having equal numbers of turns wound in opposite directions. By altering the allocation of current between the two coils, the magnetic field could be adjusted to focus the electron beam while maintaining a constant total current, and therefore a constant heat output. Using two lenses of equal turns allows the magnetic field to be varied or even cancelled without changing the total electrical current in the lens. Thus, the magnetic field could be eliminated without changing the heat output of the lens. The surface viewed by the SEM is often oriented at a non-perpendicular angle to the SEM axis, so one part of the work piece is closer to the lens than another part. To compensate for the difference in distance, some SEMs change the focus of the objective lens during the scan and can therefore produce a clearer image. This is often referred to as “dynamic focusing.” Dynamic focusing requires the ability to rapidly change the magnetic field, which requires rapidly changing the electrical current in the objective lens coils. The coil inductance, which is related to the number of turns of the coil, resists a current change. The two equal coils in U.S. Pat. No. 4,345,152 have high inductance and cannot be changed rapidly. It is also known to use a separate, small lens for dynamic focusing. Such lenses have low inductance, but changing the lens current changes the power dissipation of the lens, which can upset the thermal equilibrium of the system, thereby reducing resolution. If one designed a dual beam system to compensate for the effects of a constant magnetic field from the SEM objective lens, the problem would not be solved completely, because the magnetic field is not constant. To keep the SEM in focus, the magnetic field of the objective lens is changed depending upon the height of the work piece, the magnification, and the electron energy. In some system, it is possible to reduce the operating variation in the magnetic field by using “retarding field optics,” that is, changing the voltage of the work piece to change the focus of the electron beam, rather than changing the magnetic field in the objective lens. In many dual beam systems, the FIB is mounted vertically and the SEM is mounted at an angle to view to vertical cross section cut by the FIB. A system in which the SEM is tilted cannot easily use retarding field options, since the tilt eliminates the symmetry of the retarding electric field and causes undesirable aberrations in the primary electron beam and difficulty in the collection of secondary electrons.
|
11019802
| 2,004
|
Dynamic document icons
|
A method and apparatus is disclosed herein for generating visualizations (e.g., icons) suitable for a specific display. In one embodiment, the method comprises selecting a group of document images having similar layout features suitable for visualization or a specific display from the plurality of document images based on layout analysis information corresponding to the plurality of document images, and creating a plurality of visualizations to visualize document layout information for a group of document images based on one or more display device characteristics and based on content of the group of documents.
|
BACKGROUND OF THE INVENTION With ever increasing amounts of digital documents the challenges for retrieval algorithms become bigger and effective solutions more and more important. The field of document retrieval is widely researched with a main focus on extracting and evaluating text in documents. Document retrieval techniques can be categorized as text-based and image-based retrieval techniques. Depending on which technique is used, the results are presented to the user using text and images, accordingly. For example, in content-based image retrieval (CBIR) application search results may be displayed as images since no text information is available. On the other hand, often document retrieval results are given in text form only, since text analysis (e.g., OCR) was the only analysis performed on the document image. Thumbnails have been used in addition to text for representing retrieval results. The search algorithms used for retrieval are based on text features only, whereas the thumbnail images are just displayed as “some additional information” without any direct linkage to the text results, with the exception that they represent the same document. Xerox' enhanced thumbnails are created pasting keywords found in HTML pages into the corresponding locations in the thumbnails. Besides displaying a list of retrieved text results, text-based retrieval techniques may also display the structure of all or part of the underlying feature space derived from the document data base. The resulting images are visualizations of high-dimensional data, i.e. points in the feature space. Several methods exist to transform high-dimensional data into low-dimensional (2-dim.) data plots that can be displayed as an image. Example methods are dendrograms or multidimensional scaling techniques. Visualizations of document clusters using dendrograms are known in the art. For example, see van Liere, R., de Leeuw, W., Waas, F., “Interactive Visualization of Multidimensional Feature Spaces,” in Proc. of Workshop on New Paradigms for Information Visualization, Washington D.C., November 2000. Multidimensional scaling (MDS) has been used in the prior art as well. For example, see Leouski, A., Allan, J., “Visual Interactions with a Multidimensional Ranked List,” Proc. of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 353-354, 1998. An approach referred to as the Data Mountain approach allows the user to define his own spatial arrangement of thumbnails in a simulated 3-D environment. For more information, see Robertson, G., Czerwinski, M., Larson, K., Robbins, D., Thiel, D. & van Dantzich, M., “Data Mountain: Using spatial memory for document management,” In Proceedings of UIST '98, 11th Annual Symposium on User Interface Software and Technology, pp. 153-162, 1998. Text-only visualization of text-based retrieval results is performed by the software RetrievalWare from the company Convera, http://www.convera.com/Products/rw_categorization.asp. Given a list of text-based retrieval results, Convera provides the user with an automatic categorization of the retrieval results displayed in form of a limited number of folders with labels containing a characteristic word or phrase of a category. Convera calls the algorithmic technique dynamic classification. Results of the classification are visualized as folder images with attached text labels. Use of text features in document retrieval, searching and browsing, is widely employed, whereas visual features are not commonly used. Besides simple listings of text results, visualizations of retrieval results published in the prior art consist either of traditional document thumbnails or of visualizations of the high-dimensional feature space, applying, e.g., dendrograms or multidimensional scaling techniques (see van Liere, R., de Leeuw, W., Waas, F., “Interactive Visualization of Multidimensional Feature Spaces,” in Proc. of Workshop on New Paradigms for Information Visualization, Washington D.C., November 2000). In the case of thumbnail visualizations, the algorithms used for thumbnail creation typically just downsample individual images. There is no explicit control over what features the user will recognize in the individual thumbnails, what information is lost, or what information is conveyed through a collection of thumbnails. An exception is the SmartNail technology that creates thumbnail-like images with focus on showing readable text and recognizable image portions. With the SmartNail technology, the thumbnail visualization is derived from information of a single image only and is not linked to any specific query-driven retrieval results. However, the current SmartNail technology computes image representations for individual images, not for document collections, with no knowledge on query information. For more information on SmartNails, see U.S. patent application Ser. No. 10/435,300, entitled “Resolution Sensitive Layout of Document Regions,” filed May 9, 2003, published Jul. 29, 2004 (Publication No. 20040145593). In the case of high-dimensional data visualization, the user is confronted with an abstract representation of potential features without any association to the document image. MDS and dendrogram visualizations do not convey information on the document image, only arrangements of extracted features. The Data Mountain approach uses conventional thumbnails arranged by the user following personal preferences. For a different user, the structure is not meaningful. Since screen area is often very limited, it is not possible to show visualizations for each individual document on the screen. Therefore, it is natural to group documents that have similar features and associate each group with a label. This grouping, or clustering, is a common technique in retrieval applications. Clustering of retrieval results, in contrast to clustering the entire data set without having a query, is referred to herein as post-retrieval clustering. See, Park, G., Baek, Y., Lee, H.-K., “Re-ranking algorithm using post-retrieval clustering for content-based image retrieval,” Information Processing and Management, vol. 41, no. 2, pp. 177-194, 2005 Clusters are typically created with respect to text features. Cluster labels are typically text descriptions of the common cluster content. Clustering may be performed in other ways. In one exemplary document system textures are used to categorize and cluster documents in order to support query-by-example. Textures, describing document layout, are query inputs by the user. In one embodiment, the system uses a clustering algorithm to respond with returning documents matching the user-described document layout. Clustering algorithms (e.g., K-means or Sum-of-Square-Errors) may be employed to group documents with respect to traditional document features. These algorithms may return a set of cluster prototypes, visualized as icons, one of which can be used to perform a further query. For more information, see U.S. Pat. No. 5,933,823, entitled “Image Database Browsing and Query Using Texture Analysis,” issued Aug. 3, 1999. In general, clustering techniques can be split into bottom-up and top-down techniques. The bottom-up, or agglomerative, techniques begin by treating each data point as its own cluster and then performing the merger of clusters on the way up to the top. The top-down, or divisive, techniques begin with all data being one cluster and then gradually breaking this cluster down into smaller and smaller clusters. For more information on devisive techniques, see, Duda, R. O., Hart, P. E., “Pattern Classification and Scene Analysis,” Wiley, N.Y., 1973. Another characterization of clustering techniques is monothetic vs. polythetic. In a monothetic approach, cluster membership is based on the presence or absence of a single feature. Polythetic approaches use more than one feature. See, Kummamuru, K., et al., “A Hierarchical Monlothetic Document Clustering Algorithm for Summarization and Browsing Search Results,” Proceedings of the 13th international conference on World Wide Web, New York, N.Y., USA, pp. 658 -665p, 2004.
|
Title:
Dynamic document icons
Abstract:
A method and apparatus is disclosed herein for generating visualizations (e.g., icons) suitable for a specific display. In one embodiment, the method comprises selecting a group of document images having similar layout features suitable for visualization or a specific display from the plurality of document images based on layout analysis information corresponding to the plurality of document images, and creating a plurality of visualizations to visualize document layout information for a group of document images based on one or more display device characteristics and based on content of the group of documents.
Background:
BACKGROUND OF THE INVENTION With ever increasing amounts of digital documents the challenges for retrieval algorithms become bigger and effective solutions more and more important. The field of document retrieval is widely researched with a main focus on extracting and evaluating text in documents. Document retrieval techniques can be categorized as text-based and image-based retrieval techniques. Depending on which technique is used, the results are presented to the user using text and images, accordingly. For example, in content-based image retrieval (CBIR) application search results may be displayed as images since no text information is available. On the other hand, often document retrieval results are given in text form only, since text analysis (e.g., OCR) was the only analysis performed on the document image. Thumbnails have been used in addition to text for representing retrieval results. The search algorithms used for retrieval are based on text features only, whereas the thumbnail images are just displayed as “some additional information” without any direct linkage to the text results, with the exception that they represent the same document. Xerox' enhanced thumbnails are created pasting keywords found in HTML pages into the corresponding locations in the thumbnails. Besides displaying a list of retrieved text results, text-based retrieval techniques may also display the structure of all or part of the underlying feature space derived from the document data base. The resulting images are visualizations of high-dimensional data, i.e. points in the feature space. Several methods exist to transform high-dimensional data into low-dimensional (2-dim.) data plots that can be displayed as an image. Example methods are dendrograms or multidimensional scaling techniques. Visualizations of document clusters using dendrograms are known in the art. For example, see van Liere, R., de Leeuw, W., Waas, F., “Interactive Visualization of Multidimensional Feature Spaces,” in Proc. of Workshop on New Paradigms for Information Visualization, Washington D.C., November 2000. Multidimensional scaling (MDS) has been used in the prior art as well. For example, see Leouski, A., Allan, J., “Visual Interactions with a Multidimensional Ranked List,” Proc. of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 353-354, 1998. An approach referred to as the Data Mountain approach allows the user to define his own spatial arrangement of thumbnails in a simulated 3-D environment. For more information, see Robertson, G., Czerwinski, M., Larson, K., Robbins, D., Thiel, D. & van Dantzich, M., “Data Mountain: Using spatial memory for document management,” In Proceedings of UIST '98, 11th Annual Symposium on User Interface Software and Technology, pp. 153-162, 1998. Text-only visualization of text-based retrieval results is performed by the software RetrievalWare from the company Convera, http://www.convera.com/Products/rw_categorization.asp. Given a list of text-based retrieval results, Convera provides the user with an automatic categorization of the retrieval results displayed in form of a limited number of folders with labels containing a characteristic word or phrase of a category. Convera calls the algorithmic technique dynamic classification. Results of the classification are visualized as folder images with attached text labels. Use of text features in document retrieval, searching and browsing, is widely employed, whereas visual features are not commonly used. Besides simple listings of text results, visualizations of retrieval results published in the prior art consist either of traditional document thumbnails or of visualizations of the high-dimensional feature space, applying, e.g., dendrograms or multidimensional scaling techniques (see van Liere, R., de Leeuw, W., Waas, F., “Interactive Visualization of Multidimensional Feature Spaces,” in Proc. of Workshop on New Paradigms for Information Visualization, Washington D.C., November 2000). In the case of thumbnail visualizations, the algorithms used for thumbnail creation typically just downsample individual images. There is no explicit control over what features the user will recognize in the individual thumbnails, what information is lost, or what information is conveyed through a collection of thumbnails. An exception is the SmartNail technology that creates thumbnail-like images with focus on showing readable text and recognizable image portions. With the SmartNail technology, the thumbnail visualization is derived from information of a single image only and is not linked to any specific query-driven retrieval results. However, the current SmartNail technology computes image representations for individual images, not for document collections, with no knowledge on query information. For more information on SmartNails, see U.S. patent application Ser. No. 10/435,300, entitled “Resolution Sensitive Layout of Document Regions,” filed May 9, 2003, published Jul. 29, 2004 (Publication No. 20040145593). In the case of high-dimensional data visualization, the user is confronted with an abstract representation of potential features without any association to the document image. MDS and dendrogram visualizations do not convey information on the document image, only arrangements of extracted features. The Data Mountain approach uses conventional thumbnails arranged by the user following personal preferences. For a different user, the structure is not meaningful. Since screen area is often very limited, it is not possible to show visualizations for each individual document on the screen. Therefore, it is natural to group documents that have similar features and associate each group with a label. This grouping, or clustering, is a common technique in retrieval applications. Clustering of retrieval results, in contrast to clustering the entire data set without having a query, is referred to herein as post-retrieval clustering. See, Park, G., Baek, Y., Lee, H.-K., “Re-ranking algorithm using post-retrieval clustering for content-based image retrieval,” Information Processing and Management, vol. 41, no. 2, pp. 177-194, 2005 Clusters are typically created with respect to text features. Cluster labels are typically text descriptions of the common cluster content. Clustering may be performed in other ways. In one exemplary document system textures are used to categorize and cluster documents in order to support query-by-example. Textures, describing document layout, are query inputs by the user. In one embodiment, the system uses a clustering algorithm to respond with returning documents matching the user-described document layout. Clustering algorithms (e.g., K-means or Sum-of-Square-Errors) may be employed to group documents with respect to traditional document features. These algorithms may return a set of cluster prototypes, visualized as icons, one of which can be used to perform a further query. For more information, see U.S. Pat. No. 5,933,823, entitled “Image Database Browsing and Query Using Texture Analysis,” issued Aug. 3, 1999. In general, clustering techniques can be split into bottom-up and top-down techniques. The bottom-up, or agglomerative, techniques begin by treating each data point as its own cluster and then performing the merger of clusters on the way up to the top. The top-down, or divisive, techniques begin with all data being one cluster and then gradually breaking this cluster down into smaller and smaller clusters. For more information on devisive techniques, see, Duda, R. O., Hart, P. E., “Pattern Classification and Scene Analysis,” Wiley, N.Y., 1973. Another characterization of clustering techniques is monothetic vs. polythetic. In a monothetic approach, cluster membership is based on the presence or absence of a single feature. Polythetic approaches use more than one feature. See, Kummamuru, K., et al., “A Hierarchical Monlothetic Document Clustering Algorithm for Summarization and Browsing Search Results,” Proceedings of the 13th international conference on World Wide Web, New York, N.Y., USA, pp. 658 -665p, 2004.
|
10930243
| 2,004
|
Focusing device
|
There is provided a focusing device capable of rapidly moving a lens to a minute focusing region and of realizing minute movement of focusing the lens in the minute focusing region. A lens moving mechanism comprises a first guide portion for guiding a lens to move in an optical-axis direction by a first predetermined distance to a minute focusing region and a second guide portion for guiding the lens 5 to minutely move in an optical direction by a second predetermined distance in the minute focusing region. The first guide portion is comprised of inclined portions 8a12 and 8a22 of guide grooves 8a1 and 8a2 of the outer cam 8. The second guide portion is comprised a first cam 4a1 and a second cam 4a2 of a lens holder 4.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a focusing device for moving a lens of a small camera by driving a motor to control a focus. 2. Description of the Related Art Such a kind of conventional technology is disclosed in the Patent Document 1. In the technology disclosed in Patent Document 1 (see Japanese Unexamined Patent Application Publication No. 2002-51524 (Paragraph Numbers 0058 and 0059 and FIG. 7) and corresponding U.S. Unexamined Patent Application Publication No. 2003/0178911A1), a pin is formed in a magnet that forms a rotor of a hollow motor and engages the above-described pin with a lens holder that holds a lens. The lens holder and a main body are connected to each other in a screw-shaped guide groove. According to the conventional technology, when the rotor, that is, a magnet is rotated by driving the hollow motor, the lens holder rotates through the pin of the magnet. That is, the lens held in the lens holder proceeds so as to protrude from the main body or recedes so as to be received in the main body. Thus, the lens moves in an optical-axis direction to control the focus. It has been desired to rapidly move the lens from a predetermined stand-by position, for example, an accommodating position of the main body to a minute focusing region and to minutely move the lens in the direction of the optical direction in the minute focusing region. However, according to the above-described conventional technology, since the lens holder that holds the lens moves while rotating along the screw-shaped guide groove, it take long time for the lens to move from the reception position to the minute focusing region. Thus, it is not possible to satisfy the above-described desire. Also, when the pitch of the guide groove is set to be large in the conventional technology, it is possible to secure a large amount of movement of the lens holder with respect to the number of rotations of the lens holder, that is, a large amount of movement of the lens such that it is possible to rapidly move the lens from the reception position to the minute focusing region. However, when the pitch of the guide groove is set to be large, it is not possible to realize minute motion such as focusing the lens in the minute focusing region, that is, to perform minute control. Thus, such a structure cannot be mentioned as practical. When it is considered that the lens rapidly moves through a cam groove, a member for forming the cam groove is necessary in addition to a protrusion engaged with the cam groove such that the entire structure becomes complicated to increase the manufacturing cost.
|
Title:
Focusing device
Abstract:
There is provided a focusing device capable of rapidly moving a lens to a minute focusing region and of realizing minute movement of focusing the lens in the minute focusing region. A lens moving mechanism comprises a first guide portion for guiding a lens to move in an optical-axis direction by a first predetermined distance to a minute focusing region and a second guide portion for guiding the lens 5 to minutely move in an optical direction by a second predetermined distance in the minute focusing region. The first guide portion is comprised of inclined portions 8a12 and 8a22 of guide grooves 8a1 and 8a2 of the outer cam 8. The second guide portion is comprised a first cam 4a1 and a second cam 4a2 of a lens holder 4.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a focusing device for moving a lens of a small camera by driving a motor to control a focus. 2. Description of the Related Art Such a kind of conventional technology is disclosed in the Patent Document 1. In the technology disclosed in Patent Document 1 (see Japanese Unexamined Patent Application Publication No. 2002-51524 (Paragraph Numbers 0058 and 0059 and FIG. 7) and corresponding U.S. Unexamined Patent Application Publication No. 2003/0178911A1), a pin is formed in a magnet that forms a rotor of a hollow motor and engages the above-described pin with a lens holder that holds a lens. The lens holder and a main body are connected to each other in a screw-shaped guide groove. According to the conventional technology, when the rotor, that is, a magnet is rotated by driving the hollow motor, the lens holder rotates through the pin of the magnet. That is, the lens held in the lens holder proceeds so as to protrude from the main body or recedes so as to be received in the main body. Thus, the lens moves in an optical-axis direction to control the focus. It has been desired to rapidly move the lens from a predetermined stand-by position, for example, an accommodating position of the main body to a minute focusing region and to minutely move the lens in the direction of the optical direction in the minute focusing region. However, according to the above-described conventional technology, since the lens holder that holds the lens moves while rotating along the screw-shaped guide groove, it take long time for the lens to move from the reception position to the minute focusing region. Thus, it is not possible to satisfy the above-described desire. Also, when the pitch of the guide groove is set to be large in the conventional technology, it is possible to secure a large amount of movement of the lens holder with respect to the number of rotations of the lens holder, that is, a large amount of movement of the lens such that it is possible to rapidly move the lens from the reception position to the minute focusing region. However, when the pitch of the guide groove is set to be large, it is not possible to realize minute motion such as focusing the lens in the minute focusing region, that is, to perform minute control. Thus, such a structure cannot be mentioned as practical. When it is considered that the lens rapidly moves through a cam groove, a member for forming the cam groove is necessary in addition to a protrusion engaged with the cam groove such that the entire structure becomes complicated to increase the manufacturing cost.
|
10859696
| 2,004
|
Shaped washing elements for vehicle wash systems
|
A shaped washing element used in a car wash system, having a proximal portion with a generally rectangular shape in length and width, and a shaped distal portion which is not generally rectangular-shaped in length and width. The washing element may be made of any material suitable for washing and/or polishing vehicles. Shaped washing elements according to the present invention are believed to provide increased cleaning efficiency, greater durability, and less propensity for damaging vehicles passing through the car wash system.
|
BACKGROUND OF THE INVENTION The present invention relates to the field of washing apparatus and machines for vehicles such as cars, trucks, buses, trains, recovery vehicles, etc. More specifically, the invention is directed to designs for washing and/or polishing of vehicles using curtains and/or brushes typically employed in vehicle wash systems. Generally, automatic vehicle washing systems include various mechanisms to wash vehicles, including hanging curtains, also referred to as mitters or hangdowns, among other names, that are suspended vertically in the vehicle conveyor line, tunnel, roll-over or wash or polish bay (“vehicle wash system”) (e.g., FIG. 1 ) and/or brushes that extend radially from rotating machines which may have vertical (e.g., FIG. 2 ) or horizontal axes. Mechanisms are typically employed to move the curtains or brushes, causing them to oscillate or rotate or the like so that they contact as many portions of the vehicle as possible as it passes through the vehicle wash system, or a wash machine passes over the vehicle (depending upon the system employed). Vehicle wash systems also may employ rotating machines with brushes, cloths, etc., extending radially outward from the machines to wash the sides and/or top and rear of vehicles. Prior art patents describe, for example, curtains consisting of fabric panels cut into multiple strips and suspended vertically from an overhead support structure. Some prior patents reference curtains with variable lengths to prevent entanglement with successive rows. Still other prior patents disclose the use of pie-shaped or rectangular curtains with slits at the bottom to provide independent contact surfaces; for example, the pie-shaped cloth elements may be oriented in circular arrays for rotating brushes, as disclosed in U.S. Pat. No. 6,035,482, which is incorporated by reference in its entirety into this application. Prior art vehicle wash systems have encountered difficulty in thoroughly cleaning vehicle surfaces without grabbing or catching on vehicle parts such as rear wipers, or without thoroughly cleaning side panels with dips and undulations, or lower car rocker panels, which are typically convex-shaped. Despite advances in vehicle wash systems and apparatus, there is still a need for providing a vehicle wash system with improved cleaning capabilities and enhanced durability which also minimizess possible damage to the vehicle being washed.
|
Title:
Shaped washing elements for vehicle wash systems
Abstract:
A shaped washing element used in a car wash system, having a proximal portion with a generally rectangular shape in length and width, and a shaped distal portion which is not generally rectangular-shaped in length and width. The washing element may be made of any material suitable for washing and/or polishing vehicles. Shaped washing elements according to the present invention are believed to provide increased cleaning efficiency, greater durability, and less propensity for damaging vehicles passing through the car wash system.
Background:
BACKGROUND OF THE INVENTION The present invention relates to the field of washing apparatus and machines for vehicles such as cars, trucks, buses, trains, recovery vehicles, etc. More specifically, the invention is directed to designs for washing and/or polishing of vehicles using curtains and/or brushes typically employed in vehicle wash systems. Generally, automatic vehicle washing systems include various mechanisms to wash vehicles, including hanging curtains, also referred to as mitters or hangdowns, among other names, that are suspended vertically in the vehicle conveyor line, tunnel, roll-over or wash or polish bay (“vehicle wash system”) (e.g., FIG. 1 ) and/or brushes that extend radially from rotating machines which may have vertical (e.g., FIG. 2 ) or horizontal axes. Mechanisms are typically employed to move the curtains or brushes, causing them to oscillate or rotate or the like so that they contact as many portions of the vehicle as possible as it passes through the vehicle wash system, or a wash machine passes over the vehicle (depending upon the system employed). Vehicle wash systems also may employ rotating machines with brushes, cloths, etc., extending radially outward from the machines to wash the sides and/or top and rear of vehicles. Prior art patents describe, for example, curtains consisting of fabric panels cut into multiple strips and suspended vertically from an overhead support structure. Some prior patents reference curtains with variable lengths to prevent entanglement with successive rows. Still other prior patents disclose the use of pie-shaped or rectangular curtains with slits at the bottom to provide independent contact surfaces; for example, the pie-shaped cloth elements may be oriented in circular arrays for rotating brushes, as disclosed in U.S. Pat. No. 6,035,482, which is incorporated by reference in its entirety into this application. Prior art vehicle wash systems have encountered difficulty in thoroughly cleaning vehicle surfaces without grabbing or catching on vehicle parts such as rear wipers, or without thoroughly cleaning side panels with dips and undulations, or lower car rocker panels, which are typically convex-shaped. Despite advances in vehicle wash systems and apparatus, there is still a need for providing a vehicle wash system with improved cleaning capabilities and enhanced durability which also minimizess possible damage to the vehicle being washed.
|
10848864
| 2,004
|
Freeze-free air hose coupling
|
An improved air hose coupling for cold weather operation for use on outdoor tire inflator machines said coupling having an internal water trap, airway check valve, thermal insulated airways, and multiple air inlets to preclude water condensate from freezing inside the cold metal of the coupling or connected tire filling nozzle during cold weather.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention Class 285/238/239/242 2. Discussion of the Prior Art Of the literally millions of air hoses in use today, the overwhelming majority are employed indoors and are not germane to this discussion except to state that these indoor hoses are generally for air tools in a system having a compressed air tank complete with gravity water collection and drain cocks to blow water out of the system, sophisticated air-driers, oilers and other accoutrements to protect and assist the air tools. Being indoors and free of water, no need exists nor thought given to freeze protected couplings. Moreover an examination of prior art in coupling patents per se, finds much focus on insuring the coupling stays coupled but no focus on freezing. Indoor systems notwithstanding, there are more than a hundred thousand minimalist automobile tire inflator machine systems located outdoors, primarily at service stations and convenience stores, and used by customers year round, night or day, summer or winter, in the order of one billion times per year. It is that during winter and intermediate seasons when the outdoor temperature drops below freezing, water vapor introduced in the compression process will condense inside the hose and gravitate to the end of the hose assembly there to freeze and block the tiny airways of the metal hose coupling or attached tire filling nozzle. This condensate water travels within the system in two forms, liquid driven by gravity and vapor by vapor pressure which seeks the coldest component of a closed system. The two forms must thusly be separately addressed.
|
Title:
Freeze-free air hose coupling
Abstract:
An improved air hose coupling for cold weather operation for use on outdoor tire inflator machines said coupling having an internal water trap, airway check valve, thermal insulated airways, and multiple air inlets to preclude water condensate from freezing inside the cold metal of the coupling or connected tire filling nozzle during cold weather.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention Class 285/238/239/242 2. Discussion of the Prior Art Of the literally millions of air hoses in use today, the overwhelming majority are employed indoors and are not germane to this discussion except to state that these indoor hoses are generally for air tools in a system having a compressed air tank complete with gravity water collection and drain cocks to blow water out of the system, sophisticated air-driers, oilers and other accoutrements to protect and assist the air tools. Being indoors and free of water, no need exists nor thought given to freeze protected couplings. Moreover an examination of prior art in coupling patents per se, finds much focus on insuring the coupling stays coupled but no focus on freezing. Indoor systems notwithstanding, there are more than a hundred thousand minimalist automobile tire inflator machine systems located outdoors, primarily at service stations and convenience stores, and used by customers year round, night or day, summer or winter, in the order of one billion times per year. It is that during winter and intermediate seasons when the outdoor temperature drops below freezing, water vapor introduced in the compression process will condense inside the hose and gravitate to the end of the hose assembly there to freeze and block the tiny airways of the metal hose coupling or attached tire filling nozzle. This condensate water travels within the system in two forms, liquid driven by gravity and vapor by vapor pressure which seeks the coldest component of a closed system. The two forms must thusly be separately addressed.
|
10869813
| 2,004
|
Labraries of optimized cytochrome P450 enzymes and the optimized P450 enzymes
|
The present disclosure teaches that the recombination of homologous sequences of P450 enzymes, with the aid of SCHEMA to predict a resulting protein structure, is able to generate libraries of chimeras with significant functional diversity. Additionally, the members of these libraries demonstrate superior or unexpected new properties, which correlate with other factors that are observable in the library. Thus, the making of libraries of optimized P450 enzymes, the analysis of libraries to identify an optimized subset, and the optimized chimeras with improved or altered functionalities are all taught in the present disclosure.
|
BACKGROUND OF THE INVENTION The cytochrome P450 superfamily of enzymes exhibits an impressive range of chemical activities and biological roles. Nature has exploited these diverse enzymes for everything from steroid biosynthesis to interspecies chemical warfare, protection of the organisms from toxic compounds, drug detoxification and utilization of new food sources. (Ortiz de Montellano, P. R., Cytochrome P450: Structure, Mechanism, and Biochemistry (New York: Plenum Press)(1995); Gotoh, O., Cytochrome P450, 2nd Edition, pp. 255-272 (1993); Gonzalez et al., Trends Genet, 6:182-186 (1990); Mauersberger et al., Z Alig Mikrobiol., 121:313-321 (1981); Porter et al., J. Biol. Chem., 266:13469-13472 (1991)). While activities are diverse across the entire superfamily, individual members of the superfamily show a much narrower range of catalytic activities, usually catalyzing oxygen insertion into C—H bonds and substrate specificities. The heme prosthetic group recruited by the cytochrome P450s to effect monooxygenation is also used by these and other proteins for oxygen transport, electron transfer, reduction, dealkylation and dehalogenation. (Sono et al., Chem Rev 96, 2841-2888 (1996), Eichhorn et al., Heme Proteins, New York, N.Y.: Elsevier Science Publishing Co., Inc. (1988)). Recent engineering efforts have demonstrated that P450s can acquire new or improved activities by point mutation (Cirino, P. C., and Arnold, F. H., Angew Chem Int Ed Engl 42, 3299-3301 (2003); Li et al., Biochem Biophys. Acta., 1545:114-121 (2001); Glieder et al., Nat. Biotechnol. 20:1135-1139 (2002); Li et al., Chemistry, 6:1531-1536 (2000); Joo et al., Nature, 399:670-673 (1999); Appel et al., J. Biotechnol., 88:167-171 (2001)). However, making and characterizing each engineered P450 can be a laborious and time-consuming process. This is especially true when many of the mutations made, if done randomly, result in proteins with little or no function. This is even further exacerbated if one desires high levels of mutation. One possible way around this is to create libraries containing potentially numerous useful proteins by recombining different P450s either from nature or which have created in the laboratory. This could at least reduce the initial amount of work involved in creating the enzymes, although a substantial amount of work will still be required in testing these libraries. However, creating protein libraries is not a simple matter, especially for P450s. P450s typically exhibit low sequence identity. Thus, annealing-based DNA-shuffling techniques are largely useless for creating highly diverse libraries of P450 chimeras or for creating the individual chimeric proteins (Stemmer, W P, Proc. Natl. Acad. Sci. USA, 91:10747-10751 (1994); Coco, W M. et al., Nat. Biotechnol., 19:354-359 (2001); Zhao, H. et al. (1998). Nat. Biotechnol., 16:258-261; Volkov, A A et al., Nucleic Acids Res., 27, e18 (1999); Kikuchi, M. et al., Gene, 243:133-137 (2000)). While there are some methods for making shuffled gene libraries independent of sequence homology, these approaches generate few crossovers and large numbers of inactive sequences due to insertions, deletions, and frameshifts, as well as disruptive crossover events. (Lutz, S. et al. Proc Natl Acad Sci USA, 98:11248-11253 (2001); Sieber, V. et al., Nat Biotechnol., 19:456-460 (2001)). Additionally, functional characterization of such libraries is extremely difficult without a selection method that can remove unfolded or nonfunctional sequences. Finally, as such libraries do not currently generally exist, the functional abilities, characteristics, benefits of, and method of characterizing such libraries currently remain unknown, although attempts have been made (Abecassis et al., Nucleic Acids Res 28:E88, (2000)).
|
Title:
Labraries of optimized cytochrome P450 enzymes and the optimized P450 enzymes
Abstract:
The present disclosure teaches that the recombination of homologous sequences of P450 enzymes, with the aid of SCHEMA to predict a resulting protein structure, is able to generate libraries of chimeras with significant functional diversity. Additionally, the members of these libraries demonstrate superior or unexpected new properties, which correlate with other factors that are observable in the library. Thus, the making of libraries of optimized P450 enzymes, the analysis of libraries to identify an optimized subset, and the optimized chimeras with improved or altered functionalities are all taught in the present disclosure.
Background:
BACKGROUND OF THE INVENTION The cytochrome P450 superfamily of enzymes exhibits an impressive range of chemical activities and biological roles. Nature has exploited these diverse enzymes for everything from steroid biosynthesis to interspecies chemical warfare, protection of the organisms from toxic compounds, drug detoxification and utilization of new food sources. (Ortiz de Montellano, P. R., Cytochrome P450: Structure, Mechanism, and Biochemistry (New York: Plenum Press)(1995); Gotoh, O., Cytochrome P450, 2nd Edition, pp. 255-272 (1993); Gonzalez et al., Trends Genet, 6:182-186 (1990); Mauersberger et al., Z Alig Mikrobiol., 121:313-321 (1981); Porter et al., J. Biol. Chem., 266:13469-13472 (1991)). While activities are diverse across the entire superfamily, individual members of the superfamily show a much narrower range of catalytic activities, usually catalyzing oxygen insertion into C—H bonds and substrate specificities. The heme prosthetic group recruited by the cytochrome P450s to effect monooxygenation is also used by these and other proteins for oxygen transport, electron transfer, reduction, dealkylation and dehalogenation. (Sono et al., Chem Rev 96, 2841-2888 (1996), Eichhorn et al., Heme Proteins, New York, N.Y.: Elsevier Science Publishing Co., Inc. (1988)). Recent engineering efforts have demonstrated that P450s can acquire new or improved activities by point mutation (Cirino, P. C., and Arnold, F. H., Angew Chem Int Ed Engl 42, 3299-3301 (2003); Li et al., Biochem Biophys. Acta., 1545:114-121 (2001); Glieder et al., Nat. Biotechnol. 20:1135-1139 (2002); Li et al., Chemistry, 6:1531-1536 (2000); Joo et al., Nature, 399:670-673 (1999); Appel et al., J. Biotechnol., 88:167-171 (2001)). However, making and characterizing each engineered P450 can be a laborious and time-consuming process. This is especially true when many of the mutations made, if done randomly, result in proteins with little or no function. This is even further exacerbated if one desires high levels of mutation. One possible way around this is to create libraries containing potentially numerous useful proteins by recombining different P450s either from nature or which have created in the laboratory. This could at least reduce the initial amount of work involved in creating the enzymes, although a substantial amount of work will still be required in testing these libraries. However, creating protein libraries is not a simple matter, especially for P450s. P450s typically exhibit low sequence identity. Thus, annealing-based DNA-shuffling techniques are largely useless for creating highly diverse libraries of P450 chimeras or for creating the individual chimeric proteins (Stemmer, W P, Proc. Natl. Acad. Sci. USA, 91:10747-10751 (1994); Coco, W M. et al., Nat. Biotechnol., 19:354-359 (2001); Zhao, H. et al. (1998). Nat. Biotechnol., 16:258-261; Volkov, A A et al., Nucleic Acids Res., 27, e18 (1999); Kikuchi, M. et al., Gene, 243:133-137 (2000)). While there are some methods for making shuffled gene libraries independent of sequence homology, these approaches generate few crossovers and large numbers of inactive sequences due to insertions, deletions, and frameshifts, as well as disruptive crossover events. (Lutz, S. et al. Proc Natl Acad Sci USA, 98:11248-11253 (2001); Sieber, V. et al., Nat Biotechnol., 19:456-460 (2001)). Additionally, functional characterization of such libraries is extremely difficult without a selection method that can remove unfolded or nonfunctional sequences. Finally, as such libraries do not currently generally exist, the functional abilities, characteristics, benefits of, and method of characterizing such libraries currently remain unknown, although attempts have been made (Abecassis et al., Nucleic Acids Res 28:E88, (2000)).
|
10974465
| 2,004
|
Golf course management system
|
A golf course management system has an administration manager for managing administrative information including member information, a golf service manager for managing golf services using the member information; an auxiliary service manager for managing auxiliary services, the auxiliary service manager being linked with the golf service manager to handle golf services and auxiliary services together; and a system manager for managing the golf course management system using information obtained from the administration manager, golf service manager and the auxiliary service manager.
|
BACKGROUND OF THE INVENTION Golf course companies need to manage several aspects of their businesses, such as course booking, product sales, food services and equipment inventory. Typically golf course companies use different systems for different aspects of their business. While there are variety of aspects, they are often related to each other. Different systems often require redundant work to enter and maintain information which has been already entered or updated in a different system. If the company wants to provide a new service to its members, a new system needs to be introduced and the information of members needs to be entered in the new system. Also, having different systems makes difficult to obtain an overview of the business. Further, traditional systems for golf course management are not customizable or offer limited customizability sand do not offer real-time online tee sheet booking in the industry. Accordingly, it is desirable to provide a mechanism that allows a golf course company to manage several aspects of its golf course interactively in an organized manner.
|
Title:
Golf course management system
Abstract:
A golf course management system has an administration manager for managing administrative information including member information, a golf service manager for managing golf services using the member information; an auxiliary service manager for managing auxiliary services, the auxiliary service manager being linked with the golf service manager to handle golf services and auxiliary services together; and a system manager for managing the golf course management system using information obtained from the administration manager, golf service manager and the auxiliary service manager.
Background:
BACKGROUND OF THE INVENTION Golf course companies need to manage several aspects of their businesses, such as course booking, product sales, food services and equipment inventory. Typically golf course companies use different systems for different aspects of their business. While there are variety of aspects, they are often related to each other. Different systems often require redundant work to enter and maintain information which has been already entered or updated in a different system. If the company wants to provide a new service to its members, a new system needs to be introduced and the information of members needs to be entered in the new system. Also, having different systems makes difficult to obtain an overview of the business. Further, traditional systems for golf course management are not customizable or offer limited customizability sand do not offer real-time online tee sheet booking in the industry. Accordingly, it is desirable to provide a mechanism that allows a golf course company to manage several aspects of its golf course interactively in an organized manner.
|
10886694
| 2,004
|
Flashlight
|
A flashlight includes a base, a lamp unit, a cover, and a 9V battery. The base has plural through holes, and the lamp unit arranged on the base consists of an electric circuit board, plural LED, a switch and two terminals. The LED and the switch are positioned on the circuit board, and the two terminals are fixed under the lower surface of the circuit board. The cover is closed on the base. A user combines the 9V battery under the base, with its terminals extending through the base and contacting with the terminals of the lamp unit. Then the user turns on the flashlight for shining any location by griping the battery and moving or putting the flashlight at any location to shine it movingly or stationarily. The flashlight can also be used as a decoration, with the battery taken off, and with a hanging chain strung through the cover for wearing.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to a flashlight, particularly to one provided with a base, a lamp unit, a cover and a 9V battery. The base has a through hole, and the lamp unit is secured on the base and consists of an electric circuit board and a plurality of LED and a switch fixed on the circuit board. Two terminals are fixed under the lower surface of the circuit board. The cover is closed over the base and the lamp unit. In using, the 9V battery combined with the lower side of the base, with its terminals extending through the through holes of the base and positioned in the contact condition with the terminals of the circuit board, and a user presses the switch for turning on the lamp unit, with the hand of the user holding the battery securely. Thus the flashlight of the invention can movably be used for shining, or placed at any location stationary for shining constantly that location only. If not used, the 9V battery can be taken off, and a key chain can string through the cover of the flashlight, with the flashlight functioning as a decoration worn on the neck or hung on a wall and convenient to carry around. 2. Description of the Prior Art Conventional flashlights have been used simply as a shining apparatus, generally consisting of a lamp in a front head and a battery (or batteries) received in a rear portion of the body, and turned on and off by a switch. They are generally stored in a box or a tool case, not so handy for carrying around, so there have been produced some small-sized flashlights possible to hang on a key chain with keys. But this kind of flashlight is also used for shining only, with not so neat an appearance and with components of the flashlight possible to fall off owing to mutual bumping with keys on the chain.
|
Title:
Flashlight
Abstract:
A flashlight includes a base, a lamp unit, a cover, and a 9V battery. The base has plural through holes, and the lamp unit arranged on the base consists of an electric circuit board, plural LED, a switch and two terminals. The LED and the switch are positioned on the circuit board, and the two terminals are fixed under the lower surface of the circuit board. The cover is closed on the base. A user combines the 9V battery under the base, with its terminals extending through the base and contacting with the terminals of the lamp unit. Then the user turns on the flashlight for shining any location by griping the battery and moving or putting the flashlight at any location to shine it movingly or stationarily. The flashlight can also be used as a decoration, with the battery taken off, and with a hanging chain strung through the cover for wearing.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to a flashlight, particularly to one provided with a base, a lamp unit, a cover and a 9V battery. The base has a through hole, and the lamp unit is secured on the base and consists of an electric circuit board and a plurality of LED and a switch fixed on the circuit board. Two terminals are fixed under the lower surface of the circuit board. The cover is closed over the base and the lamp unit. In using, the 9V battery combined with the lower side of the base, with its terminals extending through the through holes of the base and positioned in the contact condition with the terminals of the circuit board, and a user presses the switch for turning on the lamp unit, with the hand of the user holding the battery securely. Thus the flashlight of the invention can movably be used for shining, or placed at any location stationary for shining constantly that location only. If not used, the 9V battery can be taken off, and a key chain can string through the cover of the flashlight, with the flashlight functioning as a decoration worn on the neck or hung on a wall and convenient to carry around. 2. Description of the Prior Art Conventional flashlights have been used simply as a shining apparatus, generally consisting of a lamp in a front head and a battery (or batteries) received in a rear portion of the body, and turned on and off by a switch. They are generally stored in a box or a tool case, not so handy for carrying around, so there have been produced some small-sized flashlights possible to hang on a key chain with keys. But this kind of flashlight is also used for shining only, with not so neat an appearance and with components of the flashlight possible to fall off owing to mutual bumping with keys on the chain.
|
10982877
| 2,004
|
Ethylene oxide decomposition processing method and decomposition processing device therefor
|
A decomposition processing method for ethylene oxide is provided for when concentration of the ethylene oxide to be decomposed in a gas varies. The method comprises steps of reducing the concentration of ethylene oxide in the gas to a predetermined concentration which is less than the highest concentration of the ethylene oxide in the range of the variation, adsorbing ethylene oxide to a photocatalyst which has ethylene oxide adsorbing ability, and decomposing ethylene oxide by action of one of the photocatalyst and a combination of the photocatalyst and plasma. The adsorbing step and decomposing step are conducted after the reducing step.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an ethylene oxide decomposition processing method and to a decomposition processing device therefor. Priority is claimed on Japanese Patent Application No. 2003-379874, filed Nov. 10, 2003, the content of which is incorporated herein by reference. 2. Description of Related Art When a sterilization processing with a sterilization device using ethylene oxide is conducted and an exhaust gas is discharged from the sterilization device after the sterilization processing is completed, the gas contained in the device is withdrawn to be discharged from the sterilization device. Outside air is not introduced into the sterilization device in the initial stage of the discharge of the exhaust gas. For this reason, the exhaust gas in the initial stage has a high ethylene oxide concentration. In particular, when a sterilization device comprises a cartridge type cylinder as a source of ethylene oxide, the ethylene oxide concentration in the exhaust gas is about 100%. The ethylene oxide concentration in the exhaust gas may decrease rapidly by the outside air introduction thereto as the discharge of the exhaust gas from the sterilization device proceeds. Furthermore, in order to remove the ethylene oxide adhering to sterilized material such as gauze contained in the sterilization device, since ethylene oxide adheres in the sterilization processing, an operation is performed so that a process called “cleaning” is conducted several times. The cleaning is conducted both by an introduction of outside air into the sterilization device and a drawing of a gas contained in the device wherein the drawing is conducted after a short period has been passed from the introduction. The concentration of the ethylene oxide in the exhaust gas which is discharged in the cleaning process changes. In this way, when the ethylene oxide in the exhaust gas, in which a variation in ethylene oxide concentration is large, is decomposed with a conventional method using an oxidation catalyst, excess ethylene oxide, which exceeds the throughput of the catalyst, is discharged without decomposition thereof, if throughput of the oxidation catalyst cannot be appropriate for the maximum concentration of ethylene oxide included in the exhaust gas. Therefore, there is a problem because the cost for the decomposition processing device increases since large amounts of oxidation catalyst must be used. In order to overcome this problem, a method in which a treated exhaust air is sent into a decomposition processing device, after a concentration of the ethylene oxide contained in the exhaust gas is decreased by reducing variation in ethylene oxide concentration in the exhaust gas, is proposed in WO 99/61137. In this prior art, the exhaust gas is introduced from sterilization device (not shown) into a container 1 which stores liquid such as water, through a pipe 2 and a valve 3 , as shown in FIG. 8 . Then, an aeration (a bubbling) of the introduced exhaust gas is conducted by exposing the gas to the liquid by an aeration member 4 in order to dissolve and adsorb the ethylene oxide in the exhaust gas into the liquid. Most of the ethylene oxide in the exhaust gas is absorbed by the liquid. The exhaust gas wherein the ethylene oxide concentration is greatly reduced is sent from the container 1 to the catalytic combustion device 6 , in which the oxidation catalyst is filled, via the pipe 5 , and then decomposition processing is carried out in the device. When the ethylene oxide concentration in the exhaust gas supplied from the sterilization device decreases, an air supply pump 7 is operated to send outside air to the pipe 2 . The sent outside air is allowed to bubble into the liquid in the container 1 so that the ethylene oxide dissolved in the liquid passed into the air. The air in which the ethylene oxide is transferred is sent into the catalytic combustion device 6 to carry out a decomposition processing of the ethylene oxide. By using the aforementioned decomposition processing method, the range of variation in the ethylene oxide concentration in the exhaust gas, which is large, can be reduced, and the concentration of the ethylene oxide can be standardized. In the document, there are described those in which, since the ethylene oxide concentration becomes low even if a high concentration of ethylene oxide is in the exhaust gas, the exhaust gas containing the high concentration ethylene oxide is not sent into the catalytic combustion device 6 , and therefore the catalytic combustion device 6 can be miniaturized, and device cost can be reduced. However, the decomposition processing method for the ethylene oxide described in the document has the following problems. Firstly, since the oxidation catalyst is used as a decomposition mean for ethylene oxide, the temperature of the exhaust gas which is exhausted after the decomposition is high (300 to 400° C.). Therefore, exhaust gas at such a temperature cannot be discharged as it is, and a cooling device and/or a dilution device using the outside air must be provided. Moreover, undecomposed ethylene oxide may be discharged from the system, when the ethylene oxide concentration in the exhaust gas sent from the container 1 is not reduced sufficiently for some reason and therefore an exhaust gas including ethylene oxide in excess concentration, which exceeds a throughput of the oxidation catalyst, is transferred into the catalytic combustion device 6 . Furthermore, the exhaust gas may leak to the outside of the device, since the overall device for the decomposition processing may have a positive pressure provided by the operation of an air supply pump 7 and the like. Accordingly, in order to avoid these problems, excessive device cost is incurred to provide a system which is very airtight.
|
Title:
Ethylene oxide decomposition processing method and decomposition processing device therefor
Abstract:
A decomposition processing method for ethylene oxide is provided for when concentration of the ethylene oxide to be decomposed in a gas varies. The method comprises steps of reducing the concentration of ethylene oxide in the gas to a predetermined concentration which is less than the highest concentration of the ethylene oxide in the range of the variation, adsorbing ethylene oxide to a photocatalyst which has ethylene oxide adsorbing ability, and decomposing ethylene oxide by action of one of the photocatalyst and a combination of the photocatalyst and plasma. The adsorbing step and decomposing step are conducted after the reducing step.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an ethylene oxide decomposition processing method and to a decomposition processing device therefor. Priority is claimed on Japanese Patent Application No. 2003-379874, filed Nov. 10, 2003, the content of which is incorporated herein by reference. 2. Description of Related Art When a sterilization processing with a sterilization device using ethylene oxide is conducted and an exhaust gas is discharged from the sterilization device after the sterilization processing is completed, the gas contained in the device is withdrawn to be discharged from the sterilization device. Outside air is not introduced into the sterilization device in the initial stage of the discharge of the exhaust gas. For this reason, the exhaust gas in the initial stage has a high ethylene oxide concentration. In particular, when a sterilization device comprises a cartridge type cylinder as a source of ethylene oxide, the ethylene oxide concentration in the exhaust gas is about 100%. The ethylene oxide concentration in the exhaust gas may decrease rapidly by the outside air introduction thereto as the discharge of the exhaust gas from the sterilization device proceeds. Furthermore, in order to remove the ethylene oxide adhering to sterilized material such as gauze contained in the sterilization device, since ethylene oxide adheres in the sterilization processing, an operation is performed so that a process called “cleaning” is conducted several times. The cleaning is conducted both by an introduction of outside air into the sterilization device and a drawing of a gas contained in the device wherein the drawing is conducted after a short period has been passed from the introduction. The concentration of the ethylene oxide in the exhaust gas which is discharged in the cleaning process changes. In this way, when the ethylene oxide in the exhaust gas, in which a variation in ethylene oxide concentration is large, is decomposed with a conventional method using an oxidation catalyst, excess ethylene oxide, which exceeds the throughput of the catalyst, is discharged without decomposition thereof, if throughput of the oxidation catalyst cannot be appropriate for the maximum concentration of ethylene oxide included in the exhaust gas. Therefore, there is a problem because the cost for the decomposition processing device increases since large amounts of oxidation catalyst must be used. In order to overcome this problem, a method in which a treated exhaust air is sent into a decomposition processing device, after a concentration of the ethylene oxide contained in the exhaust gas is decreased by reducing variation in ethylene oxide concentration in the exhaust gas, is proposed in WO 99/61137. In this prior art, the exhaust gas is introduced from sterilization device (not shown) into a container 1 which stores liquid such as water, through a pipe 2 and a valve 3 , as shown in FIG. 8 . Then, an aeration (a bubbling) of the introduced exhaust gas is conducted by exposing the gas to the liquid by an aeration member 4 in order to dissolve and adsorb the ethylene oxide in the exhaust gas into the liquid. Most of the ethylene oxide in the exhaust gas is absorbed by the liquid. The exhaust gas wherein the ethylene oxide concentration is greatly reduced is sent from the container 1 to the catalytic combustion device 6 , in which the oxidation catalyst is filled, via the pipe 5 , and then decomposition processing is carried out in the device. When the ethylene oxide concentration in the exhaust gas supplied from the sterilization device decreases, an air supply pump 7 is operated to send outside air to the pipe 2 . The sent outside air is allowed to bubble into the liquid in the container 1 so that the ethylene oxide dissolved in the liquid passed into the air. The air in which the ethylene oxide is transferred is sent into the catalytic combustion device 6 to carry out a decomposition processing of the ethylene oxide. By using the aforementioned decomposition processing method, the range of variation in the ethylene oxide concentration in the exhaust gas, which is large, can be reduced, and the concentration of the ethylene oxide can be standardized. In the document, there are described those in which, since the ethylene oxide concentration becomes low even if a high concentration of ethylene oxide is in the exhaust gas, the exhaust gas containing the high concentration ethylene oxide is not sent into the catalytic combustion device 6 , and therefore the catalytic combustion device 6 can be miniaturized, and device cost can be reduced. However, the decomposition processing method for the ethylene oxide described in the document has the following problems. Firstly, since the oxidation catalyst is used as a decomposition mean for ethylene oxide, the temperature of the exhaust gas which is exhausted after the decomposition is high (300 to 400° C.). Therefore, exhaust gas at such a temperature cannot be discharged as it is, and a cooling device and/or a dilution device using the outside air must be provided. Moreover, undecomposed ethylene oxide may be discharged from the system, when the ethylene oxide concentration in the exhaust gas sent from the container 1 is not reduced sufficiently for some reason and therefore an exhaust gas including ethylene oxide in excess concentration, which exceeds a throughput of the oxidation catalyst, is transferred into the catalytic combustion device 6 . Furthermore, the exhaust gas may leak to the outside of the device, since the overall device for the decomposition processing may have a positive pressure provided by the operation of an air supply pump 7 and the like. Accordingly, in order to avoid these problems, excessive device cost is incurred to provide a system which is very airtight.
|
10767764
| 2,004
|
Methods for improving metal-to-metal contact in a via, devices made according to the methods, and systems including the same
|
In damascene process integration, a reducing plasma is applied after the etch stop or barrier layer is opened over a copper layer. Currently known methods for opening barrier layers suffer from the disadvantage that they cause at least some of the underlying copper to oxidize to copper oxide.. Because copper oxide is selectively removed by subsequent wet cleaning, voids can form where damaged copper (e.g., copper oxide) is removed, thus compromising the reliability of metal-to-metal contact in vias. The present invention advantageously overcomes this and other disadvantages of the prior art through the use of a hydrogen plasma following the barrier layer opening step, which repairs damaged copper (e.g., reduces copper oxide to copper), thus preventing and/or diminishing defects in metal-to-metal contacts in vias and concomitantly improving the reliability of the same.
|
BACKGROUND OF THE INVENTION The present invention relates generally to the field of semiconductor device fabrication and, more particularly, to methods for improving metal-to-metal contact in vias by decreasing and/or repairing damage to metal layers during formation of damascene structures in semiconductor devices. The integration of a large number of components on a single integrated circuit (IC) chip requires complex interconnects. Ideally, the interconnect structures should be fabricated with minimal signal delay and optimal packing density. The reliability and performance of integrated circuits may be affected by the quality of their interconnect structures. Advanced multiple metallization layers have been used to accommodate higher packing densities as devices shrink below sub-0.25 micron design rules. One such metallization scheme is a dual damascene structure formed by a dual damascene process. The dual damascene process is a sequential mask/etch process to form a two-level structure, such as a via connected to a metal line situated above the via. In contrast to a single damascene process, the via and the trench are simultaneously filled with metal. Thus, compared to the single damascene process, the dual damascene process offers the advantage of process simplification and low manufacturing cost. To improve the performance, reliability and density of the interconnects, the microelectronics industry has recently begun migrating away from the use of aluminum (Al) and/or its alloys for the interconnects. As such, advanced dual damascene processes have begun using copper (Cu) as the material of choice because copper has high conductivity, extremely low resistivity (about 1.7 μΩcm) and good resistance to electromigration. One difficulty encountered with copper is that copper-to-copper connections between the first level interconnect metal layer and a copper via-filling plug are subject to reliability problems due to chemical and physical damage to the first level interconnect metal layer during formation of the dual damascene structure. FIGS. 1A-1C illustrate a sequence of fabrication steps for a known dual damascene process as applied to interconnect formation. As shown in FIG. 1A , the process begins with the deposition of a first insulating layer 140 over a first level interconnect metal layer 120 , which in turn is formed over or within a semiconductor substrate 100 . A second insulating layer 160 is next formed over the first insulating layer 140 . Etch stop layers 150 , 150 ′ are typically formed between the first and second insulating layers 140 , 160 and between the first insulating layer 140 and the first level interconnect metal layer 120 . The second insulating layer 160 is patterned by photolithography with a first mask (not shown) to form a trench 170 corresponding to a metal line of a second level interconnect. The etch stop layer 150 prevents the upper level trench pattern 170 from being etched through to the first insulating layer 140 . As illustrated in FIG. 1B , a second masking step followed by an etch step is applied to form a via 180 through the etch stop layer 150 and the first insulating layer 140 . The second etch stop layer or barrier layer 150 ′ is formed between the first level interconnect metal layer 120 and the first insulating layer 140 during the formation of the dual damascene structure 125 . Thus, a further step is required to open barrier layer 150 ′ and expose the underlying first level interconnect metal layer 120 . After the etching is completed, both the trench 170 and the via 180 are filled with metal 122 (also referred to as via-filling plug 122 ), which is typically copper (Cu), to form a damascene structure 125 , as illustrated in FIG. 1C . FIGS. 1D-1F depict one problematic result that arises with known damascene processing techniques. Among other contaminants, copper oxide 121 is formed in the first level interconnect metal layer 120 by the oxidizing etchants conventionally used to open barrier layer 150 ′, as shown in FIG. 1D . Such damage to first level interconnect metal layer 120 often further includes undercutting (i.e., removal of material from first level interconnect metal layer 120 under barrier layer 150 ′) of the first level interconnect metal layer 120 near the edges of barrier layer 150 ′ (see also FIG. 1F ). Copper oxide and other contaminants must be removed prior to formation of the via-filling plug 122 , which is typically accomplished with a wet clean process. As shown in FIGS. 1E-1F , removal of copper oxide 121 in such a wet clean process sometimes causes voids 127 to occur during formation of the via-filling plug 122 . Such voids 127 compromise the reliability of the electrical connection between plug 122 and the first level interconnect metal layer 120 and are particularly likely to occur near or under the edges of the barrier layer 150 ′, as shown in FIGS. 1E-1F . FIG. 1F is a detail view of region 190 shown in FIG. 1E . FIG. 1F shows the aforementioned undercutting of first level interconnect metal layer 120 near the edges of barrier layer 150 ′, as well as voids 127 that can form due, at least in part, to such undercutting. In the past, hydrogen plasmas have been used after the wet clean process described above. However, such an approach is disadvantageous because the wet clean process selectively removes copper oxides 121 from first level interconnect metal layer 120 , thus giving rise to greater potential for incidence of voids 127 and other anomalies in subsequently formed metal-to-metal contacts, e.g., between via-filling plug 125 and first level interconnect metal layer 120 . The present invention advantageously overcomes this problem by at least partly reducing copper oxide to copper before the wet clean process, thus reducing the amount of copper material removed by the wet clean process and concomitantly improving the reliability of subsequently formed metallic connections. As mentioned above, copper interconnect is the most promising metallization scheme for the future generation high-speed ULSI, primarily because of lower electrical resistivity (1.7 vs. 2.3 μΩcm) and electro/stress-migration resistance than the conventional aluminum-based materials. However, copper metallization suffers from disadvantages, including those described above. As a result, in order to adopt copper interconnects for ULSI, suitable methods for improving the reliability of copper-to-copper contact in vias are needed. As mentioned above, of the several schemes proposed for fabricating copper interconnects, the most promising method appears to be the dual damascene process shown in FIGS. 1A-1C . Using this method, the trenches for conductors and holes for vias are patterned in blanket dielectrics, and then the desired metal is deposited into the trenches and holes in one step. Chemical mechanical planarization (CMP) is conventionally used to remove the unwanted surface metal extending over the uppermost dielectric, while leaving the desired metal in the trenches and vias. This leaves a planarized surface for subsequent metallization to build multilevel interconnect structures. Unfortunately, this technology not only uses a large amount of expensive consumables for the CMP process and the associated waste disposal problem but also is very wasteful of copper. Typically, the conductors and vias in a given metallization level occupy only a small proportion of the deposited copper, while the bulk of the copper is removed by CMP, rendering the technology very expensive. There is thus a strong economic incentive to minimize waste wherever possible, and losses that can occur due to defective metal-to-metal contact in vias are especially onerous because they occur and/or are discovered only after substantial fabrication is complete. The ordinarily skilled artisan will readily appreciate that a number of processes are known for forming dual damascene structures. For instance, trenches may be etched through the upper insulating layer, after which a further mask may be employed to etch the contact vias, or the etch continues through a previously defined, buried hard mask (the so-called “trench first” approach). Alternatively, vias may first be etched through the upper and lower insulating layers, after which the via in the upper insulating layer may be widened to form a trench (the so-called “via first” approach). The “via first” dual damascene approach has been widely adopted for small geometry devices. Due to the disadvantageous results (as depicted in FIGS. 1E-1F ) that can arise in conventional damascene techniques, great care is taken to minimize physical and chemical damage to the first level interconnect metal (copper) layer 120 . Nevertheless, known damascene techniques still frequently result in formation of voids 127 , which are undesirably detrimental to the integrity of the electrical connection between the first level interconnect metal layer 120 and the conductive via-filling plug 122 . It can thus be seen that a need exists for improved dual damascene processing techniques that provide improved electrical connections in vias.
|
Title:
Methods for improving metal-to-metal contact in a via, devices made according to the methods, and systems including the same
Abstract:
In damascene process integration, a reducing plasma is applied after the etch stop or barrier layer is opened over a copper layer. Currently known methods for opening barrier layers suffer from the disadvantage that they cause at least some of the underlying copper to oxidize to copper oxide.. Because copper oxide is selectively removed by subsequent wet cleaning, voids can form where damaged copper (e.g., copper oxide) is removed, thus compromising the reliability of metal-to-metal contact in vias. The present invention advantageously overcomes this and other disadvantages of the prior art through the use of a hydrogen plasma following the barrier layer opening step, which repairs damaged copper (e.g., reduces copper oxide to copper), thus preventing and/or diminishing defects in metal-to-metal contacts in vias and concomitantly improving the reliability of the same.
Background:
BACKGROUND OF THE INVENTION The present invention relates generally to the field of semiconductor device fabrication and, more particularly, to methods for improving metal-to-metal contact in vias by decreasing and/or repairing damage to metal layers during formation of damascene structures in semiconductor devices. The integration of a large number of components on a single integrated circuit (IC) chip requires complex interconnects. Ideally, the interconnect structures should be fabricated with minimal signal delay and optimal packing density. The reliability and performance of integrated circuits may be affected by the quality of their interconnect structures. Advanced multiple metallization layers have been used to accommodate higher packing densities as devices shrink below sub-0.25 micron design rules. One such metallization scheme is a dual damascene structure formed by a dual damascene process. The dual damascene process is a sequential mask/etch process to form a two-level structure, such as a via connected to a metal line situated above the via. In contrast to a single damascene process, the via and the trench are simultaneously filled with metal. Thus, compared to the single damascene process, the dual damascene process offers the advantage of process simplification and low manufacturing cost. To improve the performance, reliability and density of the interconnects, the microelectronics industry has recently begun migrating away from the use of aluminum (Al) and/or its alloys for the interconnects. As such, advanced dual damascene processes have begun using copper (Cu) as the material of choice because copper has high conductivity, extremely low resistivity (about 1.7 μΩcm) and good resistance to electromigration. One difficulty encountered with copper is that copper-to-copper connections between the first level interconnect metal layer and a copper via-filling plug are subject to reliability problems due to chemical and physical damage to the first level interconnect metal layer during formation of the dual damascene structure. FIGS. 1A-1C illustrate a sequence of fabrication steps for a known dual damascene process as applied to interconnect formation. As shown in FIG. 1A , the process begins with the deposition of a first insulating layer 140 over a first level interconnect metal layer 120 , which in turn is formed over or within a semiconductor substrate 100 . A second insulating layer 160 is next formed over the first insulating layer 140 . Etch stop layers 150 , 150 ′ are typically formed between the first and second insulating layers 140 , 160 and between the first insulating layer 140 and the first level interconnect metal layer 120 . The second insulating layer 160 is patterned by photolithography with a first mask (not shown) to form a trench 170 corresponding to a metal line of a second level interconnect. The etch stop layer 150 prevents the upper level trench pattern 170 from being etched through to the first insulating layer 140 . As illustrated in FIG. 1B , a second masking step followed by an etch step is applied to form a via 180 through the etch stop layer 150 and the first insulating layer 140 . The second etch stop layer or barrier layer 150 ′ is formed between the first level interconnect metal layer 120 and the first insulating layer 140 during the formation of the dual damascene structure 125 . Thus, a further step is required to open barrier layer 150 ′ and expose the underlying first level interconnect metal layer 120 . After the etching is completed, both the trench 170 and the via 180 are filled with metal 122 (also referred to as via-filling plug 122 ), which is typically copper (Cu), to form a damascene structure 125 , as illustrated in FIG. 1C . FIGS. 1D-1F depict one problematic result that arises with known damascene processing techniques. Among other contaminants, copper oxide 121 is formed in the first level interconnect metal layer 120 by the oxidizing etchants conventionally used to open barrier layer 150 ′, as shown in FIG. 1D . Such damage to first level interconnect metal layer 120 often further includes undercutting (i.e., removal of material from first level interconnect metal layer 120 under barrier layer 150 ′) of the first level interconnect metal layer 120 near the edges of barrier layer 150 ′ (see also FIG. 1F ). Copper oxide and other contaminants must be removed prior to formation of the via-filling plug 122 , which is typically accomplished with a wet clean process. As shown in FIGS. 1E-1F , removal of copper oxide 121 in such a wet clean process sometimes causes voids 127 to occur during formation of the via-filling plug 122 . Such voids 127 compromise the reliability of the electrical connection between plug 122 and the first level interconnect metal layer 120 and are particularly likely to occur near or under the edges of the barrier layer 150 ′, as shown in FIGS. 1E-1F . FIG. 1F is a detail view of region 190 shown in FIG. 1E . FIG. 1F shows the aforementioned undercutting of first level interconnect metal layer 120 near the edges of barrier layer 150 ′, as well as voids 127 that can form due, at least in part, to such undercutting. In the past, hydrogen plasmas have been used after the wet clean process described above. However, such an approach is disadvantageous because the wet clean process selectively removes copper oxides 121 from first level interconnect metal layer 120 , thus giving rise to greater potential for incidence of voids 127 and other anomalies in subsequently formed metal-to-metal contacts, e.g., between via-filling plug 125 and first level interconnect metal layer 120 . The present invention advantageously overcomes this problem by at least partly reducing copper oxide to copper before the wet clean process, thus reducing the amount of copper material removed by the wet clean process and concomitantly improving the reliability of subsequently formed metallic connections. As mentioned above, copper interconnect is the most promising metallization scheme for the future generation high-speed ULSI, primarily because of lower electrical resistivity (1.7 vs. 2.3 μΩcm) and electro/stress-migration resistance than the conventional aluminum-based materials. However, copper metallization suffers from disadvantages, including those described above. As a result, in order to adopt copper interconnects for ULSI, suitable methods for improving the reliability of copper-to-copper contact in vias are needed. As mentioned above, of the several schemes proposed for fabricating copper interconnects, the most promising method appears to be the dual damascene process shown in FIGS. 1A-1C . Using this method, the trenches for conductors and holes for vias are patterned in blanket dielectrics, and then the desired metal is deposited into the trenches and holes in one step. Chemical mechanical planarization (CMP) is conventionally used to remove the unwanted surface metal extending over the uppermost dielectric, while leaving the desired metal in the trenches and vias. This leaves a planarized surface for subsequent metallization to build multilevel interconnect structures. Unfortunately, this technology not only uses a large amount of expensive consumables for the CMP process and the associated waste disposal problem but also is very wasteful of copper. Typically, the conductors and vias in a given metallization level occupy only a small proportion of the deposited copper, while the bulk of the copper is removed by CMP, rendering the technology very expensive. There is thus a strong economic incentive to minimize waste wherever possible, and losses that can occur due to defective metal-to-metal contact in vias are especially onerous because they occur and/or are discovered only after substantial fabrication is complete. The ordinarily skilled artisan will readily appreciate that a number of processes are known for forming dual damascene structures. For instance, trenches may be etched through the upper insulating layer, after which a further mask may be employed to etch the contact vias, or the etch continues through a previously defined, buried hard mask (the so-called “trench first” approach). Alternatively, vias may first be etched through the upper and lower insulating layers, after which the via in the upper insulating layer may be widened to form a trench (the so-called “via first” approach). The “via first” dual damascene approach has been widely adopted for small geometry devices. Due to the disadvantageous results (as depicted in FIGS. 1E-1F ) that can arise in conventional damascene techniques, great care is taken to minimize physical and chemical damage to the first level interconnect metal (copper) layer 120 . Nevertheless, known damascene techniques still frequently result in formation of voids 127 , which are undesirably detrimental to the integrity of the electrical connection between the first level interconnect metal layer 120 and the conductive via-filling plug 122 . It can thus be seen that a need exists for improved dual damascene processing techniques that provide improved electrical connections in vias.
|
10976349
| 2,004
|
Container and valve assembly for storing and dispensing substances, and related method
|
A container including a nozzle and body depending therefrom. The body is preferably tubular and defines an interior which retains a product to be dispensed. A cap engages the nozzle to prevent inadvertent release of the product. In order to dispense the product, the cap is removed and pressure is applied to the body and the nozzle allows release of the product. The nozzle releases the product without exposing the remaining product to the external atmosphere, thus the sterility of the interior of the body is maintained and the shelf life of the product is increased. The nozzle includes an inner body, coupled to the tubular body, surrounded by a flexible outer cover. A seam between the inner body and flexible outer cover forms a one-way release valve wherein a portion of the seam remains closed during dispensing the product.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The subject invention relates to containers for dispensing liquid, creamy, pasty or like products, and more particularly, to improved containers including one-way valves and collapsible and/or squeeze tubes that maintain the product in an airless and/or sterile condition during repeated dispensing, and to related methods of making and using such containers and valve assemblies. 2. Background of the Related Art Flexible tubes are used to store a variety of powder, liquid, gel, creamy and pasty products having a broad range of viscosities. Generally, the flexible tubes have a cover which is removed to expose a simple release aperture. As a result, low pressure is required to express the contents therein. Undesirable oozing and collection of product that can clog the release aperture is common. Moreover, when the traditional tube is opened, the contents are not only subject to the environment but a quantity of air is normally sucked into the tube. Hence, despite techniques for sterilizing foodstuffs and other products, even the use of preservatives cannot prevent degradation of many products, thereby limiting the shelf-life and range of products suitable for dispensing via tubes. For tubes which dispense multiple doses, even refrigeration after opening cannot prevent the subsequent degradation of the product. The perishable item still has a limited shelf life. In view of the above, one solution has been to provide sterile servings in smaller, portable quantities, such as individual serving packets of ketchup, mustard and mayonnaise. Similarly, many cosmetic, dermatological, pharmaceutical and/or cosmeceutical products and other substances are packaged in dispensers or other containers that expose the product to air after opening and/or initially dispensing the product. As a result, such products must include preservatives in order to prevent the product remaining in the container from spoiling or otherwise degrading between usages. In addition, such products typically must be used within a relatively short period of time after opening in order to prevent the product from spoiling or otherwise degrading before use. One of the drawbacks associated with preservatives is that they can cause an allergic or an otherwise undesirable reaction or effect on the user. In addition, the preservatives do not prevent the bulk product stored within the open container from collecting, and in some cases, facilitating the growth of germs. Many such prior art dispensers expose the bulk product contained within the dispenser after opening to air, and thus expose the bulk product to bacteria, germs and/or other impurities during and/or after application of the product, thereby allowing contamination of the product remaining in the dispenser and spreading of the bacteria, germs or impurities with subsequent use of the product. For example, liquid lipstick is particularly poorly suited for dispensing by prior art containers. The liquid lipstick becomes contaminated, evaporates due to air passage losing moisture, and ultimately is unusable if not unsafe before complete utilization of the product. The tips become contaminated, dirty and sticky or crusty as well as allowing the lipstick to continue to flow when not being used. In view of the above, several containers have been provided with closure devices such as one-way valves. One drawback associated with prior art dispensers including one-way valves is that the valves are frequently designed to work with mechanical pumps or like actuators that are capable of creating relatively high valve opening pressures. Exemplary dispensers of this type are illustrated in U.S. Pat. Nos. RE 37,047, 6,032,101, 5,944,702, and 5,746,728 and U.S. Publication Nos. US2002/0074362 A1, US2002/0017294 A1. Squeeze tube-type dispensers, on the other hand, are not capable of creating the necessary valve opening pressures, and therefore such prior art valves do not work effectively with squeeze tubes. Accordingly, it is an object of the present invention to overcome one or more of the above-described drawbacks and disadvantages of the prior art.
|
Title:
Container and valve assembly for storing and dispensing substances, and related method
Abstract:
A container including a nozzle and body depending therefrom. The body is preferably tubular and defines an interior which retains a product to be dispensed. A cap engages the nozzle to prevent inadvertent release of the product. In order to dispense the product, the cap is removed and pressure is applied to the body and the nozzle allows release of the product. The nozzle releases the product without exposing the remaining product to the external atmosphere, thus the sterility of the interior of the body is maintained and the shelf life of the product is increased. The nozzle includes an inner body, coupled to the tubular body, surrounded by a flexible outer cover. A seam between the inner body and flexible outer cover forms a one-way release valve wherein a portion of the seam remains closed during dispensing the product.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The subject invention relates to containers for dispensing liquid, creamy, pasty or like products, and more particularly, to improved containers including one-way valves and collapsible and/or squeeze tubes that maintain the product in an airless and/or sterile condition during repeated dispensing, and to related methods of making and using such containers and valve assemblies. 2. Background of the Related Art Flexible tubes are used to store a variety of powder, liquid, gel, creamy and pasty products having a broad range of viscosities. Generally, the flexible tubes have a cover which is removed to expose a simple release aperture. As a result, low pressure is required to express the contents therein. Undesirable oozing and collection of product that can clog the release aperture is common. Moreover, when the traditional tube is opened, the contents are not only subject to the environment but a quantity of air is normally sucked into the tube. Hence, despite techniques for sterilizing foodstuffs and other products, even the use of preservatives cannot prevent degradation of many products, thereby limiting the shelf-life and range of products suitable for dispensing via tubes. For tubes which dispense multiple doses, even refrigeration after opening cannot prevent the subsequent degradation of the product. The perishable item still has a limited shelf life. In view of the above, one solution has been to provide sterile servings in smaller, portable quantities, such as individual serving packets of ketchup, mustard and mayonnaise. Similarly, many cosmetic, dermatological, pharmaceutical and/or cosmeceutical products and other substances are packaged in dispensers or other containers that expose the product to air after opening and/or initially dispensing the product. As a result, such products must include preservatives in order to prevent the product remaining in the container from spoiling or otherwise degrading between usages. In addition, such products typically must be used within a relatively short period of time after opening in order to prevent the product from spoiling or otherwise degrading before use. One of the drawbacks associated with preservatives is that they can cause an allergic or an otherwise undesirable reaction or effect on the user. In addition, the preservatives do not prevent the bulk product stored within the open container from collecting, and in some cases, facilitating the growth of germs. Many such prior art dispensers expose the bulk product contained within the dispenser after opening to air, and thus expose the bulk product to bacteria, germs and/or other impurities during and/or after application of the product, thereby allowing contamination of the product remaining in the dispenser and spreading of the bacteria, germs or impurities with subsequent use of the product. For example, liquid lipstick is particularly poorly suited for dispensing by prior art containers. The liquid lipstick becomes contaminated, evaporates due to air passage losing moisture, and ultimately is unusable if not unsafe before complete utilization of the product. The tips become contaminated, dirty and sticky or crusty as well as allowing the lipstick to continue to flow when not being used. In view of the above, several containers have been provided with closure devices such as one-way valves. One drawback associated with prior art dispensers including one-way valves is that the valves are frequently designed to work with mechanical pumps or like actuators that are capable of creating relatively high valve opening pressures. Exemplary dispensers of this type are illustrated in U.S. Pat. Nos. RE 37,047, 6,032,101, 5,944,702, and 5,746,728 and U.S. Publication Nos. US2002/0074362 A1, US2002/0017294 A1. Squeeze tube-type dispensers, on the other hand, are not capable of creating the necessary valve opening pressures, and therefore such prior art valves do not work effectively with squeeze tubes. Accordingly, it is an object of the present invention to overcome one or more of the above-described drawbacks and disadvantages of the prior art.
|
10840660
| 2,004
|
Nanosized intermetallic powders
|
Nanoparticles of intermetallic alloys such as FeAl, Fe3Al, NiAl, TiAl and FeCoV exhibit a wide variety of interesting structural, magnetic, catalytic, resistive and electronic, and bar coding applications. The nanosized powders can be used to make structural parts having enhanced mechanical properties, magnetic parts having enhanced magnetic saturation, catalyst materials having enhanced catalytic activity, thick film circuit elements having enhanced resolution, and screen printed images such as magnetic bar codes having enhanced magnetic properties. In contrast to bulk FeAl materials which are nonmagnetic at room temperature, the FeAl nanoparticles exhibit magnetic properties at room temperature.
|
BACKGROUND Nanocrystalline materials such as nanocrystalline nickel have been reported to have uses such as wear resistant coatings, hydrogen storage materials, magnetic materials and catalysts for hydrogen evolution. See U.S. Pat. No. 5,352,266 wherein it is reported that nanocrystalline materials, nanophase materials or nanometer-sized crystalline materials can be prepared by sputtering, laser ablation, inert gas condensation, oven evaporation, spray conversion pyrolysis, flame hydrolysis, high speed deposition, high energy milling, sol-gel deposition and electrodeposition. In the field of catalysis, U.S. Pat. No. 5,547,649 discloses the use of nanocrystalline titania for hydrogen sulfide conversion. Nanocrystalline materials have been reportedly made from metals (e.g., M50 type steel, Pd, Cu, intermetallics (e.g., Al 52 Ti 48 )), semiconductors such as Si, metal carbonates such as ZnCO 3 , and metal oxides (e.g., SiO 2 , TiO 2 , Y 2 O 3 , ZnO, MgO, Al 2 O 3 ). See, for example, U.S. Pat. Nos. 5,580,655; 5,589,011; 5,695,617; 5,770,022; 5,876,683; 5,879,715; 5,891,548 and 5,962,132, the disclosures of which are hereby incorporated by reference. According to these patents, the production of nanocrystalline materials has been achieved by methods such as chemical synthesis, gas-phase synthesis, condensed phase synthesis, high speed deposition by ionized cluster beams, consolidation, high speed milling, deposition and sol-gel methods. One method reported in the literature for the synthesis of intermetallic nanocrystalline material is mechanical ball milling. (Jartych E., et al., J. Phys. Condens. Matter, 10:4929 (1998); Jartych E., et al., Nanostructured Materials, 12:927 (1999); Amilis, X., et al., Nanostructured Materials 12:801 (1999); Perez R. J., et al., Nanostructured Materials, 7:565 (1996)). Jartych et al. report preparation of nanocrystalline powders of Fe-30 at. % Al, Fe-40 at. % Al and Fe-50 at. % Al by ball milling, all of which were found to possess strong ferromagnetic interactions. (Jartych E., et al., J. Phys. Condens. Matter, 10:4929 (1998); Jartych E., et al., Nanostructured Materials, 12:927 (1999)). However, the authors reported that even after 800 hours of milling time, small quantities of α-Fe were still present in the samples as indicated by the hyperfine magnetic field distribution measurements. The presence of α-Fe is believed to produce defects and high strain levels within the milled material. Amilis and coworkers reported that the microhardness of ball milled Fe-40Al at % alloy directly correlated with defect concentration. (Amilis, X., et al., Nanostructured Materials 12:801 (1999)). They reported possible media contamination during the process of ball milling, which resulted in the presence of low concentrations of SiO 2 from the agate used for milling and presence of Fe 3 Al. Perez and coworkers reportedly synthesized nanocrystaline Fe-10 at. % Al using cryogenic milling at liquid nitrogen temperature. (Perez, R. J., et al., Nanostructured Materials, 7:565 (1996)). The thermal stability of the milled material was found to be significantly higher than that of Fe milled under analogous conditions. The authors speculated that this increase in stability might be due to the formation of fine dispersoids of γ-Al 2 O 3 or AlN, which would restrict the movement of the grain boundaries. In spite of the simplicity and efficiency of ball milling as a means by which nanocrystailine metallic alloys may be synthesized, there are some problems and limitations. For example, the microstructure of the milled products is very sensitive to the grinding conditions and may be unpredictably affected by unwanted contamination from the milling media and atmosphere. In addition, excessively long periods of milling time may be required. (Amilis, X., et al., Nanostructured Materials 12:801 (1999); Perez R. J., et al., Nanostructured Materials, 7:565 (1996)). A process for manufacturing a magnetic core made of an iron-based soft magnetic alloy having a nanocrystalline structure is disclosed in U.S. Pat. No. 5,922,143. Nanocrystalline alloys having magnetic properties are also disclosed in U.S. Pat. Nos. 5,340,413 and 5,611,871. U.S. Pat. No. 5,381,664 discloses a nanocomposite superparamagnetic material that includes nanosized particles of a magnetic component (rare earth and transition element) dispersed within a bulk matrix. In view of the state of the art of methods for preparing nanocrystalline powders, it would be desirable to develop uses of the nanocrystalline intermetallic powders in various fields of technology. The present invention provides a variety of new uses for nanosized powders, the new uses utilizing advantageous and/or unique properties of such nanosized powders.
|
Title:
Nanosized intermetallic powders
Abstract:
Nanoparticles of intermetallic alloys such as FeAl, Fe3Al, NiAl, TiAl and FeCoV exhibit a wide variety of interesting structural, magnetic, catalytic, resistive and electronic, and bar coding applications. The nanosized powders can be used to make structural parts having enhanced mechanical properties, magnetic parts having enhanced magnetic saturation, catalyst materials having enhanced catalytic activity, thick film circuit elements having enhanced resolution, and screen printed images such as magnetic bar codes having enhanced magnetic properties. In contrast to bulk FeAl materials which are nonmagnetic at room temperature, the FeAl nanoparticles exhibit magnetic properties at room temperature.
Background:
BACKGROUND Nanocrystalline materials such as nanocrystalline nickel have been reported to have uses such as wear resistant coatings, hydrogen storage materials, magnetic materials and catalysts for hydrogen evolution. See U.S. Pat. No. 5,352,266 wherein it is reported that nanocrystalline materials, nanophase materials or nanometer-sized crystalline materials can be prepared by sputtering, laser ablation, inert gas condensation, oven evaporation, spray conversion pyrolysis, flame hydrolysis, high speed deposition, high energy milling, sol-gel deposition and electrodeposition. In the field of catalysis, U.S. Pat. No. 5,547,649 discloses the use of nanocrystalline titania for hydrogen sulfide conversion. Nanocrystalline materials have been reportedly made from metals (e.g., M50 type steel, Pd, Cu, intermetallics (e.g., Al 52 Ti 48 )), semiconductors such as Si, metal carbonates such as ZnCO 3 , and metal oxides (e.g., SiO 2 , TiO 2 , Y 2 O 3 , ZnO, MgO, Al 2 O 3 ). See, for example, U.S. Pat. Nos. 5,580,655; 5,589,011; 5,695,617; 5,770,022; 5,876,683; 5,879,715; 5,891,548 and 5,962,132, the disclosures of which are hereby incorporated by reference. According to these patents, the production of nanocrystalline materials has been achieved by methods such as chemical synthesis, gas-phase synthesis, condensed phase synthesis, high speed deposition by ionized cluster beams, consolidation, high speed milling, deposition and sol-gel methods. One method reported in the literature for the synthesis of intermetallic nanocrystalline material is mechanical ball milling. (Jartych E., et al., J. Phys. Condens. Matter, 10:4929 (1998); Jartych E., et al., Nanostructured Materials, 12:927 (1999); Amilis, X., et al., Nanostructured Materials 12:801 (1999); Perez R. J., et al., Nanostructured Materials, 7:565 (1996)). Jartych et al. report preparation of nanocrystalline powders of Fe-30 at. % Al, Fe-40 at. % Al and Fe-50 at. % Al by ball milling, all of which were found to possess strong ferromagnetic interactions. (Jartych E., et al., J. Phys. Condens. Matter, 10:4929 (1998); Jartych E., et al., Nanostructured Materials, 12:927 (1999)). However, the authors reported that even after 800 hours of milling time, small quantities of α-Fe were still present in the samples as indicated by the hyperfine magnetic field distribution measurements. The presence of α-Fe is believed to produce defects and high strain levels within the milled material. Amilis and coworkers reported that the microhardness of ball milled Fe-40Al at % alloy directly correlated with defect concentration. (Amilis, X., et al., Nanostructured Materials 12:801 (1999)). They reported possible media contamination during the process of ball milling, which resulted in the presence of low concentrations of SiO 2 from the agate used for milling and presence of Fe 3 Al. Perez and coworkers reportedly synthesized nanocrystaline Fe-10 at. % Al using cryogenic milling at liquid nitrogen temperature. (Perez, R. J., et al., Nanostructured Materials, 7:565 (1996)). The thermal stability of the milled material was found to be significantly higher than that of Fe milled under analogous conditions. The authors speculated that this increase in stability might be due to the formation of fine dispersoids of γ-Al 2 O 3 or AlN, which would restrict the movement of the grain boundaries. In spite of the simplicity and efficiency of ball milling as a means by which nanocrystailine metallic alloys may be synthesized, there are some problems and limitations. For example, the microstructure of the milled products is very sensitive to the grinding conditions and may be unpredictably affected by unwanted contamination from the milling media and atmosphere. In addition, excessively long periods of milling time may be required. (Amilis, X., et al., Nanostructured Materials 12:801 (1999); Perez R. J., et al., Nanostructured Materials, 7:565 (1996)). A process for manufacturing a magnetic core made of an iron-based soft magnetic alloy having a nanocrystalline structure is disclosed in U.S. Pat. No. 5,922,143. Nanocrystalline alloys having magnetic properties are also disclosed in U.S. Pat. Nos. 5,340,413 and 5,611,871. U.S. Pat. No. 5,381,664 discloses a nanocomposite superparamagnetic material that includes nanosized particles of a magnetic component (rare earth and transition element) dispersed within a bulk matrix. In view of the state of the art of methods for preparing nanocrystalline powders, it would be desirable to develop uses of the nanocrystalline intermetallic powders in various fields of technology. The present invention provides a variety of new uses for nanosized powders, the new uses utilizing advantageous and/or unique properties of such nanosized powders.
|
10897274
| 2,004
|
Pseudo constant current multiple cell battery charger configured with a parallel topology
|
A multiple cell battery charger configured in a parallel topology provides constant current charging. The multiple cell battery charger requires fewer active components than known serial battery chargers, while at the same time preventing a thermal runaway condition. The multiple cell battery charger in accordance with the present invention is a constant voltage constant current battery charger that includes a regulator for providing a regulated source of direct current (DC) voltage to the battery cells to be charged. The battery charger also includes a pair of battery terminals coupled in series with a switching device, such as a field effect transistor (FET) and optionally a battery cell charging current sensing element, forming a charging circuit. In a charging mode, the serially connected FET conducts, thus enabling the battery cell to be charged. The FETs are controlled by a microprocessor that monitors the battery cell voltage and cell charging current and optionally the cell temperature. The microprocessor periodically adjusts the charging current of each cell to maintain a relatively constant current. When the microprocessor senses a voltage or temperature indicative that the battery cell is fully charged, the FET is turned off, thus disconnecting the battery cell from the circuit. Accordingly, the battery charger in accordance with the present invention utilizes fewer active components and is thus less expensive to manufacture than known battery chargers configured with a serial topography while at the same time providing constant current charging to avoid a thermal runaway condition.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a. battery charger and more particularly, to a battery charger for charging two or more rechargeable battery cells using a parallel battery charger topology which provides constant current charging. 2. Description of the Prior Art Various portable devices and appliances are known to use multiple rechargeable battery cells, such as AA and AAA battery cells. In order to facilitate charging of the battery cells for such multiple cell appliances, multiple cell battery chargers have been developed. Both parallel and series topologies are known for such multiple cell battery chargers. For example, U.S. Pat. Nos. 5,821,733 and 6,580,249, as well as published U.S. Patent Application U.S. 2003/0160593, disclose multiple cell battery chargers configured in a series topology. U.S. Pat. Nos. 6,034,506 and 6,586,909 as well as published U.S. Patent Application U.S. 2003/0117109 A1 disclose battery chargers configured in a parallel topology. In multiple cell battery chargers configured in a series topology, a series charging current is applied to a plurality of serially coupled battery cells. Because the internal resistance and charge on the individual cells may vary during charging, it is necessary with such battery chargers to monitor the voltage across and/or temperature of each cell in order to avoid overcharging any of the serially connected cells. In the event that an over-voltage condition is sensed, it is necessary to shunt charging current around the cell to prevent overcharging of any of the individual serially connected cells. Thus, such multiple cell battery chargers normally include a parallel shunt around each of the serially connected cells. As such, when a battery cell becomes fully charged, additional charging current is thus shunted around the cell to prevent overcharging and possible damage to the cell. In addition, it is necessary to prevent discharge of such serially connected battery cells when such cells are not being charged. Various embodiments of a multiple cell battery charger configured with a serial charging topography are disclosed in the '733 patent. In one embodiment, a Zener diode is connected in parallel across each of the serially connected battery cells. The Zener diode is selected so that its breakdown voltage is essentially equivalent to the fully-charged voltage of the battery cell. Thus, when any of the cells become fully charged, the Zener diode conducts and shunts current around that cell to prevent further charging of the battery cell. Unfortunately, the Zener diode does not provide relatively accurate control of the switching voltage. In an alternate embodiment of the battery charger disclosed in the '733 patent, a multiple cell battery charger with a series topology is disclosed in which a field effect transistors (FET) are used in place of the Zener diodes to shunt current around the battery cells. In that embodiment, the voltage across each of the serially connected cells is monitored. When the voltage measurements indicate that the cell is fully charged, the FET is turned on to shunt additional charging current around the fully charged cell. In order to prevent discharge of battery cells, isolation switches, formed from additional FETs, are used. These isolation switches simply disconnect the charging circuit from the individual battery cells during a condition when the cells are not being charged. U.S. Pat. No. 6,580,249 and published U.S. Patent Application No. U.S. 2003/01605393 A1 also disclosed multiple cell battery chargers configured in a serial topology. The multiple cell battery chargers disclosed in these publications also include a shunt device, connected in parallel around each of the serially coupled battery cells. In these embodiments, FETs are used for the shunts. The FETs are under the control of a microprocessor. Essentially, the microprocessor monitors the voltage and temperature of each of the serially connected cells. When the microprocessor senses that the cell voltage or temperature of any cell is above a predetermined threshold indicative that the cell is fully charged, the microprocessor turns on the FET, thus shunting charging current around that particular battery cell. In order to prevent discharge of the serially connected cells when no power is applied to the battery charger, blocking devices, such as diodes, are used. Although such multiple cell battery chargers configured in a series topology are able to simultaneously charge multiple battery cells without damage, such battery chargers are as discussed above, not without problems. For example, such multiple cell battery chargers require at least two active components, namely, either a Zener diode or a FET as a shunt and either a FET or diode for isolation to prevent discharge. The need for at least two active devices drives up the cost of such multiple battery cell chargers. In order to avoid the problems associated with multiple cell series battery chargers, multiple cell battery chargers configured in a parallel topology are known to be used. Examples of such parallel chargers are disclosed in U.S. Pat. Nos. 6,034,506 and 6,586,909, as well as U.S. Published Patent Application No. U.S. 2003/0117109. U.S. Pat. No. 6,586,909 and published U.S. Application No. U.S. 2003/0117109 discloses a multiple cell battery chargers for use in charging industrial high capacity electrochemical batteries. These publications disclose the use of a transformer having a single primary and multiple balanced secondary windings that are magnetically coupled together by way of an induction core. Each battery cell is charged by way of a regulator, coupled to one of the multiple secondary windings. While such a configuration may be suitable for large industrial applications, it is practically not suitable for use in charging appliance size batteries, such as, AA and AAA batteries. Finally, U.S. Pat. No. 6,034,506 discloses a multiple cell battery charger for charging multiple lithium ion cells in parallel. As shown best in FIG. 3 of the '506 patent, a plurality of serially connected lithium ion battery cells are connected together forming a module. Multiple modules are connected in series and in parallel as shown in FIG. 2 of the '506 patent. Three isolation devices are required for each cell making the topology disclosed in the '506 patent even more expensive to manufacture than the series battery chargers discussed above. Another problem associated with parallel battery chargers is thermal runaway. In particular, it is known parallel battery chargers provide constant potential charging. With such constant potential charging, as the cell voltage increases, the temperature and charging current of the cell also increase. Continued constant potential charging of the battery cell causes the current to continue to rise as well as the rate of change of the temperature to increase significantly, resulting in a thermal runaway condition. Thus, there is a need for a battery charger which requires fewer active components than known battery chargers and is thus less expensive to manufacture and also avoids a thermal runaway condition.
|
Title:
Pseudo constant current multiple cell battery charger configured with a parallel topology
Abstract:
A multiple cell battery charger configured in a parallel topology provides constant current charging. The multiple cell battery charger requires fewer active components than known serial battery chargers, while at the same time preventing a thermal runaway condition. The multiple cell battery charger in accordance with the present invention is a constant voltage constant current battery charger that includes a regulator for providing a regulated source of direct current (DC) voltage to the battery cells to be charged. The battery charger also includes a pair of battery terminals coupled in series with a switching device, such as a field effect transistor (FET) and optionally a battery cell charging current sensing element, forming a charging circuit. In a charging mode, the serially connected FET conducts, thus enabling the battery cell to be charged. The FETs are controlled by a microprocessor that monitors the battery cell voltage and cell charging current and optionally the cell temperature. The microprocessor periodically adjusts the charging current of each cell to maintain a relatively constant current. When the microprocessor senses a voltage or temperature indicative that the battery cell is fully charged, the FET is turned off, thus disconnecting the battery cell from the circuit. Accordingly, the battery charger in accordance with the present invention utilizes fewer active components and is thus less expensive to manufacture than known battery chargers configured with a serial topography while at the same time providing constant current charging to avoid a thermal runaway condition.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a. battery charger and more particularly, to a battery charger for charging two or more rechargeable battery cells using a parallel battery charger topology which provides constant current charging. 2. Description of the Prior Art Various portable devices and appliances are known to use multiple rechargeable battery cells, such as AA and AAA battery cells. In order to facilitate charging of the battery cells for such multiple cell appliances, multiple cell battery chargers have been developed. Both parallel and series topologies are known for such multiple cell battery chargers. For example, U.S. Pat. Nos. 5,821,733 and 6,580,249, as well as published U.S. Patent Application U.S. 2003/0160593, disclose multiple cell battery chargers configured in a series topology. U.S. Pat. Nos. 6,034,506 and 6,586,909 as well as published U.S. Patent Application U.S. 2003/0117109 A1 disclose battery chargers configured in a parallel topology. In multiple cell battery chargers configured in a series topology, a series charging current is applied to a plurality of serially coupled battery cells. Because the internal resistance and charge on the individual cells may vary during charging, it is necessary with such battery chargers to monitor the voltage across and/or temperature of each cell in order to avoid overcharging any of the serially connected cells. In the event that an over-voltage condition is sensed, it is necessary to shunt charging current around the cell to prevent overcharging of any of the individual serially connected cells. Thus, such multiple cell battery chargers normally include a parallel shunt around each of the serially connected cells. As such, when a battery cell becomes fully charged, additional charging current is thus shunted around the cell to prevent overcharging and possible damage to the cell. In addition, it is necessary to prevent discharge of such serially connected battery cells when such cells are not being charged. Various embodiments of a multiple cell battery charger configured with a serial charging topography are disclosed in the '733 patent. In one embodiment, a Zener diode is connected in parallel across each of the serially connected battery cells. The Zener diode is selected so that its breakdown voltage is essentially equivalent to the fully-charged voltage of the battery cell. Thus, when any of the cells become fully charged, the Zener diode conducts and shunts current around that cell to prevent further charging of the battery cell. Unfortunately, the Zener diode does not provide relatively accurate control of the switching voltage. In an alternate embodiment of the battery charger disclosed in the '733 patent, a multiple cell battery charger with a series topology is disclosed in which a field effect transistors (FET) are used in place of the Zener diodes to shunt current around the battery cells. In that embodiment, the voltage across each of the serially connected cells is monitored. When the voltage measurements indicate that the cell is fully charged, the FET is turned on to shunt additional charging current around the fully charged cell. In order to prevent discharge of battery cells, isolation switches, formed from additional FETs, are used. These isolation switches simply disconnect the charging circuit from the individual battery cells during a condition when the cells are not being charged. U.S. Pat. No. 6,580,249 and published U.S. Patent Application No. U.S. 2003/01605393 A1 also disclosed multiple cell battery chargers configured in a serial topology. The multiple cell battery chargers disclosed in these publications also include a shunt device, connected in parallel around each of the serially coupled battery cells. In these embodiments, FETs are used for the shunts. The FETs are under the control of a microprocessor. Essentially, the microprocessor monitors the voltage and temperature of each of the serially connected cells. When the microprocessor senses that the cell voltage or temperature of any cell is above a predetermined threshold indicative that the cell is fully charged, the microprocessor turns on the FET, thus shunting charging current around that particular battery cell. In order to prevent discharge of the serially connected cells when no power is applied to the battery charger, blocking devices, such as diodes, are used. Although such multiple cell battery chargers configured in a series topology are able to simultaneously charge multiple battery cells without damage, such battery chargers are as discussed above, not without problems. For example, such multiple cell battery chargers require at least two active components, namely, either a Zener diode or a FET as a shunt and either a FET or diode for isolation to prevent discharge. The need for at least two active devices drives up the cost of such multiple battery cell chargers. In order to avoid the problems associated with multiple cell series battery chargers, multiple cell battery chargers configured in a parallel topology are known to be used. Examples of such parallel chargers are disclosed in U.S. Pat. Nos. 6,034,506 and 6,586,909, as well as U.S. Published Patent Application No. U.S. 2003/0117109. U.S. Pat. No. 6,586,909 and published U.S. Application No. U.S. 2003/0117109 discloses a multiple cell battery chargers for use in charging industrial high capacity electrochemical batteries. These publications disclose the use of a transformer having a single primary and multiple balanced secondary windings that are magnetically coupled together by way of an induction core. Each battery cell is charged by way of a regulator, coupled to one of the multiple secondary windings. While such a configuration may be suitable for large industrial applications, it is practically not suitable for use in charging appliance size batteries, such as, AA and AAA batteries. Finally, U.S. Pat. No. 6,034,506 discloses a multiple cell battery charger for charging multiple lithium ion cells in parallel. As shown best in FIG. 3 of the '506 patent, a plurality of serially connected lithium ion battery cells are connected together forming a module. Multiple modules are connected in series and in parallel as shown in FIG. 2 of the '506 patent. Three isolation devices are required for each cell making the topology disclosed in the '506 patent even more expensive to manufacture than the series battery chargers discussed above. Another problem associated with parallel battery chargers is thermal runaway. In particular, it is known parallel battery chargers provide constant potential charging. With such constant potential charging, as the cell voltage increases, the temperature and charging current of the cell also increase. Continued constant potential charging of the battery cell causes the current to continue to rise as well as the rate of change of the temperature to increase significantly, resulting in a thermal runaway condition. Thus, there is a need for a battery charger which requires fewer active components than known battery chargers and is thus less expensive to manufacture and also avoids a thermal runaway condition.
|
10864201
| 2,004
|
Generalized polyphase channelization system
|
A computation efficient polyphase channelization system enables one of many user FDMA signals to be channelized through multiple FFT response frequency bands forming an aggregate frequency band where K-point FFT channels are greater than the decimation factor M to produce FFT overlapped responses that have a smooth aggregate response without disjointed band gaps for reduced distortion using a clockwise commutator having M channels feeding M filter blocks, each of which having β polyphase filters, and having a ring switch to provide smooth filter responses that then drive β K-point FFTs to provide a β set of K vector FFT responses that are then combined in a post processing system for producing K channelized outputs.
|
BACKGROUND OF THE INVENTION The present and future generations of satellites need to operate with small earth terminals such as mobile vehicle or hand held terminals. Such satellites need to be user oriented in that the user terminal needs to be relatively less complex, using low power, having low weight and low cost. Such requirement may be achieved at the cost of increasing the complexity, such as with space borne equipment and the central earth stations. Present day technology involves such processing on board the satellite. An example of such a system is mobile messaging service via satellites. In such a system, a forward link takes messages from an earth station to the satellite, which retransmits to the mobiles over spot beams. The return link begins at the mobiles, goes up to the satellite and terminates at the earth station. In such a system, the types of transmitter and receivers in the forward and reverse links may be different. Thus the optimum uplink and downlink designs to and from the mobiles and the earth stations may be very different requiring frequency translation achieved by channelization. In the case of a multiple access communications system, the uplink uses frequency division multiple access (FDMA) signaling with low cost and low complexity terminals while the downlink uses time division multiple access (TDMA) signaling to maximize the satellite radiated power without intermodulation noise. In such systems, the small earth terminals do not need the capability of transmitting at very high burst rate and stringent satellite frame synchronization capabilities necessary for TDMA transmitter. In another multiple access system, uplink is based on random access technique while the downlink uses TDMA. In terms of modulation, all such multiple access systems make use of digital techniques with inherent advantages in terms of power efficiency, flexibility, error correction and detection coding and encryption. The feasibility of mixed mode multiple accessing techniques requires efficient means of translation between the two formats of multiple access system. Although analog techniques are in principle straightforward, in terms of implementation considerations of size, weight, cost, and flexibility, direct digital method are expected to achieve higher performance. Digital techniques can also fully exploit advances in VLSI and ASIC technologies to achieve these speed and costs objectives. Such translation may involve conversion of an FDMA signal into a TDM multiplexed signal, which may then go through a digital switch to various TDMA carriers being transmitted over the spot beams. Such digital translation techniques are also useful in the switching of FDMA carriers to different spot beams with out requiring arrays of analog bandpass filters and converters. There are several techniques for direct digital translation and switching using a channelization method where a wide band signal is channelized and individual channels are respectively processed. Optimum system design in such cases may involve different multiple accessing techniques on the uplink and downlink. The feasibility of mixed mode multiple accessing techniques requires an efficient means of translation between the two formats of multiple accessing communication systems. There are several digital techniques available for translation, that is channelization, namely, an analytical signal method, a polyphase Discrete Fourier Transform (DFT) method, a frequency domain FFT filtering method, weight, overlap and add (WOLA) method, and a tree filter multistage bank method. The analytical signal method, frequency domain FFT filtering method, and the multistage filtering method are computationally complex, the weight, overlap and add method involves processing of the input signal in blocks. Among these prior methods, the polyphase DFT method is the most efficient in terms of computational efficiencies and processes the input signal on a sample-by-sample basis. In terms of computational efficiency and the ease of sample-by-sample processing, the polyphase DFT approach is the most attractive as the number of computations required per sample of the input signal processing increases linearly with log 2 K where K is the number of channels. However, the polyphase channelizer that possesses this computational advantage is only applicable to the case where K is equal to the decimation factor M or an integer multiple. There are many significant applications where K is not equal to M or an integer multiple and it is desirable to achieve the same computational advantage as for the case of K equal to M. The conventional polyphase DFT communication channelizer includes an analyzer for channelization and a synthesizer for dechannelization. The conventional polyphase DFT analyzer includes a front end complex downconverter for downconverting an input wideband signal into a complex input fed into an input clockwise commutator for round robin sampling for providing M channelized outputs. The M channelized outputs are fed into a filter bank of K filters to provide K filtered outputs to an FFT, the FFT outputs constitute the K channelized outputs. The input to the analyzer is the sampled version of the multiplexed signal comprising K channel signals. This polyphase DFT analyzer is computationally efficient where M=K providing a homogenous mapping between the M commutator output the K number of filters in the filter bank. That is, the polyphase analyzer includes a commutator followed by a bank of polyphase filters having filter outputs that are processed by the FFT processor. The FFT processor outputs are the desired K channels. All of the channel signals have equal one-sided bandwidth of B Hz. The sampled input is an analytic complex signal that may be obtained by a Hilbert transform operation on the real IF bandpass signal. In the polyphase analyzer for the case of K=M, all of the K channels share a common polyphase filter bank. The i th polyphase branch filter has a impulse response {overscore (p)} i (m) given by {overscore (p)} i (m)=h(mM−i) for i=0, 1, . . . , M−1, where h is the impulse response of the desired analyzer prototype low pass filter. Similarly, the polyphase synthesizer includes an inverse FFT processor, followed by a set of polyphase filters whose outputs are combined by a commutator to yield the desired synthesized multiplexed signal. The inverse FFT providing M inverse transformed outputs to a bank of filters having M filter outputs feeding a commutator for combining the M filter outputs into a complex output. The commutator provides the complex output that is then upconverted by an upconverter for forming a wideband output. In the polyphase synthesizer, all of the K channels share a polyphase filter bank with the i th polyphase filter impulse response q i (m) given by q i (m)=f(mM+i) for i=0, 1, . . . , M−1 where f is the desired synthesizer prototype low pass filter impulse response. The total number of real multiplications required per second per channel are given by a M PDFT multiplication equation. In the M PDFT multiplication equation, the terms δ 1 and δ 2 are constants, the term B is the bandwidth, and the term w is the channel center frequency spacing. M PDFT = 2 w [ [ 2 3 log [ 1 / ( 10 δ 1 δ 2 ) ] ] ( w - 2 B ) + 4 log 2 ( K ) ) ] However, the standard polyphase analyzer and synthesizer architecture is applicable to the case when the number of channels K is equal to the decimation factor M. When some user signals require larger frequency bands compared to other user signals, in principle, the user signal requiring larger frequency band may be allocated more than one adjacent channels out of K number of channels each of the same bandwidth. However, the filter roll off near the edges of the channels introduces band gaps among adjacent channels thus causing band gaps in the frequency band of the user allocated multiple channels which in turn causes distortion in the user signal. To avoid the problem of band gaps in the frequency band of the user with multiple channel allocation, it is desirable to introduce some overlap among the frequency response of adjacent channels. The said overlap is achieved by selecting the number of channels K greater than the decimation factor M. The selection of K greater than M thus provides signal fidelity to users assigned with multiple of the K channels. In the case when K>M, it is desirable to have similar computational and sample-by-sample processing advantages of the conventional polyphase architecture. Hence, it desirable to have a computationally efficient polyphase channelization system with a sample-by-sample processing architecture for the complex case where the number of channels K is not integrally related to the decimation factor M of the channelizer. Various modifications for the case when K is not integrally related to M, do not have the sample-by-sample processing and computational advantages of the conventional polyphase DFT method where essentially one filter operating at a single channel rate filters all the channels. In the case when some users require assignment of multiple channels, there is significant band gap and consequential distortion in the channelized signals when K is selected equal to M. These and other disadvantages are solved or reduced using the invention.
|
Title:
Generalized polyphase channelization system
Abstract:
A computation efficient polyphase channelization system enables one of many user FDMA signals to be channelized through multiple FFT response frequency bands forming an aggregate frequency band where K-point FFT channels are greater than the decimation factor M to produce FFT overlapped responses that have a smooth aggregate response without disjointed band gaps for reduced distortion using a clockwise commutator having M channels feeding M filter blocks, each of which having β polyphase filters, and having a ring switch to provide smooth filter responses that then drive β K-point FFTs to provide a β set of K vector FFT responses that are then combined in a post processing system for producing K channelized outputs.
Background:
BACKGROUND OF THE INVENTION The present and future generations of satellites need to operate with small earth terminals such as mobile vehicle or hand held terminals. Such satellites need to be user oriented in that the user terminal needs to be relatively less complex, using low power, having low weight and low cost. Such requirement may be achieved at the cost of increasing the complexity, such as with space borne equipment and the central earth stations. Present day technology involves such processing on board the satellite. An example of such a system is mobile messaging service via satellites. In such a system, a forward link takes messages from an earth station to the satellite, which retransmits to the mobiles over spot beams. The return link begins at the mobiles, goes up to the satellite and terminates at the earth station. In such a system, the types of transmitter and receivers in the forward and reverse links may be different. Thus the optimum uplink and downlink designs to and from the mobiles and the earth stations may be very different requiring frequency translation achieved by channelization. In the case of a multiple access communications system, the uplink uses frequency division multiple access (FDMA) signaling with low cost and low complexity terminals while the downlink uses time division multiple access (TDMA) signaling to maximize the satellite radiated power without intermodulation noise. In such systems, the small earth terminals do not need the capability of transmitting at very high burst rate and stringent satellite frame synchronization capabilities necessary for TDMA transmitter. In another multiple access system, uplink is based on random access technique while the downlink uses TDMA. In terms of modulation, all such multiple access systems make use of digital techniques with inherent advantages in terms of power efficiency, flexibility, error correction and detection coding and encryption. The feasibility of mixed mode multiple accessing techniques requires efficient means of translation between the two formats of multiple access system. Although analog techniques are in principle straightforward, in terms of implementation considerations of size, weight, cost, and flexibility, direct digital method are expected to achieve higher performance. Digital techniques can also fully exploit advances in VLSI and ASIC technologies to achieve these speed and costs objectives. Such translation may involve conversion of an FDMA signal into a TDM multiplexed signal, which may then go through a digital switch to various TDMA carriers being transmitted over the spot beams. Such digital translation techniques are also useful in the switching of FDMA carriers to different spot beams with out requiring arrays of analog bandpass filters and converters. There are several techniques for direct digital translation and switching using a channelization method where a wide band signal is channelized and individual channels are respectively processed. Optimum system design in such cases may involve different multiple accessing techniques on the uplink and downlink. The feasibility of mixed mode multiple accessing techniques requires an efficient means of translation between the two formats of multiple accessing communication systems. There are several digital techniques available for translation, that is channelization, namely, an analytical signal method, a polyphase Discrete Fourier Transform (DFT) method, a frequency domain FFT filtering method, weight, overlap and add (WOLA) method, and a tree filter multistage bank method. The analytical signal method, frequency domain FFT filtering method, and the multistage filtering method are computationally complex, the weight, overlap and add method involves processing of the input signal in blocks. Among these prior methods, the polyphase DFT method is the most efficient in terms of computational efficiencies and processes the input signal on a sample-by-sample basis. In terms of computational efficiency and the ease of sample-by-sample processing, the polyphase DFT approach is the most attractive as the number of computations required per sample of the input signal processing increases linearly with log 2 K where K is the number of channels. However, the polyphase channelizer that possesses this computational advantage is only applicable to the case where K is equal to the decimation factor M or an integer multiple. There are many significant applications where K is not equal to M or an integer multiple and it is desirable to achieve the same computational advantage as for the case of K equal to M. The conventional polyphase DFT communication channelizer includes an analyzer for channelization and a synthesizer for dechannelization. The conventional polyphase DFT analyzer includes a front end complex downconverter for downconverting an input wideband signal into a complex input fed into an input clockwise commutator for round robin sampling for providing M channelized outputs. The M channelized outputs are fed into a filter bank of K filters to provide K filtered outputs to an FFT, the FFT outputs constitute the K channelized outputs. The input to the analyzer is the sampled version of the multiplexed signal comprising K channel signals. This polyphase DFT analyzer is computationally efficient where M=K providing a homogenous mapping between the M commutator output the K number of filters in the filter bank. That is, the polyphase analyzer includes a commutator followed by a bank of polyphase filters having filter outputs that are processed by the FFT processor. The FFT processor outputs are the desired K channels. All of the channel signals have equal one-sided bandwidth of B Hz. The sampled input is an analytic complex signal that may be obtained by a Hilbert transform operation on the real IF bandpass signal. In the polyphase analyzer for the case of K=M, all of the K channels share a common polyphase filter bank. The i th polyphase branch filter has a impulse response {overscore (p)} i (m) given by {overscore (p)} i (m)=h(mM−i) for i=0, 1, . . . , M−1, where h is the impulse response of the desired analyzer prototype low pass filter. Similarly, the polyphase synthesizer includes an inverse FFT processor, followed by a set of polyphase filters whose outputs are combined by a commutator to yield the desired synthesized multiplexed signal. The inverse FFT providing M inverse transformed outputs to a bank of filters having M filter outputs feeding a commutator for combining the M filter outputs into a complex output. The commutator provides the complex output that is then upconverted by an upconverter for forming a wideband output. In the polyphase synthesizer, all of the K channels share a polyphase filter bank with the i th polyphase filter impulse response q i (m) given by q i (m)=f(mM+i) for i=0, 1, . . . , M−1 where f is the desired synthesizer prototype low pass filter impulse response. The total number of real multiplications required per second per channel are given by a M PDFT multiplication equation. In the M PDFT multiplication equation, the terms δ 1 and δ 2 are constants, the term B is the bandwidth, and the term w is the channel center frequency spacing. M PDFT = 2 w [ [ 2 3 log [ 1 / ( 10 δ 1 δ 2 ) ] ] ( w - 2 B ) + 4 log 2 ( K ) ) ] However, the standard polyphase analyzer and synthesizer architecture is applicable to the case when the number of channels K is equal to the decimation factor M. When some user signals require larger frequency bands compared to other user signals, in principle, the user signal requiring larger frequency band may be allocated more than one adjacent channels out of K number of channels each of the same bandwidth. However, the filter roll off near the edges of the channels introduces band gaps among adjacent channels thus causing band gaps in the frequency band of the user allocated multiple channels which in turn causes distortion in the user signal. To avoid the problem of band gaps in the frequency band of the user with multiple channel allocation, it is desirable to introduce some overlap among the frequency response of adjacent channels. The said overlap is achieved by selecting the number of channels K greater than the decimation factor M. The selection of K greater than M thus provides signal fidelity to users assigned with multiple of the K channels. In the case when K>M, it is desirable to have similar computational and sample-by-sample processing advantages of the conventional polyphase architecture. Hence, it desirable to have a computationally efficient polyphase channelization system with a sample-by-sample processing architecture for the complex case where the number of channels K is not integrally related to the decimation factor M of the channelizer. Various modifications for the case when K is not integrally related to M, do not have the sample-by-sample processing and computational advantages of the conventional polyphase DFT method where essentially one filter operating at a single channel rate filters all the channels. In the case when some users require assignment of multiple channels, there is significant band gap and consequential distortion in the channelized signals when K is selected equal to M. These and other disadvantages are solved or reduced using the invention.
|
10972367
| 2,004
|
Magnetic head supporting mechanism
|
A magnetic head supporting mechanism includes a head positioning actuator having an arm, and a load beam connected to the arm. The load beam has a gimbal. The gimbal includes a magnetic head slider fixing portion on which a magnetic head slider having a magnetic head is mounted, a first pair of beams extending from opposite sides of the magnetic head slider fixing portion along a traverse direction of the load beam perpendicular to a longitudinal direction thereof, and a second pair of beams respectively connected to the first pair of beams and extending so as to face the opposite sides of the magnetic head slider fixing portion.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a magnetic head supporting mechanism used for a magnetic disk drive. 2. Description of the Prior Art A magnetic head slider on which a magnetic head is mounted is attached to a free end of a load beam, and is maintained, during a recording/reproducing operation, in a state in which the magnetic head slider flies above a magnetic disk. Recently, it has been required to improve an HDI (Head Disk Interface) characteristic, which is one of the parameters describing the reliability of magnetic disk drives. In order to meet the above requirement, it is effective to diminish the magnetic head slider or reduce a spring force urging the magnetic head slider towards the magnetic disk. The following event will occur when the magnetic head slider is diminished. It is necessary to reduce the size of a supporting spring which holds the magnetic head slider as the slider is reduced in size. This is intended to keep the follow-up characteristic with respect to waviness of the disk and maintain the flying stability of the head. The following event will occur when the spring force on the head slider is reduced. That is, the flying stiffness of the head is degraded due to reduction of the spring force on the head slider. Further, assembly errors are increased because parts, such as a slider and a supporting spring are diminished. With the above in mind, it is necessary for a device for supporting a magnetic head slider to have a mechanism capable of sufficiently ensuring the flying stability of the magnetic head slider. Conventionally, the magnetic head supporting mechanism is made up of a load beam, a gimbal fixed to the load beam, and a magnetic head slider fixed to the gimbal. With the above structure, it is more difficult to assemble (position) these parts as the size of the parts is reduced. When there is an assembly error, the magnetic head slider is maintained in an unbalance flying state in which the slider flies in a tilted state. Hence, the reliability of the flying head is degraded and further the read/write characteristics are also degraded. As a result, the reliability of the magnetic disk drive is degraded. In order to eliminate the factors causing the unbalanced flying due to the assembly error of the head supporting mechanism, Japanese Patent Laid-Open Application No. 3-189976 proposes an improvement in which an integrally formed supporting spring corresponding to the conventional load beam and gimbal is used and assembly is no longer needed. FIG. 1 shows a magnetic head supporting mechanism 1 disclosed in the above application document. The magnetic head supporting mechanism 1 includes a load arm 3 and a load beam 4 (which is also referred to as a flexure). The load beam 4 includes a gimbal 5 , which has openings (through holes) 6 and 7 having a substantially C shape. Further, the gimbal 5 includes a beam 8 supported at both ends in a direction in which the beam 8 traverses the load beam 4 , and tongue portions 9 and 10 extending from the beam 8 . The back surface of the magnetic head slider 11 is formed so that grooves are formed in the width direction of the load beam 4 . The magnetic head slider 11 can be rotated together with a twist of the beam 8 in a pitching direction indicated by an arrow 12 , and can be rotated together with a bend of the beam 8 in a rolling direction indicated by an arrow 13 . It is necessary to reduce the rotation stiffness of the gimbal 5 in order to ensure the flying stability of the compact magnetic head slider. Further, it is impossible to reduce the thickness t of the gimbal 5 having the above structure because the load beam 4 needs to be stiff. In order to reduce the rotation stiffness of the gimbal 5 without reducing the thickness t of the load beam 4 , it is necessary to lengthen the length l of the beam 8 . If the load beam 4 and the gimbal 5 are made to have different thicknesses, it is necessary to a complex process in which only the gimbal 5 is half etched, while the load beam is not processed. However, it is very difficult to obtain a desired precision in thickness by the above process and to obtain desirable characteristics. If the length l of the beam 8 is increased, the following disadvantages will occur. First, the resonance point (frequency) of vibration of the twist and bend of the beam 8 will greatly becomes lower, and it becomes likely that the degree of flying of the magnetic head slider 11 is varied. Second, the width W of the load beam 4 increases, and hence the resonance frequency of vibration of the load beam 4 itself will becomes lower. Thus, the flying magnetic head slider 11 becomes unstable. Consequently, when the integrally formed supporting spring having the integrated load beam and gimbal is used, it is very difficult to realize a structure of the integrated supporting spring in which only the rotation stiffness is reduced without decreasing the resonance frequency of the gimbal. It becomes impossible to neglect the influence of lead wires connected to the head because of degradation of the airbearing stiffness caused by down-sizing of the slider and reduction in the load force on the head slider. More particularly, the slider is affected by the stiffness of the lead wires and may cause the slider to fly in the tilt state. Particularly, when a magneto-resistive effect type head (MR head) is used as a reproduction head, such a head is combined with an interactive type head. Hence, four lead wires equal to twice the number of lead wires for the conventional recording/reproducing head are needed. Use of the four lead wires increases the influence of the stiffness of the lead wires. This degrades not only the reliability of the flying head but also the read/write characteristics. Hence, the magnetic disk drive does not have a satisfactory reliability.
|
Title:
Magnetic head supporting mechanism
Abstract:
A magnetic head supporting mechanism includes a head positioning actuator having an arm, and a load beam connected to the arm. The load beam has a gimbal. The gimbal includes a magnetic head slider fixing portion on which a magnetic head slider having a magnetic head is mounted, a first pair of beams extending from opposite sides of the magnetic head slider fixing portion along a traverse direction of the load beam perpendicular to a longitudinal direction thereof, and a second pair of beams respectively connected to the first pair of beams and extending so as to face the opposite sides of the magnetic head slider fixing portion.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a magnetic head supporting mechanism used for a magnetic disk drive. 2. Description of the Prior Art A magnetic head slider on which a magnetic head is mounted is attached to a free end of a load beam, and is maintained, during a recording/reproducing operation, in a state in which the magnetic head slider flies above a magnetic disk. Recently, it has been required to improve an HDI (Head Disk Interface) characteristic, which is one of the parameters describing the reliability of magnetic disk drives. In order to meet the above requirement, it is effective to diminish the magnetic head slider or reduce a spring force urging the magnetic head slider towards the magnetic disk. The following event will occur when the magnetic head slider is diminished. It is necessary to reduce the size of a supporting spring which holds the magnetic head slider as the slider is reduced in size. This is intended to keep the follow-up characteristic with respect to waviness of the disk and maintain the flying stability of the head. The following event will occur when the spring force on the head slider is reduced. That is, the flying stiffness of the head is degraded due to reduction of the spring force on the head slider. Further, assembly errors are increased because parts, such as a slider and a supporting spring are diminished. With the above in mind, it is necessary for a device for supporting a magnetic head slider to have a mechanism capable of sufficiently ensuring the flying stability of the magnetic head slider. Conventionally, the magnetic head supporting mechanism is made up of a load beam, a gimbal fixed to the load beam, and a magnetic head slider fixed to the gimbal. With the above structure, it is more difficult to assemble (position) these parts as the size of the parts is reduced. When there is an assembly error, the magnetic head slider is maintained in an unbalance flying state in which the slider flies in a tilted state. Hence, the reliability of the flying head is degraded and further the read/write characteristics are also degraded. As a result, the reliability of the magnetic disk drive is degraded. In order to eliminate the factors causing the unbalanced flying due to the assembly error of the head supporting mechanism, Japanese Patent Laid-Open Application No. 3-189976 proposes an improvement in which an integrally formed supporting spring corresponding to the conventional load beam and gimbal is used and assembly is no longer needed. FIG. 1 shows a magnetic head supporting mechanism 1 disclosed in the above application document. The magnetic head supporting mechanism 1 includes a load arm 3 and a load beam 4 (which is also referred to as a flexure). The load beam 4 includes a gimbal 5 , which has openings (through holes) 6 and 7 having a substantially C shape. Further, the gimbal 5 includes a beam 8 supported at both ends in a direction in which the beam 8 traverses the load beam 4 , and tongue portions 9 and 10 extending from the beam 8 . The back surface of the magnetic head slider 11 is formed so that grooves are formed in the width direction of the load beam 4 . The magnetic head slider 11 can be rotated together with a twist of the beam 8 in a pitching direction indicated by an arrow 12 , and can be rotated together with a bend of the beam 8 in a rolling direction indicated by an arrow 13 . It is necessary to reduce the rotation stiffness of the gimbal 5 in order to ensure the flying stability of the compact magnetic head slider. Further, it is impossible to reduce the thickness t of the gimbal 5 having the above structure because the load beam 4 needs to be stiff. In order to reduce the rotation stiffness of the gimbal 5 without reducing the thickness t of the load beam 4 , it is necessary to lengthen the length l of the beam 8 . If the load beam 4 and the gimbal 5 are made to have different thicknesses, it is necessary to a complex process in which only the gimbal 5 is half etched, while the load beam is not processed. However, it is very difficult to obtain a desired precision in thickness by the above process and to obtain desirable characteristics. If the length l of the beam 8 is increased, the following disadvantages will occur. First, the resonance point (frequency) of vibration of the twist and bend of the beam 8 will greatly becomes lower, and it becomes likely that the degree of flying of the magnetic head slider 11 is varied. Second, the width W of the load beam 4 increases, and hence the resonance frequency of vibration of the load beam 4 itself will becomes lower. Thus, the flying magnetic head slider 11 becomes unstable. Consequently, when the integrally formed supporting spring having the integrated load beam and gimbal is used, it is very difficult to realize a structure of the integrated supporting spring in which only the rotation stiffness is reduced without decreasing the resonance frequency of the gimbal. It becomes impossible to neglect the influence of lead wires connected to the head because of degradation of the airbearing stiffness caused by down-sizing of the slider and reduction in the load force on the head slider. More particularly, the slider is affected by the stiffness of the lead wires and may cause the slider to fly in the tilt state. Particularly, when a magneto-resistive effect type head (MR head) is used as a reproduction head, such a head is combined with an interactive type head. Hence, four lead wires equal to twice the number of lead wires for the conventional recording/reproducing head are needed. Use of the four lead wires increases the influence of the stiffness of the lead wires. This degrades not only the reliability of the flying head but also the read/write characteristics. Hence, the magnetic disk drive does not have a satisfactory reliability.
|
10950664
| 2,004
|
Method and apparatus for removing boiling liquid from a tank
|
A method and apparatus are provided for removing a boiling liquid from a tank. The liquid is removed from the tank and, before the delivery to a consuming device is supplied to an intermediate receptacle in which the boiling liquid is subjected to a pressure reduction and subsequently to a pressure increase.
|
BACKGROUND AND SUMMARY OF THE INVENTION This application claims the priority of German Application No. 103 47 129.4 filed Oct. 10, 2003 and German Application No. 10 2004 006346.8 filed Feb. 12, 2004, the disclosures of which are expressly incorporated by reference herein. The invention relates to a method of removing a boiling liquid from a tank. For removing boiling liquids (for example, liquefied gases) from a tank, normally the present tank pressure is used for generating a flow through nozzles or valves. Only rarely is the boiling liquid fed to a booster pump for generating a condition in which the liquid is supercooled. It is also known that the boiling liquid in an intermediate receptacle is acted upon by a higher pressure in order to produce a supercooled liquid in this manner. In some applications, a partial relaxation of the liquid takes place in an intermediate receptacle behind the tank. The liquid will then flow at a reduced pressure but not supercooled along to the application location. It is an object of the invention to provide an improved method and apparatus for removing a boiling liquid from a tank. This object is achieved according to certain preferred embodiments of the invention in that the liquid is removed from the tank and is guided to an intermediate receptacle before being delivered to a consuming device, in which intermediate receptacle the boiling liquid is subjected to a pressure decrease and then to a pressure increase. After the removal of the desired quantity of boiling liquid, the pipe between the tank and the intermediate receptacle is advantageously closed. The intermediate receptacle is thus filled to a defined level. The pressure decrease in the intermediate receptacle is preferably implemented by releasing gas from the head space of the intermediate receptacle. Particularly preferably, the pressure increase in the intermediate receptacle is carried out by feeding gas from the tank. According to an advantageous further development of certain preferred embodiments of the invention, the pressure increase in the intermediate receptacle is implemented by feeding liquid from the tank, the liquid being guided via a vaporizer. Particularly advantageous according to certain preferred embodiments of the invention, the liquid is removed from the lower part of the tank. The mass flow through nozzles, screens, valves, etc. reduced during the relaxation vaporization is to be increased by using a supercooled liquid. A relaxation vaporization in an outflow opening is to be prevented as completely as possible. Known systems also aim at providing a supercooled liquid, but do not prevent the occurrence of a relaxation vaporization to the extent desired here. According to certain preferred embodiments of the invention, the boiling liquid is relaxed in a receptacle, if possible, to atmospheric pressure. Subsequently, the intermediate receptacle is pressurized. This pressurization takes place by the flowing-in of the same medium as the medium present in the intermediate receptacle and is removed from the same storage tank (preferably in a gaseous state, but it can also be in a liquid state). By means of suitable devices, the pressure may also be lowered here below the ambient pressure. Other known methods utilize either a lowering of the pressure of the boiling liquid or a pressure increase but not a combination of the two. In the case of the method with the lowering of pressure, the relaxation usually does not take place to the ambient pressure (atmospheric pressure) but to a pressure higher than the ambient pressure. According to certain preferred embodiments of the invention, the pressurization of the intermediate receptacle takes place by means of the fluid from the storage tank, whereas external storage devices are used in the state of the art. The invention as well as details of the invention will be explained in the following by means of an embodiment illustrated in the figure. Other objects, advantages and novel features of the present invention will become apparent from the following detailed description of the invention when considered in conjunction with the accompanying drawings.
|
Title:
Method and apparatus for removing boiling liquid from a tank
Abstract:
A method and apparatus are provided for removing a boiling liquid from a tank. The liquid is removed from the tank and, before the delivery to a consuming device is supplied to an intermediate receptacle in which the boiling liquid is subjected to a pressure reduction and subsequently to a pressure increase.
Background:
BACKGROUND AND SUMMARY OF THE INVENTION This application claims the priority of German Application No. 103 47 129.4 filed Oct. 10, 2003 and German Application No. 10 2004 006346.8 filed Feb. 12, 2004, the disclosures of which are expressly incorporated by reference herein. The invention relates to a method of removing a boiling liquid from a tank. For removing boiling liquids (for example, liquefied gases) from a tank, normally the present tank pressure is used for generating a flow through nozzles or valves. Only rarely is the boiling liquid fed to a booster pump for generating a condition in which the liquid is supercooled. It is also known that the boiling liquid in an intermediate receptacle is acted upon by a higher pressure in order to produce a supercooled liquid in this manner. In some applications, a partial relaxation of the liquid takes place in an intermediate receptacle behind the tank. The liquid will then flow at a reduced pressure but not supercooled along to the application location. It is an object of the invention to provide an improved method and apparatus for removing a boiling liquid from a tank. This object is achieved according to certain preferred embodiments of the invention in that the liquid is removed from the tank and is guided to an intermediate receptacle before being delivered to a consuming device, in which intermediate receptacle the boiling liquid is subjected to a pressure decrease and then to a pressure increase. After the removal of the desired quantity of boiling liquid, the pipe between the tank and the intermediate receptacle is advantageously closed. The intermediate receptacle is thus filled to a defined level. The pressure decrease in the intermediate receptacle is preferably implemented by releasing gas from the head space of the intermediate receptacle. Particularly preferably, the pressure increase in the intermediate receptacle is carried out by feeding gas from the tank. According to an advantageous further development of certain preferred embodiments of the invention, the pressure increase in the intermediate receptacle is implemented by feeding liquid from the tank, the liquid being guided via a vaporizer. Particularly advantageous according to certain preferred embodiments of the invention, the liquid is removed from the lower part of the tank. The mass flow through nozzles, screens, valves, etc. reduced during the relaxation vaporization is to be increased by using a supercooled liquid. A relaxation vaporization in an outflow opening is to be prevented as completely as possible. Known systems also aim at providing a supercooled liquid, but do not prevent the occurrence of a relaxation vaporization to the extent desired here. According to certain preferred embodiments of the invention, the boiling liquid is relaxed in a receptacle, if possible, to atmospheric pressure. Subsequently, the intermediate receptacle is pressurized. This pressurization takes place by the flowing-in of the same medium as the medium present in the intermediate receptacle and is removed from the same storage tank (preferably in a gaseous state, but it can also be in a liquid state). By means of suitable devices, the pressure may also be lowered here below the ambient pressure. Other known methods utilize either a lowering of the pressure of the boiling liquid or a pressure increase but not a combination of the two. In the case of the method with the lowering of pressure, the relaxation usually does not take place to the ambient pressure (atmospheric pressure) but to a pressure higher than the ambient pressure. According to certain preferred embodiments of the invention, the pressurization of the intermediate receptacle takes place by means of the fluid from the storage tank, whereas external storage devices are used in the state of the art. The invention as well as details of the invention will be explained in the following by means of an embodiment illustrated in the figure. Other objects, advantages and novel features of the present invention will become apparent from the following detailed description of the invention when considered in conjunction with the accompanying drawings.
|
10923994
| 2,004
|
Stationary board for blocking lights of oncoming vehicles in medial strip and facilitating nighttime identification of medial strip
|
Disclosed is a stationary board adapted to be set up in a medial strip between traffic lanes to block lights of oncoming vehicles in the medial strip and facilitate identification of the medial strip in nighttime driving or riding. This stationary board comprises a pair of plate members each composed of a molded component made of a transparent plastic material, and the plate members are coupled with one another at the respective marginal edges thereof to form an integrated assembly having a hollow space therein. Each of the plate members is formed with irregularities in its inner surface facing the hollow space of the assembly. A top member molded of a plastic material is attached to the top portion of the assembly in a fitting manner. The plastic material of the top member contains a luminous pigment capable of absorbing, storing and emitting light. The stationary board of the present invention can bring out a function of facilitating identification of the medial strip in nighttime driving or riding as well as blocking lights of oncoming vehicles, while offering excellent aesthetic appearance.
|
BACKGROUND OF THE INVENTION It is often the case that during driving a motor vehicle such as automobile or motorcycle in the lane facing oncoming traffic, the lights of oncoming vehicles can dazzle a driver or rider and negatively influence his/her driving or riding at nighttime. In view of this risk, various types of barriers are set up in a medial strip of a highway. Such barriers include a simple type composed of plural pairs of plate members with opposite colors to be alternately set up in a medial strip at given intervals to provide enhanced anti-dazzling effect and visibility (see Japanese Utility Model Laid-Open Publication No. 58-85611). There has also been known a common technique of applying a luminous paint or the like onto road or traffic signs to effectively provide enhanced visibility in dark places (see, for example, Japanese Patent Laid-Open Publication No. 10-82023). However, the anti-dazzling plate disclosed in the above Japanese Utility Model Laid-Open Publication No. 58-85611 is designed to simply achieve its intended purpose of preventing dazzle. A luminous road-sign material disclosed in the above Japanese Patent Laid-Open Publication No. 10-82023 is intended to be limitedly used as a line for zoning a road or indicating a dangerous zone, in darkness such as nighttime. As above, conventionally employed barriers are intended to provide only a light-blocking effect. Thus, they are limited in functionality, and far from excellent in appearance.
|
Title:
Stationary board for blocking lights of oncoming vehicles in medial strip and facilitating nighttime identification of medial strip
Abstract:
Disclosed is a stationary board adapted to be set up in a medial strip between traffic lanes to block lights of oncoming vehicles in the medial strip and facilitate identification of the medial strip in nighttime driving or riding. This stationary board comprises a pair of plate members each composed of a molded component made of a transparent plastic material, and the plate members are coupled with one another at the respective marginal edges thereof to form an integrated assembly having a hollow space therein. Each of the plate members is formed with irregularities in its inner surface facing the hollow space of the assembly. A top member molded of a plastic material is attached to the top portion of the assembly in a fitting manner. The plastic material of the top member contains a luminous pigment capable of absorbing, storing and emitting light. The stationary board of the present invention can bring out a function of facilitating identification of the medial strip in nighttime driving or riding as well as blocking lights of oncoming vehicles, while offering excellent aesthetic appearance.
Background:
BACKGROUND OF THE INVENTION It is often the case that during driving a motor vehicle such as automobile or motorcycle in the lane facing oncoming traffic, the lights of oncoming vehicles can dazzle a driver or rider and negatively influence his/her driving or riding at nighttime. In view of this risk, various types of barriers are set up in a medial strip of a highway. Such barriers include a simple type composed of plural pairs of plate members with opposite colors to be alternately set up in a medial strip at given intervals to provide enhanced anti-dazzling effect and visibility (see Japanese Utility Model Laid-Open Publication No. 58-85611). There has also been known a common technique of applying a luminous paint or the like onto road or traffic signs to effectively provide enhanced visibility in dark places (see, for example, Japanese Patent Laid-Open Publication No. 10-82023). However, the anti-dazzling plate disclosed in the above Japanese Utility Model Laid-Open Publication No. 58-85611 is designed to simply achieve its intended purpose of preventing dazzle. A luminous road-sign material disclosed in the above Japanese Patent Laid-Open Publication No. 10-82023 is intended to be limitedly used as a line for zoning a road or indicating a dangerous zone, in darkness such as nighttime. As above, conventionally employed barriers are intended to provide only a light-blocking effect. Thus, they are limited in functionality, and far from excellent in appearance.
|
11002627
| 2,004
|
Robot and over-current protection device for a robot
|
It is so arranged in a robot as to monitor the over-current state of each motor and that of two more than two motors when put together by seeing the total current value of the motors being monitored in parallel with absorption of both the static load torque and the dynamic load torque of each actuator/motor. Additionally, it is so arranged as to check if each of the predetermined unit members including the arm sections and the leg sections of the robot is in an over-current state or not and also if the entire robot is in an over-current state or not, while each of the motors are not in an over-current state.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to a robot comprising a plurality of joint axes, links coupling the joints and actuators for driving the joint axes and adapted to operate by supplying a drive current to the actuators. More particularly, the present invention relates to a robot adapted to prevent an over-current from flowing to any of its actuators during an operation and also to an over-current protection device to be used for such a robot. Still more particularly, the present invention relates to a robot adapted to prevent an over-current from flowing to any of its actuators when an excessively heavy load is applied to the related joint axes and also to an over-current protection device to be used for such a robot. Still more particularly, the present invention relates to a robot adapted to prevent an over-current from flowing to any of its actuators when a heavy load that exceeds the permissible limit of the entire robot is applied to any of its joint axes and also to an over-current protection device to be used for such a robot. This application claims priority of Japanese Patent Application No. 2003-403932, filed on Dec. 3, 2003, the entirety of which is incorporated by reference herein. 2. Description of Related Art A machine device adapted to move in a manner resembling to motions of human being by means of electric and/or magnetic operations is referred to as “robot”. It is said that the word “robot” derives from a Slavic word “ROBOTA (slave machine)”. In Japan, robots started to become popular in the later 1960s, although many of them were industrial robots such as manipulators and transfer robots installed for the purpose of automating productive operations of factories and saving man power. Research and development efforts have been paid in recent years on mobile robots that are equipped with movable legs. Expectations are high for such mobile robots in practical applications. Two-legged mobile robots modeled after human motions are referred to humanoid robots. While two-legged robots that are based on erect bipedalism are accompanied by problems of instability and difficulty of attitude control and walk control if compared with crawler type robots and four-legged or six-legged robots, they provide advantages including that they can adapt themselves to walking surfaces with obstacles and undulations on the way such as unleveled ground, and discontinued walking surfaces such as staircases and ladders to be stepped up and down so that they can move in a flexible manner. Legged mobile robots generally have a large number of degrees of freedom of joints and are adapted to realize motions of joints by means of motors of actuators. More specifically, the link of an arm or a leg, which is a structure member of a robot, is coupled at an end thereof to the output shaft of a motor by way of a reduction gear and at the other end thereof to another motor for driving the corresponding neighboring joint. Additionally, the rotary position and the quantity of revolution of each motor are taken out for servo control in order to reproduce a desired pattern of motion and also for attitude control. Currently, servo motors are generally used for realizing certain degrees of freedom of each joint of a robot. This is because servo motors are easy to handle and compact and show a high torque besides they are highly responsive. Particularly, AC servo motors are brushless and maintenance-free motors and hence can be applied to joint actuators of various automotive machines that can move and work in an unmanned work space such legged robots adapted to freely walk around. An AC servo motor is formed by arranging a permanent magnet and a coil having a plurality of phases respectively at the rotor side and at the stator side so as to generate a rotary torque at the rotor by means of a sinusoidal flux distribution and a sinusoidal wave current. A sophisticated legged mobile robot can typically autonomously walk and perform various operations by using the legs. Additionally, such a robot can stand up from a posture of lying on the face or on the back. It can also hold an object by hand and carry it to some other place. On the other hand, when such a robot falls on the floor or collides with an object on the floor on the intended route of movement, some or all of the joint actuators of the robot may be subjected to a tremendously excessive load. The machine can be broken, plastically deformed or otherwise fatally damaged by such an excessive load. Therefore, it may be important for the motors of the joint actuators of a robot to incorporate a mechanism for absorbing such a load. FIG. 1 of the accompanying drawings schematically shows a known robot, which is illustrated as a simple model. The robot drives a motor 120 under the control of a host controller (not shown) and the output torque of the motor 120 is applied to a link 122 by way of gear 121 so as to drive a movable part thereof. In the illustrated instance, a torque limiter is arranged between the gear 121 and the link 122 so that it is possible to prevent the output shaft of the motor 120 from being deformed and the motor 120 from being otherwise damaged by any impact externally applied thereto as the torque limiter absorbs the impact. Various torque limiters (or servo savers) that can be used for such applications have hitherto been proposed [see, inter alia, Japanese Utility Model Application Laid-Open Publication No. 60-192893 (FIGS. 1 and 2)]. FIG. 2 schematically illustrates a torque limiter of the type under consideration, showings its configurations. The illustrated torque limiter 130 comprises semi-annular first and second friction plates 132 A, 132 B arranged in the inside of an annular body 131 that is rigidly fitted to a link 135 . The first and second friction plates 132 A, 132 B are rigidly fitted to the output shaft 134 of a motor by way of resilient bodies 133 , which may be pieces of rubber or compression coil springs. Then, the first and second friction plates 132 A, 132 B are pressed against the inner wall surface of the annular body 131 by the resilient bodies 133 under pressure of a predetermined level. In the illustrated torque limiter 130 , the annular body 131 can be rotated integrally with the output shaft 134 of the motor by the frictional force that is generated between the first and second friction plates 132 A, 132 B and the annular body 131 in normal operating conditions. On the other hand, when the annular body 131 is subjected to a large load as a result of the impact applied to the link 135 and the load is greater than the static frictional force between the first and second friction plates 132 A, 132 B and the annular body 131 , the annular body 131 slides on the first and second friction plates 132 A, 132 B so that the output shaft 134 of the motor is not subjected to a load that is greater than the dynamic frictional force between the annular body 131 and the first and second friction plate 132 A, 132 B. However, such conventional torque limiters 130 are accompanied by a problem that the coefficient of static friction between the annular body 131 and the first and second friction plates 132 A, 132 B shows a large dispersion among individual torque limiters if they are manufactured according to same numerical specifications so that it is difficult to establish a design margin for the entire robot in terms of the coefficient of static friction. Additionally, with such conventional torque limiters 130 , the coefficient of static friction between the annular body 131 and the first and second friction plates 132 A, 132 B can easily change as a function of temperature. Thus, it is difficult to handle them also from the viewpoint of the coefficient of static friction. Still additionally, since conventional torque limiters 130 have a rather complex and bulky mechanical configuration as described, it is difficult to make them lightweight. Then, it is difficult to reduce the size and weight of a robot that comprises a large number of motors. Furthermore, an over-current may flow to the actuators for driving some of the joints of a robot in an attempt to make the robot move according to the command given to it when an excessively large load torque is applied to any of the joints. Such over-current makes the actuators operate faultily. For example, if individual actuators do not show any over-current by themselves, the total electric current flowing to a plurality of actuators can exceed the permissible level of the entire system. Particularly, in the case of a robot whose bodily components are driven to move in a coordinated manner under control, the entire system requires over-current protection because, when a joint is subjected to an overload, the excessive load is often distributed to all the body of the robot in order to avoid an over-current condition.
|
Title:
Robot and over-current protection device for a robot
Abstract:
It is so arranged in a robot as to monitor the over-current state of each motor and that of two more than two motors when put together by seeing the total current value of the motors being monitored in parallel with absorption of both the static load torque and the dynamic load torque of each actuator/motor. Additionally, it is so arranged as to check if each of the predetermined unit members including the arm sections and the leg sections of the robot is in an over-current state or not and also if the entire robot is in an over-current state or not, while each of the motors are not in an over-current state.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to a robot comprising a plurality of joint axes, links coupling the joints and actuators for driving the joint axes and adapted to operate by supplying a drive current to the actuators. More particularly, the present invention relates to a robot adapted to prevent an over-current from flowing to any of its actuators during an operation and also to an over-current protection device to be used for such a robot. Still more particularly, the present invention relates to a robot adapted to prevent an over-current from flowing to any of its actuators when an excessively heavy load is applied to the related joint axes and also to an over-current protection device to be used for such a robot. Still more particularly, the present invention relates to a robot adapted to prevent an over-current from flowing to any of its actuators when a heavy load that exceeds the permissible limit of the entire robot is applied to any of its joint axes and also to an over-current protection device to be used for such a robot. This application claims priority of Japanese Patent Application No. 2003-403932, filed on Dec. 3, 2003, the entirety of which is incorporated by reference herein. 2. Description of Related Art A machine device adapted to move in a manner resembling to motions of human being by means of electric and/or magnetic operations is referred to as “robot”. It is said that the word “robot” derives from a Slavic word “ROBOTA (slave machine)”. In Japan, robots started to become popular in the later 1960s, although many of them were industrial robots such as manipulators and transfer robots installed for the purpose of automating productive operations of factories and saving man power. Research and development efforts have been paid in recent years on mobile robots that are equipped with movable legs. Expectations are high for such mobile robots in practical applications. Two-legged mobile robots modeled after human motions are referred to humanoid robots. While two-legged robots that are based on erect bipedalism are accompanied by problems of instability and difficulty of attitude control and walk control if compared with crawler type robots and four-legged or six-legged robots, they provide advantages including that they can adapt themselves to walking surfaces with obstacles and undulations on the way such as unleveled ground, and discontinued walking surfaces such as staircases and ladders to be stepped up and down so that they can move in a flexible manner. Legged mobile robots generally have a large number of degrees of freedom of joints and are adapted to realize motions of joints by means of motors of actuators. More specifically, the link of an arm or a leg, which is a structure member of a robot, is coupled at an end thereof to the output shaft of a motor by way of a reduction gear and at the other end thereof to another motor for driving the corresponding neighboring joint. Additionally, the rotary position and the quantity of revolution of each motor are taken out for servo control in order to reproduce a desired pattern of motion and also for attitude control. Currently, servo motors are generally used for realizing certain degrees of freedom of each joint of a robot. This is because servo motors are easy to handle and compact and show a high torque besides they are highly responsive. Particularly, AC servo motors are brushless and maintenance-free motors and hence can be applied to joint actuators of various automotive machines that can move and work in an unmanned work space such legged robots adapted to freely walk around. An AC servo motor is formed by arranging a permanent magnet and a coil having a plurality of phases respectively at the rotor side and at the stator side so as to generate a rotary torque at the rotor by means of a sinusoidal flux distribution and a sinusoidal wave current. A sophisticated legged mobile robot can typically autonomously walk and perform various operations by using the legs. Additionally, such a robot can stand up from a posture of lying on the face or on the back. It can also hold an object by hand and carry it to some other place. On the other hand, when such a robot falls on the floor or collides with an object on the floor on the intended route of movement, some or all of the joint actuators of the robot may be subjected to a tremendously excessive load. The machine can be broken, plastically deformed or otherwise fatally damaged by such an excessive load. Therefore, it may be important for the motors of the joint actuators of a robot to incorporate a mechanism for absorbing such a load. FIG. 1 of the accompanying drawings schematically shows a known robot, which is illustrated as a simple model. The robot drives a motor 120 under the control of a host controller (not shown) and the output torque of the motor 120 is applied to a link 122 by way of gear 121 so as to drive a movable part thereof. In the illustrated instance, a torque limiter is arranged between the gear 121 and the link 122 so that it is possible to prevent the output shaft of the motor 120 from being deformed and the motor 120 from being otherwise damaged by any impact externally applied thereto as the torque limiter absorbs the impact. Various torque limiters (or servo savers) that can be used for such applications have hitherto been proposed [see, inter alia, Japanese Utility Model Application Laid-Open Publication No. 60-192893 (FIGS. 1 and 2)]. FIG. 2 schematically illustrates a torque limiter of the type under consideration, showings its configurations. The illustrated torque limiter 130 comprises semi-annular first and second friction plates 132 A, 132 B arranged in the inside of an annular body 131 that is rigidly fitted to a link 135 . The first and second friction plates 132 A, 132 B are rigidly fitted to the output shaft 134 of a motor by way of resilient bodies 133 , which may be pieces of rubber or compression coil springs. Then, the first and second friction plates 132 A, 132 B are pressed against the inner wall surface of the annular body 131 by the resilient bodies 133 under pressure of a predetermined level. In the illustrated torque limiter 130 , the annular body 131 can be rotated integrally with the output shaft 134 of the motor by the frictional force that is generated between the first and second friction plates 132 A, 132 B and the annular body 131 in normal operating conditions. On the other hand, when the annular body 131 is subjected to a large load as a result of the impact applied to the link 135 and the load is greater than the static frictional force between the first and second friction plates 132 A, 132 B and the annular body 131 , the annular body 131 slides on the first and second friction plates 132 A, 132 B so that the output shaft 134 of the motor is not subjected to a load that is greater than the dynamic frictional force between the annular body 131 and the first and second friction plate 132 A, 132 B. However, such conventional torque limiters 130 are accompanied by a problem that the coefficient of static friction between the annular body 131 and the first and second friction plates 132 A, 132 B shows a large dispersion among individual torque limiters if they are manufactured according to same numerical specifications so that it is difficult to establish a design margin for the entire robot in terms of the coefficient of static friction. Additionally, with such conventional torque limiters 130 , the coefficient of static friction between the annular body 131 and the first and second friction plates 132 A, 132 B can easily change as a function of temperature. Thus, it is difficult to handle them also from the viewpoint of the coefficient of static friction. Still additionally, since conventional torque limiters 130 have a rather complex and bulky mechanical configuration as described, it is difficult to make them lightweight. Then, it is difficult to reduce the size and weight of a robot that comprises a large number of motors. Furthermore, an over-current may flow to the actuators for driving some of the joints of a robot in an attempt to make the robot move according to the command given to it when an excessively large load torque is applied to any of the joints. Such over-current makes the actuators operate faultily. For example, if individual actuators do not show any over-current by themselves, the total electric current flowing to a plurality of actuators can exceed the permissible level of the entire system. Particularly, in the case of a robot whose bodily components are driven to move in a coordinated manner under control, the entire system requires over-current protection because, when a joint is subjected to an overload, the excessive load is often distributed to all the body of the robot in order to avoid an over-current condition.
|
11027361
| 2,004
|
Carboxyalkyl cellulose
|
Carboxyalkyl cellulose.
|
BACKGROUND OF THE INVENTION Personal care absorbent products, such as infant diapers, adult incontinent pads, and feminine care products, typically contain an absorbent core that includes superabsorbent polymer particles distributed within a fibrous matrix. Superabsorbents are water-swellable, generally water-insoluble absorbent materials having a high absorbent capacity for body fluids. Superabsorbent polymers (SAPs) in common use are mostly derived from acrylic acid, which is itself derived from oil, a non-renewable raw material. Acrylic acid polymers and SAPs are generally recognized as not being biodegradable. Despite their wide use, some segments of the absorbent products market are concerned about the use of non-renewable oil derived materials and their non-biodegradable nature. Acrylic acid based polymers also comprise a meaningful portion of the cost structure of diapers and incontinent pads. Users of SAP are interested in lower cost SAPs. The high cost derives in part from the cost structure for the manufacture of acrylic acid which, in turn, depends upon the fluctuating price of oil. Also, when diapers are discarded after use they normally contain considerably less than their maximum or theoretical content of body fluids. In other words, in terms of their fluid holding capacity, they are “over-designed”. This “over-design” constitutes an inefficiency in the use of SAP. The inefficiency results in part from the fact that SAPs are designed to have high gel strength (as demonstrated by high absorbency under load or AUL). The high gel strength (upon swelling) of currently used SAP particles helps them to retain a lot of void space between particles, which is helpful for rapid fluid uptake. However, this high “void volume” simultaneously results in there being a lot of interstitial (between particle) liquid in the product in the saturated state. When there is a lot of interstitial liquid the “rewet” value or “wet feeling” of an absorbent product is compromised. In personal care absorbent products, U.S. southern pine fluff pulp is commonly used in conjunction with the SAP. This fluff is recognized worldwide as the preferred fiber for absorbent products. The preference is based on the fluff pulp's advantageous high fiber length (about 2.8 mm) and its relative ease of processing from a wetlaid pulp sheet to an airlaid web. Fluff pulp is also made from renewable and biodegradable cellulose pulp fibers. Compared to SAP, these fibers are inexpensive on a per mass basis, but tend to be more expensive on a per unit of liquid held basis. These fluff pulp fibers mostly absorb within the interstices between fibers. For this reason, a fibrous matrix readily releases acquired liquid on application of pressure. The tendency to release acquired liquid can result in significant skin wetness during use of an absorbent product that includes a core formed exclusively from cellulosic fibers. Such products also tend to leak acquired liquid because liquid is not effectively retained in such a fibrous absorbent core. A need therefore exists for a superabsorbent composition that is made from a biodegradable renewable resource like cellulose and that is cost effective. In this way, the superabsorbent composition can be used in absorbent product designs that are efficient such that they can be used closer to their theoretical capacity without feeling wet to the wearer. The present invention seeks to fulfill this need and provides further related advantages.
|
Title:
Carboxyalkyl cellulose
Abstract:
Carboxyalkyl cellulose.
Background:
BACKGROUND OF THE INVENTION Personal care absorbent products, such as infant diapers, adult incontinent pads, and feminine care products, typically contain an absorbent core that includes superabsorbent polymer particles distributed within a fibrous matrix. Superabsorbents are water-swellable, generally water-insoluble absorbent materials having a high absorbent capacity for body fluids. Superabsorbent polymers (SAPs) in common use are mostly derived from acrylic acid, which is itself derived from oil, a non-renewable raw material. Acrylic acid polymers and SAPs are generally recognized as not being biodegradable. Despite their wide use, some segments of the absorbent products market are concerned about the use of non-renewable oil derived materials and their non-biodegradable nature. Acrylic acid based polymers also comprise a meaningful portion of the cost structure of diapers and incontinent pads. Users of SAP are interested in lower cost SAPs. The high cost derives in part from the cost structure for the manufacture of acrylic acid which, in turn, depends upon the fluctuating price of oil. Also, when diapers are discarded after use they normally contain considerably less than their maximum or theoretical content of body fluids. In other words, in terms of their fluid holding capacity, they are “over-designed”. This “over-design” constitutes an inefficiency in the use of SAP. The inefficiency results in part from the fact that SAPs are designed to have high gel strength (as demonstrated by high absorbency under load or AUL). The high gel strength (upon swelling) of currently used SAP particles helps them to retain a lot of void space between particles, which is helpful for rapid fluid uptake. However, this high “void volume” simultaneously results in there being a lot of interstitial (between particle) liquid in the product in the saturated state. When there is a lot of interstitial liquid the “rewet” value or “wet feeling” of an absorbent product is compromised. In personal care absorbent products, U.S. southern pine fluff pulp is commonly used in conjunction with the SAP. This fluff is recognized worldwide as the preferred fiber for absorbent products. The preference is based on the fluff pulp's advantageous high fiber length (about 2.8 mm) and its relative ease of processing from a wetlaid pulp sheet to an airlaid web. Fluff pulp is also made from renewable and biodegradable cellulose pulp fibers. Compared to SAP, these fibers are inexpensive on a per mass basis, but tend to be more expensive on a per unit of liquid held basis. These fluff pulp fibers mostly absorb within the interstices between fibers. For this reason, a fibrous matrix readily releases acquired liquid on application of pressure. The tendency to release acquired liquid can result in significant skin wetness during use of an absorbent product that includes a core formed exclusively from cellulosic fibers. Such products also tend to leak acquired liquid because liquid is not effectively retained in such a fibrous absorbent core. A need therefore exists for a superabsorbent composition that is made from a biodegradable renewable resource like cellulose and that is cost effective. In this way, the superabsorbent composition can be used in absorbent product designs that are efficient such that they can be used closer to their theoretical capacity without feeling wet to the wearer. The present invention seeks to fulfill this need and provides further related advantages.
|
10890744
| 2,004
|
Air conditioner having water draining device
|
An air conditioner includes an outdoor device coupled to an indoor device via a hose, and a water draining device coupled between the outdoor device and the indoor device, to force water that may be generated in the indoor device from the indoor device to the outdoor device, and to prevent the water from dropping from the indoor device. The water draining device includes a casing having a channel to slidably receive a piston which may pump the water from the indoor device to the outdoor device. The indoor device includes a tray disposed in a container to collect water. The outdoor device includes a fan device to blow and to dry the water.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an air conditioner, and more particularly to an air conditioner having a draining device for draining water from indoor device of the air conditioner. 2. Description of the Prior Art Typical air conditioners comprise an outdoor device for being disposed outdoors, and for generating cooling air, and an indoor device coupled to the outdoor device, for receiving the cooling air, and for allowing the cooling air to flow or to blow into the family buildings. Normally, when the cooling air flows or blows into the family buildings via the indoor device, condense water may be generated in the indoor device, and may drop into the family buildings. However, till now, the indoor device is directly coupled to the outdoor device, and the typical air conditioners do not have any water draining devices provided to remove or to drain the water that may be generated in the indoor device, such that the condense water may still drop into the family buildings and may dirt various objects in the family buildings. The present invention has arisen to mitigate and/or obviate the afore-described disadvantages of the conventional air conditioners.
|
Title:
Air conditioner having water draining device
Abstract:
An air conditioner includes an outdoor device coupled to an indoor device via a hose, and a water draining device coupled between the outdoor device and the indoor device, to force water that may be generated in the indoor device from the indoor device to the outdoor device, and to prevent the water from dropping from the indoor device. The water draining device includes a casing having a channel to slidably receive a piston which may pump the water from the indoor device to the outdoor device. The indoor device includes a tray disposed in a container to collect water. The outdoor device includes a fan device to blow and to dry the water.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an air conditioner, and more particularly to an air conditioner having a draining device for draining water from indoor device of the air conditioner. 2. Description of the Prior Art Typical air conditioners comprise an outdoor device for being disposed outdoors, and for generating cooling air, and an indoor device coupled to the outdoor device, for receiving the cooling air, and for allowing the cooling air to flow or to blow into the family buildings. Normally, when the cooling air flows or blows into the family buildings via the indoor device, condense water may be generated in the indoor device, and may drop into the family buildings. However, till now, the indoor device is directly coupled to the outdoor device, and the typical air conditioners do not have any water draining devices provided to remove or to drain the water that may be generated in the indoor device, such that the condense water may still drop into the family buildings and may dirt various objects in the family buildings. The present invention has arisen to mitigate and/or obviate the afore-described disadvantages of the conventional air conditioners.
|
10928435
| 2,004
|
Telecommunication call distribution system
|
A call center server architecture supporting service transactions between service customers and service agents who can be either local to or in geographic distributed locations relative to the call center. The call center server architecture includes an inbound voice packetizer providing a PSTN line interface to the call center, a call center server system, coupled to said inbound voice packetizer, that provides for the execution of call center server control applications, and a router, coupled among said inbound voice packetizer, the call center server system, and, through a network interface to any combination of intra- and extranets, to service agent terminal equipment. The call center server control applications dynamically determine the routing and distribution of service requests received from service customers to service agents and are dynamically responsive to determinations of inadequate quality of service for individual communications channels. The call center server control applications provide for the controlled interruption of a predetermined service transaction while establishing a new communications channel having an adequate quality of service.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention is generally related to telecommunications-based call centers and, in particular, to a unified call center system architecture capable of efficiently and productively handling multiple communications channels and the methods of operating such a call center. 2. Description of the Related Art Remotely-based customer service centers, variously referred to as call centers, telecom-contact centers, hosted contact centers, and network-based contact centers, are an increasingly common business unit in today's service oriented business and consumer markets. Customer service centers enable customers to conduct typically telecom-based transactions with call agents. The types of transactions that can be conducted include but are not limited to sales, reservations, credit card verification, stock transactions, yellow pages, and customer support services. The traditional call center system architecture includes a private branch exchange (“PBX”) system and an Automatic Call Distribution (“ACD”) system. A PBX is a private telephone network that allows users to share a certain number of outside lines for making telephone calls external to the PBX. A PBX is less expensive than connecting an external telephone line to every telephone in the organization. In addition, making calls within the scope of a PBX system is easier because the internal extension designator is typically just 3 or 4 digits. An ACD system routes and queues calls to the appropriate agent, based on various categorization and availability algorithms. For example, one commonly used routing scheme is to send the longest waiting call to the longest available agent. Other commonly used distribution schemes include skills-based routing and priority routing. In a traditional call center system, each agent is logged into one or more ACD queues on the basis of an internal extension number that is assigned to the telephone equipment used by that agent. When a customer contacts a company via the call center, the call is initially queued. The customer is then typically prompted in queue to “press one for sales,” “press two for custom service,” and so on with the result that the call is selectively transferred to another queue to await servicing by an appropriate group of customer service agents. The ACD system thus acts as a connection manager for callers. However, the drawback to conventional ACD systems is that the routing of inbound and outbound calls is based on circuit switching through the PBX. While traditional call centers are a product of the telephone industry, modern call centers evolved to encompass new communication channels, such as voice mail, video and voice over Internet protocol (“VoIP”), Internet text chat (also variously referred to as “online chat,” “keyboard chat,” and “Web chat”), short messages services (“SMS”) text messaging, and e-mail. As a result, some conventional call centers have evolved complex procedural and technical mechanisms, often including dedicated agent groups, to handle the various requirements of the different communications channels. For example, known call center architectures are required to employ a complex of PBXs and ACD servers to handle customer support transactions initiated through the Public Switched Telephone Network (“PSTN”) to a call center. Conventionally, support calls are routed internal to the call center based on statically predefined agent extensions mapped to agent skills. An enhanced system allows an agent, when logging into the call center server to establish availability to take calls routed from the ACD server, to provide a full call-back telephone number instead of implicitly or explicitly providing an internal extension number. By permitting entry of a full call-back number, as an alternative to just an internal extension number, the service center flexibly permits agents to be distributed anywhere on the PSTN. Groups as small as a single agent can therefore be located in quite different geographical locations, yet still provide support through a single call center. Supporting distributed groups of agents, however, comes at the cost of the telecommunications charges to connect between the call center and agent. These costs offset the other benefits of supporting distributed agents, particularly where the agent groups are in fundamentally distant geographical locations, for example, in India or in the Philippines. Private telecom lines and PSTN toll charges to distant countries can easily range on the order of $12,000 to $15,000 per month per line if not more. A call center system developed by White PJ, Inc. supports routing of support transactions between the call center and agents using VoIP connections. The substantial cost of maintaining telecom lines to remote agent groups is thereby substantially avoided. The routing system uses a conventional PSTN to packetized voice switch to route transactions between the call center PBXs and VoIP client equipment used by the agents. The cost of supporting VoIP-based agents, both internal to a call center and geographically distributed, is both substantial equivalent and comparatively minimal. There is, however, a fundamental limitation of existing VoIP call center systems. Known PSTN to packetized voice switches are statically configured. Consequently, each time an agent changes location, regardless of whether the change is internal to the call center or to a different remote location, the switch must be correspondingly reconfigured to match agents to IP addresses. Beyond requiring significant management costs, switch reconfigurations increase the exposure to significant reductions in productivity and even downtime should the switch be misconfigured. As a result, there is a reduction in flexibility, since remote agents in particular are not able to dynamically change their location for providing support. Another known problem with VoIP systems is the inability to assure an adequate quality of service level for voice communications. The Internet at large was not designed to guarantee any particular minimum packet delivery latency level or even a minimum packet delivery success rate. VoIP connections over the Internet and, indeed, over some intranets, can noticeably degrade as a result of packet path congestion. While the congestion is often due to burst packet transmissions, the congestion may be sufficiently persistent to make VoIP communications difficult. As a result, the VoIP connection is dropped. In the context of a call center, the corresponding PSTN originated customer service call is also dropped, requiring the customer to redial the call center and restart the service request. A VoIP system employing a PSTN fallback scheme, as described in U.S. Pat. Nos. 6,542,499 and 6,282,192, is designed to maintain an adequate quality of VoIP communications in the presence of generalized Internet congestion. This VoIP system relies on proprietary gateway hardware at both the source and destination of the VoIP connection to support establishment of a multilink-capable network connection. As described, the gateways support automatic creation of an integrated services digital network (“ISDN”) connection over a digital data qualified circuit-switched line whenever the VoIP quality degrades. Since the ISDN connection is routed over the PSTN, Internet congestion is avoided. The gateways use the ISDN connection in a multilink-mode, enabling the voice data packets routed in part over the Internet and in part over the PSTN to be merged at the destination gateway into a single VoIP stream. A number of problems exist with such VoIP/PSTN failback systems. Perhaps the most significant is that, in the presence of Internet congestion, whatever VoIP data packets are sent over the Internet are still subject to transmission latency and packet loss problems. Unless the ISDN path is used for the substantial majority of VoIP data packets, the VoIP call will be subject to noticeable degradation. Another problem is the significant cost of maintaining the ISDN channel. U.S. Pat. Nos. 6,542,499 and 6,282,192 suggest that the costs can be shared and thus effectively minimized by concurrently routing parts of multiple VoIP calls over the ISDN channel. Where the Internet congestion is sufficient to affect multiple VoIP calls, the naturally limited bandwidth of an ISDN channel is likely to be insufficient to ensure adequate quality for all of the VoIP calls affected. Perhaps a more fundamental problem with VoIP/PSTN fallback systems is the necessity of the destination gateway in particular. The cost of provisioning both the source and destination gateways is alone significant. The cost of providing a destination gateway to each remotely located service agent or small group of agents, however, is likely prohibitive, particularly where separate ISDN lines must be qualified to the destination site. Indeed, the flexibility of ad hoc siting of service agents is generally infeasible and further fundamentally limited to areas serviceable by ISDN lines. Large portions of the currently available PSTN, particularly in other countries, remain unreachable by any ISDN terminal equipment. Therefore, VoIP/PSTN fullback systems appear only suitable to support significant auxiliary call center installations where the grouping of a large number of service agents in a major PSTN market location will achieve a reasonable level of cost effectiveness to permit use. Even with the limitations of existing systems, many businesses cannot afford the high investment, extensive development, and ongoing maintenance costs of supporting such advanced-functionality call centers. Of course, all businesses would benefit from a reduction in the cost, time and management effort in maintaining an advanced-functionality call center. Consequently, a clear need exists for an affordable, efficiently operable, flexible, distributed, scalable call center capable of handling not only the traditional telephone capabilities, but also supporting the new communication channels in a unified system architecture.
|
Title:
Telecommunication call distribution system
Abstract:
A call center server architecture supporting service transactions between service customers and service agents who can be either local to or in geographic distributed locations relative to the call center. The call center server architecture includes an inbound voice packetizer providing a PSTN line interface to the call center, a call center server system, coupled to said inbound voice packetizer, that provides for the execution of call center server control applications, and a router, coupled among said inbound voice packetizer, the call center server system, and, through a network interface to any combination of intra- and extranets, to service agent terminal equipment. The call center server control applications dynamically determine the routing and distribution of service requests received from service customers to service agents and are dynamically responsive to determinations of inadequate quality of service for individual communications channels. The call center server control applications provide for the controlled interruption of a predetermined service transaction while establishing a new communications channel having an adequate quality of service.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention is generally related to telecommunications-based call centers and, in particular, to a unified call center system architecture capable of efficiently and productively handling multiple communications channels and the methods of operating such a call center. 2. Description of the Related Art Remotely-based customer service centers, variously referred to as call centers, telecom-contact centers, hosted contact centers, and network-based contact centers, are an increasingly common business unit in today's service oriented business and consumer markets. Customer service centers enable customers to conduct typically telecom-based transactions with call agents. The types of transactions that can be conducted include but are not limited to sales, reservations, credit card verification, stock transactions, yellow pages, and customer support services. The traditional call center system architecture includes a private branch exchange (“PBX”) system and an Automatic Call Distribution (“ACD”) system. A PBX is a private telephone network that allows users to share a certain number of outside lines for making telephone calls external to the PBX. A PBX is less expensive than connecting an external telephone line to every telephone in the organization. In addition, making calls within the scope of a PBX system is easier because the internal extension designator is typically just 3 or 4 digits. An ACD system routes and queues calls to the appropriate agent, based on various categorization and availability algorithms. For example, one commonly used routing scheme is to send the longest waiting call to the longest available agent. Other commonly used distribution schemes include skills-based routing and priority routing. In a traditional call center system, each agent is logged into one or more ACD queues on the basis of an internal extension number that is assigned to the telephone equipment used by that agent. When a customer contacts a company via the call center, the call is initially queued. The customer is then typically prompted in queue to “press one for sales,” “press two for custom service,” and so on with the result that the call is selectively transferred to another queue to await servicing by an appropriate group of customer service agents. The ACD system thus acts as a connection manager for callers. However, the drawback to conventional ACD systems is that the routing of inbound and outbound calls is based on circuit switching through the PBX. While traditional call centers are a product of the telephone industry, modern call centers evolved to encompass new communication channels, such as voice mail, video and voice over Internet protocol (“VoIP”), Internet text chat (also variously referred to as “online chat,” “keyboard chat,” and “Web chat”), short messages services (“SMS”) text messaging, and e-mail. As a result, some conventional call centers have evolved complex procedural and technical mechanisms, often including dedicated agent groups, to handle the various requirements of the different communications channels. For example, known call center architectures are required to employ a complex of PBXs and ACD servers to handle customer support transactions initiated through the Public Switched Telephone Network (“PSTN”) to a call center. Conventionally, support calls are routed internal to the call center based on statically predefined agent extensions mapped to agent skills. An enhanced system allows an agent, when logging into the call center server to establish availability to take calls routed from the ACD server, to provide a full call-back telephone number instead of implicitly or explicitly providing an internal extension number. By permitting entry of a full call-back number, as an alternative to just an internal extension number, the service center flexibly permits agents to be distributed anywhere on the PSTN. Groups as small as a single agent can therefore be located in quite different geographical locations, yet still provide support through a single call center. Supporting distributed groups of agents, however, comes at the cost of the telecommunications charges to connect between the call center and agent. These costs offset the other benefits of supporting distributed agents, particularly where the agent groups are in fundamentally distant geographical locations, for example, in India or in the Philippines. Private telecom lines and PSTN toll charges to distant countries can easily range on the order of $12,000 to $15,000 per month per line if not more. A call center system developed by White PJ, Inc. supports routing of support transactions between the call center and agents using VoIP connections. The substantial cost of maintaining telecom lines to remote agent groups is thereby substantially avoided. The routing system uses a conventional PSTN to packetized voice switch to route transactions between the call center PBXs and VoIP client equipment used by the agents. The cost of supporting VoIP-based agents, both internal to a call center and geographically distributed, is both substantial equivalent and comparatively minimal. There is, however, a fundamental limitation of existing VoIP call center systems. Known PSTN to packetized voice switches are statically configured. Consequently, each time an agent changes location, regardless of whether the change is internal to the call center or to a different remote location, the switch must be correspondingly reconfigured to match agents to IP addresses. Beyond requiring significant management costs, switch reconfigurations increase the exposure to significant reductions in productivity and even downtime should the switch be misconfigured. As a result, there is a reduction in flexibility, since remote agents in particular are not able to dynamically change their location for providing support. Another known problem with VoIP systems is the inability to assure an adequate quality of service level for voice communications. The Internet at large was not designed to guarantee any particular minimum packet delivery latency level or even a minimum packet delivery success rate. VoIP connections over the Internet and, indeed, over some intranets, can noticeably degrade as a result of packet path congestion. While the congestion is often due to burst packet transmissions, the congestion may be sufficiently persistent to make VoIP communications difficult. As a result, the VoIP connection is dropped. In the context of a call center, the corresponding PSTN originated customer service call is also dropped, requiring the customer to redial the call center and restart the service request. A VoIP system employing a PSTN fallback scheme, as described in U.S. Pat. Nos. 6,542,499 and 6,282,192, is designed to maintain an adequate quality of VoIP communications in the presence of generalized Internet congestion. This VoIP system relies on proprietary gateway hardware at both the source and destination of the VoIP connection to support establishment of a multilink-capable network connection. As described, the gateways support automatic creation of an integrated services digital network (“ISDN”) connection over a digital data qualified circuit-switched line whenever the VoIP quality degrades. Since the ISDN connection is routed over the PSTN, Internet congestion is avoided. The gateways use the ISDN connection in a multilink-mode, enabling the voice data packets routed in part over the Internet and in part over the PSTN to be merged at the destination gateway into a single VoIP stream. A number of problems exist with such VoIP/PSTN failback systems. Perhaps the most significant is that, in the presence of Internet congestion, whatever VoIP data packets are sent over the Internet are still subject to transmission latency and packet loss problems. Unless the ISDN path is used for the substantial majority of VoIP data packets, the VoIP call will be subject to noticeable degradation. Another problem is the significant cost of maintaining the ISDN channel. U.S. Pat. Nos. 6,542,499 and 6,282,192 suggest that the costs can be shared and thus effectively minimized by concurrently routing parts of multiple VoIP calls over the ISDN channel. Where the Internet congestion is sufficient to affect multiple VoIP calls, the naturally limited bandwidth of an ISDN channel is likely to be insufficient to ensure adequate quality for all of the VoIP calls affected. Perhaps a more fundamental problem with VoIP/PSTN fallback systems is the necessity of the destination gateway in particular. The cost of provisioning both the source and destination gateways is alone significant. The cost of providing a destination gateway to each remotely located service agent or small group of agents, however, is likely prohibitive, particularly where separate ISDN lines must be qualified to the destination site. Indeed, the flexibility of ad hoc siting of service agents is generally infeasible and further fundamentally limited to areas serviceable by ISDN lines. Large portions of the currently available PSTN, particularly in other countries, remain unreachable by any ISDN terminal equipment. Therefore, VoIP/PSTN fullback systems appear only suitable to support significant auxiliary call center installations where the grouping of a large number of service agents in a major PSTN market location will achieve a reasonable level of cost effectiveness to permit use. Even with the limitations of existing systems, many businesses cannot afford the high investment, extensive development, and ongoing maintenance costs of supporting such advanced-functionality call centers. Of course, all businesses would benefit from a reduction in the cost, time and management effort in maintaining an advanced-functionality call center. Consequently, a clear need exists for an affordable, efficiently operable, flexible, distributed, scalable call center capable of handling not only the traditional telephone capabilities, but also supporting the new communication channels in a unified system architecture.
|
10816820
| 2,004
|
3-stage method for forming deep trench structure and deep trench capacitor
|
A method for forming a deep trench structure comprises the steps of providing a silicon substrate; forming a mask layer of a predetermined pattern on the silicon substrate to expose a portion of the silicon substrate; forming a first trench in the exposed portion of the silicon substrate, the first trench having a first depth; forming a nitride layer on the surfaces of the whole structure; forming a second trench in the first trench downward, the second trench having a second depth greater than the first depth; forming another nitride layer on the surfaces of the whole structure; and forming a third trench in the second trench downward, the third trench having a third depth greater than the second depth. The method of the present invention can make the whole trench have better etch uniformity, thereby obtaining good electrical performance.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a semiconductor process, more specifically, to a method for forming a deep trench structure and a deep trench capacitor. 2. Description of the Prior Art Deep trench capacitors have been widely employed in the conventional semiconductor memory (such as DRAM) process, in order to reduce the occupied areas and to increase capacitances. In general, the formation of a deep trench capacitor is completed by forming a deep trench with desired depth (e.g., 7-8 μm) in a substrate once, followed by implementing some steps, including deposition, photoresist, etching, etc, several times, to form the buried plate (BP) (i.e., the bottom electrode), dielectric layer, upper electrode, collar oxide layer, connection electrode, and buried strap (BS) separately. However, because the aforementioned deep trench process is restricted in process capability with the gradual shrinking of the dimension of components, particularly in sub-90 μm process, the etching uniformity inside the trench becomes worse, thereby influencing the overall electrical performance of the capacitors. Therefore, a need for overcoming the above problem is required. The present invention fulfils this need.
|
Title:
3-stage method for forming deep trench structure and deep trench capacitor
Abstract:
A method for forming a deep trench structure comprises the steps of providing a silicon substrate; forming a mask layer of a predetermined pattern on the silicon substrate to expose a portion of the silicon substrate; forming a first trench in the exposed portion of the silicon substrate, the first trench having a first depth; forming a nitride layer on the surfaces of the whole structure; forming a second trench in the first trench downward, the second trench having a second depth greater than the first depth; forming another nitride layer on the surfaces of the whole structure; and forming a third trench in the second trench downward, the third trench having a third depth greater than the second depth. The method of the present invention can make the whole trench have better etch uniformity, thereby obtaining good electrical performance.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a semiconductor process, more specifically, to a method for forming a deep trench structure and a deep trench capacitor. 2. Description of the Prior Art Deep trench capacitors have been widely employed in the conventional semiconductor memory (such as DRAM) process, in order to reduce the occupied areas and to increase capacitances. In general, the formation of a deep trench capacitor is completed by forming a deep trench with desired depth (e.g., 7-8 μm) in a substrate once, followed by implementing some steps, including deposition, photoresist, etching, etc, several times, to form the buried plate (BP) (i.e., the bottom electrode), dielectric layer, upper electrode, collar oxide layer, connection electrode, and buried strap (BS) separately. However, because the aforementioned deep trench process is restricted in process capability with the gradual shrinking of the dimension of components, particularly in sub-90 μm process, the etching uniformity inside the trench becomes worse, thereby influencing the overall electrical performance of the capacitors. Therefore, a need for overcoming the above problem is required. The present invention fulfils this need.
|
10486273
| 2,004
|
Butt welder and butt welding method and butt welded product
|
Disclosed are a butt welding apparatus, a butt welding method, and a product manufactured by the butt welding method. Two electrode rollers (3, 4) are disposed on both the front and back sides of a thick sheet member (1) and on both the front and back sides of a thin sheet member (2) whose end surfaces (1A, 2A) are butted. The electrode rollers (3, 4) are applied with power, melt the butt portion (6) of the sheet members (1, 2) with electric resistance heat, and joint the butt portion. Further, the electrode rollers (3, 4) have a length bridging across the sheet members (1, 2) and are composed of first portions (3A, 4A) arranged as small diameter portions on the side of the thick sheet member (1) and second portions (3B, 4B) arranged as large diameter portions on the side of the thin sheet member (2). The first portions (3A, 4A) come into contact with the thick sheet member (1) and presses it before the second portions (3B, 4B) come into contact with the thin sheet member (2). Thus, the end surface (1A) of the thick sheet member (1) swells and deforms toward the thin sheet member (2) and reliably comes into contact with the end surface (2A) of the thin sheet member (2). As a result, power is applied between the end surfaces (1A, 2A) even if the end surfaces (1A, 2A) are not finished by polishing and the like.
|
BACKGROUND OF THE INVENTION 1. Technical field The present invention relates to a butt welding apparatus for and a butt welding method of melting and jointing a butt portion where end surfaces of two welding sheet members are butted to each other with electric resistance heat generated by power applied between a pair of two electrode members, and to a butt welded product manufactured by the butt welding method. 2. Background art FIG. 21 shows a conventional butt welding apparatus. Two welding sheet members 101 , 102 having the same thickness are set to the welding apparatus with end surfaces 101 A, 102 A butted to each other. Each of electrode rollers 103 , 104 disposed on both the front and back surface sides of the sheet members 101 , 102 has a thickness bridging across the sheet members 101 , 102 , and power is applied between the electrode rollers 103 , 104 when the sheet members 101 , 102 are welded. When the power is applied between the electrode rollers 103 , 104 while they press both the sheet members 101 , 102 , the metal material of the sheet members 101 , 102 is melted and a nugget 105 is formed in the sheet members 101 , 102 at a central portion in the thickness thereof where an electric resistance is increased in the sheet members 101 , 102 by the resistance heat of the power flowing in the thickness direction of both the sheet members 101 , 102 . Further, since the power also flows through a path passing through a butt portion 106 where the end surfaces 101 A, 102 A are butted to each other, the butt portion 106 is also melted at a central portion in the thickness thereof by the heat generated by the contact resistance of these end surfaces 101 A, 102 A. Thus, the nugget 105 is formed so as to bridge across both the sheet members 101 , 102 . Then, when the electrode rollers 103 , 104 move along the butt portion 106 while rolling or when the sheet members 101 , 102 move with respect to the electrode rollers 103 , 104 that are free to move at a definite position, the nugget 105 , which can joint the sheet members 101 , 102 with a large amount of strength, is formed over the entire length of the butt portion 106 . To form the nugget 105 bridging across both the sheet members 101 , 102 , an electrically conductive state must be secured by causing the end surface 101 A of the sheet member 101 to be butted to come into contact with the end surface 102 A of the sheet member 102 . Thus, conventionally, both the end surfaces 101 A, 102 A are polished over the entire lengths thereof prior to butt welding so as to secure a contact state of the end surfaces 101 A, 102 A in the butt welding. Therefore, conventionally, welding sheet members, for example, sheared in predetermined sizes by a shearing apparatus cannot be butt welded in a sheared state and must be subjected to finish processing to the end surfaces 101 A, 102 A prior to a welding operation, which increases a working cost and a working time. An object of the present invention is to provide a butt welding apparatus and a butt welding method capable of eliminating processing such as polishing, and the like for finishing the end surfaces of two welding sheet members to be butted prior to butt welding, and to provide a butt welded product capable of being manufactured by the butt welding method.
|
Title:
Butt welder and butt welding method and butt welded product
Abstract:
Disclosed are a butt welding apparatus, a butt welding method, and a product manufactured by the butt welding method. Two electrode rollers (3, 4) are disposed on both the front and back sides of a thick sheet member (1) and on both the front and back sides of a thin sheet member (2) whose end surfaces (1A, 2A) are butted. The electrode rollers (3, 4) are applied with power, melt the butt portion (6) of the sheet members (1, 2) with electric resistance heat, and joint the butt portion. Further, the electrode rollers (3, 4) have a length bridging across the sheet members (1, 2) and are composed of first portions (3A, 4A) arranged as small diameter portions on the side of the thick sheet member (1) and second portions (3B, 4B) arranged as large diameter portions on the side of the thin sheet member (2). The first portions (3A, 4A) come into contact with the thick sheet member (1) and presses it before the second portions (3B, 4B) come into contact with the thin sheet member (2). Thus, the end surface (1A) of the thick sheet member (1) swells and deforms toward the thin sheet member (2) and reliably comes into contact with the end surface (2A) of the thin sheet member (2). As a result, power is applied between the end surfaces (1A, 2A) even if the end surfaces (1A, 2A) are not finished by polishing and the like.
Background:
BACKGROUND OF THE INVENTION 1. Technical field The present invention relates to a butt welding apparatus for and a butt welding method of melting and jointing a butt portion where end surfaces of two welding sheet members are butted to each other with electric resistance heat generated by power applied between a pair of two electrode members, and to a butt welded product manufactured by the butt welding method. 2. Background art FIG. 21 shows a conventional butt welding apparatus. Two welding sheet members 101 , 102 having the same thickness are set to the welding apparatus with end surfaces 101 A, 102 A butted to each other. Each of electrode rollers 103 , 104 disposed on both the front and back surface sides of the sheet members 101 , 102 has a thickness bridging across the sheet members 101 , 102 , and power is applied between the electrode rollers 103 , 104 when the sheet members 101 , 102 are welded. When the power is applied between the electrode rollers 103 , 104 while they press both the sheet members 101 , 102 , the metal material of the sheet members 101 , 102 is melted and a nugget 105 is formed in the sheet members 101 , 102 at a central portion in the thickness thereof where an electric resistance is increased in the sheet members 101 , 102 by the resistance heat of the power flowing in the thickness direction of both the sheet members 101 , 102 . Further, since the power also flows through a path passing through a butt portion 106 where the end surfaces 101 A, 102 A are butted to each other, the butt portion 106 is also melted at a central portion in the thickness thereof by the heat generated by the contact resistance of these end surfaces 101 A, 102 A. Thus, the nugget 105 is formed so as to bridge across both the sheet members 101 , 102 . Then, when the electrode rollers 103 , 104 move along the butt portion 106 while rolling or when the sheet members 101 , 102 move with respect to the electrode rollers 103 , 104 that are free to move at a definite position, the nugget 105 , which can joint the sheet members 101 , 102 with a large amount of strength, is formed over the entire length of the butt portion 106 . To form the nugget 105 bridging across both the sheet members 101 , 102 , an electrically conductive state must be secured by causing the end surface 101 A of the sheet member 101 to be butted to come into contact with the end surface 102 A of the sheet member 102 . Thus, conventionally, both the end surfaces 101 A, 102 A are polished over the entire lengths thereof prior to butt welding so as to secure a contact state of the end surfaces 101 A, 102 A in the butt welding. Therefore, conventionally, welding sheet members, for example, sheared in predetermined sizes by a shearing apparatus cannot be butt welded in a sheared state and must be subjected to finish processing to the end surfaces 101 A, 102 A prior to a welding operation, which increases a working cost and a working time. An object of the present invention is to provide a butt welding apparatus and a butt welding method capable of eliminating processing such as polishing, and the like for finishing the end surfaces of two welding sheet members to be butted prior to butt welding, and to provide a butt welded product capable of being manufactured by the butt welding method.
|
10848247
| 2,004
|
Methods of forming semiconductor constructions
|
The invention includes methods by which a fuse box of a semiconductor construction is fabricated to have a substantially uniform layer over fuses extending therein. In particular aspects, the invention includes methods in which one or more processing steps associated with fabrication and patterning of bond pads and redistribution layers is conducted simultaneously over a fuse box region to form and/or remove materials that are directly over the fuse box region.
|
BACKGROUND OF THE INVENTION Two facets of prior art semiconductor constructions are pertinent to exemplary aspects of the present invention. One is the utilization of bond pads and redistribution layers, and the other is the utilization of fuses. Both facets are described with reference to a prior art semiconductor construction 10 shown in FIGS. 1 and 2 . Construction 10 comprises a semiconductor substrate 12 having a surface 14 of insulative material. The substrate 12 also comprises a first series of bond pads 16 extending vertically along a central region of the top view of FIG. 1 . The bond pads 16 are beneath surface 14 in the top view, and accordingly are shown in dashed-line view in FIG. 1 . Semiconductor substrate 12 comprises a package having a semiconductor die (such as, for example, a silicon wafer die) (not shown) and integrated circuitry associated therewith (not shown) covered by insulative material 14 . Bond pads 16 electrically interconnect with such integrated circuitry, and are utilized for providing electrical connection between the integrated circuitry contained within the package of construction 10 and other circuitry (not shown) external of construction 10 . For instance, construction 10 can comprise a memory chip and bond pads 16 can be utilized for electrically connecting the memory chip with other circuitry, including, for example, circuitry leading to a computer processor. Bond pads 16 are frequently too tightly packed to readily enable direct connection between bond pads 16 and other circuitry external of the pads. Accordingly, another set of pads 18 is formed, and redistribution layers 20 are provided to electrically connect pads 18 with pads 16 . Pads 18 would typically not be covered by insulative material 14 , so that the pads 18 are exposed for electrical connection to circuitry external of construction 10 . In contrast, redistribution layers 20 typically are covered by insulative material 14 to protect such redistribution layers, and accordingly the redistribution layers are shown in dashed-line view in FIG. 1 . Bond pads 18 are significantly more disperse from one another than are bond pads 16 . As discussed previously, the bond pads 16 and 18 are utilized for electrically connecting to circuitry associated with substrate 12 , and accordingly for providing electrical access to such circuitry. Pads 16 and 18 are thus exemplary access nodes. FIG. 2 shows a cross-sectional view along the line 2 - 2 of FIG. 1 , and illustrates an exemplary assembly of bond pads 16 and 18 , and redistribution layer 20 . The assembly includes a base 22 which can comprise numerous layers of insulative and conductive material. In particular aspects, base 22 will comprise the semiconductor die and integrated circuitry referred to above. For purposes of interpreting this disclosure and the claims that follow, it is useful to define the terms “semiconductor substrate” and “substrate”. Accordingly, the terms “semiconductive substrate” and “semiconductor substrate” are to be understood in this document to mean any construction comprising semiconductive material, including, but not limited to, bulk semiconductive materials such as a semiconductive wafer (either alone or in assemblies comprising other materials thereon), and semiconductive material layers (either alone or in assemblies comprising other materials). The term “substrate” is to be understood to refer to any supporting structure, including, but not limited to, the semiconductive substrates described above. Accordingly, base 22 can be considered a semiconductor substrate if the base comprises a semiconductor die. Also, base 22 in combination with one or more of the layers thereover can be considered a semiconductor substrate if the base comprises a semiconductor die. An insulative material 24 is over base 22 , and pads 16 are within openings extending through insulative material 24 . Insulative material 24 can comprise any suitable material, including, for example, silicon dioxide, silicon nitride, borophosphosilicate glass (BPSG), etc. Additionally, pad 16 can comprise any suitable conductive material or combination of conductive materials, and in particular aspects will comprise, consist essentially of, or consist of one or more metals, metal alloys, or metal-containing compounds. For instance, pad 16 can comprise, consist essentially of, or consist of one or more of copper, silver, aluminum, gold and nickel. Although pad 16 is shown comprising a single homogeneous layer, it is to be understood that pad 16 can comprise multiple layers. Redistribution layer 20 is formed over insulative material 24 and in electrical connection with pad 16 . Redistribution layer 20 can comprise any suitable conductive material or combination of conductive materials, and in particular aspects will comprise, consist essentially of, or consist of one or more of metals, metal compounds, metal alloys, and/or conductively-doped semiconductor material (such as conductively-doped silicon). An insulative material 26 is formed over redistribution layer 20 and over insulative material 24 . Insulative material 26 can be any suitable material, including, for example, BPSG, phosphosilicate glass (PSG), polyimide, etc. Insulative material 26 comprises the upper surface 14 shown in FIG. 1 . Bond pads 18 are formed within openings in insulative material 14 , and in electrical connection with redistribution layer 20 . Bond pads 18 can comprise any suitable electrically conductive material or combination of materials. In particular aspects, bond pads 18 will comprise a nickel-containing layer adjacent redistribution layer 20 , and a gold-containing layer over the nickel-containing layer. As discussed previously with reference to FIG. 1 , bond pads 18 are ultimately utilized for forming electrical connections to circuitry external of construction 10 . Such connections will typically be achieved through utilization of solder balls, and specifically a ball grid array will be formed over the pads 18 of the FIG. 1 construction. An exemplary solder ball 28 is diagrammatically illustrated in FIG. 2 as being electrically connected with shown bond pad 18 . Solder ball 28 is shown in dashed-line view in FIG. 2 to indicate that the solder ball structure is only shown in FIG. 2 , and not in FIG. 1 . FIG. 1 shows a region 30 demarcated by a dashed-line square. Such region is a diagrammatic illustration of a fuse box region (or alternatively a fuse access region). The region 30 is shown as a square and referred to as a fuse “box,” but it is to be understood that fuse box region 30 can have any suitable peripheral shape, including, for example, curved shapes, polygonal shapes, etc. Fuses are provided to extend within region 30 of construction 10 so that various circuit elements within the construction can be electrically decoupled from other elements. Numerous uses of fuses are known to persons of ordinary skill in the art. For instance, the fuses can be utilized for disconnecting circuit elements which are utilized only for testing of circuitry components associated with construction 10 , for disconnecting circuit elements which are found to be faulty through testing of the circuitry so that redundant circuitry can be utilized in place of the faulty circuitry, etc. The fuse box location 30 will typically comprise a number of fuses beneath surface 14 . The fuses can be configured to be broken (i.e. “blown”) with appropriate energy input, such as, for example, laser-energy input and/or thermal-energy input. It is desired that the material over the fuses be uniformly thick across the fuses so that the energy utilized to penetrate through the material and break the fuses is uniform across the fuses in the fuse box region. Numerous difficulties are encountered, however, in attempting to form a uniform-thickness material across all of the fuses contained within fuse box region 30 . Accordingly, some aspects of the invention described herein pertain to methodologies which can enable a substantially uniform thickness of material to be provided over the fuses within a fuse box region. However, although the invention was motivated from this perspective, the invention is not so limited. Rather, the invention is only limited by the accompanying claims as literally worded, and in accordance with the doctrine of equivalents.
|
Title:
Methods of forming semiconductor constructions
Abstract:
The invention includes methods by which a fuse box of a semiconductor construction is fabricated to have a substantially uniform layer over fuses extending therein. In particular aspects, the invention includes methods in which one or more processing steps associated with fabrication and patterning of bond pads and redistribution layers is conducted simultaneously over a fuse box region to form and/or remove materials that are directly over the fuse box region.
Background:
BACKGROUND OF THE INVENTION Two facets of prior art semiconductor constructions are pertinent to exemplary aspects of the present invention. One is the utilization of bond pads and redistribution layers, and the other is the utilization of fuses. Both facets are described with reference to a prior art semiconductor construction 10 shown in FIGS. 1 and 2 . Construction 10 comprises a semiconductor substrate 12 having a surface 14 of insulative material. The substrate 12 also comprises a first series of bond pads 16 extending vertically along a central region of the top view of FIG. 1 . The bond pads 16 are beneath surface 14 in the top view, and accordingly are shown in dashed-line view in FIG. 1 . Semiconductor substrate 12 comprises a package having a semiconductor die (such as, for example, a silicon wafer die) (not shown) and integrated circuitry associated therewith (not shown) covered by insulative material 14 . Bond pads 16 electrically interconnect with such integrated circuitry, and are utilized for providing electrical connection between the integrated circuitry contained within the package of construction 10 and other circuitry (not shown) external of construction 10 . For instance, construction 10 can comprise a memory chip and bond pads 16 can be utilized for electrically connecting the memory chip with other circuitry, including, for example, circuitry leading to a computer processor. Bond pads 16 are frequently too tightly packed to readily enable direct connection between bond pads 16 and other circuitry external of the pads. Accordingly, another set of pads 18 is formed, and redistribution layers 20 are provided to electrically connect pads 18 with pads 16 . Pads 18 would typically not be covered by insulative material 14 , so that the pads 18 are exposed for electrical connection to circuitry external of construction 10 . In contrast, redistribution layers 20 typically are covered by insulative material 14 to protect such redistribution layers, and accordingly the redistribution layers are shown in dashed-line view in FIG. 1 . Bond pads 18 are significantly more disperse from one another than are bond pads 16 . As discussed previously, the bond pads 16 and 18 are utilized for electrically connecting to circuitry associated with substrate 12 , and accordingly for providing electrical access to such circuitry. Pads 16 and 18 are thus exemplary access nodes. FIG. 2 shows a cross-sectional view along the line 2 - 2 of FIG. 1 , and illustrates an exemplary assembly of bond pads 16 and 18 , and redistribution layer 20 . The assembly includes a base 22 which can comprise numerous layers of insulative and conductive material. In particular aspects, base 22 will comprise the semiconductor die and integrated circuitry referred to above. For purposes of interpreting this disclosure and the claims that follow, it is useful to define the terms “semiconductor substrate” and “substrate”. Accordingly, the terms “semiconductive substrate” and “semiconductor substrate” are to be understood in this document to mean any construction comprising semiconductive material, including, but not limited to, bulk semiconductive materials such as a semiconductive wafer (either alone or in assemblies comprising other materials thereon), and semiconductive material layers (either alone or in assemblies comprising other materials). The term “substrate” is to be understood to refer to any supporting structure, including, but not limited to, the semiconductive substrates described above. Accordingly, base 22 can be considered a semiconductor substrate if the base comprises a semiconductor die. Also, base 22 in combination with one or more of the layers thereover can be considered a semiconductor substrate if the base comprises a semiconductor die. An insulative material 24 is over base 22 , and pads 16 are within openings extending through insulative material 24 . Insulative material 24 can comprise any suitable material, including, for example, silicon dioxide, silicon nitride, borophosphosilicate glass (BPSG), etc. Additionally, pad 16 can comprise any suitable conductive material or combination of conductive materials, and in particular aspects will comprise, consist essentially of, or consist of one or more metals, metal alloys, or metal-containing compounds. For instance, pad 16 can comprise, consist essentially of, or consist of one or more of copper, silver, aluminum, gold and nickel. Although pad 16 is shown comprising a single homogeneous layer, it is to be understood that pad 16 can comprise multiple layers. Redistribution layer 20 is formed over insulative material 24 and in electrical connection with pad 16 . Redistribution layer 20 can comprise any suitable conductive material or combination of conductive materials, and in particular aspects will comprise, consist essentially of, or consist of one or more of metals, metal compounds, metal alloys, and/or conductively-doped semiconductor material (such as conductively-doped silicon). An insulative material 26 is formed over redistribution layer 20 and over insulative material 24 . Insulative material 26 can be any suitable material, including, for example, BPSG, phosphosilicate glass (PSG), polyimide, etc. Insulative material 26 comprises the upper surface 14 shown in FIG. 1 . Bond pads 18 are formed within openings in insulative material 14 , and in electrical connection with redistribution layer 20 . Bond pads 18 can comprise any suitable electrically conductive material or combination of materials. In particular aspects, bond pads 18 will comprise a nickel-containing layer adjacent redistribution layer 20 , and a gold-containing layer over the nickel-containing layer. As discussed previously with reference to FIG. 1 , bond pads 18 are ultimately utilized for forming electrical connections to circuitry external of construction 10 . Such connections will typically be achieved through utilization of solder balls, and specifically a ball grid array will be formed over the pads 18 of the FIG. 1 construction. An exemplary solder ball 28 is diagrammatically illustrated in FIG. 2 as being electrically connected with shown bond pad 18 . Solder ball 28 is shown in dashed-line view in FIG. 2 to indicate that the solder ball structure is only shown in FIG. 2 , and not in FIG. 1 . FIG. 1 shows a region 30 demarcated by a dashed-line square. Such region is a diagrammatic illustration of a fuse box region (or alternatively a fuse access region). The region 30 is shown as a square and referred to as a fuse “box,” but it is to be understood that fuse box region 30 can have any suitable peripheral shape, including, for example, curved shapes, polygonal shapes, etc. Fuses are provided to extend within region 30 of construction 10 so that various circuit elements within the construction can be electrically decoupled from other elements. Numerous uses of fuses are known to persons of ordinary skill in the art. For instance, the fuses can be utilized for disconnecting circuit elements which are utilized only for testing of circuitry components associated with construction 10 , for disconnecting circuit elements which are found to be faulty through testing of the circuitry so that redundant circuitry can be utilized in place of the faulty circuitry, etc. The fuse box location 30 will typically comprise a number of fuses beneath surface 14 . The fuses can be configured to be broken (i.e. “blown”) with appropriate energy input, such as, for example, laser-energy input and/or thermal-energy input. It is desired that the material over the fuses be uniformly thick across the fuses so that the energy utilized to penetrate through the material and break the fuses is uniform across the fuses in the fuse box region. Numerous difficulties are encountered, however, in attempting to form a uniform-thickness material across all of the fuses contained within fuse box region 30 . Accordingly, some aspects of the invention described herein pertain to methodologies which can enable a substantially uniform thickness of material to be provided over the fuses within a fuse box region. However, although the invention was motivated from this perspective, the invention is not so limited. Rather, the invention is only limited by the accompanying claims as literally worded, and in accordance with the doctrine of equivalents.
|
10896650
| 2,004
|
Methods, systems, and computer program products for joint account registers
|
A first account profile is on a first mobile communications device and a second account profile is on a second mobile communications device. User input of transactional information is accepted on the first mobile communications device. The first account profile on the first mobile communications device is modified based on the transactional information. A message is transmitted including the transactional information to the second mobile communications device.
|
BACKGROUND OF THE INVENTION Withdrawals and/or deposits to checking accounts generally take some period of time to clear an account. For example, the account user may write a check to a third party, and the third party may take days or weeks to cash the check. Therefore, the ledger balance of the account as recorded by the bank may not include all outstanding checks or transactions. Bank customers generally keep track of outstanding transactions in a register balance to avoid inadvertently overdrawing their account, and financial institutions may charge a penalty if an account is overdrawn. The “register” balance is the current balance on an account if all outstanding transactions were processed. For example, if an account had an initial balance of $500 and if a check were written on the account for $300, the register balance would be $200. However, until the check is cashed, the account would have an actual ledger balance of $500. The register balance may be monitored by manually writing down all transactions in a register balance sheet, which bank customers may keep with their checkbook. Computer software has also been developed to monitor the register balance of an account, such as Quicken™ or Microsoft Money™ software. Software may also be used on hand held devices, such as a personal digital assistant (PDA) or mobile communications device, such as a cellular telephone. Despite these techniques for monitoring the register balance of an account, financial services customers may still experience difficulty in monitoring the register balance of their accounts. Financial services customers may keep extra cash in the account in case a mistake in the register balance is made. Funds that could be used for other purposes may be tied up as a reserve in this attempt to avoid depleting the account. This money could otherwise be spent or invested, such as in an interest-bearing account or investment fund. This problem may be exacerbated when more than one party uses a single account, such as may be the case with family members who share an account or with a business. Multiple parties to an account may struggle with how to communicate transactions to one another.
|
Title:
Methods, systems, and computer program products for joint account registers
Abstract:
A first account profile is on a first mobile communications device and a second account profile is on a second mobile communications device. User input of transactional information is accepted on the first mobile communications device. The first account profile on the first mobile communications device is modified based on the transactional information. A message is transmitted including the transactional information to the second mobile communications device.
Background:
BACKGROUND OF THE INVENTION Withdrawals and/or deposits to checking accounts generally take some period of time to clear an account. For example, the account user may write a check to a third party, and the third party may take days or weeks to cash the check. Therefore, the ledger balance of the account as recorded by the bank may not include all outstanding checks or transactions. Bank customers generally keep track of outstanding transactions in a register balance to avoid inadvertently overdrawing their account, and financial institutions may charge a penalty if an account is overdrawn. The “register” balance is the current balance on an account if all outstanding transactions were processed. For example, if an account had an initial balance of $500 and if a check were written on the account for $300, the register balance would be $200. However, until the check is cashed, the account would have an actual ledger balance of $500. The register balance may be monitored by manually writing down all transactions in a register balance sheet, which bank customers may keep with their checkbook. Computer software has also been developed to monitor the register balance of an account, such as Quicken™ or Microsoft Money™ software. Software may also be used on hand held devices, such as a personal digital assistant (PDA) or mobile communications device, such as a cellular telephone. Despite these techniques for monitoring the register balance of an account, financial services customers may still experience difficulty in monitoring the register balance of their accounts. Financial services customers may keep extra cash in the account in case a mistake in the register balance is made. Funds that could be used for other purposes may be tied up as a reserve in this attempt to avoid depleting the account. This money could otherwise be spent or invested, such as in an interest-bearing account or investment fund. This problem may be exacerbated when more than one party uses a single account, such as may be the case with family members who share an account or with a business. Multiple parties to an account may struggle with how to communicate transactions to one another.
|
10508339
| 2,004
|
Remedy for sleep disturbance
|
The present invention has been made based on the finding that a compound acting on the ORL-1 receptor as an agonist acts as a non-photic entrainment factor, and advances the circadian rhythm phase, and provides a novel therapeutic agent for a sleep disorder such as circadian rhythm sleep disorder, more particularly, an agent for the prophylaxis and/or treatment of a sleep disorder, which contains an ORL-1 receptor agonist, and a novel compound useful as such agent for the prophylaxis and/or treatment.
|
BACKGROUND ART An ORL-1 (opioid receptor-like 1) receptor (FEBS Lett. 347, 284-288, 1994, FEBS Lett. 341, 33-38, 1994) was found to be a fourth opioid receptor next to δ, κ and μ receptors in 1994. The ORL-1 receptor has about 60% homology of amino acid sequences with other opioid receptors, but it is clearly distinguished from other opioid receptors in that naloxone, a non-selective opioid receptor antagonist, does not bind thereto (FEBS Lett. 341, 33-38, 1994). The ORL-1 receptor is mainly distributed in a central nerve system broadly, and is expressed in high density especially in a cerebral cortex, hippocampus, hypothalamus, amygdala and spinal cord, though it is also expressed in peripheral organs such as intestine and spleen (Eur. J. Pharmacol. 340, 1-15, 1997, Pharmacol. Rev. 53, 381-415, 2001). Endogenous ligands for the ORL-1 receptor were identified successively by the research groups in France and Switzerland in 1995, and were designated as nociceptin (Nature 377, 532-535, 1995) and orphanin FQ (Science 270, 792-794, 1995), respectively. Nociceptin has been reported to be a peptide consisting of 17 amino acids, and plays a critical role in central functions such as learning, memory, anxiety and stress (Br. J. Pharmacol. 129, 1261-1283, 2000). Specifically, it has been reported that injecting a small amount of nociceptin to hippocampus of rats causes learning disorder in water-maze learning test (Eur. J. Neurosci. 9, 194-197, 1997) and the nociceptin receptor knock-out mice are quick in learning acquisition in water-maze learning test as compared to normal mice (wild-type), and that long term potentiation (LTP) in hippocampus of knock-out mouse is enhanced as compared to normal mice (Nature 394, 577-581, 1998). Nociceptin is considered to inhibit memory and/or learning functions. In addition, it has been reported that if nociceptin is administered intraventricularly in rats, the anti-anxiety activity is found to be almost equivalent to diazepam in a behavioral pharmacology test such as a conflict test, a light-dark box test and an elevated plus maze test (Proc. Natl. Acad. Sci. USA 94, 14854-14858, 1997). Further, it has been reported that the sensitivity to stress is enhanced, and the adaptation ability to stress is inhibited in nociceptin knock-out mice as compared to normal mice (Proc. Natl. Acad. Sci. USA 96, 10444-10449, 1999). In other words, nociceptin is considered to have a defensive physiological action against anxiety or stress, and the ORL-1 receptor agonist is likely to show anti-anxiety actions by a completely different mechanism from benzodiazepine compounds. From the above, it has been reported that a compound having an agonistic and/or antagonistic activity for the ORL-1 receptor, is useful for treating a mental disorder, a neural disorder and a physiological disorder, and in particular for improving anxiety and stress disorders, depression, a trauma disorder, memory loss from Alzheimer's disease or other dementia, epilepsy and spasm symptoms, acute and/or chronic pain symptoms, withdrawal symptoms from drug addiction, control of water balance, Na + excretion, arterial blood pressure disorder and eating disorder such as obesity and anorexia (publications such as JP-A-2000-26466, JP-A-11-228575, JP-A-10-212290, JP-A-2000-53686, WO00/14067, WO99/29696, EP1122257, JP-A-2001-39974, WO00/08013, WO99/36421, EP0997464, WO03/000677, WO98/54168, WO00/31061, JP-A-2001-58991, WO01/39767, WO01/39775, WO02/085291, WO02/085354, WO02/085355, WO02/085361, WO00/27815, WO00/06545, WO99/59997, WO99/48492, WO02/26714, etc.). On the other hand, the circadian rhythm sleep disorder is a disease in which a person's main complaint or cardinal symptom is the lack of normal sleep at night, and this disease may sometimes disturb ordinary social behavior. This disease includes a variety of pathological states, for example, endogenous chronic syndromes such as delayed sleep phase syndromes caused by a disruption of the biological clock and its synchronizing mechanism, as well as exogenous acute syndromes such as jet-lag syndromes and a shift-work sleep disorder. Although various drug therapies have been tried for the treatment of circadian rhythm sleep disorder, it has been revealed that only an insufficient therapeutic effect can be obtained with hypnotics, which are typically benzodiazepine hypnotics (as a Review of pathologic states, therapy or others for a circadian rhythm sleep disorder, see, for example, S. Ozaki and K. Okawa, “Sleep Disorder and Biological Rhythm”, Special feature; Chronopharmacology, New Guideline of Administration, Molecular Medicine, Vol.34(3), pp. 355-365, 1997, etc.). Entrainment factors of circadian rhythm are classified into the two major groups of light (photic entrainment) and other factors than light (non-photic entrainment). The drugs which have been known to cause non-photic entrainment so far, are serotonin agonists, benzodiazepine hypnotics, melatonin and the like, but no ORL-1 receptor agonist has been reported to cause non-photic entrainment. One paper has disclosed that a small amount of nociceptin, an endogenous ligand of the ORL-1 receptor, was injected into suprachiasmatic nucleus, biological clock of hamster, but the paper has concluded that nociceptin inhibits photic entrainment, but nociceptin itself does not cause non-photic entrainment (J. Neurosci., Vol.19(6), pp. 2152-2160, 1999). In addition, the above-mentioned publications and the patent publication neither disclose nor suggest that a compound having an agonistic and/or antagonistic activity for the ORL-1 receptor, can be used for treating a circadian rhythm sleep disorder.
|
Title:
Remedy for sleep disturbance
Abstract:
The present invention has been made based on the finding that a compound acting on the ORL-1 receptor as an agonist acts as a non-photic entrainment factor, and advances the circadian rhythm phase, and provides a novel therapeutic agent for a sleep disorder such as circadian rhythm sleep disorder, more particularly, an agent for the prophylaxis and/or treatment of a sleep disorder, which contains an ORL-1 receptor agonist, and a novel compound useful as such agent for the prophylaxis and/or treatment.
Background:
BACKGROUND ART An ORL-1 (opioid receptor-like 1) receptor (FEBS Lett. 347, 284-288, 1994, FEBS Lett. 341, 33-38, 1994) was found to be a fourth opioid receptor next to δ, κ and μ receptors in 1994. The ORL-1 receptor has about 60% homology of amino acid sequences with other opioid receptors, but it is clearly distinguished from other opioid receptors in that naloxone, a non-selective opioid receptor antagonist, does not bind thereto (FEBS Lett. 341, 33-38, 1994). The ORL-1 receptor is mainly distributed in a central nerve system broadly, and is expressed in high density especially in a cerebral cortex, hippocampus, hypothalamus, amygdala and spinal cord, though it is also expressed in peripheral organs such as intestine and spleen (Eur. J. Pharmacol. 340, 1-15, 1997, Pharmacol. Rev. 53, 381-415, 2001). Endogenous ligands for the ORL-1 receptor were identified successively by the research groups in France and Switzerland in 1995, and were designated as nociceptin (Nature 377, 532-535, 1995) and orphanin FQ (Science 270, 792-794, 1995), respectively. Nociceptin has been reported to be a peptide consisting of 17 amino acids, and plays a critical role in central functions such as learning, memory, anxiety and stress (Br. J. Pharmacol. 129, 1261-1283, 2000). Specifically, it has been reported that injecting a small amount of nociceptin to hippocampus of rats causes learning disorder in water-maze learning test (Eur. J. Neurosci. 9, 194-197, 1997) and the nociceptin receptor knock-out mice are quick in learning acquisition in water-maze learning test as compared to normal mice (wild-type), and that long term potentiation (LTP) in hippocampus of knock-out mouse is enhanced as compared to normal mice (Nature 394, 577-581, 1998). Nociceptin is considered to inhibit memory and/or learning functions. In addition, it has been reported that if nociceptin is administered intraventricularly in rats, the anti-anxiety activity is found to be almost equivalent to diazepam in a behavioral pharmacology test such as a conflict test, a light-dark box test and an elevated plus maze test (Proc. Natl. Acad. Sci. USA 94, 14854-14858, 1997). Further, it has been reported that the sensitivity to stress is enhanced, and the adaptation ability to stress is inhibited in nociceptin knock-out mice as compared to normal mice (Proc. Natl. Acad. Sci. USA 96, 10444-10449, 1999). In other words, nociceptin is considered to have a defensive physiological action against anxiety or stress, and the ORL-1 receptor agonist is likely to show anti-anxiety actions by a completely different mechanism from benzodiazepine compounds. From the above, it has been reported that a compound having an agonistic and/or antagonistic activity for the ORL-1 receptor, is useful for treating a mental disorder, a neural disorder and a physiological disorder, and in particular for improving anxiety and stress disorders, depression, a trauma disorder, memory loss from Alzheimer's disease or other dementia, epilepsy and spasm symptoms, acute and/or chronic pain symptoms, withdrawal symptoms from drug addiction, control of water balance, Na + excretion, arterial blood pressure disorder and eating disorder such as obesity and anorexia (publications such as JP-A-2000-26466, JP-A-11-228575, JP-A-10-212290, JP-A-2000-53686, WO00/14067, WO99/29696, EP1122257, JP-A-2001-39974, WO00/08013, WO99/36421, EP0997464, WO03/000677, WO98/54168, WO00/31061, JP-A-2001-58991, WO01/39767, WO01/39775, WO02/085291, WO02/085354, WO02/085355, WO02/085361, WO00/27815, WO00/06545, WO99/59997, WO99/48492, WO02/26714, etc.). On the other hand, the circadian rhythm sleep disorder is a disease in which a person's main complaint or cardinal symptom is the lack of normal sleep at night, and this disease may sometimes disturb ordinary social behavior. This disease includes a variety of pathological states, for example, endogenous chronic syndromes such as delayed sleep phase syndromes caused by a disruption of the biological clock and its synchronizing mechanism, as well as exogenous acute syndromes such as jet-lag syndromes and a shift-work sleep disorder. Although various drug therapies have been tried for the treatment of circadian rhythm sleep disorder, it has been revealed that only an insufficient therapeutic effect can be obtained with hypnotics, which are typically benzodiazepine hypnotics (as a Review of pathologic states, therapy or others for a circadian rhythm sleep disorder, see, for example, S. Ozaki and K. Okawa, “Sleep Disorder and Biological Rhythm”, Special feature; Chronopharmacology, New Guideline of Administration, Molecular Medicine, Vol.34(3), pp. 355-365, 1997, etc.). Entrainment factors of circadian rhythm are classified into the two major groups of light (photic entrainment) and other factors than light (non-photic entrainment). The drugs which have been known to cause non-photic entrainment so far, are serotonin agonists, benzodiazepine hypnotics, melatonin and the like, but no ORL-1 receptor agonist has been reported to cause non-photic entrainment. One paper has disclosed that a small amount of nociceptin, an endogenous ligand of the ORL-1 receptor, was injected into suprachiasmatic nucleus, biological clock of hamster, but the paper has concluded that nociceptin inhibits photic entrainment, but nociceptin itself does not cause non-photic entrainment (J. Neurosci., Vol.19(6), pp. 2152-2160, 1999). In addition, the above-mentioned publications and the patent publication neither disclose nor suggest that a compound having an agonistic and/or antagonistic activity for the ORL-1 receptor, can be used for treating a circadian rhythm sleep disorder.
|
10932581
| 2,004
|
Drinking tube and cap assembly
|
A hydration system is disclosed for carrying readily dispensable fluids, such as water. A removable cap having an annular valve covers a container. A flexible tube is disposed through the center of the annular valve and extends generally to near the bottom of the container. A bite valve is attached to the end of the tube that is external to the container. When the annular valve is closed, the hydration system is substantially closed, preventing fluid loss. When the annular valve is opened, an air channel is created that allows air to enter the container, facilitating the flow of fluid from the container through the flexible tube. The annular valve may be a poppet-type valve having a valve stem that is movable between the closed position and the open position. The hydration system is sufficiently compact to be utilized with narrow-mouthed bottles.
|
BACKGROUND OF THE INVENTION Water bottles and similar hydration systems are popular, particularly among outdoor athletes—for example, by persons engaged in hiking, biking, skating, etc. Hydration systems are convenient for rehydrating a person who has lost body fluids as a result of heat, physical exertion, arid environment, and/or the passage of time. There are two general types of hydration systems—(1) hard or rigid/semirigid container systems, and (2) soft or flexible bladder systems. A hard container system includes a hard or semirigid container that is made from plastic, metal, glass, or another material that holds its shape when the container is empty. The container typically includes a removable lid, providing access to the contents of the container. Examples of such containers include, but are not limited to, NALGENE® brand bottles, sports cycle bottles, canteens, and glass bottles. Hard container systems provide many advantages. For example, hard containers can easily be cleaned and can hold a number of different liquids, including water. Because the container is generally rigid or semirigid, it is sturdy and difficult to puncture. Moreover, the container typically retains its shape in a backpack, even when other items are placed on top of the container. A rigid or semirigid container system can be transported separate from or away from the user—for example, in a water carrier on a bicycle. Alternatively, a hard container system can be mounted in a wearable carrier, allowing the weight of the liquid to be efficiently transferred to the user's hips. Hard container systems, however, often require that the container be physically removed from a carrier or other support mechanism that holds the container. This may require the user to stop doing whatever physical activity is being performed or to substantially interrupt such activity in order to remove the container from its carrier or holder so that the user can rehydrate. Most rigid containers are carried in this fashion. Another disadvantage of hard container systems is that for the liquid to be efficiently removed from a rigid or semirigid container, the container must be vented to permit air to enter the container in order to replace the volume of liquid being removed from the container. Without such a vent, the removal of the liquid will generally cause a partial vacuum to form in the container, impeding or completely preventing the flow of the liquid out of the container. In many applications it is undesirable to have a vent that is always open. If the vent remains open during exposure to harsh environmental conditions, the vent could allow dirt to enter the container, resulting in contamination of the liquid. Dirt can also obstruct the vent, thereby rendering the vent inoperable. Therefore, the user may be required to open a vent prior to consuming the contents of the container, further interrupting the user's activities. Systems have been proposed that incorporate automatically operable mechanical vents, e.g., check valves, that require a pressure differential that must be overcome to open the vent. These automatic vents, however, require additional pressure differential to extract the fluid and therefore add resistance to the overall system. In some rigid containers an extra-wide drinking opening is provided, such that the liquid egress and vent air can simultaneously pass through the same opening. Such containers however, can be difficult to drink from without spilling the contents. To avoid some of the disadvantages discussed above, hard container hydration systems are sometimes equipped with an elongate, flexible drinking tube that extends from the container to the user's mouth. The tube may be quite long, and the elevation difference from the top of the container to the user's end of the tube (that may include a mouth dispenser) can often be several feet. This requires the user to suck the liquid through the length of the tube at each use. Some systems utilize a check valve to prevent the liquid from returning to the container, i.e., whereby a volume of liquid remains in the tube. Alternatively, some systems use motorized or manual pumps to force liquid through the liquid tube, while other systems require complicated valves either in the liquid tube or mouth dispenser. Check valves and unidirectional valves have a set pressure differential that must be overcome for the valve to operate properly. For example, a check valve may use spring tension or the resilient nature of a plastic or rubber material to urge the valve to a closed position. This tension is typically preset so the pressure required to open the valve remains substantially constant. Similarly, if a liquid tube or vent contains an in-line check valve, the force to open the valve remains constant regardless of all other conditions in the system. Generally speaking, check valves are expensive to manufacture, degrade over time, malfunction when dirty, freeze easily, and allow fluid to flow in a single direction. Moreover, some hard container systems with drinking tubes requiring the bottle to be inverted so that gravity can help pull air into the container when the user ceases to suck liquid from the drinking tube, are known in the art. Soft bladder container systems overcome many of the disadvantages of hard container systems. A soft bladder container system typically includes a pliable liquid container or bladder that provides a liquid reservoir. The bladder is easily compressed, folded, or deformed. Examples of this type of system include, but are not limited to, the CAMELBAK® brand system, the PLATYPUS® brand system, bota bags, and collapsible water pails. The bladder or pliable container, however, generally requires some type of support when the container is filled with a liquid-for example, a backpack-type assembly. A tube is typically provided to the container, allowing the user to draw water to from the reservoir of the soft bladder system. An advantage of such soft bladder systems is that the user can rehydrate without stopping an activity. Because the soft bladder container is pliable, it can collapse as liquid is removed, obviating the need for a vent, and it is easier to draw liquid from the bladder because no check valve is required. In conventional, soft bladder container systems, the soft bladder must be operated with its tube at the container's lowest point in order for the bladder to be fully evacuated during use. A disadvantage of soft bladder systems is that they are susceptible to punctures and leaks. While positioned upside down and supported inside a carrier pack, a leak can drain the bladder of liquid into vital gear, such as a sleeping bag or clothing. The flexible materials that are used to manufacture the soft bladder hydration systems are selected to withstand water but may deteriorate or absorb nonwater constituents present in other liquids. A soft bladder type of system is often transported on the back of the user, which may increase the risk of back fatigue and back injury. The construction of a soft bladder hydration system typically causes water to flow from the liquid dispenser when the bladder becomes compressed during use. In addition, a soft container is extremely difficult to clean. Many manufacturers of soft bladder hydration systems often offer secondary products such as patch kits, cleaning brushes, cleaning holders, and extensive cleaning chemicals for their systems. There remains a need, therefore, for a hydration system that provides the advantages of ruggedness of rigid container systems while also providing the ease of use and availability of soft bladder container systems.
|
Title:
Drinking tube and cap assembly
Abstract:
A hydration system is disclosed for carrying readily dispensable fluids, such as water. A removable cap having an annular valve covers a container. A flexible tube is disposed through the center of the annular valve and extends generally to near the bottom of the container. A bite valve is attached to the end of the tube that is external to the container. When the annular valve is closed, the hydration system is substantially closed, preventing fluid loss. When the annular valve is opened, an air channel is created that allows air to enter the container, facilitating the flow of fluid from the container through the flexible tube. The annular valve may be a poppet-type valve having a valve stem that is movable between the closed position and the open position. The hydration system is sufficiently compact to be utilized with narrow-mouthed bottles.
Background:
BACKGROUND OF THE INVENTION Water bottles and similar hydration systems are popular, particularly among outdoor athletes—for example, by persons engaged in hiking, biking, skating, etc. Hydration systems are convenient for rehydrating a person who has lost body fluids as a result of heat, physical exertion, arid environment, and/or the passage of time. There are two general types of hydration systems—(1) hard or rigid/semirigid container systems, and (2) soft or flexible bladder systems. A hard container system includes a hard or semirigid container that is made from plastic, metal, glass, or another material that holds its shape when the container is empty. The container typically includes a removable lid, providing access to the contents of the container. Examples of such containers include, but are not limited to, NALGENE® brand bottles, sports cycle bottles, canteens, and glass bottles. Hard container systems provide many advantages. For example, hard containers can easily be cleaned and can hold a number of different liquids, including water. Because the container is generally rigid or semirigid, it is sturdy and difficult to puncture. Moreover, the container typically retains its shape in a backpack, even when other items are placed on top of the container. A rigid or semirigid container system can be transported separate from or away from the user—for example, in a water carrier on a bicycle. Alternatively, a hard container system can be mounted in a wearable carrier, allowing the weight of the liquid to be efficiently transferred to the user's hips. Hard container systems, however, often require that the container be physically removed from a carrier or other support mechanism that holds the container. This may require the user to stop doing whatever physical activity is being performed or to substantially interrupt such activity in order to remove the container from its carrier or holder so that the user can rehydrate. Most rigid containers are carried in this fashion. Another disadvantage of hard container systems is that for the liquid to be efficiently removed from a rigid or semirigid container, the container must be vented to permit air to enter the container in order to replace the volume of liquid being removed from the container. Without such a vent, the removal of the liquid will generally cause a partial vacuum to form in the container, impeding or completely preventing the flow of the liquid out of the container. In many applications it is undesirable to have a vent that is always open. If the vent remains open during exposure to harsh environmental conditions, the vent could allow dirt to enter the container, resulting in contamination of the liquid. Dirt can also obstruct the vent, thereby rendering the vent inoperable. Therefore, the user may be required to open a vent prior to consuming the contents of the container, further interrupting the user's activities. Systems have been proposed that incorporate automatically operable mechanical vents, e.g., check valves, that require a pressure differential that must be overcome to open the vent. These automatic vents, however, require additional pressure differential to extract the fluid and therefore add resistance to the overall system. In some rigid containers an extra-wide drinking opening is provided, such that the liquid egress and vent air can simultaneously pass through the same opening. Such containers however, can be difficult to drink from without spilling the contents. To avoid some of the disadvantages discussed above, hard container hydration systems are sometimes equipped with an elongate, flexible drinking tube that extends from the container to the user's mouth. The tube may be quite long, and the elevation difference from the top of the container to the user's end of the tube (that may include a mouth dispenser) can often be several feet. This requires the user to suck the liquid through the length of the tube at each use. Some systems utilize a check valve to prevent the liquid from returning to the container, i.e., whereby a volume of liquid remains in the tube. Alternatively, some systems use motorized or manual pumps to force liquid through the liquid tube, while other systems require complicated valves either in the liquid tube or mouth dispenser. Check valves and unidirectional valves have a set pressure differential that must be overcome for the valve to operate properly. For example, a check valve may use spring tension or the resilient nature of a plastic or rubber material to urge the valve to a closed position. This tension is typically preset so the pressure required to open the valve remains substantially constant. Similarly, if a liquid tube or vent contains an in-line check valve, the force to open the valve remains constant regardless of all other conditions in the system. Generally speaking, check valves are expensive to manufacture, degrade over time, malfunction when dirty, freeze easily, and allow fluid to flow in a single direction. Moreover, some hard container systems with drinking tubes requiring the bottle to be inverted so that gravity can help pull air into the container when the user ceases to suck liquid from the drinking tube, are known in the art. Soft bladder container systems overcome many of the disadvantages of hard container systems. A soft bladder container system typically includes a pliable liquid container or bladder that provides a liquid reservoir. The bladder is easily compressed, folded, or deformed. Examples of this type of system include, but are not limited to, the CAMELBAK® brand system, the PLATYPUS® brand system, bota bags, and collapsible water pails. The bladder or pliable container, however, generally requires some type of support when the container is filled with a liquid-for example, a backpack-type assembly. A tube is typically provided to the container, allowing the user to draw water to from the reservoir of the soft bladder system. An advantage of such soft bladder systems is that the user can rehydrate without stopping an activity. Because the soft bladder container is pliable, it can collapse as liquid is removed, obviating the need for a vent, and it is easier to draw liquid from the bladder because no check valve is required. In conventional, soft bladder container systems, the soft bladder must be operated with its tube at the container's lowest point in order for the bladder to be fully evacuated during use. A disadvantage of soft bladder systems is that they are susceptible to punctures and leaks. While positioned upside down and supported inside a carrier pack, a leak can drain the bladder of liquid into vital gear, such as a sleeping bag or clothing. The flexible materials that are used to manufacture the soft bladder hydration systems are selected to withstand water but may deteriorate or absorb nonwater constituents present in other liquids. A soft bladder type of system is often transported on the back of the user, which may increase the risk of back fatigue and back injury. The construction of a soft bladder hydration system typically causes water to flow from the liquid dispenser when the bladder becomes compressed during use. In addition, a soft container is extremely difficult to clean. Many manufacturers of soft bladder hydration systems often offer secondary products such as patch kits, cleaning brushes, cleaning holders, and extensive cleaning chemicals for their systems. There remains a need, therefore, for a hydration system that provides the advantages of ruggedness of rigid container systems while also providing the ease of use and availability of soft bladder container systems.
|
10814929
| 2,004
|
Method and apparatus for switching packets in a passive optical network
|
One embodiment of the present invention provides a system that performs packets switching in a passive optical network which includes a central node and at least one remote node. After receiving a packet, the system obtains a first set of results by performing a first lookup based on a first set of values derived from the packet. The system also obtains a second set of results by performing a second lookup based on a second set of values derived from the packet. Next, the system merges the first set of results and the second set of results, and produces a merged value. The system then obtains a subsequent result by performing a subsequent lookup with the merged value. If the packet is a downstream packet, the system derives a logical identifier corresponding to one or more remote nodes from the subsequent result. The system then incorporates the logical identifier into the packet and transmits the packet to one or more remote nodes.
|
BACKGROUND 1. Field of the Invention The present invention relates to packet switching in communication networks. More specifically, the present invention relates to a method and apparatus for switching packets in a passive optical network. 2. Related Art In order to keep pace with increasing Internet traffic, optical fibers and optical transmission equipment have been widely deployed to substantially increase the capacity of backbone networks. However, this capacity increase in backbone networks has not been matched by a corresponding capacity increase in access networks. Even with broadband access solutions, such as digital subscriber line (DSL) and cable modem (CM), the limited bandwidth offered by current access networks creates a severe bottleneck in delivering high bandwidth to end users. Among the different technologies presently being developed, Ethernet passive optical networks (EPONs) are among the best candidates for next-generation access networks. EPONs combine ubiquitous Ethernet technology with inexpensive passive optics. They offer the simplicity and scalability of Ethernet with the cost-efficiency and high capacity of passive optics. Because of optical fiber's high bandwidth, EPONs can support broadband voice, data, and video traffic simultaneously. Such integrated services are difficult to provide with DSL or CM technology. Furthermore, EPONs are more suitable for Internet Protocol (IP) traffic, since Ethernet frames can encapsulate native IP packets with different sizes, whereas ATM passive optical networks (APONs) use fixed-size ATM cells and require packet fragmentation and reassembly. Typically, EPONs are used in the “first mile” of the network, which provides connectivity between the service provider's central offices and business or residential subscribers. This first mile network is a logical point-to-multipoint network, with a central office servicing a number of subscribers. In a typical tree-topology EPON, one fiber couples the central office to a passive optical coupler, which divides and distributes downstream optical signals to subscribers. The coupler also combines upstream signals from subscribers (see FIG. 1 ). Transmissions in an EPON are typically between an optical line terminal (OLT) and optical networks units (ONUs) (see FIG. 2 ). The OLT generally resides in the central office and couples the optical access network to an external network (e.g., a carrier network). An ONU can be located either at the curb or at an end-user location, and can provide broadband voice, data, and video services. ONUs are typically coupled to a one-by-N (1×N) passive optical coupler, and the passive optical coupler is coupled to the OLT through a single optical link. (Note that a number of optical couplers can be cascaded.) This configuration can achieve significant savings in the number of fibers and amount of hardware. Communications within an EPON are divided into downstream traffic (from OLT to ONUs) and upstream traffic (from ONUs to OLT). In the upstream direction, the ONUs share channel capacity and resources, since there is only one link coupling the passive optical coupler with the OLT. In the downstream direction, because of the broadcast nature of the 1×N passive optical coupler, packets are broadcast by the OLT to all ONUs and are subsequently extracted by their destination ONUs. Each network device attached to a certain ONU is assigned a Logical Link ID (LLID), according to the IEEE 802.3ah standard. A downstream packet is first processed at the OLT, where the packet receives the LLID of its destination, and is then transmitted to the ONUs. Although a packet is broadcast to all the ONUs, only the ONUs with an LLID that matches the one with the packet is allowed to receive the packet. Therefore, the OLT switches packets by attaching proper LLIDs to the packets. The OLT is responsible for processing and forwarding both upstream and downstream packets. Because the links in EPONs may operate at high speeds (e.g., 1 Gbps and above), the OLT bears the burden of processing a large number of packets at line speed. Furthermore, customers often request virtual local area network (VLAN) services. The additional VLAN packet processing adds to OLT's workload. Hence, what is needed is a method and apparatus for switching packets in a passive optical network, which can process packets at line speed and implement various forwarding policies cost-effectively.
|
Title:
Method and apparatus for switching packets in a passive optical network
Abstract:
One embodiment of the present invention provides a system that performs packets switching in a passive optical network which includes a central node and at least one remote node. After receiving a packet, the system obtains a first set of results by performing a first lookup based on a first set of values derived from the packet. The system also obtains a second set of results by performing a second lookup based on a second set of values derived from the packet. Next, the system merges the first set of results and the second set of results, and produces a merged value. The system then obtains a subsequent result by performing a subsequent lookup with the merged value. If the packet is a downstream packet, the system derives a logical identifier corresponding to one or more remote nodes from the subsequent result. The system then incorporates the logical identifier into the packet and transmits the packet to one or more remote nodes.
Background:
BACKGROUND 1. Field of the Invention The present invention relates to packet switching in communication networks. More specifically, the present invention relates to a method and apparatus for switching packets in a passive optical network. 2. Related Art In order to keep pace with increasing Internet traffic, optical fibers and optical transmission equipment have been widely deployed to substantially increase the capacity of backbone networks. However, this capacity increase in backbone networks has not been matched by a corresponding capacity increase in access networks. Even with broadband access solutions, such as digital subscriber line (DSL) and cable modem (CM), the limited bandwidth offered by current access networks creates a severe bottleneck in delivering high bandwidth to end users. Among the different technologies presently being developed, Ethernet passive optical networks (EPONs) are among the best candidates for next-generation access networks. EPONs combine ubiquitous Ethernet technology with inexpensive passive optics. They offer the simplicity and scalability of Ethernet with the cost-efficiency and high capacity of passive optics. Because of optical fiber's high bandwidth, EPONs can support broadband voice, data, and video traffic simultaneously. Such integrated services are difficult to provide with DSL or CM technology. Furthermore, EPONs are more suitable for Internet Protocol (IP) traffic, since Ethernet frames can encapsulate native IP packets with different sizes, whereas ATM passive optical networks (APONs) use fixed-size ATM cells and require packet fragmentation and reassembly. Typically, EPONs are used in the “first mile” of the network, which provides connectivity between the service provider's central offices and business or residential subscribers. This first mile network is a logical point-to-multipoint network, with a central office servicing a number of subscribers. In a typical tree-topology EPON, one fiber couples the central office to a passive optical coupler, which divides and distributes downstream optical signals to subscribers. The coupler also combines upstream signals from subscribers (see FIG. 1 ). Transmissions in an EPON are typically between an optical line terminal (OLT) and optical networks units (ONUs) (see FIG. 2 ). The OLT generally resides in the central office and couples the optical access network to an external network (e.g., a carrier network). An ONU can be located either at the curb or at an end-user location, and can provide broadband voice, data, and video services. ONUs are typically coupled to a one-by-N (1×N) passive optical coupler, and the passive optical coupler is coupled to the OLT through a single optical link. (Note that a number of optical couplers can be cascaded.) This configuration can achieve significant savings in the number of fibers and amount of hardware. Communications within an EPON are divided into downstream traffic (from OLT to ONUs) and upstream traffic (from ONUs to OLT). In the upstream direction, the ONUs share channel capacity and resources, since there is only one link coupling the passive optical coupler with the OLT. In the downstream direction, because of the broadcast nature of the 1×N passive optical coupler, packets are broadcast by the OLT to all ONUs and are subsequently extracted by their destination ONUs. Each network device attached to a certain ONU is assigned a Logical Link ID (LLID), according to the IEEE 802.3ah standard. A downstream packet is first processed at the OLT, where the packet receives the LLID of its destination, and is then transmitted to the ONUs. Although a packet is broadcast to all the ONUs, only the ONUs with an LLID that matches the one with the packet is allowed to receive the packet. Therefore, the OLT switches packets by attaching proper LLIDs to the packets. The OLT is responsible for processing and forwarding both upstream and downstream packets. Because the links in EPONs may operate at high speeds (e.g., 1 Gbps and above), the OLT bears the burden of processing a large number of packets at line speed. Furthermore, customers often request virtual local area network (VLAN) services. The additional VLAN packet processing adds to OLT's workload. Hence, what is needed is a method and apparatus for switching packets in a passive optical network, which can process packets at line speed and implement various forwarding policies cost-effectively.
|
10982890
| 2,004
|
Method for preparing amino alkyl(meth)acrylates
|
A process for the preparation of aminoalkyl (meth)acrylates by transesterification from C1-C4-alkyl (meth)acrylates and aminoalcohols is described, in which process the trans-esterification is carried out in the presence of at least one distannoxane of the general formula (1) wherein R=linear, cyclic or branched alkyl radical having from 1 to 6 carbon atoms, phenyl radical, and the radicals. R may be identical or different from one another, Y=halogen, preferably Cl, Br; pseudo-halogen, preferably SCN; OH, OAc or OR, the radicals Y being identical or different from one another, as catalyst, and the use of the aminoalkyl (meth)acrylates prepared according to the process in the preparation of cationic monomers.
|
Title:
Method for preparing amino alkyl(meth)acrylates
Abstract:
A process for the preparation of aminoalkyl (meth)acrylates by transesterification from C1-C4-alkyl (meth)acrylates and aminoalcohols is described, in which process the trans-esterification is carried out in the presence of at least one distannoxane of the general formula (1) wherein R=linear, cyclic or branched alkyl radical having from 1 to 6 carbon atoms, phenyl radical, and the radicals. R may be identical or different from one another, Y=halogen, preferably Cl, Br; pseudo-halogen, preferably SCN; OH, OAc or OR, the radicals Y being identical or different from one another, as catalyst, and the use of the aminoalkyl (meth)acrylates prepared according to the process in the preparation of cationic monomers.
Background:
|
|
11012841
| 2,004
|
Method and apparatus for pharyngeal augmentation of ventilation
|
A nasopharyngeal catheter provides direct pharyngeal delivery of high flows of humidified air, oxygen, helium, or other gases to supplement ventilation of a spontaneously breathing patient. For example, flow rates in the range of approximately 4 to 40 liters per minute can be employed. The flow passes through a heater that maintains a desired temperature, and a humidifier that maintains a desired relative humidity. The present invention includes a nasal catheter that can be cut to a desired length and removably attached to a horizontal delivery tube. Gas can be supplied through oxygen connections at either end of the horizontal delivery tube.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates generally to the field of systems for augmenting patient ventilation. More specifically, the present invention discloses a nasopharyngeal catheter used for providing a supplemental flow of air/oxygen to a patient. 2. Statement of the Problem A variety of conventional therapies are currently used for treatment of sleep apnea. A mechanical ventilation system can be used to supply nasal continuous positive airway pressure (CPAP) or bilevel positive airway pressure (BiPAP) through a mask strapped to the patient's face. Both CPAP and BiPAP ventilation seek to achieve elevated backpressures to relieve airway obstruction. These therapies can be effective in a clinical setting (e.g., in a sleep laboratory), but tend to suffer from poor compliance in the home due primarily to patient discomfort and the obtrusiveness of the required equipment. In particular, patients often experience discomfort due to the drying effect on the airway, the sensation of pressure, and other adverse effects from the mask, such as cellulitis, nasal congestion, dermatitis, nose bleeds, and claustrophobia. The obtrusiveness of the face mask, large-bore tubing, ventilator noise, restricted sexual activity, and restricted mobility associated with these therapies impacts both the patient and the patient's significant other. Surgical procedures are sometimes used to treat sleep apnea. Nasal surgery tends to have minimal long-term benefits. A uvulopalatalpharyngoplasty (UPPP) can be performed if the obstruction is thought to be at the level of the soft palate (i.e., between the nasopharynx and the oropharynx) However, this surgical procedure is relatively uncomfortable and has a relatively low success rate, typically not greater than 50 percent. Supplemental air/oxygen can be delivered via a nasal cannula. This more comfortable and less obstructive than surgery or CPAP/BiPAP ventilation. But, it is not effective in treating obstructive sleep apnea, even with high flows, since the flow merely exits through the patient's nostrils if an airway obstruction exists. Tracheotomy is generally successful in treating sleep apnea, but is extremely poorly tolerated due to daytime inconvenience, interference with normal speech, patient discomfort, and poor social acceptance. Finally, ventilation can be augmented via a transtracheal catheter. This approach allows either low or high flows of humidified gas to be delivered directly into the patient's trachea. It is very effective, relatively comfortable for the patient, and only minimally intrusive. In addition to relieving the obstruction in sleep apnea, transtracheal augmentation of ventilation with high flows of heated and humidified air has been shown to offer the advantages of reduced physiologic dead space, reduced inspired minute ventilation, decreased work of breathing, improved daytime activity and exercise capacity, and improved sleep for the patient. However, it does require surgery for creation of a tracheal stoma, and involves inconvenience for maintenance and care, including keeping the stoma open both day and night. Similarly, conventional therapies for treatment of respiratory failure or insufficiency have many of the same shortcomings. Nasal CPAP and BiPAP ventilation have the same issues and concerns as with sleep apnea. Rather than relieving the obstruction, these therapies are intended to “rest” respiratory muscles and reduce the work of breathing. Little data are available to show any resulting long-term benefits, but the patient may have a reduced PCO 2 . As previously discussed, CPAP and BiPAP ventilation often causes patient discomfort due to the drying effect that flows of unhumidified air/oxygen can have on nasal and pulmonary secretions. The patient may also feel claustrophobic and may “fight” the efforts of the device to force air/oxygen into the nose. The previously discussed shortcomings associated with a tracheotomy with conventional mechanical ventilation or transtracheal augmentation of ventilation also apply in treatment of chronic or acute respiratory failure or insufficiency. Previous Nasopharyngeal Catheters. Nasopharyngeal catheters were formerly used to deliver low flow rates of oxygen to hospitalized patients. A length of flexible tubing was inserted into the patients' nostril and its distal tip was advanced through the nasal cavity into the nasopharynx until it could be viewed past the soft palate by looking into the patient's mouth. The catheter was then withdrawn until it disappeared behind the soft palate. The tubing was held in place by tape applied to the bridge of the patient's nose. The state of technology at that time only allowed for delivery of poorly humidified gas. As a result, mucus would tend to obstruct the catheter. The catheter would have to be removed, cleaned, and reinserted every eight hours, which often resulted in poor patient tolerance. In addition, the catheter could be easily dislodged out of the patient's nose or inadvertently advanced into the patient's esophagus, potentially causing serious complications such as gastric distention, perforation, and aspiration. The catheter could also be inadvertently placed into the trachea or lungs. Due to these shortcomings, this technology has not been used for approximately 30 to 40 years. 3. Solution to the Problem The present invention provides a method and apparatus for direct pharyngeal delivery of high flows of humidified air, oxygen, or other gases to supplement ventilation of a spontaneously breathing patient. For example, the present invention can be used for the purpose of treating patients with respiratory failure or insufficiency, or sleep apnea syndrome. In a home setting, the present invention can be employed for nocturnal augmentation of patients with sleep apnea syndrome (obstructive, central, or mixed), or chronic respiratory failure or insufficiency resulting from emphysema (COPD), other obstructive lung diseases, interstitial lung diseases, pleural diseases, neuromuscular diseases, and other restrictive disorders. In a hospital setting, the present invention can be used to treat patients with acute respiratory failure/insufficiency or acute respiratory failure/insufficiency superimposed upon chronic respiratory failure/insufficiency. The present system can be used intermittently or throughout the day and night to augment ventilation and avoid the need for endotracheal intubation and conventional mechanical ventilation. The present invention offers a number of advantages over the prior art in treatment of sleep apnea and respiratory failure/insufficiency. No surgical procedure is required. The device is more comfortable and less obtrusive for the patient to wear. The catheter effectively bypasses any obstructions in the patient's nasal cavity and nasopharynx. The high flow of gas can also helps to relieve any obstruction between the nasopharynx and trachea (e.g., obstruction by the tongue). The flow of air/oxygen is thoroughly humidified, which reduces accumulation of mucus and drying of the patient's airway. There are no constraints on the patient during periods when the patient is not receiving therapy. In addition, the present system can be used to deliver a variety of gases including air (for sleep apnea and neuromuscular disorders), air and oxygen (for hypoxemia), and helium and oxygen (for enhanced gas transport and other physiologic benefits, such as reduced work of breathing).
|
Title:
Method and apparatus for pharyngeal augmentation of ventilation
Abstract:
A nasopharyngeal catheter provides direct pharyngeal delivery of high flows of humidified air, oxygen, helium, or other gases to supplement ventilation of a spontaneously breathing patient. For example, flow rates in the range of approximately 4 to 40 liters per minute can be employed. The flow passes through a heater that maintains a desired temperature, and a humidifier that maintains a desired relative humidity. The present invention includes a nasal catheter that can be cut to a desired length and removably attached to a horizontal delivery tube. Gas can be supplied through oxygen connections at either end of the horizontal delivery tube.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates generally to the field of systems for augmenting patient ventilation. More specifically, the present invention discloses a nasopharyngeal catheter used for providing a supplemental flow of air/oxygen to a patient. 2. Statement of the Problem A variety of conventional therapies are currently used for treatment of sleep apnea. A mechanical ventilation system can be used to supply nasal continuous positive airway pressure (CPAP) or bilevel positive airway pressure (BiPAP) through a mask strapped to the patient's face. Both CPAP and BiPAP ventilation seek to achieve elevated backpressures to relieve airway obstruction. These therapies can be effective in a clinical setting (e.g., in a sleep laboratory), but tend to suffer from poor compliance in the home due primarily to patient discomfort and the obtrusiveness of the required equipment. In particular, patients often experience discomfort due to the drying effect on the airway, the sensation of pressure, and other adverse effects from the mask, such as cellulitis, nasal congestion, dermatitis, nose bleeds, and claustrophobia. The obtrusiveness of the face mask, large-bore tubing, ventilator noise, restricted sexual activity, and restricted mobility associated with these therapies impacts both the patient and the patient's significant other. Surgical procedures are sometimes used to treat sleep apnea. Nasal surgery tends to have minimal long-term benefits. A uvulopalatalpharyngoplasty (UPPP) can be performed if the obstruction is thought to be at the level of the soft palate (i.e., between the nasopharynx and the oropharynx) However, this surgical procedure is relatively uncomfortable and has a relatively low success rate, typically not greater than 50 percent. Supplemental air/oxygen can be delivered via a nasal cannula. This more comfortable and less obstructive than surgery or CPAP/BiPAP ventilation. But, it is not effective in treating obstructive sleep apnea, even with high flows, since the flow merely exits through the patient's nostrils if an airway obstruction exists. Tracheotomy is generally successful in treating sleep apnea, but is extremely poorly tolerated due to daytime inconvenience, interference with normal speech, patient discomfort, and poor social acceptance. Finally, ventilation can be augmented via a transtracheal catheter. This approach allows either low or high flows of humidified gas to be delivered directly into the patient's trachea. It is very effective, relatively comfortable for the patient, and only minimally intrusive. In addition to relieving the obstruction in sleep apnea, transtracheal augmentation of ventilation with high flows of heated and humidified air has been shown to offer the advantages of reduced physiologic dead space, reduced inspired minute ventilation, decreased work of breathing, improved daytime activity and exercise capacity, and improved sleep for the patient. However, it does require surgery for creation of a tracheal stoma, and involves inconvenience for maintenance and care, including keeping the stoma open both day and night. Similarly, conventional therapies for treatment of respiratory failure or insufficiency have many of the same shortcomings. Nasal CPAP and BiPAP ventilation have the same issues and concerns as with sleep apnea. Rather than relieving the obstruction, these therapies are intended to “rest” respiratory muscles and reduce the work of breathing. Little data are available to show any resulting long-term benefits, but the patient may have a reduced PCO 2 . As previously discussed, CPAP and BiPAP ventilation often causes patient discomfort due to the drying effect that flows of unhumidified air/oxygen can have on nasal and pulmonary secretions. The patient may also feel claustrophobic and may “fight” the efforts of the device to force air/oxygen into the nose. The previously discussed shortcomings associated with a tracheotomy with conventional mechanical ventilation or transtracheal augmentation of ventilation also apply in treatment of chronic or acute respiratory failure or insufficiency. Previous Nasopharyngeal Catheters. Nasopharyngeal catheters were formerly used to deliver low flow rates of oxygen to hospitalized patients. A length of flexible tubing was inserted into the patients' nostril and its distal tip was advanced through the nasal cavity into the nasopharynx until it could be viewed past the soft palate by looking into the patient's mouth. The catheter was then withdrawn until it disappeared behind the soft palate. The tubing was held in place by tape applied to the bridge of the patient's nose. The state of technology at that time only allowed for delivery of poorly humidified gas. As a result, mucus would tend to obstruct the catheter. The catheter would have to be removed, cleaned, and reinserted every eight hours, which often resulted in poor patient tolerance. In addition, the catheter could be easily dislodged out of the patient's nose or inadvertently advanced into the patient's esophagus, potentially causing serious complications such as gastric distention, perforation, and aspiration. The catheter could also be inadvertently placed into the trachea or lungs. Due to these shortcomings, this technology has not been used for approximately 30 to 40 years. 3. Solution to the Problem The present invention provides a method and apparatus for direct pharyngeal delivery of high flows of humidified air, oxygen, or other gases to supplement ventilation of a spontaneously breathing patient. For example, the present invention can be used for the purpose of treating patients with respiratory failure or insufficiency, or sleep apnea syndrome. In a home setting, the present invention can be employed for nocturnal augmentation of patients with sleep apnea syndrome (obstructive, central, or mixed), or chronic respiratory failure or insufficiency resulting from emphysema (COPD), other obstructive lung diseases, interstitial lung diseases, pleural diseases, neuromuscular diseases, and other restrictive disorders. In a hospital setting, the present invention can be used to treat patients with acute respiratory failure/insufficiency or acute respiratory failure/insufficiency superimposed upon chronic respiratory failure/insufficiency. The present system can be used intermittently or throughout the day and night to augment ventilation and avoid the need for endotracheal intubation and conventional mechanical ventilation. The present invention offers a number of advantages over the prior art in treatment of sleep apnea and respiratory failure/insufficiency. No surgical procedure is required. The device is more comfortable and less obtrusive for the patient to wear. The catheter effectively bypasses any obstructions in the patient's nasal cavity and nasopharynx. The high flow of gas can also helps to relieve any obstruction between the nasopharynx and trachea (e.g., obstruction by the tongue). The flow of air/oxygen is thoroughly humidified, which reduces accumulation of mucus and drying of the patient's airway. There are no constraints on the patient during periods when the patient is not receiving therapy. In addition, the present system can be used to deliver a variety of gases including air (for sleep apnea and neuromuscular disorders), air and oxygen (for hypoxemia), and helium and oxygen (for enhanced gas transport and other physiologic benefits, such as reduced work of breathing).
|
10881022
| 2,004
|
Integrated DDR/SDR flow control managers that support multiple queues and mux, demux and broadcast operating modes
|
An integrated circuit chip includes a plurality of independent FIFO memory devices that are each configured to support all four combinations of DDR and SDR write modes and DDR and SDR read modes and collectively configured to support all four multiplexer, demultiplexer, broadcast and multi-Q operating modes.
|
BACKGROUND OF THE INVENTION Semiconductor memory devices can typically be classified on the basis of memory functionality, data access patterns and the nature of the data storage mechanism. For example, distinctions are typically made between read-only memory (ROM) devices and read-write memory (RWM) devices. The RWM devices typically have the advantage of offering both read and write functionality with comparable data access times. Typically, in RWM devices, data can be stored in flip-flops for “static” memory devices or as preset levels of charge on a capacitor in “dynamic” memory devices. As will be understood by those skilled in the art, static memory devices retain their data as long as a supply of power is maintained, however, dynamic memory devices require periodic data refreshing to compensate for potential charge leakage. Because RWM devices use active circuitry to store data, they belong to a class of memory devices known as “volatile” memory devices because data stored therein will be lost upon termination of the power supply. ROM devices, on the other hand, may encode data into circuit topology (e.g., by blowing fuses, removing diodes, etc.). Because this latter type of data storage may be hardwired, the data cannot be modified, but can only be read. ROM devices also typically belong to a class of memory devices known as “nonvolatile” memory devices because data stored therein will typically not be lost upon termination of the power supply. Other types of memory devices include nonvolatile read-write (NVRWM) memory devices. These types of nonvolatile memory devices may operate as erasable programmable read-only memory (EPROM) devices, electrically erasable programmable read-only memory (E 2 PROM) devices and flash memory devices, for example. An additional memory classification is typically based on the order in which data can be accessed. Here, most memory devices belong to the random-access class, which means that memory locations can be read from or written to in random order. Notwithstanding the fact that most memory devices provide random-access, typically only random-access RWM memories use the acronym RAM. Alternatively, memory devices may restrict the order of data access to achieve shorter data access times, reduce layout area and/or provide specialized functionality. Examples of such specialized memory devices include buffer memory devices such as first-in first-out (FIFO) memory devices, last-in first-out (LIFO or “stack”) memory devices, shift registers and content-addressable memory (CAM) devices. A final classification of semiconductor memories is based on the number of data input and data output ports associated with the memory cells therein. For example, although most memory devices have unit cells therein that provide only a single port, which is shared to provide an input and output path for transfer of data, memory devices with higher bandwidth requirements often have cells therein with multiple input and output ports. However, the addition of ports to unit memory cells typically increases the complexity and layout area requirements for these higher bandwidth memory devices. Single-port memory devices are typically made using static RAM cells if fast data access times are a requirement, and dynamic RAM cells if low cost is a primary requirement. Many FIFO memory devices use dual-port RAM based designs with self-incrementing internal read and write pointers to achieve fast fall-through capability. As will be understood by those skilled in the art, fall-through capability is typically measured as the time elapsing between the end of a write cycle into a previously empty FIFO and the time an operation to read that data may begin. Exemplary FIFO memory devices are more fully described and illustrated at section 2.2.7 of a textbook by A. K. Sharma entitled “Semiconductor Memories: Technology, Testing and Reliability”, IEEE Press (1997). In particular, dual-port SRAM-based FIFOs typically utilize separate read and write pointers to advantageously allow read and write operations to occur independently of each other and achieve fast fall-through capability as data written into a dual-port SRAM FIFO can be immediately accessed for reading. Since these read and write operations may occur independently, independent read and write clocks having different frequencies may be provided to enable the FIFO to act as a buffer between peripheral devices operating at different rates. Unfortunately, a major disadvantage of typical dual-port SRAM-based FIFOs is the relatively large unit cell size for each dual-port SRAM cell therein. Thus, for a given semiconductor chip size, dual-port buffer memory devices typically provide less memory capacity relative to single-port buffer memory devices. For example, using a standard DRAM cell as a reference unit cell consuming one (1) unit of area, a single-port SRAM unit cell typically may consume four (4) units of area and a dual-port SRAM unit cell typically may consume sixteen (16) units of area. Moreover, the relatively large unit cells of a dual-port SRAM FIFO limit the degree to which the number of write operations can exceed the number of read operations before the FIFO becomes full. To address these limitations of dual-port buffer memory devices, single-port buffer memory devices have been developed to, among other things, achieve higher data capacities for a given semiconductor chip size. For example, U.S. Pat. No. 5,546,347 to Ko et al. entitled “Interleaving Architecture And Method For A High Density FIFO”, assigned to the present assignee, discloses a memory device that has high capacity and uses relatively small single-port memory cells. However, the use of only single port memory cells typically precludes simultaneous read and write access to data in the same memory cell, which means that single-port buffer memory devices typically have slower fall-through time than comparable dual-port memory devices. Moreover, single-port buffer memory devices may use complicated arbitration hardware to control sequencing and queuing of reading and writing operations. U.S. Pat. No. 5,371,708 to Kobayashi also discloses a FIFO memory device containing a single-port memory array, a read data register for holding read data from the memory array and a write data register for holding data to be written into the memory array. A bypass switch is also provided for transferring data from the write data register to the read data register so that the memory array can be bypassed during testing of the FIFO to detect the presence of defects therein. However, like the above-described single-port buffer memory devices, simultaneous read and write access to data is not feasible. Commonly assigned U.S. Pat. Nos. 5,978,307, 5,982,700 and 5,998,478 disclose FIFO memory devices having generally fast fall-through capability. These memory buffers contain a tri-port memory array of moderate capacity having nonlinear columns of tri-port cells therein, which collectively form four separate registers, and a substantially larger capacity supplemental memory array (e.g., DRAM array) having cells therein with reduced unit cell size. The tri-port memory array has a read port, a write port and a bidirectional input/output port. The tri-port memory array communicates internally with the supplemental memory array via the bidirectional input/output port and communicates with external devices (e.g., peripheral devices) via the read and write data ports. Efficient steering circuitry is also provided by a bidirectional crosspoint switch that electrically couples terminals (lines IO and IOB) of the bidirectional input/output port in parallel to bit lines (BL and BLB) in the supplemental memory array during a write-to-memory time interval and vice versa during a read-from-memory time interval. U.S. Pat. Nos. 6,240,031, 6,377,071 and 6,400,642, which are related and commonly assigned to Cypress Semiconductor Corp., disclose a pair of FIFOs that are configured to operate internally in a ping-pong fashion during read and write cycles. Each FIFO in the pair operates at half the frequency of an external clock in order to provide DDR read functions and DDR write functions. U.S. Pat. No. 6,134,180 to Kim et al. discloses a synchronous random access memory (RAM) device that supports burst write operations and burst read operations at single and dual data rates. However, unlike a FIFO memory device, the RAM device disclosed in the '180 patent does not support write and read operations to and from a memory core during overlapping time intervals. Notwithstanding the above described memory devices, there still exists a need to develop higher speed FIFO memory devices having expanded functionality and increased data capacity. There also exists a need for FIFO memory devices that provide faster data transfer for such applications as network, video, telecommunications and data communications.
|
Title:
Integrated DDR/SDR flow control managers that support multiple queues and mux, demux and broadcast operating modes
Abstract:
An integrated circuit chip includes a plurality of independent FIFO memory devices that are each configured to support all four combinations of DDR and SDR write modes and DDR and SDR read modes and collectively configured to support all four multiplexer, demultiplexer, broadcast and multi-Q operating modes.
Background:
BACKGROUND OF THE INVENTION Semiconductor memory devices can typically be classified on the basis of memory functionality, data access patterns and the nature of the data storage mechanism. For example, distinctions are typically made between read-only memory (ROM) devices and read-write memory (RWM) devices. The RWM devices typically have the advantage of offering both read and write functionality with comparable data access times. Typically, in RWM devices, data can be stored in flip-flops for “static” memory devices or as preset levels of charge on a capacitor in “dynamic” memory devices. As will be understood by those skilled in the art, static memory devices retain their data as long as a supply of power is maintained, however, dynamic memory devices require periodic data refreshing to compensate for potential charge leakage. Because RWM devices use active circuitry to store data, they belong to a class of memory devices known as “volatile” memory devices because data stored therein will be lost upon termination of the power supply. ROM devices, on the other hand, may encode data into circuit topology (e.g., by blowing fuses, removing diodes, etc.). Because this latter type of data storage may be hardwired, the data cannot be modified, but can only be read. ROM devices also typically belong to a class of memory devices known as “nonvolatile” memory devices because data stored therein will typically not be lost upon termination of the power supply. Other types of memory devices include nonvolatile read-write (NVRWM) memory devices. These types of nonvolatile memory devices may operate as erasable programmable read-only memory (EPROM) devices, electrically erasable programmable read-only memory (E 2 PROM) devices and flash memory devices, for example. An additional memory classification is typically based on the order in which data can be accessed. Here, most memory devices belong to the random-access class, which means that memory locations can be read from or written to in random order. Notwithstanding the fact that most memory devices provide random-access, typically only random-access RWM memories use the acronym RAM. Alternatively, memory devices may restrict the order of data access to achieve shorter data access times, reduce layout area and/or provide specialized functionality. Examples of such specialized memory devices include buffer memory devices such as first-in first-out (FIFO) memory devices, last-in first-out (LIFO or “stack”) memory devices, shift registers and content-addressable memory (CAM) devices. A final classification of semiconductor memories is based on the number of data input and data output ports associated with the memory cells therein. For example, although most memory devices have unit cells therein that provide only a single port, which is shared to provide an input and output path for transfer of data, memory devices with higher bandwidth requirements often have cells therein with multiple input and output ports. However, the addition of ports to unit memory cells typically increases the complexity and layout area requirements for these higher bandwidth memory devices. Single-port memory devices are typically made using static RAM cells if fast data access times are a requirement, and dynamic RAM cells if low cost is a primary requirement. Many FIFO memory devices use dual-port RAM based designs with self-incrementing internal read and write pointers to achieve fast fall-through capability. As will be understood by those skilled in the art, fall-through capability is typically measured as the time elapsing between the end of a write cycle into a previously empty FIFO and the time an operation to read that data may begin. Exemplary FIFO memory devices are more fully described and illustrated at section 2.2.7 of a textbook by A. K. Sharma entitled “Semiconductor Memories: Technology, Testing and Reliability”, IEEE Press (1997). In particular, dual-port SRAM-based FIFOs typically utilize separate read and write pointers to advantageously allow read and write operations to occur independently of each other and achieve fast fall-through capability as data written into a dual-port SRAM FIFO can be immediately accessed for reading. Since these read and write operations may occur independently, independent read and write clocks having different frequencies may be provided to enable the FIFO to act as a buffer between peripheral devices operating at different rates. Unfortunately, a major disadvantage of typical dual-port SRAM-based FIFOs is the relatively large unit cell size for each dual-port SRAM cell therein. Thus, for a given semiconductor chip size, dual-port buffer memory devices typically provide less memory capacity relative to single-port buffer memory devices. For example, using a standard DRAM cell as a reference unit cell consuming one (1) unit of area, a single-port SRAM unit cell typically may consume four (4) units of area and a dual-port SRAM unit cell typically may consume sixteen (16) units of area. Moreover, the relatively large unit cells of a dual-port SRAM FIFO limit the degree to which the number of write operations can exceed the number of read operations before the FIFO becomes full. To address these limitations of dual-port buffer memory devices, single-port buffer memory devices have been developed to, among other things, achieve higher data capacities for a given semiconductor chip size. For example, U.S. Pat. No. 5,546,347 to Ko et al. entitled “Interleaving Architecture And Method For A High Density FIFO”, assigned to the present assignee, discloses a memory device that has high capacity and uses relatively small single-port memory cells. However, the use of only single port memory cells typically precludes simultaneous read and write access to data in the same memory cell, which means that single-port buffer memory devices typically have slower fall-through time than comparable dual-port memory devices. Moreover, single-port buffer memory devices may use complicated arbitration hardware to control sequencing and queuing of reading and writing operations. U.S. Pat. No. 5,371,708 to Kobayashi also discloses a FIFO memory device containing a single-port memory array, a read data register for holding read data from the memory array and a write data register for holding data to be written into the memory array. A bypass switch is also provided for transferring data from the write data register to the read data register so that the memory array can be bypassed during testing of the FIFO to detect the presence of defects therein. However, like the above-described single-port buffer memory devices, simultaneous read and write access to data is not feasible. Commonly assigned U.S. Pat. Nos. 5,978,307, 5,982,700 and 5,998,478 disclose FIFO memory devices having generally fast fall-through capability. These memory buffers contain a tri-port memory array of moderate capacity having nonlinear columns of tri-port cells therein, which collectively form four separate registers, and a substantially larger capacity supplemental memory array (e.g., DRAM array) having cells therein with reduced unit cell size. The tri-port memory array has a read port, a write port and a bidirectional input/output port. The tri-port memory array communicates internally with the supplemental memory array via the bidirectional input/output port and communicates with external devices (e.g., peripheral devices) via the read and write data ports. Efficient steering circuitry is also provided by a bidirectional crosspoint switch that electrically couples terminals (lines IO and IOB) of the bidirectional input/output port in parallel to bit lines (BL and BLB) in the supplemental memory array during a write-to-memory time interval and vice versa during a read-from-memory time interval. U.S. Pat. Nos. 6,240,031, 6,377,071 and 6,400,642, which are related and commonly assigned to Cypress Semiconductor Corp., disclose a pair of FIFOs that are configured to operate internally in a ping-pong fashion during read and write cycles. Each FIFO in the pair operates at half the frequency of an external clock in order to provide DDR read functions and DDR write functions. U.S. Pat. No. 6,134,180 to Kim et al. discloses a synchronous random access memory (RAM) device that supports burst write operations and burst read operations at single and dual data rates. However, unlike a FIFO memory device, the RAM device disclosed in the '180 patent does not support write and read operations to and from a memory core during overlapping time intervals. Notwithstanding the above described memory devices, there still exists a need to develop higher speed FIFO memory devices having expanded functionality and increased data capacity. There also exists a need for FIFO memory devices that provide faster data transfer for such applications as network, video, telecommunications and data communications.
|
10929634
| 2,004
|
Semiconductor contact device
|
The invention provides an advanced metallization technique for fabricating a memory cell array on a substrate. The array is fabricated by forming discrete and self-aligned vias in a first layer disposed over the array to form contacts to each of the source and drain junction in the array. Further, self-aligned local area slotted vias are formed in a second layer that is disposed over the first layer to form local area interconnects that electrically shunt all of the source contacts/junctions. Further, discrete self-aligned drain extensions are formed over each of the formed drain contacts to electrically connect the junctions, and source contacts to the extensions. The formed vias, extensions, and slotted local area vias are simultaneously plugged and filled with a conductive material to form the memory cell array.
|
BACKGROUND OF THE INVENTION Contacts are required in an integrated circuit device to provide electrical connections between layers or levels of the integrated circuit device. Semiconductor devices typically include a multitude of transistors, which are coupled together in particular configurations through the use of contacts. A conventional flash memory module includes multiple memory cells. A memory cell includes a stacked gate, a drain, and a source. A drain contact electrically connects the drain of each memory cell to a conductive layer (a bit line) above the stacked gate. The conductive layer can be a aluminum layer. For a NOR type of memory array, a common/single source contact connects the source junctions of a number of memory cells. This common source contact is generally referred to as a “source rail.” There is increasing pressure in the current semiconductor industry to achieve higher device density within a given die area. This is particularly true in memory circuit fabrication, such as a flash memory manufacture. In recent years, the number and density of these memory cells on the flash memory module has dramatically increased so that the number of memory cells on a single chip is expected to soon reach 1 Gigabit. Increases in semiconductor packing density and downsizing of individual devices has resulted in increases in circuit density. Many aspects of the semiconductor fabrication process are affected by the demand for density increases in device packing. Feature alignment from one semiconductor level to the next is of critical importance, particularly relating to the alignment of contact holes with the underlying structures with which they are to connect, such as active areas. Device miniaturization complicates the process of forming interconnect structures because in order to maintain sufficient electrical communication, the interconnect structure must be formed in exact alignment with an underlying active region. At the same time, the area of the interconnect structure interfacing with the active area must be maximized. Thus, as device sizes shrink there is less room for misalignment errors of the interconnect structure. Device size reductions are due in part to advances in photolithography and directional (anisotropic) plasma etching. Because horizontal device feature sizes are approaching deep submicrometer dimensions, self-alignment techniques are employed to relax the alignment requirements and improve critical dimension (CD) control. One such self-alignment technique is called self-aligned contact (SAC) etching. In SAC etching, a pair of adjacent gate stacks are utilized to align an etched opening in an insulating layer. Currently there are possible options for a flash memory module to utilize the self-aligned contact process. The first option is to limit the SAC process to the current location for making contact to both the source and the drain junctions. In this case, a scaled process would still be limited by high source rail resistance and/or excess source junction overlap with the gate stack. The second option would be to merge a local area interconnect and the SAC process together. The problem with this option being is that you have to etch both a long slotted contact over the source junctions and discrete round contacts over the drain junctions. Etching of the SAC contact is generally very shape sensitive and etching of such multiple shapes during the self-aligned contact process can result in significant etch problems and self-aligned contact problems. In addition, the long slotted contact would be passing over both active junction regions and field isolation regions. The etch would ideally have to be selective to field isolation. This is somewhat difficult, because the material used for the field isolation and the undoped glass, under the borophosphosilicate glass (BPSG) are very similar. The third possible option is to limit the SAC etch contact to one size only, all having a discrete round pattern. The problem with this approach is that the source contacts are not linked together and an additional shunting layer must be patterned (resulting in a second lithography level), etched (resulting in a second etch step), and formed for the source junctions (resulting in a second metal deposition and chemical-mechanical polishing (CMP)). As device sizes are reduced, smaller dimensions are required to achieve higher packing densities. The spacing between the contacts and the gate can significantly contribute to the overall size of the flash memory cell. Simply reducing the space between the contacts and the gate makes the fabrication process less robust, more complex for the lithography process, and less cost effective due to yield loss resulting from alignment errors. Thus, there is a need in the art to relax contact-to-gate spacing, making the SAC contact a requirement. In addition, there is a need for a flash memory with a smaller cell channel length, which will require the use of a local interconnect. Further still, there is an overall need to reduce the cost of the process flow, which in combination with all of the above, requires the memory cell fabrication process to be more robust, less complex, and more cost effective.
|
Title:
Semiconductor contact device
Abstract:
The invention provides an advanced metallization technique for fabricating a memory cell array on a substrate. The array is fabricated by forming discrete and self-aligned vias in a first layer disposed over the array to form contacts to each of the source and drain junction in the array. Further, self-aligned local area slotted vias are formed in a second layer that is disposed over the first layer to form local area interconnects that electrically shunt all of the source contacts/junctions. Further, discrete self-aligned drain extensions are formed over each of the formed drain contacts to electrically connect the junctions, and source contacts to the extensions. The formed vias, extensions, and slotted local area vias are simultaneously plugged and filled with a conductive material to form the memory cell array.
Background:
BACKGROUND OF THE INVENTION Contacts are required in an integrated circuit device to provide electrical connections between layers or levels of the integrated circuit device. Semiconductor devices typically include a multitude of transistors, which are coupled together in particular configurations through the use of contacts. A conventional flash memory module includes multiple memory cells. A memory cell includes a stacked gate, a drain, and a source. A drain contact electrically connects the drain of each memory cell to a conductive layer (a bit line) above the stacked gate. The conductive layer can be a aluminum layer. For a NOR type of memory array, a common/single source contact connects the source junctions of a number of memory cells. This common source contact is generally referred to as a “source rail.” There is increasing pressure in the current semiconductor industry to achieve higher device density within a given die area. This is particularly true in memory circuit fabrication, such as a flash memory manufacture. In recent years, the number and density of these memory cells on the flash memory module has dramatically increased so that the number of memory cells on a single chip is expected to soon reach 1 Gigabit. Increases in semiconductor packing density and downsizing of individual devices has resulted in increases in circuit density. Many aspects of the semiconductor fabrication process are affected by the demand for density increases in device packing. Feature alignment from one semiconductor level to the next is of critical importance, particularly relating to the alignment of contact holes with the underlying structures with which they are to connect, such as active areas. Device miniaturization complicates the process of forming interconnect structures because in order to maintain sufficient electrical communication, the interconnect structure must be formed in exact alignment with an underlying active region. At the same time, the area of the interconnect structure interfacing with the active area must be maximized. Thus, as device sizes shrink there is less room for misalignment errors of the interconnect structure. Device size reductions are due in part to advances in photolithography and directional (anisotropic) plasma etching. Because horizontal device feature sizes are approaching deep submicrometer dimensions, self-alignment techniques are employed to relax the alignment requirements and improve critical dimension (CD) control. One such self-alignment technique is called self-aligned contact (SAC) etching. In SAC etching, a pair of adjacent gate stacks are utilized to align an etched opening in an insulating layer. Currently there are possible options for a flash memory module to utilize the self-aligned contact process. The first option is to limit the SAC process to the current location for making contact to both the source and the drain junctions. In this case, a scaled process would still be limited by high source rail resistance and/or excess source junction overlap with the gate stack. The second option would be to merge a local area interconnect and the SAC process together. The problem with this option being is that you have to etch both a long slotted contact over the source junctions and discrete round contacts over the drain junctions. Etching of the SAC contact is generally very shape sensitive and etching of such multiple shapes during the self-aligned contact process can result in significant etch problems and self-aligned contact problems. In addition, the long slotted contact would be passing over both active junction regions and field isolation regions. The etch would ideally have to be selective to field isolation. This is somewhat difficult, because the material used for the field isolation and the undoped glass, under the borophosphosilicate glass (BPSG) are very similar. The third possible option is to limit the SAC etch contact to one size only, all having a discrete round pattern. The problem with this approach is that the source contacts are not linked together and an additional shunting layer must be patterned (resulting in a second lithography level), etched (resulting in a second etch step), and formed for the source junctions (resulting in a second metal deposition and chemical-mechanical polishing (CMP)). As device sizes are reduced, smaller dimensions are required to achieve higher packing densities. The spacing between the contacts and the gate can significantly contribute to the overall size of the flash memory cell. Simply reducing the space between the contacts and the gate makes the fabrication process less robust, more complex for the lithography process, and less cost effective due to yield loss resulting from alignment errors. Thus, there is a need in the art to relax contact-to-gate spacing, making the SAC contact a requirement. In addition, there is a need for a flash memory with a smaller cell channel length, which will require the use of a local interconnect. Further still, there is an overall need to reduce the cost of the process flow, which in combination with all of the above, requires the memory cell fabrication process to be more robust, less complex, and more cost effective.
|
10850967
| 2,004
|
Substituted quinazolinone compounds
|
A variety of small molecule, guanidine-containing molecules capable of acting as MC4-R agonists are provided. The compounds are useful in treating MC4-R mediated diseases when administered to subjects. The compounds have the structure IA, IB, and IC where the values of the variables are defined herein.
|
BACKGROUND OF THE INVENTION Melanocortins are peptide products resulting from post-translational processing of pro-opiomelanocortin and are known to have a broad array of physiological activities. The natural melanocortins include the different types of melanocyte stimulating hormone (α-MSH, β-MSH, γ-MSH) and ACTH. Of these, α-MSH and ACTH are considered to be the main endogenous melanocortins. The melanocortins mediate their effects through melanocortin receptors (MC-Rs), a subfamily of G-protein coupled receptors. There are at least five different receptor subtypes (MC1-R to MC5-R). MC1-R mediates pigmentation of the hair and skin. MC2-R mediates the effects of ACTH on steroidogenesis in the adrenal gland. MC3-R and MC4-R are predominantly expressed in the brain. MC5-R is considered to have a role in the exocrine gland system. The melanocortin-4 receptor (MC4-R) is a seven-transmembrane receptor. MC4-R may participate in modulating the flow of visual and sensory information, coordinate aspects of somatomotor control, and/or participate in the modulation of autonomic outflow to the heart. K. G. Mountjoy et al., Science, 257:1248-125 (1992). Significantly, inactivation of this receptor by gene targeting has resulted in mice that develop a maturity onset obesity syndrome associated with hyperphagia, hyperinsulinemia, and hyperglycemia. D. Husznar et al., Cell, 88(1): 131-41 (1997). MC4-R has also been implicated in other disease states including erectile disorders, cardiovascular disorders, neuronal injuries or disorders, inflammation, fever, cognitive disorders, and sexual behavior disorders. M. E. Hadley and C. Haskell-Luevano, The Proopiomelanocortin system, Ann. N.Y. Acad. Sci., 885:1 (1999). Furthermore, observations in connection with endogenous MC4-R antagonists indicate that MC4-R is implicated in endogenous energy regulation. For example, an agouti protein is normally expressed in the skin and is an antagonist of the cutaneous MC receptor involved in pigmentation, MC1-R. M. M. Ollmann et al., Science, 278:135-138 (1997). However, overexpression of agouti protein in mice leads to a yellow coat color due to antagonism of MC1-R and increased food intake and body weight due to antagonism of MC4-R. L. L. Kiefer et al., Biochemistry, 36: 2084-2090 (1997); D. S. Lu et al., Nature, 371:799-802 (1994). Agouti related protein (AGRP), an agouti protein homologue, antagonizes MC4-R but not MC1-R. T. M. Fong et al., Biochem. Biophys. Res. Commun. 237:629-631 (1997). Administration of AGRP in mice increases food intake and causes obesity but does not alter pigmentation. M. Rossi et al., Endocrinology, 139:4428-4431 (1998). Together, this research indicates that MC4-R participates in energy regulation, and therefore, identifies this receptor as a target for a rational drug design for the treatment of obesity. In connection with MC4-R and its uncovered role in the etiology of obesity and food intake, the prior art includes reports of compounds and compositions that act as agonists or antagonists of MC4-R. As examples, U.S. Pat. No. 6,060,589 describes polypeptides that are capable of modulating signaling activity of melanocortin receptors. Also, U.S. Pat. Nos. 6,054,556 and 5,731,408 describe families of agonists and antagonists for MC4-R receptors that are lactam heptapeptides having a cyclic structure. WO 01/10842 discloses MC4-R binding compounds having a multitude of structures and methods of using such compounds to treat MC4-R associated disorders. Some of the compounds described include amidino- and guanidino-containing arenes and heteroarenes. Various other classes of compounds have been disclosed as having MC4-R agonist activity. For example, WO 01/70708 and WO 00/74679 disclose MC4-R agonists that are piperidine compounds and derivatives, while WO 01/70337 and WO 99/64002 disclose MC-R agonists that are spiropiperidine derivatives. Other known melanocortin receptor agonists include aromatic amine compounds containing amino acid residues, particularly tryptophan residues, as disclosed in WO 01/55106. Similar agonists are disclosed in WO 01/055107 which comprise aromatic amine compounds containing tertiary amide or tertiary amine groups. Finally, WO 01/055109 discloses melanocortin receptor agonists comprising aromatic amines which are generally bisamides separated by a nitrogen-containing alkyl linker. Guanidine-containing compounds having a variety of biological activities are also known in the prior art. For example, U.S. Pat. No. 4,732,916 issued to Satoh et al. discloses guanidine compounds useful as antiulcer agents; U.S. Pat. No. 4,874,864, U.S. Pat. No. 4,949,891, and U.S. Pat. No. 4,948,901 issued to Schnur et al. and EP 0343 894 disclose guanidino compounds useful as protease inhibitors and as anti-plasmin and anti-thrombin agents; and U.S. Pat. No. 5,352,704 issued to Okuyama et al. discloses a guanidino compound useful as an antiviral agent. Guanidine-containing compounds are also disclosed in other references. For example, U.S. Pat. No. 6,030,985 issued to Gentile et al. discloses guanidine compounds useful for treating and preventing conditions in which inhibition of nitric oxide synthetase is beneficial such as stroke, schizophrenia, anxiety, and pain. U.S. Pat. No. 5,952,381 issued to Chen et al. discloses certain guanidine compounds for use in selectively inhibiting or antagonizing α v β 3 integrins. Various 5-, 6-, and 7-membered fully saturated 1-azacarbocyclic-2-ylidene derivatives of guanidine are disclosed as having anti-secretory and hypoglycemic activities by U.S. Pat. No. 4,211,867 issued to Rasmussen. Such compounds are also taught as useful for the treatment of cardiovascular disease. Other guanidine derivatives are disclosed by U.S. Pat. No. 5,885,985 issued to Macdonald et al. as useful in therapy to treat inflammation. Various guanidinobenzamide compounds are disclosed in WO 02/18327. The guanidinobenzamides are disclosed as useful for treating obesity and type II diabetes. The synthesis of various quinazolinone compounds is set forth in U.S. patent application Ser. No. 10/444,495, published on Jan. 29, 2004 as US 2004/0019049, international application number PCT/US03/16442, published on Dec. 4, 2003 as WO 03/099818, and U.S. Provisional Application Nos. 60/382,762, 60/441,019, 60/473,317, 60/523,336, and 60/524,492 each of which is hereby incorporated by reference in its entirety and for all purposes as if fully set forth herein. Despite the recent disclosure of various compounds that exhibit MC4-R agonist activity, a need remains for new compounds and pharmaceutical compositions that may be used to treat MC4-R mediated diseases and disease states. A need also remains for compounds that exhibit desirable pharmacological properties such as compounds that have reduced bioaccumulation properties in subjects to which they are administered.
|
Title:
Substituted quinazolinone compounds
Abstract:
A variety of small molecule, guanidine-containing molecules capable of acting as MC4-R agonists are provided. The compounds are useful in treating MC4-R mediated diseases when administered to subjects. The compounds have the structure IA, IB, and IC where the values of the variables are defined herein.
Background:
BACKGROUND OF THE INVENTION Melanocortins are peptide products resulting from post-translational processing of pro-opiomelanocortin and are known to have a broad array of physiological activities. The natural melanocortins include the different types of melanocyte stimulating hormone (α-MSH, β-MSH, γ-MSH) and ACTH. Of these, α-MSH and ACTH are considered to be the main endogenous melanocortins. The melanocortins mediate their effects through melanocortin receptors (MC-Rs), a subfamily of G-protein coupled receptors. There are at least five different receptor subtypes (MC1-R to MC5-R). MC1-R mediates pigmentation of the hair and skin. MC2-R mediates the effects of ACTH on steroidogenesis in the adrenal gland. MC3-R and MC4-R are predominantly expressed in the brain. MC5-R is considered to have a role in the exocrine gland system. The melanocortin-4 receptor (MC4-R) is a seven-transmembrane receptor. MC4-R may participate in modulating the flow of visual and sensory information, coordinate aspects of somatomotor control, and/or participate in the modulation of autonomic outflow to the heart. K. G. Mountjoy et al., Science, 257:1248-125 (1992). Significantly, inactivation of this receptor by gene targeting has resulted in mice that develop a maturity onset obesity syndrome associated with hyperphagia, hyperinsulinemia, and hyperglycemia. D. Husznar et al., Cell, 88(1): 131-41 (1997). MC4-R has also been implicated in other disease states including erectile disorders, cardiovascular disorders, neuronal injuries or disorders, inflammation, fever, cognitive disorders, and sexual behavior disorders. M. E. Hadley and C. Haskell-Luevano, The Proopiomelanocortin system, Ann. N.Y. Acad. Sci., 885:1 (1999). Furthermore, observations in connection with endogenous MC4-R antagonists indicate that MC4-R is implicated in endogenous energy regulation. For example, an agouti protein is normally expressed in the skin and is an antagonist of the cutaneous MC receptor involved in pigmentation, MC1-R. M. M. Ollmann et al., Science, 278:135-138 (1997). However, overexpression of agouti protein in mice leads to a yellow coat color due to antagonism of MC1-R and increased food intake and body weight due to antagonism of MC4-R. L. L. Kiefer et al., Biochemistry, 36: 2084-2090 (1997); D. S. Lu et al., Nature, 371:799-802 (1994). Agouti related protein (AGRP), an agouti protein homologue, antagonizes MC4-R but not MC1-R. T. M. Fong et al., Biochem. Biophys. Res. Commun. 237:629-631 (1997). Administration of AGRP in mice increases food intake and causes obesity but does not alter pigmentation. M. Rossi et al., Endocrinology, 139:4428-4431 (1998). Together, this research indicates that MC4-R participates in energy regulation, and therefore, identifies this receptor as a target for a rational drug design for the treatment of obesity. In connection with MC4-R and its uncovered role in the etiology of obesity and food intake, the prior art includes reports of compounds and compositions that act as agonists or antagonists of MC4-R. As examples, U.S. Pat. No. 6,060,589 describes polypeptides that are capable of modulating signaling activity of melanocortin receptors. Also, U.S. Pat. Nos. 6,054,556 and 5,731,408 describe families of agonists and antagonists for MC4-R receptors that are lactam heptapeptides having a cyclic structure. WO 01/10842 discloses MC4-R binding compounds having a multitude of structures and methods of using such compounds to treat MC4-R associated disorders. Some of the compounds described include amidino- and guanidino-containing arenes and heteroarenes. Various other classes of compounds have been disclosed as having MC4-R agonist activity. For example, WO 01/70708 and WO 00/74679 disclose MC4-R agonists that are piperidine compounds and derivatives, while WO 01/70337 and WO 99/64002 disclose MC-R agonists that are spiropiperidine derivatives. Other known melanocortin receptor agonists include aromatic amine compounds containing amino acid residues, particularly tryptophan residues, as disclosed in WO 01/55106. Similar agonists are disclosed in WO 01/055107 which comprise aromatic amine compounds containing tertiary amide or tertiary amine groups. Finally, WO 01/055109 discloses melanocortin receptor agonists comprising aromatic amines which are generally bisamides separated by a nitrogen-containing alkyl linker. Guanidine-containing compounds having a variety of biological activities are also known in the prior art. For example, U.S. Pat. No. 4,732,916 issued to Satoh et al. discloses guanidine compounds useful as antiulcer agents; U.S. Pat. No. 4,874,864, U.S. Pat. No. 4,949,891, and U.S. Pat. No. 4,948,901 issued to Schnur et al. and EP 0343 894 disclose guanidino compounds useful as protease inhibitors and as anti-plasmin and anti-thrombin agents; and U.S. Pat. No. 5,352,704 issued to Okuyama et al. discloses a guanidino compound useful as an antiviral agent. Guanidine-containing compounds are also disclosed in other references. For example, U.S. Pat. No. 6,030,985 issued to Gentile et al. discloses guanidine compounds useful for treating and preventing conditions in which inhibition of nitric oxide synthetase is beneficial such as stroke, schizophrenia, anxiety, and pain. U.S. Pat. No. 5,952,381 issued to Chen et al. discloses certain guanidine compounds for use in selectively inhibiting or antagonizing α v β 3 integrins. Various 5-, 6-, and 7-membered fully saturated 1-azacarbocyclic-2-ylidene derivatives of guanidine are disclosed as having anti-secretory and hypoglycemic activities by U.S. Pat. No. 4,211,867 issued to Rasmussen. Such compounds are also taught as useful for the treatment of cardiovascular disease. Other guanidine derivatives are disclosed by U.S. Pat. No. 5,885,985 issued to Macdonald et al. as useful in therapy to treat inflammation. Various guanidinobenzamide compounds are disclosed in WO 02/18327. The guanidinobenzamides are disclosed as useful for treating obesity and type II diabetes. The synthesis of various quinazolinone compounds is set forth in U.S. patent application Ser. No. 10/444,495, published on Jan. 29, 2004 as US 2004/0019049, international application number PCT/US03/16442, published on Dec. 4, 2003 as WO 03/099818, and U.S. Provisional Application Nos. 60/382,762, 60/441,019, 60/473,317, 60/523,336, and 60/524,492 each of which is hereby incorporated by reference in its entirety and for all purposes as if fully set forth herein. Despite the recent disclosure of various compounds that exhibit MC4-R agonist activity, a need remains for new compounds and pharmaceutical compositions that may be used to treat MC4-R mediated diseases and disease states. A need also remains for compounds that exhibit desirable pharmacological properties such as compounds that have reduced bioaccumulation properties in subjects to which they are administered.
|
10952605
| 2,004
|
Trimmer head
|
A trimmer head for use with rotary vegetation cutting devices is disclosed. The head has a wear guide that indicates when the body of the trimmer head is worn down and needs replacement. In an embodiment of the invention, the body comprises two plates that are molded to fit together. The plates have bores for holding connecting pins. The connecting pins not only hold the plates together, but also pivotably support cutting blades, by fitting into openings in the blades.
|
FIELD OF THE INVENTION The present invention relates to heads for attachment to rotary vegetation cutting devices.
|
Title:
Trimmer head
Abstract:
A trimmer head for use with rotary vegetation cutting devices is disclosed. The head has a wear guide that indicates when the body of the trimmer head is worn down and needs replacement. In an embodiment of the invention, the body comprises two plates that are molded to fit together. The plates have bores for holding connecting pins. The connecting pins not only hold the plates together, but also pivotably support cutting blades, by fitting into openings in the blades.
Background:
FIELD OF THE INVENTION The present invention relates to heads for attachment to rotary vegetation cutting devices.
|
10904428
| 2,004
|
SEMICONDUCTOR PROCESS AND PHOTORESIST COATING PROCESS
|
A semiconductor process is disclosed, wherein before photoresist is coated on a substrate, a chemical is applied to dampen the substrate. Further, the chemical is applied on the substrate while the substrate is kept in a spinning state. In addition, a photoresist coating process is also provided. Wherein, a substrate is spun at a first speed. Then, a chemical is applied to dampen the surface of the spinning substrate. Next, the photoresist is coated on the surface of the substrate. The present invention can prevent defects in the formed photoresist layer during the coating process and therefore enhance the yield of the subsequent semiconductor process.
|
BACKGROUND OF THE INVENTION 1Field of the Invention The present invention relates to a semiconductor process and a photoresist-coating process, and more particularly, to a semiconductor process and a photoresist-coating process that keep the substrate in a spinning state before coating photoresist in order to prevent defects therein. 2Description of the Related Art Photolithography is a vital process in the semiconductor manufacturing technology. It has been broadly applied in the process, for example, in patterning various film layers and in ion implantation. A photolithographic process comprises the steps of photoresist coating, exposure and film development. Wherein, photoresist coating is an essential part in the photolithographic process. The prior photoresist-coating method starts by placing a substrate on the table of the spinner. The substrate is sucked on the table by proper vacuum degree provided through the axis of the spinner. The photoresist is then applied on the substrate. When the spinner starts spinning the substrate, the centrifugal force enables the photoresist to be spun over the substrate and a photoresist layer is thus formed. After the formation of the photoresist layer, a baking process follows, wherein the solvent is removed from the photoresist layer. It should be noted that the formed photoresist layer in the conventional photoresist-coating process tends to have defects. These defects can be, for example, gaps or cracks in the photoresist layer. These defects have great consequence on the subsequent exposure and film development process, and may cause misalignment during the photolithographic process and therefore destroy the integrity of the photolithographic pattern. They may even impair the reliabilities and yields of the semiconductor devices. In particular, when the sizes of semiconductor devices shrink to deep sub-micron dimensions in which 193-nm photolithographic process should be applied, the defects become even more obvious.
|
Title:
SEMICONDUCTOR PROCESS AND PHOTORESIST COATING PROCESS
Abstract:
A semiconductor process is disclosed, wherein before photoresist is coated on a substrate, a chemical is applied to dampen the substrate. Further, the chemical is applied on the substrate while the substrate is kept in a spinning state. In addition, a photoresist coating process is also provided. Wherein, a substrate is spun at a first speed. Then, a chemical is applied to dampen the surface of the spinning substrate. Next, the photoresist is coated on the surface of the substrate. The present invention can prevent defects in the formed photoresist layer during the coating process and therefore enhance the yield of the subsequent semiconductor process.
Background:
BACKGROUND OF THE INVENTION 1Field of the Invention The present invention relates to a semiconductor process and a photoresist-coating process, and more particularly, to a semiconductor process and a photoresist-coating process that keep the substrate in a spinning state before coating photoresist in order to prevent defects therein. 2Description of the Related Art Photolithography is a vital process in the semiconductor manufacturing technology. It has been broadly applied in the process, for example, in patterning various film layers and in ion implantation. A photolithographic process comprises the steps of photoresist coating, exposure and film development. Wherein, photoresist coating is an essential part in the photolithographic process. The prior photoresist-coating method starts by placing a substrate on the table of the spinner. The substrate is sucked on the table by proper vacuum degree provided through the axis of the spinner. The photoresist is then applied on the substrate. When the spinner starts spinning the substrate, the centrifugal force enables the photoresist to be spun over the substrate and a photoresist layer is thus formed. After the formation of the photoresist layer, a baking process follows, wherein the solvent is removed from the photoresist layer. It should be noted that the formed photoresist layer in the conventional photoresist-coating process tends to have defects. These defects can be, for example, gaps or cracks in the photoresist layer. These defects have great consequence on the subsequent exposure and film development process, and may cause misalignment during the photolithographic process and therefore destroy the integrity of the photolithographic pattern. They may even impair the reliabilities and yields of the semiconductor devices. In particular, when the sizes of semiconductor devices shrink to deep sub-micron dimensions in which 193-nm photolithographic process should be applied, the defects become even more obvious.
|
10812128
| 2,004
|
Memory package
|
A memory package comprising a first cover portion connected to a second cover portion. The first cover portion supports a first electronics sub-assembly that comprise a circuit board with at least one memory module socket and at least one controller chip mounted thereto. The second cover portion supports a second electronics sub-assembly that comprises a circuit board with at least one memory module socket and at least one controller chip mounted thereto. The first and second cover portions are moveable between a closed position wherein the electronics sub-assemblies are nested and an open position wherein the electronics sub-assemblies are not nested.
|
BACKGROUND Certain computer-based systems, for example servers, employ a variety of different components. Each of these components requires a certain volumetric envelope to operate in. Although the size of one individual component may be fairly small, many systems utilize multiple examples of each type of component. The multiple examples may be supplied to provide redundancy or to improve the operation of the system. For example, servers may use a plurality of memory modules that may be upgraded or replaced periodically. Therefore, a system that supports efficient storage of a plurality of memory modules while also supporting access to the memory modules for maintenance reasons may be advantageous.
|
Title:
Memory package
Abstract:
A memory package comprising a first cover portion connected to a second cover portion. The first cover portion supports a first electronics sub-assembly that comprise a circuit board with at least one memory module socket and at least one controller chip mounted thereto. The second cover portion supports a second electronics sub-assembly that comprises a circuit board with at least one memory module socket and at least one controller chip mounted thereto. The first and second cover portions are moveable between a closed position wherein the electronics sub-assemblies are nested and an open position wherein the electronics sub-assemblies are not nested.
Background:
BACKGROUND Certain computer-based systems, for example servers, employ a variety of different components. Each of these components requires a certain volumetric envelope to operate in. Although the size of one individual component may be fairly small, many systems utilize multiple examples of each type of component. The multiple examples may be supplied to provide redundancy or to improve the operation of the system. For example, servers may use a plurality of memory modules that may be upgraded or replaced periodically. Therefore, a system that supports efficient storage of a plurality of memory modules while also supporting access to the memory modules for maintenance reasons may be advantageous.
|
10825220
| 2,004
|
Apparatus and method for coloring electric wire
|
The apparatus for coloring a wire includes a plurality of coloring nozzles, each of which spouts a liquid coloring agent toward an outer surface of a wire with a specific amount thereof per spouting so as to allow the liquid drop of the coloring agent to adhere to the outer surface of the wire, thereby coloring the wire. The coloring agent adheres on the outer surface of the wire so as to form a spot. Each coloring nozzle includes an insert member for receiving the coloring agent therein and a nozzle member that communicates with the insert member. The length of the nozzle member is different from each other. The apparatus selects one coloring nozzle from a plurality of the coloring nozzles in response to the size of the spot to be formed on the outer surface of the wire and spouts the coloring agent.
|
BACKGROUND OF THE INVENTION (1) Field of the Invention The present invention relates to an apparatus and method for coloring an electric wire that includes an electrically conductive core wire and an electrically insulating coating for coating the core wire. (2) Description of the Related Art Various electronic devices are mounted on a motor vehicle as a mobile unit. Therefore, the motor vehicle is provided with a wiring harness for transmitting power from a power source and control signals from a computer to the electronic devices. The wiring harness includes a plurality of electric wires and connectors attached to an end of the wires. The wire includes an electrically conductive core wire and a coating made of insulating synthetic resin, which coats the core wire. The wire is a so-called coated wire. A connector includes a terminal fitting and a connector housing that receives the terminal fitting therein. The terminal fitting, consisting of electrically conductive sheet metal or the like, is attached to an end of the wire and electrically connected to the core wire of the wire. The connector housing made of electrically insulating synthetic resin is formed in a box-shape. When the connector housing is connected to the electronic devices, each wires is connected to the corresponding electronic device through the terminal fitting, thereby the wiring harness transmits the desired electric power and signals to the electronic devices. When the wiring harness is assembled, first the wire is cut into a specific length and then the terminal fitting is attached to an end of the wire after removing the coating near the end. A wire is connected to another wire according to the need. Afterward, the terminal fitting is inserted into the connector housing, thereby assembling the wiring harness. The wire of the wiring harness must be distinguished in terms of the size of the core wire, the material of the coating (concerning with alteration in the materials depending upon heat-resisting property), and a purpose of use. The purpose of use means, for example, an air bag, antilock brake system (ABS), control signal such as speed data, and system in a motor vehicle in which the wire is used, such as a power transmission system. The coating of the wire used in the wiring harness has been colored to a desired color by mixing a coloring agent of the desired color with synthetic resin which constitutes the coating when the synthetic resin of the coating is applied onto the circumference of the core wire by extrusion (for example, see Japanese Patent Application Laid-Open No. H5-111947, Japanese Patent Application Laid-Open No. H6-119833, and Japanese Patent Application Laid-Open No. H9-92056). In this case, when a color of an outer surface of the wire is altered, it is necessary to halt an operation of an extrusion apparatus that performs the extrusion-coating. That is, whenever the color of the wire is changed, it is necessary to halt an operation of an extrusion apparatus, causing increasing in a time period and labor hour required for the production of the wire and deteriorating in the productivity of the wire. Alternatively, the coloring agent to be mixed has been replaced while the extrusion apparatus is performing the extrusion-coating. In such a case, right after changing the color of the coloring agent, a wire, in the color of the synthetic resin of which a coloring agent before the replacement and a coloring agent after the replacement are mixed, has been inevitably manufactured, causing the deterioration in the yield of the material of the wire. In order to prevent the deterioration in the productivity of the wire and in the yield of the material of the wire, the present applicant proposed a method, in which monochromatic wire is produced, then the outer surface of the wire is colored with a desired color according to the need, thereby assembling a wiring harness (see Japanese Patent Application No. 2001-256721). Alternatively, the present applicant proposed an apparatus for coloring a wire, by which upon coloring a monochromatic wire, a liquid coloring agent is spouted toward the outer surface of the wire with a specific amount thereof per spouting so as to allow the liquid drop of the coloring agent to adhere to the outer surface of the wire, thereby coloring the wire with the desired color (see Japanese Patent Application No. 2002-233729). The coloring apparatus described above includes a coloring nozzle that spouts the liquid coloring agent toward the outer surface of the wire with a specific amount thereof per spouting. The coloring nozzle includes a receiver for receiving the coloring agent under pressure, a cylindrical nozzle member that communicates with the receiver and guides the coloring agent therethrough, and a valve element provided in the receiver, which can approach and leave a base end of the coloring nozzle. In the coloring apparatus for coloring the wire, the coloring agent is spouted from an end of the nozzle member toward the outer surface of the wire in a state that the valve element leaves away from the nozzle member. Further, in the coloring apparatus for coloring the wire, the valve element approaches the nozzle member so as to come in contact with the nozzle member, thereby halting the spouting of the coloring agent from an end of the nozzle member toward the outer surface of the wire. As for the coloring apparatus, in which the coloring agent is spouted toward the outer surface of the wire with a specific amount thereof per spouting, when the amount of the liquid drop of the coloring agent is changed, that is, when the area to be colored of the outer surface of the wire is changed, the pressure in the receiver as described above may be changed, or alternatively, the time period when the valve element leaves the base end of the nozzle member may be changed. However, in order to change such a pressure or such a time period, the coloring apparatus is forced to have a complicated mechanism therein, thereby causing an increasing in the cost of the coloring apparatus.
|
Title:
Apparatus and method for coloring electric wire
Abstract:
The apparatus for coloring a wire includes a plurality of coloring nozzles, each of which spouts a liquid coloring agent toward an outer surface of a wire with a specific amount thereof per spouting so as to allow the liquid drop of the coloring agent to adhere to the outer surface of the wire, thereby coloring the wire. The coloring agent adheres on the outer surface of the wire so as to form a spot. Each coloring nozzle includes an insert member for receiving the coloring agent therein and a nozzle member that communicates with the insert member. The length of the nozzle member is different from each other. The apparatus selects one coloring nozzle from a plurality of the coloring nozzles in response to the size of the spot to be formed on the outer surface of the wire and spouts the coloring agent.
Background:
BACKGROUND OF THE INVENTION (1) Field of the Invention The present invention relates to an apparatus and method for coloring an electric wire that includes an electrically conductive core wire and an electrically insulating coating for coating the core wire. (2) Description of the Related Art Various electronic devices are mounted on a motor vehicle as a mobile unit. Therefore, the motor vehicle is provided with a wiring harness for transmitting power from a power source and control signals from a computer to the electronic devices. The wiring harness includes a plurality of electric wires and connectors attached to an end of the wires. The wire includes an electrically conductive core wire and a coating made of insulating synthetic resin, which coats the core wire. The wire is a so-called coated wire. A connector includes a terminal fitting and a connector housing that receives the terminal fitting therein. The terminal fitting, consisting of electrically conductive sheet metal or the like, is attached to an end of the wire and electrically connected to the core wire of the wire. The connector housing made of electrically insulating synthetic resin is formed in a box-shape. When the connector housing is connected to the electronic devices, each wires is connected to the corresponding electronic device through the terminal fitting, thereby the wiring harness transmits the desired electric power and signals to the electronic devices. When the wiring harness is assembled, first the wire is cut into a specific length and then the terminal fitting is attached to an end of the wire after removing the coating near the end. A wire is connected to another wire according to the need. Afterward, the terminal fitting is inserted into the connector housing, thereby assembling the wiring harness. The wire of the wiring harness must be distinguished in terms of the size of the core wire, the material of the coating (concerning with alteration in the materials depending upon heat-resisting property), and a purpose of use. The purpose of use means, for example, an air bag, antilock brake system (ABS), control signal such as speed data, and system in a motor vehicle in which the wire is used, such as a power transmission system. The coating of the wire used in the wiring harness has been colored to a desired color by mixing a coloring agent of the desired color with synthetic resin which constitutes the coating when the synthetic resin of the coating is applied onto the circumference of the core wire by extrusion (for example, see Japanese Patent Application Laid-Open No. H5-111947, Japanese Patent Application Laid-Open No. H6-119833, and Japanese Patent Application Laid-Open No. H9-92056). In this case, when a color of an outer surface of the wire is altered, it is necessary to halt an operation of an extrusion apparatus that performs the extrusion-coating. That is, whenever the color of the wire is changed, it is necessary to halt an operation of an extrusion apparatus, causing increasing in a time period and labor hour required for the production of the wire and deteriorating in the productivity of the wire. Alternatively, the coloring agent to be mixed has been replaced while the extrusion apparatus is performing the extrusion-coating. In such a case, right after changing the color of the coloring agent, a wire, in the color of the synthetic resin of which a coloring agent before the replacement and a coloring agent after the replacement are mixed, has been inevitably manufactured, causing the deterioration in the yield of the material of the wire. In order to prevent the deterioration in the productivity of the wire and in the yield of the material of the wire, the present applicant proposed a method, in which monochromatic wire is produced, then the outer surface of the wire is colored with a desired color according to the need, thereby assembling a wiring harness (see Japanese Patent Application No. 2001-256721). Alternatively, the present applicant proposed an apparatus for coloring a wire, by which upon coloring a monochromatic wire, a liquid coloring agent is spouted toward the outer surface of the wire with a specific amount thereof per spouting so as to allow the liquid drop of the coloring agent to adhere to the outer surface of the wire, thereby coloring the wire with the desired color (see Japanese Patent Application No. 2002-233729). The coloring apparatus described above includes a coloring nozzle that spouts the liquid coloring agent toward the outer surface of the wire with a specific amount thereof per spouting. The coloring nozzle includes a receiver for receiving the coloring agent under pressure, a cylindrical nozzle member that communicates with the receiver and guides the coloring agent therethrough, and a valve element provided in the receiver, which can approach and leave a base end of the coloring nozzle. In the coloring apparatus for coloring the wire, the coloring agent is spouted from an end of the nozzle member toward the outer surface of the wire in a state that the valve element leaves away from the nozzle member. Further, in the coloring apparatus for coloring the wire, the valve element approaches the nozzle member so as to come in contact with the nozzle member, thereby halting the spouting of the coloring agent from an end of the nozzle member toward the outer surface of the wire. As for the coloring apparatus, in which the coloring agent is spouted toward the outer surface of the wire with a specific amount thereof per spouting, when the amount of the liquid drop of the coloring agent is changed, that is, when the area to be colored of the outer surface of the wire is changed, the pressure in the receiver as described above may be changed, or alternatively, the time period when the valve element leaves the base end of the nozzle member may be changed. However, in order to change such a pressure or such a time period, the coloring apparatus is forced to have a complicated mechanism therein, thereby causing an increasing in the cost of the coloring apparatus.
|
10818162
| 2,004
|
Locking mechanism for load analyzer
|
The invention provides a locking mechanism having a catch with a first recess including a lateral wall that extends generally perpendicular to an applied load and an inclined portion that is inclined relative to the lateral wall. The locking mechanism can also include a guide block having a second recess. The guide block can further include a lock wedge that is slidably disposed within the second recess having a first inclined surface that corresponds to the inclined portion of the catch, a second inclined surface, and a contact surface. The guide block can also include a jam wedge that is slidably disposed within the second recess having an inclined surface corresponding to the second inclined surface of the lock wedge. During operation, the lock wedge is urged towards the catch so that a portion of the lock wedge is disposed within the recess of the catch so that the first inclined surface of the lock wedge is in contact with the inclined portion of the catch and the contact surface of the lock wedge is in contact with the lateral wall of the catch. Additionally, the jam wedge can be urged towards the catch so that the inclined surface of the jam wedge is in contact with the second inclined surface of the lock wedge.
|
BACKGROUND OF THE INVENTION 1. Field of Invention The invention is related to methods and apparatus for securely locking a test device in place while load related measurements are taken. 2. Description of Related Art Currently, a radial stiffness contact analyzer (RASCAL) machine can be used to measure performance qualities of a test tire, such as vertical, lateral and fore/aft stiffness. Generally, these tests can be accomplished by either pressing the test tire against a stationary load plate for vertical stiffness measurements, pressing the tire against a movable load plate for lateral and fore/aft stiffness measurement, or holding the test tire stationary while applying a force to a contact surface of the tire via a load plate. As a result of knowing the load or force exerted on the test tire and measuring the resulting deformation of the test tire, a stiffness of the test tire can be determined. For example, in order to measure fore/aft stiffness of a test tire, the test tire can be mounted on a tire spindle of the radial stiffness contact analyzer. The tire spindle supporting the test tire is then locked in place by a locking assembly so that it will not rotate. Next, a contact surface of the test tire is then brought into contact with a load plate at a predetermined force. The force with which the test tire is brought into contact with the load plate is sufficient to prevent slippage between the test tire and load plate. A force is subsequently applied to the load plate, for example by a hydraulic cylinder or the like, in order to urge the load plate to move under the tire. The force applied to the load plate in turn results in a force being applied to the test tire. The force applied to the test tire also applies a torque or moment about the tire spindle. While the force is being applied, a load cell, linear transducer, or the like, can measure the corresponding deformation of the test tire. Based on these measurements, a stiffness of the test tire can be determined. Presently, the locking assembly used to lock the tire spindle into place, and thereby to prevent rotation of the tire spindle and test tire, is a pin and sleeve assembly. In such an assembly, the pin is mounted on a stationary housing of the radial stiffness contact analyzer and is used to engage the sleeve mounted on the rotating tire spindle. In other words, the pin is extended to seat within the sleeve, and therefore the tire spindle is no longer able to rotate. Once held in place, the radial stiffness contact analyzer can perform stiffness measurements. However, a problem with the above-described locking assembly is that the simple pin does not securely engaged the sleeve on the tire spindle, and therefore the tire spindle is able to slightly rotate until the clearances between the pin and sleeve are taken up. This is due in part to the inherent design of the pin and sleeve assembly which require some amount of space or tolerance between the pin and sleeve in order for the pin to be able to move in and out of the sleeve. As a result, there is a problem that the test tire is free to rotate until the clearances are taken in the locking assembly, which often results in inaccurate stiffness measurements of the test tire.
|
Title:
Locking mechanism for load analyzer
Abstract:
The invention provides a locking mechanism having a catch with a first recess including a lateral wall that extends generally perpendicular to an applied load and an inclined portion that is inclined relative to the lateral wall. The locking mechanism can also include a guide block having a second recess. The guide block can further include a lock wedge that is slidably disposed within the second recess having a first inclined surface that corresponds to the inclined portion of the catch, a second inclined surface, and a contact surface. The guide block can also include a jam wedge that is slidably disposed within the second recess having an inclined surface corresponding to the second inclined surface of the lock wedge. During operation, the lock wedge is urged towards the catch so that a portion of the lock wedge is disposed within the recess of the catch so that the first inclined surface of the lock wedge is in contact with the inclined portion of the catch and the contact surface of the lock wedge is in contact with the lateral wall of the catch. Additionally, the jam wedge can be urged towards the catch so that the inclined surface of the jam wedge is in contact with the second inclined surface of the lock wedge.
Background:
BACKGROUND OF THE INVENTION 1. Field of Invention The invention is related to methods and apparatus for securely locking a test device in place while load related measurements are taken. 2. Description of Related Art Currently, a radial stiffness contact analyzer (RASCAL) machine can be used to measure performance qualities of a test tire, such as vertical, lateral and fore/aft stiffness. Generally, these tests can be accomplished by either pressing the test tire against a stationary load plate for vertical stiffness measurements, pressing the tire against a movable load plate for lateral and fore/aft stiffness measurement, or holding the test tire stationary while applying a force to a contact surface of the tire via a load plate. As a result of knowing the load or force exerted on the test tire and measuring the resulting deformation of the test tire, a stiffness of the test tire can be determined. For example, in order to measure fore/aft stiffness of a test tire, the test tire can be mounted on a tire spindle of the radial stiffness contact analyzer. The tire spindle supporting the test tire is then locked in place by a locking assembly so that it will not rotate. Next, a contact surface of the test tire is then brought into contact with a load plate at a predetermined force. The force with which the test tire is brought into contact with the load plate is sufficient to prevent slippage between the test tire and load plate. A force is subsequently applied to the load plate, for example by a hydraulic cylinder or the like, in order to urge the load plate to move under the tire. The force applied to the load plate in turn results in a force being applied to the test tire. The force applied to the test tire also applies a torque or moment about the tire spindle. While the force is being applied, a load cell, linear transducer, or the like, can measure the corresponding deformation of the test tire. Based on these measurements, a stiffness of the test tire can be determined. Presently, the locking assembly used to lock the tire spindle into place, and thereby to prevent rotation of the tire spindle and test tire, is a pin and sleeve assembly. In such an assembly, the pin is mounted on a stationary housing of the radial stiffness contact analyzer and is used to engage the sleeve mounted on the rotating tire spindle. In other words, the pin is extended to seat within the sleeve, and therefore the tire spindle is no longer able to rotate. Once held in place, the radial stiffness contact analyzer can perform stiffness measurements. However, a problem with the above-described locking assembly is that the simple pin does not securely engaged the sleeve on the tire spindle, and therefore the tire spindle is able to slightly rotate until the clearances between the pin and sleeve are taken up. This is due in part to the inherent design of the pin and sleeve assembly which require some amount of space or tolerance between the pin and sleeve in order for the pin to be able to move in and out of the sleeve. As a result, there is a problem that the test tire is free to rotate until the clearances are taken in the locking assembly, which often results in inaccurate stiffness measurements of the test tire.
|
10861811
| 2,004
|
System and method for assessing motor and locomotor deficits and recovery therefrom
|
An automated intelligent computer system for analyzing motor or locomotor behavior and method of use is provided. The system comprises an automatic, objective, fast and consistent assessment of the level of injury and course of recovery in animal models of spinal cord injury and other gait and motor coordination disorders. The system also is useful for analyzing other types of motor or neurologic dysfunction.
|
BACKGROUND OF THE INVENTION Disorders of motor function due to accidental injury, stroke and neurodegenerative disorders, together with disorders of mental health, are the most crippling human ailments. Spinal cord injury (SCI), for example, involves damage of the spinal cord by contusion, compression, or laceration causing loss of sensation, motor and reflex function below the point of injury, and often bowel and bladder dysfunction, hyperalgesia and sexual dysfunction. SCI patients suffer major chronic dysfunction that affects all aspects of their life. Therapeutic drugs or other beneficial interventions indicated for spinal cord injury and other neurological conditions are developed using animal models for which assessment of locomotor behavior, gait and motor coordination are important measures of long-term functional recovery. However, assessing the degree of motor dysfunction in an animal model, whether acutely or over a longer term, is a difficult challenge because the methods relied upon involve subjective scoring of symptoms. Current methods of assessing locomotor behavior include the measurement of motor coordination and skill acquisition in the rotarod test, of muscular strength with the grip strength apparatus, of locomotor activity with infrared video tracking in open field, of motor coordination in the grid test and of gait in the paw print tests (video assisted and with force transducers). The ideal system for gait analysis would be analogous to the infrared technology based on reflective markers positioned at the joints. Such systems have been extensively and successfully used in humans and large mammals, but are less suitable in rodents due to the cost, the size differences between the original large mammals used for development and rodents, and the difficulty of attaching fixed joint markers to loose skin. For example, rat locomotor behavior, in the context of SCI, is commonly assessed using the a 21-point open field locomotion score developed by Basso, Beattie, and Bresnahan (BBB), which was developed in order to overcome the limitations of existing rating scales for studying open field locomotion (Basso, et al., J. Neurotrauma, 12(1): 1-21, 1995). The scoring categories of the expanded scale are based upon the observed sequence of locomotor recovery patterns and take into consideration the early (BBB score from 0 to 7), intermediate (8-13) and late phases (14-21) of recovery (ibid.). There is evidence that the BBB Locomotor Rating Scale correlates with other indices of injury, such as the amount of gliosis or scarring following injury. Thus, the BBB scale is a sensitive test that identifies both SCI injury severity and recovery by predicting histological outcomes. Subjective evaluation and low throughput place severe limitations on the accuracy and reproducibility of the BBB test, however. The BBB open-field locomotor rating scale, currently the most widely accepted behavioral outcome measure for animal models of SCI, is a labor-intensive, partially subjective measure that, like all such measures, is prone to training effects and inter-rater variability. The BBB scale is currently the only validated scale for assessment of spinal cord injuries in animal models. There are, however, three main disadvantages of using this scale in assessing the recovery from SCI: subjectivity and variability of measurements, discrete classification of impairment, and visual occlusion. Because the measurements are subjective and variable, it is sometimes difficult to assess the amount and frequency of joint flexion and the degree of trunk instability. The same people have to perform all the testing in order to minimize inter-rater subjective variability. BBB scale classifies the impairments as discrete categories. Most measures of the human-based BBB scores are taken on an ordinal scale (e.g. a scale with three levels such as “none”, “slight” and “extensive” that only have a relation of order but lack a proportional relationship to the degree of impairment). This creates a problem in that a slight error in the subjective measurement may result in a large change in the BBB score. Finally, visual assessment can be hampered by the animal's body occluding the field of vision. In the early phases of recovery rats leaning on one side will preclude assessment of function of the limb placed under the body. BBB also provides limited information, which in turn may prevent assessment of more subtle motor deficits or recovery. Manual observation of animals exhibiting other types of motor or neurological deficits is also limited with regard to some of the more subtle deficits or recovery, and is labor intensive. Such manual observation also suffers from the same disadvantages of BBB, including subjectivity and variability of measurements and visual occlusion.
|
Title:
System and method for assessing motor and locomotor deficits and recovery therefrom
Abstract:
An automated intelligent computer system for analyzing motor or locomotor behavior and method of use is provided. The system comprises an automatic, objective, fast and consistent assessment of the level of injury and course of recovery in animal models of spinal cord injury and other gait and motor coordination disorders. The system also is useful for analyzing other types of motor or neurologic dysfunction.
Background:
BACKGROUND OF THE INVENTION Disorders of motor function due to accidental injury, stroke and neurodegenerative disorders, together with disorders of mental health, are the most crippling human ailments. Spinal cord injury (SCI), for example, involves damage of the spinal cord by contusion, compression, or laceration causing loss of sensation, motor and reflex function below the point of injury, and often bowel and bladder dysfunction, hyperalgesia and sexual dysfunction. SCI patients suffer major chronic dysfunction that affects all aspects of their life. Therapeutic drugs or other beneficial interventions indicated for spinal cord injury and other neurological conditions are developed using animal models for which assessment of locomotor behavior, gait and motor coordination are important measures of long-term functional recovery. However, assessing the degree of motor dysfunction in an animal model, whether acutely or over a longer term, is a difficult challenge because the methods relied upon involve subjective scoring of symptoms. Current methods of assessing locomotor behavior include the measurement of motor coordination and skill acquisition in the rotarod test, of muscular strength with the grip strength apparatus, of locomotor activity with infrared video tracking in open field, of motor coordination in the grid test and of gait in the paw print tests (video assisted and with force transducers). The ideal system for gait analysis would be analogous to the infrared technology based on reflective markers positioned at the joints. Such systems have been extensively and successfully used in humans and large mammals, but are less suitable in rodents due to the cost, the size differences between the original large mammals used for development and rodents, and the difficulty of attaching fixed joint markers to loose skin. For example, rat locomotor behavior, in the context of SCI, is commonly assessed using the a 21-point open field locomotion score developed by Basso, Beattie, and Bresnahan (BBB), which was developed in order to overcome the limitations of existing rating scales for studying open field locomotion (Basso, et al., J. Neurotrauma, 12(1): 1-21, 1995). The scoring categories of the expanded scale are based upon the observed sequence of locomotor recovery patterns and take into consideration the early (BBB score from 0 to 7), intermediate (8-13) and late phases (14-21) of recovery (ibid.). There is evidence that the BBB Locomotor Rating Scale correlates with other indices of injury, such as the amount of gliosis or scarring following injury. Thus, the BBB scale is a sensitive test that identifies both SCI injury severity and recovery by predicting histological outcomes. Subjective evaluation and low throughput place severe limitations on the accuracy and reproducibility of the BBB test, however. The BBB open-field locomotor rating scale, currently the most widely accepted behavioral outcome measure for animal models of SCI, is a labor-intensive, partially subjective measure that, like all such measures, is prone to training effects and inter-rater variability. The BBB scale is currently the only validated scale for assessment of spinal cord injuries in animal models. There are, however, three main disadvantages of using this scale in assessing the recovery from SCI: subjectivity and variability of measurements, discrete classification of impairment, and visual occlusion. Because the measurements are subjective and variable, it is sometimes difficult to assess the amount and frequency of joint flexion and the degree of trunk instability. The same people have to perform all the testing in order to minimize inter-rater subjective variability. BBB scale classifies the impairments as discrete categories. Most measures of the human-based BBB scores are taken on an ordinal scale (e.g. a scale with three levels such as “none”, “slight” and “extensive” that only have a relation of order but lack a proportional relationship to the degree of impairment). This creates a problem in that a slight error in the subjective measurement may result in a large change in the BBB score. Finally, visual assessment can be hampered by the animal's body occluding the field of vision. In the early phases of recovery rats leaning on one side will preclude assessment of function of the limb placed under the body. BBB also provides limited information, which in turn may prevent assessment of more subtle motor deficits or recovery. Manual observation of animals exhibiting other types of motor or neurological deficits is also limited with regard to some of the more subtle deficits or recovery, and is labor intensive. Such manual observation also suffers from the same disadvantages of BBB, including subjectivity and variability of measurements and visual occlusion.
|
10787994
| 2,004
|
Method, apparatus and article for off-line certification in mobile applications
|
A tamper-resistant certification device receives a certified digital time stamp from a trusted third party, resets a time function and produces a time stamp receipt in an on-line mode; The tamper-resistant certification device receives a digital file from a mobile computing device, and produces a certified digitally signed digital file including a copy of the digital file, time stamp receipt and temporal offset in an off-line mode to evidence the content of the digital file within a defined tolerance of a day and/or time. A processor may be portioned into tamper and non-tamper resistant portions.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention This disclosure generally relates to mobile computing applications, and particularly to certification and/or authentication in mobile computing environments. 2. Description of the Related Art There currently exist a large variety of mobile computing applications in which certification or authentication to provide proof of services would be desirable. For example, many package delivery services or couriers employ mobile computing devices (e.g., laptop and/or handheld computing devices) for tracking packages and parcels through delivery. These mobile computing devices are capable of downloading package or parcel location information from time-to-time, that permits the on-line tracking of a package or parcel through the entire delivery process. The mobile computing devices may also provide business process assurances such as “proof-of-delivery” (POD). For example, mobile computing devices may allow for electronic signature capture which may be offered as proof of delivery. Current techniques for implementing proof-of-services rendered are far from being non-repudiable. For example, electronic bitmaps of signatures can be easily applied to receipts other than the receipt for which they are intended. Further, mobile computing systems can easily be tampered with to forge electronic receipts, electronic signatures, and even biometric data. Security is a growing concern for the delivery of documents and/or packages. Non-repudiable transaction certification is necessary as true proof-of-service or -delivery. Without such certification, service providers will have to resort to time-consuming manual business practices to establish proof of service. Such manual practices increase labor costs and increase the billing cycle time. Cryptographic techniques can be employed advantageously in non-mobile computing environments. For example, some cryptographic techniques may be used to achieve confidentiality (i.e., keep information from all but those authorized to have access). Also, some cryptographic techniques can offer data integrity (i.e., allowing one to detect unauthorized alteration or manipulation of data such as insertion, deletion or substitution). Additionally, some cryptographic techniques may provide for authentication (i.e., allowing one to verify the origin, date of origin, data content, and time sent of both data and the sender). Further, some cryptographic techniques may be employed for non-repudiation (i.e., prevent an entity from denying previous commitments or actions). Non-repudiation typically involves a trusted third party. One cryptographic primitive is the digital signature, which is fundamental in authentication, authorization and non-repudiation. A digital signature is a means for an entity to bind its identity with a piece of information. The signing process entails transforming the message and some secret information held by the entity into a tag called a signature. Techniques and devices to provide for non-repudiation proof-of-service and/or proof-of-delivery in mobile computing environments are highly desirable, particularly for package delivery and courier applications.
|
Title:
Method, apparatus and article for off-line certification in mobile applications
Abstract:
A tamper-resistant certification device receives a certified digital time stamp from a trusted third party, resets a time function and produces a time stamp receipt in an on-line mode; The tamper-resistant certification device receives a digital file from a mobile computing device, and produces a certified digitally signed digital file including a copy of the digital file, time stamp receipt and temporal offset in an off-line mode to evidence the content of the digital file within a defined tolerance of a day and/or time. A processor may be portioned into tamper and non-tamper resistant portions.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention This disclosure generally relates to mobile computing applications, and particularly to certification and/or authentication in mobile computing environments. 2. Description of the Related Art There currently exist a large variety of mobile computing applications in which certification or authentication to provide proof of services would be desirable. For example, many package delivery services or couriers employ mobile computing devices (e.g., laptop and/or handheld computing devices) for tracking packages and parcels through delivery. These mobile computing devices are capable of downloading package or parcel location information from time-to-time, that permits the on-line tracking of a package or parcel through the entire delivery process. The mobile computing devices may also provide business process assurances such as “proof-of-delivery” (POD). For example, mobile computing devices may allow for electronic signature capture which may be offered as proof of delivery. Current techniques for implementing proof-of-services rendered are far from being non-repudiable. For example, electronic bitmaps of signatures can be easily applied to receipts other than the receipt for which they are intended. Further, mobile computing systems can easily be tampered with to forge electronic receipts, electronic signatures, and even biometric data. Security is a growing concern for the delivery of documents and/or packages. Non-repudiable transaction certification is necessary as true proof-of-service or -delivery. Without such certification, service providers will have to resort to time-consuming manual business practices to establish proof of service. Such manual practices increase labor costs and increase the billing cycle time. Cryptographic techniques can be employed advantageously in non-mobile computing environments. For example, some cryptographic techniques may be used to achieve confidentiality (i.e., keep information from all but those authorized to have access). Also, some cryptographic techniques can offer data integrity (i.e., allowing one to detect unauthorized alteration or manipulation of data such as insertion, deletion or substitution). Additionally, some cryptographic techniques may provide for authentication (i.e., allowing one to verify the origin, date of origin, data content, and time sent of both data and the sender). Further, some cryptographic techniques may be employed for non-repudiation (i.e., prevent an entity from denying previous commitments or actions). Non-repudiation typically involves a trusted third party. One cryptographic primitive is the digital signature, which is fundamental in authentication, authorization and non-repudiation. A digital signature is a means for an entity to bind its identity with a piece of information. The signing process entails transforming the message and some secret information held by the entity into a tag called a signature. Techniques and devices to provide for non-repudiation proof-of-service and/or proof-of-delivery in mobile computing environments are highly desirable, particularly for package delivery and courier applications.
|
10516379
| 2,004
|
Decorative material and decorative sheet
|
An object of the present invention is to realize a configuration of decorative sheet, particularly a decorative paper and the like, or a decorative material in which it is adhered, that is: a grain depression is not visible; excellent in scratch resistance, also in contamination resistance; and three-dimensional design can be expressed, at low cost. For attaining the above-mentioned object, the present invention uses a delustering silica, whose surface is treated with a fatty acid based wax such as stearic acid, as a delustering silica in a decorative material 10 in which a luster adjusting resin layer 2, which is formed of a cross-linked cured material of an ionizing radiation curing resin composition containing a delustering silica, is provided on a base material 1. The luster adjusting resin layer may be formed with an even thickness. However, a convex-concave surface design can be expressed by forming the luster adjusting resin layer partially in a pattern. The luster adjusting resin layer is formed with an ionizing radiation curing resin composition, particularly with no solvent, by a gravure printing or gravure coating using a doctor blade and a gravure plate.
|
BACKGROUND ART Decorative sheets using paper and resin sheet, or decorative materials such as decorative material in the form of plate, in which the above-mentioned decorative sheet is adhered to an adhered base material, are used in various uses such as construction interior and exterior materials. These decorative sheets and decorative materials, in general, are often required to have surface strength such as scratch resistance and the like. For the above-mentioned reasons, for example, (1) ones, in which a curing resin layer of two-component curing resin, ionizing radiation curing resin, or the like is formed as an even thickness resin coated membrane (Japanese Patent Application Laid-Open (JP-A) No. 53-64289), is conventionally used for the surface of the decorative sheet. Comparing to two-component urethane resins and the like, such ionizing radiation curing resin has various advantages such as: excellent in productivity because instant curing is possible; solvent drying is not necessary and can be piled up; and further as result, relief printing in a pattern is possible. Further, a decorative sheet, whose curing resin layer of the surface is formed into a convex-concave pattern, is proposed in the purpose of a convex-concave surface design, improving abrasion resistance or the like. For example, (2) a decorative sheet 20 having a configuration shown in cross-sectional view in FIG. 4 , that on a pattern printed layer 22 provided on a base material 21 , coating film layer 23 of an urethane based resin ink is provided on the entire surface, and further thereon, a convex-concave pattern 24 formed by the relief printing of the urethane base resin ink is provided (JP-A No. 8-100397). Or (3) a decorative sheet 20 having a configuration shown in cross-sectional view in FIG. 5 , that on a pattern printed layer 22 provided on a base material 21 , coating film layer 23 of an urethane based resin ink is provided on the entire surface, a convex-concave pattern 24 formed by the relief printing of the urethane base resin ink is provided thereon, and further on the entire surface of the convex-concave pattern 24 , an over coat layer 25 of a curing resin is provided(JP-A No. 8-244193). On the other hand, various design expression is possible in forming of surface resin layers such as curing resin layer, using a doctor blade and a gravure plate (gravure coating, gravure printing), by adjusting a cell volume in order to make variation in thickness of the resin layer, or by forming in a pattern. In the above-mentioned gravure coating or gravure printing, doctor streak may occur in long time operation. The doctor streak occurs when a tip of the doctor blade is chipped off, a groove shaped damage (doctor damage) occurs across the tip, so that the ink of this part is not scraped off sufficiently, because the doctor blade is not worn evenly in its width direction. Such doctor streak can be avoided if the doctor blade is changed earlier, or can be improved by using a steel doctor coated with ceramic (hereinafter, referred to as “ceramic doctor” for short) as the doctor blade instead of a conventional steel doctor blade. The improvement of the doctor streak is attempted also in an aspect of compositions of the ink or coating liquid. For example, compositions containing an inorganic pigment (special light calcium carbonate) having rosette crystal (JP-A No. 5-51549), containing an amine salt of N-benzoyl amino alkane acid in an aqueous ink (JP-A No. 6-220385), or containing spherical filler such as a polycarbonate based resin and the like (JP-A No. 11-277685 (paragraph 0013)) are proposed. However, particularly when the ink or coating liquid contain delustering agent such as delustering silica, the doctor streak is likely to occur. The delustering silica is used when a delustered surface (including a low-luster surface in addition to a delustered surface, as it is named) is required, for example, when luster on a surface of a decorative material is not wanted. Therefore, the resin layer on the surface is formed as a luster adjusting resin layer in which the delustering agent is added (Japanese Patent No. 2856862). Though there are various types of delustering agent, the delustering silica is most common in view of high delustering effect and low cost. In the decorative sheet such as above-mentioned (1), in which a curing resin layer of an even thickness is formed by coating on the entire surface, abrasion resistance is improved by the curing resin layer. However, a problem of grain depression is likely to occur. The grain depression is a phenomenon that convex-concave, such as conduit or the like of the adhered base material surface, stands out on the surface of the decorative sheet when the decorative sheet is adhered to an adhered base material such as wooden substrate, such as a lauan plywood, a particle board and the like, to form a decorative material. Particularly, the phenomenon occurs when the decorative sheet is in a form of a decorative paper, a coated paper or the like, and the base material sheet is thin like a paper. It was found that, in the decorative sheet provided with a convex-concave pattern by relief printing as the above-mentioned (2) and (3), not only the expression of the three-dimensional design, the grain depression can be made not visible by the convex-concave pattern, and further, scratch resistance can also be obtained. However, on the lower side of the convex-concave pattern 24 of the decorative sheet of (2), the coating film layer 23 , of the curing resin, as same as the convex-concave pattern is provided. On the upper side of the convex-concave pattern 24 of the decorative sheet (3), the overcoat layer 25 , of the curing resin, as same as the convex-concave pattern is provided. Therefore, the coating process of the coating film layer or the overcoat layer is necessary in addition to the relief printing of the convex-concave pattern so that high cost in processing and high material cost are inevitable. In the viewpoint of the cost, a configuration of base material 21 /pattern printed layer 22 /convex-concave pattern 24 , omitting the coating film layer or the overcoat layer, can be presented. However, with such configuration, sufficient property cannot be obtained in applications in which scratch resistance or contamination resistance is required. This is because, even though contamination resistance can be imparted to a convex part “a” of the convex-concave pattern 24 by forming the convex-concave pattern with curing resin, the lower layer of the convex-concave pattern, such as the pattern printed layer 22 or base material sheet 21 , is bared in a concave part “b” of the convex-concave pattern in the relief printing. Therefore, contamination resistance of the decorative sheet is deteriorated as a whole, due to the poor contamination resistance of the lower layer (refer to FIG. 4 ). On the other hand, when the delustering silica is added in order to adjust the luster of the surface, there is a problem that the doctor streak tends to occur. The tendency is apparent particularly when the curing resin layer on the surface is formed of the ionizing radiation curing resin, especially with no solvent. Further, in case of using the ionizing radiation curing resin by itself, the surface thereof tends to have a strong luster and it is difficult to weaken the luster. Therefore, the delustering agent must be added in the applications in which the strong luster is not wanted, so that improvement of the doctor streak and making the manufacturing easier are inevitable problems. A reason that the addition of the delustering agent, when the resin is the ionizing radiation curing resin, has tendency to lead to the doctor streak is as follows. When a two-component curing type urethane resin and the like is diluted with a solvent and used, a lift up effect, wherein the delustering agent float up to the surface in volume shrinking of the coating film due to drying of the solvent, will contribute to the delustering. However, when no solvent is used, an adding amount or a particle diameter of the delustering agent is needed to be increased since there is no lift up effect. Moreover, when no solvent is used, a leveling effect after the coating is low so that the doctor streak tends to remain, being another reason. Although the doctor streak is improved by the use of the ceramic doctor, a difference by adding the delustering silica still remains.
|
Title:
Decorative material and decorative sheet
Abstract:
An object of the present invention is to realize a configuration of decorative sheet, particularly a decorative paper and the like, or a decorative material in which it is adhered, that is: a grain depression is not visible; excellent in scratch resistance, also in contamination resistance; and three-dimensional design can be expressed, at low cost. For attaining the above-mentioned object, the present invention uses a delustering silica, whose surface is treated with a fatty acid based wax such as stearic acid, as a delustering silica in a decorative material 10 in which a luster adjusting resin layer 2, which is formed of a cross-linked cured material of an ionizing radiation curing resin composition containing a delustering silica, is provided on a base material 1. The luster adjusting resin layer may be formed with an even thickness. However, a convex-concave surface design can be expressed by forming the luster adjusting resin layer partially in a pattern. The luster adjusting resin layer is formed with an ionizing radiation curing resin composition, particularly with no solvent, by a gravure printing or gravure coating using a doctor blade and a gravure plate.
Background:
BACKGROUND ART Decorative sheets using paper and resin sheet, or decorative materials such as decorative material in the form of plate, in which the above-mentioned decorative sheet is adhered to an adhered base material, are used in various uses such as construction interior and exterior materials. These decorative sheets and decorative materials, in general, are often required to have surface strength such as scratch resistance and the like. For the above-mentioned reasons, for example, (1) ones, in which a curing resin layer of two-component curing resin, ionizing radiation curing resin, or the like is formed as an even thickness resin coated membrane (Japanese Patent Application Laid-Open (JP-A) No. 53-64289), is conventionally used for the surface of the decorative sheet. Comparing to two-component urethane resins and the like, such ionizing radiation curing resin has various advantages such as: excellent in productivity because instant curing is possible; solvent drying is not necessary and can be piled up; and further as result, relief printing in a pattern is possible. Further, a decorative sheet, whose curing resin layer of the surface is formed into a convex-concave pattern, is proposed in the purpose of a convex-concave surface design, improving abrasion resistance or the like. For example, (2) a decorative sheet 20 having a configuration shown in cross-sectional view in FIG. 4 , that on a pattern printed layer 22 provided on a base material 21 , coating film layer 23 of an urethane based resin ink is provided on the entire surface, and further thereon, a convex-concave pattern 24 formed by the relief printing of the urethane base resin ink is provided (JP-A No. 8-100397). Or (3) a decorative sheet 20 having a configuration shown in cross-sectional view in FIG. 5 , that on a pattern printed layer 22 provided on a base material 21 , coating film layer 23 of an urethane based resin ink is provided on the entire surface, a convex-concave pattern 24 formed by the relief printing of the urethane base resin ink is provided thereon, and further on the entire surface of the convex-concave pattern 24 , an over coat layer 25 of a curing resin is provided(JP-A No. 8-244193). On the other hand, various design expression is possible in forming of surface resin layers such as curing resin layer, using a doctor blade and a gravure plate (gravure coating, gravure printing), by adjusting a cell volume in order to make variation in thickness of the resin layer, or by forming in a pattern. In the above-mentioned gravure coating or gravure printing, doctor streak may occur in long time operation. The doctor streak occurs when a tip of the doctor blade is chipped off, a groove shaped damage (doctor damage) occurs across the tip, so that the ink of this part is not scraped off sufficiently, because the doctor blade is not worn evenly in its width direction. Such doctor streak can be avoided if the doctor blade is changed earlier, or can be improved by using a steel doctor coated with ceramic (hereinafter, referred to as “ceramic doctor” for short) as the doctor blade instead of a conventional steel doctor blade. The improvement of the doctor streak is attempted also in an aspect of compositions of the ink or coating liquid. For example, compositions containing an inorganic pigment (special light calcium carbonate) having rosette crystal (JP-A No. 5-51549), containing an amine salt of N-benzoyl amino alkane acid in an aqueous ink (JP-A No. 6-220385), or containing spherical filler such as a polycarbonate based resin and the like (JP-A No. 11-277685 (paragraph 0013)) are proposed. However, particularly when the ink or coating liquid contain delustering agent such as delustering silica, the doctor streak is likely to occur. The delustering silica is used when a delustered surface (including a low-luster surface in addition to a delustered surface, as it is named) is required, for example, when luster on a surface of a decorative material is not wanted. Therefore, the resin layer on the surface is formed as a luster adjusting resin layer in which the delustering agent is added (Japanese Patent No. 2856862). Though there are various types of delustering agent, the delustering silica is most common in view of high delustering effect and low cost. In the decorative sheet such as above-mentioned (1), in which a curing resin layer of an even thickness is formed by coating on the entire surface, abrasion resistance is improved by the curing resin layer. However, a problem of grain depression is likely to occur. The grain depression is a phenomenon that convex-concave, such as conduit or the like of the adhered base material surface, stands out on the surface of the decorative sheet when the decorative sheet is adhered to an adhered base material such as wooden substrate, such as a lauan plywood, a particle board and the like, to form a decorative material. Particularly, the phenomenon occurs when the decorative sheet is in a form of a decorative paper, a coated paper or the like, and the base material sheet is thin like a paper. It was found that, in the decorative sheet provided with a convex-concave pattern by relief printing as the above-mentioned (2) and (3), not only the expression of the three-dimensional design, the grain depression can be made not visible by the convex-concave pattern, and further, scratch resistance can also be obtained. However, on the lower side of the convex-concave pattern 24 of the decorative sheet of (2), the coating film layer 23 , of the curing resin, as same as the convex-concave pattern is provided. On the upper side of the convex-concave pattern 24 of the decorative sheet (3), the overcoat layer 25 , of the curing resin, as same as the convex-concave pattern is provided. Therefore, the coating process of the coating film layer or the overcoat layer is necessary in addition to the relief printing of the convex-concave pattern so that high cost in processing and high material cost are inevitable. In the viewpoint of the cost, a configuration of base material 21 /pattern printed layer 22 /convex-concave pattern 24 , omitting the coating film layer or the overcoat layer, can be presented. However, with such configuration, sufficient property cannot be obtained in applications in which scratch resistance or contamination resistance is required. This is because, even though contamination resistance can be imparted to a convex part “a” of the convex-concave pattern 24 by forming the convex-concave pattern with curing resin, the lower layer of the convex-concave pattern, such as the pattern printed layer 22 or base material sheet 21 , is bared in a concave part “b” of the convex-concave pattern in the relief printing. Therefore, contamination resistance of the decorative sheet is deteriorated as a whole, due to the poor contamination resistance of the lower layer (refer to FIG. 4 ). On the other hand, when the delustering silica is added in order to adjust the luster of the surface, there is a problem that the doctor streak tends to occur. The tendency is apparent particularly when the curing resin layer on the surface is formed of the ionizing radiation curing resin, especially with no solvent. Further, in case of using the ionizing radiation curing resin by itself, the surface thereof tends to have a strong luster and it is difficult to weaken the luster. Therefore, the delustering agent must be added in the applications in which the strong luster is not wanted, so that improvement of the doctor streak and making the manufacturing easier are inevitable problems. A reason that the addition of the delustering agent, when the resin is the ionizing radiation curing resin, has tendency to lead to the doctor streak is as follows. When a two-component curing type urethane resin and the like is diluted with a solvent and used, a lift up effect, wherein the delustering agent float up to the surface in volume shrinking of the coating film due to drying of the solvent, will contribute to the delustering. However, when no solvent is used, an adding amount or a particle diameter of the delustering agent is needed to be increased since there is no lift up effect. Moreover, when no solvent is used, a leveling effect after the coating is low so that the doctor streak tends to remain, being another reason. Although the doctor streak is improved by the use of the ceramic doctor, a difference by adding the delustering silica still remains.
|
11002378
| 2,004
|
Task-oriented book with functional features for facilitating experiential learning
|
A book is disclosed for facilitating experiential learning. The book includes a first task packet that includes a collection of preview material that introduces a task without revealing what the task is. The first task packet also includes a collection of description material that identifies what the task is. Finally, the first task packet includes a commitment mechanism configured to discourage a reader from proceeding from the collection of preview material to the collection of description material until the reader is committed to performing the task.
|
BACKGROUND OF THE INVENTION The present invention generally pertains books. More specifically, the present invention pertains to a manner of structuring a book to encourage and facilitate a sampling of new experiences by the reader. Innovations in the structure of books have been patented in the past. Some of these developments have been directed toward children's literature. For example, U.S. Pat. No. 6,206,699 (D'Andrea) is directed to an activity book that includes an illustrated page with at least one opening on the page through which a moldable material such as modeling clay is forced or extruded by the reader. Another example, U.S. Pat. No. 6,135,844 (D'Andrea) is directed to a children's activity book having illustrated pages with openings for the placement of edible candy such as mints or jelly beans. Yet another example, U.S. Pat. No. 6,050,604 (Ossiatzky), pertains to a coloring book with pop-up figures. Other patented book formats are designed to facilitate a predetermined user experience that extends beyond simple reading comprehension. For example, U.S. Pat. No. 4,487,430 (Bernardin) is directed to a question and answer book wherein a question posed by the story in the book is answerable by a mechanical manipulation of the book pages. In another example, U.S. Pat. No. 6,000,986 (Kaufman) describes an interactive book having pages that include tracks or monorails for guiding a toy figure along a page. In still another example, U.S. Pat. No. 4,640,512 (Burke) discloses an interactive instructive book which guides the reader, using consecutively arranged indicia, in the assembly of a puzzle which is provided separate from the book. In view of the forgoing, there is an on-going need for unique book formats that engage readers so as to make reading more enjoyable and/or educational.
|
Title:
Task-oriented book with functional features for facilitating experiential learning
Abstract:
A book is disclosed for facilitating experiential learning. The book includes a first task packet that includes a collection of preview material that introduces a task without revealing what the task is. The first task packet also includes a collection of description material that identifies what the task is. Finally, the first task packet includes a commitment mechanism configured to discourage a reader from proceeding from the collection of preview material to the collection of description material until the reader is committed to performing the task.
Background:
BACKGROUND OF THE INVENTION The present invention generally pertains books. More specifically, the present invention pertains to a manner of structuring a book to encourage and facilitate a sampling of new experiences by the reader. Innovations in the structure of books have been patented in the past. Some of these developments have been directed toward children's literature. For example, U.S. Pat. No. 6,206,699 (D'Andrea) is directed to an activity book that includes an illustrated page with at least one opening on the page through which a moldable material such as modeling clay is forced or extruded by the reader. Another example, U.S. Pat. No. 6,135,844 (D'Andrea) is directed to a children's activity book having illustrated pages with openings for the placement of edible candy such as mints or jelly beans. Yet another example, U.S. Pat. No. 6,050,604 (Ossiatzky), pertains to a coloring book with pop-up figures. Other patented book formats are designed to facilitate a predetermined user experience that extends beyond simple reading comprehension. For example, U.S. Pat. No. 4,487,430 (Bernardin) is directed to a question and answer book wherein a question posed by the story in the book is answerable by a mechanical manipulation of the book pages. In another example, U.S. Pat. No. 6,000,986 (Kaufman) describes an interactive book having pages that include tracks or monorails for guiding a toy figure along a page. In still another example, U.S. Pat. No. 4,640,512 (Burke) discloses an interactive instructive book which guides the reader, using consecutively arranged indicia, in the assembly of a puzzle which is provided separate from the book. In view of the forgoing, there is an on-going need for unique book formats that engage readers so as to make reading more enjoyable and/or educational.
|
11010249
| 2,004
|
Self-checking pair on a braided ring network
|
In one embodiment, one or more self checking pairs are implemented at the application layer in a network that supports the qualified propagation of data at the transport layer (for example, in a network having a braided ring topology).
|
BACKGROUND Distributed, fault-tolerant communication systems are used, for example, in applications where a failure could possibly result in injury or death to one or more persons. Such applications are referred to here as “safety-critical applications.” One example of a safety-critical application is in a system that is used to monitor and manage sensors and actuators included in an airplane or other aerospace vehicle. One architecture that is commonly considered for use in such safety-critical applications is the Time-Triggered Architecture (TTA). In a TTA system, multiple nodes communicate with one another over two replicated high-speed communication channels using, for example, the Time Triggered Protocol/C (TTP/C) or the FLEXRAY protocol. In some embodiments, at least one of the nodes in such a TTA system is coupled to one or more sensors and/or actuators over two replicated, low-speed serial communication channels using, for example, the Time Triggered Protocol/A (TTP/A). In one configuration of such a TTA system, various nodes communicate with one another over two, replicated communication channels, each of which is implemented using a star topology. In such a configuration, each channel includes an independent, centralized bus guardian. Each such centralized bus guardian represents a single point of failure for the respective channel. Another configuration of a TTA system is implemented using a linear bus topology in which various nodes communicate with one another over two, replicated communication channels and where each node includes a separate, independent bus guardian for each communication channel to which that node is coupled. In other words, where two communication channels are used, each node includes two independent bus guardians. Providing multiple independent bus guardians within each node, however, may not be suitable for some applications (for example, due to the increased cost associated with providing multiple bus guardians within each node).
|
Title:
Self-checking pair on a braided ring network
Abstract:
In one embodiment, one or more self checking pairs are implemented at the application layer in a network that supports the qualified propagation of data at the transport layer (for example, in a network having a braided ring topology).
Background:
BACKGROUND Distributed, fault-tolerant communication systems are used, for example, in applications where a failure could possibly result in injury or death to one or more persons. Such applications are referred to here as “safety-critical applications.” One example of a safety-critical application is in a system that is used to monitor and manage sensors and actuators included in an airplane or other aerospace vehicle. One architecture that is commonly considered for use in such safety-critical applications is the Time-Triggered Architecture (TTA). In a TTA system, multiple nodes communicate with one another over two replicated high-speed communication channels using, for example, the Time Triggered Protocol/C (TTP/C) or the FLEXRAY protocol. In some embodiments, at least one of the nodes in such a TTA system is coupled to one or more sensors and/or actuators over two replicated, low-speed serial communication channels using, for example, the Time Triggered Protocol/A (TTP/A). In one configuration of such a TTA system, various nodes communicate with one another over two, replicated communication channels, each of which is implemented using a star topology. In such a configuration, each channel includes an independent, centralized bus guardian. Each such centralized bus guardian represents a single point of failure for the respective channel. Another configuration of a TTA system is implemented using a linear bus topology in which various nodes communicate with one another over two, replicated communication channels and where each node includes a separate, independent bus guardian for each communication channel to which that node is coupled. In other words, where two communication channels are used, each node includes two independent bus guardians. Providing multiple independent bus guardians within each node, however, may not be suitable for some applications (for example, due to the increased cost associated with providing multiple bus guardians within each node).
|
10829823
| 2,004
|
EROSION-CORROSION RESISTANT CARBIDE CERMETS FOR LONG TERM HIGH TEMPERATURE SERVICE
|
Cermets are provided in which the ceramic phase is selected from the group consisting of Cr23C6, Cr7C3, Cr3C2 and mixtures thereof. The binder phase is selected from certain specified Ni/Cr alloys and certain Fe/Ni/Cr alloys. These cermets are particularly useful in protecting surfaces from erosion at high temperatures.
|
BACKGROUND OF INVENTION Abrasive and chemically resistant materials find use in many applications where metal surfaces are subjected to substances which would otherwise promote erosion or corrosion of the metal surfaces. Reactor vessels and transfer lines used in various chemical and petroleum processes are examples of equipment having metal surfaces that often are provided with materials to protect the surfaces against material degradation. Because these vessels and transfer lines are typically used at high temperatures protecting them against degradation is a technological challenge. Currently refractory liners are used to protect metal surfaces exposed at high temperature to erosive or corrosive environments. The lifespan of these refractory liners, however, is significantly limited by mechanical attrition of the liner, especially when exposed to high velocity particulates, often encountered in petroleum and petrochemical processing. Refractory liners also commonly exhibit cracking and spallation. Thus, there is a need for liner material that is more resistant to erosion and corrosion at high temperatures. Ceramic metal composites or cermets are known to possess the attributes of the hardness of ceramics and the fracture toughness of metal but only when used at relatively moderate temperatures, for example, from 25° C. to no more than about 300° C. Tungsten carbide (WC) based cermets, for example, have both hardness and fracture toughness making them useful in high wear applications such as in cutting tools and drill bits cooled with fluids. WC based cermets, however, degrade at sustained high temperatures, greater than about 600° F. (315° C.). Chromium carbide has been a potentially suitable ceramic phase for use in cermets because its three crystallographic forms: the cubic (Cr 23 C 6 ) the hexagonal (Cr 7 C 3 ) and the orthorhombic (Cr 3 C 2 ) have excellent oxidation resistance at elevated temperatures; yet cermets formed from these carbides typically undergo transformations at elevated temperatures which result in the formation of microstructural phases which have a deleterious effect on the properties of such cermets. The object of the present invention is to provide new and improved cermet compositions. Another object of the invention is to provide chromium carbide containing cermet compositions suitable for use at high temperatures. Another object of the invention is to provide chromium carbide containing cermet compositions with long term microstructural stability suitable for long term service at high temperatures. Yet another object of the invention is to provide an improved method for protecting metal surfaces against erosion and corrosion under high temperature conditions. These and other objects will become apparent from the detailed description which follows.
|
Title:
EROSION-CORROSION RESISTANT CARBIDE CERMETS FOR LONG TERM HIGH TEMPERATURE SERVICE
Abstract:
Cermets are provided in which the ceramic phase is selected from the group consisting of Cr23C6, Cr7C3, Cr3C2 and mixtures thereof. The binder phase is selected from certain specified Ni/Cr alloys and certain Fe/Ni/Cr alloys. These cermets are particularly useful in protecting surfaces from erosion at high temperatures.
Background:
BACKGROUND OF INVENTION Abrasive and chemically resistant materials find use in many applications where metal surfaces are subjected to substances which would otherwise promote erosion or corrosion of the metal surfaces. Reactor vessels and transfer lines used in various chemical and petroleum processes are examples of equipment having metal surfaces that often are provided with materials to protect the surfaces against material degradation. Because these vessels and transfer lines are typically used at high temperatures protecting them against degradation is a technological challenge. Currently refractory liners are used to protect metal surfaces exposed at high temperature to erosive or corrosive environments. The lifespan of these refractory liners, however, is significantly limited by mechanical attrition of the liner, especially when exposed to high velocity particulates, often encountered in petroleum and petrochemical processing. Refractory liners also commonly exhibit cracking and spallation. Thus, there is a need for liner material that is more resistant to erosion and corrosion at high temperatures. Ceramic metal composites or cermets are known to possess the attributes of the hardness of ceramics and the fracture toughness of metal but only when used at relatively moderate temperatures, for example, from 25° C. to no more than about 300° C. Tungsten carbide (WC) based cermets, for example, have both hardness and fracture toughness making them useful in high wear applications such as in cutting tools and drill bits cooled with fluids. WC based cermets, however, degrade at sustained high temperatures, greater than about 600° F. (315° C.). Chromium carbide has been a potentially suitable ceramic phase for use in cermets because its three crystallographic forms: the cubic (Cr 23 C 6 ) the hexagonal (Cr 7 C 3 ) and the orthorhombic (Cr 3 C 2 ) have excellent oxidation resistance at elevated temperatures; yet cermets formed from these carbides typically undergo transformations at elevated temperatures which result in the formation of microstructural phases which have a deleterious effect on the properties of such cermets. The object of the present invention is to provide new and improved cermet compositions. Another object of the invention is to provide chromium carbide containing cermet compositions suitable for use at high temperatures. Another object of the invention is to provide chromium carbide containing cermet compositions with long term microstructural stability suitable for long term service at high temperatures. Yet another object of the invention is to provide an improved method for protecting metal surfaces against erosion and corrosion under high temperature conditions. These and other objects will become apparent from the detailed description which follows.
|
10892815
| 2,004
|
Device and method for forwarding a message
|
Method of triggering the forwarding of a message in a device including an autonomous switching means including at least one input including a storage means provided with an input and an output. In this process, a coefficient representative of the ratio of the input clock gating frequency and output clock gating frequency is formulated, the quantity of data stored in the storage means of the input at which the said message arrives is compared with the product of the coefficient and of the length of the message, and the triggering is decided when the quantity of data stored in the storage means of the input at which the message arrives is greater than the product of the coefficient times the length of the message.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method and a device for forwarding a message. 2. Description of the Relevant Art Interconnection networks are devices for forwarding messages between various agents or entities of a communication network. These interconnections networks are generally composed of two distinct parts which interact, namely a hardware part including physical links and a network controller, hard-wired or microprogrammed, which executes a low-level protocol, and a software part for effecting the interface with software functions of higher level. An ideal interconnections network would certainly be a fully interconnected network, that is to say a network in which each pair of agents is connected by a point-to-point link. However, this is totally unrealistic onwards of a few tens of agents. It is therefore necessary for the interconnections network to be able to cater for all the communications between agents with a limited number of links per agent. Specialized agents exist for performing routing or steering of messages flowing over the interconnections network. These interconnections networks include forwarding devices or routers (also known as “switches”), an organization of the network ensuring the link between the routers and the other agents, and a routing assembly that caters for the flow of messages within the organization of the network. A router is an active agent of the interconnections network which receives as input messages coming from one or more agents and which steers or routes each of these messages respectively to their destination agent or to another router. This routing is performed by means of the address of the message destination agent, which is present in the header of the message to be routed. The organization of a network constitutes the physical structure linking the various nodes or points of connections of an interconnections network. The routing assembly manages the way in which a message is routed, or steered, from a source agent sending the message to a message destination agent through routers, along a routing path. A message is, of course, a string of computer data, that is to say a string of bits or bytes. Each messages includes a message header that chiefly includes the destination address of the message and the size of the message. Any agent present in an interconnections network may send and/or receive messages. The routing technique determines the way in which the messages are forwarded from the sending agent to the destination agent. For a given interconnections network, there are various routing techniques, for which the objectives are to reduce the end of message latency, or end of message steering time, for a message, from the sending agent to the destination agent, to increase the overall throughput and to improve the overall reliability of the network. The latency includes all the waiting times due to the way in which the messages propagate in the network and more particularly through the devices for forwarding messages in charge of routing the messages. The throughput is the quantity of computer data that a link of the network can transport per unit time, and can be measured locally over a link of the interconnections network or globally over the whole of the interconnections network. The reliability of a network is important, since the probability of errors grows rapidly with the number of nodes in an interconnections network. Numerous algorithms for routing in interconnection networks exist. Two of the most widespread are “store and forward” routing, and “wormhole” routing. These mechanisms are for example described at the following electronic addresses: http://www.cs.bu.edu/˜best/crs/cs551/lectures/lecture-15.html http://www.proj-mission.org/EE660/Gautam7.4.pdf, http://www.comp.mq.edu.au/courses/comp439/lectures/comm — 4.pdf, and http://www.cs.uh.edu/˜resch/TUTORIALS/SLIDES_TSS — 02/2-21-2002.pdf. The “store and forward” routing algorithm requires that there be a storage means of first in first out or FIFO type of a size at least equal to the maximum length of a message. When the maximum size of a message is large, the hardware cost and the memory size are significant. Moreover the end of message latency will be relatively significant, and this may be critical for certain networks. The “wormhole” routing algorithm minimizes the end of message latency, but does not make it possible to control the integrity of the message over intermediate nodes situated between the sending agent and the destination agent. The validity of the content of the message can then be controlled only at the level of the destination agent, that is to say of the final agent.
|
Title:
Device and method for forwarding a message
Abstract:
Method of triggering the forwarding of a message in a device including an autonomous switching means including at least one input including a storage means provided with an input and an output. In this process, a coefficient representative of the ratio of the input clock gating frequency and output clock gating frequency is formulated, the quantity of data stored in the storage means of the input at which the said message arrives is compared with the product of the coefficient and of the length of the message, and the triggering is decided when the quantity of data stored in the storage means of the input at which the message arrives is greater than the product of the coefficient times the length of the message.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method and a device for forwarding a message. 2. Description of the Relevant Art Interconnection networks are devices for forwarding messages between various agents or entities of a communication network. These interconnections networks are generally composed of two distinct parts which interact, namely a hardware part including physical links and a network controller, hard-wired or microprogrammed, which executes a low-level protocol, and a software part for effecting the interface with software functions of higher level. An ideal interconnections network would certainly be a fully interconnected network, that is to say a network in which each pair of agents is connected by a point-to-point link. However, this is totally unrealistic onwards of a few tens of agents. It is therefore necessary for the interconnections network to be able to cater for all the communications between agents with a limited number of links per agent. Specialized agents exist for performing routing or steering of messages flowing over the interconnections network. These interconnections networks include forwarding devices or routers (also known as “switches”), an organization of the network ensuring the link between the routers and the other agents, and a routing assembly that caters for the flow of messages within the organization of the network. A router is an active agent of the interconnections network which receives as input messages coming from one or more agents and which steers or routes each of these messages respectively to their destination agent or to another router. This routing is performed by means of the address of the message destination agent, which is present in the header of the message to be routed. The organization of a network constitutes the physical structure linking the various nodes or points of connections of an interconnections network. The routing assembly manages the way in which a message is routed, or steered, from a source agent sending the message to a message destination agent through routers, along a routing path. A message is, of course, a string of computer data, that is to say a string of bits or bytes. Each messages includes a message header that chiefly includes the destination address of the message and the size of the message. Any agent present in an interconnections network may send and/or receive messages. The routing technique determines the way in which the messages are forwarded from the sending agent to the destination agent. For a given interconnections network, there are various routing techniques, for which the objectives are to reduce the end of message latency, or end of message steering time, for a message, from the sending agent to the destination agent, to increase the overall throughput and to improve the overall reliability of the network. The latency includes all the waiting times due to the way in which the messages propagate in the network and more particularly through the devices for forwarding messages in charge of routing the messages. The throughput is the quantity of computer data that a link of the network can transport per unit time, and can be measured locally over a link of the interconnections network or globally over the whole of the interconnections network. The reliability of a network is important, since the probability of errors grows rapidly with the number of nodes in an interconnections network. Numerous algorithms for routing in interconnection networks exist. Two of the most widespread are “store and forward” routing, and “wormhole” routing. These mechanisms are for example described at the following electronic addresses: http://www.cs.bu.edu/˜best/crs/cs551/lectures/lecture-15.html http://www.proj-mission.org/EE660/Gautam7.4.pdf, http://www.comp.mq.edu.au/courses/comp439/lectures/comm — 4.pdf, and http://www.cs.uh.edu/˜resch/TUTORIALS/SLIDES_TSS — 02/2-21-2002.pdf. The “store and forward” routing algorithm requires that there be a storage means of first in first out or FIFO type of a size at least equal to the maximum length of a message. When the maximum size of a message is large, the hardware cost and the memory size are significant. Moreover the end of message latency will be relatively significant, and this may be critical for certain networks. The “wormhole” routing algorithm minimizes the end of message latency, but does not make it possible to control the integrity of the message over intermediate nodes situated between the sending agent and the destination agent. The validity of the content of the message can then be controlled only at the level of the destination agent, that is to say of the final agent.
|
11027542
| 2,004
|
Method for defining a coating fluid pattern
|
A method of defining a pattern of coating fluid on a surface includes introducing coating fluid containing microspheres onto a surface of an applicator roll, wherein the topography of the applicator roll surface comprises at least one longitudinally extending circumferential, helical groove portion which is sized to at least partially receive the microspheres of the coating fluid therein, and at least one circumferential, longitudinally extending smooth surface portion. The method further includes engaging the applicator roll surface with a doctor blade to remove coating fluid from the smooth surface portions thereof and to limit the amount of microspheres advanced past the doctor blade by the helical groove portion of the applicator roll surface. Thus, a pattern of coating fluid containing microspheres remains on the applicator roll surface which is defined by the helical groove portion thereon and is formed to define at least one stripe of coating fluid containing microspheres. The pattern of coating fluid is transferred from the applicator roll surface to a moving web by a reverse kiss coating.
|
BACKGROUND OF THE INVENTION This application relates to a method for applying a coating fluid. More particularly, the present invention relates to applying coating fluid in a specifically desired longitudinally disposed pattern. In various product designs, it is desirable to coat one or more stripes of a coating material in a down-web or cross web pattern on a substrate such as a moving paper web or polymeric film web. In some applications, the coating material comprises a pressure sensitive adhesive (either permanent or removable). In particular, such adhesives may constitute pressure sensitive adhesive coatings including microsphere based adhesives, such as those disclosed in U.S. Pat. Nos. 6,296,932, 5,824,748, 5,756,625, 5,714,237, 5,571,617, 5,045,569, 4,495,318, 4,166,152, 3,857,731, and 3,691,140. It is important when processing such microsphere based adhesives that the relatively delicate microspheres themselves not be damaged or ruptured. For example, if the microspheres are cut or sheared, the adhesive materials therein could start to agglomerate, thereby making it difficult to handle the coating material and form a uniform layer thereof on a substrate. Such agglomeration also may cause the adhesive material to adhere to components of the coating equipment or further web processing equipment, thereby necessitating a shut down of the coating process while coating equipment and components are cleaned. Accordingly, it is quite important that microsphere adhesives be handled delicately in processing and that any shearing of those adhesives in fluid form be done in a manner that would minimize possible shearing of the microspheres themselves. This goal has proved problematic in many processing conditions where metering and further processing of a microsphere adhesive based coating requires such activities as dispensing of the coating through a die under pressure, exposure of the coating to a doctor blade on a roller, or metering under pressure, exposure of the coating to a doctor blade on a roller, or metering of the coating by passing it through a nip between opposed rollers. For instance, if there is insufficient space in a nip between opposed rolls for a microsphere to pass through that nip, it cannot do so. The microspheres are then squeezed out to the sides of the roll and do not accumulate on any coating being deposited after the nip The deficiencies in prior art processes include inadequate transfer of adhesive from an etched gravure application roll to the web, or undue splitting of the coating material in film form during flexographic coating. In addition, the shear sensitivity and/or poor rheological properties of the microsphere adhesive fluid may result in excessive coagulation (i.e., caused by agglomeration of sheared adhesive microspheres) and/or non-uniform coating lay down, which will result in non-uniform streaks of adhesive, mottled adhesive patterns, coating voids or an undesired “orange peel” coating effect which affect the adhesion level of the dried coating.
|
Title:
Method for defining a coating fluid pattern
Abstract:
A method of defining a pattern of coating fluid on a surface includes introducing coating fluid containing microspheres onto a surface of an applicator roll, wherein the topography of the applicator roll surface comprises at least one longitudinally extending circumferential, helical groove portion which is sized to at least partially receive the microspheres of the coating fluid therein, and at least one circumferential, longitudinally extending smooth surface portion. The method further includes engaging the applicator roll surface with a doctor blade to remove coating fluid from the smooth surface portions thereof and to limit the amount of microspheres advanced past the doctor blade by the helical groove portion of the applicator roll surface. Thus, a pattern of coating fluid containing microspheres remains on the applicator roll surface which is defined by the helical groove portion thereon and is formed to define at least one stripe of coating fluid containing microspheres. The pattern of coating fluid is transferred from the applicator roll surface to a moving web by a reverse kiss coating.
Background:
BACKGROUND OF THE INVENTION This application relates to a method for applying a coating fluid. More particularly, the present invention relates to applying coating fluid in a specifically desired longitudinally disposed pattern. In various product designs, it is desirable to coat one or more stripes of a coating material in a down-web or cross web pattern on a substrate such as a moving paper web or polymeric film web. In some applications, the coating material comprises a pressure sensitive adhesive (either permanent or removable). In particular, such adhesives may constitute pressure sensitive adhesive coatings including microsphere based adhesives, such as those disclosed in U.S. Pat. Nos. 6,296,932, 5,824,748, 5,756,625, 5,714,237, 5,571,617, 5,045,569, 4,495,318, 4,166,152, 3,857,731, and 3,691,140. It is important when processing such microsphere based adhesives that the relatively delicate microspheres themselves not be damaged or ruptured. For example, if the microspheres are cut or sheared, the adhesive materials therein could start to agglomerate, thereby making it difficult to handle the coating material and form a uniform layer thereof on a substrate. Such agglomeration also may cause the adhesive material to adhere to components of the coating equipment or further web processing equipment, thereby necessitating a shut down of the coating process while coating equipment and components are cleaned. Accordingly, it is quite important that microsphere adhesives be handled delicately in processing and that any shearing of those adhesives in fluid form be done in a manner that would minimize possible shearing of the microspheres themselves. This goal has proved problematic in many processing conditions where metering and further processing of a microsphere adhesive based coating requires such activities as dispensing of the coating through a die under pressure, exposure of the coating to a doctor blade on a roller, or metering under pressure, exposure of the coating to a doctor blade on a roller, or metering of the coating by passing it through a nip between opposed rollers. For instance, if there is insufficient space in a nip between opposed rolls for a microsphere to pass through that nip, it cannot do so. The microspheres are then squeezed out to the sides of the roll and do not accumulate on any coating being deposited after the nip The deficiencies in prior art processes include inadequate transfer of adhesive from an etched gravure application roll to the web, or undue splitting of the coating material in film form during flexographic coating. In addition, the shear sensitivity and/or poor rheological properties of the microsphere adhesive fluid may result in excessive coagulation (i.e., caused by agglomeration of sheared adhesive microspheres) and/or non-uniform coating lay down, which will result in non-uniform streaks of adhesive, mottled adhesive patterns, coating voids or an undesired “orange peel” coating effect which affect the adhesion level of the dried coating.
|
10753559
| 2,004
|
User feedback system
|
A user feedback system for improving a performance of a software application is described. The feedback system includes a telemetry collection system and a user feedback collection system. A context aggregator collects data from both the telemetry collection system and the user feedback collection system, and constructs a data model that characterizes the data. Using this data model, the feedback system is able to provide or enable software support in a timely, convenient, and useful way. Specifically, data in the data model is standardized across a number of software applications and/or users, so that multiple data models, along with other data sources, may be meaningfully compared to identify a problem, and possibly a solution, associated with an operation of the software application. Additionally, users of the feedback system may be connected with a virtual community of other users who the system has determined may be helpful in assisting one another.
|
BACKGROUND Conventional systems exist for collecting user feedback and/or for improving software performance or functionality. Such systems have the potential to provide a wide collection of benefits to users and providers of software. For example, software users benefit from improved performance, ease of use, or increased functionality of a given software application. Employers who provide software in the workplace benefit from improved software and/or reduced software downtime, inasmuch as productivity may be increased for users of the software (as well as for information technology (IT) support staff). As a final example, a software producer may experience increased profitability when consumers are satisfied with software products and/or support for those products. In providing feedback, some software systems automatically generate error messages in response to a software malfunction, where the messages may be sent to the software producer. Somewhat similarly, some software systems generate periodic messages (e.g., error messages or quality of service messages) for transmission to the software producer or other support personnel. In this way, the software producer may either respond to the error message directly, or simply compile the error message(s) for use in future improvements or upgrades of the software. Other systems invite structured and/or unstructured feedback from end users, and the feedback is evaluated by software support personnel. In addition, various forums exist for discussion of topics, including software support forums. For example, users of a particular software application may subscribe to, or participate in, an Internet discussion forum, bulletin board, newsgroup, chat room, or other messaging techniques for communicating with other users. In such environments, for example, a user having a particular problem or issue with a software application may search a discussion forum for a user with a similar problem, or may post a question to the forum in the hopes that someone knowledgeable will see the question and respond.
|
Title:
User feedback system
Abstract:
A user feedback system for improving a performance of a software application is described. The feedback system includes a telemetry collection system and a user feedback collection system. A context aggregator collects data from both the telemetry collection system and the user feedback collection system, and constructs a data model that characterizes the data. Using this data model, the feedback system is able to provide or enable software support in a timely, convenient, and useful way. Specifically, data in the data model is standardized across a number of software applications and/or users, so that multiple data models, along with other data sources, may be meaningfully compared to identify a problem, and possibly a solution, associated with an operation of the software application. Additionally, users of the feedback system may be connected with a virtual community of other users who the system has determined may be helpful in assisting one another.
Background:
BACKGROUND Conventional systems exist for collecting user feedback and/or for improving software performance or functionality. Such systems have the potential to provide a wide collection of benefits to users and providers of software. For example, software users benefit from improved performance, ease of use, or increased functionality of a given software application. Employers who provide software in the workplace benefit from improved software and/or reduced software downtime, inasmuch as productivity may be increased for users of the software (as well as for information technology (IT) support staff). As a final example, a software producer may experience increased profitability when consumers are satisfied with software products and/or support for those products. In providing feedback, some software systems automatically generate error messages in response to a software malfunction, where the messages may be sent to the software producer. Somewhat similarly, some software systems generate periodic messages (e.g., error messages or quality of service messages) for transmission to the software producer or other support personnel. In this way, the software producer may either respond to the error message directly, or simply compile the error message(s) for use in future improvements or upgrades of the software. Other systems invite structured and/or unstructured feedback from end users, and the feedback is evaluated by software support personnel. In addition, various forums exist for discussion of topics, including software support forums. For example, users of a particular software application may subscribe to, or participate in, an Internet discussion forum, bulletin board, newsgroup, chat room, or other messaging techniques for communicating with other users. In such environments, for example, a user having a particular problem or issue with a software application may search a discussion forum for a user with a similar problem, or may post a question to the forum in the hopes that someone knowledgeable will see the question and respond.
|
10912828
| 2,004
|
Virtual resource ID mapping
|
The present invention provides virtual mapping of system resource identifiers in use by a software application for the purpose of making the running state of an application node independent. By adding a layer of indirection between the application and the resource, new system resources are reallocated and then can be mapped to the application's existing resource requirements while it is running, without the application detecting a failure or change in resource handles. This layer of indirection makes the application's system resource identifier (system RID) transparent to the application. RID's are usually numeric in form, but can also be alphanumeric. RID's are unique to a machine, and can be reused once all claims to a specific RID have been given up.
|
BACKGROUND Global computer networks such as the Internet have allowed electronic commerce (“e-commerce”) to flourish to a point where a large number of customers purchase goods and services over websites operated by online merchants. Because the Internet provides an effective medium to reach this large customer base, online merchants who are new to the e-commerce marketplace are often flooded with high customer traffic from the moment their websites are rolled out. In order to effectively serve customers, online merchants are charged with the same responsibility as conventional merchants: they must provide quality service to customers in a timely manner. Often, insufficient computing resources are the cause of a processing bottleneck that results in customer frustration and loss of sales. This phenomena has resulted in the need for a new utility: leasable on-demand computing infrastructure. Previous attempts at providing computing resources have entailed leasing large blocks of storage and processing power. However, for a new online merchant having no baseline from which to judge customer traffic upon rollout, this approach is inefficient. Either too much computing resources are leased, depriving a start up merchant of financial resources that are needed elsewhere in the operation, or not enough resources are leased, and a bottleneck occurs. To make an on-demand computer infrastructure possible, computer applications must be ported across computer networks to different processing locations. However, this approach is costly in terms of overhead for the applications to be moved across the network must be saved, shut down, stored, ported and then restored and re-initialized with the previously running data. The overhead is prohibitive and negates any performance improvements realized by transferring the application to another computer. Thus, there remains a heartfelt need for a system and method for effecting a transfer of applications across computer networks without incurring costly processing overhead.
|
Title:
Virtual resource ID mapping
Abstract:
The present invention provides virtual mapping of system resource identifiers in use by a software application for the purpose of making the running state of an application node independent. By adding a layer of indirection between the application and the resource, new system resources are reallocated and then can be mapped to the application's existing resource requirements while it is running, without the application detecting a failure or change in resource handles. This layer of indirection makes the application's system resource identifier (system RID) transparent to the application. RID's are usually numeric in form, but can also be alphanumeric. RID's are unique to a machine, and can be reused once all claims to a specific RID have been given up.
Background:
BACKGROUND Global computer networks such as the Internet have allowed electronic commerce (“e-commerce”) to flourish to a point where a large number of customers purchase goods and services over websites operated by online merchants. Because the Internet provides an effective medium to reach this large customer base, online merchants who are new to the e-commerce marketplace are often flooded with high customer traffic from the moment their websites are rolled out. In order to effectively serve customers, online merchants are charged with the same responsibility as conventional merchants: they must provide quality service to customers in a timely manner. Often, insufficient computing resources are the cause of a processing bottleneck that results in customer frustration and loss of sales. This phenomena has resulted in the need for a new utility: leasable on-demand computing infrastructure. Previous attempts at providing computing resources have entailed leasing large blocks of storage and processing power. However, for a new online merchant having no baseline from which to judge customer traffic upon rollout, this approach is inefficient. Either too much computing resources are leased, depriving a start up merchant of financial resources that are needed elsewhere in the operation, or not enough resources are leased, and a bottleneck occurs. To make an on-demand computer infrastructure possible, computer applications must be ported across computer networks to different processing locations. However, this approach is costly in terms of overhead for the applications to be moved across the network must be saved, shut down, stored, ported and then restored and re-initialized with the previously running data. The overhead is prohibitive and negates any performance improvements realized by transferring the application to another computer. Thus, there remains a heartfelt need for a system and method for effecting a transfer of applications across computer networks without incurring costly processing overhead.
|
10489141
| 2,004
|
Methods for cultivating and analyzing microbial individual cell cultures
|
The invention relates to methods for individually separating microorganisms from a suspension or culture, parallel cultivation of individual cells and analyzing the metabolic performances thereof. The invention enables basic microbial operations such as media optimization, screening according to images of novel natural substances and special metabolic performances, qualitative and quantitative detection of the effects of nutrient substrates, effectors and active substances including the media optimization and selection of microorganism clones with specific properties from large populations according to mutagenesis, transformation, transfection and genetic processing in addition to the detection of microbial contaminations to be carried out. One advantage of the invention is that it can be applied when microorganisms having outstanding properties can be respectively obtained as individual cells or individual organisms from a large population and can be characterized as pure cultures or when the effect of influencing variables can be examined in many fully comparable cultures.
|
Title:
Methods for cultivating and analyzing microbial individual cell cultures
Abstract:
The invention relates to methods for individually separating microorganisms from a suspension or culture, parallel cultivation of individual cells and analyzing the metabolic performances thereof. The invention enables basic microbial operations such as media optimization, screening according to images of novel natural substances and special metabolic performances, qualitative and quantitative detection of the effects of nutrient substrates, effectors and active substances including the media optimization and selection of microorganism clones with specific properties from large populations according to mutagenesis, transformation, transfection and genetic processing in addition to the detection of microbial contaminations to be carried out. One advantage of the invention is that it can be applied when microorganisms having outstanding properties can be respectively obtained as individual cells or individual organisms from a large population and can be characterized as pure cultures or when the effect of influencing variables can be examined in many fully comparable cultures.
Background:
|
|
10898350
| 2,004
|
Valve
|
A first valve portion and a second valve portion are arranged in series in a flow passage within a valve casing to open and close the flow passage. The first valve portion includes a first valve seat, a first valve element supported to a first valve shaft and adapted to make an axial reciprocating movement into contact with or away from the first valve seat, and an opening and closing drive unit composed of a motor and a motion converting mechanism that converts a rotary motion into a linear motion, the opening and closing drive unit causing the first valve shaft to make a reciprocating movement and capable of effecting a flow rate control and slow valve-opening for the flow passage. The second valve portion includes a second valve seat, a second valve element adapted to move into contact with or away from the second valve seat, a compression spring that urges the second valve element into contact with the second valve seat, and an electromagnetic valve-opening unit for moving the second valve element away from the second valve seat by an electromagnetic force and capable of effecting quick valve-closure for the flow passage.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a valve for opening and closing a flow passage of a fluid. 2. Description of the Related Art The following valve is employed as a valve for controlling a flow rate of a fluid. The valve concerned is constructed such that a flow passage defined within a valve casing having fluid inlet and outlet portions is partitioned by a valve seat, with a valve hole of the valve seat being opened and closed by a valve element supported to a valve shaft. The valve shaft is driven back and forth in its axial direction by opening and closing drive means, closing the valve hole with the valve element supported thereto as it moves forward and opening the valve hole as it moves backward. Conventionally, as a valve of this type, there is known one which uses a pulse motor as the above-mentioned drive means and in which the rotary force of the pulse motor is converted into linear motion to move the valve shaft forward and backward, thus opening and closing the valve hole (see, for example, JP 2608579). With the valve described above, however, both the opening and closing of the valve element must be effected by driving the pulse motor. Therefore, when, for instance, a need arises to effect emergency valve closure, it is difficult to close the valve instantaneously. Further, when power outage occurs while the valve is open, the valve cannot be closed, which may cause a defect in equipment using a fluid.
|
Title:
Valve
Abstract:
A first valve portion and a second valve portion are arranged in series in a flow passage within a valve casing to open and close the flow passage. The first valve portion includes a first valve seat, a first valve element supported to a first valve shaft and adapted to make an axial reciprocating movement into contact with or away from the first valve seat, and an opening and closing drive unit composed of a motor and a motion converting mechanism that converts a rotary motion into a linear motion, the opening and closing drive unit causing the first valve shaft to make a reciprocating movement and capable of effecting a flow rate control and slow valve-opening for the flow passage. The second valve portion includes a second valve seat, a second valve element adapted to move into contact with or away from the second valve seat, a compression spring that urges the second valve element into contact with the second valve seat, and an electromagnetic valve-opening unit for moving the second valve element away from the second valve seat by an electromagnetic force and capable of effecting quick valve-closure for the flow passage.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a valve for opening and closing a flow passage of a fluid. 2. Description of the Related Art The following valve is employed as a valve for controlling a flow rate of a fluid. The valve concerned is constructed such that a flow passage defined within a valve casing having fluid inlet and outlet portions is partitioned by a valve seat, with a valve hole of the valve seat being opened and closed by a valve element supported to a valve shaft. The valve shaft is driven back and forth in its axial direction by opening and closing drive means, closing the valve hole with the valve element supported thereto as it moves forward and opening the valve hole as it moves backward. Conventionally, as a valve of this type, there is known one which uses a pulse motor as the above-mentioned drive means and in which the rotary force of the pulse motor is converted into linear motion to move the valve shaft forward and backward, thus opening and closing the valve hole (see, for example, JP 2608579). With the valve described above, however, both the opening and closing of the valve element must be effected by driving the pulse motor. Therefore, when, for instance, a need arises to effect emergency valve closure, it is difficult to close the valve instantaneously. Further, when power outage occurs while the valve is open, the valve cannot be closed, which may cause a defect in equipment using a fluid.
|
10799297
| 2,004
|
Respiration monitoring system and method
|
An impedance variation respiration monitor determines the variation in human body impedance between two electrodes coupled to the surface of the body. One of the two electrodes is attached to the thorax below the armpit and the other of the two electrodes is attached to the leg extending from the opposing side of the thorax. The variation in impedance between these two electrodes measured by the monitor is closely correlated to the respiration rate of the subject and is particularly responsive to and indicates combined abdominal and thoracic breathing.
|
BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to respiration monitoring. More particularly, it relates to respiration monitoring using impedance measuring devices connected to electrodes attached to a human body. 2. Description of the Related Art Current respiration monitoring utilizes a technique known as impedance respiration monitoring. This technique measures the impedance between two electrodes (typically right arm and left arm) to monitor airflow. As a subject inhales, air, which is an insulator, enters the lungs and causes the net impedance in the circuit to increase. When the subject exhales, air leaves the lungs and causes the impedance in the circuit to decrease. The current lead measurement options, i.e., leads I and II, focus on measuring thoracic breathing, which is considered a standard method of breathing in most adults. Thoracic breathing involves using the intercostals to elevate the lungs to begin inspiration. Although the chest moves significantly, only a small amount of air is actually passed into the lungs and usually only as far as the middle lobes. Given the current leads I and II placement, which defines a conductive path across the upper portion of the thorax, left arm (LA) and right arm (RA) electrodes are well suited to measuring thoracic breathing. However, there is another more efficient type of breathing known as “abdominal breathing,” which the traditional electrode placement is less effective at monitoring. While thoracic breathing is normal in most conscious adults, children and adult subjects who relax, sleep or are otherwise unconscious, commonly adopt abdominal breathing. Abdominal breathing occurs when the diaphragm becomes the controlling factor in the respiratory cycle. When the diaphragm controls breathing, each breath becomes deeper as more air enters the lower lobes of the lung where there is a higher concentration of blood vessels, allowing for more efficient gas exchange. Abdominal breathing is the mode of respiration that humans use at birth because it is the most efficient. As humans grow, the conscious breathing pattern elevates to the chest to the point where we tend to forget abdominal breathing. Abdominal breathing is typical in unconscious adults. When an adult relaxes or falls asleep they will unconsciously revert back to the more efficient abdominal breathing. As the subject transitions to abdominal breathing, the respiration signal provided by the arm electrodes is attenuated, since thoracic expansion is progressively reduced, even though the respiration is becoming more efficient. The attenuated signal could mistakenly suggest to an observer that respiration is getting worse, not better. Thus, electrodes used to monitor respiration in their traditional ECG positions (i.e. the LA and RA electrodes) provide a respiration signal that is subject to motion artifact and is attenuated whenever the subject falls asleep. Further, the traditional placement does not indicate abdominal breathing, the dominant mode of respiration for children and unconscious adults. What is needed therefore is a method of monitoring subject respiration that minimizes both motion artifact and cardiogenic artifact. What is also needed is a respiration monitoring method that produces a stronger signal. What is also needed is a method of monitoring respiration that would give the clinician a better option for monitoring abdominal respiration. What is also needed is a new respiration monitoring vector that will provide significant noise reduction and improved signal quality as compared to the traditional respiration monitoring vectors, i.e., leads I and II. These improvements would give clinicians more flexibility in respiration monitoring.
|
Title:
Respiration monitoring system and method
Abstract:
An impedance variation respiration monitor determines the variation in human body impedance between two electrodes coupled to the surface of the body. One of the two electrodes is attached to the thorax below the armpit and the other of the two electrodes is attached to the leg extending from the opposing side of the thorax. The variation in impedance between these two electrodes measured by the monitor is closely correlated to the respiration rate of the subject and is particularly responsive to and indicates combined abdominal and thoracic breathing.
Background:
BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to respiration monitoring. More particularly, it relates to respiration monitoring using impedance measuring devices connected to electrodes attached to a human body. 2. Description of the Related Art Current respiration monitoring utilizes a technique known as impedance respiration monitoring. This technique measures the impedance between two electrodes (typically right arm and left arm) to monitor airflow. As a subject inhales, air, which is an insulator, enters the lungs and causes the net impedance in the circuit to increase. When the subject exhales, air leaves the lungs and causes the impedance in the circuit to decrease. The current lead measurement options, i.e., leads I and II, focus on measuring thoracic breathing, which is considered a standard method of breathing in most adults. Thoracic breathing involves using the intercostals to elevate the lungs to begin inspiration. Although the chest moves significantly, only a small amount of air is actually passed into the lungs and usually only as far as the middle lobes. Given the current leads I and II placement, which defines a conductive path across the upper portion of the thorax, left arm (LA) and right arm (RA) electrodes are well suited to measuring thoracic breathing. However, there is another more efficient type of breathing known as “abdominal breathing,” which the traditional electrode placement is less effective at monitoring. While thoracic breathing is normal in most conscious adults, children and adult subjects who relax, sleep or are otherwise unconscious, commonly adopt abdominal breathing. Abdominal breathing occurs when the diaphragm becomes the controlling factor in the respiratory cycle. When the diaphragm controls breathing, each breath becomes deeper as more air enters the lower lobes of the lung where there is a higher concentration of blood vessels, allowing for more efficient gas exchange. Abdominal breathing is the mode of respiration that humans use at birth because it is the most efficient. As humans grow, the conscious breathing pattern elevates to the chest to the point where we tend to forget abdominal breathing. Abdominal breathing is typical in unconscious adults. When an adult relaxes or falls asleep they will unconsciously revert back to the more efficient abdominal breathing. As the subject transitions to abdominal breathing, the respiration signal provided by the arm electrodes is attenuated, since thoracic expansion is progressively reduced, even though the respiration is becoming more efficient. The attenuated signal could mistakenly suggest to an observer that respiration is getting worse, not better. Thus, electrodes used to monitor respiration in their traditional ECG positions (i.e. the LA and RA electrodes) provide a respiration signal that is subject to motion artifact and is attenuated whenever the subject falls asleep. Further, the traditional placement does not indicate abdominal breathing, the dominant mode of respiration for children and unconscious adults. What is needed therefore is a method of monitoring subject respiration that minimizes both motion artifact and cardiogenic artifact. What is also needed is a respiration monitoring method that produces a stronger signal. What is also needed is a method of monitoring respiration that would give the clinician a better option for monitoring abdominal respiration. What is also needed is a new respiration monitoring vector that will provide significant noise reduction and improved signal quality as compared to the traditional respiration monitoring vectors, i.e., leads I and II. These improvements would give clinicians more flexibility in respiration monitoring.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.