Abstract:
Short messages are formatted as control messages in a communication network but do not control the communication network. Techniques for dynamically distributing short messages include remotely reprogramming a control node that processes control messages for the communications network to change processing of short messages without further involvement by a vendor of the control node. In some embodiments, this involves sending provider data that includes a special parameter set, a special value set, and a special action set. The special parameter set includes at least one parameter among multiple parameters in multiple network protocol headers for a data packet that includes a short message. The special value set includes at least one value for each parameter in the special parameter set. The special action set includes at least one action of multiple actions for forwarding a short message.
Abstract:
A controlled stent-graft deployment delivery system (10 50 or 900) includes a stent-graft (30 or 63), a retractable primary sheath (40) containing the stent-graft in a first constrained diameter configuration, an outer tube (18) within the retractable primary sheath and within the stent-graft, and an inner tube (20) within the outer tube, where the inner tube and the outer tube both axially move relative to the retractable primary sheath and to each other. The system further includes a cap (15) coupled to a distal end of the inner tube and configured to retain at least a portion of a proximal area of the stent-graft in a radially compressed configuration. A distal assembly (100) provides controlled relative axial movement between the outer tube and the inner tube enabling the release of the proximal end (65, 67, 68, and 69) of the stent-graft from the cap and from the radially compressed configuration.
Abstract:
Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card.The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
Abstract:
The present invention provides for a breathing device comprising a reservoir bag, oxygen source, scrubber, and activation device. The oxygen source and an exit from the scrubber may be fluidly connected to the reservoir bag. The reservoir bag may be attached to a mouthpiece to provide inhalation air. Expired air may be exhaled through the mouthpiece and directed to an inlet for the scrubber. As a user breaths normally, expired air is scrubbed of undesired components, such as excess CO2. The scrubbed expired air is then mixed with generated oxygen, and delivered back to the user for inhalation. Additionally, the oxygen source and the scrubber may be replaced and/or replenished without interrupting or compromising a breathing cycle.
Abstract:
A beverage making system that includes a plurality of packs containing different beverage making ingredients and having different infrared reflectance spectra in a region thereof. A beverage making apparatus includes a station for receiving at least one of the packs; a source of liquid adapted to supply liquid into the at least one pack while the pack is located at the station; a system controller for controlling the supply of liquid from the source according to a beverage making program; and an infrared pack recognition system comprising an infrared light source for illuminating the region of the pack while it is located at the station. The apparatus also includes a detector for measuring an intensity of infrared light reflected from the region and for supplying an output signal to the system controller, whereby the beverage-making program is selected by the system controller in response to the output of the infrared pack recognition system.
Abstract:
Short messages are formatted as control messages in a communication network but do not control the communication network. Techniques for dynamically distributing short messages include remotely reprogramming a control node that processes control messages for the communications network to change processing of short messages without further involvement by a vendor of the control node. In some embodiments, this involves sending provider data that includes a special parameter set, a special value set, and a special action set. The special parameter set includes at least one parameter among multiple parameters in multiple network protocol headers for a data packet that includes a short message. The special value set includes at least one value for each parameter in the special parameter set. The special action set includes at least one action of multiple actions for forwarding a short message.
Abstract:
A system for providing a user interface includes an XML-based scene file that includes an element tag that specifies an element of the user interface. The system also includes an XML-based animation tag and an XML-based state tag. The animation tag includes an animator element for applying an animation to an attribute of the element. The state tag specifies a state of the element and references the animation tag such that the animation is applied to the attribute in response to the element entering the state. In addition, the system includes a parser to parse the scene file, the animation tag, and the state tag and to generate an object model that includes an element object corresponding to the element of the user interface. The system further includes a layout engine to determine a layout of the user interface and a rendering engine to render the user interface.
Abstract:
An engine is disclosed including at least one piston which is positioned within a toroidal piston chamber. A method of operating an engine is disclosed wherein a piston is advanced in a toroidal piston chamber past a first valve and the first valve is closed to form a first ignition chamber area located within the piston chamber between the first valve and the rear side of the piston. A second valve is closed ahead of the piston to form a first exhaust removal chamber area located within the piston chamber between the second valve and the front side of the piston, the exhaust removal chamber including exhaust gases from a preceding ignition which occurred in the first ignition chamber area. A fuel mixture is introduced into the first ignition chamber area and ignited thereby advancing the piston further along the toroidal piston chamber.
Abstract:
An electronic lock assembly is actuated by a key including a transponder. The key is received within a coil assembly of the lock assembly. The key engages a switch that powers the coil assembly. The coil assembly generates a magnetic field that energizes the transponder. The transponder transmits a signal received by a controller. The controller actuates the lock assembly responsive to the received signal to move a locking member to an unlocked position. The key may then move to unlatch a latch associated with the lock assembly. As the key provides the energy required for unlatching the latch further energization of the motor is not required. The lock assembly provides for the actuation and energization of the transponder with small amounts electrical energy such that the lock assembly may be powered by commercially available batteries for a practical operational life.