A variable-diameter reinforcing cage for an anchor rod or pile foundation, comprising an axial rod (4), a plurality of vertical bars (2), at least two circular fixators (5) and several groups of ribs (3) which correspond to the circular fixators (5). The circular fixators (5) are all sleeved on the axial rod (4); each circular fixator (5) is arranged in a circular manner and used for movably fixing a group of ribs (3) of which the quantity is the same as that of the plurality of vertical bars (2); one end of the ribs (3) is movably connected to the position of the vertical bars (2) at the same height, and the other end of the ribs (3) is movably connected to the circular fixators (5); annular hoops (6) are arranged on the periphery of the vertical bars (2) to serve as circles of latitude; fixing points are formed on the annular hoops (6) and the vertical bars (2); and the annular hoops (6) are annular spiral spring hoops of an elastic material or flexible steel wires.
Compositions containing iron, buffering agent and denatured protein have been prepared that are capable of increasing serum iron in a subject. For example, spray dried microbeads have been prepared containing iron entrapped within a protein matrix and unbound iron in a buffered composition that provides a gastroprotective effect, preserves iron in the more available Fe2+ form and improves iron bioavailability in humans relative to previously known vehicles for delivering iron to a subject.
Embodiment techniques map parity bits to sub-channels based on their row weights. The row weight for a sub-channel may be viewed as the number of "ones" in the corresponding row of the Kronecker matrix or as a power of 2 with the exponent (i.e. the hamming weight) being the number of "ones" in the binary representation of the sub-channel index (further described below). In one embodiment, candidate sub-channels that have certain row weight values are reserved for parity bit (s). Thereafter, K information bits may be mapped to the K most reliable remaining sub-channels, and a number of frozen bits (e.g. N-K) may be mapped to the least reliable remaining sub-channels. Parity bits may then mapped to the candidate sub-channels, and parity bit values are determined based on a function of the information bits.
Embodiment techniques map parity bits to sub-channels based on their row weights. The row weight for a sub-channel may be viewed as the number of "ones" in the corresponding row of the Kronecker matrix or as a power of 2 with the exponent (i.e. the hamming weight) being the number of "ones" in the binary representation of the sub-channel index (further described below). In one embodiment, candidate sub-channels that have certain row weight values are reserved for parity bit (s). Thereafter, K information bits may be mapped to the K most reliable remaining sub-channels, and a number of frozen bits (e.g. N-K) may be mapped to the least reliable remaining sub-channels. Parity bits may then mapped to the candidate sub-channels, and parity bit values are determined based on a function of the information bits.
In this application, the method and apparatus for transmission and reception with polar codes to support up to 16 permutations or transformation mappings, i. e., 16 versions of copies able to be soft-combined for PBCH or any other data channel or control channel are suggested if the mother code length is 256 or 512 or 1024. With the new design, up to 16 different versions can be used to soft combined to improve the performance. Some sequences are provided as examples to support 16 different permutation patterns. The inverse of these sequences also have the feature to support 16 different permutation patterns.
An item shelf, comprising: an item shelf body, and an item warehouse and a control device disposed therein, the control device comprising a control master board, a smart item sensing and identifying unit and a user identity acquisition and identification unit, the control master board being used for realizing the automatic operation of the item shelf, the smart item sensing and identifying unit being used for detecting the information of a shared item in the item warehouse and monitoring the time at which the shared item is taken out and/or the time at which the shared item is put back into the item chamber, the user identity acquisition and identification unit being used for identifying user identity authentication information. Further provided are an item sharing system comprising the item shelf, an item sharing method and an item sharing method for the item sharing system. The item shelf above provides an item sharing platform which is open to both supply and demand parties, online by way of the Internet and offline, not only ensuring an online sharing mode for pairing supply and demand parties, but also providing an offline sharing mode for an intuitional experience, item tryout and usage, and online and offline communication, thereby satisfying potential needs to the greatest extent, and providing users with a new item sharing experience.
Various examples provide a method of caching service data in LTE networks. A base station parses a data request received from a UE to obtain an identification of requested contents, judges whether the requested contents are cached in the base station, sends the contents to the UE in response to a determination that the requested contents are cached in the base station. In response to a determination that the requested contents are not cached in the base station, the base station judges whether the requested contents are cached in an adjacent base station, and obtains the contents from the adjacent base station and returns the contents to the UE in response to a determination that the requested contents are cached in the adjacent base station. In response to a determination that the requested contents are not cached in adjacent base stations, the base station forwards the data request to an SGW, and returns contents obtained from the SGW to the UE. Various examples also provide another method and apparatus of caching service data in an LTE network. According to the examples, data requests of UEs are not necessarily always forwarded to a business server. Instead, requested data is first sought from a cache (in a base station and/or an SGW) which is the closest to to the user to reduce transmission load of the LTE network, reduce the time delay in obtaining service data by users, and improve the quality of experience of users.
The present invention provides Genome-Scale T Cell Activity Arrays (GS-TCAA), as well as methods of making these arrays and methods of using them to identify immune modulators.
Provided are an Ag-CuO low-voltage contact material and a method for fabrication thereof, comprising a CuO frame having a porous structure, and a metallic silver material filling the CuO frame; the volume of said CuO frame occupies 40%-80% of the total volume of the low-voltage contact material, and the remainder is said metallic silver material. In the Ag-CuO low-voltage contact material provided above, a ceramic-phase CuO frame is fabricated by means of high-temperature sintering, and metallic silver is added to the CuO frame structure to form a composite contact material; between the CuO and the liquid silver are good wetting properties; the properties of the high strength of the frame enhanced material and the high electrical and thermal conductivity of the metallic material are combined together to obtain a frame strengthened composite material having excellent overall properties.
An over-the-air (OTA) broadcast middleware unit is configured to receive aggregated session description data for a plurality of sessions, wherein each of the sessions transports media data related to common media content, and wherein each of the sessions is transmitted as part of an OTA broadcast, and extract at least some of the media data from the OTA broadcast based on the aggregated session description data. The OTA broadcast middleware unit may further deliver the extracted media data to a streaming client, such as a Dynamic Adaptive Streaming over HTTP (DASH) client.
An anomaly detection method for an internal virtual machine of a cloud system. State information about a normal virtual machine in a cloud system is collected to train a Hidden Semi-Markov Model (HsMM), and a corresponding algorithm is designed for detecting and computing probabilities and mahalanobis distances of resource dynamic change behaviour when various virtual machines in the cloud system are on line. If the mahalanobis distance in an on-line detection result of a certain virtual machine is greater than a pre-set threshold value, this indicates that an activity of the virtual machine is abnormal, so an anomaly detection and processing system in the cloud system is started for performing anomaly detection and processing on the virtual machine. If it is detected that an anomaly rate of a certain virtual machine is less than the maximum threshold value of the anomaly detection and processing, after an anomaly is eliminated, a warning prompt is sent to a cloud tenant of the virtual machine; and otherwise, an alarm is given to the cloud tenant of the virtual machine, and the virtual machine is shut down. According to the method, abnormal behaviour of an internal virtual machine of a cloud system can be detected in real time, and fewer system resources are occupied, thereby fully ensuring the high availability and security of an internal virtual machine of a cloud system.
An energy-storage lithium battery pack, comprising a casing, multiple batteries connected in series within the casing, a battery management module, a current-limiting module, a charging switch, a discharging switch, an air switch, a start-up switch, a communication connection port, and a power connector. The charging switch and discharging switch achieve control of charging and discharging of the batteries. The start-up switch and communication connection port are connected to the battery management module. The power connector connects positive and negative electrodes of the batteries. The current limiting module achieves a balance of a current of the lithium battery pack. The air switch provides secondary over-current protection to the lithium battery pack. The energy-storage lithium battery pack of the present invention can be used independently, and multiple battery packs can be connected in series to expand the capacity. In a series connection configuration, a host is automatically configured to communicate and interact with an upper level controller, and voltage consistency across the multiple battery packs is achieved by means of controlling the charging and discharging switches to be on or off, thus preventing a loop current, and preventing the battery packs from being damaged by an over-current condition.
The present invention relates to a resource release method, system, and device, and computer storage medium in a service function chain. The method comprises: a classifier constructs, upon detection of a flow being in a termination state, a flow release message packet carrying a flow release identifier and link information of the flow; the classifier sends, according to the link information, to a corresponding service function forwarder the flow release message packet; the service function forwarder forwards, according to the link information, to a corresponding function node the flow release message packet; and upon receiving the flow release message packet, the function node releases, according to the flow release identifier carried in the flow release message packet, a corresponding resource.