Creat membership Creat membership
Sign in

Forgot password?

Confirm
  • Forgot password?
    Sign Up
  • Confirm
    Sign In
home > search

Now showing items 1 - 16 of 10355

  • Beijing Record: A Physical and Political History of Planning Modern Beijingby Wang Jun

    Review by: Sheng Zhong  

    Download Collect
  • Beijing Record: A Physical and Political History of Planning Modern Beijing,by Wang Jun

    Review by: Carolyn Cartier  

    Download Collect
  • VARIABLE-DIAMETER REINFORCING CAGE FOR ANCHOR ROD OR PILE FOUNDATION

    A variable-diameter reinforcing cage for an anchor rod or pile foundation, comprising an axial rod (4), a plurality of vertical bars (2), at least two circular fixators (5) and several groups of ribs (3) which correspond to the circular fixators (5). The circular fixators (5) are all sleeved on the axial rod (4); each circular fixator (5) is arranged in a circular manner and used for movably fixing a group of ribs (3) of which the quantity is the same as that of the plurality of vertical bars (2); one end of the ribs (3) is movably connected to the position of the vertical bars (2) at the same height, and the other end of the ribs (3) is movably connected to the circular fixators (5); annular hoops (6) are arranged on the periphery of the vertical bars (2) to serve as circles of latitude; fixing points are formed on the annular hoops (6) and the vertical bars (2); and the annular hoops (6) are annular spiral spring hoops of an elastic material or flexible steel wires.
    Download Collect
  • COMPOSITIONS AND METHODS FOR INCREASING IRON INTAKE IN A MAMMAL

    Compositions containing iron, buffering agent and denatured protein have been prepared that are capable of increasing serum iron in a subject. For example, spray dried microbeads have been prepared containing iron entrapped within a protein matrix and unbound iron in a buffered composition that provides a gastroprotective effect, preserves iron in the more available Fe2+ form and improves iron bioavailability in humans relative to previously known vehicles for delivering iron to a subject.
    Download Collect
  • METHOD AND APPARATUS FOR ENCODING DATA USING A POLAR CODE

    Embodiment techniques map parity bits to sub-channels based on their row weights. The row weight for a sub-channel may be viewed as the number of "ones" in the corresponding row of the Kronecker matrix or as a power of 2 with the exponent (i.e. the hamming weight) being the number of "ones" in the binary representation of the sub-channel index (further described below). In one embodiment, candidate sub-channels that have certain row weight values are reserved for parity bit (s). Thereafter, K information bits may be mapped to the K most reliable remaining sub-channels, and a number of frozen bits (e.g. N-K) may be mapped to the least reliable remaining sub-channels. Parity bits may then mapped to the candidate sub-channels, and parity bit values are determined based on a function of the information bits.
    Download Collect
  • METHOD AND APPARATUS FOR ENCODING DATA USING A POLAR CODE

    Embodiment techniques map parity bits to sub-channels based on their row weights. The row weight for a sub-channel may be viewed as the number of "ones" in the corresponding row of the Kronecker matrix or as a power of 2 with the exponent (i.e. the hamming weight) being the number of "ones" in the binary representation of the sub-channel index (further described below). In one embodiment, candidate sub-channels that have certain row weight values are reserved for parity bit (s). Thereafter, K information bits may be mapped to the K most reliable remaining sub-channels, and a number of frozen bits (e.g. N-K) may be mapped to the least reliable remaining sub-channels. Parity bits may then mapped to the candidate sub-channels, and parity bit values are determined based on a function of the information bits.
    Download Collect
  • ITEM SHELF, ITEM SHARING SYSTEM COMPRISING SAME AND ITEM SHARING METHODS

    An item shelf, comprising: an item shelf body, and an item warehouse and a control device disposed therein, the control device comprising a control master board, a smart item sensing and identifying unit and a user identity acquisition and identification unit, the control master board being used for realizing the automatic operation of the item shelf, the smart item sensing and identifying unit being used for detecting the information of a shared item in the item warehouse and monitoring the time at which the shared item is taken out and/or the time at which the shared item is put back into the item chamber, the user identity acquisition and identification unit being used for identifying user identity authentication information. Further provided are an item sharing system comprising the item shelf, an item sharing method and an item sharing method for the item sharing system. The item shelf above provides an item sharing platform which is open to both supply and demand parties, online by way of the Internet and offline, not only ensuring an online sharing mode for pairing supply and demand parties, but also providing an offline sharing mode for an intuitional experience, item tryout and usage, and online and offline communication, thereby satisfying potential needs to the greatest extent, and providing users with a new item sharing experience.
    Download Collect
  • METHOD AND APPARATUS OF CACHING SERVICE DATA IN LTE NETWORKS

    Various examples provide a method of caching service data in LTE networks. A base station parses a data request received from a UE to obtain an identification of requested contents, judges whether the requested contents are cached in the base station, sends the contents to the UE in response to a determination that the requested contents are cached in the base station. In response to a determination that the requested contents are not cached in the base station, the base station judges whether the requested contents are cached in an adjacent base station, and obtains the contents from the adjacent base station and returns the contents to the UE in response to a determination that the requested contents are cached in the adjacent base station. In response to a determination that the requested contents are not cached in adjacent base stations, the base station forwards the data request to an SGW, and returns contents obtained from the SGW to the UE. Various examples also provide another method and apparatus of caching service data in an LTE network. According to the examples, data requests of UEs are not necessarily always forwarded to a business server. Instead, requested data is first sought from a cache (in a base station and/or an SGW) which is the closest to to the user to reduce transmission load of the LTE network, reduce the time delay in obtaining service data by users, and improve the quality of experience of users.
    Download Collect
  • GENOME-SCALE T CELL ACTIVITY ARRAY AND METHODS OF USE THEREOF

    The present invention provides Genome-Scale T Cell Activity Arrays (GS-TCAA), as well as methods of making these arrays and methods of using them to identify immune modulators.
    Download Collect
  • AG-CUO LOW-VOLTAGE CONTACT MATERIAL AND METHOD FOR FABRICATION THEREOF

    Provided are an Ag-CuO low-voltage contact material and a method for fabrication thereof, comprising a CuO frame having a porous structure, and a metallic silver material filling the CuO frame; the volume of said CuO frame occupies 40%-80% of the total volume of the low-voltage contact material, and the remainder is said metallic silver material. In the Ag-CuO low-voltage contact material provided above, a ceramic-phase CuO frame is fabricated by means of high-temperature sintering, and metallic silver is added to the CuO frame structure to form a composite contact material; between the CuO and the liquid silver are good wetting properties; the properties of the high strength of the frame enhanced material and the high electrical and thermal conductivity of the metallic material are combined together to obtain a frame strengthened composite material having excellent overall properties.
    Download Collect
  • SESSION DESCRIPTION INFORMATION FOR OVER-THE-AIR BROADCAST MEDIA DATA

    An over-the-air (OTA) broadcast middleware unit is configured to receive aggregated session description data for a plurality of sessions, wherein each of the sessions transports media data related to common media content, and wherein each of the sessions is transmitted as part of an OTA broadcast, and extract at least some of the media data from the OTA broadcast based on the aggregated session description data. The OTA broadcast middleware unit may further deliver the extracted media data to a streaming client, such as a Dynamic Adaptive Streaming over HTTP (DASH) client.
    Download Collect
  • ANOMALY DETECTION METHOD FOR INTERNAL VIRTUAL MACHINE OF CLOUD SYSTEM

    An anomaly detection method for an internal virtual machine of a cloud system. State information about a normal virtual machine in a cloud system is collected to train a Hidden Semi-Markov Model (HsMM), and a corresponding algorithm is designed for detecting and computing probabilities and mahalanobis distances of resource dynamic change behaviour when various virtual machines in the cloud system are on line. If the mahalanobis distance in an on-line detection result of a certain virtual machine is greater than a pre-set threshold value, this indicates that an activity of the virtual machine is abnormal, so an anomaly detection and processing system in the cloud system is started for performing anomaly detection and processing on the virtual machine. If it is detected that an anomaly rate of a certain virtual machine is less than the maximum threshold value of the anomaly detection and processing, after an anomaly is eliminated, a warning prompt is sent to a cloud tenant of the virtual machine; and otherwise, an alarm is given to the cloud tenant of the virtual machine, and the virtual machine is shut down. According to the method, abnormal behaviour of an internal virtual machine of a cloud system can be detected in real time, and fewer system resources are occupied, thereby fully ensuring the high availability and security of an internal virtual machine of a cloud system.
    Download Collect
  • IMMOBILE REACTION DEVICE AND METHOD FOR REACTING USING IMMOBILE TECHNIQUE

    Provided in the present invention are an immobile reaction device and a method for reacting using an immobile technique.
    Download Collect
  • ENERGY-STORAGE LITHIUM BATTERY PACK, AND CAPACITY EXPANSION METHOD FOR SAME

    An energy-storage lithium battery pack, comprising a casing, multiple batteries connected in series within the casing, a battery management module, a current-limiting module, a charging switch, a discharging switch, an air switch, a start-up switch, a communication connection port, and a power connector. The charging switch and discharging switch achieve control of charging and discharging of the batteries. The start-up switch and communication connection port are connected to the battery management module. The power connector connects positive and negative electrodes of the batteries. The current limiting module achieves a balance of a current of the lithium battery pack. The air switch provides secondary over-current protection to the lithium battery pack. The energy-storage lithium battery pack of the present invention can be used independently, and multiple battery packs can be connected in series to expand the capacity. In a series connection configuration, a host is automatically configured to communicate and interact with an upper level controller, and voltage consistency across the multiple battery packs is achieved by means of controlling the charging and discharging switches to be on or off, thus preventing a loop current, and preventing the battery packs from being damaged by an over-current condition.
    Download Collect
  • RESOURCE RELEASE METHOD, SYSTEM, AND DEVICE, AND COMPUTER STORAGE MEDIUM

    The present invention relates to a resource release method, system, and device, and computer storage medium in a service function chain. The method comprises: a classifier constructs, upon detection of a flow being in a termination state, a flow release message packet carrying a flow release identifier and link information of the flow; the classifier sends, according to the link information, to a corresponding service function forwarder the flow release message packet; the service function forwarder forwards, according to the link information, to a corresponding function node the flow release message packet; and upon receiving the flow release message packet, the function node releases, according to the flow release identifier carried in the flow release message packet, a corresponding resource.
    Download Collect
  • SESSION SYNCHRONIZATION METHOD BASED ON INSTANT COPY BETWEEN CLUSTER NODES

    Disclosed is a session synchronization method based on instant copy between cluster nodes. Session identification information is stored in a client, thereby avoiding storing complete session information in the client, so as to prevent the potential security hazard of exposing user identity information; moreover, during a process of sending a request to a server by the client, only the session identification information, rather than the complete session information, is carried so that the transmitted data volume is greatly reduced, thereby improving the efficiency of accessing the server by the client. Session information synchronization between various cluster nodes does not need to acquire session information from a database, thereby avoiding the performance bottleneck caused by frequently using the database, and also does not need to use a dedicated session cache server, thereby reducing the development and deployment costs and having a good application prospect.
    Download Collect
1 2 3 4 5 6 7 8 9 10

Contact

If you have any feedback, Please follow the official account to submit feedback.

Turn on your phone and scan

Submit Feedback