Patent application number | Description | Published |
20110260700 | POWER FACTOR CORRECTION CONVERTER AND CONTROL METHOD THEREOF - A power factor correction converter and a control method thereof are provided includes an interleaving control tube set, an interface to an alternating current power supply, a first inductor, a second inductor, a third inductor, a capacitor, a first bridge arm and a second bridge arm. Abridge arm includes a first switch tube and a second switch tube connected in series; The first bridge arm, the second bridge arm, and the capacitor are connected to each other in parallel; the alternating current power supply and the first inductor are connected in series, and the second inductor and the third inductor are connected in parallel, and then connected to the first inductor in series; the second inductor is connected to the first bridge arm, and the second inductor is connected to the second bridge arm; and the alternating current power supply and the first inductor are connected in series. | 10-27-2011 |
20130051101 | HOLD-UP TIME CIRCUIT, HOLD-UP TIME METHOD, AND POWER SUPPLY SYSTEM - A hold-up time circuit is provided, including: an energy storage capacitor, a step-down circuit and a step-up circuit. A first and a second input end of the step-down circuit are connected to two electrodes of an input power supply. A first output end and a second output end of the step-down circuit are connected to two electrodes of the energy storage capacitor. When the input power supply is normal, the step-down circuit is configured to perform reduction processing on an input voltage of the input power supply, and the energy storage capacitor is charged by an output of the step-down circuit. A first and a second input end of the step-up circuit are connected to the two electrodes of the energy storage capacitor. When the input power supply is power-off, the step-up circuit is configured to perform boost processing on an energy storage voltage of the energy storage capacitor. | 02-28-2013 |
20130345095 | METHOD AND DEVICE FOR ASSEMBLING GENOME SEQUENCE - A method and an apparatus for genome assembly are provided. The method comprises: filtering a short-fragment-sequence output from end sequencing of an large insert-size library to remove unqualified sequence; aligning the filtered short-fragment-sequence onto a reference genome sequence, wherein, the filtered short-fragment-sequences comprise paired short-fragment-sequences; sorting the paired short-fragment-sequence after alignment into soap reads sequence, single reads sequence and unmap reads sequence based on the aligning result, and counting the number of each sort of sequence; calculating a distance between the paired soap reads on a fragment of the reference genome sequence, wherein a pair of the paired soap reads can be aligned onto a same fragment of the reference genome sequence; and counting a distance distribution of each pair of soap reads on the reference genome sequence; and assembling the genome sequence by using the paired single reads upon the distance distribution meeting a requirement of a threshold, wherein a pair of the paired single reads can be aligned onto two different fragments of the reference genome sequence. | 12-26-2013 |
20140002033 | Bridgeless Power Factor Correction Circuit and Control Method Thereof | 01-02-2014 |
20150109838 | Synchronous Rectifier Control Circuit and Synchronous - A synchronous rectifier control circuit an includes a current transformer (CT), a bridge rectifier, and a comparator, where the CT is connected in series to a secondary side, performs sampling on a loop current of the secondary side to obtain a current detection signal, and outputs the obtained current detection signal to the bridge rectifier; the bridge rectifier acquires a secondary-side sampling current according to the current detection signal, and outputs the secondary-side sampling current to the comparator so that the comparator generates a voltage difference; and an output signal of the comparator turns over so as to control on and off of a synchronous rectifier transistor. In this way, high-speed and high-precision control over a synchronous rectifier transistor can be implemented. The control is simple and is low in cost. | 04-23-2015 |
20150180350 | RESONANT BIDIRECTIONAL CONVERTER, UNINTERRUPTIBLE POWER SUPPLY APPARATUS, AND CONTROL METHOD - The present invention provides a resonant bidirectional converter, an uninterruptible power supply apparatus, and a control method. The resonant bidirectional converter includes: a filter capacitor, three primary side bridge arms, a resonant cavity, three transformers, and three secondary side bridge arms, where two ends of each of the primary side bridge arms are separately connected to two ends of a bus capacitor, each of the primary side bridge arms includes two semiconductor switch that are serially connected in a same direction, and any connection point located between the two semiconductor switch of the primary side bridge arm that are serially connected in the same direction is a first connection point. | 06-25-2015 |
20160049882 | RESONANT CONVERTER AND SYNCHRONOUS RECTIFICATION CONVERTER CIRCUIT THEREOF - The present invention provides a synchronous rectification converter circuit, including three transformer secondary-windings, three current transformer, a synchronous rectification switching unit, a diode rectification unit, and a control unit. Each of three current transformers includes a primary-winding and secondary-winding. The three transformer secondary-windings and the three current transformer primary-windings are alternately connected in series to form a first triangular structure. Three vertices of the first triangular structure are connected to the synchronous rectification switching unit. The three current transformer secondary-windings are connected in series to form a second triangular structure. Three vertices of the second triangular structure are connected to the diode rectification unit. The diode rectification unit is connected to the control unit and the synchronous rectification switching unit is connected to the control unit. The present invention achieves a purpose of precisely controlling the on-off state of the synchronous rectification circuit. | 02-18-2016 |
Patent application number | Description | Published |
20150115064 | SHOWER SYSTEM COMBINING A TOP SPRAYER AND A HAND SHOWER - A shower system includes a top sprayer with at least two water types and a hand shower. The top sprayer is disposed with an inlet waterway to connect to the water source and first diversion waterways corresponding to the water types one by one; wherein the top sprayer is further disposed with a second diversion waterway, the hand shower is connected to the second diversion waterway by an external flexible pipe; the top sprayer is disposed with a switch mechanism, the switch mechanism is cooperated to the inlet waterway, the first diversion waterways and the second diversion waterway to switch the waterways, thus switching any diversion waterway to connect to the inlet waterway. | 04-30-2015 |
20150122913 | OUTLET MECHANISM WITH ADDITIONAL FUNCTION - The present invention is provided with an outlet mechanism with additional function, which comprises a fixation base, a hand shower and an additional module. The fixation base is assembled to a shower arm with an inlet, an outlet and a waterway connecting the inlet and the outlet, the inlet is connected to the shower arm. The hand shower is connected to the outlet of the fixation base by a flexible pipe and is detachably fixedly connected to the fixation base. The additional module detachably attached to the fixation base. The present invention has advantages: with the additional function, for example it can play music or give off perfume, the structure is simple with fewer components, the configuration is reasonable, and the structure is compact. | 05-07-2015 |
Patent application number | Description | Published |
20080201480 | METHOD FOR ESTABLISHING PEER-TO-PEER CONNECTION, METHOD, APPARATUS AND SYSTEM FOR TRAVERSING NAT TO REALIZE NETWORK COMMUNICATION - The employment relates to a realization method for establishing peer-to-peer communication connection, a method, an apparatus and a system for realizing network communication by traversing NAT. The employment mainly comprises following steps. When the user terminal may not directly communicate with the peer user terminal by the manner of peer-to-peer communication for needing to traverse through the NAT (network address translator) entity, the type information of the NAT entity needed to be traversed is determined. Then, the communication connection with the peer user terminal is established according to the determined type information of the NAT entity and by using the predefined manner of peer-to peer communication and the communications between the user terminals are carried out. The employment realizes that the manner of peer-to-peer communication is adopted as much as possible during the process of traversing the NAT to carry out the communication so as to reduce the occupation of server source and effectively save the costs of network operation. The employment also tries to use the corresponding re-issue mechanism during the procedure of establishing the peer-to-peer communication in order to resolve various connection establishment problems when the factors which may affect the connection establishment appear. | 08-21-2008 |
20150222630 | THIRD APPLICATION LOGIN METHOD AND CORRESPONDING APPARATUS AND TERMINAL - Described relates to mobile Internet field, and described are a third application login method, a third application login apparatus and a third application login terminal. The third application login method includes: obtaining biologic feature information of a user; authenticating the biologic feature information of the user, when the biologic feature information passes authentication, reminding the user the third application is allowed to use; detecting a trigger instruction generated according to a user's response to a reminder and input by any third application; responding to the trigger instruction, sending an information obtaining request to a cloud server; the information obtaining request being configured to obtain a personal account of the third application, and receive the personal account of the third application sent from the cloud server; and logging in the third application with the personal account of the third application. | 08-06-2015 |
Patent application number | Description | Published |
20090038750 | HIGH-TEMPERATURE SPIN-ON TEMPORARY BONDING COMPOSITIONS - New compositions and methods of using those compositions as bonding compositions are provided. The compositions are preferably thermoplastic and comprise imides, amideimides, and/or amideimide-siloxanes (either in polymeric or oligomeric form) dispersed or dissolved in a solvent system, and can be used to bond an active wafer to a carrier wafer or substrate to assist in protecting the active wafer and its active sites during subsequent processing and handling. The compositions form bonding layers that are chemically and thermally resistant, but that can also be softened to allow the wafers to slide apart at the appropriate stage in the fabrication process. | 02-12-2009 |
20100112305 | CYCLIC OLEFIN COMPOSITIONS FOR TEMPORARY WAFER BONDING - New compositions and methods of using those compositions as bonding compositions are provided. The compositions comprise a cycloolefin copolymer dispersed or dissolved in a solvent system, and can be used to bond an active wafer to a carrier wafer or substrate to assist in protecting the active wafer and its active sites during subsequent processing and handling. The compositions form bonding layers that are chemically and thermally resistant, but that can also be softened or dissolved to allow the wafers to slide or be pulled apart at the appropriate stage in the fabrication process. | 05-06-2010 |
20110065257 | HIGH-TEMPERATURE SPIN-ON TEMPORARY BONDING COMPOSITIONS - New compositions and methods of using those compositions as bonding compositions are provided. The compositions are preferably thermoplastic and comprise imides, amideimides, and/or amideimide-siloxanes (either in polymeric or oligomeric form) dispersed or dissolved in a solvent system, and can be used to bond an active wafer to a carrier wafer or substrate to assist in protecting the active wafer and its active sites during subsequent processing and handling. The compositions form bonding layers that are chemically and thermally resistant, but that can also be softened to allow the wafers to slide apart at the appropriate stage in the fabrication process. | 03-17-2011 |
20110086955 | CYCLIC OLEFIN COMPOSITIONS FOR TEMPORARY WAFER BONDING - New compositions and methods of using those compositions as bonding compositions are provided. The compositions comprise a cycloolefin copolymer dispersed or dissolved in a solvent system, and can be used to bond an active wafer to a carrier wafer or substrate to assist in protecting the active wafer and its active sites during subsequent processing and handling. The compositions form bonding layers that are chemically and thermally resistant, but that can also be softened or dissolved to allow the wafers to slide or be pulled apart at the appropriate stage in the fabrication process. | 04-14-2011 |
20110171478 | ACID-ETCH RESISTANT, PROTECTIVE COATINGS - New compositions and methods of using those compositions as protective layers during the production of semiconductor and MEMS devices are provided. The compositions comprise a cycloolefin copolymer dispersed or dissolved in a solvent system, and can be used to form layers that protect a substrate during acid etching and other processing and handling. The protective layer can be photosensitive or non-photosensitive, and can be used with or without a primer layer beneath the protective layer. Preferred primer layers comprise a basic polymer in a solvent system. | 07-14-2011 |
20120291938 | CYCLIC OLEFIN COMPOSITIONS FOR TEMPORARY WAFER BONDING - New compositions and methods of using those compositions as bonding compositions are provided. The compositions comprise a cycloolefin copolymer dispersed or dissolved in a solvent system, and can be used to bond an active wafer to a carrier wafer or substrate to assist in protecting the active wafer and its active sites during subsequent processing and handling. The compositions form bonding layers that are chemically and thermally resistant, but that can also be softened or dissolved to allow the wafers to slide or be pulled apart at the appropriate stage in the fabrication process. | 11-22-2012 |
20120308835 | FLUORINATED POLYIMIDES WITH FLUORENE CARDO STRUCTURE AS OPTICAL MATERIALS THAT HAVE LOW ABSOLUTE THERMO-OPTIC COEFFICIENTS - The present invention provides new polyimide materials suitable for use in optically transparent fiber composites, ribbon composites, and optical communications applications. The polyimide compounds include monomeric repeat units comprising a fluorinated moiety and a fluorene cardo structure. The polyimides exhibit good optical transparency and have a low absolute thermo-optic coefficient (|dn/dT|). | 12-06-2012 |
Patent application number | Description | Published |
20150089028 | Method, system and client for uploading image, network server and computer storage medium - The present disclosure relates to the technical field of wireless network communications, and provides a method, system and client for uploading an image, a network server and a computer storage medium. The method includes: a client determines an image to be uploaded, generates a unique image identifier corresponding to the image to be uploaded, and transmits an image detection request to a network server; the network server detects whether there is an image having the same image identifier in the network server according to the image identifier included in the image detection request, and returns a detection result to the client; when the detection result is that there is not an image having the same image identifier in the network server, the client uploads the image to be uploaded in the form of multi-part uploading to the network server; and after the image to be uploaded is uploaded successfully, the network server records the image identifier, and returns an upload success response to the client. The present disclosure avoids a repeated uploading of a same image, so that the upload rate is improved, a great deal of network traffic bandwidth is saved, and user experiences are improved. | 03-26-2015 |
20160050044 | Device Element, Node Device, and Method and System for Adjusting Tunnel Bandwidth - Provided are a device unit, a node device, and a method and a system for automatically adjusting a tunnel bandwidth. The device unit includes: a client side element, configured to dynamically adjust The quantity of the first timeslots according to a bandwidth of a received data service before the received data service is mapped to an Optical Channel Data Unit (ODU) tunnel; a line side element, configured to configure, according to the quantity of the first timeslots adjusted by the client side element, The quantity of the second timeslots matched with the first timeslots; a tunnel managing element, configured to adjust, according to the quantity of the first timeslots and the quantity of the second timeslots, the quantity of unblocked ODU tunnels between the client side element and the line side element, wherein unblocked ODU tunnels after the adjustment carry the data service. When the bandwidth of the received data service increases or decreases, the device unit of the present disclosure flexibly controls usage of an ODU0 timeslot in an ODU of each stage, and does not need to use a complicated ODUflex frame format, thereby meeting the requirement of automatically adjusting the bandwidth without using ODUflex. | 02-18-2016 |
Patent application number | Description | Published |
20150368733 | Method for repairing break of universal connecting rod of universal coupling - A method for repairing break of a universal connecting rod of a universal coupling includes steps of: cleaning and detecting cracks, providing primary anneal, depositing alloys, providing secondary anneal, manually milling and controlling a quality; wherein depositing the alloys includes forming gradient in an order of a bonding layer, a transition layer, a working layer and a processing layer; wherein the bonding layer: S and P in the depositing area are diluted with an FGM-KM1 | 12-24-2015 |
20160031048 | Method for remanufacturing ultra-large copper nut - A method for remanufacturing an ultra-large copper nut includes steps of: step (1) coarsening treatment; step (2) purifying treatment; step (3) detecting a material of the ultra-large copper nut; step (4) sleeving a thermal insulation device; step (5) preheating the ultra-large copper nut; step (6) melting-deposition shaping; step (7) post-processing; and step (8) detecting. The method of the present invention simultaneously utilizes water, electricity, gas, fire and machine and performs melting-deposition on materials by simultaneously supplying water, electricity, gas, fire and machine according to the designed requirements. The method of the present invention solves problems of large thickness abrasion and remediation of fracture components. The method of the present invention is capable of preventing the ultra-large copper nut from deformation and collapse and is a feasible remanufacturing for decreasing the huge economic loss caused by damages of expensive ultra-large of nonferrous metals. | 02-04-2016 |
Patent application number | Description | Published |
20130131423 | Methods to detect and treat diseases - The current invention discloses methods to treat disease caused by virus infection, bacterial infection, parasites infection, autoimmune disease, disease caused by production of unwanted antibodies, sepsis as well as methods to treat cancer and methods for virus infection detection using blood purification method. The current invention provides a method to treat pathogen infection by inactivating the pathogens in the blood. During the treatment, blood is withdrawn from a patient and is separated into its plasma and cellular components. The plasma portion is treated with physical means such as UV radiation to inactivate the pathogens inside and then is returned to the patient. The current invention also provide a method to treat cancer especially to prevent tumor metastasis and tumor recurrence by removing and/or inactivating (e.g. killing) the circulating tumor cells (CTC) in the blood after removing the tumor or treating the tumor with therapeutical means. | 05-23-2013 |
20150283318 | Methods to detect and treat diseases - The current invention discloses methods to treat disease caused by virus infection, bacterial infection, parasites infection, autoimmune disease, disease caused by production of unwanted antibodies, sepsis as well as methods to treat cancer and methods for virus infection detection using blood purification method. The current invention provides a method to treat pathogen infection by inactivating the pathogens in the blood. During the treatment, blood is withdrawn from a patient and is separated into its plasma and cellular components. The plasma portion is treated with physical means such as UV radiation to inactivate the pathogens inside and then is returned to the patient. The current invention also provide a method to treat cancer especially to prevent tumor metastasis and tumor recurrence by removing and/or inactivating (e.g. killing) the circulating tumor cells (CTC) in the blood after removing the tumor or treating the tumor with therapeutical means. | 10-08-2015 |
Patent application number | Description | Published |
20130174257 | Active Defense Method on The Basis of Cloud Security - The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security. | 07-04-2013 |
20140137252 | METHOD AND SYSTEM FOR UNLOCKING AND DELETING FILE AND FOLDER - A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder. The embodiments of the present invention relieves layer by layer the protections arranged by files infected with a virus by employing a plurality of means such as removing the read-only lock, removing the routine lock, adding the authority and closing the handle, thereby increasing the confrontation capacity of a security software against a malignant program. | 05-15-2014 |
20140317733 | METHOD AND CLIENT FOR ENSURING USER NETWORK SECURITY - A method and client for ensuring user network security, the method comprising: detecting whether a user opens a login operation mode or payment operation mode via a client; and when detecting that the user opens the login operation mode or payment operation mode, performing security monitoring for the login procedure or payment procedure of the user according to a preset security strategy. By applying the embodiment of the present invention, when a client user is in a login procedure or online payment procedure, security protection can be implemented for the login procedure or payment procedure via multiple security strategies specially used for ensuring the login procedure or payment procedure, and network security is ensured for the user during the login procedure or payment procedure via risky process interception, executable file prompt and browser invoke monitoring. | 10-23-2014 |
20150207810 | Method and System for Detecting Behaviour of Remotely Intruding into Computer - The invention discloses a method and system for detecting a behavior of remotely intruding into a computer, wherein the method comprises: monitoring a process creating event in a system; when a request for creating a process is monitored, intercepting the process creating request; by analyzing the process, an ancestor process of the process and a currently opened port, judging whether the process creating operation is normal; and if the process creating request is abnormal, determining the process creating request to be a behavior of remotely intruding into a computer. The invention can detect a remote intrusion behavior without the intervention of a user, and will not cause stored data to expand excessively. | 07-23-2015 |
20150356298 | METHOD AND SYSTEM FOR UNLOCKING AND DELETING FILE AND FOLDER - A method and system for unlocking and deleting a file or a folder. The method for unlocking the file or the folder comprises: receiving an unlock request of a file or a folder, wherein the unlock request includes an input parameter; verifying whether the input parameter complies with a preset condition; if the input parameter complies with the preset condition, correcting a deformed path format of the file or the folder and/or the special file name of the file or the special folder name of the folder according to a preset rule; determining whether restrictive setting of the corrected file or folder is present; and if yes, cleaning the restrictive setting of the file or the folder. The embodiments of the present invention relieves layer by layer the protections arranged by files infected with a virus by employing a plurality of means such as removing the read-only lock, removing the routine lock, adding the authority and closing the handle, thereby increasing the confrontation capacity of a security software against a malignant program. | 12-10-2015 |