Patent application number | Description | Published |
20080298999 | Method for Producing a Copper Alloy Having a High Damping Capacity - The invention relates to a copper alloy which is used for mechanically stressed components which, during operation, are subjected to vibrations and/or impacts to produce the same, and have particularly good mechanical damping properties. The composition of said copper alloy depends upon the utilisation temperature or working temperature of the component. Said copper alloy consists of 2-12 wt.-% manganese, 5-14 wt.-% aluminum and individually or in total 0-18 wt.-% of one or several elements, nickel, iron, cobalt, zinc, silicon, vanadium, niobium, molybdenum, chromium, tungsten, beryllium, lithium, yttrium, cerium, scandium, calcium, titanium, phosphorous, zirconium, boron, nitrogen, carbon, whereby each element does not contain more that 6% and 100 wt.-% copper. The alloy is obtained by adapting the martensite-austenitic conversation temperatures or the associated intervals M | 12-04-2008 |
20100221141 | ALUMINUM PLAIN BEARING ALLOY - The invention relates to a monotectic aluminium plain bearing alloy, comprising 5 to 20 wt. % bismuth, 3 to 20 wt. % zinc, 1 to 4 wt. % copper and additionally several of the components manganese, vanadium, niobium, nickel, molybdenum, cobalt, iron, tungsten, chromium, silver, calcium, scandium, cerium, beryllium, antimony, boron, titanium, carbon and zirconium in amounts up to 5 wt. % and aluminium to make 100 wt. %, produced by strip casting and during the subsequent production process for plain bearings, after rolling or roll-bonding, subjected to a heat treatment at ca. 270 to 400° C. Long bismuth particles or sheets, produced by rolling or roll-bonding can thus be recoagulated to give finely-distributed spherical drops with a size in the 20 μm range and smaller. | 09-02-2010 |
20140030133 | CAST IRON CONTAINING NIOBIUM AND COMPONENT - Known cast iron alloys have use limits in respect of the temperature. An alloy (in a weight percentage) including silicon 2.0%-4.5%, carbon 2.9%-4.0%, niobium 0.05%-0.7%, molybdenum 0.3%-1.5%, optionally cobalt 0.1%-2.0%, manganese≦0.3%, nickel≦0.5%, magnesium≦0.07%, phosphorus≦0.05%, sulphur≦0.012%, chromium≦0.1%, antimony≦0.004%, and, iron, is provided. | 01-30-2014 |
20140093416 | CAST IRON CONTAINING NIOBIUM AND COMPONENT - An alloy is provided. The alloy comprises (in % by weight): | 04-03-2014 |
Patent application number | Description | Published |
20090241781 | HYBRID WET ELECTROSTATIC PRECIPITATOR - A hybrid, wet electrostatic precipitator has multiple precipitation zones for removing particulate and contaminants from a flue gas stream. A first precipitation zone has at least one discharge electrode and at least one collection plate made of a metal or a fiber glass reinforced plastic. A second precipitation zone has at least one discharge electrode and at least one collecting electrode which is a porous membrane sheet. The precipitation zones are in series with one another. | 10-01-2009 |
20090247392 | IN-SITU REGENERATION OF A CATALYST MASKED BY CALCIUM SULFATE - An in-situ method for regenerating a deactivated catalyst removes a calcium sulfate layer masking active catalyst sites. A reducing agent converts the calcium sulfate to calcium oxide, which is then removed, by reintrainment into the flue gas steam using soot blowers or sonic horns. The method is particularly useful for regenerating selective catalytic reduction (SCR) catalysts used to remove nitrogen oxides from flue gas produced by combustion of coal from the Powder River Basin. The method can be practiced using existing SCR system hardware, and without removing the SCR system from service. | 10-01-2009 |
20100273643 | SYSTEM AND METHOD FOR PROTECTION OF SCR CATALYST AND CONTROL OF MULTIPLE EMISSIONS - The present invention relates generally to the field of emission control equipment for boilers, heaters, kilns, or other flue gas-, or combustion gas-, generating devices (e.g., those located at power plants, processing plants, etc.) and, in particular to a new and useful method and apparatus for preventing the poisoning and/or contamination of an SCR catalyst. In another embodiment, the method and apparatus of the present invention is designed to protect an SCR catalyst, while simultaneously providing emission control. | 10-28-2010 |
20140216309 | SYSTEM AND METHOD FOR INCREASING THE SERVICE LIFE AND/OR CATALYTIC ACTIVITY OF AN SCR CATALYST AND CONTROL OF MULTIPLE EMISSIONS - The present invention relates generally to the field of emission control equipment for boilers, heaters, kilns, or other flue gas-, or combustion gas-, generating devices (e.g., those located at power plants, processing plants, etc.) and, in particular to a new and useful method and apparatus for reducing or preventing the poisoning and/or contamination of an SCR catalyst. In another embodiment, the method and apparatus of the present invention is designed to protect the SCR catalyst. In still another embodiment, the present invention relates to a method and apparatus for increasing the service life and/or catalytic activity of an SCR catalyst while simultaneously controlling various emissions. | 08-07-2014 |
Patent application number | Description | Published |
20130263270 | SYSTEMS AND METHODS FOR DETECTING MALICIOUS CODE - A system, method, and computer-readable medium for detecting malicious computer code are provided. Instructions, such as HTML or JavaScript instructions may be received from a server, parsed, and executed. During execution of the instructions, one or more functions of a software application, such as a web browser, may be hooked, and an event object may be created for each called function that is hooked, resulting in a collection of event objects. Rules may be matched with event objects of the collection of event objects to detect malicious code. Attributes from the matched event objects may then be used to locate original malicious script or code injected into a web page. | 10-03-2013 |
20140380482 | SYSTEMS AND METHODS FOR MALWARE DETECTION AND SCANNING - Systems and methods are provided for malware scanning and detection in a computing system. In one exemplary embodiment, the method includes launching, in a computing device of the computing system, a virtual machine, and launching, in the virtual machine of the computing device, an internet browser. The method also includes requesting, by the internet browser, data from a web page, and performing, using one or more analysis tools, analysis on the web page. In the method, performing analysis on the web page includes performing monitoring and recording of system application programming interface (API) calls, and creating software objects associated with the web page. The method also includes performing antivirus scanning of the software objects, de-obfuscating JavaScript associated with the software objects, and correlating data associated with the performed analysis to determine if the web page is a malicious web page. | 12-25-2014 |
20150106931 | CLASSIFYING MALWARE BY ORDER OF NETWORK BEHAVIOR ARTIFACTS - The present invention generally relates to systems and methods for classifying executable files as likely malware or likely benign. The techniques utilize temporally-ordered network behavioral artifacts together with machine learning techniques to perform the classification. Because they rely on network behavioral artifacts, the disclosed techniques may be applied to executable files with obfuscated code. | 04-16-2015 |
20150242637 | AUTOMATED VULNERABILITY INTELLIGENCE GENERATION AND APPLICATION - Techniques for providing computer security vulnerability intelligence are disclosed. The techniques include obtaining distributable vulnerability data that includes, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter, where the distributable vulnerability data was derived from an intelligence graph including a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges. The techniques also include identifying installed software packages on a computer system, correlating a plurality of the installed software packages with the distributable vulnerability data to obtain a plurality of installed software packages and associated vulnerabilities, ordering at least some of the plurality of installed software packages and associated vulnerabilities according to threat priority parameters, such that an ordered plurality of installed software packages and associated vulnerabilities is obtained, and providing mitigation information for the ordered plurality of installed software packages and associated vulnerabilities. | 08-27-2015 |
20150244734 | AUTOMATED INTELLIGENCE GRAPH CONSTRUCTION AND COUNTERMEASURE DEPLOYMENT - Techniques for providing information security threat assessment and amelioration are disclosed. The techniques may include obtaining fundamental data, obtaining document data, preparing fundamental instance nodes from the fundamental data, preparing document nodes from the document data, preparing edges between at least some of the nodes, storing the nodes and the edges in a manner that reflects a graph structure, and causing to be displayed at least a portion of a graph defined by at least one node and at least one edge. | 08-27-2015 |
20160028746 | MALICIOUS CODE DETECTION - A system, method, and computer-readable medium for detecting malicious computer code are provided. A dataset may be accessed and converted to a binary dataset according to a predefined conversion algorithm. One or more cycles in the binary dataset may be identified. Statistical analysis may be performed on the identified one or more cycles. A determination that the set of dataset includes malicious software code may be made based on the performed statistical analysis. | 01-28-2016 |
Patent application number | Description | Published |
20120174224 | Systems and Methods for Malware Detection and Scanning - Systems and methods are provided for malware scanning and detection in a computing system. In one exemplary embodiment, the method includes launching, in a computing device of the computing system, a virtual machine, and launching, in the virtual machine of the computing device, an internet browser. The method also includes requesting, by the internet browser, data from a web page, and performing, using one or more analysis tools, analysis on the web page. In the method, performing analysis on the web page includes performing monitoring and recording of system application programming interface (API) calls, and creating software objects associated with the web page. The method also includes performing antivirus scanning of the software objects, de-obfuscating JavaScript associated with the software objects, and correlating data associated with the performed analysis to determine if the web page is a malicious web page. | 07-05-2012 |
20120174225 | Systems and Methods for Malware Detection and Scanning - Systems and methods are provided for malware scanning and detection. In one exemplary embodiment, the method includes a hub computing device that receives, from a controller computing device, a scan request, and identifies spoke computing devices for performing the scan request. The method performed by the hub computing device also includes sending to the identified spoke computing devices, the scan request, receiving, from the spoke computing devices, results associated with the scan request, and sending, to the controller computing device, the results associated with the scan request. | 07-05-2012 |
20120330994 | Systems and Methods for Inter-Object Pattern Matching - Systems and methods are disclosed for identifying objects from a collection of objects of diverse types that match a pattern. In one implementation, a system includes a processor and a memory. The memory stores instructions that cause the processor to receive a pattern input text identifying the pattern to be matched. The pattern input text comprises one or more conditions and a match statement. The processor also receives a collection of objects of diverse types, where each object comprises at least an attribute and a value associated with the attribute. The processor analyzes each object to determine whether the object satisfies the match statement based on an application of the one or more conditions to the attributes and attribute values for the object. If the processor determines that the object satisfies the match statement, the processor creates an output comprising an indication of the object and the conditions that caused the match statement to be satisfied. | 12-27-2012 |