v

Personalized tourniquet system having dual-purpose cuff

Disclosed is a method and apparatus for regulating tourniquet cuff pressure based on a personalized tourniquet pressure (PTP) to facilitate safe performance of a surgical procedure. The apparatus includes a dual-purpose tourniquet cuff adapted to encircle a region of a patient limb to provide both a sensor during a pre-surgical time period and an effector during a surgical time period. An effector module communicates pneumatically with an inflatable bladder of the cuff for maintaining pressure in the bladder near a PTP during the surgical time period to safely stop penetration of arterial blood past the cuff. A pulsation sensor that communicates pneumatically with the inflatable bladder during the pre-surgical time period senses and characterizes pressure pulsations that are indicative of penetration of arterial blood into the region of the limb encircled by the cuff. A PTP estimator is responsive to the pulsation sensor for producing an estimate of the PTP, such that the estimate of the PTP is a function of the sensed pulsations.




v

Shape memory polymer foams for endovascular therapies

A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.




v

Implantable biodegradable wound closure device

A biodegradable device for maintaining the alignment of the edges of a trocar defect, consisting of two bases joined by a connector, a first base to be positioned below the defect and a second base above. The first base has a threaded hole from its upper surface but not through the lower surface. The connector attached to the bases such that there is a hole aligned with the threaded hole in the first base allowing a device to mate with the threads in the first base. The second base has a hole aligned with the hole in the connector and wide enough to allow a device to mate with the threads in the first base. The device is arranged so the distance between the lower surface of the second base and upper surface of the first base holds but does not compress the fascia around the trocar defect.




v

Apparatus and methods for sealing a vascular puncture

Apparatus for sealing a puncture communicating with a blood vessel includes a porous carrier formed from lyophilized hydrogel or other material. The plug may include at least first and second hydrogel precursors and a pH adjusting agent carried by the porous carrier in an unreactive state prior to exposure to an aqueous physiological environment. Once exposed to bodily fluids, the carrier expands as the lyophilized material hydrates to enhance and facilitate rapid hemostasis of the puncture. When the plug is placed into the puncture, the natural wetting of the plug by bodily fluids (e.g., blood) causes the first and second precursors to react and cross-link into an adhesive or “sticky” hydrogel that aids in retaining the plug in place within the puncture.




v

Surgical stapling device with dissecting tip

A dissecting tip is provided for use with a surgical stapler or instrument. In one embodiment, the dissecting tip is secured to the end effector of the surgical instrument, e.g., to the cartridge assembly. The dissecting tip extends distally from the end effector and is configured to dissect or separate target tissue from certain tissue, e.g., adherent, connective, joined or other tissue.




v

Vascular sealing device with high surface area sealing plug

An internal tissue puncture closure method and apparatus. The method and apparatus provide a folded sealing plug that provides more surface area than conventional plugs to more fully cover and seal an external situs of an internal tissue puncture. The folded sealing plug may have a weave pattern that tends to cause the sealing plug to corkscrew into the internal tissue puncture as it is compressed toward an anchor placed inside of the tissue puncture.




v

Tissue fixation delivery apparatus

A device for deploying a tissue fixation apparatus of the type including first and second tissue anchors coupled together by an adjustable suture assembly. The device comprises a handle mechanism and a needle cartridge assembly releasably coupled to the handle mechanism. The needle cartridge assembly includes a needle cannula with a side opening through which a tissue anchor can be loaded into an internal chamber of the needle cannula. A push rod is disposed in the needle cannula and is operable between an extended position in which the push rod prevents the tissue anchor from entering the chamber through the side opening, and a retracted configuration in which the tissue anchor can be pushed into the chamber under the action of a resilient band positioned over the side opening.




v

One-piece variable angle locking washer

A variable angle locking washer comprising a body having an outer surface circumferentially disposed between a top surface and a bottom surface, a central bore extending between the top and bottom surfaces, the central bore having a threaded portion and an unthreaded portion, and a plurality of radial slots peripherally positioned along the body, each slot defining a channel that extends between the outer surface of the body and the central bore.




v

Composite vertebral spacers and instrument

An intervertebral fusion cage that is adapted to contain an inserter within its inner volume during insertion of the cage.




v

Anchoring device and system for an intervertebral implant, intervertebral implant and implantation instrument

Various embodiments of intervertebral implants, anchoring devices for intervertebral implants, and implantation instrumentation are provided, along with various embodiments of methods for using one or more of the devices. Some embodiments of an anchoring device have a body comprising at least one curve and a rigid plate elongated along a longitudinal axis so that its front end enters at least one vertebra while its rear end remains in the passage of an implant. In some embodiments, the plate comprises at least one longitudinal slot separating at least one posterior portion of the plate into two branches, with at least one branch comprising at least one withdrawal stop configured to retain the device in the implant.




v

High-strength microwave antenna assemblies

Various high-strength microwave antenna assemblies are described herein. The microwave antenna has a radiating portion connected by a feedline to a power generating source, e.g., a generator. The antenna is a dipole antenna with the distal end of the radiating portion being tapered and terminating at a tip to allow for direct insertion into tissue. Antenna rigidity comes from placing distal and proximal radiating portions in a pre-stressed state, assembling them via threaded or overlapping joints, or fixedly attaching an inner conductor to the distal portion. The inner conductor is affixed to the distal portion by, e.g., welding, brazing, soldering, or by adhesives. A junction member made from a hard dielectric material, e.g., ceramic, can be placed between the two portions and can have uniform or non-uniform shapes to accommodate varying antenna designs. Electrical chokes may also be used to contain returning currents to the distal end of the antenna.




v

Medical device with orientable tip for robotically directed laser cutting and biomaterial application

A medical device used in a medical robotic system has a conduit and an orientable tip. An optical fiber coupled to a laser source and/or a catheter coupled to one or more biomaterial sources extends through the conduit and tip so that the tip of the medical device may be robotically directed towards a target tissue for laser and/or biomaterial application as part of a medical procedure performed at a surgical site within a patient. A protective sheath covers the fiber as it extends through the conduit and tip. A first coupler adjustably secures at least the sheath to the medical device and a second coupler adjustably secures the fiber to at least the sheath. A similar dual coupler mechanism may be used to secure the sheathed catheter to the medical device.




v

Percutaneous nephrostomy plug delivery device

A device for delivering a percutaneous nephrostomy plug is provided. The device comprises a tubular member configured for insertion into a biological body. The device further comprises a handle coupled to a proximal end of the tubular member. The handle comprises a pusher element, an actuation element, and a transmission. The pusher element is disposed within the tubular member, and is configured to deliver a plug through a distal end of the tubular member. The transmission is coupled to the tubular member and the actuation element, and the transmission is configured to cause a retraction of the tubular member relative to the pusher element in response to a depression of the actuation element. A first depression of the actuation element toward the tubular member urges a partial exposure of the plug. A second depression of the actuation element urges a further exposure of the plug.




v

Medical device

An attachment for a surgical instrument including a drive input hub for connection to a power source; a drive output hub for connection to a surgical instrument; and a body connecting the drive input hub to the drive output hub, the body including a mechanism for transferring drive from the input hub to the output hub, and wherein the body, the drive input hub and the drive output hub are at least in part not coaxial. A method for surgically preparing a bone using the attachment is also provided.




v

Flexible harmonic waveguides/blades for surgical instruments

In one embodiment, a surgical instrument comprises an articulable harmonic waveguide. The articulable harmonic waveguide comprises a first drive section comprising a proximal end and a distal end. The proximal end of the first drive section may be configured to connect to an ultrasonic transducer. The articulable harmonic waveguide further comprises a first flexible waveguide coupled to the distal end of the first drive section. An end effector extends distally from the first flexible waveguide. The surgical instrument further comprises an articulation actuator to flex the first flexible waveguide.




v

Anterior cervical plate

An anterior cervical plate system is provided. The cervical plate includes a retention ring with a deflectable flange that is upwardly spaced from the top surface of the ring and configured to prevent an inserted bone fastener from backing out of the plate. The plate includes a locking pin having a camming surface and a blocking surface. When the camming surface is moved into position adjacent to the flange, the flange is free to flex out of the way of a bone screw being inserted into or removed from the plate. When the blocking surface is positioned adjacent to the flange, outward deflection of the flange is prevented to retain the bone screw inside the plate. The locking pin is rotated through a camming surface to bring a blocking surface against the flange deflecting the flange onto the head of the bone screw.




v

Heart occlusion devices

The present invention is specifically directed to a heart occlusion device with a self-centering mechanism. The heart occlusion device includes two separate uniquely shaped wires 12, 14, each forming shapes that mirror the respective wire's shapes. Each wire forms half-discs or quarter-discs that together form a distal disc and a proximal disc. In other versions, the device includes four separate wires, each mirroring its neighboring wire and forming a proximal and a distal quarter-disc. In the versions with four wires, the quarter-discs of each wire together form proximal and distal discs. The distal disc and proximal disc are separated by a self-centering waist. The proximal disc is attached to a hub comprising a screw mechanism. A similar hub is optional on the distal disc. The discs further include coverings which form a sealant to occlude an aperture in a tissue. The wires forming the discs have a shape-memory capability such that they can be collapsed and distorted in a catheter during delivery but resume and maintain their intended shape after delivery.




v

Joint arthroplasty devices and surgical tools

Disclosed herein are methods, compositions and tools for repairing articular surfaces repair materials and for repairing an articular surface. The articular surface repairs are customizable or highly selectable by patient and geared toward providing optimal fit and function. The surgical tools are designed to be customizable or highly selectable by patient to increase the speed, accuracy and simplicity of performing total or partial arthroplasty.




v

Joint arthroplasty devices and surgical tools

Disclosed herein are methods, compositions and tools for repairing articular surfaces repair materials and for repairing an articular surface. The articular surface repairs are customizable or highly selectable by patient and geared toward providing optimal fit and function. The surgical tools are designed to be customizable or highly selectable by patient to increase the speed, accuracy and simplicity of performing total or partial arthroplasty.




v

Medical device inserters and processes of inserting and using medical devices

An apparatus for insertion of a medical device in the skin of a subject is provided, as well as methods of inserting medical devices.




v

Receiving device and method

A receiving device receives messages, detects the priority levels set in the headers of the messages, and reads the first and second messages. When the receiving device receives the header of the second message during reading of the first message, it controls, in accordance with the priority levels of the first and second messages, the reading rates at which the first and second messages are read.




v

Mobile electronic device configured to establish secure wireless communication

The invention relates to a method for configuring a mobile device capable of reproducing, for a user, multimedia content previously provided by a remote content server. The invention relates to using a client installed on said electronic device to relay authentication requests between a card, preferably complying with the provisions of the Mobile Commerce Extension standard, and an authentication server that is accessible via an access point.




v

Network-based revocation, compliance and keying of copy protection systems

A method of authenticating a device involves establishing a local connection between a local target device and a local source device; at the source device, obtaining credentials of the target device via the local connection; at the source device, sending the credentials to a cloud authentication server via a secure communication channel; at the cloud authentication server, checking the credentials of the target device against a database of known good devices; at the source device, receiving a message from the cloud authentication server via the secure communication channel, said message indicating that the target device is authenticated; and delivering content from the source device to the target device on the condition that the target device is authenticated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.




v

Setting in wireless communication device for encrypted communication

A system administrator of a wireless LAN 100 manipulates a personal computer PC1 to change a WEP key. The personal computer PC1 authenticates a memory card MC as genuine under management of the system administrator. In the case of the authenticated memory card MC, changed setting information, as well as a previous WEP key before the change of the setting information, is written into the memory card MC. The system administrator then inserts this memory card MC into a memory card slot of a printer PRT1. The printer PRT1 authenticates the memory card MC as genuine under management of the system administrator. In the case of the authenticated memory card MC, the setting information is updated. This arrangement effectively relieves the user's workload in setting wireless communication devices, while ensuring the sufficiently high security.




v

Device and method for obfuscating visual information

A device is described for the hiding and subsequent recovery of visual information. The device comprises two or more tokens (1), each containing a mask (2,3) of coloured pixels (4), are overlaid (5), so that when the pixels are aligned, hidden information, invisible in the individual tokens. The hidden information consists of one or more recognisable alphabetic, numerical or pictorial characters (6). During token overlay and alignment, the information becomes recognisable because it is made up of pixels whose colour is differentiated from the other pixels in the overlay. The information is hidden by adding pixels of certain colours. When the tokens are overlaid and the pixels aligned, the added pixels are effectively subtracted, revealing the hidden information. The tokens may be printed on various media, or may be displayed on an electronic device.




v

Private key generation apparatus and method, and storage media storing programs for executing the methods

Disclosed herein are a private key generation apparatus and method, and storage media storing programs for executing the methods on a computer. The private key generation apparatus includes a root private key generation unit and a sub-private key generation unit. The root private key generation unit sets a root master key and predetermined parameters capable of generating private keys, and generates a first sub-master key set capable of generating a number of private keys equal to or smaller than a preset limited number. The sub-private key generation unit generates private keys with the root private key generation unit by receiving the first sub-master key set from the root private key generation unit, to generate a private key corresponding to a user ID using the first sub-master key set, and issues the private key to a user.




v

Broadcast receiving apparatus and control method thereof

The present invention provides a broadcast receiving apparatus that receives a broadcast wave containing multiple channels. The apparatus comprises, among other things, a selecting unit that selects a channel from the broadcast wave; a determination unit that determines, for all channels that can be selected by the selecting unit, whether or not the obtaining unit can obtain an encrypted second-type encryption key that can be decrypted by the decrypting unit using the updated first-type encryption key; and an updating unit that updates the computer program stored in the memory to the updated program in the case where the determination unit has determined that the obtainment is possible for all the channels.




v

Method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise

A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.




v

Methods for managing user information and devices thereof

A method, non-transitory computer readable medium and application manager computing device comprises obtaining at least one cryptographic key from a request by a client computing device for a user session. User information corresponding to a user is encrypted or decrypted using the cryptographic key. The request is authenticated based on encryption or decryption of the user information. The cryptographic key is deleted after the completion or termination of the user session.




v

Method and system for secured remote provisioning of a universal integrated circuit card of a user equipment

The present invention provides a method and system for secured remote provisioning of a universal integrated circuit card of a user equipment. A system includes a user equipment for initiating a request for remote provisioning of an universal integrated circuit card (UICC) in the user equipment, where the request for remote provisioning includes a machine identifier (MID) associated with the user equipment and a public land mobile network (PLMN) identifier (ID) associated with an network operator. The system also includes at least one shared key management server for dynamically generating security keys and an operator shared key using the security keys, the MID. Moreover, the system includes an operator network for generating a subscription key using the operator shared key and an international mobile subscriber identity (IMSI), and provisioning the IMSI in a secured manner to the UICC of the user equipment using the security keys.




v

Apparatus and methods for managing messages sent between services

Disclosed are methods and apparatus for managing services within a computer network. In one embodiment, a message interchange network for exchanging application-level messages between services, which are located outside the message interchange network, is provided. At the message interchange network, a plurality of application-level messages, which each specify which one or more receiving services are to receive the each application-level message, are received. Each received application-level message is forward towards the one or more receiving services. Correlation information regarding each application-level message that is received into message interchange network is retained. The application-level messages are sent between pairs of the services, and the retained correlation information for each application-level message pertains to each application-level message and any other application-level messages related to the each application-level message. A query can then be received, at the message interchange network from a first service, to search the retained correlation information for specific one or more portions of the retained correlation information. A response to the query, which includes the specific one or more portions of the retained correlation information, is sent to the first service.




v

Method and system for providing a rotating key encrypted file system

A file system data is divided into two or more data blocks. A unique encryption key is assigned to each data block with the encryption key assigned to each data block being distinct from other encryption keys used to encrypt the other data blocks and each of the data blocks is encrypted using its assigned encryption key. One of the data blocks within the file system is then selected and decrypted using the distinct encryption key assigned to the selected data block and a new encryption key, distinct for the previously assigned encryption key, is assigned to the selected data block and the selected data block is re-encrypted using the new encryption key. This process is then repeated for each data block on a sequential/cyclic and continually rotating basis.




v

Method for arbitrary-precision division or modular reduction

A method in a portable data carrier for executing a cryptographic operation on security-relevant data comprises a step of determining a remainder (r) of a dividend (a) modulo a divisor (b). In so doing, the remainder (r) is determined iteratively by means of a division device of the data carrier. In each iteration there is carried out a Montgomery multiplication with the divisor (b) as the modulus and an additive linkage of an output value of the Montgomery multiplication with a coefficient (ai) derived from the dividend (a) and associated with the respective iteration. The Montgomery multiplication is carried out here by means of a multiplication device of the data carrier, preferably a corresponding coprocessor. The Montgomery multiplication of a subsequent iteration receives a result of a preceding iteration as an input value.




v

Apparatus and method for converting random binary sequence into random integer

An apparatus and method for converting a random binary sequence into a random integer is provided. The present invention converts a random binary sequence into a random integer, and determines whether the corresponding random integer falls within a preset integer interval. Further, if it is determined that the random integer generated from the random binary sequence does not fall within the preset integer interval, the present invention repeatedly updates a random binary sequence until a random integer falling within the corresponding integer interval is obtained, thus outputting uniformly distributed random integers which fall within the preset integer interval.




v

Level-two encryption associated with individual privacy and public safety protection via double encrypted lock box

Computationally implemented methods and systems are described herein that are designed to, among other things, receiving a level-one encrypted output of a surveillance device; encrypting at least a part of the level-one encrypted output of the surveillance device with a level-two encryption key whose decryption key is inaccessible by a level-two encryption entity; and transmitting a level-two encrypted output of the surveillance device.




v

Apparatus and method for address privacy protection in receiver oriented channels

Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the first wireless device using a pseudo-random function with the seed value and the privacy key as input arguments. The privacy key is only known to the first and second wireless devices. A privacy address is generated for the first wireless device based on the seed value and the first resolution tag. A packet is transmitted from the first wireless device to the second wireless device. The packet includes the privacy address and the first resolution tag.




v

Methods and apparatus for base station assisted peer discovery through aggregation of expressions

A method, an apparatus, and a computer program product for wireless communication are provided in which a UE is equipped to generate an expression associated with a wireless device for use in a peer discovery signal, generate an expression set from the expression, a first temporal frequency, and a first time duration, and transmit the generated expression set to a base station to allow the base station to broadcast each of the expressions included in the expression set at the first temporal frequency over the first time duration. Another method, apparatus, and computer program product for wireless communication are provided in which a base station is equipped to receive an expression set from a wireless device, process the received expression set to determine each of one or more instances of an expression, and transmit each of the one or more instances of the expression.




v

Communicating device and communicating method

The debugging unit writes a public key of the key issuing server and an initializing program given from outside, to the storage unit. The instruction executing unit reads and executes the initializing program stored in the storage unit. The debug disabling unit disables the debugging unit. The public-key encrypting unit encrypts the random number by the public key in the storage unit, the random number generated by the random number generating unit after the debugging unit is disabled. The transmitting unit transmits the encrypted random number to the key issuing server. The receiving unit receives an individual key encrypted by the random number from the key issuing server. The individual-key writing unit decrypts the encrypted individual key by the random number to obtain the individual key and write the individual key to the storage unit.




v

Method and apparatus for authenticating public key without authentication server

Provided is a method in which a first device authenticates a public key of a second device. The method includes: receiving a first value generated based on the public key of the second device and a password displayed on a screen of the second device and the public key of the second device, from the second device; generating a second value based on the public key of the second device and a password input to the first device by a user of the first device according to the password displayed on the screen of the second device; and authenticating the public key of the second device based on the first value and the second value.




v

Method and server for providing a mobility key

A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to the network, the authentication server extracts a subscriber identification contained in said message and generates a corresponding mobile key, which is stored together with the respective extracted subscriber identification. Upon subsequent receipt of a key request message (key request) that is transmitted when a subscriber registers, the authentication server extracts a mobile identification of the subscriber contained in said message and searches for an identical mobile identification, which can be derived in accordance with a configurable derivation function from a subscriber identification that is stored in the authentication server. Once a derived mobile identification that is identical or can be uniquely assigned to the extracted mobile identification has been found, the authentication server provides the stored corresponding mobile key that has been generated, to cryptographically protect the mobile signaling messages of the registered subscriber.




v

Disk array device and data management method for disk array device

A disk array device comprises a first storage unit that stores encrypted user data, a second storage unit that is different from the first storage unit and locks and stores configuration information including a first encrypted authentication key that unlocks the encrypted user data, a management unit that includes a decoder that decodes the first encrypted authentication key and a control unit that unlocks the locked configuration information using a second authentication key, the management unit managing data using the first and second authentication keys. the management unit includes a configuration information recovery portion that unlocks the locked configuration information by using the second authentication key and recovers the configuration information during booting and a user data unlocking portion that decodes the first encrypted authentication key included in the configuration information and unlocks the encrypted user data stored in the first storage unit by using the first decoded authentication key.




v

Method and system for providing conditional access to encrypted content

A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network. Partially decrypted video content is obtained by decrypting a first layer of encryption of the encrypted video content using the first decryption data. The partially decrypted video content is stored. A request for viewing the encrypted video content is transmitted and second decryption data is received. A second layer of encryption of the encrypted video content is decrypted using the second decryption data.




v

Selective management controller authenticated access control to host mapped resources

An information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes a plurality of registers. The board management controller is in communication with the host mapped GPIO and with the shared memory, and is configured to control accessibility to the plurality of registers in the GPIO, and to control write accessibility of the shared memory based on a private key received from a basic input output system requesting accessibility to the plurality of registers and write accessibility of the shared memory. The cryptography engine is in communication with the board memory controller, and is configured to authenticate the private key received from the board management controller.




v

Mobile host using a virtual single account client and server system for network access and management

A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.




v

Method for manufacturing ethylene vinyl acetate copolymer sheet for solar cell encapsulant

Provided is a method for manufacturing a sheet for a solar cell encapsulant which has stability against yellowing after a crosslinking process and thus good appearance with improved productivity in the sheet manufacture process, specifically to a method for manufacturing a sheet for a solar cell encapsulant characterized by melt-mixing a resin composition with an organic peroxide, a co-crosslinking agent and a silane coupling agent at the degradation temperature of the organic peroxide or less, wherein the resin composition is obtained by melt-mixing EVA resin with an antioxidant, an UV absorber and a light stabilizer at 80-220° C., and forming a sheet from the obtained melt-mixed resin composition.




v

Substrate-based additive fabrication process

The invention relates to a substrate-based method for forming a three-dimensional object by additive fabrication by coating a liquid radiation curable resin comprising from 30 to 80 wt % of cationically curable compounds on a substrate, contacting the liquid radiation curable resin with a previously cured layer, selectively exposing the layer of liquid radiation curable layer to actinic radiation thereby forming a cured layer, separating the cured layer at the substrate, and repeating the steps a sufficient number of time in order to build up a three-dimensional object.




v

Method and device for producing and treating pellets

The invention relates to a method and a device for producing and treating plastic pellets. According to said method, a melt of the plastic material is granulated to give pellets, the pellets are cooled in a cooling fluid, the pellets are separated from the cooling fluid and the pellets are crystallized. The device according to the invention is characterized by comprising a control unit which monitors the crystallization step and controls the method in such a manner that, in case of a disturbance of crystallization, the pellets are supplied to an intermediate storage alter separation of the pellets from the cooling fluid and, as soon as the disturbance is removed, the pellets temporarily stored in the intermediate storage are supplied to crystallization and are crystallized.




v

Retardation compensators of negative C-type for liquid crystal display

Disclosed is a negative C-type retardation compensator for a liquid crystal display. The negative C-type retardation compensator for the liquid crystal display includes polyarlate having a thio group or a sulfur oxide group in a polymer main chain thereof. Accordingly, the retardation compensator has an absolute value of negative retardation that is larger in a thickness direction that a retardation compensator which includes polyarylate having no thio group or sulfur oxide group in a polymer main chain thereof even though the retardation compensator having the thio group or sulfur oxide group and the retardation compensator having no thio group or sulfur oxide group are the same as each other in thickness. Thereby, the negative C-type retardation compensator for liquid crystal displays is capable of being desirably applied to the liquid crystal displays.




v

Renewable polyester compositions having a low density

A thermoplastic composition that contains a rigid renewable polyester and has a voided structure and low density is provided. To achieve such a structure, the renewable polyester is blended with a polymeric toughening additive to form a precursor material in which the toughening additive can be dispersed as discrete physical domains within a continuous matrix of the renewable polyester. The precursor material is thereafter stretched or drawn at a temperature below the glass transition temperature of the polyester (i.e., “cold drawn”). This creates a network of voids located adjacent to the discrete domains, which as a result of their proximal location, can form a bridge between the boundaries of the voids and act as internal structural “hinges” that help stabilize the network and increase its ability to dissipate energy. The present inventors have also discovered that the voids can be distributed in a substantially homogeneous fashion throughout the composition.




v

Information processing device, information processing method, playback device, playback method, program and recording medium

An information processing device includes first encoding means for encoding an image by placing strip-shaped areas in the upper and lower sides, second encoding means for encoding data of first subtitles displayed in a third area formed by joining at least a part of one area of a first area and a second area together with the other area, first generating means for generating information referred to form the third area, and second generating means for generating the contents including the video stream, a stream of the first subtitles, and the control information.