ネイティブの英語明細書では「第1実施形態」、「第1の実施形態」(First Embodiment, Embodiment 1)のような項目名を立てることは日本語の場合にくらべ非常に少ない気がする(Example 1等は多い)。
US9464938(Boeing Co)
First Embodiment(*第1実施形態、第1の実施形態)
[0071] FIGS. 4A and 4B are top and side views of an idealized fixed-wing aircraft 20 having a single downward-facing camera 16 fixedly mounted thereto. A polarizing filter 18 is mounted in such a way that it has a fixed position relative to the camera and is disposed in front of the camera lens (not shown). The polarization angle is indicated by a two-headed arrow in FIG. 4A.
////////
Second Embodiment
[0074] In accordance with an alternative embodiment, a downward-pointing camera with a polarizing filter in a fixed position can be mounted on a rotorcraft. Because a rotorcraft is able to hover in one place, the rotorcraft pilot can position the rotorcraft at one position with the target in the camera's field of view and then hover at that position. While the rotorcraft is hovering, the pilot can cause the rotorcraft to yaw as three images are captured by the camera at different yaw angles, thereby orienting the polarizing filter in three directions while capturing the three images.
Third Embodiment
[0075] In accordance with another embodiment, an aircraft with a single camera pointed forward or aft uses bank angles to achieve different polarizing filter orientations. FIGS. 6A and 6B are side and front views of an idealized fixed-wing aircraft 20 having a single forward-pointing camera 16 fixedly mounted thereto. A polarizing filter 18 is mounted in such a way that it has a fixed position relative to the camera and is disposed in front of the camera lens (not shown). The polarization angle is again indicated by a two-headed arrow in FIG. 6B.
US9464938(AUTHENTEC INC [US])
A. First Embodiment
[0035] Referring now additionally to FIG. 2, further details of a first embodiment of a secure electronic device 100 , such as the computer 10 of FIG. 1, will be described. The computer 10 illustratively includes a host platform 102 having a processor 104 and other associated peripherals 106 such as memories, disk drives etc. as would be appreciated by those skilled in the art. For example, a suitable memory may have basic input/output system (BIOS) instructions stored therein, and/or a magnetic disk (e.g., a hard disk) may have operating system (OS) instructions stored therein. The operating system may be windows, for example, although the present invention may be used with other operating systems as well.
////////////
B. Second Embodiment
[0043] Referring now additionally to FIG. 3, further details of another embodiment of a secure electronic device 200 , such as the computer 10 of FIG. 1, will be described. The device 200 illustratively includes a host platform 202 having a processor 204 and other associated peripherals 206 .
US2011143769(MICROSOFT CORP [US])
Embodiment 1(*実施の形態1;滅多に見かけない)
[0092] A mobile phone ( 200 , 500 ), comprising: a first device ( 290 , 590 ) having a first display ( 210 , 510 ) and a first wireless modem ( 835 ); a second device ( 250 , 550 ) having a second display ( 260 , 560 ) and a second wireless modem ( 885 ), the second device ( 250 , 550 ) operable as a handset of the mobile phone ( 200 , 500 ); the first and second devices ( 290 , 590 , 250 , 550 ) being slidably attachable to each other and releasable from each other so that in a closed configuration, the first and second devices ( 290 , 590 , 250 , 550 ) are attached and the second display ( 260 , 560 ) is hidden beneath the first device ( 290 , 590 ); in an open configuration, the first and second devices ( 290 , 590 , 250 , 550 ) are attached and the first and second displays ( 210 , 510 , 260 , 560 ) are both visible and function as a single integrated display; and in a detached configuration, the first and second devices ( 290 , 590 , 250 , 550 ) are detached from one another for wireless communication there between.
Embodiment 2
[0093] The mobile phone ( 200 , 500 ) of any of the previous numbered embodiments, wherein the second device ( 250 , 550 ) can slide both horizontally and vertically with respect to the first device ( 290 , 590 ) to allow the first and second displays ( 210 , 510 , 260 , 560 ) be substantially flush with each other in the open configuration.
US2019309176(TESLA NANOCOTINGS INC [US])
EXAMPLE 1.(*実施例1)
[0070] Two moles ethylene glycol and one mole of tetramethyl silicate were heated first under reflux at 60° C., and then in a distillation apparatus until no methanol was recovered. Two moles of 1,4-phenylene di-isocyanate was added. 100 ml of the mixture was added slowly onto 50 g of amino-CNTs under vacuum. The mixture was filtered using suction. Half of the amino groups in 16-aminodendrimer were reacted with butanoyl anhydride. The product was dissolved into butyl propionate, and dry ice cooled (about −50° C.). Filled CNTs were added slowly mixing very well. The mixture was filtered with suction and the product was mixed immediately with the diglycidyl ether of bisphenol A.
US9697371(GOOGLE INC [US])
Example 1
[0095] A method comprising: receiving, by a TEE implemented by a computing device, an operation request requiring use of protected data accessible only to the TEE; responsive to receiving the operation request, generating, by the TEE, first data; sending, by the computing device, the first data to a remote computing device; responsive to sending the first data, receiving, by the TEE, second data only if a constraint on usage of the protected data is satisfied; validating, by the TEE, the second data to verify the remote computing device generated the second data; and responsive to validating the second data was generated by the remote computing device, performing an operation indicated by the operation request using the protected data.
Example 2
[0096] The method of example 1, wherein validating the second data comprises: using, by the TEE, a cryptographic key to decrypt the second data, wherein the second data comprises a first hash value of the first data generated by the remote computing device; performing, by the TEE, a hashing algorithm on the first data to generate a second hash value of the first data; and determining, by the TEE, the second data is verified when the first hash value matches the second hash value.
※コメント投稿者のブログIDはブログ作成者のみに通知されます