1460711026-056d4f7b-379d-4846-bfeb-067186fb768a

1. A tube straightening process using a roll straightening machine in which drum type straightening roll pairs are disposed, the rolls of each pair being vertically opposed to each other, in a manner such that directions of rotating axes of rolls in each pair are horizontally oppositely diverted so as to horizontally cross, wherein:
in at least three pairs of straightening rolls on an outlet-side of the roll straightening machine, at least an outer layer portion of a roll main body is made of elastic material having spring type hardness Hs (JIS K 6301 A type) of 50 to 100, and
an offset amount is imparted to a tube engaged in the three pairs, at least, of straightening opposing rolls on the outlet side such that \u03b7 defined by the following equation (1) ranges from 1.0\xd710\u22123 to 1.5\xd710\u22123, the offset amount being set at three positions tube axis where the upper and lower rolls of each pair horizontally cross
Formula
\u2062
\u2062
1
\u03b7
=
1
R

\xd7

(

d
2

)
(
1
)
where a relationship of R=(\u03b42+L2)2\u03b4 holds, given that d (mm) is a tube outside diameter, L (mm) is a roll stand span of the roll straightening machine, and \u03b4 (mm) is an offset amount.
The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A method comprising:
stalling a request on a host computer system prior to sending the request to a target computer system;
determining whether the request is suspicious;
wherein upon a determination that the request is not suspicious, releasing the request; and
wherein upon a determination that the request is suspicious, adding a request entry to a request database, the request entry identifying the request,
generating a counter value associated with the request entry,
determining whether the counter value meets a counter value threshold, and
wherein upon a determination that the counter value meets the counter value threshold, determining that malicious code activity is detected.
2. The method of claim 1, further comprising:
wherein upon a determination that malicious code activity is detected, generating a notification that malicious code activity is detected; and
implementing one or more protective actions.
3. A method comprising:
intercepting a request on a host computer system;
stalling the request;
determining whether the request is suspicious,
wherein upon a determination that the request is suspicious, adding a request entry representative of the request to a request database, and
determining whether malicious code activity is detected on the host computer system based upon the request entry; and
wherein upon a determination that malicious code activity is detected on the host computer system, generating a notification that malicious code activity is detected on the host computer system, and
implementing one or more protective actions.
4. The method of claim 3, further comprising:
wherein upon a determination that the request is not suspicious, releasing the request.
5. The method of claim 3, further comprising:
wherein upon a determination that malicious code activity is not detected on the host computer system, releasing the request.
6. The method of claim 3, wherein the implementing one or more protective actions comprises:
terminating the request.
7. The method of claim 3, wherein the request is an HTTP GET request.
8. The method of claim 3, wherein the intercepting a request on a host computer system utilizes a local proxy mechanism.
9. The method of claim 3, wherein the intercepting a request on a host computer system occurs at the application level.
10. A method comprising:
intercepting a request on a host computer system;
stalling the request; and
determining whether the request is suspicious,
wherein upon a determination that the request is suspicious, adding a request entry representative of the request to a request database, and
determining whether malicious code activity is detected on the host computer system based upon the request entry,
wherein the determining whether malicious code activity is detected on the host computer system based upon the request entry further comprises:
generating a counter value associated with the request entry; and
determining whether the counter value meets a counter value threshold,
wherein upon a determination that the counter value does not meet the counter value threshold, determining that malicious code activity is not detected on the host computer system, and
wherein upon a determination that the counter value meets the counter value threshold, determining that malicious code activity is detected on the host computer system.
11. A malicious code detection device comprising:
an intercept module, the intercept module for intercepting a request issuing on a host computer system prior to the sending of the request from the host computer system to a target computer system;
an analyzer module coupled to the intercept module, the analyzer module for determining whether the request is suspicious utilizing at least a standards list, the analyzer module further for adding a request entry corresponding to the request to a request database when the request is determined as suspicious, the analyzer module further for determining whether malicious activity is detected on the host computer system based on whether a counter value associated with a request entry meets a counter value threshold;
a request database coupled to the analyzer module, the request database including one or more request entries, each of the one or more request entries identifying a request determined to be suspicious; and
a standards list coupled to the analyzer module, the standards list including selected standards for use in determining whether the request is suspicious.
12. The malicious code detection device of claim 11, further comprising:
an inclusion profile list coupled to the analyzer module.
13. The malicious code detection device of claim 11, further comprising:
an exclusion profile list coupled to the analyzer module.
14. The malicious code detection device of claim 11, further comprising a memory area coupled to the intercept module and the analyzer module.
15. The malicious code detection device of claim 11, wherein the intercept module includes an interception mechanism for intercepting a request.
16. A computer program product comprising a computer-readable medium storing computer program code for a method comprising:
stalling a request on a host computer system prior to sending the request to a target computer system;
determining whether the request is suspicious;
wherein upon a determination that the request is not suspicious, releasing the request; and
wherein upon a de termination that the request is suspicious, adding a request entry to a request database, the request entry identifying the request,
generating a counter value associated with the request entry,
determining whether the counter value meets a counter value threshold, and
wherein upon a determination that the counter value meets the counter value threshold, determining that malicious code activity is detected.
17. The computer program product of claim 16, the method further comprising:
wherein upon a determination that malicious code activity is detected, generating a notification that malicious code activity is detected; and
implementing one or more protective actions.
18. A computer program product comprising a computer-readable medium storing computer program code for a method comprising:
intercepting a request on a host computer system;
stalling the request;
determining whether the request is suspicious,
wherein upon a determination that the request is suspicious, adding a request entry representative of the request to a request database, and
determining whether malicious code activity is detected on the host computer system based upon the request entry; and
wherein upon a determination that malicious code activity is detected on the host computer system, generating a notification that malicious code activity is detected on the host computer system, and
implementing one or more protective actions.

1460711017-ec38e456-7192-41e2-9b86-c48fb4e86609

1. A plasma apparatus, comprising:
a chamber;
an arc electrode set disposed in the chamber, wherein the arc electrode set comprises an anode and a cathode, an arc discharging space is formed between the anode and the cathode, an end of the cathode opposite to the anode and an end of the anode opposite to the cathode respectively has a crystallized silicon target, and a resistance of the crystallized silicon targets is smaller than 0.01 \u03a9\xb7cm; and
a substrate holder disposed within the chamber, wherein the substrate holder has a carrier substrate, and the carrier surface faces to the arc discharging space.
2. The plasma apparatus as claimed in claim 1, wherein each of the crystallized silicon targets has a single crystal structure of silicon, the single crystal structure of silicon grains has dopants with a high dopant concentration, and the dopant concentration of the dopants within each of the single crystal structure of silicon grains is substantially from 1019 to 1020 atomcm2.
3. The plasma apparatus as claimed in claim 1, wherein each of the crystallized silicon targets has a high dopant concentration, a material of the dopants is selected from III-group elements, and the crystallized silicon targets constitute P-type semiconductor targets.
4. The plasma apparatus as claimed in claim 1, wherein each of the crystallized silicon targets has a high dopant concentration, a material of the dopants is selected from V-group elements, and the crystallized silicon targets constitute N-type semiconductor targets.
5. The plasma apparatus as claimed in claim 1, wherein each of the crystallized silicon targets has a high dopant concentration, a material of the dopants includes III-group elements and V-group elements, and each of the crystallized silicon targets constitutes an intrinsic semiconductor target.
6. The plasma apparatus as claimed in claim 1, wherein a resistance of the crystallized silicon targets is greater than 0.005 \u03a9cm.
7. The plasma apparatus as claimed in claim 1, further comprising a movable mechanism, wherein the movable mechanism is connected to the arc electrode set, so as to generate a relative displacement between the anode and the cathode by the movable mechanism.
8. The plasma apparatus as claimed in claim 1, further comprising a substrate, wherein the substrate is disposed on a carrier surface of the substrate holder, the substrate holder further comprises a cooling system, wherein the cooling system is buried inside the carrier surface, so as to force the substrate heated during process to cool.
9. The plasma apparatus as claimed in claim 8, wherein the cooling system comprises a cooling pipe and a coolant, the cooling pipe passes through a trench buried inside the substrate holder, and the coolant flows and circulates in the cooling pipe.
10. The plasma apparatus as claimed in claim 9, wherein the carrier surface is forced to cool to a temperature substantially smaller than 0\xb0 C. by the cooling system during the process.
11. The plasma apparatus of claim 9, wherein the coolant comprises water or liquid nitrogen.
12. The plasma apparatus as claimed in claim 8, wherein the substrate is a flexible substrate.
13. The plasma apparatus as claimed in claim 8, wherein a surface to be deposited of the substrate is a flat surface, a spherical surface or a mirror surface.
14. The plasma apparatus as claimed in claim 8, further comprising a continuous feeding system, wherein the continuous feeding system is connected to the substrate, and the substrate is carried to be disposed on the substrate holder through the continuous feeding system.
15. The plasma apparatus as claimed in claim 1, further comprising a gas pipe, wherein the gas pipe is disposed on a sidewall of the chamber, and a dopant gas passing through the gas pipe comprises diborane or phosphine.
16. A method of fabricating a nano-crystalline silicon thin film, suitable for fabricating by using the plasma apparatus as claimed in claim 1, the method of fabricating a nano-crystalline silicon thin film comprises:
providing a substrate on the carrier surface of the substrate holder;
adjusting a pressure of the gas within the chamber to an operation pressure;
inputting a voltage to form a voltage difference between the anode and the cathode;
shortening a distance between the anode and the cathode, so as to form a stable arc plasma between the anode and the cathode;
forming a plurality of silicon crystalline grains and silicon atoms through the crystallized silicon target of the anode and the crystallized silicon target of the cathode by the stable arc plasma; and
depositing the plurality of silicon crystalline grains and silicon atoms to the substrate to form a nano-crystalline silicon thin film.
17. The method of fabricating a nano-crystalline silicon thin film as claimed in claim 16, wherein the plurality of silicon crystalline grains and silicon atoms formed by the stable arc plasma are in a status of high temperature.
18. The method of fabricating a nano-crystalline silicon thin film as claimed in claim 17, wherein the substrate holder further comprises a cooling system, the cooling system is buried inside the carrier surface, and passing a coolant through the cooling system to force the heated substrate during process to cool before the step of forming the silicon crystalline grains and silicon atoms through the stable arc plasma, so that the high-temperature silicon crystalline grains and silicon atoms are quenched and deposited to the substrate.
19. The method of fabricating a nano-crystalline silicon thin film as claimed in claim 16, wherein the nano-crystalline silicon thin film comprises a continuous phase of amorphous silicon layer and a plurality of single crystal of silicon grains dispersed within the amorphous silicon layer.
20. The method of fabricating a nano-crystalline silicon thin film as claimed in claim 19, wherein a size of each of the single crystal of silicon grain substantially ranges from 100 nanometers to 5 micrometers.
21. The method of fabricating a nano-crystalline silicon thin film as claimed in claim 16, wherein the substrate is a flexible substrate, and the substrate is continuously fed, so that the nano-crystalline silicon thin film is continuously deposited on the continuous-fed substrate.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A method, carried out on a computer with a volatile storage device running an operating system, comprising:
intercepting an IO request packet (IRP) from the operating system, the IRP indicative of an impending operating system shutdown;
signaling the operating system to temporarily suspend the operating system shutdown;
in response to intercepting the IRP, transferring information from the volatile storage device to an image file on a nonvolatile storage device;
signaling the operating system to permit the shutdown to proceed following transferring of the information to the image file; and
restoring the information to the volatile storage device from the image file on system re-boot to re-establish the information in the volatile storage device.
2. The method of claim 1, wherein the volatile storage device includes a random access memory (RAM) disk.
3. The method of claim 2, wherein the RAM disk has characteristics including a size, a drive letter, and a location of the image file on the nonvolatile storage device.
4. The method of claim 3, wherein characteristics of the RAM disk are added to the operating system registry.
5. The method of claim 1, wherein the nonvolatile storage device includes a magnetic disk.
6. The method of claim 1, wherein the information transferred to the image file is digital data representing a subset of information stored in the volatile storage device prior to intercepting the IRP.
7. The method of claim 1, wherein the IRP indicates an instruction to power-off, and the information is provided back to the volatile storage device on reboot.
8. The method of claim 1, wherein the volatile storage device is a RAM disk, and information is provided to the nonvolatile storage device on shutdown and back to the volatile storage device on re-boot in a manner that appears to the user to be the same before and after the shutdown and re-boot.
9. The method of claim 1, further comprising allowing access to the volatile memory device while the information is being provided from the nonvolatile storage device to the volatile storage device.
10. The method of claim 1, wherein the image file corresponds to an allocated block of memory in the nonvolatile storage device, the allocated block of memory having a same size as a RAM disk in the volatile storage device or a partition thereof.
11. The method of claim 1, further comprising increasing the rate of movement of data to or from the volatile storage device by transferring the data to or from the volatile storage device in block sizes at least large enough to reduce latency time during the transfer of said data to or from the volatile storage device.
12. A system for providing persistent memory in a computer running an operating system comprising:
a volatile storage device;
a nonvolatile storage device; and
a bus driver,
wherein:
the nonvolatile storage device includes an image file of the volatile storage device,
the bus driver for intercepting an IO request packet (IRP) from the operating system, the IRP indicative of an impending operating system shutdown, and for signaling the operating system to temporarily suspend the operating system shutdown,
and in response to intercepting the IRP, the bus driver for transferring information from the volatile storage device to the image file,
and, following the transferring of information, the bus driver for signaling the operating system to permit the shutdown to proceed;
and
on system re-boot the bus driver for restoring the information to the volatile storage device from the image file to re-establish the information in the volatile storage device.
13. The system of claim 12, wherein the volatile storage device includes a random access memory (RAM) disk.
14. The system of claim 13, wherein the RAM disk has characteristics which include a size, a drive letter, and a location of the image file on the nonvolatile storage device.
15. The system of claim 14, wherein characteristics of the RAM disk are added to the operating system registry.
16. The system of claim 12, wherein the nonvolatile storage device includes a magnetic disk.
17. The system of claim 12, wherein the information transferred to the image file is digital data representing a subset of information stored in the volatile storage device prior to intercepting the IRP.
18. The system of claim 12, wherein the IRP indicates an instruction to power-off, and the information is provided back to the volatile storage device on reboot.
19. The system of claim 12, wherein the volatile storage device is a RAM disk, and wherein the bus driver provides information to the nonvolatile storage device on shutdown and back to the volatile storage device on re-boot in a manner that appears to the user to be the same before and after the shutdown and re-boot.
20. The system of claim 12, wherein the system allows access to the volatile memory device while the information is being provided from the nonvolatile storage device to the volatile storage device.
21. The system of claim 12, wherein the image file corresponds to an allocated block of memory in the nonvolatile storage device, the allocated block of memory having a same size as a RAM disk in the volatile storage device or a partition thereof.
22. The system of claim 12, wherein the bus driver increases the rate of movement of data to or from the volatile storage device by transferring the data to or from the volatile storage device in block sizes at least large enough to reduce latency time during the transfer of said data to or from the volatile storage device.