The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Embedded Mask Patterning (EMP) method uses a plasma etching process to form ultra-small but thermally stable isolated L10-FePt magnetic grains with embedded Ru hardmask1,2. It has been demonstrated as a promising and highly cost effective solution to fabricate the ultra-high density magnetic media for the next generation hard-disk drive technology, such as heat-assisted magnetic recording (HAMR)....
Aircraft performance is highly affected by induced drag caused by wingtip vortices. Winglets, referred to as vertical or angled extensions at aircraft wingtips, are used to minimise vortices formation to improve fuel efficiency. This paper describes a wind tunnel experiment and a Computational Fluid Dynamics (CFD) analysis, performed on a rectangular wing prototype (with and without winglet) of NACA...
It has been shown that incorporation of human-specified high-level description of the target objects, e.g. labeled prior-knowledge data, can increase the performance of one-shot recognition. In this paper, we introduce latent components as a high level representation of the original objects and propose a cascade model for one-shot image recognition based on latent components learned by Hierarchical...
MOS device aging caused by hot-carrier injection (HCI) and negative/positive bias-temperature instability (N/PBTI) is increasingly more responsible for IC reliability failure for advanced process technology nodes. Accurate aging modeling and fast yet trustable reliability signoff are thus mandatory in process development and circuit design. This paper will first present an aging model that takes into...
Constructing 3D human model from 2D images provides a cost-effective approach to visualize digital human in virtual environment. This paper presents a systematic approach for constructing 3D human model using the front and side images of a person. The silhouettes of human body are first detected and the feature points on the silhouettes are subsequently identified. The feature points are further used...
Inferring effective brain connectivity from neuroimaging data such as functional Magnetic Resonance Imaging (fMRI) has been attracting increasing interest due to its critical role in understanding brain functioning. Incorporating sparsity into connectivity modeling to make models more biologically realistic and performing group analysis to deal with inter-subject variability are still challenges associated...
Repetitive closure of the upper airway characterizes obstructive sleep apnea. It disrupts sleep causing excessive daytime drowsiness and is linked to hypertension and cardiovascular disease. Previous studies simulating the underlying fluid mechanics are based upon geometries, time-averaged over the respiratory cycle, obtained usually via MRI or CT scans. Here, we generate an anatomically correct geometry...
Cyber-Physical Systems (CPSs) are combinations of physical entities controlled by software systems to accomplish specified tasks under stringent real-time and physical entity constraints. As more and more physical entities are equipped with embedded computers, they are becoming more and more intelligent. However, the problem of effectively composing the services provided by cyber and physical entities...
This paper investigates the additional iron loss generated in the laminated silicon sheets of the core or the magnetic shields of large power transformers due to the leakage flux. A verification model is well established, and an efficient analysis method is implemented and validated. Both the magnetic and electric anisotropy of the oriented silicon steel sheets are taken into account in 3-D FEM eddy...
A library of components for simulation and analysis of large vehicular electrical power systems using Modelica language is presented. Components are described using different levels of model complexity, catering for both detailed high fidelity transient switching dynamics and averaged value descriptions which, being time invariant, are a computationally efficient and useful tool for design, stability...
This study modeled the Left Ventricular (LV) motion using parameters of myocardial twisting angle and shortening of LV long axis. Twenty two sets of the heart's volume-time curve (VTC) were analyzed. The ejection fraction (EF) of each data set was evaluated. The average of EF was 70.96 ?? 5.76%. The accuracy of model simulation was evaluated in each time frame. The average difference of volume between...
In this work we present an scientific application that has been given a Hadoop MapReduce implementation. We also discuss other scientific fields of supercomputing that could benefit from a MapReduce implementation. We recognize in this work that Hadoop has potential benefit for more applications than simply data mining, but that it is not a panacea for all data intensive applications. We provide an...
Access control is important for protecting the information integrities in WfMS's. Compared to conventional access control models such as discretionary, mandatory, and role-based access control models, an access-control model based on both tasks and roles meets more requirements for modern enterprise environments. However, there are no discussions on delegation mechanisms for such a model. In this...
This paper discusses a new approach to model a complex evolving system, a digital business ecosystem (DBE). We present a geography-based two coupled networks model. The upper layer is the business network layer regarded as an information ecosystem with multiple evolving agents. The lower layer is the underlying P2P communication layer to support communications. The two networks in the system are modelled...
Object of this paper is the analysis of a conformal wire antenna used for the detection of stolen cars. The antenna operates in the low frequency range 0-300 MHz and it is located on the top part of the metallic chassis, over the back tire. Details on the simulation model are provided and results are validated by comparing different numerical methods: time domain (Finite Integration Technique and...
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.