The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rational approximation is an important tool for establishing a dynamic analysis model in time domain for semi‐infinite water and soil. It accurately represents the interaction between the semi‐infinite medium and an engineering structure. Current research on rational approximation method focuses mainly on the establishment of time‐domain analysis models. However, the stability, accuracy, and calculation...
AFM has been proved to be a powerful nano-manipulation tool taking advantage of its ultra high resolution and precision. However the large spatial uncertainties associated with AFM tip positioning dual to the PZT nonlinearity and thermal drift are still challenging problems, which hinders its wide application especially in building complex structures In this paper, a probabilistic approach combined...
Nanomanipulation and nanoassembly using atom force microscopy (AFM) is a potential and promising technology for nanomanufacturing. Precise position of the tip of AFM is important to increase the accuracy and efficiency on fabricate complex nanostructures. However at the nano-scale, it is difficult to acquire the tip position expressed by the coordinate in real time due to PZT nonlinearity and thermal...
The detection of malicious executables (malware) is a well known problem. Anti-malware software are typically signature based, and only malicious attacks containing those known signatures can be detected. This is problematic because new malware is appearing extremely rapidly. This threatens to overwhelm signature-based approaches. In this paper, we propose a novel approach to detect malicious executables...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.