Antifouling liquid-infused surfaces have generated interest in multiple fields due to their diverse applications in industry and *** nearly all reports to date,the liquid component consists of only one chemical ***,un...
详细信息
Antifouling liquid-infused surfaces have generated interest in multiple fields due to their diverse applications in industry and *** nearly all reports to date,the liquid component consists of only one chemical ***,unlike traditional solid surfaces,the unique nature of liquid surfaces holds the potential for synergistic and even adaptive functionality simply by including additional elements in the liquid *** this work,we explore the concept of multi-component liquid-infused systems,in which the coating liquid consists of a primary liquid and a secondary component or components that provide additional *** ease of understanding,we categorize recently reported multi-component liquid-infused surfaces according to the size of the secondary components:molecular scale,in which the secondary components are molecules;nanoscale,in which they are nanoparticles or their equivalent;and microscale,in which the additional components are micrometer size or *** present examples at each scale,showing how introducing a secondary element into the liquid can result in synergistic effects,such as maintaining a pristine surface while actively modifying the surrounding environment,which are difficult to achieve in other surface *** review highlights the diversity of fabrication methods and provides perspectives on future research *** secondary components into the liquid matrix of liquid-infused surfaces is a promising strategy with significant potential to create a new class of multifunctional materials.
作者:
Butola, RajatLi, YimingKola, Sekhar ReddyNational Yang Ming Chiao Tung University
Parallel and Scientific Computing Laboratory Electrical Engineering and Computer Science International Graduate Program Hsinchu300093 Taiwan Institute of Pioneer Semiconductor Innovation
The Institute of Artificial Intelligence Innovation National Yang Ming Chiao Tung University Parallel and Scientific Computing Laboratory Electrical Engineering and Computer Science International Graduate Program The Institute of Communications Engineering the Institute of Biomedical Engineering Department of Electronics and Electrical Engineering Hsinchu300093 Taiwan
In this work, a dynamic weighting-artificial neural network (DW-ANN) methodology is presented for quick and automated compact model (CM) generation. It takes advantage of both TCAD simulations for high accuracy and SP...
详细信息
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain *** has been common since 2017,and in fact,it once became the ...
详细信息
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain *** has been common since 2017,and in fact,it once became the greatest threat to network *** better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for *** on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype *** results show that the existing detection methods used for testing may become invalid as result of this *** view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process ***,it identifies malicious mining by monitoring CPU usage and analyzing the function call *** system not only effectively detects the attack in our example but also has universal *** recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real *** found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored.
Under-resourced automatic speech recognition (ASR) has become an active field of research and has experienced significant progress during the past decade. However, the performance of under-resourced ASR trained by exi...
详细信息
Visual question answering is a challenging task that necessitates for sophisticated reasoning over the visual elements to provide an accurate answer to a question. Majority of the state-of-the-art VQA models are only ...
详细信息
The research on Variational Quantum Algorithms (VQAs) has gained significant momentum because of their promising practicality in the noisy intermediate-scale quantum (NISQ) era. Recent studies highlight the potential ...
详细信息
We report a compact modeling framework based on the Grove-Frohman (GF) model and artificial neural networks (ANNs) for emerging gate-all-around (GAA) MOSFETs. The framework consists of two ANNs;the first ANN construct...
详细信息
In order to expand the applications of electronically controllable intense mid-air ultrasonic fields generated with airborne ultrasonic phased arrays (AUPA), a precise spatial calibration method between multiple AUPAs...
详细信息
We propose a method of generating midair acoustic streaming traveling along a curve by combining a central acceleration field with a tangential one by ultrasound emissions from multiple phased arrays of ultrasound tra...
详细信息
Dear editor,K1 In recent years,the finite-time and fixed-time control techniques have drawn much *** letter will present a new method for designing a predefined-time adaptive sliding mode controller with prescribed co...
详细信息
Dear editor,K1 In recent years,the finite-time and fixed-time control techniques have drawn much *** letter will present a new method for designing a predefined-time adaptive sliding mode controller with prescribed convergent *** specifically,class function is used to construct the sliding function,and to achieve a real sliding mode,the function is also adopted in designing the adaptive gain without knowing the disturbance’s upper bound(DUB).Compared to the existing finite-time and fixed-time controllers,the key superiority of the proposed method is that the system can converge to a prescribed arbitrarily small region in predefined time irrespective of the initial *** addition,the control signal is bounded along the settling period,where the settling time instance can be estimated without conservation.
暂无评论