The growing demand for efficient energy storage solutions has sparked increased interest in precise battery voltage prediction. In this study the Long Short-Term Memory networks, are applied in the time series forecas...
The growing demand for efficient energy storage solutions has sparked increased interest in precise battery voltage prediction. In this study the Long Short-Term Memory networks, are applied in the time series forecasting, to improve battery voltage prediction compared to conventional models. The developed forecasting system includes three main parts: Pre-processing, modeling, and evaluation. In the pre-processing, the voltage and current time series are normalized, and divided to the test and train subsets. Then the windows of consecutive samples are generated for both train and test subsets. The forecasting LSTM models are learnt from training data set, in the modeling phase. Finally, the Mean Absolute Error (MAE) is used as the evaluation criterion. This model is compared to two other neural network models. The study concludes that LSTM outperforms the other models, highlighted by a significantly lower MAE. With a comprehensive methodology and successful experimental framework, this paper demonstrates the efficacy of LSTM in predicting battery voltage, indicating its superiority over simple neural networks for time series forecasting.
In the realm of real-time applications such as autonomous driving and surveillance, efficient vehicle detection stands as a paramount concern. The revolutionary You Only Look Once (YOLO) framework, renowned for its ra...
In the realm of real-time applications such as autonomous driving and surveillance, efficient vehicle detection stands as a paramount concern. The revolutionary You Only Look Once (YOLO) framework, renowned for its rapid object recognition, has reshaped this landscape. This study delves into the fusion of real-time vehicle detection and YOLO v8, optimizing its architecture for swift and precise identification. Empirical validation underscores the model's prowess, achieving a remarkable accuracy of 97.9% on mAP50 and 91.3% on mAP50-95. This achievement not only attests to the model's accuracy but also reaffirms its real-time processing capabilities. The implications resonate across transportation safety and urban planning, promising transformative potential. This research underscores the power of YOLO v8 in intelligent object detection, poised to reshape and enhance various domains.
Enabling large-scale and high-speed quantum computation is a key to practical quantum computation. Continuous-variable approach in optical systems offer advantages in scalability and speed by leveraging their temporal...
详细信息
Detecting vulnerabilities within compiled binaries is challenging due to lost high-level code structures and other factors such as architectural dependencies, compilers, and optimization options. To address these obst...
详细信息
ISBN:
(数字)9798350386417
ISBN:
(纸本)9798350386424
Detecting vulnerabilities within compiled binaries is challenging due to lost high-level code structures and other factors such as architectural dependencies, compilers, and optimization options. To address these obstacles, this research explores vulnerability detection using natural language processing (NLP) embedding techniques with word2vec, BERT, and RoBERTa to learn semantics from intermediate representation (LLVM IR) code. Long short-term memory (LSTM) neural networks were trained on embeddings from encoders created using approximately 48k LLVM functions from the Juliet dataset. This study is pioneering in its comparison of word2vec models with multiple bidirectional transformers (BERT, RoBERTa) embeddings built using LLVM code to train neural networks to detect vulnerabilities in compiled binaries. Word2vec Skip-Gram models achieved 92% validation accuracy in detecting vulnerabilities, outperforming word2vec Continuous Bag of Words (CBOW), BERT, and RoBERTa. This suggests that complex contextual embeddings may not provide advantages over simpler word2vec models for this task when a limited number (e.g. 48K) of data samples are used to train the bidirectional transformer-based models. The comparative results provide novel insights into selecting optimal embeddings for learning compiler-independent semantic code representations to advance machine learning detection of vulnerabilities in compiled binaries.
We theoretically and experimentally proved that the generation rate of squeezed single photon states can be increased by generalized photon subtraction method. Our work will encourage universal and fault-tolerant cont...
详细信息
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte...
详细信息
As hate speech is becoming common on social media platforms, it is important to detect, and curb hate speech in order to provide a better and safe environment online. Given the heavy usage of manual methods of hate sp...
详细信息
Feature extraction is the process of transforming raw data into features that are more relevant for machine learning algorithms. The goal of feature extraction is to find a set of features that can be used to accurate...
Feature extraction is the process of transforming raw data into features that are more relevant for machine learning algorithms. The goal of feature extraction is to find a set of features that can be used to accurately predict the target variable. The specific features that are extracted will depend on the specific application. For example, features that are extracted for the purpose of diagnosing arrhythmias will be different from the features that are extracted for the purpose of assessing myocardial infarction. A generalized new algorithm for feature extraction could be helpful for all complex feature extraction data sets. In this paper, we propose a random selection process to generate the required number of new features with the help of existing specific features of the electrocardiogram (ECG) signal. We have named this novel feature extraction method the Random Feature Explorer (RFE). The proposed method was tested and evaluated using Physio Net's MIT-BIH datasets. The results indicate that the suggested method achieved an accuracy of 99.79% in arrhythmia classification. We have made the source code for our proposed method available on GitHub for open access and reproducibility. The code can be accessed at https://***/3NnrH4A
In this Letter, we derive new bounds on a heat current flowing into a quantum L-particle system coupled with a Markovian environment. By assuming that a system Hamiltonian and a system-environment interaction Hamilton...
详细信息
In this Letter, we derive new bounds on a heat current flowing into a quantum L-particle system coupled with a Markovian environment. By assuming that a system Hamiltonian and a system-environment interaction Hamiltonian are extensive in L, we prove that the absolute value of the heat current scales at most as Θ(L3) in a limit of large L. Furthermore, we present an example of noninteracting particles globally coupled with a thermal bath, for which this bound is saturated in terms of scaling. However, the construction of such a system requires many-body interactions induced by the environment, which may be difficult to realize with the existing technology. To consider more feasible cases, we consider a class of the system where any nondiagonal elements of the noise operator (derived from the system-environment interaction Hamiltonian) become zero in the system energy basis, if the energy difference exceeds a certain value ΔE. Then, for ΔE=Θ(L0), we derive another scaling bound Θ(L2) on the absolute value of the heat current, and the so-called superradiance belongs to a class for which this bound is saturated. Our results are useful for evaluating the best achievable performance of quantum-enhanced thermodynamic devices, including far-reaching applications such as quantum heat engines, quantum refrigerators, and quantum batteries.
暂无评论