In the era of digital communication, ensuring user privacy on social media platforms is essential. A major challenge is aligning platform privacy settings with individual user preferences without overwhelming them wit...
详细信息
Unmanned Aerial Vehicles(UAVs)offer a strategic solution to address the increasing demand for cellular connectivity in rural,remote,and disaster-hit regions lacking traditional ***,UAVs’limited onboard energy storage...
详细信息
Unmanned Aerial Vehicles(UAVs)offer a strategic solution to address the increasing demand for cellular connectivity in rural,remote,and disaster-hit regions lacking traditional ***,UAVs’limited onboard energy storage necessitates optimized,energy-efficient communication strategies and intelligent energy expenditure to maximize *** work proposes a novel joint optimization model to coordinate charging operations across multiple UAVs functioning as aerial base *** model optimizes charging station assignments and trajectories to maximize UAV flight time and minimize overall energy *** leveraging both static ground base stations and mobile supercharging stations for opportunistic charging while considering battery chemistry constraints,the mixed integer linear programming approach reduces energy usage by 9.1%versus conventional greedy *** key results provide insights into separating charging strategies based on UAV mobility patterns,fully utilizing all available infrastructure through balanced distribution,and strategically leveraging existing base stations before deploying dedicated charging *** to myopic localized decisions,the globally optimized solution extends battery life and enhances ***,this work marks a significant advance in UAV energy management by consolidating multiple improvements within a unified coordination framework focused on joint charging optimization across UAV *** model lays a critical foundation for energy-efficient aerial network deployments to serve the connectivity needs of the future.
The selection and scaling of ground motion records is considered a primary and essential task in performing structural analysis and *** methods involve using ground motion models and a conditional spectrum to select g...
详细信息
The selection and scaling of ground motion records is considered a primary and essential task in performing structural analysis and *** methods involve using ground motion models and a conditional spectrum to select ground motion records based on the target *** research demonstrates the influence of adopting different weighted factors for various period ranges during matching selected ground motions with the target hazard *** event data from the Next Generation Attenuation West 2(NGA-West 2)database is used as the basis for ground motion selection,and hazard de-aggregation is conducted to estimate the event parameters of interest,which are then used to construct the target intensity measure(IM).The target IMs are then used to select ground motion records with different weighted vector-valued objective *** weights are altered to account for the relative importance of IM in accordance with the structural analysis application of steel moment resisting frame(SMRF)*** of an ordinary objective function for the matching spectrum,a novel model is introduced and compared with the conventional cost *** results indicate that when applying the new cost function for ground motion selection,it places higher demands on structures compared to the conventional cost ***,submitting more weights to the first-mode period of structures increases engineering demand *** demonstrate that weight factors allocated to different period ranges can successfully account for period elongation and higher mode effects.
Anticipating the imminent surge of retired lithium-ion batteries(R-LIBs)from electric vehicles,the need for safe,cost-effective and environmentally friendly disposal technologies has *** paper seeks to offer a compreh...
详细信息
Anticipating the imminent surge of retired lithium-ion batteries(R-LIBs)from electric vehicles,the need for safe,cost-effective and environmentally friendly disposal technologies has *** paper seeks to offer a comprehensive overview of the entire disposal framework for R-LIBs,encompassing a broad spectrum of activities,including screening,repurposing and ***,we delve deeply into a thorough examination of current screening technologies,shifting the focus from a mere enumeration of screening methods to the exploration of the strategies for enhancing screening ***,we outline battery repurposing with associated key factors,summarizing stationary applications and sizing methods for R-LIBs in their second life.A particular light is shed on available reconditioning solutions,demonstrating their great potential in facilitating battery safety and lifetime in repurposing scenarios and identifying their techno-economic *** the realm of battery recycling,we present an extensive survey of pre-treatment options and subsequent material recovery ***,we introduce several global leading recyclers to illustrate their industrial processes and technical ***,relevant challenges and evolving trends are investigated in pursuit of a sustainable end-of-life management and disposal *** hope that this study can serve as a valuable resource for researchers,industry professionals and policymakers in this field,ultimately facilitating the adoption of proper disposal practices.
Platooning represents one of the key features that connected automated vehicles may possess as it allows multiple automated vehicles to be maneuvered cooperatively with small headways on roads. However, a critical cha...
详细信息
Platooning represents one of the key features that connected automated vehicles may possess as it allows multiple automated vehicles to be maneuvered cooperatively with small headways on roads. However, a critical challenge in accomplishing automated vehicle platoons is to deal with the effects of intermittent and sporadic vehicle-to-vehicle data transmissions caused by limited wireless communication resources. This paper addresses the co-design problem of dynamic event-triggered communication scheduling and cooperative adaptive cruise control for a convoy of automated vehicles with diverse spacing policies. The central aim is to achieve automated vehicle platooning under various gap references with desired platoon stability and spacing performance requirements, while simultaneously improving communication efficiency. Toward this aim, a dynamic event-triggered scheduling mechanism is developed such that the intervehicle data transmissions are scheduled dynamically and efficiently over time. Then, a tractable co-design criterion on the existence of both the admissible event-driven cooperative adaptive cruise control law and the desired scheduling mechanism is derived. Finally, comparative simulation results are presented to substantiate the effectiveness and merits of the obtained results.
Diabetes is a long-term illness that results in a variety of chronic body damage, such as kidney failure, heart problems, eye damage, depression, and nerve damage. This disease is caused by several risk factors, ...
详细信息
The search for non-lattice methods continues — but one thing that is for sure is that we need to start the migration for our key exchange and digital signatures soon. It is likely, though, that this will not be a ...
详细信息
The search for non-lattice methods continues — but one thing that is for sure is that we need to start the migration for our key exchange and digital signatures soon. It is likely, though, that this will not be a 'big bang’ approach. In most cases, we will implement a hybrid approach, where ECDH will sit alongside Kyber in the packets exchanged, and we will be double signing with RSA, ECDSA and EdDSA alongside Dilithium signatures.
Wastewater from dye industries has become an ecological environmental issue. In this research, the agricultural waste ‘Parkia speciosa’ (PS) was used as a bio-sorbent for the sequestration of Methylene Blue (MB) dye...
详细信息
The increased energy consumption due to industrial machines and household appliances affectenergy sustainability as well as economic stability. To meet the energy demand various practices are followed worldwide. Resea...
详细信息
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ...
详细信息
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.
暂无评论