In recent years, there has been an increasing interest in renewable energy. Particularly, wind energy is gaining more and more popularity in many countries. However, the main obstacles to wind turbines usage are the v...
详细信息
Effective management of the charging process is not only crucial for reducing costs and improving the efficiency of electric vehicles and renewable energy systems but also essential for enhancing the stability and saf...
Effective management of the charging process is not only crucial for reducing costs and improving the efficiency of electric vehicles and renewable energy systems but also essential for enhancing the stability and safety of energy systems. Consequently, it has become a key focus in battery management system research. However, there is a contradiction between improving battery charging efficiency and extending service life, and the diversified battery use needs make this contradiction more prominent. This paper proposes a lithium-ion battery charging process management framework based on digital twin technology and Bayesian principle. A hybrid model is used to establish the digital twin of the lithium-ion battery charging state and health state. At the same time, the model evaluation reward and maturity evaluation reward are comprehensively considered in the decision-making process to improve the effectiveness of decision-making. Furthermore, the charging strategy is optimized according to the distinct characteristics of different battery life stages. The case analysis demonstrates that, compared to existing charging strategies, the proposed method effectively extends battery lifespan while meeting various battery performance requirements.
The study of switching dynamics of memristive devices is a topical direction both in fundamental and applied investigation of memristive technologies. The main problem in this field is a stochastic nature of switching...
The study of switching dynamics of memristive devices is a topical direction both in fundamental and applied investigation of memristive technologies. The main problem in this field is a stochastic nature of switching between resistive states of memristive device. This feature leads to the large variance of resistive states during switching and difficulties in setting specific intermediate states of memristive device. We propose the novel method of setting intermediate states of memristive device by controlling parameters of external pulse stimulation. We have demonstrated experimentally the possibility of switching and holding the resistive states of memristive device by pulse-width modulation (PWM).
In this paper, we present a virtual control contraction metric (VCCM) based nonlinear parameter-varying (NPV) approach to design a state-feedback controller for a control moment gyroscope (CMG) to track a user-defined...
详细信息
This paper considers imbalance problems arising in Energy Management in Smart Grids (SG) as discrete-time stochastic linear systems subject to chance constraints, and proposes a Model Predictive control (MPC) approach...
详细信息
ISBN:
(数字)9781728171005
ISBN:
(纸本)9781728171012
This paper considers imbalance problems arising in Energy Management in Smart Grids (SG) as discrete-time stochastic linear systems subject to chance constraints, and proposes a Model Predictive control (MPC) approach to solve them. It is well-known that handling the closed-loop constraint feasibility of such systems is in general difficult due to the presence of a potentially unbounded uncertainty source. To overcome such a difficulty, we propose two new ideas. We first reformulate the chance constraint using the so-called Conditional Value at Risk (CVaR), which is known to be the tightest convex approximation for chance constraints. We then relax the CVaR constraint using a penalty function depending on a coefficient parameter. An optimal solution is therefore obtained by solving a single unconstrained problem which, intuitively, takes into consideration a risk of the system trajectories in an undesirable state. A case study using an academic example is presented to estimate the a-posteriori probability of the coefficient parameter in order to show when such a penalty function is exact by means of probabilistic constraint fulfillment.
This paper investigates the scheduling problem of a fleet of electric vehicles, providing mobility as a service to a set of time-specified customers, where the operator needs to solve the routing and charging problem ...
详细信息
Decentralized stealth attack constructions that minimize the mutual information between the state variables and the measurements are proposed. The attack constructions are formulated as random Gaussian attacks targeti...
详细信息
The effective management and early diagnosis of cardiovascular diseases (CVDs) are crucial to bring down the mortality associated these diseases. Because detecting CVDs can be a difficult task, especially when no symp...
详细信息
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comprehensive overview of data poisoning including attack techniques, adversary incentives, impacts on security and reliability, detection methods, defenses, and key research gaps. We examine label flipping, instance injection, backdoors, and other attack categories that enable malicious outcomes ranging from IP theft to accidents in autonomous systems. Promising detection approaches include statistical tests, robust learning, and forensics. However, significant challenges remain in translating academic defenses like adversarial training and sanitization into practical tools ready for operational use. With safety and trustworthiness at stake, more research on benchmarking evaluations, adaptive attacks, fundamental tradeoffs, and real-world deployment of defenses is urgently needed. Understanding vulnerabilities and developing resilient machine learning pipelines will only grow in importance as data integrity is fundamental to developing safe artificial intelligence.
As China's steel production accounts for an increasing share of the world's output, the intelligent transformation of the steel industry is becoming increasingly urgent. To address issues such as low levels of...
As China's steel production accounts for an increasing share of the world's output, the intelligent transformation of the steel industry is becoming increasingly urgent. To address issues such as low levels of mobile informationization in steel enterprises and the lack of an industry-specific mobile application platform, it is of great significance to establish a shared mobile application platform for the steel industry. In this paper, the requirements of the platform were analyzed, and the platform's functions were designed. The software design of the platform was then carried out, and the entire mobile application sharing platform was developed, effectively improving the production management efficiency of steel enterprises. The results indicate that the platform can effectively meet the needs of steel enterprises and has significant engineering significance.
暂无评论