Potassium-ion batteries(PIBs)have been considered as one of the most promising alternatives to lithiumion batteries(LIBs)in view of their competitive energy density with significantly reduced product ***,alloy-type ma...
详细信息
Potassium-ion batteries(PIBs)have been considered as one of the most promising alternatives to lithiumion batteries(LIBs)in view of their competitive energy density with significantly reduced product ***,alloy-type materials are expected as a high-performance anode of PIBs thanks to their intrinsic chemical stability as well as high theoretical specific ***,the serious incompatibility between alloy-type active materials and electrolytes,especially for the formation of unstable solidelectrolyte interfacial(SEI)films,often leads to insufficient cycle ***,the formation mechanism of SEI films in the K-storage systems based on carbon sphere confined Sb anode(Sb@CS)were investigated in commercially available *** characterizations and theoretical calculation revealed that the solvents in the dilute electrolyte of 0.8 M KPF_(6)/EC+DEC were excessively decomposed on the interface to generate unstable SEI and thus result in inferior K-storage *** the contrary,a salt-concentrated electrolyte(3 M KFSI/DME)can generate inorganic-dominated stable SEI due to the preferential decomposition of *** a result,the prepared Sb@CS in the matched 3 M KFSI/DME electrolyte delivered a high reversible capacity of 467.8 m A h g^(-1)after 100 cycles at 100 m A g^(-1),with a slow capacity decay of 0.19%per cycle from the 10th to the 100th *** findings are of great significance for revealing the interfacial reaction between electrodes and electrolytes as well as improving the stability of Sb-based anode materials for PIBs.
With the field of technology has witnessed rapid advancements, attracting an ever-growing community of researchers dedicated to developing theories and techniques. This paper proposes an innovative ICRM (Intelligent C...
详细信息
This study utilized continuous observational data from a PARSIVEL2 disdrometer collected during winter from 2019 to 2021 in the southwest mountainous areas of China. Based on the diameter and terminal fall velocity of...
详细信息
This study utilized continuous observational data from a PARSIVEL2 disdrometer collected during winter from 2019 to 2021 in the southwest mountainous areas of China. Based on the diameter and terminal fall velocity of the precipitation particles, combined with the discrete Fréchet distance method, the precipitation particles were classified into five categories:freezing raindrops, freezing raindrops-graupel mixed(F-G Mixed), graupel, graupel-snow mixed(G-S Mixed), and snow. The characteristics of their particle size distributions(PSDs) were analyzed, and the results indicated that during freezing weather, the dominant precipitation type was G-S Mixed, accounting for 44.80% of total precipitation. The total number concentration(Nt),mass-weighted mean diameter(Dm), and spectrum dispersion(σ) of all precipitation particles exhibit a positive correlation with precipitation intensity(PI), while the normalized intercept parameter in logarithmic form(log10Nw) shows minimal correlation with PI. Particles with diameters smaller than 2 mm contributed significantly to Nt, with freezing raindrops, F-G Mixed, and graupel particles between 1 mm and 2 mm, and G-S Mixed and snow particles larger than 4 mm contributing the most to PI. The mean PSD width followed the order of snow > G-S Mixed> graupel > freezing raindrops > F-G Mixed. Furthermore, this study derives the shape(μ) and slope(Λ) parameters of the Gamma distribution for different precipitation types, as well as the relationships between radar reflectivity(Z) and PI, and between kinetic energy(KE) and PI. These findings are expected to enhance the accuracy of PSD retrieval and the quantitative estimation of winter precipitation in this area.
Unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC), as a way of coping with delaysensitive and computing-intensive tasks, is considered to be a key technology to solving the challenges of terrestrial MEC...
详细信息
Unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC), as a way of coping with delaysensitive and computing-intensive tasks, is considered to be a key technology to solving the challenges of terrestrial MEC networks. In this work, we study the problem of collaborative service provisioning(CSP) for UAV-assisted MEC. Specifically, taking into account the task latency and other resource constraints, this paper investigates how to minimize the total energy consumption of all terrestrial user equipments, by jointly optimizing computing resource allocation, task offloading, UAV trajectory, and service placement. The CSP problem is a non-convex mixed integer nonlinear programming problem, owing to the complex coupling of mixed integral variables and non-convexity of CSP. To address the CSP problem, this paper proposes an alternating optimization-based solution with the convergence guarantee as follows. We iteratively deal with the joint service placement and task offloading subproblem, and UAV movement trajectory subproblem, by branch and bound and successive convex approximation, respectively,while the closed form of the optimal computation resource allocation can be efficiently obtained. Extensive simulations validate the effectiveness of the proposed algorithm compared to three baselines.
Deep learning methods have played a prominent role in the development of computer visualization in recent years. Hyperspectral imaging (HSI) is a popular analytical technique based on spectroscopy and visible imaging ...
详细信息
The evolving landscape of decision-making, especially in complex scenarios, poses a challenge in accurately capturing decision-makers’ cognitive information. This challenge becomes even more intricate in group decisi...
详细信息
This study investigates barely-supervised medical image segmentation where only few labeled data, i.e., single-digit cases are available. We observe the key limitation of the existing state-of-the-art semi-supervised ...
详细信息
computer vision methods for depth estimation usually use simple camera models with idealized optics. For modern machine learning approaches, this creates an issue when attempting to train deep networks with simulated ...
详细信息
computer vision methods for depth estimation usually use simple camera models with idealized optics. For modern machine learning approaches, this creates an issue when attempting to train deep networks with simulated data, especially for focus-sensitive tasks like Depth-from-Focus. In this work, we investigate the domain gap caused by off-axis aberrations that will affect the decision of the best-focused frame in a focal stack. We then explore bridging this domain gap through aberration-aware training (AAT). Our approach involves a lightweight network that models lens aberrations at different positions and focus distances, which is then integrated into the conventional network training pipeline. We evaluate the generality of network models on both synthetic and real-world data. The experimental results demonstrate that the proposed AAT scheme can improve depth estimation accuracy without fine-tuning the model for different datasets. The code will be available in ***/vccimaging/Aberration-Aware-Depth-from-Focus. Author
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have...
详细信息
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have made progress,a common challenge is the low accuracy of existing detection *** models often struggle to reliably identify corrosion tendencies,which are crucial for minimizing industrial risks and optimizing resource *** proposed study introduces an innovative approach that significantly improves the accuracy of corrosion detection using a convolutional neural network(CNN),as well as two pretrained models,namely YOLOv8 and *** leveraging advanced technologies and methodologies,we have achieved high accuracies in identifying and managing the hazards associated with corrosion across various industrial *** advancement not only supports the overarching goals of enhancing safety and efficiency,but also sets a new benchmark for future research in the *** results demonstrate a significant improvement in the ability to detect and mitigate corrosion-related concerns,providing a more accurate and comprehensive solution for industries facing these *** CNN and EfficientNetB0 exhibited 100%accuracy,precision,recall,and F1-score,followed by YOLOv8 with respective metrics of 95%,100%,90%,and 94.74%.Our approach outperformed state-of-the-art with similar datasets and methodologies.
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt...
详细信息
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encryption and decryption algorithms are being *** cloud computation,data processing,storage,and transmission can be done through laptops andmobile *** Storing in cloud facilities is expanding each day and data is the most significant asset of *** important concern with the transmission of information to the cloud is security because there is no perceivability of the client’s *** have to be dependent on cloud service providers for assurance of the platform’s *** security and privacy issues reduce the progression of cloud computing and add ***;most of the data that is stored on cloud servers is in the form of images and photographs,which is a very confidential form of data that requires secured *** this research work,a public key cryptosystem is being implemented to store,retrieve and transmit information in cloud computation through a modified Rivest-Shamir-Adleman(RSA)algorithm for the encryption and decryption of *** implementation of a modified RSA algorithm results guaranteed the security of data in the cloud *** enhance the user data security level,a neural network is used for user authentication and ***;the proposed technique develops the performance of detection as a loss function of the bounding *** Faster Region-Based Convolutional Neural Network(Faster R-CNN)gets trained on images to identify authorized users with an accuracy of 99.9%on training.
暂无评论