Accurate capacity and State of Charge(SOC)estimation are crucial for ensuring the safety and longevity of lithium-ion batteries in electric *** study examines ten machine learning architectures,Including Deep Belief N...
详细信息
Accurate capacity and State of Charge(SOC)estimation are crucial for ensuring the safety and longevity of lithium-ion batteries in electric *** study examines ten machine learning architectures,Including Deep Belief Network(DBN),Bidirectional Recurrent Neural Network(BiDirRNN),Gated Recurrent Unit(GRU),and others using the NASA B0005 dataset of 591,458 *** indicate that DBN excels in capacity estimation,achieving orders-of-magnitude lower error values and explaining over 99.97%of the predicted variable’s *** computational efficiency is paramount,the Deep Neural Network(DNN)offers a strong alternative,delivering near-competitive accuracy with significantly reduced prediction *** GRU achieves the best overall performance for SOC estimation,attaining an R^(2) of 0.9999,while the BiDirRNN provides a marginally lower error at a slightly higher computational *** contrast,Convolutional Neural Networks(CNN)and Radial Basis Function Networks(RBFN)exhibit relatively high error rates,making them less viable for real-world battery *** of error distributions reveal that the top-performing models cluster most predictions within tight bounds,limiting the risk of overcharging or deep *** findings highlight the trade-off between accuracy and computational overhead,offering valuable guidance for battery management system(BMS)designers seeking optimal performance under constrained *** work may further explore advanced data augmentation and domain adaptation techniques to enhance these models’robustness in diverse operating conditions.
Backdoor attacks threaten federated learning (FL) models, where malicious participants embed hidden triggers into local models during training. These triggers can compromise crucial applications, such as autonomous sy...
详细信息
Backdoor attacks threaten federated learning (FL) models, where malicious participants embed hidden triggers into local models during training. These triggers can compromise crucial applications, such as autonomous systems, when they activate specific inputs, causing a targeted misclassification in the global *** recommend a strong defense mechanism that combines statistical testing, model refinement, and adversarial training methods. The primary goal is to develop a robust defense against backdoor attacks in federated learning (FL), where malicious participants embed hidden triggers into local models. This defense aims to preserve the integrity of the global model and ensure high reliability in real-world FL deployments, even when facing sophisticated adversarial strategies. Our defense strategy incorporates "Messy" samples with obvious triggers and "wrap" samples with similar but nonidentical triggers during adversarial training. This dual approach enhances the model’s ability to detect and resist hidden manipulations. We facilitate applying neuron pruning to remove compromised neurons, further refining the model architecture for improved security. Continuous statistical testing, including variance analysis and cosine similarity checks, ensures that only legitimate and significant updates are integrated into the global model. A key innovation of our method is a significance-based filtering mechanism that effectively identifies and excludes malicious updates, preventing backdoor triggers from affecting the global model. This iterative defense process adapts to attack strategies, maintaining the model’s robustness. Empirical results confirm that this defense mechanism significantly improves FL models’ resilience to sophisticated backdoor attacks while preserving high accuracy and reliability. Balancing defensive strategies from adversarial training and sample diversification to model pruning provides a dependable framework for safeguarding FL models where integ
In this paper, we study the benefit of applying loop transformations to a part of module in the CMS software. Particularly, we focus at the effect of loop transformations in term of performance improvement from the op...
详细信息
In this article, a study of radial and trunk circuits of networks was carried out and power losses were determined using the proposed coefficients. Equivalent resistances of the investigated circuits were calculated c...
详细信息
Effective congestion control algorithms (CCAs) are crucial for the smooth operation of Internet communication infrastructure. CCAs adjust transmission rates based on congestion signals, optimizing resource utilization...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Effective congestion control algorithms (CCAs) are crucial for the smooth operation of Internet communication infrastructure. CCAs adjust transmission rates based on congestion signals, optimizing resource utilization and user experience. However, existing studies, both rule-based and learning-based CCAs, often struggle with generalization and underperform when deployed in real-world environments. When applied to unseen network conditions, hand-crafted schemes or pre-trained models may experience significant performance degradation. To address this challenge, we propose MetaCon, a novel adaptive Internet congestion control approach based on meta-reinforcement learning. MetaCon leverages knowledge learned from prior scenarios to quickly adapt to new environments. Experimental results show that MetaCon outperforms existing algorithms by exhibiting superior generalization and achieving better transmission performance across a wide variety of network conditions.
Healthcare monitoring systems have advanced significantly in emergency rooms and many other health settings. Today, many nations are deeply concerned about the rise of small healthcare monitoring systems. In-person ad...
详细信息
The proposed web application for tomato leaf disease detection exemplifies the transformative power of Artificial Intelligence and computer Vision in modern agriculture. Addressing the critical issue of early and accu...
详细信息
ISBN:
(数字)9798331523923
ISBN:
(纸本)9798331523930
The proposed web application for tomato leaf disease detection exemplifies the transformative power of Artificial Intelligence and computer Vision in modern agriculture. Addressing the critical issue of early and accurate disease detection, this solution bridges the gap between advanced technological innovations and the practical needs of farming. The application is designed using Streamlit and Python to combine the usability of a friendly interface with the power of robust analytical capabilities in CNN, offering real-time reliable diagnosis and actionable insights to farmers. This application provides the highest possible accuracy and adaptability through the thorough training and evaluation of models and is a good asset for disease management. Deployment on scalable cloud platforms ensures access, reliability, and global reach. Future improvements, including extending disease detection to other crops, multilingual support, real-time recommendations, and integration with IoT devices, promise to expand its reach and utility. This initiative is a shining example of how AI-based solutions can transform agricultural practices by enhancing productivity, reducing losses, and ensuring sustainability. The application empowers farmers and contributes to a resilient agricultural ecosystem, addressing the pressing need for innovative and sustainable solutions in a rapidly evolving world.
Twitter is one of social media used by the public to send and read tweets that have been shared, making it easier to express their opinions. The opinions found on Twitter are perceptions, both positive and negative. T...
详细信息
Patients in intensive care unit (ICU) often have multiple vital signs monitored continuously. However, missing data is common in ICU settings, negatively impacting clinical decision-making and patient outcomes. In thi...
详细信息
An intrusion Detection System (IDS) is a system that resides inside the network and monitors all incoming and outgoing traffic. It prevents unethical activities from happening over the network. With the use of IoT dev...
详细信息
暂无评论