Perovskite solar cells have shown great potential in the field of underwater solar cells due to their excellent optoelectronic properties;however,their underwater performance and stability still hinder their practical...
详细信息
Perovskite solar cells have shown great potential in the field of underwater solar cells due to their excellent optoelectronic properties;however,their underwater performance and stability still hinder their practical *** this research,a 1H,1H,2H,2H-heptadecafluorodecyl acrylate(HFDA)anti-reflection coating(ARC)was introduced as a high-transparent material for encapsulating perovskite solar modules(PSMs).Optical characterization results revealed that HFDA can effectively reduce reflection of light below 800 nm,aiding in the absorption of light within this wavelength range by underwater solar ***,a remarkable efficiency of 14.65%was achieved even at a water depth of 50 ***,the concentration of Pb^(2+)for HFDA-encapsulated film is significantly reduced from 186 to 16.5 ppb after being immersed in water for 347 ***,the encapsulated PSMs still remained above 80%of their initial efficiency after continuous underwater illumination for 400 ***,being exposed to air,the encapsulated PSMs maintained 94%of their original efficiency after 1000 h light *** highly transparent ARC shows great potentials in enhancing the stability of perovskite devices,applicable not only to underwater cells but also extendable to land-based photovoltaic devices.
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
There are numerous energy minimisation plans that are adopted in today’s data centres (DCs). The highest important ones are those that depend on switching off unused physical machines (PMs). This is usually done by o...
详细信息
Photo sensing capability of an artificial synaptic device make it more valuable for brain-inspired computing systems, which can conquer the von Neumann bottleneck. In this letter, Ba0.7 Sr0.3 TiO3 (BST) based single l...
详细信息
Virtual reality (VR) systems are susceptible to cybersickness, significantly hindering user immersion. Very recently, researchers introduced explainable artificial intelligence (XAI) enabled methods for detecting and ...
详细信息
Amidst rising distributed generation and its potential role in grid management, this article presents a new realistic approach to determine the operational space and flexibility potential of an unbalanced active distr...
详细信息
Diffractive deep neural networks(D2NNs)are composed of successive transmissive layers optimized using supervised deep learning to all-optically implement various computational tasks between an input and output ***,we ...
详细信息
Diffractive deep neural networks(D2NNs)are composed of successive transmissive layers optimized using supervised deep learning to all-optically implement various computational tasks between an input and output ***,we present a pyramid-structured diffractive optical network design(which we term P-D2NN),optimized specifically for unidirectional image magnification and *** this design,the diffractive layers are pyramidally scaled in alignment with the direction of the image magnification or *** P-D2NN design creates high-fidelity magnified or demagnified images in only one direction,while inhibiting the image formation in the opposite direction—achieving the desired unidirectional imaging operation using a much smaller number of diffractive degrees of freedom within the optical processor ***,the P-D2NN design maintains its unidirectional image magnification/demagnification functionality across a large band of illumination wavelengths despite being trained with a single *** also designed a wavelength-multiplexed P-D2NN,where a unidirectional magnifier and a unidirectional demagnifier operate simultaneously in opposite directions,at two distinct illumination ***,we demonstrate that by cascading multiple unidirectional P-D2NN modules,we can achieve higher magnification *** efficacy of the P-D2NN architecture was also validated experimentally using terahertz illumination,successfully matching our numerical simulations.P-D2NN offers a physics-inspired strategy for designing task-specific visual processors.
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar...
详细信息
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)areas or high reward(quality)*** existing methods perform exploration by only utilizing the novelty of *** novelty and quality in the neighboring area of the current state have not been well utilized to simultaneously guide the agent’s *** address this problem,this paper proposes a novel RL framework,called clustered reinforcement learning(CRL),for efficient exploration in *** adopts clustering to divide the collected states into several clusters,based on which a bonus reward reflecting both novelty and quality in the neighboring area(cluster)of the current state is given to the *** leverages these bonus rewards to guide the agent to perform efficient ***,CRL can be combined with existing exploration strategies to improve their performance,as the bonus rewards employed by these existing exploration strategies solely capture the novelty of *** on four continuous control tasks and six hard-exploration Atari-2600 games show that our method can outperform other state-of-the-art methods to achieve the best performance.
electrical system planning of the large-scale offshore wind farm is usually based on N-1 security for equipment lectotype. However, in this method, owing to the aggregation effect in large-scale offshore wind farms, o...
详细信息
electrical system planning of the large-scale offshore wind farm is usually based on N-1 security for equipment lectotype. However, in this method, owing to the aggregation effect in large-scale offshore wind farms, offshore electrical equipment operates under low load for long periods, thus wasting resources. In this paper, we propose a method for electrical system planning of the large-scale offshore wind farm based on the N+ design. A planning model based on the power-limited operation of wind turbines under the N+ design is constructed, and a solution is derived with the optimization of the upper power limits of wind turbines. A comprehensive evaluation and game analysis of the economy, risk of wind abandonment, and environmental sustainability of the planned offshore electrical systems have been conducted. Moreover, the planning of an infield collector system, substation, and transmission system of an offshore electrical system based on the N+ design is integrated. For a domestic offshore wind farm, evaluation results show that the proposed planning method can improve the efficiency of wind energy utilization while greatly reducing the investment cost of the electrical system.
暂无评论