In the era of global digitalization, digital innovation hubs have become essential, as they function as transforming forces. In this paper, we provide an analysis of the Montenegrin Academic Digital Innovation Hub by ...
详细信息
作者:
Idema, R.Vuik, C.Delft University of Technology
Faculty of Electrical Engineering Mathematics and Computer Science Delft Institute of Applied Mathematics Mekelweg 4 Delft2628 CD Netherlands
It is well known that for general linear systems, only optimal Krylov methods with long recurrences exist. For special classes of linear systems it is possible to find optimal Krylov methods with short recurrences. In...
详细信息
Lithium-ion batteries are one of the most widely used types of batteries in various applications, including electronic devices, electric vehicles, and energy storage systems. However, battery discharging caused by par...
详细信息
ISBN:
(数字)9798331533243
ISBN:
(纸本)9798331533250
Lithium-ion batteries are one of the most widely used types of batteries in various applications, including electronic devices, electric vehicles, and energy storage systems. However, battery discharging caused by parasitic reactions between electrodes and electrolytes is one of the most common problems. New methods such as Convolutional Neural Networks (CNN) can help predict discharging modes and improve battery reliability and safety. CNN is used to predict discharging in lithium-ion batteries based on data collected during battery monitoring experiments at different load levels. The data is processed and modeled to support the predictive model. The methodological process involves data collection, data preprocessing, feature selection, and artificial intelligence model training. Model performance is tested using Root Mean Squared Error (RMSE), Mean Absolute Error (MAE), and Mean Absolute Percentage Error (MAPE) as metrics. The developed CNN model is observed to follow data trends. For the CNN model, an RMSE of 0.0255, MAE of 0.0182, and MAPE of 0.216% were obtained during the training process on 80% of the data for voltage prediction. The model has been tested to be applicable in real-world scenarios for detecting battery discharging.
In this paper, we study a new kind of pilot contamination appearing in multi-operator reconfigurable intelligent surfaces (RIS) assisted networks, where multiple operators provide services to their respective served u...
详细信息
Mobility-on-demand (MoD) systems consist of a fleet of shared vehicles that can be hailed for one-way point-to-point trips. The total distance driven by the vehicles and the fleet size can be reduced by employing ride...
详细信息
Federated learning (FL) is an emerging machine learning paradigm for training models across multiple edge devices holding local data sets, without explicitly exchanging the data. Recently, over-the-air (OTA) FL has be...
详细信息
The future of communication technology is moving from 5G to 6G with new innovations. Blockchain (BC) is a such immersive technology that significantly impacts the betterment of communication technology. BC-based spect...
The future of communication technology is moving from 5G to 6G with new innovations. Blockchain (BC) is a such immersive technology that significantly impacts the betterment of communication technology. BC-based spectrum-sharing solutions can be used in Dynamic Spectrum Access (DSA) systems to fulfill the need for secure and efficient communication. With the invention of cognitive radio networks, DSA became a popular topic for the scientific community. Spectrum misuse/violations can occur due to the rapid growth of spectrum sharing. As the system is open to malicious attacks, licensed spectrum owners must be identified and verified. However, the existing BC-based DSA solutions are more expensive, non-optimized, and lack spectrum misuse detection. This paper proposes a novel consensus algorithm called “Proof of Equation” for spectrum misuse detection. The core of the proposed algorithm is a consensus score calculation based on a numerical equation with three parameters rather than using cryptographic calculations. The performance of the proposed algorithm is studied using Python simulations, and simulation results show that the proposed algorithm outperforms the Proof of Work (PoW) and Proof of Stake (PoS) consensus algorithms in terms of block production time.
Quantitative algebras are algebras enriched in the category Met of metric spaces so that all operations are nonexpanding. Mardare, Plotkin and Panangaden introduced varieties (aka 1-basic varieties) as classes of quan...
详细信息
Anomaly detection is crucial for maintaining the reliability and security of wireless sensor networks and loT systems. Conventional methods require labeled data, often unavailable in these systems, making unsupervised...
Anomaly detection is crucial for maintaining the reliability and security of wireless sensor networks and loT systems. Conventional methods require labeled data, often unavailable in these systems, making unsupervised techniques essential. Deep learning has shown promise in unsupervised anomaly detection tasks, including wireless sensor networks and loT applications. The Isolation Forest, an unsupervised anomaly detection algorithm, isolates anomalies based on in-herent properties. Combining deep learning with the Isolation Forest can improve accuracy and effectiveness in detecting anomalies. This paper presents the Deep Generative Model with Isolation Forest (DGM-IF), a novel unsupervised anomaly detection method for wireless sensor networks and loT. DGM-IF integrates deep generative models with the Isolation Forest algorithm to learn a robust representation of normal data and identify anomalies. The model generates synthetic data based on the learned distribution and employs the Isolation Forest to separate deviating data points. The proposed technique is assessed using real-world datasets and benchmarked against cutting-edge methods, proving its efficacy in detecting anomalies. The DGM-IF approach has the potential to significantly enhance the reliability and security of wireless sensor networks and IoT systems by identifying potential threats and attacks.
Vehicular Ad-hoc Networks (VANETs) have many specific issues and challenges due to a heterogeneous and highly dynamic environment, and therefore traditional solutions need to be improved and adopted in order to satisf...
Vehicular Ad-hoc Networks (VANETs) have many specific issues and challenges due to a heterogeneous and highly dynamic environment, and therefore traditional solutions need to be improved and adopted in order to satisfy the networking and processing requirements. Fog and edge computing principles enable VANETs to achieve a more realistic and dependable architecture by using several layers for information processing. In this paper, the developed FOGO method is improved and customized for VANETs. The proposed solution is using an enhanced infrastructure in which additional mobile fog nodes are added to the network together with the existing stationary nodes. Small and medium sized messages are processed by mobile fog nodes, which then disseminate the results across the network. Roadside units (RSUs) are fixed, highly-capable devices positioned throughout the network to assist the processing of increasing volumes of data. Additionally, the cloud is taken into account, but only when processing large amounts of data. Along with the presented method flowcharts, operating algorithms, and message structure, the proposed system architecture is described. Furthermore, potential use cases are suggested together with the metrics for the system performance evaluation. The LuST scenario was used to evaluate the proposed architecture and the results showed improved message processing efficiency.
暂无评论