Power systems are evolving from centralized power grid structures to networks of intelligent microgrids (MGs) that can share power more independently. The interconnection between these MGs, forming the networked MGs (...
详细信息
For the large amount of waste heat wasted in daily life and industrial production,we propose a new type of flexible thermoelectric generators(F-TEGs)which can be used as a large area bionic skin to achieve energy harv...
详细信息
For the large amount of waste heat wasted in daily life and industrial production,we propose a new type of flexible thermoelectric generators(F-TEGs)which can be used as a large area bionic skin to achieve energy harvesting of thermal *** reference to biological structures such as pinecone,succulent,and feathers,we have designed and fabricated a biomimetic flexible TEG that can be applied in a wide temperature range which has the highest temperature energy harvesting capability *** laminated free structure of the bionic F-TEG dramatically increases the efficiency and density of energy *** F-TEGs(single TEG only 101.2 mg in weight),without an additional heat sink,demonstrates the highest output voltage density of 286.1 mV/cm^(2)and the maximum power density is 66.5 mW/m^(2) at a temperature difference of nearly 1000℃.The flexible characteristics of F-TEGs make it possible to collect the diffused thermal energy by flexible attachment to the outer walls of high-temperature pipes and vessels of different diameters and *** work shows a new design and application concept for flexible thermal energy collectors,which fills the gap of flexible energy harvesting in high-temperature environment.
We propose a theoretical approach for the realization of unidirectional light scattering without spatial patterning, enabled by correlated photonic disorder in time domain. Our study enables novel photonic devices suc...
详细信息
We study the problem of policy estimation for the Linear Quadratic Regulator (LQR) in discrete-time linear timeinvariant uncertain dynamical systems. We propose a Moreau Envelope-based surrogate LQR cost, built from a...
详细信息
Emergency lighting systems are an essential component of building safety infrastructure and play a critical role in ensuring the safety of people during power outages or other emergencies. As energy efficiency and env...
详细信息
The increasing integration of distributed energy resources in distribution networks has significantly reduced system inertia, posing challenges to grid stability during transient events, such as Cold Load Pickup (CLPU...
详细信息
Detecting P300 event-related potentials (ERPs) from electroencephalography (EEG) finds applications in several domains including brain computer interfaces (BCIs). Due to the low signal-to-noise ratio (SNR), however, d...
详细信息
Identifying spatiotemporal differences in brain functional dynamics corresponding to two tasks is critical for under-standing how specific neural processes contribute to distinct tasks or cognitive functions. Traditio...
详细信息
This paper investigates the pursuit-evasion problem involving one evader and multiple pursuers with limited sensing capability, where the evader tries to maximize the distance with the pursuers, while the pursuers hav...
This paper investigates the pursuit-evasion problem involving one evader and multiple pursuers with limited sensing capability, where the evader tries to maximize the distance with the pursuers, while the pursuers have different objectives based on whether they can receive the information of the evader. The subgroup of pursuers who can observe the evader(called leaders) tries to be close to the evader, and the other subgroup of pursuers(called followers) tries to synchronize with their neighbors. When the subgraph formed by all leaders is complete, sufficient conditions are given to guarantee that the pursuers capture the evader and the pursuit-evasion game composed of the evader and leaders reaches Nash equilibrium. Furthermore, for the incomplete subgraph case, the distributed observers are proposed to estimate the relative positions between the evader and all leaders. It is shown that the distributed control strategy based on the observers converges exponentially to the Nash equilibrium solution, and makes the pursuers capture the evader. Finally, simulation examples are provided to verify the effectiveness of the proposed strategies.
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix suc...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix such *** propose an automated program repair method based on controlled text generation ***,we utilize a fine-tuned language model for patch generation and introduce a discriminator to evaluate the generation process,selecting results that contribute most to vulnerability ***,we perform static syntax analysis to expedite the patch verification *** effectiveness of the proposed approach is validated using QuixBugs and Defects4J datasets,demonstrating significant improvements in generating correct patches compared to other existing methods.
暂无评论