139 research outputs found

    Data Science-Based Full-Lifespan Management of Lithium-Ion Battery

    Get PDF
    This open access book comprehensively consolidates studies in the rapidly emerging field of battery management. The primary focus is to overview the new and emerging data science technologies for full-lifespan management of Li-ion batteries, which are categorized into three groups, namely (i) battery manufacturing management, (ii) battery operation management, and (iii) battery reutilization management. The key challenges, future trends as well as promising data-science technologies to further improve this research field are discussed. As battery full-lifespan (manufacturing, operation, and reutilization) management is a hot research topic in both energy and AI fields and none specific book has focused on systematically describing this particular from a data science perspective before, this book can attract the attention of academics, scientists, engineers, and practitioners. It is useful as a reference book for students and graduates working in related fields. Specifically, the audience could not only get the basics of battery manufacturing, operation, and reutilization but also the information of related data-science technologies. The step-by-step guidance, comprehensive introduction, and case studies to the topic make it accessible to audiences of different levels, from graduates to experienced engineers

    Model migration neural network for predicting battery aging trajectories

    Get PDF
    Accurate prediction of batteries’ future degradation is a key solution to relief users’ anxiety on battery lifespan and electric vehicle’s driving range. Technical challenges arise from the highly nonlinear dynamics of battery aging. In this paper, a feed-forward migration neural network is proposed to predict the batteries’ aging trajectories. Specifically, a base model that describes the capacity decay over time is first established from the existed battery aging dataset. This base model is then transformed by an input-output slope-and-bias-correction (SBC) method structure to capture the degradation of target cell. To enhance the model’s nonlinear transfer capability, the SBC-model is further integrated into a four-layer neural network, and easily trained via the gradient correlation algorithm. The proposed migration neural network is experimentally verified with four different commercial batteries. The predicted RMSEs are all lower than 2.5% when using only the first 30% of aging trajectories for neural network training. In addition, illustrative results demonstrate that a small size feed-forward neural network (down to 1-5-5-1) is sufficient for battery aging trajectory prediction

    Data Science-Based Full-Lifespan Management of Lithium-Ion Battery

    Get PDF
    This open access book comprehensively consolidates studies in the rapidly emerging field of battery management. The primary focus is to overview the new and emerging data science technologies for full-lifespan management of Li-ion batteries, which are categorized into three groups, namely (i) battery manufacturing management, (ii) battery operation management, and (iii) battery reutilization management. The key challenges, future trends as well as promising data-science technologies to further improve this research field are discussed. As battery full-lifespan (manufacturing, operation, and reutilization) management is a hot research topic in both energy and AI fields and none specific book has focused on systematically describing this particular from a data science perspective before, this book can attract the attention of academics, scientists, engineers, and practitioners. It is useful as a reference book for students and graduates working in related fields. Specifically, the audience could not only get the basics of battery manufacturing, operation, and reutilization but also the information of related data-science technologies. The step-by-step guidance, comprehensive introduction, and case studies to the topic make it accessible to audiences of different levels, from graduates to experienced engineers

    HSD-001 Real DGPS Ocean Survey Location System

    Get PDF
    The HSD-001 high precision Real DGPS Ocean Survey Location System, validated by the Departmental Level Assessment in August 1992, is the first system to be used in China which incorporates GPS for dynamic positioning at sea. Characterized by a coordinate differential deviation of ±4 m, and a pseudo-range deviation of ±2-3 m, the system has filled an existing gap in China in this respect. A wide range of application in fields such as Ocean Survey, Marine Engineering Prospecting, Ocean Oil and Mineral Exploration, can be expected from it

    Real-time aging trajectory prediction using a base model-oriented gradient-correction particle filter for Lithium-ion batteries

    Get PDF
    Predicting batteries' future degradation is essential for developing durable electric vehicles. The technical challenges arise from the absence of full battery degradation model and the inevitable local aging fluctuations in the uncontrolled environments. This paper proposes a base model-oriented gradient-correction particle filter (GC-PF) to predict aging trajectories of Lithium-ion batteries. Specifically, under the framework of typical particle filter, a gradient corrector is employed for each particle, resulting in the evolution of particle could follow the direction of gradient descent. This gradient corrector is also regulated by a base model. In this way, global information suggested by the base model is fully utilized, and the algorithm's sensitivity could be reduced accordingly. Further, according to the prediction deviations of base model, weighting factors between the local observations and base model can be updated adaptively. Four different battery datasets are used to extensively verify the proposed algorithm. Quantitatively, the RMSEs of GC-PF can be limited to 1.75%, which is 44% smaller than that of the conventional particle filter. In addition, the consistency of predictions when using different size of training data is also improved by 32%. Due to the pure data-driven nature, the proposed algorithm can also be extendable to other battery types

    Prompt Injection attack against LLM-integrated Applications

    Full text link
    Large Language Models (LLMs), renowned for their superior proficiency in language comprehension and generation, stimulate a vibrant ecosystem of applications around them. However, their extensive assimilation into various services introduces significant security risks. This study deconstructs the complexities and implications of prompt injection attacks on actual LLM-integrated applications. Initially, we conduct an exploratory analysis on ten commercial applications, highlighting the constraints of current attack strategies in practice. Prompted by these limitations, we subsequently formulate HouYi, a novel black-box prompt injection attack technique, which draws inspiration from traditional web injection attacks. HouYi is compartmentalized into three crucial elements: a seamlessly-incorporated pre-constructed prompt, an injection prompt inducing context partition, and a malicious payload designed to fulfill the attack objectives. Leveraging HouYi, we unveil previously unknown and severe attack outcomes, such as unrestricted arbitrary LLM usage and uncomplicated application prompt theft. We deploy HouYi on 36 actual LLM-integrated applications and discern 31 applications susceptible to prompt injection. 10 vendors have validated our discoveries, including Notion, which has the potential to impact millions of users. Our investigation illuminates both the possible risks of prompt injection attacks and the possible tactics for mitigation

    Jailbreaker: Automated Jailbreak Across Multiple Large Language Model Chatbots

    Full text link
    Large Language Models (LLMs) have revolutionized Artificial Intelligence (AI) services due to their exceptional proficiency in understanding and generating human-like text. LLM chatbots, in particular, have seen widespread adoption, transforming human-machine interactions. However, these LLM chatbots are susceptible to "jailbreak" attacks, where malicious users manipulate prompts to elicit inappropriate or sensitive responses, contravening service policies. Despite existing attempts to mitigate such threats, our research reveals a substantial gap in our understanding of these vulnerabilities, largely due to the undisclosed defensive measures implemented by LLM service providers. In this paper, we present Jailbreaker, a comprehensive framework that offers an in-depth understanding of jailbreak attacks and countermeasures. Our work makes a dual contribution. First, we propose an innovative methodology inspired by time-based SQL injection techniques to reverse-engineer the defensive strategies of prominent LLM chatbots, such as ChatGPT, Bard, and Bing Chat. This time-sensitive approach uncovers intricate details about these services' defenses, facilitating a proof-of-concept attack that successfully bypasses their mechanisms. Second, we introduce an automatic generation method for jailbreak prompts. Leveraging a fine-tuned LLM, we validate the potential of automated jailbreak generation across various commercial LLM chatbots. Our method achieves a promising average success rate of 21.58%, significantly outperforming the effectiveness of existing techniques. We have responsibly disclosed our findings to the concerned service providers, underscoring the urgent need for more robust defenses. Jailbreaker thus marks a significant step towards understanding and mitigating jailbreak threats in the realm of LLM chatbots

    Large Language Models for Software Engineering: A Systematic Literature Review

    Full text link
    Large Language Models (LLMs) have significantly impacted numerous domains, notably including Software Engineering (SE). Nevertheless, a well-rounded understanding of the application, effects, and possible limitations of LLMs within SE is still in its early stages. To bridge this gap, our systematic literature review takes a deep dive into the intersection of LLMs and SE, with a particular focus on understanding how LLMs can be exploited in SE to optimize processes and outcomes. Through a comprehensive review approach, we collect and analyze a total of 229 research papers from 2017 to 2023 to answer four key research questions (RQs). In RQ1, we categorize and provide a comparative analysis of different LLMs that have been employed in SE tasks, laying out their distinctive features and uses. For RQ2, we detail the methods involved in data collection, preprocessing, and application in this realm, shedding light on the critical role of robust, well-curated datasets for successful LLM implementation. RQ3 allows us to examine the specific SE tasks where LLMs have shown remarkable success, illuminating their practical contributions to the field. Finally, RQ4 investigates the strategies employed to optimize and evaluate the performance of LLMs in SE, as well as the common techniques related to prompt optimization. Armed with insights drawn from addressing the aforementioned RQs, we sketch a picture of the current state-of-the-art, pinpointing trends, identifying gaps in existing research, and flagging promising areas for future study

    Robust Optical Data Encryption by Projection-Photoaligned Polymer-Stabilized-Liquid-Crystals

    Full text link
    The emerging Internet of Things (IoTs) invokes increasing security demands that require robust encryption or anti-counterfeiting technologies. Albeit being acknowledged as efficacious solutions in processing elaborate graphical information via multiple degrees of freedom, optical data encryption and anti-counterfeiting techniques are typically inept in delivering satisfactory performance without compromising the desired ease-of-processibility or compatibility, thus leading to the exploration of novel materials and devices that are competent. Here, a robust optical data encryption technique is demonstrated utilizing polymer-stabilized-liquid-crystals (PSLCs) combined with projection photoalignment and photopatterning methods. The PSLCs possess implicit optical patterns encoded via photoalignment, as well as explicit geometries produced via photopatterning. Furthermore, the PSLCs demonstrate improved robustness against harsh chemical environments and thermal stability, and can be directly deployed onto various rigid and flexible substrates. Based on this, it is demonstrated that single PSLC is apt to carry intricate information, or serve as exclusive watermark with both implicit features and explicit geometries. Moreover, a novel, generalized design strategy is developed, for the first time, to encode intricate and exclusive information with enhanced security by spatially programming the photoalignment patterns of a pair of cascade PSLCs, which further illustrates the promising capabilies of PSLCs in optical data encryption and anti-counterfeiting
    • …
    corecore