139 research outputs found
Data Science-Based Full-Lifespan Management of Lithium-Ion Battery
This open access book comprehensively consolidates studies in the rapidly emerging field of battery management. The primary focus is to overview the new and emerging data science technologies for full-lifespan management of Li-ion batteries, which are categorized into three groups, namely (i) battery manufacturing management, (ii) battery operation management, and (iii) battery reutilization management. The key challenges, future trends as well as promising data-science technologies to further improve this research field are discussed. As battery full-lifespan (manufacturing, operation, and reutilization) management is a hot research topic in both energy and AI fields and none specific book has focused on systematically describing this particular from a data science perspective before, this book can attract the attention of academics, scientists, engineers, and practitioners. It is useful as a reference book for students and graduates working in related fields. Specifically, the audience could not only get the basics of battery manufacturing, operation, and reutilization but also the information of related data-science technologies. The step-by-step guidance, comprehensive introduction, and case studies to the topic make it accessible to audiences of different levels, from graduates to experienced engineers
Model migration neural network for predicting battery aging trajectories
Accurate prediction of batteries’ future degradation is a key solution to relief users’ anxiety on battery lifespan and electric vehicle’s driving range. Technical challenges arise from the highly nonlinear dynamics of battery aging. In this paper, a feed-forward migration neural network is proposed to predict the batteries’ aging trajectories. Specifically, a base model that describes the capacity decay over time is first established from the existed battery aging dataset. This base model is then transformed by an input-output slope-and-bias-correction (SBC) method structure to capture the degradation of target cell. To enhance the model’s nonlinear transfer capability, the SBC-model is further integrated into a four-layer neural network, and easily trained via the gradient correlation algorithm. The proposed migration neural network is experimentally verified with four different commercial batteries. The predicted RMSEs are all lower than 2.5% when using only the first 30% of aging trajectories for neural network training. In addition, illustrative results demonstrate that a small size feed-forward neural network (down to 1-5-5-1) is sufficient for battery aging trajectory prediction
Data Science-Based Full-Lifespan Management of Lithium-Ion Battery
This open access book comprehensively consolidates studies in the rapidly emerging field of battery management. The primary focus is to overview the new and emerging data science technologies for full-lifespan management of Li-ion batteries, which are categorized into three groups, namely (i) battery manufacturing management, (ii) battery operation management, and (iii) battery reutilization management. The key challenges, future trends as well as promising data-science technologies to further improve this research field are discussed. As battery full-lifespan (manufacturing, operation, and reutilization) management is a hot research topic in both energy and AI fields and none specific book has focused on systematically describing this particular from a data science perspective before, this book can attract the attention of academics, scientists, engineers, and practitioners. It is useful as a reference book for students and graduates working in related fields. Specifically, the audience could not only get the basics of battery manufacturing, operation, and reutilization but also the information of related data-science technologies. The step-by-step guidance, comprehensive introduction, and case studies to the topic make it accessible to audiences of different levels, from graduates to experienced engineers
HSD-001 Real DGPS Ocean Survey Location System
The HSD-001 high precision Real DGPS Ocean Survey Location System, validated by the Departmental Level Assessment in August 1992, is the first system to be used in China which incorporates GPS for dynamic positioning at sea. Characterized by a coordinate differential deviation of ±4 m, and a pseudo-range deviation of ±2-3 m, the system has filled an existing gap in China in this respect. A wide range of application in fields such as Ocean Survey, Marine Engineering Prospecting, Ocean Oil and Mineral Exploration, can be expected from it
Real-time aging trajectory prediction using a base model-oriented gradient-correction particle filter for Lithium-ion batteries
Predicting batteries' future degradation is essential for developing durable electric vehicles. The technical challenges arise from the absence of full battery degradation model and the inevitable local aging fluctuations in the uncontrolled environments. This paper proposes a base model-oriented gradient-correction particle filter (GC-PF) to predict aging trajectories of Lithium-ion batteries. Specifically, under the framework of typical particle filter, a gradient corrector is employed for each particle, resulting in the evolution of particle could follow the direction of gradient descent. This gradient corrector is also regulated by a base model. In this way, global information suggested by the base model is fully utilized, and the algorithm's sensitivity could be reduced accordingly. Further, according to the prediction deviations of base model, weighting factors between the local observations and base model can be updated adaptively. Four different battery datasets are used to extensively verify the proposed algorithm. Quantitatively, the RMSEs of GC-PF can be limited to 1.75%, which is 44% smaller than that of the conventional particle filter. In addition, the consistency of predictions when using different size of training data is also improved by 32%. Due to the pure data-driven nature, the proposed algorithm can also be extendable to other battery types
Prompt Injection attack against LLM-integrated Applications
Large Language Models (LLMs), renowned for their superior proficiency in
language comprehension and generation, stimulate a vibrant ecosystem of
applications around them. However, their extensive assimilation into various
services introduces significant security risks. This study deconstructs the
complexities and implications of prompt injection attacks on actual
LLM-integrated applications. Initially, we conduct an exploratory analysis on
ten commercial applications, highlighting the constraints of current attack
strategies in practice. Prompted by these limitations, we subsequently
formulate HouYi, a novel black-box prompt injection attack technique, which
draws inspiration from traditional web injection attacks. HouYi is
compartmentalized into three crucial elements: a seamlessly-incorporated
pre-constructed prompt, an injection prompt inducing context partition, and a
malicious payload designed to fulfill the attack objectives. Leveraging HouYi,
we unveil previously unknown and severe attack outcomes, such as unrestricted
arbitrary LLM usage and uncomplicated application prompt theft. We deploy HouYi
on 36 actual LLM-integrated applications and discern 31 applications
susceptible to prompt injection. 10 vendors have validated our discoveries,
including Notion, which has the potential to impact millions of users. Our
investigation illuminates both the possible risks of prompt injection attacks
and the possible tactics for mitigation
Jailbreaker: Automated Jailbreak Across Multiple Large Language Model Chatbots
Large Language Models (LLMs) have revolutionized Artificial Intelligence (AI)
services due to their exceptional proficiency in understanding and generating
human-like text. LLM chatbots, in particular, have seen widespread adoption,
transforming human-machine interactions. However, these LLM chatbots are
susceptible to "jailbreak" attacks, where malicious users manipulate prompts to
elicit inappropriate or sensitive responses, contravening service policies.
Despite existing attempts to mitigate such threats, our research reveals a
substantial gap in our understanding of these vulnerabilities, largely due to
the undisclosed defensive measures implemented by LLM service providers.
In this paper, we present Jailbreaker, a comprehensive framework that offers
an in-depth understanding of jailbreak attacks and countermeasures. Our work
makes a dual contribution. First, we propose an innovative methodology inspired
by time-based SQL injection techniques to reverse-engineer the defensive
strategies of prominent LLM chatbots, such as ChatGPT, Bard, and Bing Chat.
This time-sensitive approach uncovers intricate details about these services'
defenses, facilitating a proof-of-concept attack that successfully bypasses
their mechanisms. Second, we introduce an automatic generation method for
jailbreak prompts. Leveraging a fine-tuned LLM, we validate the potential of
automated jailbreak generation across various commercial LLM chatbots. Our
method achieves a promising average success rate of 21.58%, significantly
outperforming the effectiveness of existing techniques. We have responsibly
disclosed our findings to the concerned service providers, underscoring the
urgent need for more robust defenses. Jailbreaker thus marks a significant step
towards understanding and mitigating jailbreak threats in the realm of LLM
chatbots
Large Language Models for Software Engineering: A Systematic Literature Review
Large Language Models (LLMs) have significantly impacted numerous domains,
notably including Software Engineering (SE). Nevertheless, a well-rounded
understanding of the application, effects, and possible limitations of LLMs
within SE is still in its early stages. To bridge this gap, our systematic
literature review takes a deep dive into the intersection of LLMs and SE, with
a particular focus on understanding how LLMs can be exploited in SE to optimize
processes and outcomes. Through a comprehensive review approach, we collect and
analyze a total of 229 research papers from 2017 to 2023 to answer four key
research questions (RQs). In RQ1, we categorize and provide a comparative
analysis of different LLMs that have been employed in SE tasks, laying out
their distinctive features and uses. For RQ2, we detail the methods involved in
data collection, preprocessing, and application in this realm, shedding light
on the critical role of robust, well-curated datasets for successful LLM
implementation. RQ3 allows us to examine the specific SE tasks where LLMs have
shown remarkable success, illuminating their practical contributions to the
field. Finally, RQ4 investigates the strategies employed to optimize and
evaluate the performance of LLMs in SE, as well as the common techniques
related to prompt optimization. Armed with insights drawn from addressing the
aforementioned RQs, we sketch a picture of the current state-of-the-art,
pinpointing trends, identifying gaps in existing research, and flagging
promising areas for future study
Robust Optical Data Encryption by Projection-Photoaligned Polymer-Stabilized-Liquid-Crystals
The emerging Internet of Things (IoTs) invokes increasing security demands
that require robust encryption or anti-counterfeiting technologies. Albeit
being acknowledged as efficacious solutions in processing elaborate graphical
information via multiple degrees of freedom, optical data encryption and
anti-counterfeiting techniques are typically inept in delivering satisfactory
performance without compromising the desired ease-of-processibility or
compatibility, thus leading to the exploration of novel materials and devices
that are competent. Here, a robust optical data encryption technique is
demonstrated utilizing polymer-stabilized-liquid-crystals (PSLCs) combined with
projection photoalignment and photopatterning methods. The PSLCs possess
implicit optical patterns encoded via photoalignment, as well as explicit
geometries produced via photopatterning. Furthermore, the PSLCs demonstrate
improved robustness against harsh chemical environments and thermal stability,
and can be directly deployed onto various rigid and flexible substrates. Based
on this, it is demonstrated that single PSLC is apt to carry intricate
information, or serve as exclusive watermark with both implicit features and
explicit geometries. Moreover, a novel, generalized design strategy is
developed, for the first time, to encode intricate and exclusive information
with enhanced security by spatially programming the photoalignment patterns of
a pair of cascade PSLCs, which further illustrates the promising capabilies of
PSLCs in optical data encryption and anti-counterfeiting
- …