relative state
Recently Published Documents


TOTAL DOCUMENTS

143
(FIVE YEARS 40)

H-INDEX

15
(FIVE YEARS 2)

Energies ◽  
2021 ◽  
Vol 14 (21) ◽  
pp. 7206
Author(s):  
Sungwoo Jo ◽  
Sunkyu Jung ◽  
Taemoon Roh

Because lithium-ion batteries are widely used for various purposes, it is important to estimate their state of health (SOH) to ensure their efficiency and safety. Despite the usefulness of model-based methods for SOH estimation, the difficulties of battery modeling have resulted in a greater emphasis on machine learning for SOH estimation. Furthermore, data preprocessing has received much attention because it is an important step in determining the efficiency of machine learning methods. In this paper, we propose a new preprocessing method for improving the efficiency of machine learning for SOH estimation. The proposed method consists of the relative state of charge (SOC) and data processing, which transforms time-domain data into SOC-domain data. According to the correlation analysis, SOC-domain data are more correlated with the usable capacity than time-domain data. Furthermore, we compare the estimation results of SOC-based data and time-based data in feedforward neural networks (FNNs), convolutional neural networks (CNNs), and long short-term memory (LSTM). The results show that the SOC-based preprocessing outperforms conventional time-domain data-based techniques. Furthermore, the accuracy of the simplest FNN model with the proposed method is higher than that of the CNN model and the LSTM model with a conventional method when training data are small.


2021 ◽  
pp. 095269512110277
Author(s):  
Kateřina Lišková ◽  
Lucia Moravanská

Over the course of 40 years of state socialism, the explanation that Czechoslovak criminologists gave for spousal murder changed significantly. Initially attributing offences to the perpetrator's class origins, remnants of his bourgeois way of life, and the lack of positive influence from the collective in the long 1950s, criminologists then refocused their attention solely on the individual's psychopathology during the period known as ‘Normalization’, which encompassed the last two decades of state socialism. Based on an analysis of archival sources, including scholarly journals and expert reports, and following Ian Hacking's insight that ‘kinds of people come into being’ through the realignment of systems of knowledge, this article shows how new kinds of spousal murderer emerged as a result of shifting criminological expertise. We explain the change as the result of the psychiatrization of criminology that occurred in Czechoslovakia at a time when the regime needed to consolidate after the upheavals of the Prague Spring of 1968. The criminological framing of spousal murder as belonging squarely in the individualized realm of the private sphere reflected the contemporaneous effort of the regime to enclose the private as a sphere of relative state non-interference.


2021 ◽  
Vol 4 ◽  
pp. 105-116
Author(s):  
Valeriy Severyn ◽  
◽  
Elena Nikulina ◽  
◽  

Mathematical models of the WWER-1000 nuclear power reactor have been developed with division into zones along the vertical axis in the form of nonlinear systems of differential equations with dimensionless relative state variables. Models in a given number of zones along the vertical axis represent neutron kinetics, gradual heat release, thermal processes in fuel, cladding and coolant, changes in the concentration of iodine, xenon and boron. The parameters of mathematical models have been calculated based on the design and technological parameters of the V-320 series nuclear reactor. A general model of the reactor as a control object with division into zones along the vertical axis, as well as models with control of absorbing rods and boric acid, are obtained. Integration of the obtained systems of differential equations for given initial conditions allows one to obtain changes in all state variables in the reactor zones along the vertical axis. In particular, from the change in power in the zones along the vertical axis, the axial offset is calculated as the relative value of the difference between the powers of the upper and lower halves of the reactor core. The developed reactor models with dimensionless relative state variables use a minimum number of calculations, allow calculating the change in the axial offset, and are included in the information technology for controlling the power units of nuclear power plants to optimize the maneuvering modes of the WWER-1000 V-320 series reactor.


Author(s):  
Sil Kwong Tse ◽  
Yik Ben Wong ◽  
Jiawei Tang ◽  
Peihu Duan ◽  
Suk Wai Winnie Leung ◽  
...  

Author(s):  
Hongming SHEN ◽  
Qun ZONG ◽  
Hanchen LU ◽  
Xuewei ZHANG ◽  
Bailing TIAN ◽  
...  

Author(s):  
Alessia Nocerino ◽  
Roberto Opromolla ◽  
Giancarmine Fasano ◽  
Michele Grassi

Author(s):  
Schmitt Michael N

This chapter discusses the international law of cybersecurity, which, at just over two decades old, remains in a relative state of infancy. States continue to struggle with such basic issues as sovereignty in cyberspace. In great part, the challenge is that many States are conflicted over the application and interpretation of key aspects of international law in the cyber context. After all, although international law can serve as a normative firewall against hostile cyber operations, the principle of sovereign equality means that protective norms also can act as barriers to a State's own cyber operations, some of which may be deemed essential to the State, especially with respect to national security. These differences in normative perspective often play out domestically in disagreements between ministries with different roles vis-à-vis cyberspace, and internationally between States wielding offensive cyber capability and those that see themselves primarily as victims thereof. To examine the relationship between cybersecurity and international law, the chapter begins by cataloguing the development of the international law of cyberspace. It then turns to the substantive legal issues, paying particular attention to those matters that presently are the source of contention amongst States.


Author(s):  
Xiaoqian Wei ◽  
Jianying Yang ◽  
Xiangru Fan

To solve the problem of cooperative encirclement and simultaneous attack of multiple unmanned aerial vehicles, variational method and Hamiltonian optimization are utilized to design an optimal attack trajectory of multiple attackers pursuing a single target that has fixed initial relative state, fixed final relative state and fixed duration of the attack under condition that the acceleration of the target being estimable. When terminal relative state and attack duration are unknown, online calculation algorithm is used to compute a chain of key intermediate points to create the guidance law and ensure successful deliverance of multiple attackers’ simultaneous attack of the target. The only requirement for the multi-attacker communication network is that it contains a directed spanning tree. The guidance laws can function properly as long as one or more attacker can observe the target. The novel guidance laws practicability are verified by simulation results.


Sign in / Sign up

Export Citation Format

Share Document