Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (34)

Search Parameters:
Keywords = g-extra connectivity

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 1386 KB  
Article
A Hybrid Zero Trust Deployment Model for Securing O-RAN Architecture in 6G Networks
by Max Hashem Eiza, Brian Akwirry, Alessandro Raschella, Michael Mackay and Mukesh Kumar Maheshwari
Future Internet 2025, 17(8), 372; https://doi.org/10.3390/fi17080372 - 18 Aug 2025
Viewed by 1044
Abstract
The evolution toward sixth generation (6G) wireless networks promises higher performance, greater flexibility, and enhanced intelligence. However, it also introduces a substantially enlarged attack surface driven by open, disaggregated, and multi-vendor Open RAN (O-RAN) architectures that will be utilised in 6G networks. This [...] Read more.
The evolution toward sixth generation (6G) wireless networks promises higher performance, greater flexibility, and enhanced intelligence. However, it also introduces a substantially enlarged attack surface driven by open, disaggregated, and multi-vendor Open RAN (O-RAN) architectures that will be utilised in 6G networks. This paper addresses the urgent need for a practical Zero Trust (ZT) deployment model tailored to O-RAN specification. To do so, we introduce a novel hybrid ZT deployment model that establishes the trusted foundation for AI/ML-driven security in O-RAN, integrating macro-level enclave segmentation with micro-level application sandboxing for xApps/rApps. In our model, the Policy Decision Point (PDP) centrally manages dynamic policies, while distributed Policy Enforcement Points (PEPs) reside in logical enclaves, agents, and gateways to enable per-session, least-privilege access control across all O-RAN interfaces. We demonstrate feasibility via a Proof of Concept (PoC) implemented with Kubernetes and Istio and based on the NIST Policy Machine (PM). The PoC illustrates how pods can represent enclaves and sidecar proxies can embody combined agent/gateway functions. Performance discussion indicates that enclave-based deployment adds 1–10 ms of additional per-connection latency while CPU/memory overhead from running a sidecar proxy per enclave is approximately 5–10% extra utilisation, with each proxy consuming roughly 100–200 MB of RAM. Full article
(This article belongs to the Special Issue Secure and Trustworthy Next Generation O-RAN Optimisation)
Show Figures

Figure 1

12 pages, 283 KB  
Article
The Reliability of Cayley Graphs Generated by Transposition Trees Based on Edge Failures
by Xiang-Jun Li, Lin-Fei Dong, Ling-Xing Qin, Chai Shu and Mei-Jie Ma
Symmetry 2025, 17(6), 918; https://doi.org/10.3390/sym17060918 - 10 Jun 2025
Viewed by 827
Abstract
Extra edge connectivity is an important parameter for measuring the reliability of interconnection networks. Given a graph G and a non-negative integer h, the h-extra edge connectivity of G, denoted by λhG, is the minimum cardinality of a [...] Read more.
Extra edge connectivity is an important parameter for measuring the reliability of interconnection networks. Given a graph G and a non-negative integer h, the h-extra edge connectivity of G, denoted by λhG, is the minimum cardinality of a set of edges in G (if it exists) whose deletion disconnects G such that each remaining component contains at least h+1 vertices. In this paper, we obtain the h-extra edge connectivity of Cayley graphs generated by transposition trees for h5. As byproducts, we derive the h-extra edge connectivity of the star graph Sn and the bubble-sort graph Bn for h5. Full article
(This article belongs to the Section Mathematics)
Show Figures

Figure 1

13 pages, 1366 KB  
Article
Structure Fault Tolerance of Fully Connected Cubic Networks
by Eminjan Sabir and Cheng-Kuan Lin
Mathematics 2025, 13(9), 1532; https://doi.org/10.3390/math13091532 - 7 May 2025
Viewed by 573
Abstract
An interconnection network is usually modeled by a graph, and fault tolerance of the interconnection network is often measured by connectivity of the graph. Given a connected subgraph L of a graph G and non-negative integer t, the t-extra connectivity [...] Read more.
An interconnection network is usually modeled by a graph, and fault tolerance of the interconnection network is often measured by connectivity of the graph. Given a connected subgraph L of a graph G and non-negative integer t, the t-extra connectivity κt(G), the L-structure connectivity κ(G;L) and the t-extra L-structure connectivity κg(G;L) of G can provide new metrics to measure the fault tolerance of a network represented by G. Fully connected cubic networks FCn are a class of hierarchical networks which enjoy the strengths of a constant vertex degree and good expansibility. In this paper, we determine κt(FCn), κ(FCn;L) and κt(FCn;L) for t=1 and L{K1,1,K1,2,K1,3}. We also establish the edge versions λt(FCn), λ(FCn;L) and λt(FCn;L) for t=1 and L{K1,1,K1,2}. Full article
Show Figures

Figure 1

11 pages, 342 KB  
Article
Reliability Analysis of (n, k)-Bubble-Sort Networks Based on Extra Conditional Fault
by Lina Zhao, Shiying Wang and Feng Dou
Mathematics 2024, 12(18), 2939; https://doi.org/10.3390/math12182939 - 21 Sep 2024
Viewed by 902
Abstract
Given a graph G=(V(G),V(E)), a non-negative integer g and a set of faulty vertices FV(G), the g-extra connectivity of G, denoted by  [...] Read more.
Given a graph G=(V(G),V(E)), a non-negative integer g and a set of faulty vertices FV(G), the g-extra connectivity of G, denoted by κg(G), is the smallest cardinality of F, whose value of deletion, if exists, will disconnect G and give each remaining component at least g+1 vertices. The g-extra diagnosability of the graph G, denoted by tg(G), is the maximum cardinality of the set F of fault vertices that the graph can guarantee to identify under the condition that each fault-free component has more than g vertices. In this paper, we determine that g-extra connectivity of (n,k)-bubble-sort network Bn,k is κg(Bn,k)=n+g(k2)1 for 4kn1 and 0gnk. Afterwards, we show that g-extra diagnosability of Bn,k under the PMC model (4kn1 and 0gnk) and MM* model (4kn1 and 0gmin{nk1,k2}) is tg(Bn,k)=n+g(k1)1, respectively. Full article
Show Figures

Figure 1

19 pages, 2049 KB  
Article
Research on SDP-BF Method with Low False Positive Face to Passive Detection System
by Chenzhuo Jiang, Junjie Li and Yuxiao Yang
Electronics 2024, 13(16), 3240; https://doi.org/10.3390/electronics13163240 - 15 Aug 2024
Viewed by 1027
Abstract
With the rapid development of 5G, UAV, and military communications, the data volume obtained by the non-cooperative perception system has increased exponentially, and the distributed system has become the development trend of the non-cooperative perception system. The data distribution service (DDS) produces a [...] Read more.
With the rapid development of 5G, UAV, and military communications, the data volume obtained by the non-cooperative perception system has increased exponentially, and the distributed system has become the development trend of the non-cooperative perception system. The data distribution service (DDS) produces a significant effect on the performance of distributed non-cooperative perception systems. However, the traditional DDS discovery protocol has problems such as false positive misjudgment and high flow overhead, so it can hardly adapt to a large multi-node distributed system. Therefore, the design of a DDS discovery protocol for large distributed system is technically challenging. In this paper, we proposed SDP-DCBF-SFF, a discovery protocol based on the Dynamic Counter Bloom Filter (DCBF) and Second Feedback Filter (SFF). The proposed discovery protocol coarsely filters the interested endpoints through DCBF and then accurately screens the uninterested endpoints through SFF to eliminate the connection requests of false positive endpoints and avoid extra flow overhead. The experimental results indicate that the proposed discovery protocol could effectively reduce the network overhead, and eliminate the false positive probability of endpoints in small, medium, large, and super large systems. In addition, it adopts the self-adaptive extension mechanism of BF to reduce the reconfiguration delay of BF and achieve the smallest system transmission delay. Therefore, the proposed discovery protocol has optimal comprehensive performance and system adaptability. Full article
(This article belongs to the Special Issue Applications of Sensor Networks and Wireless Communications)
Show Figures

Figure 1

30 pages, 5624 KB  
Article
Supporting Differentiated Streaming Services in Heterogeneous Vehicle-to-Everything Networks
by Chenn-Jung Huang, Kai-Wen Hu, Hao-Wen Cheng, Mei-En Jian and Muhammad Inas Farras Tsamarah
Sensors 2024, 24(15), 5007; https://doi.org/10.3390/s24155007 - 2 Aug 2024
Viewed by 1391
Abstract
Advancements in assisted driving technologies are expected to enable future passengers to use a wide range of multimedia applications in electric vehicles (EVs). To address the bandwidth demands for high-resolution and immersive videos during peak traffic, this study introduces a bandwidth-management algorithm to [...] Read more.
Advancements in assisted driving technologies are expected to enable future passengers to use a wide range of multimedia applications in electric vehicles (EVs). To address the bandwidth demands for high-resolution and immersive videos during peak traffic, this study introduces a bandwidth-management algorithm to support differentiated streaming services in heterogeneous vehicle-to-everything (V2X) networks. By leveraging cellular 6G base stations, along with Cell-Free (CF) Massive Multi-Input Multi-Output (mMIMO) Wi-Fi 7 access points, the algorithm aims to provide a high-coverage, high-speed, and low-interference V2X network environment. Additionally, Li-Fi technology is employed to supply extra bandwidth to vehicles with limited connectivity via V2V communication. Importantly, the study addresses the urgency and prioritization of different applications to ensure the smooth execution of emergency applications and introduces a pre-downloading mechanism specifically for non-real-time applications. Through simulations, the algorithm’s effectiveness in meeting EV users’ bandwidth needs for various multimedia streaming applications is demonstrated. During peak-bandwidth-demand periods, users experienced an average increase in bandwidth of 47%. Furthermore, bandwidth utilization across the V2X landscape is significantly improved. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

18 pages, 517 KB  
Article
A Validation of the Phenomenon of Linearly Many Faults on Burnt Pancake Graphs with Its Applications
by Mei-Mei Gu, Hong-Xia Yan and Jou-Ming Chang
Mathematics 2024, 12(2), 268; https://doi.org/10.3390/math12020268 - 14 Jan 2024
Cited by 1 | Viewed by 1273
Abstract
“Linearly many faults” is a phenomenon observed by Cheng and Lipták in which a specific structure emerges when a graph is disconnected and often occurs in various interconnection networks. This phenomenon means that if a certain number of vertices or edges are deleted [...] Read more.
“Linearly many faults” is a phenomenon observed by Cheng and Lipták in which a specific structure emerges when a graph is disconnected and often occurs in various interconnection networks. This phenomenon means that if a certain number of vertices or edges are deleted from a graph, the remaining part either stays connected or breaks into one large component along with smaller components with just a few vertices. This phenomenon can be observed in many types of graphs and has important implications for network analysis and optimization. In this paper, we first validate the phenomenon of linearly many faults for surviving graph of a burnt pancake graph BPn when removing any edge subset with a size of approximately six times λ(BPn). For graph G, the -component edge connectivity denoted as λ(G) (resp., the -extra edge connectivity denoted as λ()(G)) is the cardinality of a minimum edge subset S such that GS is disconnected and has at least components (resp., each component of GS has at least +1 vertices). Both λ(G) and eλ()(G) are essential metrics for network reliability assessment. Specifically, from the property of “linearly many faults”, we may further prove that λ5(BPn)=λ(3)(BPn)+3=4n3 for n5; λ6(BPn)=λ(4)(BPn)+4=5n4 and λ7(BPn)=λ(5)(BPn)+5=6n5 for n6. Full article
(This article belongs to the Special Issue Graph Theory: Advanced Algorithms and Applications)
Show Figures

Figure 1

26 pages, 2138 KB  
Article
Protecting Hybrid ITS Networks: A Comprehensive Security Approach
by Ricardo Severino, José Simão, Nuno Datia and António Serrador
Future Internet 2023, 15(12), 388; https://doi.org/10.3390/fi15120388 - 30 Nov 2023
Cited by 2 | Viewed by 3268
Abstract
Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attackers can exploit. This represents a threat to all road users, as security failures [...] Read more.
Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attackers can exploit. This represents a threat to all road users, as security failures can lead to privacy violations or even fatalities. Moreover, a high fatality rate is correlated with soft-mobility road users. Therefore, when developing C-ITS systems, it is important to broaden the focus beyond connected vehicles to include soft-mobility users and legacy vehicles. This work presents a new approach developed in the context of emerging hybrid networks, combining intelligent transport systems operating in 5.9 GHz (ITS-G5) and radio-mobile cellular technologies. Two protocols were implemented and evaluated to introduce security guarantees (such as privacy and integrity) in communications within the developed C-ITS hybrid environment. As a result, this work securely integrates G5-connected ITS stations and soft-mobility users through a smartphone application via cellular networks. Commercial equipment was used for this goal, including on-board and roadside units. Computational, transmission and end-to-end latency were used to assess the system’s performance. Implemented protocols introduce an additional 11% end-to-end latency in hybrid communications. Moreover, workflows employing hybrid communications impose, on average, an extra 28.29 ms of end-to-end latency. The proposal shows promise, as it reaches end-to-end times below the latency requirements imposed in most C-ITS use cases. Full article
(This article belongs to the Special Issue Inter-Vehicle Communication Protocols and Their Applications)
Show Figures

Figure 1

12 pages, 4583 KB  
Article
Development of a Low-Cost Artificial Vision System as an Alternative for the Automatic Classification of Persian Lemon: Prototype Test Simulation
by Bridget V. Granados-Vega, Carlos Maldonado-Flores, Camila S. Gómez-Navarro, Walter M. Warren-Vega, Armando Campos-Rodríguez and Luis A. Romero-Cano
Foods 2023, 12(20), 3829; https://doi.org/10.3390/foods12203829 - 19 Oct 2023
Cited by 5 | Viewed by 2485
Abstract
In the present research work, an algorithm of artificial neural network (ANN) has been developed based on the processing of digital images of Persian lemons with the aim of optimizing the quality control of the product. For this purpose, the physical properties (weight, [...] Read more.
In the present research work, an algorithm of artificial neural network (ANN) has been developed based on the processing of digital images of Persian lemons with the aim of optimizing the quality control of the product. For this purpose, the physical properties (weight, thickness of the peel, diameter, length, and color) of 90 lemons selected from the company Esperanza de San José Ornelas SPR de RL (Jalisco, Mexico) were studied, which were divided into three groups (Category “extra”, Category I, and Category II) according to their characteristics. The parameters of weight (26.50 ± 3.00 g), diameter/length (0.92 ± 0.08) and thickness of the peel (1.50 ± 0.29 mm) did not present significant differences between groups. On the other hand, the color (determined by the RGB and HSV models) presents statistically significant changes between groups. Due to the above, the proposed ANN correctly classifies 96.60% of the data obtained for each of the groups studied. Once the ANN was trained, its application was tested in an automatic classification process. For this purpose, a prototype based on the operation of a stepper motor was simulated using Simulink from Matlab, which is connected to three ideal switches powered by three variable pulse generators that receive the information from an ANN and provide the corresponding signal for the motor to turn to a specific position. Manual classification is a process that requires expert personnel and is prone to human error. The scientific development presented shows an alternative for the automation of the process using low-cost computational tools as a potential alternative. Full article
(This article belongs to the Special Issue Applications of Artificial Intelligence in Food Industry)
Show Figures

Figure 1

11 pages, 496 KB  
Article
Generalized Connectivity of the Mycielskian Graph under g-Extra Restriction
by Jinyu Zou, He Li, Shumin Zhang and Chengfu Ye
Mathematics 2023, 11(19), 4043; https://doi.org/10.3390/math11194043 - 23 Sep 2023
Viewed by 1520
Abstract
The g-extra connectivity is a very important index to evaluate the fault tolerance, reliability of interconnection networks. Let g be a non-negative integer, G be a connected graph with vertex set V and edge set E, a subset SV [...] Read more.
The g-extra connectivity is a very important index to evaluate the fault tolerance, reliability of interconnection networks. Let g be a non-negative integer, G be a connected graph with vertex set V and edge set E, a subset SV is called a g-extra cut of G if the graph induced by the set GS is disconnected and each component of GS has at least g+1 vertices. The g-extra connectivity of G, denoted as κg(G), is the cardinality of the minimum g-extra cut of G. Mycielski introduced a graph transformation to discover chromatic numbers of triangle-free graphs that can be arbitrarily large. This transformation converts a graph G into a new compound graph called μ(G), also known as the Mycielskian graph of G. In this paper, we study the relationship on g-extra connectivity between the Mycielskian graph μ(G) and the graph G. In addition, we show that κ3(μ(G))=2κ1(G)+1 for κ1(G)min{4,n2}, and prove the bounds of κ2g+1(μ(G)) for g2. Full article
(This article belongs to the Special Issue Advanced Graph Theory and Combinatorics)
Show Figures

Figure 1

12 pages, 1747 KB  
Article
Application of Precision Agriculture for the Sustainable Management of Fertilization in Olive Groves
by Eliseo Roma, Vito Armando Laudicina, Mariangela Vallone and Pietro Catania
Agronomy 2023, 13(2), 324; https://doi.org/10.3390/agronomy13020324 - 20 Jan 2023
Cited by 30 | Viewed by 4484
Abstract
Olive tree growing (Olea europaea L.) has considerably increased in the last decades, as has the consumption of extra virgin olive oil in the world. Precision agriculture is increasingly being applied in olive orchards as a new method to manage agronomic variability [...] Read more.
Olive tree growing (Olea europaea L.) has considerably increased in the last decades, as has the consumption of extra virgin olive oil in the world. Precision agriculture is increasingly being applied in olive orchards as a new method to manage agronomic variability with the aim of providing individual plants with the right input amount, limiting waste or excess. The objective of this study was to develop a methodology on a GIS platform using GEOBIA algorithms in order to build prescription maps for variable rate (VRT) nitrogen fertilizers application in an olive orchard. The fertilization plan was determined for each tree by applying its own nitrogen balance, taking into account the variability of nitrogen in soil, leaf, production, and actual biometric and spectral conditions. Each olive tree was georeferenced using the S7-G Stonex instrument with real-time kinematic RTK positioning correction and the trunk cross section area (TCSA) was measured. Soil and leaves were sampled to study nutrient variability. Soil and plant samples were analyzed for all major physical and chemical properties. Spectral data were obtained using a multispectral camera (DJI multispectral) carried by an unmanned aerial vehicle (UAV) platform (DJI Phantom4). The biometric characteristics of the plants were extracted from the achieved normalized vegetation index (NDVI) map. The obtained prescription map can be used for variable rate fertilization with a tractor and fertilizer spreader connected via the ISOBUS system. Using the proposed methodology, the variable rate application of nitrogen fertilizer resulted in a 31% reduction in the amount to be applied in the olive orchard compared to the standard dose. Full article
Show Figures

Figure 1

29 pages, 8166 KB  
Article
A State Machine-Based Droop Control Method Aided with Droop Coefficients Tuning through In-Feasible Range Detection for Improved Transient Performance of Microgrids
by Mandarapu Srikanth and Yellapragada Venkata Pavan Kumar
Symmetry 2023, 15(1), 1; https://doi.org/10.3390/sym15010001 - 20 Dec 2022
Cited by 13 | Viewed by 3438
Abstract
 The cascaded droop-voltage-current controller plays a key role in the effective operation of microgrids, where the controller performance is critically impacted by the desigheme, a constant value n of the droop controller. Moreover, in critical loading (e.g.: connection/disconnection of large inductive load), the [...] Read more.
 The cascaded droop-voltage-current controller plays a key role in the effective operation of microgrids, where the controller performance is critically impacted by the desigheme, a constant value n of the droop controller. Moreover, in critical loading (e.g.: connection/disconnection of large inductive load), the pre-set value of the droop coefficient brings asymmetry in transient performance leading to instability. Hence, to improve symmetry by reducing the trade-off between transient response and stability margin, this paper proposes a state machine-based droop control method (SMDCM) aided with droop coefficients’ tuning through in-feasible range detection. Here, to realize the issues and the role of the droop controller’s dynamics on the microgrid’s stability, a small-signal stability analysis is conducted, thereby, an in-feasible range of droop values is identified. Accordingly, safe values for droop coefficients are implemented using the state machine concept. This proposed SMDCM is compared with the conventional constant droop control method (CDCM) and fuzzy logic-based droop control method (FLDCM) in terms of frequency/power/voltage characteristics subjected to different power factor (PF) loading conditions. From the results, it is seen that CDCM failed in many metrics under moderate and poor PF loadings. FLDCM is satisfactory under moderate PF loading, but, showed 54 Hz/48 Hz as maximum/minimum frequency values during poor PF loading. These violate the standard limit of ±2%, but SMDCM satisfactorily showed 50.02 Hz and 49.8 Hz, respectively. Besides, FLDCM levied an extra burden of 860 W on the system while it is 550 W with SMDCM. System recovery has taken 0.04 s with SMDCM, which completely failed with FLDCM. Similarly, voltage THD with FLDCM is 58.9% while with SMDCM is 3.08%. Peak voltage due to capacitive load switching is 340V with FLDCM and 150 V with SMDCM. These findings confirm that the proposed SMDCM considerably improved the transient performance of microgrids.  Full article
Show Figures

Figure 1

16 pages, 530 KB  
Article
The t/k-Diagnosability and a t/k Diagnosis Algorithm of the Data Center Network BCCC under the MM* Model
by Jialiang Lu, Wei Zhao and Jie Li
Algorithms 2022, 15(12), 480; https://doi.org/10.3390/a15120480 - 16 Dec 2022
Cited by 3 | Viewed by 2527
Abstract
The evaluation of the fault diagnosis capability of a data center network (DCN) is important research in measuring network reliability. The g-extra diagnosability is defined under the condition that every component except the fault vertex set contains at least g+1 vertices. The t/k [...] Read more.
The evaluation of the fault diagnosis capability of a data center network (DCN) is important research in measuring network reliability. The g-extra diagnosability is defined under the condition that every component except the fault vertex set contains at least g+1 vertices. The t/k diagnosis strategy is that the number of fault nodes does not exceed t, and all fault nodes can be isolated into a set containing up to k fault-free nodes. As an important data center network, BCube Connected Crossbars (BCCC) has many excellent properties that have been widely studied. In this paper, we first determine that the g-extra connectivity of BCn,k for 0gn1. Based on this, we establish the g-extra conditional diagnosability of BCn,k under the MM* model for 1gn1. Next, based on the conclusion of the largest connected component in g-extra connectivity, we prove that the t/k-diagnosability of BCn,k under the MM* model for 1kn1. Finally, we present a t/k diagnosis algorithm on BCCC under the MM* model. The algorithm can correctly identify all nodes at most k nodes undiagnosed. So far, t/k-diagnosability and diagnosis algorithms for most networks in the MM* model have not been studied. Full article
(This article belongs to the Special Issue Graph Algorithms and Applications)
Show Figures

Figure 1

17 pages, 11233 KB  
Article
Mapping Irregular Local Climate Zones from Sentinel-2 Images Using Deep Learning with Sequential Virtual Scenes
by Qianxiang Yao, Hui Li, Peng Gao, Haojia Guo and Cheng Zhong
Remote Sens. 2022, 14(21), 5564; https://doi.org/10.3390/rs14215564 - 4 Nov 2022
Cited by 8 | Viewed by 2916
Abstract
Recently, the local climate zone (LCZ) system has been presented to establish the connection between urban landscape and local thermal environment. However, LCZ entities are very difficult to be identified by pixel-based classifiers or object-oriented image analysis, as they are often a complicated [...] Read more.
Recently, the local climate zone (LCZ) system has been presented to establish the connection between urban landscape and local thermal environment. However, LCZ entities are very difficult to be identified by pixel-based classifiers or object-oriented image analysis, as they are often a complicated combination of multiple ground objects (e.g., buildings, roads, grassland, etc.). Scene classifiers, especially deep learning methods can exploit the structure or contextual information of image scenes and then improve the performance of LCZ classification. However, the square and uniform-sized image patches often bring about extra challenges, as they cannot exactly match LCZ entities of diverse sizes and shapes in most cases. In this study, a sequential virtual scene method is presented to identify LCZ entities of diverse shapes and sizes, which consists of a small “core patch” for scanning diverse entities and sequential virtual scenes for providing abundant context. Specifically, the Bidirectional Long Short-Term Memory (Bi-LSTM) were used to learn the spatial relationship among virtual scenes, respectively. Importantly, a “self-attention” mechanism is designed to weigh the contribution of every virtual scene for alleviating the influences of mixed patches, according to the similarity between its hidden state and the final hidden state. Experiments prove SVS achieves better accuracies than random forest and ResNet and has the outstanding capacity of identifying irregular LCZ entities. It is a promising way to carry out LCZ mapping in cities of different types due to its flexibility and adaptability. Full article
Show Figures

Figure 1

22 pages, 6303 KB  
Article
A Comprehensive Study of Degradation Characteristics and Mechanisms of Commercial Li(NiMnCo)O2 EV Batteries under Vehicle-To-Grid (V2G) Services
by Yifan Wei, Yuan Yao, Kang Pang, Chaojie Xu, Xuebing Han, Languang Lu, Yalun Li, Yudi Qin, Yuejiu Zheng, Hewu Wang and Minggao Ouyang
Batteries 2022, 8(10), 188; https://doi.org/10.3390/batteries8100188 - 17 Oct 2022
Cited by 48 | Viewed by 13904
Abstract
Lithium-ion batteries on electric vehicles have been increasingly deployed for the enhancement of grid reliability and integration of renewable energy, while users are concerned about extra battery degradation caused by vehicle-to-grid (V2G) operations. This paper details a multi-year cycling study of commercial 24 [...] Read more.
Lithium-ion batteries on electric vehicles have been increasingly deployed for the enhancement of grid reliability and integration of renewable energy, while users are concerned about extra battery degradation caused by vehicle-to-grid (V2G) operations. This paper details a multi-year cycling study of commercial 24 Ah pouch batteries with Li(NiMnCo)O2 (NCM) cathode, varying the average state of charge (SOC), depth of discharge (DOD), and charging rate by 33 groups of experiment matrix. Based on the reduced freedom voltage parameter reconstruction (RF-VPR), a more efficient non-intrusive diagnosis is combined with incremental capacity (IC) analysis to evaluate the aging mechanisms including loss of lithium-ion inventory and loss of active material on the cathode and anode. By analyzing the evolution of indicator parameters and the cumulative degradation function (CDF) of the battery capacity, a non-linear degradation model with calendar and cyclic aging is established to evaluate the battery aging cost under different unmanaged charging (V0G) and V2G scenarios. The result shows that, although the extra energy throughput would cause cyclic degradation, discharging from SOC 90 to 65% by V2G will surprisingly alleviate the battery decaying by 0.95% compared to the EV charged within 90–100% SOC, due to the improvement of calendar life. By optimal charging strategies, the connection to the smart grid can potentially extend the EV battery life beyond the scenarios without V2G. Full article
(This article belongs to the Special Issue Battery Energy Storage in Advanced Power Systems)
Show Figures

Figure 1

Back to TopTop