Dear Editor,State of health(SOH)estimation is critical for the management of lithium-ion batteries(LIBs).Data-driven estimation methods are appealing with the availability of real-world battery data.However,time-and d...Dear Editor,State of health(SOH)estimation is critical for the management of lithium-ion batteries(LIBs).Data-driven estimation methods are appealing with the availability of real-world battery data.However,time-and data-costly training for batteries with different chemistries and models barriers their efficient deployment.展开更多
Exploring low-cost and effective approaches to extend the potentials of aqueous electrolytes is highly desired.Herein,it is found that the activity of H_(2)O in aqueous electrolytes could be intensively manipulated by...Exploring low-cost and effective approaches to extend the potentials of aqueous electrolytes is highly desired.Herein,it is found that the activity of H_(2)O in aqueous electrolytes could be intensively manipulated by introducing small urea and long-chain polyethylene glycol(PEG)molecules into Li TFSI-H_(2)O electrolyte systems without super salt concentration.The urea and PEG molecules could exclude partial coordinated H_(2)O out of the inner solvation shell of Li_(4) and reconstruct hydrogen-bonding network between H_(2)O and PEG molecules outside the solvation sheaths with restricted H_(2)O activity and extended electrochemical window.The bonding competitions in aqueous electrolytes and their correlation to the electrochemical performance of full cells are studied.When the occurrence probability of H_(2)O around Li_(4)is lower than 40%,stable cycling of 3.1 V LiMn_(2)O_(4)-Li_(4)Ti_(5)O_(12) full cell is achieved,showing 73%capacity retention after 200 cycles at 1 C rate in optimal electrolytes.This work provides new avenues to understand the role of H_(2)O and explore low-cost and effective approaches for the development of nextgeneration aqueous lithium-ion batteries.展开更多
In this paper,we propose an asymmetric encrypted end-to-end communication system based on convolutional neural networks to solve the problem of secure transmission in the end-to-end wireless communication system.The s...In this paper,we propose an asymmetric encrypted end-to-end communication system based on convolutional neural networks to solve the problem of secure transmission in the end-to-end wireless communication system.The system generates a key generator through a convolutional neural network as a bridge.The private and public keys establish a key pair relationship of arbitrary length sequence information.The transmitter and receiver consist of autoencoders based on convolutional neural networks.For data confidentiality requirements,we design the loss function of the end-to-end communication model based on a convolutional neural network.We also design bugs based on different predictions about the information the system eavesdropper has.Simulation results show that the system performs well on additive Gaussian white noise and Rayleigh fading channels.A legitimate party can establish a secure transmission under a designed communication system;an illegal eavesdropper without a key cannot accurately decode it.展开更多
基金partially supported by the Shenzhen Municipal Science and Technology Innovation Committee(RCBS20210609104423057)Fujian Key Laboratory of New Energy Generation and Power Conversion(KLIF-202104)the National Natural Science Foundation of China(52072038)。
文摘Dear Editor,State of health(SOH)estimation is critical for the management of lithium-ion batteries(LIBs).Data-driven estimation methods are appealing with the availability of real-world battery data.However,time-and data-costly training for batteries with different chemistries and models barriers their efficient deployment.
基金supported by the Startup Foundation for Hundred-Talent Program of Zhejiang University。
文摘Exploring low-cost and effective approaches to extend the potentials of aqueous electrolytes is highly desired.Herein,it is found that the activity of H_(2)O in aqueous electrolytes could be intensively manipulated by introducing small urea and long-chain polyethylene glycol(PEG)molecules into Li TFSI-H_(2)O electrolyte systems without super salt concentration.The urea and PEG molecules could exclude partial coordinated H_(2)O out of the inner solvation shell of Li_(4) and reconstruct hydrogen-bonding network between H_(2)O and PEG molecules outside the solvation sheaths with restricted H_(2)O activity and extended electrochemical window.The bonding competitions in aqueous electrolytes and their correlation to the electrochemical performance of full cells are studied.When the occurrence probability of H_(2)O around Li_(4)is lower than 40%,stable cycling of 3.1 V LiMn_(2)O_(4)-Li_(4)Ti_(5)O_(12) full cell is achieved,showing 73%capacity retention after 200 cycles at 1 C rate in optimal electrolytes.This work provides new avenues to understand the role of H_(2)O and explore low-cost and effective approaches for the development of nextgeneration aqueous lithium-ion batteries.
基金supported by the National Key Research and Development Program of China(No.2017YFE0135700)the High Level Talent Support Project of Hebei Province(No.A201903011)+3 种基金the Natural Science Foundation of Hebei Province(No.F2018209358)the Tsinghua Precision Medicine Foundation(No.2022TS003)the Telecommunications Research Centre(TRC)of University of Limerick,Ireland,the Science and Education for Smart Growth Operational Program(2014-2020)(No.BG05M2OP001-1.001-0003)co-financed by the European Union through the European Structural and Investment funds.
文摘In this paper,we propose an asymmetric encrypted end-to-end communication system based on convolutional neural networks to solve the problem of secure transmission in the end-to-end wireless communication system.The system generates a key generator through a convolutional neural network as a bridge.The private and public keys establish a key pair relationship of arbitrary length sequence information.The transmitter and receiver consist of autoencoders based on convolutional neural networks.For data confidentiality requirements,we design the loss function of the end-to-end communication model based on a convolutional neural network.We also design bugs based on different predictions about the information the system eavesdropper has.Simulation results show that the system performs well on additive Gaussian white noise and Rayleigh fading channels.A legitimate party can establish a secure transmission under a designed communication system;an illegal eavesdropper without a key cannot accurately decode it.