Standards Research Data
Data centers are increasingly adopting renewable energy sources to mitigate environmental impact and reduce operational costs. However, effectively optimizing energy costs remains challenging due to unpredictable workloads and fluctuating renewable energy availability. This paper introduces LOECM, a Lyapunov-driven online scheduling algorithm designed to minimize energy cost without relying on future information.
- Categories:
This project aims to optimize the routing of large-scale Automated Guided Vehicles (AGVs) in a large-scale logistics warehouse in Japan using Quantum Annealing. The project will generate real-world operational problems and use them for performance evaluation. It is designed to be compatible with various solvers, including classical solvers and quantum annealing solvers.
- Categories:

Recently, pulse transformers have been widely used in pulsed power systems. However, the magnetic saturation phenomenon of the pulse transformer with closed magnetic cores will change its output waveform parameters, which makes it difficult to predict the output waveforms of the pulse transformer accurately, and a more accurate model considering the nonlinear magnetization process of the pulse transformer needs to be established.
- Categories:
This work introduces a breakthrough two-axis electromagnetic scanning micromirror system that resolves the fundamental aperture-frequency trade-off in MEMS-based LiDAR, achieving 20 mm optical aperture with 610 Hz resonant frequency. The design seamlessly integrates a voice coil motor (VCM) for vertical actuation with a resonant horizontal scanner.
- Categories:

The subject of the conducted project was research and development work aimed at developing a product innovation in the form of a robotic hospital ward. The task of such a ward was to minimize the participation of medical personnel in processes requiring contact with the patient, and thus the risk of infections and further spread of viruses.
- Categories:

A high-efficiency energy storage battery technology development project was officially launched, attracting seven experts from different institutions to participate and form a high-efficiency energy storage battery R&D collaboration network. Based on the participants' previous project collaboration experience, three overlapping subgroups naturally formed in the network. After the research and development are completed, the nine members must jointly evaluate the most suitable TT path for the energy storage battery technology.
- Categories:

- MovieLens-1M: This dataset contains user ratings for movies from the MovieLens website. It consists of 6,040 users and 3,952 movies. Users rate movies on a 5-star scale, and for our analysis, we convert the ratings into binary signals (positive and negative feedback) using a threshold of 3.5. The training set contains 456,138 positive feedback interactions and 337,990 negative feedback interactions, while the testing set consists of 111,412 positive feedback interactions.
- Categories:

DALHOUSIE NIMS LAB ATTACK IOT DATASET 2025-1 dataset comprises of four prevalent types attacks, namely Portscan, Slowloris, Synflood, and Vulnerability Scan, on nine distinct Internet of Things (IoT) devices. These attacks are very common on the IoT eco-systems because they often serve as precursors to more sophisticated attack vectors. By analyzing attack vector traffic characteristics and IoT device responses, our dataset will aid to shed light on IoT eco-system vulnerabilities.
- Categories:

This is a videoconference between a witness about murders who is a victim of many crimes and a law firm. This witness is called Colin Paul Gloster. This law firm is called Pais do Amaral Advogados.
\begin{quotation}``A significant part of the background of eh this process is that Hospital
Sobral Cid tortured me during 2013 eh but eh this process is actually
about consequences eh thru through a later process [. . .] To obscure eh
this torture of 2013, eh a new show trial was intitiated. Its process was
- Categories:

Kubernetes is a tool that facilitates rapid deployment of software. Unfortunately, configuring Kubernetes is prone to errors.
Configuration defects are not uncommon and can result in serious consequences. This paper reports an empirical study about
configuration defects in Kubernetes with the goal of helping practitioners detect and prevent these defects. We study 719 defects that
we extract from 2,260 Kubernetes configuration scripts using open source repositories. Using qualitative analysis, we identify 15
- Categories: