Computer Science ›› 2026, Vol. 53 ›› Issue (4): 163-172.doi: 10.11896/jsjkx.250600205

• Database & Big Data & Data Science • Previous Articles     Next Articles

Denoising Diffusion Model-enhanced Algorithm for Battery Swap Demand Data Generation

LIU Dehua1, YU Saixuan2, QIAO Jinlan3, HUANG Heqing4, CHENG Wenhui1   

  1. 1 College of Computer Science, Chongqing University, Chongqing 400044, China
    2 College of Information, Sichuan Vocational College of Finance and Economics, Chengdu 610101, China
    3 Department of Logistics Command, Engineering University of the Joint Logistics Support Force, Chongqing 401331, China
    4 College of Chongqing Technology and Business, Chongqing Open University, Chongqing 400053, China
  • Received:2025-06-26 Revised:2025-10-09 Online:2026-04-15 Published:2026-04-08
  • About author:LIU Dehua,born in 2000,master.His main research interests include urban computing and generative model.
    QIAO Jinlan,born in 1990,master,lecturer.Her main research interests include operational research,big data intelligence and AI.
  • Supported by:
    Key Science and Technology Project of the Chongqing Education Commission(KJZD-K202404002) and Science and Technology Project of Hechuan District(HCKJ-2024-112).

Abstract: In recent years,electric vehicle battery swap services have rapidly gained popularity due to their fast and convenient energy replenishment capabilities.Accurate prediction of user battery swap demand is crucial for optimizing the operational efficiency of battery swap platforms.However,in cities with newly deployed battery swap stations,conventional prediction models often suffer from insufficient training due to the lack of historical data,resulting in degraded prediction accuracy.To address this challenge,this paper proposes a denoising diffusion model-enhanced algorithm for generating battery swap demand data.By synthesizing samples that preserve the statistical distribution of real-world battery swap demand data,the proposed approach effectively augments the training dataset,thereby significantly improving the model’s prediction accuracy.Specifically,it firstly employs analog bit encoding to represent mixed-type battery swap demand data in continuous space,enabling it to be processed by the diffusion model.Furthermore,it designs a conditional denoising network incorporating the cross-attention mechanism,utilizing station information to guide the generation of high-quality battery swap demand data.Finally,the proposed algorithm is evaluated on a real-world battery swap dataset collected from 40 battery swap stations in Chengdu over a one-month period.Experimental results demonstrate that combining the generated data from the proposed algorithm with the original training data reduces the MAE,RMSE,and MAPE of battery swap demand prediction by 9.29%,8.56%,and 8.23%,respectively,compared to using the original training data alone.

Key words: Electric vehicle battery swap service, Battery swap demand prediction, Battery swap demand data generation, Denoi-sing diffusion model, Cross-attention mechanism

CLC Number: 

  • TP393
[1]WU H.A survey of battery swapping stations for electric vehicles:Operation modes and decision scenarios[J].IEEE Transactions on Intelligent Transportation Systems,2021,23(8):10163-10185.
[2]KO H,PACK S,LEUNG V C M.An optimal battery charging algorithm in electric vehicle-assisted battery swapping environments[J].IEEE Transactions on Intelligent Transportation Systems,2020,23(5):3985-3994.
[3]ZHOU E,LI Z,LIU D,et al.Balancing Electric Scooter Battery Swapping Network by Spatio-Temporal Recommendation[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(12):21315-21326.
[4]SARKER M R,PANDZIC H,ORTEGA-VAZQUEZ M A.Optimal operation and services scheduling for an electric vehicle battery swapping station[J].IEEE Transactions on Power Systems,2014,30(2):901-910.
[5]CUI D,WANG Z,LIU P,et al.Operation optimization approaches of electric vehicle battery swapping and charging station:A literature review[J].Energy,2023,263:126095.
[6]Xinhuanet.Writing the Digital Epic,Sharing the New Quality Future | China Tower Featured at the 2024 China International Fair for Trade in Services.[EB/OL].(2024-09-13)[2025-05-18]http://www.xinhuanet.com/info/20240913/f9e2190e701345969cb0fad08254c5b9/c.html.
[7]WANG S,CHEN A,WANG P,et al.Short-term electric vehicle battery swapping demand prediction:Deep learning methods[J].Transportation Research Part D:Transport and Environment,2023,119:103746.
[8]CHENG W,LU H,XIANG C,et al.Breaking ‘Chicken-Egg’:Cross-city Battery Swap Demand Prediction via Knowledge-guided Diffusion[C]//IEEE INFOCOM 2025-IEEE Confe-rence on Computer Communications.IEEE,2025:1-10.
[9]CHATTERJEE S,HAZRA D,BYUN Y C.GAN-based syn-thetic time-series data generation for improving prediction of demand for electric vehicles[J].Expert Systems with Applications,2025,264:125838.
[10]ZHANG Z,WANG L,LIU Y,et al.A GAN-Based EnsembleModel for Predicting the Demand of Shared Bikes in 5G Networks[J].IEEE Transactions on Intelligent Transportation Systems,2023,25(3):2869-2879.
[11]CROITORU F A,HONDRU V,IONESCU R T,et al.Diffusion models in vision:A survey[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2023,45(9):10850-10869.
[12]KANDWAL S,NEHRA V.A survey of text-to-image diffusion models in generative AI[C]//2024 14th International Confe-rence on Cloud Computing,Data Science & Engineering(Conf-luence).IEEE,2024:73-78.
[13]LOVELACE J,KISHORE V,WAN C,et al.Latent diffusion for language generation[J].Advances in Neural Information Processing Systems,2023,36:56998-57025.
[14]CHEN N,ZHANG Y,ZEN H,et al.Wavegrad:Estimating gradients for waveform generation[J].arXiv:2009.00713,2020.
[15]KONG Z,PING W,HUANG J,et al.Diffwave:A versatile diffusion model for audio synthesis[J].arXiv:2009.09761,2020.
[16]SOHL-DICKSTEIN J,WEISS E,MAHESWARANATHAN N,et al.Deep unsupervised learning using nonequilibrium thermodynamics[C]//International Conference on Machine Learning.PMLR,2015:2256-2265.
[17]HO J,JAIN A,ABBEEL P.Denoising diffusion probabilisticmodels[J].Advances in Neural Information Processing Systems,2020,33:6840-6851.
[18]SONG J,MENG C,ERMON S.Denoising diffusion implicit models[J].arXiv:2010.02502,2020.
[19]DHARIWAL P,NICHOL A.Diffusion models beat gans onimage synthesis[J].Advances in Neural Information Processing Systems,2021,34:8780-8794.
[20]LIN L,LI Z,LI R,et al.Diffusion models for time-series applications:a survey[J].Frontiers of Information Technology & Electronic Engineering,2024,25(1):19-41.
[21]FONSECA J,BACAO F.Tabular and latent space synthetic data generation:a literature review[J].Journal of Big Data,2023,10(1):115.
[22]YANG J,WU P,CONG G,et al.SAM:Database generationfrom query workloads with supervised autoregressive models[C]//Proceedings of the 2022 International Conference on Management of Data.2022:1542-1555.
[23]GERMAIN M,GREGOR K,MURRAY I,et al.Made:Masked autoencoder for distribution estimation[C]//International Conference on Machine Learning.PMLR,2015:881-889.
[24]XU L,SKOULARIDOU M,CUESTA-INFANTE A,et al.Modeling tabular data using conditional GAN[C]//Advances in Neural Information Processing Systems.2019.
[25]GOODFELLOW I J,POUGET-ABADIE J,MIRZA M,et al.Generative adversarial nets[C]//Advances in Neural Information Processing Systems.2014.
[26]KOTELNIKOV A,BARANCHUK D,RUBACHEV I,et al.Tabddpm:Modelling tabular data with diffusion models[C]//International Conference on Machine Learning.PMLR,2023:17564-17579.
[27]THANH-TUNG H,TRAN T.Catastrophic forgetting andmode collapse in GANs[C]//2020 International Joint Confe-rence on Neural Networks(IJCNN).IEEE,2020:1-10.
[28]MASSEY JR F J.The Kolmogorov-Smirnov test for goodness of fit[J].Journal of the American Statistical Association,1951,46(253):68-78.
[29]CHEN T,ZHANG R,HINTON G.Analog bits:Generating discrete data using diffusion models with self-conditioning[J].ar-Xiv:2208.04202,2022.
[30]VASWANI A,SHAZEER N,PARMAR N,et al.Attention isall you need[C]//Proceedings of the 31st International Confe-rence on Neural Information Processing Systems.2017:6000-6010.
[31]PEDREGOSA F,VAROQUAUX G,GRAMFORT A,et al.Scikit-learn:Machine learning in Python[J].The Journal of Machine Learning Research,2011,12:2825-2830.
[32]NICHOL A Q,DHARIWAL P.Improved denoising diffusionprobabilistic models[C]//International Conference on Machine Learning.PMLR,2021:8162-8171.
[33]ZHAO Z,KUNAR A,BIRKE R,et al.CTAB-GAN+:Enhancing tabular data synthesis[J].Frontiers in Big Data,2024,6:1296508.
[34]SATTAROV T,SCHREYER M,BORTH D.Findiff:Diffusion models for financial tabular data generation[C]//Proceedings of the Fourth ACM International Conference on AI in Finance.2023:64-72.
[35]VERDÚ S.Total variation distance and the distribution of relative information[C]//2014 Information Theory and Applications Workshop(ITA).IEEE,2014:1-3.
[36]BENESTY J,CHEN J,HUANG Y,et al.Pearson correlationcoefficient[M]//Noise reduction in speech processing.Berlin:Springer,2009:1-4.
[37]YUAN J,ZHENG Y,XIE X.Discovering regions of differentfunctions in a city using human mobility and POIs[C]//Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2012:186-194.
[38]VAN DER MAATEN L,HINTON G.Visualizing data using t-SNE[J].Journal of Machine Learning Research,2008,9(11):2579-2605.
[39]DONG X,YU Z,CAO W,et al.A survey on ensemble learning[J].Frontiers of Computer Science,2020,14:241-258.
[1] JIANG Zixian, YU Saixuan, HUANG Ruixue, SHEN Xin, HUANG Heqing. Vehicle-mounted Video Compression Algorithm for Collaborative Vehicle Crowdsensing [J]. Computer Science, 2026, 53(4): 308-317.
[2] YIN Chuang, LIU Jianyi, ZHANG Ru. Cross-modal Fusion Few-sample Ransomware Classifier:Multimodal Encoding Based on Pre-trained Models [J]. Computer Science, 2026, 53(4): 435-444.
[3] YANG Xin, GUO Yimin. Smart Medical Secure Authentication Protocol for Cloud and Fog Leakage Resistance [J]. Computer Science, 2026, 53(4): 454-468.
[4] YANG Ruoxuan, JIN Feiyu, QU Lianwei, ZHOU Zijie, ZHENG Qibin, LI Zhenhua. A Serverless-based Approach to Fast Measurement of Network Bandwidth [J]. Computer Science, 2026, 53(3): 392-399.
[5] ZHANG Xinfan, CHENG Baolei, FAN Jianxi, WANG Yan. Connectivity and Diagnosability of Data Center Network SWCube [J]. Computer Science, 2026, 53(3): 400-410.
[6] CHANG Huiyan, HU Hongchao, ZHOU Dacheng, XU Depeng, CHENG Guozhen. Research Review of Application-based Covert Channel [J]. Computer Science, 2026, 53(3): 411-423.
[7] CHEN Shangyu, HU Hongchao, ZHANG Shuai, ZHOU Dacheng, YANG Xiaohan. Tor Multipath Selection Based on Threaten Awareness [J]. Computer Science, 2026, 53(1): 395-403.
[8] CHEN Jiayi, GU Chengyi, ZHOU Jihua, ZHAO Tao, WANG Shuangchao, ZHU Mingxing, XIANG Chaocan. Cross-regional Battery Swapping Station Deployment Algorithm Based on Intelligent E-scooterFlow Generation [J]. Computer Science, 2025, 52(12): 71-80.
[9] CHEN Haiyan. Efficient Clustering Routing Method for WSNs Based on Clone Reverse Learning Grey WolfOptimization Algorithm [J]. Computer Science, 2025, 52(12): 294-301.
[10] SHI Junnan, CHEN Zemao, ZHANG Liqiang. Automatic Attack Path Discovery Method for Substation Remote Monitoring Network [J]. Computer Science, 2025, 52(12): 339-350.
[11] LIANG Jianpeng, MO Xiuliang, WANG Pengxiang, WANG Huanran, WANG Chundong. Research on Malicious Domain Detection Based on Heterogeneous Graph Inductive Learning [J]. Computer Science, 2025, 52(12): 358-366.
[12] CHEN Xianyi, ZHANG Chengjuan, QIAN Jiangfeng, GUO Qianbin, CUI Qi, FU Zhangjie. Highly Robust Model Structure Backdoor Method Based on Feature Distribution [J]. Computer Science, 2025, 52(12): 374-383.
[13] WEI Zihan, MA Rongkuan, LI Beibei, YANG Yahui, LI Zhuo, SONG Yunkai. Firmware Recovery Based Emulation and Testing Method for Industrial Gateway [J]. Computer Science, 2025, 52(12): 411-418.
[14] LU Bo, LYU Xiao. Detection of Web Command Injection Vulnerabilities on IOS-XE Based on Static Analysis-drivenApproach [J]. Computer Science, 2025, 52(12): 419-427.
[15] WEI Debin, ZHANG Yi, XU Pingduo, WANG Xinrui. Multipath Routing Algorithm for Satellite Networks Based on Convolutional Twin Delay Deep Deterministic Policy Gradient [J]. Computer Science, 2025, 52(11): 280-288.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!