The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto...The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.展开更多
In electrochemical energy storage systems,the sodium-ion battery is typically integrated in the form of a“cell-module-cluster”,but its cross-scale thermal runaway triggering risk and the propagation mechanism remain...In electrochemical energy storage systems,the sodium-ion battery is typically integrated in the form of a“cell-module-cluster”,but its cross-scale thermal runaway triggering risk and the propagation mechanism remain unclear.This study reveals the cross-scale thermal runaway triggering and propagation behavior of sodium-ion batteries of“cell-module-cluster”under overcharge conditions,and investigates the effects of key factors,including module spacing,triggering cell location,and heat dissipation condition,on the thermal runaway propagation behavior.Results demonstrate that the thermal runaway propagation in a module containing the overcharged cell follows a sequential triggering mode,while thermal runaway in the downstream module exhibits a simultaneous triggering mode with greater severity.Furthermore,increasing the module spacing or enhancing the heat dissipation capacity can effectively reduce the heat accumulation and prevent the trigger of thermal runaway.On the above basis,the multi-dimensional evaluation strategy is proposed to quantitatively assess the hazard of sodium-ion battery cluster thermal runaway.The findings serve as a foundation for the safe design of sodium-ion batteries in energy storage systems.展开更多
With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall e...With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.展开更多
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to...Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.展开更多
With the increasing application of lithium-ion batteries under high-rate operation,safety concerns such as thermal runaway(TR)and thermal runaway propagation(TRP)have become critical.In this study,the TRP action of ba...With the increasing application of lithium-ion batteries under high-rate operation,safety concerns such as thermal runaway(TR)and thermal runaway propagation(TRP)have become critical.In this study,the TRP action of batteries undergoing high-rate cycling is systematically investigated.Microanalysis results reveal that the crystallinity and I_((003))/I_((004))of the cathode are decreased by 32.95%and 13.01%after 4 C cycling,while the layered structure of the anode is seriously damaged.As revealed,the TR interval time(At)of batteries cycled at 4 C is decreased by 83.23%compared with that for batteries cycled at 1 C.Meanwhile,the maximum mass loss(ML)rate of Battery 2#is increased by 32.35%.We have further investigated the influence of battery spacing on TRP action.The maximum TR temperature of Battery2#at 1.5 cm spacing is reduced by 26.21%compared with the value at 0 cm spacing.When increasing the spacing from 0 to 1.5 cm,the ML of batteries is reduced by 20.73%.ML increases and decreases with the elevation of the charging rate and battery spacing,respectively.Compared with a battery cycled at1 C,a battery cycled at 4 C shows reduced heat required to trigger TR.The corresponding decreases can reach 68.28%,70.10%,76.88%,and 26.15%when setting the spacing at 0,0.6,1.5,and 2.1 cm,respectively.This indicates that Battery 2#can enter TR with much lower heat after high-rate cycling.Overall,high-rate cycling and low spacing accelerate the TRP of the battery and aggravate the TR severity of the battery.This work can provide insights for the practical safety design of energy storage systems.展开更多
Arc faults within the transformers can generate sudden pressure surges,constituting significant hazards that may precipitate oil tank explosions and severely compromise power system stability.Conventional power−freque...Arc faults within the transformers can generate sudden pressure surges,constituting significant hazards that may precipitate oil tank explosions and severely compromise power system stability.Conventional power−frequency arc discharge experiments encounter limitations in isolating pressure wave characteristics due to persistent gas generation and arc reignition.To circumvent these challenges,an oil-immersed impulse voltage discharge platform was conceived and engineered to investigate pressure wave propagation dynamics.A pressure numerical simulation model and theoretical model of oil−solid interface reflection and refraction were subsequently established to elucidate the pressure propagation mechanism.The experimental and simulation results show that the pressure wave generated by pulsed arc discharge in oil propagates radially in the form of spherical waves.Due to the viscous loss and wave front expansion of transformer oil,the peak pressure decays exponentially with distance,with a decay coefficientβ=1.15.When pressure waves encounter metal obstacles inside transformer oil,there are two propagation paths:direct transmission through and multiple reflections through,and a mode transformation of pressure waves occurs at the oil−solid interface,mainly propagating through obstacles in the form of transverse waves.This work quantitatively delineates the energy pressure wave coupling,propagation dynamics,and attenuation mechanisms,providing critical insights for assessing and mitigating arc fault-induced transformer explosion risks.展开更多
Hydraulic fracturing serves as a critical technology for reservoir stimulation in deep coalbed methane(CBM)development,where the mechanical properties of gangue layers exert a significant control on fracture propagati...Hydraulic fracturing serves as a critical technology for reservoir stimulation in deep coalbed methane(CBM)development,where the mechanical properties of gangue layers exert a significant control on fracture propagation behavior.To address the unclear mechanisms governing fracture penetration across coal-gangue interfaces,this study employs the Continuum-Discontinuum Element Method(CDEM)to simulate and analyze the vertical propagation of hydraulic fractures initiating within coal seams,based on geomechanical parameters derived from the deep Benxi Formation coal seams in the southeastern Ordos Basin.The investigation systematically examines the influence of geological and operational parameters on cross-interfacial fracture growth.Results demonstrate that vertical stress difference,elastic modulus contrast between coal and gangue layers,interfacial stress differential,and interfacial cohesion at coal-gangue interfaces are critical factors governing hydraulic fracture penetration through these interfaces.High vertical stress differences(>3 MPa)inhibit interfacial dilation,promoting predominant crosslayer fracture propagation.Reduced interfacial stress contrasts and enhanced interfacial cohesion facilitate fracture penetration across interfaces.Furthermore,smaller elastic modulus contrasts between coal and gangue correlate with increased interfacial aperture.Finally,lower injection rates effectively suppress vertical fracture propagation in deep coal reservoirs.This study elucidates the characteristics and mechanisms governing cross-layer fracture propagation in coal–rock composites with interbedded partings,and delineates the dynamic evolution laws and dominant controlling factors involved.Thefindings provide critical theoretical insights for the optimization of fracture design and the efficient development of deep coalbed methane reservoirs.展开更多
The influence of different solution and aging conditions on the microstructure,impact toughness,and crack initiation and propagation mechanisms of the novel α+β titanium alloy Ti6422 was systematically investigated....The influence of different solution and aging conditions on the microstructure,impact toughness,and crack initiation and propagation mechanisms of the novel α+β titanium alloy Ti6422 was systematically investigated.By adjusting the furnace cooling time after solution treatment and the aging temperature,Ti6422 alloy samples were developed with a multi-level lamellar microstructure,in-cluding microscaleαcolonies and α_(p) lamellae,as well as nanoscale α_(s) phases.Extending the furnace cooling time after solution treatment at 920℃ for 1 h from 240 to 540 min,followed by aging at 600℃ for 6 h,increased the α_(p) lamella content,reduced the α_(s) phase content,expanded theαcolonies and α_(p) lamellae size,and improved the impact toughness from 22.7 to 53.8 J/cm^(2).Additionally,under the same solution treatment,raising the aging temperature from 500 to 700℃ resulted in a decrease in the α_(s) phase content and a growth in the thickness of the α_(p) lamella and α_(s) phase.The impact toughness increased significantly with these changes.Samples with high α_(p) lamellae content or large α_(s) phase size exhibited high crack initiation and propagation energies.Impact deformation caused severe kinking of the α_(p) lamellae in crack initiation and propagation areas,leading to a uniform and high-density kernel average misorientation(KAM)distribu-tion,enhancing plastic deformation coordination and uniformity.Moreover,the multidirectional arrangement of coarserαcolonies and α_(p) lamellae continuously deflect the crack propagation direction,inhibiting crack propagation.展开更多
The stability of rock slopes is frequently controlled by the initiation and propagation of inherent dominant cracks.This study systematically investigated these processes in valley slopes by combining fracture-mechani...The stability of rock slopes is frequently controlled by the initiation and propagation of inherent dominant cracks.This study systematically investigated these processes in valley slopes by combining fracture-mechanics analysis with transparent soil model tests.An analytical expression for the stress field at the dominant crack tip was derived from the slope stress distribution by superposing the corresponding stress intensity factors(SIFs).The theoretical predictions were then validated against observations from transparent soil model tests.The influences of slope angle(β),crack inclination angle(α),crack position parameter(b),and crack length parameter(h)on crack initiation and propagation were quantified.The results indicated that:(1)cracks at the slope crest tended to propagate in shear mode,and the shear crack initiation angle(θ_(s))was approximately 8°.Cracks at the slope toe might propagate in either tensile or shear mode.(2)θ_(s) at the slope crest increased withβ,b,and l,and decreased withα.The maximum change inθ_(s) induced by the considered parameters was approximately 30°.(3)The tensile crack initiation angle(θ_(t))at the slop toe decreased withβ,α,and l,while the influence of b was comparatively minor.The maximum change inθ_(t) caused by individual parameters ranged approximately from 25°to 60°.Predicted crack propagation modes and directions showed good agreement with experimental results.These findings provide theoretical guidance for stability assessments of valley slopes controlled by dominant crack propagation.展开更多
This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material u...This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.展开更多
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military...Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.展开更多
Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spa...Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.展开更多
Hydraulic stimulation technology is widely employed to enhance the permeability of geothermal reservoirs.Nevertheless,accurately predicting hydraulic fracture propagation in complex geological conditions remains chall...Hydraulic stimulation technology is widely employed to enhance the permeability of geothermal reservoirs.Nevertheless,accurately predicting hydraulic fracture propagation in complex geological conditions remains challenging,thereby hindering the effective utilization of existing natural fractures.In this study,a phase field model was developed utilizing the finite element method to examine the influence of fluid presence,stress conditions,and natural fractures on the initiation and propagation of hydraulic fractures.The model employs Biot's poroelasticity theory to establish the coupling between the displacement field and the fluid field,while the phase field theory is applied to simulate fracture behavior.The results show that whenσ_(x0)/σ_(y0)<3 or qf<20 kg/(m^(3)·s),the presence of natural fractures can alter the original propagation direction of hydraulic fractures.Conversely,in the absence of these conditions,the propagation path of natural fractures is predominantly influenced by the initial stress field.Furthermore,based on the analysis of breakdown pressure and damage area,the optimal intersection angle between natural fractures and hydraulic fractures is determined to range from 45°to 60°.Finally,once a dominant channel forms,initiating and propagating hydraulic fractures in other directions becomes increasingly difficult,even in highly fractured areas.This method tackles the challenges of initiating and propagating hydraulic fractures in complex geological conditions,providing a theoretical basis for optimizing Enhanced Geothermal System(EGS)projects.展开更多
Using the software ANSYS-19.2/Explicit Dynamics,this study performedfinite-element modeling of the large-diameter steel pipeline cross-section for the Beineu-Bozoy-Shymkent gas pipeline with a non-through straight crac...Using the software ANSYS-19.2/Explicit Dynamics,this study performedfinite-element modeling of the large-diameter steel pipeline cross-section for the Beineu-Bozoy-Shymkent gas pipeline with a non-through straight crack,strengthened by steel wire wrapping.The effects of the thread tensile force of the steel winding in the form of single rings at the crack edges and the wires with different winding diameters and pitches were also studied.The results showed that the strengthening was preferably executed at a minimum value of the thread tensile force,which was 6.4%more effective than that at its maximum value.The analysis of the influence of the winding dia-meters showed that the equivalent stresses increased by 32%from the beginning of the crack growth until the wire broke.The increment in winding diameter decelerated the disclosure of the edge crack and reduced its length by 8.2%.The analysis of the influence of the winding pitch showed that decreasing the distance between the winding turns also led to a 33.6%reduction in the length of the straight crack and a 7.9%reduction in the maximum stres-ses on the strengthened pipeline cross-section.The analysis of the temperature effect on the pipeline material,within a range from-40℃to+50℃,resulted in a crack length change of up to 5.8%.As the temperature dropped,the crack length decreased.Within such a temperature range,the maximum stresses were observed along the cen-tral area of the crack,which were equal to 413 MPa at+50℃and 440 MPa at-40℃.The results also showed that the presence of the steel winding in the pipeline significantly reduced the length of crack propagation up to 8.4 times,depending on the temperature effect and design parameters of prestressing.This work integrated the existing methods for crack localization along steel gas pipelines.展开更多
In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has beco...In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys.展开更多
The crack initiation and early propagation are of great significance to the overall fatigue life of material.In order to investigate the anisotropic fracture behavior of laser metal deposited Ti-6Al-4V alloy(LMD Ti64)...The crack initiation and early propagation are of great significance to the overall fatigue life of material.In order to investigate the anisotropic fracture behavior of laser metal deposited Ti-6Al-4V alloy(LMD Ti64)during the early stage,the fourpoint bending fatigue test was carried out on specimens of three different directions,as well as the forged specimens.The results indicate the anisotropic crack initiation and early propagation of LMD Ti64.The direction perpendicular to the deposition direction exhibits a better fatigue resistance than the other two.The crack initiation position and propagation path are dominated by the microstructure in the vicinity of U-notch.LMD Ti64 has a typical small crack effect,and the early crack propagation velocities in three directions are similar.Affected by the slip system of LMD Ti64,secondary cracks frequently occur,which are often found to have an angle of 60°to the main crack.The electron backscatter diffraction analysis indicates that LMD Ti64 has preferred orientations,i.e.,strong 0001//Z texture and 001//Z texture.Their crystallographic orientation will change as the direction of columnarβgrains turns over,resulting in the fatigue anisotropy of LMD Ti64 in crack initiation and early crack propagation process.展开更多
This study addresses the significant disparity in aerodynamic uplift forces experienced by single-strip high-speed pantographs under different operating directions.A systematic numerical investigation was conducted to...This study addresses the significant disparity in aerodynamic uplift forces experienced by single-strip high-speed pantographs under different operating directions.A systematic numerical investigation was conducted to evaluate the influence of key geometric parameters on aerodynamic characteristics,culminating in two targeted adjustment strategies.The reliability of the computational methodology was validated through comparative analysis,which revealed less than a 6%deviation in aerodynamic drag between the numerical simulations and wind tunnel tests.Aerodynamic decomposition revealed that the operating direction critically impacts the uplift force,which is governed by two factors:streamwise cross-strip positioning and the angular orientation of the arm hinge.These factors collectively determine the divergent aerodynamic responses of the panhead and frame during directional changes.By establishing a parametric database encompassing four strip-to-crossbar spacing configurations and six arm diameter variations,nonlinear response patterns of the uplift forces under different operating directions to geometric modifications were quantified.Both adjustment approaches,simultaneously reducing both streamwise and vertical strip-to-crossbar spacings to half of the original dimensions or increasing the upper arm spanwise diameter to 1.45 times and decreasing the lower arm spanwise diameter to 0.55 times the baseline values,successfully constrained aerodynamic uplift force deviations between operating directions within 3%.展开更多
Prepulse combined hydraulic fracturing facilitates the development of fracture networks by integrating prepulse hydraulic loading with conventional hydraulic fracturing.The formation mechanisms of fracture networks be...Prepulse combined hydraulic fracturing facilitates the development of fracture networks by integrating prepulse hydraulic loading with conventional hydraulic fracturing.The formation mechanisms of fracture networks between hydraulic and pre-existing fractures under different prepulse loading parameters remain unclear.This research investigates the impact of prepulse loading parameters,including the prepulse loading number ratio(C),prepulse loading stress ratio(S),and prepulse loading frequency(f),on the formation of fracture networks between hydraulic and pre-existing fractures,using both experimental and numerical methods.The results suggest that low prepulse loading stress ratios and high prepulse loading number ratios are advantageous loading modes.Multiple hydraulic fractures are generated in the specimen under the advantageous loading modes,facilitating the development of a complex fracture network.Fatigue damage occurs in the specimen at the prepulse loading stage.The high water pressure at the secondary conventional hydraulic fracturing promotes the growth of hydraulic fractures along the damage zones.This allows the hydraulic fractures to propagate deeply and interact with pre-existing fractures.Under advantageous loading conditions,multiple hydraulic fractures can extend to pre-existing fractures,and these hydraulic fractures penetrate or propagate along pre-existing fractures.Especially when the approach angle is large,the damage range in the specimen during the prepulse loading stage increases,resulting in the formation of more hydraulic fractures.展开更多
Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in speci...Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in specific tasks with reduced training costs,the substantial memory requirements during fine-tuning present a barrier to broader deployment.Parameter-Efficient Fine-Tuning(PEFT)techniques,such as Low-Rank Adaptation(LoRA),and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency.Among these,QLoRA,which combines PEFT and quantization,has demonstrated notable success in reducing memory footprints during fine-tuning,prompting the development of various QLoRA variants.Despite these advancements,the quantitative impact of key variables on the fine-tuning performance of quantized LLMs remains underexplored.This study presents a comprehensive analysis of these key variables,focusing on their influence across different layer types and depths within LLM architectures.Our investigation uncovers several critical findings:(1)Larger layers,such as MLP layers,can maintain performance despite reductions in adapter rank,while smaller layers,like self-attention layers,aremore sensitive to such changes;(2)The effectiveness of balancing factors depends more on specific values rather than layer type or depth;(3)In quantization-aware fine-tuning,larger layers can effectively utilize smaller adapters,whereas smaller layers struggle to do so.These insights suggest that layer type is a more significant determinant of fine-tuning success than layer depth when optimizing quantized LLMs.Moreover,for the same discount of trainable parameters,reducing the trainable parameters in a larger layer is more effective in preserving fine-tuning accuracy than in a smaller one.This study provides valuable guidance for more efficient fine-tuning strategies and opens avenues for further research into optimizing LLM fine-tuning in resource-constrained environments.展开更多
基金supported by the Key Project of Science and Technology Research by Chongqing Education Commission under Grant KJZD-K202400610the Chongqing Natural Science Foundation General Project Grant CSTB2025NSCQ-GPX1263.
文摘The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.
基金supported by the Anhui Quality Infrastructure Standardization Project(Grant No.2024MKSO7)the Science and Technology Project of State Grid(SGAHDK00DJJS2310027)the Anhui Provincial Natural Science Foundation(Grant No.2208085UD03).
文摘In electrochemical energy storage systems,the sodium-ion battery is typically integrated in the form of a“cell-module-cluster”,but its cross-scale thermal runaway triggering risk and the propagation mechanism remain unclear.This study reveals the cross-scale thermal runaway triggering and propagation behavior of sodium-ion batteries of“cell-module-cluster”under overcharge conditions,and investigates the effects of key factors,including module spacing,triggering cell location,and heat dissipation condition,on the thermal runaway propagation behavior.Results demonstrate that the thermal runaway propagation in a module containing the overcharged cell follows a sequential triggering mode,while thermal runaway in the downstream module exhibits a simultaneous triggering mode with greater severity.Furthermore,increasing the module spacing or enhancing the heat dissipation capacity can effectively reduce the heat accumulation and prevent the trigger of thermal runaway.On the above basis,the multi-dimensional evaluation strategy is proposed to quantitatively assess the hazard of sodium-ion battery cluster thermal runaway.The findings serve as a foundation for the safe design of sodium-ion batteries in energy storage systems.
基金Supported by Zhoukou Key Science and Technology Research Project(20200816).
文摘With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.
基金supported in part by National Natural Science Foundation of China(under Grant 61902163)the Jiangsu“Qing Lan Project”,Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Major Research Project:23KJA520007)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX25_1303).
文摘Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.
基金supported by the National Key Research and Development Plan(2023YFC30099000)the National Natural Science Foundation of China(52104197,52272396,52474233)+2 种基金the Major Basic Research Project of the Natural Science Foundation of the Jiangsu Higher Education Institutions(2020240521)the Open Fund of the State Key Laboratory of Fire Science(SKLFS)Program(HZ2025-KF03)the Postgraduate Research&Practice Innovation Program of Jiangsu Province(SJCX25_0595)。
文摘With the increasing application of lithium-ion batteries under high-rate operation,safety concerns such as thermal runaway(TR)and thermal runaway propagation(TRP)have become critical.In this study,the TRP action of batteries undergoing high-rate cycling is systematically investigated.Microanalysis results reveal that the crystallinity and I_((003))/I_((004))of the cathode are decreased by 32.95%and 13.01%after 4 C cycling,while the layered structure of the anode is seriously damaged.As revealed,the TR interval time(At)of batteries cycled at 4 C is decreased by 83.23%compared with that for batteries cycled at 1 C.Meanwhile,the maximum mass loss(ML)rate of Battery 2#is increased by 32.35%.We have further investigated the influence of battery spacing on TRP action.The maximum TR temperature of Battery2#at 1.5 cm spacing is reduced by 26.21%compared with the value at 0 cm spacing.When increasing the spacing from 0 to 1.5 cm,the ML of batteries is reduced by 20.73%.ML increases and decreases with the elevation of the charging rate and battery spacing,respectively.Compared with a battery cycled at1 C,a battery cycled at 4 C shows reduced heat required to trigger TR.The corresponding decreases can reach 68.28%,70.10%,76.88%,and 26.15%when setting the spacing at 0,0.6,1.5,and 2.1 cm,respectively.This indicates that Battery 2#can enter TR with much lower heat after high-rate cycling.Overall,high-rate cycling and low spacing accelerate the TRP of the battery and aggravate the TR severity of the battery.This work can provide insights for the practical safety design of energy storage systems.
基金funded by the Science and Technology Program of State Grid Corporation of China(5500-202356358A-2-1-ZX).
文摘Arc faults within the transformers can generate sudden pressure surges,constituting significant hazards that may precipitate oil tank explosions and severely compromise power system stability.Conventional power−frequency arc discharge experiments encounter limitations in isolating pressure wave characteristics due to persistent gas generation and arc reignition.To circumvent these challenges,an oil-immersed impulse voltage discharge platform was conceived and engineered to investigate pressure wave propagation dynamics.A pressure numerical simulation model and theoretical model of oil−solid interface reflection and refraction were subsequently established to elucidate the pressure propagation mechanism.The experimental and simulation results show that the pressure wave generated by pulsed arc discharge in oil propagates radially in the form of spherical waves.Due to the viscous loss and wave front expansion of transformer oil,the peak pressure decays exponentially with distance,with a decay coefficientβ=1.15.When pressure waves encounter metal obstacles inside transformer oil,there are two propagation paths:direct transmission through and multiple reflections through,and a mode transformation of pressure waves occurs at the oil−solid interface,mainly propagating through obstacles in the form of transverse waves.This work quantitatively delineates the energy pressure wave coupling,propagation dynamics,and attenuation mechanisms,providing critical insights for assessing and mitigating arc fault-induced transformer explosion risks.
文摘Hydraulic fracturing serves as a critical technology for reservoir stimulation in deep coalbed methane(CBM)development,where the mechanical properties of gangue layers exert a significant control on fracture propagation behavior.To address the unclear mechanisms governing fracture penetration across coal-gangue interfaces,this study employs the Continuum-Discontinuum Element Method(CDEM)to simulate and analyze the vertical propagation of hydraulic fractures initiating within coal seams,based on geomechanical parameters derived from the deep Benxi Formation coal seams in the southeastern Ordos Basin.The investigation systematically examines the influence of geological and operational parameters on cross-interfacial fracture growth.Results demonstrate that vertical stress difference,elastic modulus contrast between coal and gangue layers,interfacial stress differential,and interfacial cohesion at coal-gangue interfaces are critical factors governing hydraulic fracture penetration through these interfaces.High vertical stress differences(>3 MPa)inhibit interfacial dilation,promoting predominant crosslayer fracture propagation.Reduced interfacial stress contrasts and enhanced interfacial cohesion facilitate fracture penetration across interfaces.Furthermore,smaller elastic modulus contrasts between coal and gangue correlate with increased interfacial aperture.Finally,lower injection rates effectively suppress vertical fracture propagation in deep coal reservoirs.This study elucidates the characteristics and mechanisms governing cross-layer fracture propagation in coal–rock composites with interbedded partings,and delineates the dynamic evolution laws and dominant controlling factors involved.Thefindings provide critical theoretical insights for the optimization of fracture design and the efficient development of deep coalbed methane reservoirs.
基金supported by the National Natural Science Foundation of China(No.52090041).
文摘The influence of different solution and aging conditions on the microstructure,impact toughness,and crack initiation and propagation mechanisms of the novel α+β titanium alloy Ti6422 was systematically investigated.By adjusting the furnace cooling time after solution treatment and the aging temperature,Ti6422 alloy samples were developed with a multi-level lamellar microstructure,in-cluding microscaleαcolonies and α_(p) lamellae,as well as nanoscale α_(s) phases.Extending the furnace cooling time after solution treatment at 920℃ for 1 h from 240 to 540 min,followed by aging at 600℃ for 6 h,increased the α_(p) lamella content,reduced the α_(s) phase content,expanded theαcolonies and α_(p) lamellae size,and improved the impact toughness from 22.7 to 53.8 J/cm^(2).Additionally,under the same solution treatment,raising the aging temperature from 500 to 700℃ resulted in a decrease in the α_(s) phase content and a growth in the thickness of the α_(p) lamella and α_(s) phase.The impact toughness increased significantly with these changes.Samples with high α_(p) lamellae content or large α_(s) phase size exhibited high crack initiation and propagation energies.Impact deformation caused severe kinking of the α_(p) lamellae in crack initiation and propagation areas,leading to a uniform and high-density kernel average misorientation(KAM)distribu-tion,enhancing plastic deformation coordination and uniformity.Moreover,the multidirectional arrangement of coarserαcolonies and α_(p) lamellae continuously deflect the crack propagation direction,inhibiting crack propagation.
基金financially supported by the National Nature Science Foundation of China(Nos.52379110 and 42207222)the Key Technologies for Accurate Diagnosis and Intelligent Prevention and Control of Slope Hazards in Open Pit Mines,181 Major R&D projects of Metallurgical Corporation of China Ltd。
文摘The stability of rock slopes is frequently controlled by the initiation and propagation of inherent dominant cracks.This study systematically investigated these processes in valley slopes by combining fracture-mechanics analysis with transparent soil model tests.An analytical expression for the stress field at the dominant crack tip was derived from the slope stress distribution by superposing the corresponding stress intensity factors(SIFs).The theoretical predictions were then validated against observations from transparent soil model tests.The influences of slope angle(β),crack inclination angle(α),crack position parameter(b),and crack length parameter(h)on crack initiation and propagation were quantified.The results indicated that:(1)cracks at the slope crest tended to propagate in shear mode,and the shear crack initiation angle(θ_(s))was approximately 8°.Cracks at the slope toe might propagate in either tensile or shear mode.(2)θ_(s) at the slope crest increased withβ,b,and l,and decreased withα.The maximum change inθ_(s) induced by the considered parameters was approximately 30°.(3)The tensile crack initiation angle(θ_(t))at the slop toe decreased withβ,α,and l,while the influence of b was comparatively minor.The maximum change inθ_(t) caused by individual parameters ranged approximately from 25°to 60°.Predicted crack propagation modes and directions showed good agreement with experimental results.These findings provide theoretical guidance for stability assessments of valley slopes controlled by dominant crack propagation.
基金support from Research Council of Norway via STIPINST PhD grant(Grant No.323307),Bever Control AS,and Bane NOR.
文摘This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.
文摘Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.
基金funded by the National Key Research and Development Program of China(grant number 2023YFC2907600)the National Natural Science Foundation of China(grant number 52504132)Tiandi Science and Technology Co.,Ltd.Science and Technology Innovation Venture Capital Special Project(grant number 2023-TD-ZD011-004).
文摘Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.
基金supported by the National Key Research and Development Program(2021YFB150740401)National Natural Science Foundation of China(42202336)the CAS Pioneer Hundred Talents Program in China(Y826031C01)。
文摘Hydraulic stimulation technology is widely employed to enhance the permeability of geothermal reservoirs.Nevertheless,accurately predicting hydraulic fracture propagation in complex geological conditions remains challenging,thereby hindering the effective utilization of existing natural fractures.In this study,a phase field model was developed utilizing the finite element method to examine the influence of fluid presence,stress conditions,and natural fractures on the initiation and propagation of hydraulic fractures.The model employs Biot's poroelasticity theory to establish the coupling between the displacement field and the fluid field,while the phase field theory is applied to simulate fracture behavior.The results show that whenσ_(x0)/σ_(y0)<3 or qf<20 kg/(m^(3)·s),the presence of natural fractures can alter the original propagation direction of hydraulic fractures.Conversely,in the absence of these conditions,the propagation path of natural fractures is predominantly influenced by the initial stress field.Furthermore,based on the analysis of breakdown pressure and damage area,the optimal intersection angle between natural fractures and hydraulic fractures is determined to range from 45°to 60°.Finally,once a dominant channel forms,initiating and propagating hydraulic fractures in other directions becomes increasingly difficult,even in highly fractured areas.This method tackles the challenges of initiating and propagating hydraulic fractures in complex geological conditions,providing a theoretical basis for optimizing Enhanced Geothermal System(EGS)projects.
基金funded by the Science Committee of the Ministry of Science and Higher Education of the Republic of Kazakhstan(Grant No.AP19680589).
文摘Using the software ANSYS-19.2/Explicit Dynamics,this study performedfinite-element modeling of the large-diameter steel pipeline cross-section for the Beineu-Bozoy-Shymkent gas pipeline with a non-through straight crack,strengthened by steel wire wrapping.The effects of the thread tensile force of the steel winding in the form of single rings at the crack edges and the wires with different winding diameters and pitches were also studied.The results showed that the strengthening was preferably executed at a minimum value of the thread tensile force,which was 6.4%more effective than that at its maximum value.The analysis of the influence of the winding dia-meters showed that the equivalent stresses increased by 32%from the beginning of the crack growth until the wire broke.The increment in winding diameter decelerated the disclosure of the edge crack and reduced its length by 8.2%.The analysis of the influence of the winding pitch showed that decreasing the distance between the winding turns also led to a 33.6%reduction in the length of the straight crack and a 7.9%reduction in the maximum stres-ses on the strengthened pipeline cross-section.The analysis of the temperature effect on the pipeline material,within a range from-40℃to+50℃,resulted in a crack length change of up to 5.8%.As the temperature dropped,the crack length decreased.Within such a temperature range,the maximum stresses were observed along the cen-tral area of the crack,which were equal to 413 MPa at+50℃and 440 MPa at-40℃.The results also showed that the presence of the steel winding in the pipeline significantly reduced the length of crack propagation up to 8.4 times,depending on the temperature effect and design parameters of prestressing.This work integrated the existing methods for crack localization along steel gas pipelines.
文摘In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys.
基金National Natural Science Foundation of China(12172292,12072287)。
文摘The crack initiation and early propagation are of great significance to the overall fatigue life of material.In order to investigate the anisotropic fracture behavior of laser metal deposited Ti-6Al-4V alloy(LMD Ti64)during the early stage,the fourpoint bending fatigue test was carried out on specimens of three different directions,as well as the forged specimens.The results indicate the anisotropic crack initiation and early propagation of LMD Ti64.The direction perpendicular to the deposition direction exhibits a better fatigue resistance than the other two.The crack initiation position and propagation path are dominated by the microstructure in the vicinity of U-notch.LMD Ti64 has a typical small crack effect,and the early crack propagation velocities in three directions are similar.Affected by the slip system of LMD Ti64,secondary cracks frequently occur,which are often found to have an angle of 60°to the main crack.The electron backscatter diffraction analysis indicates that LMD Ti64 has preferred orientations,i.e.,strong 0001//Z texture and 001//Z texture.Their crystallographic orientation will change as the direction of columnarβgrains turns over,resulting in the fatigue anisotropy of LMD Ti64 in crack initiation and early crack propagation process.
基金supported by the Major Project of China Railway Co.,Ltd.(Grant No.K2021J004-A).
文摘This study addresses the significant disparity in aerodynamic uplift forces experienced by single-strip high-speed pantographs under different operating directions.A systematic numerical investigation was conducted to evaluate the influence of key geometric parameters on aerodynamic characteristics,culminating in two targeted adjustment strategies.The reliability of the computational methodology was validated through comparative analysis,which revealed less than a 6%deviation in aerodynamic drag between the numerical simulations and wind tunnel tests.Aerodynamic decomposition revealed that the operating direction critically impacts the uplift force,which is governed by two factors:streamwise cross-strip positioning and the angular orientation of the arm hinge.These factors collectively determine the divergent aerodynamic responses of the panhead and frame during directional changes.By establishing a parametric database encompassing four strip-to-crossbar spacing configurations and six arm diameter variations,nonlinear response patterns of the uplift forces under different operating directions to geometric modifications were quantified.Both adjustment approaches,simultaneously reducing both streamwise and vertical strip-to-crossbar spacings to half of the original dimensions or increasing the upper arm spanwise diameter to 1.45 times and decreasing the lower arm spanwise diameter to 0.55 times the baseline values,successfully constrained aerodynamic uplift force deviations between operating directions within 3%.
基金financially supported by,the Fundamental Research Funds for the Central Universities(Grant No.2023QN1064)the China Postdoctoral Science Foundation(Grant No.2023M733772)Jiangsu Funding Program for Excellent Postdoctoral Talent(Grant No.2023ZB847)。
文摘Prepulse combined hydraulic fracturing facilitates the development of fracture networks by integrating prepulse hydraulic loading with conventional hydraulic fracturing.The formation mechanisms of fracture networks between hydraulic and pre-existing fractures under different prepulse loading parameters remain unclear.This research investigates the impact of prepulse loading parameters,including the prepulse loading number ratio(C),prepulse loading stress ratio(S),and prepulse loading frequency(f),on the formation of fracture networks between hydraulic and pre-existing fractures,using both experimental and numerical methods.The results suggest that low prepulse loading stress ratios and high prepulse loading number ratios are advantageous loading modes.Multiple hydraulic fractures are generated in the specimen under the advantageous loading modes,facilitating the development of a complex fracture network.Fatigue damage occurs in the specimen at the prepulse loading stage.The high water pressure at the secondary conventional hydraulic fracturing promotes the growth of hydraulic fractures along the damage zones.This allows the hydraulic fractures to propagate deeply and interact with pre-existing fractures.Under advantageous loading conditions,multiple hydraulic fractures can extend to pre-existing fractures,and these hydraulic fractures penetrate or propagate along pre-existing fractures.Especially when the approach angle is large,the damage range in the specimen during the prepulse loading stage increases,resulting in the formation of more hydraulic fractures.
基金supported by the National Key R&D Program of China(No.2021YFB0301200)National Natural Science Foundation of China(No.62025208).
文摘Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in specific tasks with reduced training costs,the substantial memory requirements during fine-tuning present a barrier to broader deployment.Parameter-Efficient Fine-Tuning(PEFT)techniques,such as Low-Rank Adaptation(LoRA),and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency.Among these,QLoRA,which combines PEFT and quantization,has demonstrated notable success in reducing memory footprints during fine-tuning,prompting the development of various QLoRA variants.Despite these advancements,the quantitative impact of key variables on the fine-tuning performance of quantized LLMs remains underexplored.This study presents a comprehensive analysis of these key variables,focusing on their influence across different layer types and depths within LLM architectures.Our investigation uncovers several critical findings:(1)Larger layers,such as MLP layers,can maintain performance despite reductions in adapter rank,while smaller layers,like self-attention layers,aremore sensitive to such changes;(2)The effectiveness of balancing factors depends more on specific values rather than layer type or depth;(3)In quantization-aware fine-tuning,larger layers can effectively utilize smaller adapters,whereas smaller layers struggle to do so.These insights suggest that layer type is a more significant determinant of fine-tuning success than layer depth when optimizing quantized LLMs.Moreover,for the same discount of trainable parameters,reducing the trainable parameters in a larger layer is more effective in preserving fine-tuning accuracy than in a smaller one.This study provides valuable guidance for more efficient fine-tuning strategies and opens avenues for further research into optimizing LLM fine-tuning in resource-constrained environments.