Using the software ANSYS-19.2/Explicit Dynamics,this study performedfinite-element modeling of the large-diameter steel pipeline cross-section for the Beineu-Bozoy-Shymkent gas pipeline with a non-through straight crac...Using the software ANSYS-19.2/Explicit Dynamics,this study performedfinite-element modeling of the large-diameter steel pipeline cross-section for the Beineu-Bozoy-Shymkent gas pipeline with a non-through straight crack,strengthened by steel wire wrapping.The effects of the thread tensile force of the steel winding in the form of single rings at the crack edges and the wires with different winding diameters and pitches were also studied.The results showed that the strengthening was preferably executed at a minimum value of the thread tensile force,which was 6.4%more effective than that at its maximum value.The analysis of the influence of the winding dia-meters showed that the equivalent stresses increased by 32%from the beginning of the crack growth until the wire broke.The increment in winding diameter decelerated the disclosure of the edge crack and reduced its length by 8.2%.The analysis of the influence of the winding pitch showed that decreasing the distance between the winding turns also led to a 33.6%reduction in the length of the straight crack and a 7.9%reduction in the maximum stres-ses on the strengthened pipeline cross-section.The analysis of the temperature effect on the pipeline material,within a range from-40℃to+50℃,resulted in a crack length change of up to 5.8%.As the temperature dropped,the crack length decreased.Within such a temperature range,the maximum stresses were observed along the cen-tral area of the crack,which were equal to 413 MPa at+50℃and 440 MPa at-40℃.The results also showed that the presence of the steel winding in the pipeline significantly reduced the length of crack propagation up to 8.4 times,depending on the temperature effect and design parameters of prestressing.This work integrated the existing methods for crack localization along steel gas pipelines.展开更多
In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has beco...In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys.展开更多
Prepulse combined hydraulic fracturing facilitates the development of fracture networks by integrating prepulse hydraulic loading with conventional hydraulic fracturing.The formation mechanisms of fracture networks be...Prepulse combined hydraulic fracturing facilitates the development of fracture networks by integrating prepulse hydraulic loading with conventional hydraulic fracturing.The formation mechanisms of fracture networks between hydraulic and pre-existing fractures under different prepulse loading parameters remain unclear.This research investigates the impact of prepulse loading parameters,including the prepulse loading number ratio(C),prepulse loading stress ratio(S),and prepulse loading frequency(f),on the formation of fracture networks between hydraulic and pre-existing fractures,using both experimental and numerical methods.The results suggest that low prepulse loading stress ratios and high prepulse loading number ratios are advantageous loading modes.Multiple hydraulic fractures are generated in the specimen under the advantageous loading modes,facilitating the development of a complex fracture network.Fatigue damage occurs in the specimen at the prepulse loading stage.The high water pressure at the secondary conventional hydraulic fracturing promotes the growth of hydraulic fractures along the damage zones.This allows the hydraulic fractures to propagate deeply and interact with pre-existing fractures.Under advantageous loading conditions,multiple hydraulic fractures can extend to pre-existing fractures,and these hydraulic fractures penetrate or propagate along pre-existing fractures.Especially when the approach angle is large,the damage range in the specimen during the prepulse loading stage increases,resulting in the formation of more hydraulic fractures.展开更多
Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in speci...Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in specific tasks with reduced training costs,the substantial memory requirements during fine-tuning present a barrier to broader deployment.Parameter-Efficient Fine-Tuning(PEFT)techniques,such as Low-Rank Adaptation(LoRA),and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency.Among these,QLoRA,which combines PEFT and quantization,has demonstrated notable success in reducing memory footprints during fine-tuning,prompting the development of various QLoRA variants.Despite these advancements,the quantitative impact of key variables on the fine-tuning performance of quantized LLMs remains underexplored.This study presents a comprehensive analysis of these key variables,focusing on their influence across different layer types and depths within LLM architectures.Our investigation uncovers several critical findings:(1)Larger layers,such as MLP layers,can maintain performance despite reductions in adapter rank,while smaller layers,like self-attention layers,aremore sensitive to such changes;(2)The effectiveness of balancing factors depends more on specific values rather than layer type or depth;(3)In quantization-aware fine-tuning,larger layers can effectively utilize smaller adapters,whereas smaller layers struggle to do so.These insights suggest that layer type is a more significant determinant of fine-tuning success than layer depth when optimizing quantized LLMs.Moreover,for the same discount of trainable parameters,reducing the trainable parameters in a larger layer is more effective in preserving fine-tuning accuracy than in a smaller one.This study provides valuable guidance for more efficient fine-tuning strategies and opens avenues for further research into optimizing LLM fine-tuning in resource-constrained environments.展开更多
Atlantic Meridional Overturning Circulation(AMOC)plays a central role in long-term climate variations through its heat and freshwater transports,which can collapse under a rapid increase of greenhouse gas forcing in c...Atlantic Meridional Overturning Circulation(AMOC)plays a central role in long-term climate variations through its heat and freshwater transports,which can collapse under a rapid increase of greenhouse gas forcing in climate models.Previous studies have suggested that the deviation of model parameters is one of the major factors in inducing inaccurate AMOC simulations.In this work,with a low-resolution earth system model,the authors try to explore whether a reasonable adjustment of the key model parameter can help to re-establish the AMOC after its collapse.Through a new optimization strategy,the extra freshwater flux(FWF)parameter is determined to be the dominant one affecting the AMOC’s variability.The traditional ensemble optimal interpolation(EnOI)data assimilation and new machine learning methods are adopted to optimize the FWF parameter in an abrupt 4×CO_(2) forcing experiment to improve the adaptability of model parameters and accelerate the recovery of AMOC.The results show that,under an abrupt 4×CO_(2) forcing in millennial simulations,the AMOC will first collapse and then re-establish by the default FWF parameter slowly.However,during the parameter adjustment process,the saltier and colder sea water over the North Atlantic region are the dominant factors in usefully improving the adaptability of the FWF parameter and accelerating the recovery of AMOC,according to their physical relationship with FWF on the interdecadal timescale.展开更多
The crack initiation and early propagation are of great significance to the overall fatigue life of material.In order to investigate the anisotropic fracture behavior of laser metal deposited Ti-6Al-4V alloy(LMD Ti64)...The crack initiation and early propagation are of great significance to the overall fatigue life of material.In order to investigate the anisotropic fracture behavior of laser metal deposited Ti-6Al-4V alloy(LMD Ti64)during the early stage,the fourpoint bending fatigue test was carried out on specimens of three different directions,as well as the forged specimens.The results indicate the anisotropic crack initiation and early propagation of LMD Ti64.The direction perpendicular to the deposition direction exhibits a better fatigue resistance than the other two.The crack initiation position and propagation path are dominated by the microstructure in the vicinity of U-notch.LMD Ti64 has a typical small crack effect,and the early crack propagation velocities in three directions are similar.Affected by the slip system of LMD Ti64,secondary cracks frequently occur,which are often found to have an angle of 60°to the main crack.The electron backscatter diffraction analysis indicates that LMD Ti64 has preferred orientations,i.e.,strong 0001//Z texture and 001//Z texture.Their crystallographic orientation will change as the direction of columnarβgrains turns over,resulting in the fatigue anisotropy of LMD Ti64 in crack initiation and early crack propagation process.展开更多
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu...5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation.展开更多
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.
The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)prot...The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)protocol can overcome a fundamental physical limit,known as the Pirandola-Laurenza-Ottaviani-Banchi bound,without requiring global phase-locking.In this work,we propose a method based on multi-step AD to further enhance the performance of MP-QKD.The simulation results show that,compared to one-step AD,multi-step AD achieves better performance in long-distance scenarios and can tolerate a higher quantum bit error rate.Specifically,when the difference between the communication distances from Alice and Bob to Charlie is 25 km,50 km and 75 km,and the corresponding transmission distance exceeds 523 km,512 km and 496 km,respectively,the secret key rate achieved by multi-step AD surpasses that of one-step AD.Our findings indicate that the proposed method can effectively promote the application of MP-QKD in scenarios with high loss and high error rate.展开更多
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The la...State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization.展开更多
Multi-stage and multi-cluster fracturing(MMF)is a crucial technology in unconventional oil and gas development,aiming to enhance production by creating extensive fracture networks.However,achieving uniform expansion o...Multi-stage and multi-cluster fracturing(MMF)is a crucial technology in unconventional oil and gas development,aiming to enhance production by creating extensive fracture networks.However,achieving uniform expansion of multi-cluster hydraulic fractures(HFs)in MMF remains a significant challenge.Field practice has shown that the use of temporary plugging and diversion fracturing(TPDF)can promote the balanced expansion of multi-cluster HFs.This study conducted TPDF experiments using a true triaxial fracturing simulation system setting a horizontal well completion with multi-cluster jetting perforations to investigate the equilibrium initiation and extension of multi-cluster fractures.The influence of key parameters,including cluster spacing,fracturing fluid viscosity,differential stress,and fracturing fluid injection rate,on fracture initiation and propagation was systematically examined.The results indicate that while close-spaced multi-cluster fracturing significantly increases the number of HFs,it also leads to uneven extension of HFs in their propagation.In contrast,TPDF demonstrates effectiveness in mitigating uneven HF extension,increasing the number of HFs,and creating a larger stimulated reservoir volume,ultimately leading to improved oil and gas well productivity.Moreover,under conditions of high differential stress,the differential stress within the formation exerts a stronger guiding effect in HFs,which are more closely aligned with the minimum principal stress.Low-viscosity fluids facilitate rapid and extensive fracture propagation within the rock formation.High-volume fluid injection,on the other hand,more comprehensively fills the formation.Therefore,employing lowviscosity and high-volume fracturing is advantageous for the initiation and extension of multi-cluster HFs.展开更多
A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralde...A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralded pair-coherent sources,and devices designed to implement passive decoy states are included at the transmitter sides to generate the decoy state pulses in the decoy-state window passively.With the defined efficient events and the designed pairing strategy,the key bits and bases can be obtained by data post-processing.Numerical simulation results verify the feasibility of the proposed protocol.The results show that the proposed protocol can exceed PLOB when the pairing interval setting is greater than 10^(3),and the transmission distance exceeds 200 km.When the key transmission distance reaches 300 km and the maximum pairing interval is equivalent to 1,its performance is improved by nearly 1.8 times compared to the original MP-QKD protocol with a weak coherent source(WCS-MP-QKD),and by 6.8 times higher than that of WCS-MPQKD with passive decoy states(WCS-PDS-MP-QKD).Meanwhile,the key transmission distance can reach 480 km,and surpasses the WCS-PDS-MP-QKD protocol by nearly 40 km.When the total pulse length is greater than 10^(11),the key generation rate is almost equal to that of infinite pulses.It is a promising QKD protocol that breaks the PLOB bound without requiring phase tracking and locking,has a longer transmission distance and a higher key generation rate,and eliminates the potential of side channel attack.展开更多
Accurate identification and effective support of key blocks are crucial for ensuring the stability and safety of rock slopes.The number of structural planes and rock blocks were reduced in previous studies.This impair...Accurate identification and effective support of key blocks are crucial for ensuring the stability and safety of rock slopes.The number of structural planes and rock blocks were reduced in previous studies.This impairs the ability to characterize complex rock slopes accurately and inhibits the identification of key blocks.In this paper,a knowledge-data dually driven paradigm for accurate identification of key blocks in complex rock slopes is proposed.Our basic idea is to integrate key block theory into data-driven models based on finely characterizing structural features to identify key blocks in complex rock slopes accurately.The proposed novel paradigm consists of(1)representing rock slopes as graph-structured data based on complex systems theory,(2)identifying key nodes in the graph-structured data using graph deep learning,and(3)mapping the key nodes of graph-structured data to corresponding key blocks in the rock slope.Verification experiments and real-case applications are conducted by the proposed method.The verification results demonstrate excellent model performance,strong generalization capability,and effective classification results.Moreover,the real case application is conducted on the northern slope of the Yanqianshan Iron Mine.The results show that the proposed method can accurately identify key blocks in complex rock slopes,which can provide a decision-making basis and rational recommendations for effective support and instability prevention of rock slopes,thereby ensuring the stability of rock engineering and the safety of life and property.展开更多
Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,sca...Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks.展开更多
With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehi...With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehicles are mobile entities,they move across different domains and need to communicate with the Roadside Unit(RSU)in various regions.However,open environments are highly susceptible to becoming targets for attackers,posing significant risks of malicious attacks.Therefore,it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs,particularly in scenarios where vehicles cross domains.In this paper,we propose a provably secure cross-domain authentication and key agreement protocol for IoV.Our protocol comprises two authentication phases:intra-domain authentication and cross-domain authentication.To ensure the security of our protocol,we conducted rigorous analyses based on the ROR(Real-or-Random)model and Scyther.Finally,we show in-depth comparisons of our protocol with existing ones from both security and performance perspectives,fully demonstrating its security and efficiency.展开更多
As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on vari...As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on various aspects of security,gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments.This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function(PUF)for authentication and key agreement,offering a comprehensive solution to the security challenges in VANETs.The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs,ensuring the confidentiality and integrity of vehicle-to-network(V2N)communications and preventing malicious data injection.Notably,by replacing traditional Kerberos password authentication with Challenge-Response Pairs(CRPs)generated by PUF,the protocol significantly reduces the risk of key leakage.The inherent properties of PUF—such as unclonability and unpredictability—make it an ideal defense against physical attacks,including intrusion,semi-intrusion,and side-channel attacks.The results of this study demonstrate that this approach not only enhances security but also optimizes communication efficiency,reduces latency,and improves overall user experience.The analysis proves that our protocol achieves at least 86%improvement in computational efficiency compared to some existed protocols.This is particularly crucial in resource-constrained VANET environments,where it enables efficient data transmission between vehicles and applications,reduces latency,and enhances the overall user experience.展开更多
The acoustic wave propagation in gas-saturated double-porosity materials composed of a microporous matrix and mesopores with arrays of plate-type resonators is investigated.A macroscopic description,established with t...The acoustic wave propagation in gas-saturated double-porosity materials composed of a microporous matrix and mesopores with arrays of plate-type resonators is investigated.A macroscopic description,established with the two-scale asymptotic homogenization method,evidences the combined effect of inner resonances on the acoustic properties of the respective effective visco-thermal fluid.One type of resonance originates from strong pore-scale fluid-structure interaction,while the other one arises from pressure diffusion.These phenomena respectively cause weakly and highly damped resonances,which are activated by internal momentum or mass sources,and can largely influence,depending on the material's morphology,either the effective fluid's dynamic density,compressibility,or both.We introduce semi-analytical models to illustrate the key effective properties of the studied multiscale metamaterials.The results provide insights for the bottom-up design of multiscale acoustic metamaterials with exotic behaviors,such as the negative,very slow,or supersonic phase velocity,as well as sub-wavelength bandgaps.展开更多
Accurately identifying key nodes is essential for evaluating network robustness and controlling information propagation in complex network analysis. However, current research methods face limitations in applicability ...Accurately identifying key nodes is essential for evaluating network robustness and controlling information propagation in complex network analysis. However, current research methods face limitations in applicability and accuracy. To address these challenges, this study introduces the K-GCN model, which integrates neighborhood k-shell distribution analysis with Graph Convolutional Network(GCN) technology to enhance key node identification in complex networks. The K-GCN model first leverages neighborhood k-shell distributions to calculate entropy values for each node, effectively quantifying node importance within the network. These entropy values are then used as key features within the GCN, which subsequently formulates intelligent strategies to maximize network connectivity disruption by removing a minimal set of nodes, thereby impacting the overall network architecture. Through iterative interactions with the environment, the GCN continuously refines its strategies, achieving precise identification of key nodes in the network. Unlike traditional methods, the K-GCN model not only captures local node features but also integrates the network structure and complex interrelations between neighboring nodes, significantly improving the accuracy and efficiency of key node identification.Experimental validation in multiple real-world network scenarios demonstrates that the K-GCN model outperforms existing methods.展开更多
With the deepening cultural and economic ties between China and Italy,Chinese language education in Italy has been at the forefront of Europe,and significant progress has been made in localized teaching in Italy.Howev...With the deepening cultural and economic ties between China and Italy,Chinese language education in Italy has been at the forefront of Europe,and significant progress has been made in localized teaching in Italy.However,the current“Chinese language craze”in Italy seems to have cooled down,and the demand for Italians to learn Chinese has stabilized or even declined.This phenomenon involves multiple factors.From the perspective of cross-cultural perspective,this paper analyzes the current development status of Chinese language education in Italy,as well as the practical problems existing in various aspects such as teachers,textbooks,and curriculum settings.It explores the key factors for the better development of Chinese language education in Italy and provides suggestions on how to solve the current problems,aiming to promote the sound development of Chinese language education in Italy.展开更多
基金funded by the Science Committee of the Ministry of Science and Higher Education of the Republic of Kazakhstan(Grant No.AP19680589).
文摘Using the software ANSYS-19.2/Explicit Dynamics,this study performedfinite-element modeling of the large-diameter steel pipeline cross-section for the Beineu-Bozoy-Shymkent gas pipeline with a non-through straight crack,strengthened by steel wire wrapping.The effects of the thread tensile force of the steel winding in the form of single rings at the crack edges and the wires with different winding diameters and pitches were also studied.The results showed that the strengthening was preferably executed at a minimum value of the thread tensile force,which was 6.4%more effective than that at its maximum value.The analysis of the influence of the winding dia-meters showed that the equivalent stresses increased by 32%from the beginning of the crack growth until the wire broke.The increment in winding diameter decelerated the disclosure of the edge crack and reduced its length by 8.2%.The analysis of the influence of the winding pitch showed that decreasing the distance between the winding turns also led to a 33.6%reduction in the length of the straight crack and a 7.9%reduction in the maximum stres-ses on the strengthened pipeline cross-section.The analysis of the temperature effect on the pipeline material,within a range from-40℃to+50℃,resulted in a crack length change of up to 5.8%.As the temperature dropped,the crack length decreased.Within such a temperature range,the maximum stresses were observed along the cen-tral area of the crack,which were equal to 413 MPa at+50℃and 440 MPa at-40℃.The results also showed that the presence of the steel winding in the pipeline significantly reduced the length of crack propagation up to 8.4 times,depending on the temperature effect and design parameters of prestressing.This work integrated the existing methods for crack localization along steel gas pipelines.
文摘In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys.
基金financially supported by,the Fundamental Research Funds for the Central Universities(Grant No.2023QN1064)the China Postdoctoral Science Foundation(Grant No.2023M733772)Jiangsu Funding Program for Excellent Postdoctoral Talent(Grant No.2023ZB847)。
文摘Prepulse combined hydraulic fracturing facilitates the development of fracture networks by integrating prepulse hydraulic loading with conventional hydraulic fracturing.The formation mechanisms of fracture networks between hydraulic and pre-existing fractures under different prepulse loading parameters remain unclear.This research investigates the impact of prepulse loading parameters,including the prepulse loading number ratio(C),prepulse loading stress ratio(S),and prepulse loading frequency(f),on the formation of fracture networks between hydraulic and pre-existing fractures,using both experimental and numerical methods.The results suggest that low prepulse loading stress ratios and high prepulse loading number ratios are advantageous loading modes.Multiple hydraulic fractures are generated in the specimen under the advantageous loading modes,facilitating the development of a complex fracture network.Fatigue damage occurs in the specimen at the prepulse loading stage.The high water pressure at the secondary conventional hydraulic fracturing promotes the growth of hydraulic fractures along the damage zones.This allows the hydraulic fractures to propagate deeply and interact with pre-existing fractures.Under advantageous loading conditions,multiple hydraulic fractures can extend to pre-existing fractures,and these hydraulic fractures penetrate or propagate along pre-existing fractures.Especially when the approach angle is large,the damage range in the specimen during the prepulse loading stage increases,resulting in the formation of more hydraulic fractures.
基金supported by the National Key R&D Program of China(No.2021YFB0301200)National Natural Science Foundation of China(No.62025208).
文摘Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in specific tasks with reduced training costs,the substantial memory requirements during fine-tuning present a barrier to broader deployment.Parameter-Efficient Fine-Tuning(PEFT)techniques,such as Low-Rank Adaptation(LoRA),and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency.Among these,QLoRA,which combines PEFT and quantization,has demonstrated notable success in reducing memory footprints during fine-tuning,prompting the development of various QLoRA variants.Despite these advancements,the quantitative impact of key variables on the fine-tuning performance of quantized LLMs remains underexplored.This study presents a comprehensive analysis of these key variables,focusing on their influence across different layer types and depths within LLM architectures.Our investigation uncovers several critical findings:(1)Larger layers,such as MLP layers,can maintain performance despite reductions in adapter rank,while smaller layers,like self-attention layers,aremore sensitive to such changes;(2)The effectiveness of balancing factors depends more on specific values rather than layer type or depth;(3)In quantization-aware fine-tuning,larger layers can effectively utilize smaller adapters,whereas smaller layers struggle to do so.These insights suggest that layer type is a more significant determinant of fine-tuning success than layer depth when optimizing quantized LLMs.Moreover,for the same discount of trainable parameters,reducing the trainable parameters in a larger layer is more effective in preserving fine-tuning accuracy than in a smaller one.This study provides valuable guidance for more efficient fine-tuning strategies and opens avenues for further research into optimizing LLM fine-tuning in resource-constrained environments.
基金supported by the National Key R&D Program of China [grant number 2023YFF0805202]the National Natural Science Foun-dation of China [grant number 42175045]the Strategic Priority Research Program of the Chinese Academy of Sciences [grant number XDB42000000]。
文摘Atlantic Meridional Overturning Circulation(AMOC)plays a central role in long-term climate variations through its heat and freshwater transports,which can collapse under a rapid increase of greenhouse gas forcing in climate models.Previous studies have suggested that the deviation of model parameters is one of the major factors in inducing inaccurate AMOC simulations.In this work,with a low-resolution earth system model,the authors try to explore whether a reasonable adjustment of the key model parameter can help to re-establish the AMOC after its collapse.Through a new optimization strategy,the extra freshwater flux(FWF)parameter is determined to be the dominant one affecting the AMOC’s variability.The traditional ensemble optimal interpolation(EnOI)data assimilation and new machine learning methods are adopted to optimize the FWF parameter in an abrupt 4×CO_(2) forcing experiment to improve the adaptability of model parameters and accelerate the recovery of AMOC.The results show that,under an abrupt 4×CO_(2) forcing in millennial simulations,the AMOC will first collapse and then re-establish by the default FWF parameter slowly.However,during the parameter adjustment process,the saltier and colder sea water over the North Atlantic region are the dominant factors in usefully improving the adaptability of the FWF parameter and accelerating the recovery of AMOC,according to their physical relationship with FWF on the interdecadal timescale.
基金National Natural Science Foundation of China(12172292,12072287)。
文摘The crack initiation and early propagation are of great significance to the overall fatigue life of material.In order to investigate the anisotropic fracture behavior of laser metal deposited Ti-6Al-4V alloy(LMD Ti64)during the early stage,the fourpoint bending fatigue test was carried out on specimens of three different directions,as well as the forged specimens.The results indicate the anisotropic crack initiation and early propagation of LMD Ti64.The direction perpendicular to the deposition direction exhibits a better fatigue resistance than the other two.The crack initiation position and propagation path are dominated by the microstructure in the vicinity of U-notch.LMD Ti64 has a typical small crack effect,and the early crack propagation velocities in three directions are similar.Affected by the slip system of LMD Ti64,secondary cracks frequently occur,which are often found to have an angle of 60°to the main crack.The electron backscatter diffraction analysis indicates that LMD Ti64 has preferred orientations,i.e.,strong 0001//Z texture and 001//Z texture.Their crystallographic orientation will change as the direction of columnarβgrains turns over,resulting in the fatigue anisotropy of LMD Ti64 in crack initiation and early crack propagation process.
基金supported in part by the National Natural Science Foundation of China under Grant 61941113,Grant 61971033,and Grant 61671057by the Henan Provincial Department of Science and Technology Project(No.212102210408)by the Henan Provincial Key Scientific Research Project(No.22A520041).
文摘5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation.
文摘State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.
基金supported by the National Natural Science Foundation of China(Grant Nos.62171144and 62031024)Guangxi Science Foundation(Grant Nos.2025GXNSFAA069137 and GXR-1BGQ2424005)Innovation Project of Guangxi Graduate Education(Grant No.YCBZ2025064)。
文摘The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)protocol can overcome a fundamental physical limit,known as the Pirandola-Laurenza-Ottaviani-Banchi bound,without requiring global phase-locking.In this work,we propose a method based on multi-step AD to further enhance the performance of MP-QKD.The simulation results show that,compared to one-step AD,multi-step AD achieves better performance in long-distance scenarios and can tolerate a higher quantum bit error rate.Specifically,when the difference between the communication distances from Alice and Bob to Charlie is 25 km,50 km and 75 km,and the corresponding transmission distance exceeds 523 km,512 km and 496 km,respectively,the secret key rate achieved by multi-step AD surpasses that of one-step AD.Our findings indicate that the proposed method can effectively promote the application of MP-QKD in scenarios with high loss and high error rate.
文摘State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization.
基金funded by the National Natural Science Foundation of China(52104046).
文摘Multi-stage and multi-cluster fracturing(MMF)is a crucial technology in unconventional oil and gas development,aiming to enhance production by creating extensive fracture networks.However,achieving uniform expansion of multi-cluster hydraulic fractures(HFs)in MMF remains a significant challenge.Field practice has shown that the use of temporary plugging and diversion fracturing(TPDF)can promote the balanced expansion of multi-cluster HFs.This study conducted TPDF experiments using a true triaxial fracturing simulation system setting a horizontal well completion with multi-cluster jetting perforations to investigate the equilibrium initiation and extension of multi-cluster fractures.The influence of key parameters,including cluster spacing,fracturing fluid viscosity,differential stress,and fracturing fluid injection rate,on fracture initiation and propagation was systematically examined.The results indicate that while close-spaced multi-cluster fracturing significantly increases the number of HFs,it also leads to uneven extension of HFs in their propagation.In contrast,TPDF demonstrates effectiveness in mitigating uneven HF extension,increasing the number of HFs,and creating a larger stimulated reservoir volume,ultimately leading to improved oil and gas well productivity.Moreover,under conditions of high differential stress,the differential stress within the formation exerts a stronger guiding effect in HFs,which are more closely aligned with the minimum principal stress.Low-viscosity fluids facilitate rapid and extensive fracture propagation within the rock formation.High-volume fluid injection,on the other hand,more comprehensively fills the formation.Therefore,employing lowviscosity and high-volume fracturing is advantageous for the initiation and extension of multi-cluster HFs.
基金Project supported by the National Natural Science Foundation of China(Grant No.62375140)the Postgraduate Research&Practice Innovation Program of Jiangsu Province,China(Grant No.KYCX241191 and SJCX250315)the Open Research Fund of the National Laboratory of Solid State Microstructures(Grant No.M36055)。
文摘A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralded pair-coherent sources,and devices designed to implement passive decoy states are included at the transmitter sides to generate the decoy state pulses in the decoy-state window passively.With the defined efficient events and the designed pairing strategy,the key bits and bases can be obtained by data post-processing.Numerical simulation results verify the feasibility of the proposed protocol.The results show that the proposed protocol can exceed PLOB when the pairing interval setting is greater than 10^(3),and the transmission distance exceeds 200 km.When the key transmission distance reaches 300 km and the maximum pairing interval is equivalent to 1,its performance is improved by nearly 1.8 times compared to the original MP-QKD protocol with a weak coherent source(WCS-MP-QKD),and by 6.8 times higher than that of WCS-MPQKD with passive decoy states(WCS-PDS-MP-QKD).Meanwhile,the key transmission distance can reach 480 km,and surpasses the WCS-PDS-MP-QKD protocol by nearly 40 km.When the total pulse length is greater than 10^(11),the key generation rate is almost equal to that of infinite pulses.It is a promising QKD protocol that breaks the PLOB bound without requiring phase tracking and locking,has a longer transmission distance and a higher key generation rate,and eliminates the potential of side channel attack.
基金supported by the National Natural Science Foundation of China(Grant Nos.42277161,42230709).
文摘Accurate identification and effective support of key blocks are crucial for ensuring the stability and safety of rock slopes.The number of structural planes and rock blocks were reduced in previous studies.This impairs the ability to characterize complex rock slopes accurately and inhibits the identification of key blocks.In this paper,a knowledge-data dually driven paradigm for accurate identification of key blocks in complex rock slopes is proposed.Our basic idea is to integrate key block theory into data-driven models based on finely characterizing structural features to identify key blocks in complex rock slopes accurately.The proposed novel paradigm consists of(1)representing rock slopes as graph-structured data based on complex systems theory,(2)identifying key nodes in the graph-structured data using graph deep learning,and(3)mapping the key nodes of graph-structured data to corresponding key blocks in the rock slope.Verification experiments and real-case applications are conducted by the proposed method.The verification results demonstrate excellent model performance,strong generalization capability,and effective classification results.Moreover,the real case application is conducted on the northern slope of the Yanqianshan Iron Mine.The results show that the proposed method can accurately identify key blocks in complex rock slopes,which can provide a decision-making basis and rational recommendations for effective support and instability prevention of rock slopes,thereby ensuring the stability of rock engineering and the safety of life and property.
基金supported by the Innovation Program for Quantum Science and Technology(Grant No.2021ZD0300701)the National Key Research and Development Program of China(Grant No.2018YFA0306403)the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDB43000000).
文摘Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks.
基金supported by the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology and Natural Science Foundation of Shandong Province,China(Grant no.ZR202111230202).
文摘With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehicles are mobile entities,they move across different domains and need to communicate with the Roadside Unit(RSU)in various regions.However,open environments are highly susceptible to becoming targets for attackers,posing significant risks of malicious attacks.Therefore,it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs,particularly in scenarios where vehicles cross domains.In this paper,we propose a provably secure cross-domain authentication and key agreement protocol for IoV.Our protocol comprises two authentication phases:intra-domain authentication and cross-domain authentication.To ensure the security of our protocol,we conducted rigorous analyses based on the ROR(Real-or-Random)model and Scyther.Finally,we show in-depth comparisons of our protocol with existing ones from both security and performance perspectives,fully demonstrating its security and efficiency.
基金supported in part by the Jiangsu“Qing Lan Project”,Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Major Research Project:23KJA520007)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX25_1303).
文摘As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on various aspects of security,gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments.This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function(PUF)for authentication and key agreement,offering a comprehensive solution to the security challenges in VANETs.The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs,ensuring the confidentiality and integrity of vehicle-to-network(V2N)communications and preventing malicious data injection.Notably,by replacing traditional Kerberos password authentication with Challenge-Response Pairs(CRPs)generated by PUF,the protocol significantly reduces the risk of key leakage.The inherent properties of PUF—such as unclonability and unpredictability—make it an ideal defense against physical attacks,including intrusion,semi-intrusion,and side-channel attacks.The results of this study demonstrate that this approach not only enhances security but also optimizes communication efficiency,reduces latency,and improves overall user experience.The analysis proves that our protocol achieves at least 86%improvement in computational efficiency compared to some existed protocols.This is particularly crucial in resource-constrained VANET environments,where it enables efficient data transmission between vehicles and applications,reduces latency,and enhances the overall user experience.
基金Project supported by the Chilean National Agency for Research and Development(ANID)through Grants ANID FONDECYT Regular(Nos.1211310 and 1250496)ANID Anillo de Tecnologia(No.ACT240015)the Polish National Science Centre(NCN)through Grant Agreement(No.2021/41/B/ST8/04492)。
文摘The acoustic wave propagation in gas-saturated double-porosity materials composed of a microporous matrix and mesopores with arrays of plate-type resonators is investigated.A macroscopic description,established with the two-scale asymptotic homogenization method,evidences the combined effect of inner resonances on the acoustic properties of the respective effective visco-thermal fluid.One type of resonance originates from strong pore-scale fluid-structure interaction,while the other one arises from pressure diffusion.These phenomena respectively cause weakly and highly damped resonances,which are activated by internal momentum or mass sources,and can largely influence,depending on the material's morphology,either the effective fluid's dynamic density,compressibility,or both.We introduce semi-analytical models to illustrate the key effective properties of the studied multiscale metamaterials.The results provide insights for the bottom-up design of multiscale acoustic metamaterials with exotic behaviors,such as the negative,very slow,or supersonic phase velocity,as well as sub-wavelength bandgaps.
基金Supported by the National Natural Science Foundation of China(Grant No.12031002)。
文摘Accurately identifying key nodes is essential for evaluating network robustness and controlling information propagation in complex network analysis. However, current research methods face limitations in applicability and accuracy. To address these challenges, this study introduces the K-GCN model, which integrates neighborhood k-shell distribution analysis with Graph Convolutional Network(GCN) technology to enhance key node identification in complex networks. The K-GCN model first leverages neighborhood k-shell distributions to calculate entropy values for each node, effectively quantifying node importance within the network. These entropy values are then used as key features within the GCN, which subsequently formulates intelligent strategies to maximize network connectivity disruption by removing a minimal set of nodes, thereby impacting the overall network architecture. Through iterative interactions with the environment, the GCN continuously refines its strategies, achieving precise identification of key nodes in the network. Unlike traditional methods, the K-GCN model not only captures local node features but also integrates the network structure and complex interrelations between neighboring nodes, significantly improving the accuracy and efficiency of key node identification.Experimental validation in multiple real-world network scenarios demonstrates that the K-GCN model outperforms existing methods.
文摘With the deepening cultural and economic ties between China and Italy,Chinese language education in Italy has been at the forefront of Europe,and significant progress has been made in localized teaching in Italy.However,the current“Chinese language craze”in Italy seems to have cooled down,and the demand for Italians to learn Chinese has stabilized or even declined.This phenomenon involves multiple factors.From the perspective of cross-cultural perspective,this paper analyzes the current development status of Chinese language education in Italy,as well as the practical problems existing in various aspects such as teachers,textbooks,and curriculum settings.It explores the key factors for the better development of Chinese language education in Italy and provides suggestions on how to solve the current problems,aiming to promote the sound development of Chinese language education in Italy.