Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques inef...Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments.展开更多
With the rapid development of digital technologies such as big data,cloud computing,and the Internet of Things(loT),data security and privacy protection have become the core challenges facing modern computing systems....With the rapid development of digital technologies such as big data,cloud computing,and the Internet of Things(loT),data security and privacy protection have become the core challenges facing modern computing systems.Traditional security mechanisms are difficult to effectively deal with advanced adversarial attacks due to their reliance on a centralized trust model.In this context,the Trusted Execution Environment(TEE),as a hardware-enabled secure isolation technology,offers a potential solution to protect sensitive computations and data.This paper systematically discusses TEE's technical principle,application status,and future development trend.First,the underlying architecture of TEE and its core characteristics,including isolation,integrity,and confidentiality,are analyzed.Secondly,practical application cases of TEE in fields such as finance,the IoT,artificial intelligence,and privacy computing are studied.Finally,the future development direction of TEE is prospected.展开更多
Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are w...Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments.展开更多
As mobile edge computing continues to develop,the demand for resource-intensive applications is steadily increasing,placing a significant strain on edge nodes.These nodes are normally subject to various constraints,fo...As mobile edge computing continues to develop,the demand for resource-intensive applications is steadily increasing,placing a significant strain on edge nodes.These nodes are normally subject to various constraints,for instance,limited processing capability,a few energy sources,and erratic availability being some of the common ones.Correspondingly,these problems require an effective task allocation algorithmto optimize the resources through continued high system performance and dependability in dynamic environments.This paper proposes an improved Particle Swarm Optimization technique,known as IPSO,for multi-objective optimization in edge computing to overcome these issues.To this end,the IPSO algorithm tries to make a trade-off between two important objectives,which are energy consumption minimization and task execution time reduction.Because of global optimal position mutation and dynamic adjustment to inertia weight,the proposed optimization algorithm can effectively distribute tasks among edge nodes.As a result,it reduces the execution time of tasks and energy consumption.In comparative assessments carried out by IPSO with benchmark methods such as Energy-aware Double-fitness Particle Swarm Optimization(EADPSO)and ICBA,IPSO provides better results than these algorithms.For the maximum task size,when compared with the benchmark methods,IPSO reduces the execution time by 17.1%and energy consumption by 31.58%.These results allow the conclusion that IPSO is an efficient and scalable technique for task allocation at the edge environment.It provides peak efficiency while handling scarce resources and variable workloads.展开更多
A framework that integrates planning,monitoring and replanning techniques is proposed.It can devise the best solution based on the current state according to specific objectives and properly deal with the influence of...A framework that integrates planning,monitoring and replanning techniques is proposed.It can devise the best solution based on the current state according to specific objectives and properly deal with the influence of abnormity on the plan execution.The framework consists of three parts:the hierarchical task network(HTN)planner based on Monte Carlo tree search(MCTS),hybrid plan monitoring based on forward and backward and norm-based replanning method selection.The HTN planner based on MCTS selects the optimal method for HTN compound task through pre-exploration.Based on specific objectives,it can identify the best solution to the current problem.The hybrid plan monitoring has the capability to detect the influence of abnormity on the effect of an executed action and the premise of an unexecuted action,thus trigger the replanning.The norm-based replanning selection method can measure the difference between the expected state and the actual state,and then select the best replanning algorithm.The experimental results reveal that our method can effectively deal with the influence of abnormity on the implementation of the plan and achieve the target task in an optimal way.展开更多
Introduction: Stroke may have a negative impact on mental health and behavior. Cognitive disorders are common after stroke. They are rarely assessed in current clinical practice, particularly in our context. They cons...Introduction: Stroke may have a negative impact on mental health and behavior. Cognitive disorders are common after stroke. They are rarely assessed in current clinical practice, particularly in our context. They constitute a real “invisible” handicap. In sub-Saharan Africa, we are not aware of any studies specifically assessing executive functions. These functions are at the heart of all adaptation processes to new or complex situations. This prompted the authors to carry out this study at the Ibrahima Pierre Ndiaye Neuroscience Department of the Fann National University Hospital Centre (Senegal). Objective and Methodology: The aim of this study was to assess and characterize post-stroke alterations in executive functions in our context. We conducted a descriptive cross-sectional study. It took place over a 4-month period from April 1 to August 31, 2021. Patients were matched to controls according to age, gender and educational level. Executive functions were assessed using the Frontal Assessment Battery (FAB). Results: A total of 30 patients with stroke were enrolled. These patients were matched to controls. The mean age of the patients was 46.87 ± 17.65 years. For the control group, it was 39.27 ± 12.33 years. The prevalence of executive function disorders was 20% in post-stroke patients. The majority of executive functions assessed were impaired. Sensitivity to interference and environmental autonomy were the only ones preserved. Conclusion: Impaired executive functions are common after stroke. They should be systematically assessed in all stroke patients to ensure optimal management.展开更多
Purpose:Currently,different research conclusions exist about the relationship between relational capital and corporate innovation.The research aims to(1)reveal the actual relationship between executive alumni relation...Purpose:Currently,different research conclusions exist about the relationship between relational capital and corporate innovation.The research aims to(1)reveal the actual relationship between executive alumni relations and firm innovation performance,(2)examine the moderating role of executive academic backgrounds,(3)analyze the paths for firms to leverage knowledge spillovers from regional universities to promote firm innovation by their geographic location.Design/methodology/approach:A social network approach is used to construct alumni relationship networks of A-share listed companies in Shanghai and Shenzhen,China.A two-way fixed effects model is used to assess the impact of firms’structural position in executive alumni networks on firms’innovation performance.In addition,the research also delves into the interactions between knowledge spillovers from geographic locations and executives’alumni networks,aiming to elucidate their combined effects on firms’innovation performance.Findings:This paper explores the curvilinear relationship between executive alumni networks’centrality and firm innovation within the Chinese context.It also finds that in the positive effect interval on the right side of the“U-shaped,”the industry with the highest number of occurrences is the high-tech industry.Moreover,it elucidates the moderating influence of executives’academic experience on the alumni networks-innovation nexus,offering a nuanced understanding of these dynamics.Lastly,we provide novel insights into optimizing resource allocation to leverage geographic knowledge spillovers for innovation.Research limitations:The study may not fully represent the broader population of firms,particularly small and medium-sized enterprises(SMEs)or unlisted companies.Future research could expand the sample to include a more diverse range of firms to enhance the generalizability of the findings.Practical implications:Firstly,companies can give due consideration to the alumni resources of executives in their personnel decisions,but they should pay attention to the rational use of resources.Secondly,universities should actively work with companies to promote knowledge transfer and collaboration.Originality/value:The findings help clarify the influence mechanism of firms’innovation performance,providing theoretical support and empirical evidence for firms to drive innovation at the executive alumni relationship network level.展开更多
This study employs leadership contingency theory and resource dependency theory,utilizing financial data from Shanghai and Shenzhen A-share listed companies between 2012 and 2021.Ultimately,data samples from 4,742 com...This study employs leadership contingency theory and resource dependency theory,utilizing financial data from Shanghai and Shenzhen A-share listed companies between 2012 and 2021.Ultimately,data samples from 4,742 companies were selected to empirically examine the impact and moderating role of female executives on corporate digital transformation.Findings reveal that the proportion of female executives positively promotes corporate digital transformation.Further analysis indicates that female executives drive digital transformation by enhancing corporate innovation investment and risk control capabilities.Supported by the heterogeneity analysis,it shows that this effect is more pronounced in high-tech industries,non-state-owned enterprises,and companies in economically developed regions.This study provides a gender-perspective theoretical explanation for the drivers of digital transformation and offers practical insights for optimizing corporate executive teams.展开更多
This longitudinal study examined the association between parental autonomy support and school-aged children’s adjustment across four major domains of school functioning,as well as the mediating role of children’s ex...This longitudinal study examined the association between parental autonomy support and school-aged children’s adjustment across four major domains of school functioning,as well as the mediating role of children’s executive function.Participants were 476 school-aged children(girl:49.2%,M_(age)=10.49 years,SD=1.32 years),who completed the Psychological Autonomy Support Scale,the Behavior Rating Inventory of Executive Function–2,and the Primary School Students’Psychological Suzhi Scale at baseline and at two subsequent follow-up assessments.Results from unconditional latent growth curve models and structural equation modeling indicated that paternal autonomy support was a significant predictor of children’s adjustment across all four school domains.In contrast,maternal autonomy support was significantly associated only with interpersonal adjustment.Both the intercept(initial level)and slope(rate of change)of children’s executive function significantly predicted their adjustment in all four domains.Notably,the initial level of executive function fully mediated the association between paternal autonomy support and school adjustment,whereas the rate of change in executive function did not serve as a significant mediator.Thesefindings underscore the importance of promoting parental autonomy-supportive behaviors-particularly among fathers-as a means to enhance children’s executive functioning and,consequently,their school adjustment.展开更多
Background:Adverse childhood experiences(ACEs)are a significant issue in adolescent health due to their robust correlation with deficits in executive functions(EF)and health risk behaviors(HRBs).This study aimed to ex...Background:Adverse childhood experiences(ACEs)are a significant issue in adolescent health due to their robust correlation with deficits in executive functions(EF)and health risk behaviors(HRBs).This study aimed to examine the association between ACEs and a range of HRBs,including substance use,sexual risk behavior,suicidal ideation,physical inactivity,and violence.Methods:This cross-sectional study used self-administered questionnaire and cluster sampling in seven junior high schools in Samarinda,Indonesia,with a sample size of 534 students.Data analysis using descriptive statistics,the Chi-square test,the independent t-test,ANOVA,binary logistic regression,and mediation analysis with macro-PROCESS.Results:The most common ACEs were community violence(68.0%),physical neglect(52.8%),psychological/emotional abuse(52.6%),physical abuse(50.4%),and peer bullying(45.9%).Adolescents with more than five ACEs showed significantly higher involvement in smoking/vaping(67.9%),suicidal ideation(75.2%),sexual risk behavior(57.7%),bullying(64.3%),and physical fighting(59.7%)(p<0.001).ACEs were significantly correlated with EF deficits(r=0.471,p<0.01)and HRB(r=0.578,p<0.01).Regression analysis confirmed that ACEs predicted EF deficits(β=0.466,p<0.001)and HRB(β=0.469,p<0.001),with EF deficits partially mediating this relationship(β=0.107,95%CI[0.045,0.094]).In addition,two subdomains of EF deficits,self-motivation(β=0.042)and self-regulation of emotion(β=0.032),significantlymediated the relationship between ACEs and HRBs.Conclusion:These findings suggest an important role for EF deficits in linking childhood adversity to engagement in risky behaviors.Addressing ACEs and EF deficits(self-motivation and self-regulation of emotion)through early intervention may be important in reducing long-term health risks among Indonesian adolescents.展开更多
Background:There is growing evidence that an acute bout of exercise positively influences executive function(EF).However,the existing evidence primarily originates from laboratory-based studies,and only a limited numb...Background:There is growing evidence that an acute bout of exercise positively influences executive function(EF).However,the existing evidence primarily originates from laboratory-based studies,and only a limited number of studies have extended this work to real-world classroom settings.Accordingly,in the present study,we aimed to employ a real classroom setting to determine whether acute exercise-induced effects on EF emerged.Methods:All 49 students who enrolled in a real-world course agreed to participate in the experimental protocol and the final sample was composed of 43 individuals(13 male and 30 female participants).Participants were asked to perform an acute bout of exercise(i.e,10 min at moderate intensity)before a real classroom,and on a separate day,complete a non-exercise control condition.EF was assessed via Naming,Inhibition,and Switching variants of the Stroop task.We used a paired-samples t-test to compare participants’cognitive load between two conditions and a repeated-measures ANOVA to investigate changes in RPE.What’s more,a repeated measures ANOVA was used to examine potential pre-to post-class changes in EF-related parameters(e.g.,inverse efficiency scores,reaction times,and error rates).Results:A pre-to post-class benefit in performance efficiency across all Stroop task variants was shown.In both exercise and control conditions,there was a significant main effect of time,with lower inverse efficiency scores(IES)(p=0.003)and shorter reaction times(RT)(p<0.001)observed from pre-to post-class.Moreover,performance gains varied by Stroop task-type,with the Switching task showing the longest RTs and largest IES,reflecting its greater cognitive demands.Importantly,a marginally significant three-way interaction among task-type,intervention,and time(p=0.052)indicated that the exercise intervention enhanced post-class performance on the Switching task.Post-hoc analyses revealed significantly lower IES and faster RTs at post-class for both the Naming and Switching tasks,particularly in the exercise group(e.g.,Switching IES:p<0.001;Switching RT:p<0.001).Conclusions:These findings suggest that pre-class acute exercise enhances EF and provides a benefit to cognitive flexibility.Accordingly,our results extend previous knowledge by indicating that the cognitive benefits of acute exercise observed primarily in laboratory settings can be translated to real-world educational contexts.展开更多
This paper selects the A-share non-financial listed companies in China from 2007 to 2018 as the research object to study the impact of science and technology policy on enterprise innovation and its influence mechanism...This paper selects the A-share non-financial listed companies in China from 2007 to 2018 as the research object to study the impact of science and technology policy on enterprise innovation and its influence mechanism,and further explore the effectiveness boundary of science and technology policy.The results show that there is a significant positive correlation between science and technology policy and executive compensation;there is a significant positive correlation between technology policy and enterprise innovation;there is a significant positive correlation between science and technology policy and enterprise innovation;executive compensation plays a partial intermediary effect between technology policy and enterprise innovation.Further research on the effectiveness boundary of science and technology policy shows that:first,management power can strengthen the positive correlation between science and technology policy and executive compensation;second,regional factors have a greater impact on the relationship between science and technology policy and enterprise innovation.The ethnic regions and western regions with poor economic development level weaken the positive incentive effect of science and technology policies on enterprise innovation.展开更多
In January 2025,the United States issued executive orders that could potentially curtail lesbian,gay,bisexual,transgender,queer,and other sexual and gender minorities(LGBTQ+)rights and federal aid to developing countr...In January 2025,the United States issued executive orders that could potentially curtail lesbian,gay,bisexual,transgender,queer,and other sexual and gender minorities(LGBTQ+)rights and federal aid to developing countries,such as public health programs under the United States Agency for International Development(USAID)[1,2].In the Philippines,USAID has played an important role in funding and supporting initiatives to address the country’s local HIV epidemic[2,3].展开更多
Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, d...Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, distributed, configurable, interoperable and maintainable. Moreover, the design patterns for the framework .are developed and a variety of functional components are designed by inheriting appropriate patterns. And then an application is constructed by invoking corresponding methods of related components. An MES system implementing the framework and design patterns can be facilely integrated with other manufacturing applications, such as enterprise resource planning (ERP) and floor control system (FCS) .展开更多
Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal ba...Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal based query execution (RDF-LTE) approach, this paper discusses how the execution order of the triple pattern affects the query results and cost based on concrete SPARQL queries, and analyzes two properties of the web of linked data, missing backward links and missing contingency solution. Then three heuristic principles for logic query plan optimization, namely, the filtered basic graph pattern (FBGP) principle, the triple pattern chain principle and the seed URIs principle, are proposed. The three principles contribute to decrease the intermediate solutions and increase the types of queries that can be answered. The effectiveness and feasibility of the proposed approach is evaluated. The experimental results show that more query results can be returned with less cost, thus enabling users to develop the full potential of the web of linked data.展开更多
In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case select...In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case selection method for web application regression testing based on the control flow graph.This method is safe enough to the test case selection.On the base of features of request sequence in web application,the minimization technique and the priority of test cases are taken into consideration in the process of execution of test cases in regression testing for web application.The improved greedy algorithm is also raised resulting in optimization of execution of test cases.The experiments indicate that the number of test cases which need to be retested is reduced,and the efficiency of execution of test cases is also improved.展开更多
The extended enterprise is formed according to the philosophy of dispersednetworked manufacturing. Manufacturing execution system (MES) can close the information gap whichexists between device control system and produ...The extended enterprise is formed according to the philosophy of dispersednetworked manufacturing. Manufacturing execution system (MES) can close the information gap whichexists between device control system and production information management system. The functions andthe web-based architecture of the MES in the extended enterprise are introduced. Using thecooperating system models of object-oriented and distributed agents and CORBA, all objects keep touniform interface standards and are easily inserted to object request broker. The utilization ofdistributed MES in extended enterprise can adapt fast change of manufacturing environment andresource. It also can improve the independent management capability of manufacturing cell and theenterprise response capability to global economic competition.展开更多
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to ef...In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to effectively discover backdoor behaviors, such as stealing secret information and injecting evil data into system, with less false negatives. With concolic execution on predetermined path, the backdoor trigger condition can be extracted and analyzed to achieve high accuracy. BASEC has been implemented and experimented on several software backdoor samples widespread on the Internet, and over 90% of them can be detected. Compared with behavior-based and system-call-based detection methods, BASEC relies less on the historical sample collections, and is more effective in detecting software backdoors, especially those injected into software by modifying and recompiling source codes.展开更多
Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principle...Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM.展开更多
The management and control of material flow forms the core of manufacturing execution systems (MES) in the petrochemical industry. The bottleneck in the application of MES is the ability to match the material-flow m...The management and control of material flow forms the core of manufacturing execution systems (MES) in the petrochemical industry. The bottleneck in the application of MES is the ability to match the material-flow model with the production processes. A dynamic material-flow model is proposed in this paper after an analysis of the material-flow characteristics of the production process in a petrochemical industry. The main material-flow events are described, including the movement, storage, shifting, recycling, and elimination of the materials. The spatial and temporal characters of the material-flow events are described, and the material-flow model is constructed. The dynamic material-flow model introduced herein is the basis for other subsystems in the MES. In addition, it is the subsystem with the least scale in MES. The dynamic-modeling method of material flow has been applied in the development of the SinoMES model. It helps the petrochemical plant to manage the entire flow information related to tanks and equipments from the aspects of measurement, storage, movement, and the remaining balance of the material. As a result, it matches the production process by error elimination and data reconciliation. In addition, it facilitates the integration of application modules into the MES and guarantees the potential development of SinoMES in future applications.展开更多
基金funded by the Science and Technology Project of State Grid Jiangsu Electric Power Company Ltd.,grant number J2024169.
文摘Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments.
文摘With the rapid development of digital technologies such as big data,cloud computing,and the Internet of Things(loT),data security and privacy protection have become the core challenges facing modern computing systems.Traditional security mechanisms are difficult to effectively deal with advanced adversarial attacks due to their reliance on a centralized trust model.In this context,the Trusted Execution Environment(TEE),as a hardware-enabled secure isolation technology,offers a potential solution to protect sensitive computations and data.This paper systematically discusses TEE's technical principle,application status,and future development trend.First,the underlying architecture of TEE and its core characteristics,including isolation,integrity,and confidentiality,are analyzed.Secondly,practical application cases of TEE in fields such as finance,the IoT,artificial intelligence,and privacy computing are studied.Finally,the future development direction of TEE is prospected.
基金supported byOpen Foundation of Key Laboratory of Cyberspace Security,Ministry of Education of China(No.KLCS20240211)Henan Science and Technology Major Project No.241110210100.
文摘Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments.
基金supported by the University Putra Malaysia and the Ministry of Higher Education Malaysia under grantNumber:(FRGS/1/2023/ICT11/UPM/02/3).
文摘As mobile edge computing continues to develop,the demand for resource-intensive applications is steadily increasing,placing a significant strain on edge nodes.These nodes are normally subject to various constraints,for instance,limited processing capability,a few energy sources,and erratic availability being some of the common ones.Correspondingly,these problems require an effective task allocation algorithmto optimize the resources through continued high system performance and dependability in dynamic environments.This paper proposes an improved Particle Swarm Optimization technique,known as IPSO,for multi-objective optimization in edge computing to overcome these issues.To this end,the IPSO algorithm tries to make a trade-off between two important objectives,which are energy consumption minimization and task execution time reduction.Because of global optimal position mutation and dynamic adjustment to inertia weight,the proposed optimization algorithm can effectively distribute tasks among edge nodes.As a result,it reduces the execution time of tasks and energy consumption.In comparative assessments carried out by IPSO with benchmark methods such as Energy-aware Double-fitness Particle Swarm Optimization(EADPSO)and ICBA,IPSO provides better results than these algorithms.For the maximum task size,when compared with the benchmark methods,IPSO reduces the execution time by 17.1%and energy consumption by 31.58%.These results allow the conclusion that IPSO is an efficient and scalable technique for task allocation at the edge environment.It provides peak efficiency while handling scarce resources and variable workloads.
基金supported by the National Natural Science Foundation of China(61806221).
文摘A framework that integrates planning,monitoring and replanning techniques is proposed.It can devise the best solution based on the current state according to specific objectives and properly deal with the influence of abnormity on the plan execution.The framework consists of three parts:the hierarchical task network(HTN)planner based on Monte Carlo tree search(MCTS),hybrid plan monitoring based on forward and backward and norm-based replanning method selection.The HTN planner based on MCTS selects the optimal method for HTN compound task through pre-exploration.Based on specific objectives,it can identify the best solution to the current problem.The hybrid plan monitoring has the capability to detect the influence of abnormity on the effect of an executed action and the premise of an unexecuted action,thus trigger the replanning.The norm-based replanning selection method can measure the difference between the expected state and the actual state,and then select the best replanning algorithm.The experimental results reveal that our method can effectively deal with the influence of abnormity on the implementation of the plan and achieve the target task in an optimal way.
文摘Introduction: Stroke may have a negative impact on mental health and behavior. Cognitive disorders are common after stroke. They are rarely assessed in current clinical practice, particularly in our context. They constitute a real “invisible” handicap. In sub-Saharan Africa, we are not aware of any studies specifically assessing executive functions. These functions are at the heart of all adaptation processes to new or complex situations. This prompted the authors to carry out this study at the Ibrahima Pierre Ndiaye Neuroscience Department of the Fann National University Hospital Centre (Senegal). Objective and Methodology: The aim of this study was to assess and characterize post-stroke alterations in executive functions in our context. We conducted a descriptive cross-sectional study. It took place over a 4-month period from April 1 to August 31, 2021. Patients were matched to controls according to age, gender and educational level. Executive functions were assessed using the Frontal Assessment Battery (FAB). Results: A total of 30 patients with stroke were enrolled. These patients were matched to controls. The mean age of the patients was 46.87 ± 17.65 years. For the control group, it was 39.27 ± 12.33 years. The prevalence of executive function disorders was 20% in post-stroke patients. The majority of executive functions assessed were impaired. Sensitivity to interference and environmental autonomy were the only ones preserved. Conclusion: Impaired executive functions are common after stroke. They should be systematically assessed in all stroke patients to ensure optimal management.
基金supported in part by the National Natural Science Foundation of China under Grant No.72264036,in part by the West Light Foundation of The Chinese Academy of Sciences under Grant No.2020-XBQNXZ-020Xinjiang University of Finance and Economics Postgraduate Innovation Project XJUFE2024K036.
文摘Purpose:Currently,different research conclusions exist about the relationship between relational capital and corporate innovation.The research aims to(1)reveal the actual relationship between executive alumni relations and firm innovation performance,(2)examine the moderating role of executive academic backgrounds,(3)analyze the paths for firms to leverage knowledge spillovers from regional universities to promote firm innovation by their geographic location.Design/methodology/approach:A social network approach is used to construct alumni relationship networks of A-share listed companies in Shanghai and Shenzhen,China.A two-way fixed effects model is used to assess the impact of firms’structural position in executive alumni networks on firms’innovation performance.In addition,the research also delves into the interactions between knowledge spillovers from geographic locations and executives’alumni networks,aiming to elucidate their combined effects on firms’innovation performance.Findings:This paper explores the curvilinear relationship between executive alumni networks’centrality and firm innovation within the Chinese context.It also finds that in the positive effect interval on the right side of the“U-shaped,”the industry with the highest number of occurrences is the high-tech industry.Moreover,it elucidates the moderating influence of executives’academic experience on the alumni networks-innovation nexus,offering a nuanced understanding of these dynamics.Lastly,we provide novel insights into optimizing resource allocation to leverage geographic knowledge spillovers for innovation.Research limitations:The study may not fully represent the broader population of firms,particularly small and medium-sized enterprises(SMEs)or unlisted companies.Future research could expand the sample to include a more diverse range of firms to enhance the generalizability of the findings.Practical implications:Firstly,companies can give due consideration to the alumni resources of executives in their personnel decisions,but they should pay attention to the rational use of resources.Secondly,universities should actively work with companies to promote knowledge transfer and collaboration.Originality/value:The findings help clarify the influence mechanism of firms’innovation performance,providing theoretical support and empirical evidence for firms to drive innovation at the executive alumni relationship network level.
文摘This study employs leadership contingency theory and resource dependency theory,utilizing financial data from Shanghai and Shenzhen A-share listed companies between 2012 and 2021.Ultimately,data samples from 4,742 companies were selected to empirically examine the impact and moderating role of female executives on corporate digital transformation.Findings reveal that the proportion of female executives positively promotes corporate digital transformation.Further analysis indicates that female executives drive digital transformation by enhancing corporate innovation investment and risk control capabilities.Supported by the heterogeneity analysis,it shows that this effect is more pronounced in high-tech industries,non-state-owned enterprises,and companies in economically developed regions.This study provides a gender-perspective theoretical explanation for the drivers of digital transformation and offers practical insights for optimizing corporate executive teams.
基金supported by the National Natural Science Foundation of China(CN)(Grant No.32071074).
文摘This longitudinal study examined the association between parental autonomy support and school-aged children’s adjustment across four major domains of school functioning,as well as the mediating role of children’s executive function.Participants were 476 school-aged children(girl:49.2%,M_(age)=10.49 years,SD=1.32 years),who completed the Psychological Autonomy Support Scale,the Behavior Rating Inventory of Executive Function–2,and the Primary School Students’Psychological Suzhi Scale at baseline and at two subsequent follow-up assessments.Results from unconditional latent growth curve models and structural equation modeling indicated that paternal autonomy support was a significant predictor of children’s adjustment across all four school domains.In contrast,maternal autonomy support was significantly associated only with interpersonal adjustment.Both the intercept(initial level)and slope(rate of change)of children’s executive function significantly predicted their adjustment in all four domains.Notably,the initial level of executive function fully mediated the association between paternal autonomy support and school adjustment,whereas the rate of change in executive function did not serve as a significant mediator.Thesefindings underscore the importance of promoting parental autonomy-supportive behaviors-particularly among fathers-as a means to enhance children’s executive functioning and,consequently,their school adjustment.
基金supported by the STI 2030-Major Projects(2021ZD0200500).
文摘Background:Adverse childhood experiences(ACEs)are a significant issue in adolescent health due to their robust correlation with deficits in executive functions(EF)and health risk behaviors(HRBs).This study aimed to examine the association between ACEs and a range of HRBs,including substance use,sexual risk behavior,suicidal ideation,physical inactivity,and violence.Methods:This cross-sectional study used self-administered questionnaire and cluster sampling in seven junior high schools in Samarinda,Indonesia,with a sample size of 534 students.Data analysis using descriptive statistics,the Chi-square test,the independent t-test,ANOVA,binary logistic regression,and mediation analysis with macro-PROCESS.Results:The most common ACEs were community violence(68.0%),physical neglect(52.8%),psychological/emotional abuse(52.6%),physical abuse(50.4%),and peer bullying(45.9%).Adolescents with more than five ACEs showed significantly higher involvement in smoking/vaping(67.9%),suicidal ideation(75.2%),sexual risk behavior(57.7%),bullying(64.3%),and physical fighting(59.7%)(p<0.001).ACEs were significantly correlated with EF deficits(r=0.471,p<0.01)and HRB(r=0.578,p<0.01).Regression analysis confirmed that ACEs predicted EF deficits(β=0.466,p<0.001)and HRB(β=0.469,p<0.001),with EF deficits partially mediating this relationship(β=0.107,95%CI[0.045,0.094]).In addition,two subdomains of EF deficits,self-motivation(β=0.042)and self-regulation of emotion(β=0.032),significantlymediated the relationship between ACEs and HRBs.Conclusion:These findings suggest an important role for EF deficits in linking childhood adversity to engagement in risky behaviors.Addressing ACEs and EF deficits(self-motivation and self-regulation of emotion)through early intervention may be important in reducing long-term health risks among Indonesian adolescents.
基金supported by the Shenzhen Educational Research Funding(grant number zdzb2014)Shenzhen Science and Technology Innovation Commission(grant number 202307313000096)+3 种基金Social Science Foundation from China’s Ministry of Education(grant number 23YJA880093)Post-doctoral Fellowship(grant number 2022M711174)National Center for Mental Health(grant number Z014)Research Excellence Scholarships of Shenzhen University(grant number ZYZD2305).
文摘Background:There is growing evidence that an acute bout of exercise positively influences executive function(EF).However,the existing evidence primarily originates from laboratory-based studies,and only a limited number of studies have extended this work to real-world classroom settings.Accordingly,in the present study,we aimed to employ a real classroom setting to determine whether acute exercise-induced effects on EF emerged.Methods:All 49 students who enrolled in a real-world course agreed to participate in the experimental protocol and the final sample was composed of 43 individuals(13 male and 30 female participants).Participants were asked to perform an acute bout of exercise(i.e,10 min at moderate intensity)before a real classroom,and on a separate day,complete a non-exercise control condition.EF was assessed via Naming,Inhibition,and Switching variants of the Stroop task.We used a paired-samples t-test to compare participants’cognitive load between two conditions and a repeated-measures ANOVA to investigate changes in RPE.What’s more,a repeated measures ANOVA was used to examine potential pre-to post-class changes in EF-related parameters(e.g.,inverse efficiency scores,reaction times,and error rates).Results:A pre-to post-class benefit in performance efficiency across all Stroop task variants was shown.In both exercise and control conditions,there was a significant main effect of time,with lower inverse efficiency scores(IES)(p=0.003)and shorter reaction times(RT)(p<0.001)observed from pre-to post-class.Moreover,performance gains varied by Stroop task-type,with the Switching task showing the longest RTs and largest IES,reflecting its greater cognitive demands.Importantly,a marginally significant three-way interaction among task-type,intervention,and time(p=0.052)indicated that the exercise intervention enhanced post-class performance on the Switching task.Post-hoc analyses revealed significantly lower IES and faster RTs at post-class for both the Naming and Switching tasks,particularly in the exercise group(e.g.,Switching IES:p<0.001;Switching RT:p<0.001).Conclusions:These findings suggest that pre-class acute exercise enhances EF and provides a benefit to cognitive flexibility.Accordingly,our results extend previous knowledge by indicating that the cognitive benefits of acute exercise observed primarily in laboratory settings can be translated to real-world educational contexts.
基金supported by the National Natural Science Foundation of China under Grant No.72362001,titled'Compensation Incentive Mechanism of Accounting Firms:Theoretical Framework,Incentive Effect TestOptimization Reconstruction,'and the Guangxi Philosophy and Social Sciences Planning Project under Grant No.21BGL013,titled'Research on the Incentive Effects and Mechanisms of State-owned Capital Reverse Mixed Reform Promoting High-quality Development of Private Enterprises.
文摘This paper selects the A-share non-financial listed companies in China from 2007 to 2018 as the research object to study the impact of science and technology policy on enterprise innovation and its influence mechanism,and further explore the effectiveness boundary of science and technology policy.The results show that there is a significant positive correlation between science and technology policy and executive compensation;there is a significant positive correlation between technology policy and enterprise innovation;there is a significant positive correlation between science and technology policy and enterprise innovation;executive compensation plays a partial intermediary effect between technology policy and enterprise innovation.Further research on the effectiveness boundary of science and technology policy shows that:first,management power can strengthen the positive correlation between science and technology policy and executive compensation;second,regional factors have a greater impact on the relationship between science and technology policy and enterprise innovation.The ethnic regions and western regions with poor economic development level weaken the positive incentive effect of science and technology policies on enterprise innovation.
文摘In January 2025,the United States issued executive orders that could potentially curtail lesbian,gay,bisexual,transgender,queer,and other sexual and gender minorities(LGBTQ+)rights and federal aid to developing countries,such as public health programs under the United States Agency for International Development(USAID)[1,2].In the Philippines,USAID has played an important role in funding and supporting initiatives to address the country’s local HIV epidemic[2,3].
基金The National Natural Science Foundation of China (59990470).
文摘Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, distributed, configurable, interoperable and maintainable. Moreover, the design patterns for the framework .are developed and a variety of functional components are designed by inheriting appropriate patterns. And then an application is constructed by invoking corresponding methods of related components. An MES system implementing the framework and design patterns can be facilely integrated with other manufacturing applications, such as enterprise resource planning (ERP) and floor control system (FCS) .
基金The National Natural Science Foundation of China(No.61070170)the Natural Science Foundation of Higher Education Institutions of Jiangsu Province(No.11KJB520017)Suzhou Application Foundation Research Project(No.SYG201238)
文摘Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal based query execution (RDF-LTE) approach, this paper discusses how the execution order of the triple pattern affects the query results and cost based on concrete SPARQL queries, and analyzes two properties of the web of linked data, missing backward links and missing contingency solution. Then three heuristic principles for logic query plan optimization, namely, the filtered basic graph pattern (FBGP) principle, the triple pattern chain principle and the seed URIs principle, are proposed. The three principles contribute to decrease the intermediate solutions and increase the types of queries that can be answered. The effectiveness and feasibility of the proposed approach is evaluated. The experimental results show that more query results can be returned with less cost, thus enabling users to develop the full potential of the web of linked data.
基金The National Natural Science Foundation of China(No.60503020,60503033,60703086)Opening Foundation of Jiangsu Key Laboratory of Computer Information Processing Technology in Soochow University(No.KJS0714)
文摘In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case selection method for web application regression testing based on the control flow graph.This method is safe enough to the test case selection.On the base of features of request sequence in web application,the minimization technique and the priority of test cases are taken into consideration in the process of execution of test cases in regression testing for web application.The improved greedy algorithm is also raised resulting in optimization of execution of test cases.The experiments indicate that the number of test cases which need to be retested is reduced,and the efficiency of execution of test cases is also improved.
文摘The extended enterprise is formed according to the philosophy of dispersednetworked manufacturing. Manufacturing execution system (MES) can close the information gap whichexists between device control system and production information management system. The functions andthe web-based architecture of the MES in the extended enterprise are introduced. Using thecooperating system models of object-oriented and distributed agents and CORBA, all objects keep touniform interface standards and are easily inserted to object request broker. The utilization ofdistributed MES in extended enterprise can adapt fast change of manufacturing environment andresource. It also can improve the independent management capability of manufacturing cell and theenterprise response capability to global economic competition.
基金Supported in part by the National Natural Science Foundation of China(61272493)the Specialized Research Fund for the Doctoral Program of Higher Education of China(20113402120026)Oversea Academic Training Funds of University of Science and Technology of China
文摘In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to effectively discover backdoor behaviors, such as stealing secret information and injecting evil data into system, with less false negatives. With concolic execution on predetermined path, the backdoor trigger condition can be extracted and analyzed to achieve high accuracy. BASEC has been implemented and experimented on several software backdoor samples widespread on the Internet, and over 90% of them can be detected. Compared with behavior-based and system-call-based detection methods, BASEC relies less on the historical sample collections, and is more effective in detecting software backdoors, especially those injected into software by modifying and recompiling source codes.
文摘Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM.
基金the National High Technology Research and Development Program of China (No.2007AA04Z191).
文摘The management and control of material flow forms the core of manufacturing execution systems (MES) in the petrochemical industry. The bottleneck in the application of MES is the ability to match the material-flow model with the production processes. A dynamic material-flow model is proposed in this paper after an analysis of the material-flow characteristics of the production process in a petrochemical industry. The main material-flow events are described, including the movement, storage, shifting, recycling, and elimination of the materials. The spatial and temporal characters of the material-flow events are described, and the material-flow model is constructed. The dynamic material-flow model introduced herein is the basis for other subsystems in the MES. In addition, it is the subsystem with the least scale in MES. The dynamic-modeling method of material flow has been applied in the development of the SinoMES model. It helps the petrochemical plant to manage the entire flow information related to tanks and equipments from the aspects of measurement, storage, movement, and the remaining balance of the material. As a result, it matches the production process by error elimination and data reconciliation. In addition, it facilitates the integration of application modules into the MES and guarantees the potential development of SinoMES in future applications.