As a major fault in the northeastern Qinghai-Xizang Plateau,the Haiyuan fault zone is important for understanding the regional deformation.Aiming at the differences in the slip rate and locking degree obtained from di...As a major fault in the northeastern Qinghai-Xizang Plateau,the Haiyuan fault zone is important for understanding the regional deformation.Aiming at the differences in the slip rate and locking degree obtained from different studies,this study constructs a refined block model(including Qilian,Alxa,Ordos,Xining,Haiyuan,and Lanzhou blocks)and uses the grid search and simulated annealing methods to invert GPS data for slip rate and locking degree of the Haiyuan fault zone.The results are as follows:(1)The sinistral slip rates in the western,middle,and eastern segments are 4.93-5.22 mm/a,1.52-4.94 mm/a,and 0.43-1.18 mm/a,decreasing eastward on the whole,while the compression rates are 0.45-1.26 mm/a,0.58-2.62 mm/a,and3.52-4.48 mm/a,increasing eastward on the whole.(2)The locking depth of the western segment increases from about 5 km to about 20 km eastward;the middle segment decreases and then increases eastward;the eastern segment concentrates at about 20 km(PHI is about 0.86).(3)The slip deficit is relatively higher in the Lenglongling,Jinqianghe,Maomaoshan,and Liupanshan faults(averaging about 3.42 mm/a,4.16 mm/a,4.23 mm/a,and 3.43 mm/a within 20 km).(4)The Qilian,Alxa,Xining,Lanzhou,and Haiyuan blocks rotate clockwise,while the Ordos block rotates counterclockwise.Additionally,by comparing different block models,the Haiyuan block should be considered independently.The Haiyuan fault zone adjusts surrounding block movements and uplifts Liupanshan mountain tectonically.The results can provide important references for understanding the regional earthquake risk and deformation mechanism.展开更多
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu...The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions.展开更多
Remote driving,an emergent technology enabling remote operations of vehicles,presents a significant challenge in transmitting large volumes of image data to a central server.This requirement outpaces the capacity of t...Remote driving,an emergent technology enabling remote operations of vehicles,presents a significant challenge in transmitting large volumes of image data to a central server.This requirement outpaces the capacity of traditional communication methods.To tackle this,we propose a novel framework using semantic communications,through a region of interest semantic segmentation method,to reduce the communication costs by transmitting meaningful semantic information rather than bit-wise data.To solve the knowledge base inconsistencies inherent in semantic communications,we introduce a blockchain-based edge-assisted system for managing diverse and geographically varied semantic segmentation knowledge bases.This system not only ensures the security of data through the tamper-resistant nature of blockchain but also leverages edge computing for efficient management.Additionally,the implementation of blockchain sharding handles differentiated knowledge bases for various tasks,thus boosting overall blockchain efficiency.Experimental results show a great reduction in latency by sharding and an increase in model accuracy,confirming our framework's effectiveness.展开更多
This paper investigates a distributed heterogeneous hybrid blocking flow-shop scheduling problem(DHHBFSP)designed to minimize the total tardiness and total energy consumption simultaneously,and proposes an improved pr...This paper investigates a distributed heterogeneous hybrid blocking flow-shop scheduling problem(DHHBFSP)designed to minimize the total tardiness and total energy consumption simultaneously,and proposes an improved proximal policy optimization(IPPO)method to make real-time decisions for the DHHBFSP.A multi-objective Markov decision process is modeled for the DHHBFSP,where the reward function is represented by a vector with dynamic weights instead of the common objectiverelated scalar value.A factory agent(FA)is formulated for each factory to select unscheduled jobs and is trained by the proposed IPPO to improve the decision quality.Multiple FAs work asynchronously to allocate jobs that arrive randomly at the shop.A two-stage training strategy is introduced in the IPPO,which learns from both single-and dual-policy data for better data utilization.The proposed IPPO is tested on randomly generated instances and compared with variants of the basic proximal policy optimization(PPO),dispatch rules,multi-objective metaheuristics,and multi-agent reinforcement learning methods.Extensive experimental results suggest that the proposed strategies offer significant improvements to the basic PPO,and the proposed IPPO outperforms the state-of-the-art scheduling methods in both convergence and solution quality.展开更多
Bacterial blight(BB),caused by Xanthomonas oryzae pathovar oryzae(Xoo),poses a significant threat to rice production,particularly in Asia and West Africa.Breeding resistance against BB in elite rice varieties is cruci...Bacterial blight(BB),caused by Xanthomonas oryzae pathovar oryzae(Xoo),poses a significant threat to rice production,particularly in Asia and West Africa.Breeding resistance against BB in elite rice varieties is crucial to advancing rice breeding program and supporting smallholder farmers.Transcription Activator-Like effectors(TALes)are key virulence factors in Xoo,with some targeting the susceptibility(S)genes such as the sugar transporter SWEET genes in rice.Among these,SWEET14 is an important S gene,with its promoter bound by the TALe TalC which exists across all sequenced African Xoo isolates.In the present study,we utilized CRISPR/Cas9-based cytidine and adenine base editors to alter the effector binding element(EBE)of TalC in the promoter of SWEET14 in rice cultivars Kitaake,IR24,and Zhonghua 11.Mutations with C to T changes in EBE led to reduced SWEET14 induction by TalC-containing Xoo strains,resulting in resistance to African Xoo isolates reliant on TalC for virulence.Conversely,A to G changes retained SWEET14 inducibility and susceptibility to Xoo in edited lines.Importantly,no off-target mutations were detected at predicted sites,and the edited lines exhibited no obvious defects in major agronomic traits in Kitaake.These results underscore the effectiveness of base editing systems for both molecular biology research and crop improvement endeavors.展开更多
To increase efficiency in fierce competition,it is necessary and urgent to improve the standard of production planning for shipbuilding.The construction of curved blocks is the bottleneck to improve the efficiency of ...To increase efficiency in fierce competition,it is necessary and urgent to improve the standard of production planning for shipbuilding.The construction of curved blocks is the bottleneck to improve the efficiency of shipbuilding.Thus it is a key breakthrough for higher shipbuilding productivity to study the curved block production.By analyzing the scheduling problem in curved blocks production,we propose an intelligent curved block production scheduling method and its system based on a knowledge base,and show the main process of the system.The functions of the system include data management,assembly plan generation,plan adjustment,and plan evaluation.In order to deal with the actual situation and inherit the empirical knowledge,the system extracts some rules to control block selecting,algorithm selection,and evaluation thresholds to build a production decision-making knowledge base in the curved block scheduling system.The proposed knowledge base could be referred and modified by users,especially after a few interactions between the users and the knowledge base.The final assembly plan can be visualized and evaluated to facilitate the observation of plan implementation and effects of the decisions in the process.Finally,the system is verified by a large shipyard in Shanghai using real data and the results illustrate that the proposed method can perform the knowledge-based scheduling for curved blocks construction effectively.展开更多
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel...To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions.展开更多
With the development of anti-virus technology,malicious documents have gradually become the main pathway of Advanced Persistent Threat(APT)attacks,therefore,the development of effective malicious document classifiers ...With the development of anti-virus technology,malicious documents have gradually become the main pathway of Advanced Persistent Threat(APT)attacks,therefore,the development of effective malicious document classifiers has become particularly urgent.Currently,detection methods based on document structure and behavioral features encounter challenges in feature engineering,these methods not only have limited accuracy,but also consume large resources,and usually can only detect documents in specific formats,which lacks versatility and adaptability.To address such problems,this paper proposes a novel malicious document detection method-visualizing documents as GGE images(Grayscale,Grayscale matrix,Entropy).The GGE method visualizes the original byte sequence of the malicious document as a grayscale image,the information entropy sequence of the document as an entropy image,and at the same time,the grayscale level co-occurrence matrix and the texture and spatial information stored in it are converted into grayscale matrix image,and fuses the three types of images to get the GGE color image.The Convolutional Block Attention Module-EfficientNet-B0(CBAM-EfficientNet-B0)model is then used for classification,combining transfer learning and applying the pre-trained model on the ImageNet dataset to the feature extraction process of GGE images.As shown in the experimental results,the GGE method has superior performance compared with other methods,which is suitable for detecting malicious documents in different formats,and achieves an accuracy of 99.44%and 97.39%on Portable Document Format(PDF)and office datasets,respectively,and consumes less time during the detection process,which can be effectively applied to the task of detecting malicious documents in real-time.展开更多
As electro-hydrostatic actuator(EHA)technology advances towards lightweight and integration,the demand for enhanced internal flow pathways in hydraulic valve blocks intensifies.However,owing to the constraints imposed...As electro-hydrostatic actuator(EHA)technology advances towards lightweight and integration,the demand for enhanced internal flow pathways in hydraulic valve blocks intensifies.However,owing to the constraints imposed by traditional manufacturing processes,conventional hydraulic integrated valve blocks fail to satisfy the demands of a more compact channel layout and lower energy dissipation.Notably,the subjectivity in the arrangement of internal passages results in a time-consuming and labor-intensive process.This study employed additive manufacturing technology and the ant colony algorithm and B-spline curves for the meticulous design of internal passages within an aviation EHA valve block.The layout environment for the valve block passages was established,and path optimization was achieved using the ant colony algorithm,complemented by smoothing using B-spline curves.Three-dimensional modeling was performed using SolidWorks software,revealing a 10.03%reduction in volume for the optimized passages compared with the original passages.Computational fluid dynamics(CFD)simulations were performed using Fluent software,demonstrating that the algorithmically optimized passages effectively prevented the occurrence of vortices at right-angled locations,exhibited superior flow characteristics,and concurrently reduced pressure losses by 34.09%-36.36%.The small discrepancy between the experimental and simulation results validated the efficacy of the ant colony algorithm and B-spline curves in optimizing the passage design,offering a viable solution for channel design in additive manufacturing.展开更多
The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life.The development of the Internet of Things(I...The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life.The development of the Internet of Things(IoT)relies on the support of base stations,which provide a solid foundation for achieving a more intelligent way of living.In a specific area,achieving higher signal coverage with fewer base stations has become an urgent problem.Therefore,this article focuses on the effective coverage area of base station signals and proposes a novel Evolutionary Particle Swarm Optimization(EPSO)algorithm based on collective prediction,referred to herein as ECPPSO.Introducing a new strategy called neighbor-based evolution prediction(NEP)addresses the issue of premature convergence often encountered by PSO.ECPPSO also employs a strengthening evolution(SE)strategy to enhance the algorithm’s global search capability and efficiency,ensuring enhanced robustness and a faster convergence speed when solving complex optimization problems.To better adapt to the actual communication needs of base stations,this article conducts simulation experiments by changing the number of base stations.The experimental results demonstrate thatunder the conditionof 50 ormore base stations,ECPPSOconsistently achieves the best coverage rate exceeding 95%,peaking at 99.4400%when the number of base stations reaches 80.These results validate the optimization capability of the ECPPSO algorithm,proving its feasibility and effectiveness.Further ablative experiments and comparisons with other algorithms highlight the advantages of ECPPSO.展开更多
The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is sprea...The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is spreading positive information to counterbalance the diffusion of rumor.The spreading mechanism of rumors and effective suppression strategies are significant and challenging research issues.Firstly,in order to simulate the dissemination of multiple types of information,we propose a competitive linear threshold model with state transition(CLTST)to describe the spreading process of rumor and anti-rumor in the same network.Subsequently,we put forward a community-based rumor blocking(CRB)algorithm based on influence maximization theory in social networks.Its crucial step is to identify a set of influential seeds that propagate anti-rumor information to other nodes,which includes community detection,selection of candidate anti-rumor seeds and generation of anti-rumor seed set.Under the CLTST model,the CRB algorithm has been compared with six state-of-the-art algorithms on nine online social networks to verify the performance.Experimental results show that the proposed model can better reflect the process of rumor propagation,and review the propagation mechanism of rumor and anti-rumor in online social networks.Moreover,the proposed CRB algorithm has better performance in weakening the rumor dissemination ability,which can select anti-rumor seeds in networks more accurately and achieve better performance in influence spread,sensitivity analysis,seeds distribution and running time.展开更多
Two new complexes,[Zn_(2)(L1)(HL1)(NO_(3))]·CH_(3)OH(1)and[Zn_(3)(L2)(L3)_(3)Cl]·CH_(3)OH(2),were successfully synthesized by‘one-pot’method based on cinnoline-3-ylhydrazine ligand and zinc with 2-hydroxy-...Two new complexes,[Zn_(2)(L1)(HL1)(NO_(3))]·CH_(3)OH(1)and[Zn_(3)(L2)(L3)_(3)Cl]·CH_(3)OH(2),were successfully synthesized by‘one-pot’method based on cinnoline-3-ylhydrazine ligand and zinc with 2-hydroxy-4-methoxybenzaldehyde and 2-hydroxy-3-methoxybenzaldehyde ligands,respectively,where H_(2)L1=5-methoxy-2-(phthalazin-1-ylhydrazonomethyl)-phenol,H_(2)L2=2-methoxy-6-(phthalazin-1-yl-hydrazonomethyl)-phenol,HL3=2-(1,8-dihydro-[1,2,4]triazolo[3,4-α]phthalazin-3-yl)-6-methoxy-phenol.Complexes 1 and 2 were characterized by infrared spectroscopy,elemental analysis,single-crystal X-ray diffraction,powder X-ray diffraction,etc.It is worth noting that the cinnolin-3-yl-hydrazine ligand and 2-hydroxy-3-methoxybenzaldehyde form two types of Schiff bases(H_(2)L2 and HL3)when in situ reacting and coordinating with Zn(Ⅱ),and HL3 also has two coordination modes.In addition,the fluorescence performance showed that complex 1 can achieve selective and sensitive sensing of Al^(3+)in water with a detection limit of 6.37μmol·L^(-1).CCDC:2413978,1;2413979,2.展开更多
Two Gd_(2)complexes,namely[Gd_(2)(dbm)_(2)(HL_(1))_(2)(CH_(3)OH)_(2)]·4CH_(3)OH(1)and[Gd_(2)(dbm)_(2)(L_(2))_(2)(CH_(3)OH)_(2)]·2CH_(3)OH(2),where H_(3)L_(1)=(Z)-N'-[4-(diethylamino)-2-hydroxybenzylidene...Two Gd_(2)complexes,namely[Gd_(2)(dbm)_(2)(HL_(1))_(2)(CH_(3)OH)_(2)]·4CH_(3)OH(1)and[Gd_(2)(dbm)_(2)(L_(2))_(2)(CH_(3)OH)_(2)]·2CH_(3)OH(2),where H_(3)L_(1)=(Z)-N'-[4-(diethylamino)-2-hydroxybenzylidene]-2-hydroxyacetohydrazide,H_(2)L_(2)=(E)-N'-(5-bromo-2-hydroxy-3-methoxybenzylidene)nicotinohydrazide,Hdbm=dibenzoylmethane,have been constructed by adopting the solvothermal method.Structural characterization unveils that both complexes 1 and 2 are constituted by two Gd^(3+)ions,two dbm-ions,two CH_(3)OH molecules,and two polydentate Schiff-base ligands(HL_(1)^(2-)or L_(2)^(2-)).In addition,complex 1 contains four free methanol molecules,whereas complex 2 harbors two free methanol molecules.By investigating the interactions between complexes 1 and 2 and four types of bacteria(Bacillus subtilis,Escherichia coli,Staphylococcus aureus,Candida albicans),it was found that both complexes 1 and 2 exhibited potent antibacte-rial activities.The interaction mechanisms between the ligands H_(3)L_(1),H_(2)L_(2),complexes 1 and 2,and calf thymus DNA(CT-DNA)were studied using ultraviolet-visible spectroscopy,fluorescence titration,and cyclic voltammetry.The results demonstrated that both complexes 1 and 2 can intercalate into CT-DNA molecules,thereby inhibiting bacterial proliferation to achieve the antibacterial effects.CCDC:2401116,1;2401117,2.展开更多
There is curiosity and awareness throughout the world regarding the role of Information and Communication technologies. This is felt in each and every section of society. Several studies have confirmed and considered ...There is curiosity and awareness throughout the world regarding the role of Information and Communication technologies. This is felt in each and every section of society. Several studies have confirmed and considered information and communication technology’s significance in the field of education. It has not only affected learners but also to the teachers. This paper explores how ICT-based projects affect teachers’ and students’ attitudes. The data was collected through self-prepared attitude scale. It was distributed among the teachers and students of various schools. Two hundred students and one hundred twenty teachers responded to the questionnaire. Analysis was done through the data collected from the teachers as well as from students. The study’s conclusions demonstrated that while there was no significant variation in the attitudes of teachers utilizing different ICT-based programs, there was a substantial difference in the students’ attitude toward learning with different ICT-based programs.展开更多
Target-based and phenotype-based methods are the two main approaches for drug screening.Target-based drug screening focuses on specific targets CPA highly correlated with disease mechanisms,by detecting protein-ligand...Target-based and phenotype-based methods are the two main approaches for drug screening.Target-based drug screening focuses on specific targets CPA highly correlated with disease mechanisms,by detecting protein-ligand binding structure,dynamics and affinity.Currently,the four mainstream drug targets are G protein-coupled receptors(GPCRs),kinases,ion channels,and nuclear receptors,accounting for over 70%of effective drug targets,most of which are membrane proteins and enzymes.In recent years,various new drug targets have been continuously discovered,and the research focus has shifted from simple affinity analysis to high-throughput and high-content screening,as well as exploring drug-target interaction modes.These deepen reliance on the analytical techniques to have higher sensitivity,recognition specificity,and applicability to diversified target structures,which promoting the rapid development of novel screening methods.展开更多
A tetranuclear Ln(Ⅲ)-based complex:[Dy_(4)(dbm)_(4)(L)_(6)(μ_(3)-OH)_(2)]·CH_(3)CN(1)(HL=5-[(4-methylbenzylidene)amino]quinolin-8-ol,Hdbm=dibenzoylmethane)was manufactured and its structure was characterized in...A tetranuclear Ln(Ⅲ)-based complex:[Dy_(4)(dbm)_(4)(L)_(6)(μ_(3)-OH)_(2)]·CH_(3)CN(1)(HL=5-[(4-methylbenzylidene)amino]quinolin-8-ol,Hdbm=dibenzoylmethane)was manufactured and its structure was characterized in detail.Xray diffraction analysis shows that complex 1 belongs to the monoclinic crystal system and its space group is P2_1/n,which contains a rhombic Dy_(4)core.Magnetic measurements of 1 suggest it possesses extraordinary single-molecule magnet(SMM)behavior.Its energy barrier U_(eff)/k_(B)was 116.7 K,and the pre-exponential coefficient τ_(0)=1.05×10~(-8)s.CCDC:2359322.展开更多
In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilizati...In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilization of this information. This study proposes a novel framework for intelligent Question-and-Answer (Q&A) systems based on Retrieval-Augmented Generation (RAG) to address these issues. The system efficiently acquires domain-specific knowledge by leveraging external databases, including Relational Databases (RDBs) and graph databases, without additional fine-tuning for Large Language Models (LLMs). Crucially, the framework integrates a Dynamic Knowledge Base Updating Mechanism (DKBUM) and a Weighted Context-Aware Similarity (WCAS) method to enhance retrieval accuracy and mitigate inherent limitations of LLMs, such as hallucinations and lack of specialization. Additionally, the proposed DKBUM dynamically adjusts knowledge weights within the database, ensuring that the most recent and relevant information is utilized, while WCAS refines the alignment between queries and knowledge items by enhanced context understanding. Experimental validation demonstrates that the system can generate timely, accurate, and context-sensitive responses, making it a robust solution for managing complex business logic in specialized industries.展开更多
In general,the rapid growth of α-Fe clusters is a challenge in high Fe-content Fe-based amorphous alloys,negatively affecting their physical properties.Herein,we introduce an efficient and rapid post-treatment techni...In general,the rapid growth of α-Fe clusters is a challenge in high Fe-content Fe-based amorphous alloys,negatively affecting their physical properties.Herein,we introduce an efficient and rapid post-treatment technique known as ultrasonic vibration rapid processing(UVRP),which enables the formation of high-density strong magnetic α-Fe clusters,thereby enhancing the soft magnetic properties of Fe_(78)Si(13)B_(9) amorphous alloy ribbon.展开更多
Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in...Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in IoT environments,these systems do not perform well and have elevated false positive rates—consequently decreasing detection accuracy.In this study,we try to overcome these restrictions by employing fuzzy logic and machine learning to develop an Enhanced Rule-Based Model(ERBM)to classify the packets better and identify intrusions.The ERBM developed for this approach improves data preprocessing and feature selections by utilizing fuzzy logic,where three membership functions are created to classify all the network traffic features as low,medium,or high to remain situationally aware of the environment.Such fuzzy logic sets produce adaptive detection rules by reducing data uncertainty.Also,for further classification,machine learning classifiers such as Decision Tree(DT),Random Forest(RF),and Neural Networks(NN)learn complex ways of attacks and make the detection process more precise.A thorough performance evaluation using different metrics,including accuracy,precision,recall,F1 Score,detection rate,and false-positive rate,verifies the supremacy of ERBM over classical IDS.Under extensive experiments,the ERBM enables a remarkable detection rate of 99%with considerably fewer false positives than the conventional models.Integrating the ability for uncertain reasoning with fuzzy logic and an adaptable component via machine learning solutions,the ERBM systemprovides a unique,scalable,data-driven approach to IoT intrusion detection.This research presents a major enhancement initiative in the context of rule-based IDS,introducing improvements in accuracy to evolving IoT threats.展开更多
Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of g...Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of gender-based violence.With definitions of economic violence broadening to encompass a range of coercive and manipulative behaviors-from financial abuse in domestic violence scenarios to the economic harassment faced by stay-at-home moms-understanding this form of exploitation is crucial for crafting effective interventions.This article aims to delve into various facets of economic violence,including its definition,prevalence,and the stark realities it creates for its victims.Following the search of international databases:Social Work Abstracts(EBSCO),Psychology Abstracts,Family and Women Studies Worldwide,Psychiatry Online,Psych INFO(including Psych ARTICLES),PubMed,Wiley,and Scopus,60 peer-reviewed articles that met all inclusion criteria were included in the paper.Our review clarifies that looking forward,the call for a comprehensive understanding of economic violence,enhanced legal frameworks,and the strengthening of supportive networks underscore the multidisciplinary approach required to combat this issue effectively.展开更多
基金supported by the National Natural Science Foundation of China(42474003,42074007)the Fundamental Research Funds for the Central Universities(2042023kfyq01)。
文摘As a major fault in the northeastern Qinghai-Xizang Plateau,the Haiyuan fault zone is important for understanding the regional deformation.Aiming at the differences in the slip rate and locking degree obtained from different studies,this study constructs a refined block model(including Qilian,Alxa,Ordos,Xining,Haiyuan,and Lanzhou blocks)and uses the grid search and simulated annealing methods to invert GPS data for slip rate and locking degree of the Haiyuan fault zone.The results are as follows:(1)The sinistral slip rates in the western,middle,and eastern segments are 4.93-5.22 mm/a,1.52-4.94 mm/a,and 0.43-1.18 mm/a,decreasing eastward on the whole,while the compression rates are 0.45-1.26 mm/a,0.58-2.62 mm/a,and3.52-4.48 mm/a,increasing eastward on the whole.(2)The locking depth of the western segment increases from about 5 km to about 20 km eastward;the middle segment decreases and then increases eastward;the eastern segment concentrates at about 20 km(PHI is about 0.86).(3)The slip deficit is relatively higher in the Lenglongling,Jinqianghe,Maomaoshan,and Liupanshan faults(averaging about 3.42 mm/a,4.16 mm/a,4.23 mm/a,and 3.43 mm/a within 20 km).(4)The Qilian,Alxa,Xining,Lanzhou,and Haiyuan blocks rotate clockwise,while the Ordos block rotates counterclockwise.Additionally,by comparing different block models,the Haiyuan block should be considered independently.The Haiyuan fault zone adjusts surrounding block movements and uplifts Liupanshan mountain tectonically.The results can provide important references for understanding the regional earthquake risk and deformation mechanism.
基金supported by Hainan Provincial Natural Science Foundation of China Nos.622RC617,624RC485Open Foundation of State Key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2023-1-07).
文摘The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions.
基金supported in part by the National Natural Science Foundation of China under Grant No.62062031in part by the MIC/SCOPE#JP235006102+2 种基金in part by JST ASPIRE Grant Number JPMJAP2325in part by ROIS NII Open Collaborative Research under Grant 24S0601in part by collaborative research with Toyota Motor Corporation,Japan。
文摘Remote driving,an emergent technology enabling remote operations of vehicles,presents a significant challenge in transmitting large volumes of image data to a central server.This requirement outpaces the capacity of traditional communication methods.To tackle this,we propose a novel framework using semantic communications,through a region of interest semantic segmentation method,to reduce the communication costs by transmitting meaningful semantic information rather than bit-wise data.To solve the knowledge base inconsistencies inherent in semantic communications,we introduce a blockchain-based edge-assisted system for managing diverse and geographically varied semantic segmentation knowledge bases.This system not only ensures the security of data through the tamper-resistant nature of blockchain but also leverages edge computing for efficient management.Additionally,the implementation of blockchain sharding handles differentiated knowledge bases for various tasks,thus boosting overall blockchain efficiency.Experimental results show a great reduction in latency by sharding and an increase in model accuracy,confirming our framework's effectiveness.
基金partially supported by the National Key Research and Development Program of the Ministry of Science and Technology of China(2022YFE0114200)the National Natural Science Foundation of China(U20A6004).
文摘This paper investigates a distributed heterogeneous hybrid blocking flow-shop scheduling problem(DHHBFSP)designed to minimize the total tardiness and total energy consumption simultaneously,and proposes an improved proximal policy optimization(IPPO)method to make real-time decisions for the DHHBFSP.A multi-objective Markov decision process is modeled for the DHHBFSP,where the reward function is represented by a vector with dynamic weights instead of the common objectiverelated scalar value.A factory agent(FA)is formulated for each factory to select unscheduled jobs and is trained by the proposed IPPO to improve the decision quality.Multiple FAs work asynchronously to allocate jobs that arrive randomly at the shop.A two-stage training strategy is introduced in the IPPO,which learns from both single-and dual-policy data for better data utilization.The proposed IPPO is tested on randomly generated instances and compared with variants of the basic proximal policy optimization(PPO),dispatch rules,multi-objective metaheuristics,and multi-agent reinforcement learning methods.Extensive experimental results suggest that the proposed strategies offer significant improvements to the basic PPO,and the proposed IPPO outperforms the state-of-the-art scheduling methods in both convergence and solution quality.
基金supported by a sub-award to the University of Missouri from the Heinrich Heine University of Dusseldorf funded by the Bill&Melinda Gates Foundation(OPP1155704)(Bing Yang)and the China Scholar Council(Chenhao Li,as a joint Ph.D.student).
文摘Bacterial blight(BB),caused by Xanthomonas oryzae pathovar oryzae(Xoo),poses a significant threat to rice production,particularly in Asia and West Africa.Breeding resistance against BB in elite rice varieties is crucial to advancing rice breeding program and supporting smallholder farmers.Transcription Activator-Like effectors(TALes)are key virulence factors in Xoo,with some targeting the susceptibility(S)genes such as the sugar transporter SWEET genes in rice.Among these,SWEET14 is an important S gene,with its promoter bound by the TALe TalC which exists across all sequenced African Xoo isolates.In the present study,we utilized CRISPR/Cas9-based cytidine and adenine base editors to alter the effector binding element(EBE)of TalC in the promoter of SWEET14 in rice cultivars Kitaake,IR24,and Zhonghua 11.Mutations with C to T changes in EBE led to reduced SWEET14 induction by TalC-containing Xoo strains,resulting in resistance to African Xoo isolates reliant on TalC for virulence.Conversely,A to G changes retained SWEET14 inducibility and susceptibility to Xoo in edited lines.Importantly,no off-target mutations were detected at predicted sites,and the edited lines exhibited no obvious defects in major agronomic traits in Kitaake.These results underscore the effectiveness of base editing systems for both molecular biology research and crop improvement endeavors.
基金the China High-Tech Ship Project of the Ministry of Industry and Information Technology(No.2021-51(MC-202032-Z08))。
文摘To increase efficiency in fierce competition,it is necessary and urgent to improve the standard of production planning for shipbuilding.The construction of curved blocks is the bottleneck to improve the efficiency of shipbuilding.Thus it is a key breakthrough for higher shipbuilding productivity to study the curved block production.By analyzing the scheduling problem in curved blocks production,we propose an intelligent curved block production scheduling method and its system based on a knowledge base,and show the main process of the system.The functions of the system include data management,assembly plan generation,plan adjustment,and plan evaluation.In order to deal with the actual situation and inherit the empirical knowledge,the system extracts some rules to control block selecting,algorithm selection,and evaluation thresholds to build a production decision-making knowledge base in the curved block scheduling system.The proposed knowledge base could be referred and modified by users,especially after a few interactions between the users and the knowledge base.The final assembly plan can be visualized and evaluated to facilitate the observation of plan implementation and effects of the decisions in the process.Finally,the system is verified by a large shipyard in Shanghai using real data and the results illustrate that the proposed method can perform the knowledge-based scheduling for curved blocks construction effectively.
基金funded by the Sichuan Science and Technology Program,Grant Nos.2024NSFSC0515,2024ZHCG0182 and MZGC20230013.
文摘To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions.
基金supported by the Natural Science Foundation of Henan Province(Grant No.242300420297)awarded to Yi Sun.
文摘With the development of anti-virus technology,malicious documents have gradually become the main pathway of Advanced Persistent Threat(APT)attacks,therefore,the development of effective malicious document classifiers has become particularly urgent.Currently,detection methods based on document structure and behavioral features encounter challenges in feature engineering,these methods not only have limited accuracy,but also consume large resources,and usually can only detect documents in specific formats,which lacks versatility and adaptability.To address such problems,this paper proposes a novel malicious document detection method-visualizing documents as GGE images(Grayscale,Grayscale matrix,Entropy).The GGE method visualizes the original byte sequence of the malicious document as a grayscale image,the information entropy sequence of the document as an entropy image,and at the same time,the grayscale level co-occurrence matrix and the texture and spatial information stored in it are converted into grayscale matrix image,and fuses the three types of images to get the GGE color image.The Convolutional Block Attention Module-EfficientNet-B0(CBAM-EfficientNet-B0)model is then used for classification,combining transfer learning and applying the pre-trained model on the ImageNet dataset to the feature extraction process of GGE images.As shown in the experimental results,the GGE method has superior performance compared with other methods,which is suitable for detecting malicious documents in different formats,and achieves an accuracy of 99.44%and 97.39%on Portable Document Format(PDF)and office datasets,respectively,and consumes less time during the detection process,which can be effectively applied to the task of detecting malicious documents in real-time.
基金Supported by National Natural Science Foundation of China(Grant No.51890881)。
文摘As electro-hydrostatic actuator(EHA)technology advances towards lightweight and integration,the demand for enhanced internal flow pathways in hydraulic valve blocks intensifies.However,owing to the constraints imposed by traditional manufacturing processes,conventional hydraulic integrated valve blocks fail to satisfy the demands of a more compact channel layout and lower energy dissipation.Notably,the subjectivity in the arrangement of internal passages results in a time-consuming and labor-intensive process.This study employed additive manufacturing technology and the ant colony algorithm and B-spline curves for the meticulous design of internal passages within an aviation EHA valve block.The layout environment for the valve block passages was established,and path optimization was achieved using the ant colony algorithm,complemented by smoothing using B-spline curves.Three-dimensional modeling was performed using SolidWorks software,revealing a 10.03%reduction in volume for the optimized passages compared with the original passages.Computational fluid dynamics(CFD)simulations were performed using Fluent software,demonstrating that the algorithmically optimized passages effectively prevented the occurrence of vortices at right-angled locations,exhibited superior flow characteristics,and concurrently reduced pressure losses by 34.09%-36.36%.The small discrepancy between the experimental and simulation results validated the efficacy of the ant colony algorithm and B-spline curves in optimizing the passage design,offering a viable solution for channel design in additive manufacturing.
基金supported by the National Natural Science Foundation of China(Nos.62272418,62102058)Basic Public Welfare Research Program of Zhejiang Province(No.LGG18E050011)the Major Open Project of Key Laboratory for Advanced Design and Intelligent Computing of the Ministry of Education under Grant ADIC2023ZD001,National Undergraduate Training Program on Innovation and Entrepreneurship(No.202410345054).
文摘The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life.The development of the Internet of Things(IoT)relies on the support of base stations,which provide a solid foundation for achieving a more intelligent way of living.In a specific area,achieving higher signal coverage with fewer base stations has become an urgent problem.Therefore,this article focuses on the effective coverage area of base station signals and proposes a novel Evolutionary Particle Swarm Optimization(EPSO)algorithm based on collective prediction,referred to herein as ECPPSO.Introducing a new strategy called neighbor-based evolution prediction(NEP)addresses the issue of premature convergence often encountered by PSO.ECPPSO also employs a strengthening evolution(SE)strategy to enhance the algorithm’s global search capability and efficiency,ensuring enhanced robustness and a faster convergence speed when solving complex optimization problems.To better adapt to the actual communication needs of base stations,this article conducts simulation experiments by changing the number of base stations.The experimental results demonstrate thatunder the conditionof 50 ormore base stations,ECPPSOconsistently achieves the best coverage rate exceeding 95%,peaking at 99.4400%when the number of base stations reaches 80.These results validate the optimization capability of the ECPPSO algorithm,proving its feasibility and effectiveness.Further ablative experiments and comparisons with other algorithms highlight the advantages of ECPPSO.
基金supported by the National Social Science Fund of China (Grant No.23BGL270)。
文摘The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is spreading positive information to counterbalance the diffusion of rumor.The spreading mechanism of rumors and effective suppression strategies are significant and challenging research issues.Firstly,in order to simulate the dissemination of multiple types of information,we propose a competitive linear threshold model with state transition(CLTST)to describe the spreading process of rumor and anti-rumor in the same network.Subsequently,we put forward a community-based rumor blocking(CRB)algorithm based on influence maximization theory in social networks.Its crucial step is to identify a set of influential seeds that propagate anti-rumor information to other nodes,which includes community detection,selection of candidate anti-rumor seeds and generation of anti-rumor seed set.Under the CLTST model,the CRB algorithm has been compared with six state-of-the-art algorithms on nine online social networks to verify the performance.Experimental results show that the proposed model can better reflect the process of rumor propagation,and review the propagation mechanism of rumor and anti-rumor in online social networks.Moreover,the proposed CRB algorithm has better performance in weakening the rumor dissemination ability,which can select anti-rumor seeds in networks more accurately and achieve better performance in influence spread,sensitivity analysis,seeds distribution and running time.
文摘Two new complexes,[Zn_(2)(L1)(HL1)(NO_(3))]·CH_(3)OH(1)and[Zn_(3)(L2)(L3)_(3)Cl]·CH_(3)OH(2),were successfully synthesized by‘one-pot’method based on cinnoline-3-ylhydrazine ligand and zinc with 2-hydroxy-4-methoxybenzaldehyde and 2-hydroxy-3-methoxybenzaldehyde ligands,respectively,where H_(2)L1=5-methoxy-2-(phthalazin-1-ylhydrazonomethyl)-phenol,H_(2)L2=2-methoxy-6-(phthalazin-1-yl-hydrazonomethyl)-phenol,HL3=2-(1,8-dihydro-[1,2,4]triazolo[3,4-α]phthalazin-3-yl)-6-methoxy-phenol.Complexes 1 and 2 were characterized by infrared spectroscopy,elemental analysis,single-crystal X-ray diffraction,powder X-ray diffraction,etc.It is worth noting that the cinnolin-3-yl-hydrazine ligand and 2-hydroxy-3-methoxybenzaldehyde form two types of Schiff bases(H_(2)L2 and HL3)when in situ reacting and coordinating with Zn(Ⅱ),and HL3 also has two coordination modes.In addition,the fluorescence performance showed that complex 1 can achieve selective and sensitive sensing of Al^(3+)in water with a detection limit of 6.37μmol·L^(-1).CCDC:2413978,1;2413979,2.
文摘Two Gd_(2)complexes,namely[Gd_(2)(dbm)_(2)(HL_(1))_(2)(CH_(3)OH)_(2)]·4CH_(3)OH(1)and[Gd_(2)(dbm)_(2)(L_(2))_(2)(CH_(3)OH)_(2)]·2CH_(3)OH(2),where H_(3)L_(1)=(Z)-N'-[4-(diethylamino)-2-hydroxybenzylidene]-2-hydroxyacetohydrazide,H_(2)L_(2)=(E)-N'-(5-bromo-2-hydroxy-3-methoxybenzylidene)nicotinohydrazide,Hdbm=dibenzoylmethane,have been constructed by adopting the solvothermal method.Structural characterization unveils that both complexes 1 and 2 are constituted by two Gd^(3+)ions,two dbm-ions,two CH_(3)OH molecules,and two polydentate Schiff-base ligands(HL_(1)^(2-)or L_(2)^(2-)).In addition,complex 1 contains four free methanol molecules,whereas complex 2 harbors two free methanol molecules.By investigating the interactions between complexes 1 and 2 and four types of bacteria(Bacillus subtilis,Escherichia coli,Staphylococcus aureus,Candida albicans),it was found that both complexes 1 and 2 exhibited potent antibacte-rial activities.The interaction mechanisms between the ligands H_(3)L_(1),H_(2)L_(2),complexes 1 and 2,and calf thymus DNA(CT-DNA)were studied using ultraviolet-visible spectroscopy,fluorescence titration,and cyclic voltammetry.The results demonstrated that both complexes 1 and 2 can intercalate into CT-DNA molecules,thereby inhibiting bacterial proliferation to achieve the antibacterial effects.CCDC:2401116,1;2401117,2.
文摘There is curiosity and awareness throughout the world regarding the role of Information and Communication technologies. This is felt in each and every section of society. Several studies have confirmed and considered information and communication technology’s significance in the field of education. It has not only affected learners but also to the teachers. This paper explores how ICT-based projects affect teachers’ and students’ attitudes. The data was collected through self-prepared attitude scale. It was distributed among the teachers and students of various schools. Two hundred students and one hundred twenty teachers responded to the questionnaire. Analysis was done through the data collected from the teachers as well as from students. The study’s conclusions demonstrated that while there was no significant variation in the attitudes of teachers utilizing different ICT-based programs, there was a substantial difference in the students’ attitude toward learning with different ICT-based programs.
文摘Target-based and phenotype-based methods are the two main approaches for drug screening.Target-based drug screening focuses on specific targets CPA highly correlated with disease mechanisms,by detecting protein-ligand binding structure,dynamics and affinity.Currently,the four mainstream drug targets are G protein-coupled receptors(GPCRs),kinases,ion channels,and nuclear receptors,accounting for over 70%of effective drug targets,most of which are membrane proteins and enzymes.In recent years,various new drug targets have been continuously discovered,and the research focus has shifted from simple affinity analysis to high-throughput and high-content screening,as well as exploring drug-target interaction modes.These deepen reliance on the analytical techniques to have higher sensitivity,recognition specificity,and applicability to diversified target structures,which promoting the rapid development of novel screening methods.
文摘A tetranuclear Ln(Ⅲ)-based complex:[Dy_(4)(dbm)_(4)(L)_(6)(μ_(3)-OH)_(2)]·CH_(3)CN(1)(HL=5-[(4-methylbenzylidene)amino]quinolin-8-ol,Hdbm=dibenzoylmethane)was manufactured and its structure was characterized in detail.Xray diffraction analysis shows that complex 1 belongs to the monoclinic crystal system and its space group is P2_1/n,which contains a rhombic Dy_(4)core.Magnetic measurements of 1 suggest it possesses extraordinary single-molecule magnet(SMM)behavior.Its energy barrier U_(eff)/k_(B)was 116.7 K,and the pre-exponential coefficient τ_(0)=1.05×10~(-8)s.CCDC:2359322.
文摘In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilization of this information. This study proposes a novel framework for intelligent Question-and-Answer (Q&A) systems based on Retrieval-Augmented Generation (RAG) to address these issues. The system efficiently acquires domain-specific knowledge by leveraging external databases, including Relational Databases (RDBs) and graph databases, without additional fine-tuning for Large Language Models (LLMs). Crucially, the framework integrates a Dynamic Knowledge Base Updating Mechanism (DKBUM) and a Weighted Context-Aware Similarity (WCAS) method to enhance retrieval accuracy and mitigate inherent limitations of LLMs, such as hallucinations and lack of specialization. Additionally, the proposed DKBUM dynamically adjusts knowledge weights within the database, ensuring that the most recent and relevant information is utilized, while WCAS refines the alignment between queries and knowledge items by enhanced context understanding. Experimental validation demonstrates that the system can generate timely, accurate, and context-sensitive responses, making it a robust solution for managing complex business logic in specialized industries.
基金supported by the Major Science and Technology Project of Zhongshan City(No.2022AJ004)the Key Basic and Applied Research Program of Guangdong Province(Nos.2019B030302010 and 2022B1515120082)Guangdong Science and Technology Innovation Project(No.2021TX06C111).
文摘In general,the rapid growth of α-Fe clusters is a challenge in high Fe-content Fe-based amorphous alloys,negatively affecting their physical properties.Herein,we introduce an efficient and rapid post-treatment technique known as ultrasonic vibration rapid processing(UVRP),which enables the formation of high-density strong magnetic α-Fe clusters,thereby enhancing the soft magnetic properties of Fe_(78)Si(13)B_(9) amorphous alloy ribbon.
基金A research grant from the Multimedia University,Malaysia supports this work。
文摘Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in IoT environments,these systems do not perform well and have elevated false positive rates—consequently decreasing detection accuracy.In this study,we try to overcome these restrictions by employing fuzzy logic and machine learning to develop an Enhanced Rule-Based Model(ERBM)to classify the packets better and identify intrusions.The ERBM developed for this approach improves data preprocessing and feature selections by utilizing fuzzy logic,where three membership functions are created to classify all the network traffic features as low,medium,or high to remain situationally aware of the environment.Such fuzzy logic sets produce adaptive detection rules by reducing data uncertainty.Also,for further classification,machine learning classifiers such as Decision Tree(DT),Random Forest(RF),and Neural Networks(NN)learn complex ways of attacks and make the detection process more precise.A thorough performance evaluation using different metrics,including accuracy,precision,recall,F1 Score,detection rate,and false-positive rate,verifies the supremacy of ERBM over classical IDS.Under extensive experiments,the ERBM enables a remarkable detection rate of 99%with considerably fewer false positives than the conventional models.Integrating the ability for uncertain reasoning with fuzzy logic and an adaptable component via machine learning solutions,the ERBM systemprovides a unique,scalable,data-driven approach to IoT intrusion detection.This research presents a major enhancement initiative in the context of rule-based IDS,introducing improvements in accuracy to evolving IoT threats.
文摘Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of gender-based violence.With definitions of economic violence broadening to encompass a range of coercive and manipulative behaviors-from financial abuse in domestic violence scenarios to the economic harassment faced by stay-at-home moms-understanding this form of exploitation is crucial for crafting effective interventions.This article aims to delve into various facets of economic violence,including its definition,prevalence,and the stark realities it creates for its victims.Following the search of international databases:Social Work Abstracts(EBSCO),Psychology Abstracts,Family and Women Studies Worldwide,Psychiatry Online,Psych INFO(including Psych ARTICLES),PubMed,Wiley,and Scopus,60 peer-reviewed articles that met all inclusion criteria were included in the paper.Our review clarifies that looking forward,the call for a comprehensive understanding of economic violence,enhanced legal frameworks,and the strengthening of supportive networks underscore the multidisciplinary approach required to combat this issue effectively.