The exploitable heap layouts are used to determine the exploitability of heap vulnerabilities in general-purpose applications.Prior studies have focused on using fuzzing-based methods to generate more exploitable heap...The exploitable heap layouts are used to determine the exploitability of heap vulnerabilities in general-purpose applications.Prior studies have focused on using fuzzing-based methods to generate more exploitable heap layouts.However,the exploitable heap layout cannot fully demonstrate the exploitability of a vulnerability,as it is uncertain whether the attacker can control the data covered by the overflow.In this paper,we propose the Heap Overflow Exploitability Evaluator(Hoee),a new approach to automatically reveal the exploitability of heap buffer overflow vulnerabilities by evaluating proof-of-concepts(PoCs)generated by fuzzers.Hoee leverages several techniques to collect dynamic information at runtime and recover heap object layouts in a fine-grained manner.The overflow context is carefully analyzed to determine whether the sensitive pointer is corrupted,tainted,or critically used.We evaluate Hoee on 34 real-world CVE vulnerabilities from 16 general-purpose programs.The results demonstrate that Hoee accurately identifies the key factors for developing exploits in vulnerable contexts and correctly recognizes the behavior of overflow.展开更多
In this study,a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm(BaOA).Inspired by the human interactions ...In this study,a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm(BaOA).Inspired by the human interactions between barbers and customers,BaOA captures two key processes:the customer’s selection of a hairstyle and the detailed refinement during the haircut.These processes are translated into a mathematical framework that forms the foundation of BaOA,consisting of two critical phases:exploration,representing the creative selection process,and exploitation,which focuses on refining details for optimization.The performance of BaOA is evaluated using 52 standard benchmark functions,including unimodal,high-dimensional multimodal,fixed-dimensional multimodal,and the Congress on Evolutionary Computation(CEC)2017 test suite.This comprehensive assessment highlights BaOA’s ability to balance exploration and exploitation effectively,resulting in high-quality solutions.A comparative analysis against twelve widely known metaheuristic algorithms further demonstrates BaOA’s superior performance,as it consistently delivers better results across most benchmark functions.To validate its real-world applicability,BaOA is tested on four engineering design problems,illustrating its capability to address practical challenges with remarkable efficiency.The results confirm BaOA’s versatility and reliability as an optimization tool.This study not only introduces an innovative algorithm but also establishes its effectiveness in solving complex problems,providing a foundation for future research and applications in diverse scientific and engineering domains.展开更多
Padma was 17 when the democratic reform was introduced in Xizang in 1959.Before the reform,the region had been ruled by feudal serfdom under a theocracy for centuries.Nearly one million serfs were subjected to estate-...Padma was 17 when the democratic reform was introduced in Xizang in 1959.Before the reform,the region had been ruled by feudal serfdom under a theocracy for centuries.Nearly one million serfs were subjected to estate-holders'cruel exploitation and oppression.Padma was one of them.展开更多
BACKGROUND Economic violence is a type of domestic violence in which an intimate partner attempts to oppress,restrict,or direct a female by exercising control over her financial resources.AIM To explore the impact of ...BACKGROUND Economic violence is a type of domestic violence in which an intimate partner attempts to oppress,restrict,or direct a female by exercising control over her financial resources.AIM To explore the impact of economic abuse on individual work performance and clarify the effective factors on financial exploitation among physicians and nurses.METHODS The study has a cross-sectional design,and 305 married,female physicians and nurses working in a university hospital were included.Data was collected with demographic characteristics forms,“Revised Scale of Economic Abuse”and“Individual Work Performance Questionnaire”.Pearson correlation,comparative analyses,and internal consistency reliability tests were used.RESULTS The average age was 39.04±9.41.Among the respondents 69.2%were nurses and 63.9%held a bachelor’s degree.The mean score for the Revised Scale of Economic Abuse was 2.80±4.73 while it was 3.86±0.60 for the Individual Work Performance Questionnaire.CONCLUSION Our study revealed no relationship between economic abuse and individual work performance,confirming that nurses are exposed to more economic abuse and exploitation than physicians and exhibit higher work performance.展开更多
The geothermal resources in hot dry rock(HDR)are considered the future trend in geothermal energy extraction due to their abundant reserves.However,exploitation of the resources is fraught with complexity and technica...The geothermal resources in hot dry rock(HDR)are considered the future trend in geothermal energy extraction due to their abundant reserves.However,exploitation of the resources is fraught with complexity and technical challenges arising from their unique characteristics of high temperature,high strength,and low permeability.With the continuous advancement of artificial intelligence(AI)technology,intelligent algorithms such as machine learning and evolutionary algorithms are gradually replacing or assisting traditional research methods,providing new solutions for HDR geothermal resource exploitation.This study first provides an overview of HDR geothermal resource exploitation technologies and AI methods.Then,the latest research progress is systematically reviewed in AI applications in HDR geothermal reservoir characterization,deep drilling,heat production,and operational parameter optimization.Additionally,this study discusses the potential limitations of AI methods in HDR geothermal resource exploitation and highlights the corresponding opportunities for AI's application.Notably,the study proposes the framework of an intelligent HDR exploitation system,offering a valuable reference for future research and practice.展开更多
This paper introduces a novel optimization approach called Recuperated Seed Search Optimization(RSSO),designed to address challenges in solving mechanical engineering design problems.Many optimization techniques strug...This paper introduces a novel optimization approach called Recuperated Seed Search Optimization(RSSO),designed to address challenges in solving mechanical engineering design problems.Many optimization techniques struggle with slow convergence and suboptimal solutions due to complex,nonlinear natures.The Sperm Swarm Optimization(SSO)algorithm,which mimics the sperm’s movement to reach an egg,is one such technique.To improve SSO,researchers combined it with three strategies:opposition-based learning(OBL),Cauchy mutation(CM),and position clamping.OBL introduces diversity to SSO by exploring opposite solutions,speeding up convergence.CM enhances both exploration and exploitation capabilities throughout the optimization process.This combined approach,RSSO,has been rigorously tested on standard benchmark functions,real-world engineering problems,and through statistical analysis(Wilcoxon test).The results demonstrate that RSSO significantly outperforms other optimization algorithms,achieving faster convergence and better solutions.The paper details the RSSO algorithm,discusses its implementation,and presents comparative results that validate its effectiveness in solving complex engineering design challenges.展开更多
Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of g...Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of gender-based violence.With definitions of economic violence broadening to encompass a range of coercive and manipulative behaviors-from financial abuse in domestic violence scenarios to the economic harassment faced by stay-at-home moms-understanding this form of exploitation is crucial for crafting effective interventions.This article aims to delve into various facets of economic violence,including its definition,prevalence,and the stark realities it creates for its victims.Following the search of international databases:Social Work Abstracts(EBSCO),Psychology Abstracts,Family and Women Studies Worldwide,Psychiatry Online,Psych INFO(including Psych ARTICLES),PubMed,Wiley,and Scopus,60 peer-reviewed articles that met all inclusion criteria were included in the paper.Our review clarifies that looking forward,the call for a comprehensive understanding of economic violence,enhanced legal frameworks,and the strengthening of supportive networks underscore the multidisciplinary approach required to combat this issue effectively.展开更多
This study examined how exploitative leadership undermines employees’experience of flow with work role overload and traditionalist values.Data were collected from 361 staff members across diverse industries in China(...This study examined how exploitative leadership undermines employees’experience of flow with work role overload and traditionalist values.Data were collected from 361 staff members across diverse industries in China(females=58.17%,mean age=32.14,SD=5.83).Structural equation modeling results indicated that exploitative leadership reduces employees’work-related flow via increased role overload.Furthermore,employees’traditionality level moderates the exploitative leadership effects on role overload.Specifically,employees with higher traditionality reported lower role overload when experiencing exploitative leadership,suggesting that cultural values may buffer its negative impact.This study contributes to understanding the mechanism and contextual factors linking exploitative leadership to work-related flow,filling a gap in the literature.Organizations are encouraged to reduce exploitative leadership behaviors through leadership development programs and to consider employees’value orientations when designing work environments.展开更多
Heuristic optimization algorithms have been widely used in solving complex optimization problems in various fields such as engineering,economics,and computer science.These algorithms are designed to find high-quality ...Heuristic optimization algorithms have been widely used in solving complex optimization problems in various fields such as engineering,economics,and computer science.These algorithms are designed to find high-quality solutions efficiently by balancing exploration of the search space and exploitation of promising solutions.While heuristic optimization algorithms vary in their specific details,they often exhibit common patterns that are essential to their effectiveness.This paper aims to analyze and explore common patterns in heuristic optimization algorithms.Through a comprehensive review of the literature,we identify the patterns that are commonly observed in these algorithms,including initialization,local search,diversity maintenance,adaptation,and stochasticity.For each pattern,we describe the motivation behind it,its implementation,and its impact on the search process.To demonstrate the utility of our analysis,we identify these patterns in multiple heuristic optimization algorithms.For each case study,we analyze how the patterns are implemented in the algorithm and how they contribute to its performance.Through these case studies,we show how our analysis can be used to understand the behavior of heuristic optimization algorithms and guide the design of new algorithms.Our analysis reveals that patterns in heuristic optimization algorithms are essential to their effectiveness.By understanding and incorporating these patterns into the design of new algorithms,researchers can develop more efficient and effective optimization algorithms.展开更多
Drawing upon the Conservation of Resources theory,this study investigated the relationship between proactive personality and strengths use,as well as the mediating role of psychological safety and the moderating role ...Drawing upon the Conservation of Resources theory,this study investigated the relationship between proactive personality and strengths use,as well as the mediating role of psychological safety and the moderating role of exploitative leadership within this relationship.Data were collected from 368 employees(females=57.61%;mean age=32.35;SD=6.31)working in various organizations in China at two points in time with a two-week interval.We conducted structural equation modeling and a moderated mediation path analysis to test our hypotheses.The results demonstrated that proactive personality is positively related to strengths use and psychological safety partially mediates the association of proactive personality and strengths use.Furthermore,this study also found that exploitative leadership weakens the direct relationship between proactive personality and psychological safety and the indirect relationship of proactive personality with strengths use through psychological safety.This study identified the underlying mechanisms between proactive personality and strengths use.展开更多
The permeability of rocks is of utmost importance in the exploitation of deep geological resources.Current characterizations of rock permeability typically consider the influence of either pores or fractures alone.How...The permeability of rocks is of utmost importance in the exploitation of deep geological resources.Current characterizations of rock permeability typically consider the influence of either pores or fractures alone.However,deep reservoir rock formations are subjected to complex environments with coupling of high temperature and stress.As a result,deep reservoir rocks possess a complex structure comprising of pores and fractures,making it challenging to understand their impact on permeability.Comprehending this relationship is vital for the secure and efficient exploitation of deep geological resources.This study presents a permeability calculation model that enables simultaneously quantify the impacts of pore and fracture with full feature size.The model independently considers large-scale fractures’fractal properties and tortuosity while also addressing the distribution and size of small-scale pores.A tortuosity expression that incorporates the effects of thermal damage has been developed using the pore geometric elasticity method.Considering the distinct contributions of pores and fractures to rock permeability,a comprehensive rock permeability calculation model is established.This model has two main strengths:it thoroughly characterizes the influence of pore structures on permeability at multiple scales and precisely details how fractal attributes of fractures affect permeability.To validate the applicability of the model,this study conducted seepage experiments and microscopic observations,capturing the variations in permeability under thermo-mechanical coupling,while quantifying the geometric characteristics and spatial distribution of pores and fractures within the rock.By comparing the measured permeability results,the theoretical values demonstrated a commendable fit.In comparison to previous models,this innovative approach more accurately captures various flow characteristics of the rock under the influence of thermo-mechanical coupling.展开更多
Exploring dynamic mechanical responses and failure behaviors of hot dry rock(HDR)is significant for geothermal exploitation and stability assessment.In this study,via the split Hopkinson pressure bar(SHPB)system,a ser...Exploring dynamic mechanical responses and failure behaviors of hot dry rock(HDR)is significant for geothermal exploitation and stability assessment.In this study,via the split Hopkinson pressure bar(SHPB)system,a series of dynamic compression tests were conducted on granite treated by cyclic thermal shocks at different temperatures.We analyzed the effects of cyclic thermal shock on the thermal-related physical and dynamic mechanical behaviors of granite.Specifically,the P-wave velocity,dynamic strength,and elastic modulus of the tested granite decrease with increasing temperature and cycle number,while porosity and peak strain increase.The degradation law of dynamic mechanical properties could be described by a cubic polynomial.Cyclic thermal shock promotes shear cracks propagation,causing dynamic failure mode of granite to transition from splitting to tensile-shear composite failure,accompanied by surface spalling and debris splashing.Moreover,the thermal shock damage evolution and coupled failure mechanism of tested granite are discussed.The evolution of thermal shock damage with thermal shock cycle numbers shows an obvious S-shaped surface,featured by an exponential correlation with dynamic mechanical parameters.In addition,with increasing thermal shock temperature and cycles,granite mineral species barely change,but the length and width of thermal cracks increase significantly.The non-uniform expansion of minerals,thermal shock-induced cracking,and water-rock interaction are primary factors for deteriorating dynamic mechanical properties of granite under cyclic thermal shock.展开更多
In repeated zero-sum games,instead of constantly playing an equilibrium strategy of the stage game,learning to exploit the opponent given historical interactions could typically obtain a higher utility.However,when pl...In repeated zero-sum games,instead of constantly playing an equilibrium strategy of the stage game,learning to exploit the opponent given historical interactions could typically obtain a higher utility.However,when playing against a fully adaptive opponent,one would have dificulty identifying the opponent's adaptive dynamics and further exploiting its potential weakness.In this paper,we study the problem of optimizing against the adaptive opponent who uses no-regret learning.No-regret learning is a classic and widely-used branch of adaptive learning algorithms.We propose a general framework for online modeling no-regret opponents and exploiting their weakness.With this framework,one could approximate the opponent's no-regret learning dynamics and then develop a response plan to obtain a significant profit based on the inferences of the opponent's strategies.We employ two system identification architectures,including the recurrent neural network(RNN)and the nonlinear autoregressive exogenous model,and adopt an efficient greedy response plan within the framework.Theoretically,we prove the approximation capability of our RNN architecture at approximating specific no-regret dynamics.Empirically,we demonstrate that during interactions at a low level of non-stationarity,our architectures could approximate the dynamics with a low error,and the derived policies could exploit the no-regret opponent to obtain a decent utility.展开更多
This study employs experimental and analytical methods to quantitatively investigate the nonlinear geomechanical and physicochemical processes of multiphase and high-stress coal-bearing rock masses and non-equilibrium...This study employs experimental and analytical methods to quantitatively investigate the nonlinear geomechanical and physicochemical processes of multiphase and high-stress coal-bearing rock masses and non-equilibrium geological materials,as well as their interactions.The research encompasses following aspects,i.e.1)the relationship between volatile matter yield,geological age,and distance from magmatic deposits in Kuzbass coalfield;2)the impact of physicochemical property bifurcations on coal and gas outbursts;3)the variation law of coalbed methane content with burial depth;4)the relaxation energy of gas content;5)the specific surface area of coal;6)the relationship between heat release and deformation waves of Kuzbass coal samples of different orders under uniaxial compression;7)the gas outbursts in different mines in Kuzbass;8)the relationship between seismic energy and gas outburst concentration in coal mines;9)the influence of piston mechanism;10)the connection operation between Langmuir equation and Oparin equation;and 11)the equation of motion for structural media.The research results have created a prerequisite for establishing a unified theory of the interaction between nonlinear geomechanics and physicochemical processes in rock masses,which is of great significance for the safe development and utilization of underground resources.展开更多
As mining depth increases,the temperature of the surrounding rock rises,drawing global attention to the potential for geothermal energy extraction from high-temperature water stored in collapsed rock masses-a prospect...As mining depth increases,the temperature of the surrounding rock rises,drawing global attention to the potential for geothermal energy extraction from high-temperature water stored in collapsed rock masses-a prospect that offers both promise and challenges.In response,this study proposes a functional backfilling method using mining solid waste to construct a high-porosity heat extraction space.The research integrates experiments,theoretical analysis,and simulations to examine the mechanical and permeability properties of solid waste backfill materials.It further aims to elucidate how flow velocity and initial temperature influence the evolution of the temperature field and the thermal performance.Results indicate that the backfill material achieves optimal mechanical strength with a glass fiber content of 10‰ and a length of 6 mm.Furthermore,the permeability of the solid waste backfill demonstrates a quadratic relationship with both axial and confining pressure.During the recovery stage,the temperature in the heat extraction space remains lower than that of the surrounding rock,with geothermal energy being extracted via convective heat transfer between the water medium and the rock.The amount of heat extracted shows a positive correlation with the flow velocity of the water medium and a negative correlation with its initial temperature.展开更多
This research was to introduce the characteristics of and countermeasures for ecological compensation. From the analysis of the current situation of ecological compensation, a series of characteristics of ecological c...This research was to introduce the characteristics of and countermeasures for ecological compensation. From the analysis of the current situation of ecological compensation, a series of characteristics of ecological compensation in resource exploitation and economic development were elaborated. The principles and practical issues are complex in ecological compensation, and the corresponding object, entity, financial system of ecological compensation are the keys to set up compensation mechanism, and studying of ecosystem service function and ecological footprint calculation are important ways to quantitatively assess ecological compensation, and are also important foundations for establishing calculation system of green GDP. Advocating the benefit compensation mechanism of ecological economy and enclosing ecological compensation principle are important ways for establishing the new environmental management pattern and manifesting social justice and the ecological civilization ideas. This research proposed some views of and approaches to ecological compensation mechanism for constructing natural resource development and utilization.The establishment of ecological compensation is an important approach to prevent the imbalance of resource allocation, the system guarantee for sustainable development, and the important basis of saving resources.展开更多
The insect is the animal protein feed resource potential, the rapid repro- duction, large quantity, high protein content, and most species of insects can be used as livestock feed utilization, development of insect as...The insect is the animal protein feed resource potential, the rapid repro- duction, large quantity, high protein content, and most species of insects can be used as livestock feed utilization, development of insect as feed resources, to pro- mote the development of China's animal husbandry and feed industry, has important significance.展开更多
There are several security metrics developed to protect the computer networks. In general, common security metrics focus on qualitative and subjective aspects of networks lacking formal statistical models. In the pres...There are several security metrics developed to protect the computer networks. In general, common security metrics focus on qualitative and subjective aspects of networks lacking formal statistical models. In the present study, we propose a stochastic model to quantify the risk associated with the overall network using Markovian process in conjunction with Common Vulnerability Scoring System (CVSS) framework. The model we developed uses host access graph to represent the network environment. Utilizing the developed model, one can filter the large amount of information available by making a priority list of vulnerable nodes existing in the network. Once a priority list is prepared, network administrators can make software patch decisions. Gaining in depth understanding of the risk and priority level of each host helps individuals to implement decisions like deployment of security products and to design network topologies.展开更多
文摘The exploitable heap layouts are used to determine the exploitability of heap vulnerabilities in general-purpose applications.Prior studies have focused on using fuzzing-based methods to generate more exploitable heap layouts.However,the exploitable heap layout cannot fully demonstrate the exploitability of a vulnerability,as it is uncertain whether the attacker can control the data covered by the overflow.In this paper,we propose the Heap Overflow Exploitability Evaluator(Hoee),a new approach to automatically reveal the exploitability of heap buffer overflow vulnerabilities by evaluating proof-of-concepts(PoCs)generated by fuzzers.Hoee leverages several techniques to collect dynamic information at runtime and recover heap object layouts in a fine-grained manner.The overflow context is carefully analyzed to determine whether the sensitive pointer is corrupted,tainted,or critically used.We evaluate Hoee on 34 real-world CVE vulnerabilities from 16 general-purpose programs.The results demonstrate that Hoee accurately identifies the key factors for developing exploits in vulnerable contexts and correctly recognizes the behavior of overflow.
文摘In this study,a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm(BaOA).Inspired by the human interactions between barbers and customers,BaOA captures two key processes:the customer’s selection of a hairstyle and the detailed refinement during the haircut.These processes are translated into a mathematical framework that forms the foundation of BaOA,consisting of two critical phases:exploration,representing the creative selection process,and exploitation,which focuses on refining details for optimization.The performance of BaOA is evaluated using 52 standard benchmark functions,including unimodal,high-dimensional multimodal,fixed-dimensional multimodal,and the Congress on Evolutionary Computation(CEC)2017 test suite.This comprehensive assessment highlights BaOA’s ability to balance exploration and exploitation effectively,resulting in high-quality solutions.A comparative analysis against twelve widely known metaheuristic algorithms further demonstrates BaOA’s superior performance,as it consistently delivers better results across most benchmark functions.To validate its real-world applicability,BaOA is tested on four engineering design problems,illustrating its capability to address practical challenges with remarkable efficiency.The results confirm BaOA’s versatility and reliability as an optimization tool.This study not only introduces an innovative algorithm but also establishes its effectiveness in solving complex problems,providing a foundation for future research and applications in diverse scientific and engineering domains.
文摘Padma was 17 when the democratic reform was introduced in Xizang in 1959.Before the reform,the region had been ruled by feudal serfdom under a theocracy for centuries.Nearly one million serfs were subjected to estate-holders'cruel exploitation and oppression.Padma was one of them.
文摘BACKGROUND Economic violence is a type of domestic violence in which an intimate partner attempts to oppress,restrict,or direct a female by exercising control over her financial resources.AIM To explore the impact of economic abuse on individual work performance and clarify the effective factors on financial exploitation among physicians and nurses.METHODS The study has a cross-sectional design,and 305 married,female physicians and nurses working in a university hospital were included.Data was collected with demographic characteristics forms,“Revised Scale of Economic Abuse”and“Individual Work Performance Questionnaire”.Pearson correlation,comparative analyses,and internal consistency reliability tests were used.RESULTS The average age was 39.04±9.41.Among the respondents 69.2%were nurses and 63.9%held a bachelor’s degree.The mean score for the Revised Scale of Economic Abuse was 2.80±4.73 while it was 3.86±0.60 for the Individual Work Performance Questionnaire.CONCLUSION Our study revealed no relationship between economic abuse and individual work performance,confirming that nurses are exposed to more economic abuse and exploitation than physicians and exhibit higher work performance.
基金Open Research Fund of Key Laboratory of Deep Earth Science and Engineering,Grant/Award Number:DESEYU202303Fundamental Research Funds for the Central Universities,Grant/Award Number:DUT24GJ205。
文摘The geothermal resources in hot dry rock(HDR)are considered the future trend in geothermal energy extraction due to their abundant reserves.However,exploitation of the resources is fraught with complexity and technical challenges arising from their unique characteristics of high temperature,high strength,and low permeability.With the continuous advancement of artificial intelligence(AI)technology,intelligent algorithms such as machine learning and evolutionary algorithms are gradually replacing or assisting traditional research methods,providing new solutions for HDR geothermal resource exploitation.This study first provides an overview of HDR geothermal resource exploitation technologies and AI methods.Then,the latest research progress is systematically reviewed in AI applications in HDR geothermal reservoir characterization,deep drilling,heat production,and operational parameter optimization.Additionally,this study discusses the potential limitations of AI methods in HDR geothermal resource exploitation and highlights the corresponding opportunities for AI's application.Notably,the study proposes the framework of an intelligent HDR exploitation system,offering a valuable reference for future research and practice.
文摘This paper introduces a novel optimization approach called Recuperated Seed Search Optimization(RSSO),designed to address challenges in solving mechanical engineering design problems.Many optimization techniques struggle with slow convergence and suboptimal solutions due to complex,nonlinear natures.The Sperm Swarm Optimization(SSO)algorithm,which mimics the sperm’s movement to reach an egg,is one such technique.To improve SSO,researchers combined it with three strategies:opposition-based learning(OBL),Cauchy mutation(CM),and position clamping.OBL introduces diversity to SSO by exploring opposite solutions,speeding up convergence.CM enhances both exploration and exploitation capabilities throughout the optimization process.This combined approach,RSSO,has been rigorously tested on standard benchmark functions,real-world engineering problems,and through statistical analysis(Wilcoxon test).The results demonstrate that RSSO significantly outperforms other optimization algorithms,achieving faster convergence and better solutions.The paper details the RSSO algorithm,discusses its implementation,and presents comparative results that validate its effectiveness in solving complex engineering design challenges.
文摘Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of gender-based violence.With definitions of economic violence broadening to encompass a range of coercive and manipulative behaviors-from financial abuse in domestic violence scenarios to the economic harassment faced by stay-at-home moms-understanding this form of exploitation is crucial for crafting effective interventions.This article aims to delve into various facets of economic violence,including its definition,prevalence,and the stark realities it creates for its victims.Following the search of international databases:Social Work Abstracts(EBSCO),Psychology Abstracts,Family and Women Studies Worldwide,Psychiatry Online,Psych INFO(including Psych ARTICLES),PubMed,Wiley,and Scopus,60 peer-reviewed articles that met all inclusion criteria were included in the paper.Our review clarifies that looking forward,the call for a comprehensive understanding of economic violence,enhanced legal frameworks,and the strengthening of supportive networks underscore the multidisciplinary approach required to combat this issue effectively.
文摘This study examined how exploitative leadership undermines employees’experience of flow with work role overload and traditionalist values.Data were collected from 361 staff members across diverse industries in China(females=58.17%,mean age=32.14,SD=5.83).Structural equation modeling results indicated that exploitative leadership reduces employees’work-related flow via increased role overload.Furthermore,employees’traditionality level moderates the exploitative leadership effects on role overload.Specifically,employees with higher traditionality reported lower role overload when experiencing exploitative leadership,suggesting that cultural values may buffer its negative impact.This study contributes to understanding the mechanism and contextual factors linking exploitative leadership to work-related flow,filling a gap in the literature.Organizations are encouraged to reduce exploitative leadership behaviors through leadership development programs and to consider employees’value orientations when designing work environments.
文摘Heuristic optimization algorithms have been widely used in solving complex optimization problems in various fields such as engineering,economics,and computer science.These algorithms are designed to find high-quality solutions efficiently by balancing exploration of the search space and exploitation of promising solutions.While heuristic optimization algorithms vary in their specific details,they often exhibit common patterns that are essential to their effectiveness.This paper aims to analyze and explore common patterns in heuristic optimization algorithms.Through a comprehensive review of the literature,we identify the patterns that are commonly observed in these algorithms,including initialization,local search,diversity maintenance,adaptation,and stochasticity.For each pattern,we describe the motivation behind it,its implementation,and its impact on the search process.To demonstrate the utility of our analysis,we identify these patterns in multiple heuristic optimization algorithms.For each case study,we analyze how the patterns are implemented in the algorithm and how they contribute to its performance.Through these case studies,we show how our analysis can be used to understand the behavior of heuristic optimization algorithms and guide the design of new algorithms.Our analysis reveals that patterns in heuristic optimization algorithms are essential to their effectiveness.By understanding and incorporating these patterns into the design of new algorithms,researchers can develop more efficient and effective optimization algorithms.
基金supported by Youth Foundation of Beijing Wuzi University(Grant No.2024XJQN26).
文摘Drawing upon the Conservation of Resources theory,this study investigated the relationship between proactive personality and strengths use,as well as the mediating role of psychological safety and the moderating role of exploitative leadership within this relationship.Data were collected from 368 employees(females=57.61%;mean age=32.35;SD=6.31)working in various organizations in China at two points in time with a two-week interval.We conducted structural equation modeling and a moderated mediation path analysis to test our hypotheses.The results demonstrated that proactive personality is positively related to strengths use and psychological safety partially mediates the association of proactive personality and strengths use.Furthermore,this study also found that exploitative leadership weakens the direct relationship between proactive personality and psychological safety and the indirect relationship of proactive personality with strengths use through psychological safety.This study identified the underlying mechanisms between proactive personality and strengths use.
基金supported by the National Natural Science Foundation of China(Nos.52192625,52174082,and U22A20166)Guangdong Basic and Applied Basic Research Foundation(No.2025B1515020039)+3 种基金National Key Research and Development Program(No.2023YFF0723200)Shenzhen Science and Technology Program(No.RCYX20221008092903013)the Program for Guangdong Introducing Innovative and Entrepreneurial Teams(No.2019ZT08G315)the Natural Science Foundation of Chongqing(No.CSTB2022NSCQ-MSX1593).
文摘The permeability of rocks is of utmost importance in the exploitation of deep geological resources.Current characterizations of rock permeability typically consider the influence of either pores or fractures alone.However,deep reservoir rock formations are subjected to complex environments with coupling of high temperature and stress.As a result,deep reservoir rocks possess a complex structure comprising of pores and fractures,making it challenging to understand their impact on permeability.Comprehending this relationship is vital for the secure and efficient exploitation of deep geological resources.This study presents a permeability calculation model that enables simultaneously quantify the impacts of pore and fracture with full feature size.The model independently considers large-scale fractures’fractal properties and tortuosity while also addressing the distribution and size of small-scale pores.A tortuosity expression that incorporates the effects of thermal damage has been developed using the pore geometric elasticity method.Considering the distinct contributions of pores and fractures to rock permeability,a comprehensive rock permeability calculation model is established.This model has two main strengths:it thoroughly characterizes the influence of pore structures on permeability at multiple scales and precisely details how fractal attributes of fractures affect permeability.To validate the applicability of the model,this study conducted seepage experiments and microscopic observations,capturing the variations in permeability under thermo-mechanical coupling,while quantifying the geometric characteristics and spatial distribution of pores and fractures within the rock.By comparing the measured permeability results,the theoretical values demonstrated a commendable fit.In comparison to previous models,this innovative approach more accurately captures various flow characteristics of the rock under the influence of thermo-mechanical coupling.
基金The authors are grateful for the financial support from the National Natural Science Foundation of China(Grant Nos.52225904 and 52039007)the Natural Science Foundation of Sichuan Province(Grant No.2023NSFSC0377)supported by the New Cornerstone Science Foundation through the XPLORER PRIZE.
文摘Exploring dynamic mechanical responses and failure behaviors of hot dry rock(HDR)is significant for geothermal exploitation and stability assessment.In this study,via the split Hopkinson pressure bar(SHPB)system,a series of dynamic compression tests were conducted on granite treated by cyclic thermal shocks at different temperatures.We analyzed the effects of cyclic thermal shock on the thermal-related physical and dynamic mechanical behaviors of granite.Specifically,the P-wave velocity,dynamic strength,and elastic modulus of the tested granite decrease with increasing temperature and cycle number,while porosity and peak strain increase.The degradation law of dynamic mechanical properties could be described by a cubic polynomial.Cyclic thermal shock promotes shear cracks propagation,causing dynamic failure mode of granite to transition from splitting to tensile-shear composite failure,accompanied by surface spalling and debris splashing.Moreover,the thermal shock damage evolution and coupled failure mechanism of tested granite are discussed.The evolution of thermal shock damage with thermal shock cycle numbers shows an obvious S-shaped surface,featured by an exponential correlation with dynamic mechanical parameters.In addition,with increasing thermal shock temperature and cycles,granite mineral species barely change,but the length and width of thermal cracks increase significantly.The non-uniform expansion of minerals,thermal shock-induced cracking,and water-rock interaction are primary factors for deteriorating dynamic mechanical properties of granite under cyclic thermal shock.
基金the Science and Technology Innovation 2030-"New Generation Artificial Intelligence"Major Project(No.2018AAA0100901)。
文摘In repeated zero-sum games,instead of constantly playing an equilibrium strategy of the stage game,learning to exploit the opponent given historical interactions could typically obtain a higher utility.However,when playing against a fully adaptive opponent,one would have dificulty identifying the opponent's adaptive dynamics and further exploiting its potential weakness.In this paper,we study the problem of optimizing against the adaptive opponent who uses no-regret learning.No-regret learning is a classic and widely-used branch of adaptive learning algorithms.We propose a general framework for online modeling no-regret opponents and exploiting their weakness.With this framework,one could approximate the opponent's no-regret learning dynamics and then develop a response plan to obtain a significant profit based on the inferences of the opponent's strategies.We employ two system identification architectures,including the recurrent neural network(RNN)and the nonlinear autoregressive exogenous model,and adopt an efficient greedy response plan within the framework.Theoretically,we prove the approximation capability of our RNN architecture at approximating specific no-regret dynamics.Empirically,we demonstrate that during interactions at a low level of non-stationarity,our architectures could approximate the dynamics with a low error,and the derived policies could exploit the no-regret opponent to obtain a decent utility.
文摘This study employs experimental and analytical methods to quantitatively investigate the nonlinear geomechanical and physicochemical processes of multiphase and high-stress coal-bearing rock masses and non-equilibrium geological materials,as well as their interactions.The research encompasses following aspects,i.e.1)the relationship between volatile matter yield,geological age,and distance from magmatic deposits in Kuzbass coalfield;2)the impact of physicochemical property bifurcations on coal and gas outbursts;3)the variation law of coalbed methane content with burial depth;4)the relaxation energy of gas content;5)the specific surface area of coal;6)the relationship between heat release and deformation waves of Kuzbass coal samples of different orders under uniaxial compression;7)the gas outbursts in different mines in Kuzbass;8)the relationship between seismic energy and gas outburst concentration in coal mines;9)the influence of piston mechanism;10)the connection operation between Langmuir equation and Oparin equation;and 11)the equation of motion for structural media.The research results have created a prerequisite for establishing a unified theory of the interaction between nonlinear geomechanics and physicochemical processes in rock masses,which is of great significance for the safe development and utilization of underground resources.
基金funded by the Fundamental Research Funds for the Central Universities(No.XJ2025001701)。
文摘As mining depth increases,the temperature of the surrounding rock rises,drawing global attention to the potential for geothermal energy extraction from high-temperature water stored in collapsed rock masses-a prospect that offers both promise and challenges.In response,this study proposes a functional backfilling method using mining solid waste to construct a high-porosity heat extraction space.The research integrates experiments,theoretical analysis,and simulations to examine the mechanical and permeability properties of solid waste backfill materials.It further aims to elucidate how flow velocity and initial temperature influence the evolution of the temperature field and the thermal performance.Results indicate that the backfill material achieves optimal mechanical strength with a glass fiber content of 10‰ and a length of 6 mm.Furthermore,the permeability of the solid waste backfill demonstrates a quadratic relationship with both axial and confining pressure.During the recovery stage,the temperature in the heat extraction space remains lower than that of the surrounding rock,with geothermal energy being extracted via convective heat transfer between the water medium and the rock.The amount of heat extracted shows a positive correlation with the flow velocity of the water medium and a negative correlation with its initial temperature.
基金Supported by National Key Project of Scientific and Technical Supporting Programs Funded by Ministry of Science&Technology(2006BAD26B0902)National Program on Key Basic Research Project(973program)(2006CB705809)+2 种基金Knowledge Innovation Program of the Chinese Academy of Sciences(KSCX-YW-09)Program of Soft Sciences from China Meteorological Administration(QR2008-39)Scientific Re-search Fund of Nanjing University of Information Science and Technology(20070105)~~
文摘This research was to introduce the characteristics of and countermeasures for ecological compensation. From the analysis of the current situation of ecological compensation, a series of characteristics of ecological compensation in resource exploitation and economic development were elaborated. The principles and practical issues are complex in ecological compensation, and the corresponding object, entity, financial system of ecological compensation are the keys to set up compensation mechanism, and studying of ecosystem service function and ecological footprint calculation are important ways to quantitatively assess ecological compensation, and are also important foundations for establishing calculation system of green GDP. Advocating the benefit compensation mechanism of ecological economy and enclosing ecological compensation principle are important ways for establishing the new environmental management pattern and manifesting social justice and the ecological civilization ideas. This research proposed some views of and approaches to ecological compensation mechanism for constructing natural resource development and utilization.The establishment of ecological compensation is an important approach to prevent the imbalance of resource allocation, the system guarantee for sustainable development, and the important basis of saving resources.
基金Supported by the Planned Project for the Innovation and Entrepreneurship Training of College Students in China~~
文摘The insect is the animal protein feed resource potential, the rapid repro- duction, large quantity, high protein content, and most species of insects can be used as livestock feed utilization, development of insect as feed resources, to pro- mote the development of China's animal husbandry and feed industry, has important significance.
文摘There are several security metrics developed to protect the computer networks. In general, common security metrics focus on qualitative and subjective aspects of networks lacking formal statistical models. In the present study, we propose a stochastic model to quantify the risk associated with the overall network using Markovian process in conjunction with Common Vulnerability Scoring System (CVSS) framework. The model we developed uses host access graph to represent the network environment. Utilizing the developed model, one can filter the large amount of information available by making a priority list of vulnerable nodes existing in the network. Once a priority list is prepared, network administrators can make software patch decisions. Gaining in depth understanding of the risk and priority level of each host helps individuals to implement decisions like deployment of security products and to design network topologies.