The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins...The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks.展开更多
To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta c...To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta concept model of the C4ISR architecture is introduced.According to the meta concept model,we construct the executable meta models of the C4ISR architecture by extending the meta models of fUML.Then,we define the concrete syntax and executable activity algebra(EAA)semantics for executable models.The semantics functions are introduced to translating the syntax description of executable models into the item of EAA.To support the execution of models,we propose the executable rules which are the structural operational semantics of EAA.Finally,an area air defense of the C4ISR system is used to illustrate the feasibility of the approach.展开更多
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some trad...An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments.展开更多
As the scale of current systems become larger and larger and their complexity is increasing gradually,research on executable models in the design phase becomes significantly important as it is helpful to simulate the ...As the scale of current systems become larger and larger and their complexity is increasing gradually,research on executable models in the design phase becomes significantly important as it is helpful to simulate the execution process and capture defects of a system in advance.Meanwhile,the capability of a system becomes so important that stakeholders tend to emphasize their capability requirements when developing a system.To deal with the lack of official specifications and the fundamental theory basis for capability requirement,we propose a cooperative capability requirements(CCR)meta-model as a theory basis for researchers to refer to in this research domain,in which we provide detailed definition of the CCR concepts,associations and rules.Moreover,we also propose an executable framework,which may enable modelers to simulate the execution process of a system in advance and do well in filling the inconsistency and semantic gaps between stakeholders’requirements and their models.The primary working mechanism of the framework is to transform the Alf activity meta-model into the communicating sequential process(CSP)process meta-model based on some mapping rules,after which the internal communication mechanism between process nodes is designed to smooth the execution of behaviors in a CSP system.Moreover,a validation method is utilized to check the correctness and consistency of the models,and a self-fixing mechanism is used to fix the errors and warnings captured during the validation process automatically.Finally,a validation report is generated and fed back to the modelers for system optimization.展开更多
One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious...One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious files.In this study,an exclusive set of 29 features was collected from trusted implementations,this set was used as a baseline to analyze the presented work in this research.A Decision Tree(DT)and Neural Network Multi-Layer Perceptron(NN-MLPC)algorithms were utilized during this work.Both algorithms were chosen after testing a few diverse procedures.This work implements a method of subgrouping features to answer questions such as,which feature has a positive impact on accuracy when added?Is it possible to determine a reliable feature set to distinguish a malicious PE file from a benign one?when combining features,would it have any effect on malware detection accuracy in a PE file?Results obtained using the proposed method were improved and carried few observations.Generally,the obtained results had practical and numerical parts,for the practical part,the number of features and which features included are the main factors impacting the calculated accuracy,also,the combination of features is as crucial in these calculations.Numerical results included,finding accuracies with enhanced values,for example,NN_MLPC attained 0.979 and 0.98;for DT an accuracy of 0.9825 and 0.986 was attained.展开更多
Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on systems.One of the major challenges in tackling this problem is the c...Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on systems.One of the major challenges in tackling this problem is the complexity of malware analysis,which requires expertise from human analysts.Recent developments in machine learning have led to the creation of deep models for malware detection.However,these models often lack transparency,making it difficult to understand the reasoning behind the model’s decisions,otherwise known as the black-box problem.To address these limitations,this paper presents a novel model for malware detection,utilizing vision transformers to analyze the Operation Code(OpCode)sequences of more than 350000 Windows portable executable malware samples from real-world datasets.The model achieves a high accuracy of 0.9864,not only surpassing the previous results but also providing valuable insights into the reasoning behind the classification.Our model is able to pinpoint specific instructions that lead to malicious behavior in malware samples,aiding human experts in their analysis and driving further advancements in the field.We report our findings and show how causality can be established between malicious code and actual classification by a deep learning model,thus opening up this black-box problem for deeper analysis.展开更多
The growing threat of malware,particularly in the Portable Executable(PE)format,demands more effective methods for detection and classification.Machine learning-based approaches exhibit their potential but often negle...The growing threat of malware,particularly in the Portable Executable(PE)format,demands more effective methods for detection and classification.Machine learning-based approaches exhibit their potential but often neglect semantic segmentation of malware files that can improve classification performance.This research applies deep learning to malware detection,using Convolutional Neural Network(CNN)architectures adapted to work with semantically extracted data to classify malware into malware families.Starting from the Malconv model,this study introduces modifications to adapt it to multi-classification tasks and improve its performance.It proposes a new innovative method that focuses on byte extraction from Portable Executable(PE)malware files based on their semantic location,resulting in higher accuracy in malware classification than traditional methods using full-byte sequences.This novel approach evaluates the importance of each semantic segment to improve classification accuracy.The results revealed that the header segment of PE files provides the most valuable information for malware identification,outperforming the other sections,and achieving an average classification accuracy of 99.54%.The above reaffirms the effectiveness of the semantic segmentation approach and highlights the critical role header data plays in improving malware detection and classification accuracy.展开更多
BACKGROUND Treatment-resistant depression(TRD)has a poor response to clinical treatment.Patients with TRD do not respond adequately to standard antidepressants.Even after receiving a full dose and sufficient duration ...BACKGROUND Treatment-resistant depression(TRD)has a poor response to clinical treatment.Patients with TRD do not respond adequately to standard antidepressants.Even after receiving a full dose and sufficient duration of combined antidepressant therapy,significant improvement is still difficult to achieve.At present,electroconvulsive therapy(ECT)remains a clinically effective method for treating refractory depression.A good anesthesia regimen can enhance its clinical efficacy.Actively exploring high-quality anesthesia regimens has become a current research hotspot.AIM To explore the effect of esketamine and etomidate anesthesia on the clinical efficacy of ECT for TRD.METHODS A total of 120 patients with TRD,treated at the Department of Psychiatry,The Second Affiliated Hospital of Shandong First Medical University,China between April 2020 and April 2024,were selected for the study.The patients were allocated at random into two groups using a random number table:The combination and control groups,with 60 patients in each group.Both groups underwent ECT;the combination group received esketamine and etomidate anesthesia,while the control group received etomidate anesthesia.The following parameters were compared between the two groups:Heart rate(HR);mean arterial pressure(MAP);peripheral capillary oxygen saturation(SpO2);initial and final threshold charges;and serum brain-derived neurotrophic factor(BDNF),nerve growth factor(NGF),5-hydroxytryptamine(5-HT),and interleukin-4(IL-4)levels.Neurological functions,basic executive function scores,and adverse reactions were compared during the treatment process.RESULTS During treatment,the maximum and minimum HR and MAP values in the combination group were markedly lower than those in the control group(P<0.05),whereas there was no significant difference in SpO2 between the two groups(P>0.05).During the treatment,there were no significant differences in the initial threshold charge and average duration of seizures during ECT between the two groups(P>0.05).However,the final threshold charge and total charge in the combination group were considerably lower than those in the control group(P<0.05).After treatment,the BDNF,NGF,5-HT,and IL-4 levels were evidently higher in the combination group than in the control group(P<0.05).During treatment,as the number of ECT sessions increased,both BRNAS and Measurement and Treatment Research to Improve Cognition in Schizophrenia Consensus Cognitive Battery(MCCB)scores increased,whereas Hamilton Depression Rating Scale(HAMD)-24 scores decreased in both groups.Starting from the third treatment session,the BRNAS and MCCB scores in the combination group were higher than in the control group,whereas the Hamilton Depression Scale-24 score was lower in the combination group than in the control group(P<0.05).After treatment,the Wisconsin Card Sorting Test scores and Tower of Hanoi test results in the combination group were significantly better than those in the control group(P<0.05).The occurrence of adverse reactions was compared between the two groups(P>0.05).CONCLUSION Esketamine and etomidate anesthesia during ECT for patients with TRD helps maintain stable vital signs during the treatment process,improves depressive symptoms,and enhances neurological and basic executive functions.展开更多
Purpose:Currently,different research conclusions exist about the relationship between relational capital and corporate innovation.The research aims to(1)reveal the actual relationship between executive alumni relation...Purpose:Currently,different research conclusions exist about the relationship between relational capital and corporate innovation.The research aims to(1)reveal the actual relationship between executive alumni relations and firm innovation performance,(2)examine the moderating role of executive academic backgrounds,(3)analyze the paths for firms to leverage knowledge spillovers from regional universities to promote firm innovation by their geographic location.Design/methodology/approach:A social network approach is used to construct alumni relationship networks of A-share listed companies in Shanghai and Shenzhen,China.A two-way fixed effects model is used to assess the impact of firms’structural position in executive alumni networks on firms’innovation performance.In addition,the research also delves into the interactions between knowledge spillovers from geographic locations and executives’alumni networks,aiming to elucidate their combined effects on firms’innovation performance.Findings:This paper explores the curvilinear relationship between executive alumni networks’centrality and firm innovation within the Chinese context.It also finds that in the positive effect interval on the right side of the“U-shaped,”the industry with the highest number of occurrences is the high-tech industry.Moreover,it elucidates the moderating influence of executives’academic experience on the alumni networks-innovation nexus,offering a nuanced understanding of these dynamics.Lastly,we provide novel insights into optimizing resource allocation to leverage geographic knowledge spillovers for innovation.Research limitations:The study may not fully represent the broader population of firms,particularly small and medium-sized enterprises(SMEs)or unlisted companies.Future research could expand the sample to include a more diverse range of firms to enhance the generalizability of the findings.Practical implications:Firstly,companies can give due consideration to the alumni resources of executives in their personnel decisions,but they should pay attention to the rational use of resources.Secondly,universities should actively work with companies to promote knowledge transfer and collaboration.Originality/value:The findings help clarify the influence mechanism of firms’innovation performance,providing theoretical support and empirical evidence for firms to drive innovation at the executive alumni relationship network level.展开更多
Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques inef...Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments.展开更多
Introduction: Stroke may have a negative impact on mental health and behavior. Cognitive disorders are common after stroke. They are rarely assessed in current clinical practice, particularly in our context. They cons...Introduction: Stroke may have a negative impact on mental health and behavior. Cognitive disorders are common after stroke. They are rarely assessed in current clinical practice, particularly in our context. They constitute a real “invisible” handicap. In sub-Saharan Africa, we are not aware of any studies specifically assessing executive functions. These functions are at the heart of all adaptation processes to new or complex situations. This prompted the authors to carry out this study at the Ibrahima Pierre Ndiaye Neuroscience Department of the Fann National University Hospital Centre (Senegal). Objective and Methodology: The aim of this study was to assess and characterize post-stroke alterations in executive functions in our context. We conducted a descriptive cross-sectional study. It took place over a 4-month period from April 1 to August 31, 2021. Patients were matched to controls according to age, gender and educational level. Executive functions were assessed using the Frontal Assessment Battery (FAB). Results: A total of 30 patients with stroke were enrolled. These patients were matched to controls. The mean age of the patients was 46.87 ± 17.65 years. For the control group, it was 39.27 ± 12.33 years. The prevalence of executive function disorders was 20% in post-stroke patients. The majority of executive functions assessed were impaired. Sensitivity to interference and environmental autonomy were the only ones preserved. Conclusion: Impaired executive functions are common after stroke. They should be systematically assessed in all stroke patients to ensure optimal management.展开更多
Compliance,as a very important aspect of corporate governance,has developed earlier in the world,while China's compliance management has developed relatively late and is currently lacking in development.However,ma...Compliance,as a very important aspect of corporate governance,has developed earlier in the world,while China's compliance management has developed relatively late and is currently lacking in development.However,many enterprises suffer serious losses without compliance management,especially import and export enterprises,which are forced to exit the market due to poor compliance management.This article is based on the urgent need of Chinese enterprises for compliance management,but the lack of research by scholars.It summarizes the literature on the factors affecting compliance,hoping to be helpful for the study of compliance management.展开更多
As digital technology grows,it will improve accessibility to justice and legal protection for the differently abled and promote social justice.THE rapid development of digital technology is not only changing tradition...As digital technology grows,it will improve accessibility to justice and legal protection for the differently abled and promote social justice.THE rapid development of digital technology is not only changing traditional working modes but also profoundly impacting the application of laws,evidence collection,trial process,and execution.Digital technologies can remedy many shortcomings in traditional judicial procedures,better protecting the legitimate rights and interests of people,especially people with disabilities.展开更多
Management innovation is a key driver of total factor productivity and plays a crucial role in developing new quality productive forces.As China’s capital market continues to develop,the prevalence of common ownershi...Management innovation is a key driver of total factor productivity and plays a crucial role in developing new quality productive forces.As China’s capital market continues to develop,the prevalence of common ownership—investors who hold significant stakes in multiple firms—has grown,raising the question of how it influences corporate management innovation.This study empirically investigates this issue using panel data from A-share listed companies in China between 2014 and 2022.The findings reveal an inverted U-shaped relationship between common ownership and management innovation.Specifically,institutional common ownership exerts no significant effect,while non-institutional common ownership exhibits a significant inverted U-shaped influence.Mechanism analysis suggests that common ownership often appoints shared directors,supervisors,and senior executives across firms,which in turn significantly impacts corporate management innovation.Further analysis indicates that common ownership in the primary and tertiary industries significantly influences management innovation,whereas that in the secondary industry does not show such an effect.This study offers valuable insights for corporate governance,business management,and investor decision-making and provides important references for policymakers in formulating governance-related regulations.展开更多
BACKGROUND Physical activity(PA)is a key contributor to the neurocognitive and psychological development of children and adolescents.With the rapid integration of digital technologies in educational and recreational c...BACKGROUND Physical activity(PA)is a key contributor to the neurocognitive and psychological development of children and adolescents.With the rapid integration of digital technologies in educational and recreational contexts,technology-enhanced PA(TEPA)interventions have emerged as promising tools for promoting mental and cognitive health.However,the effectiveness of various TEPA modalities—such as virtual reality(VR),mobile applications,and biofeedback systems—remains unclear.Prior findings are fragmented across systematic reviews with inconsistent methodologies.This umbrella review was conducted to synthesize current evidence and evaluate whether specific TEPA modalities yield differential benefits.We hypothesized that TEPA interventions with immersive and selfregulatory features provide greater enhancements in executive function(EF),cognitive function(CF),and mental health(MH)than passive or minimally interactive formats.AIM To determine the effects of TEPA interventions and modality-specific characteristics on EF,CF,and MH outcomes in children and adolescents.METHODS An umbrella review of systematic reviews and meta-analyses was conducted in accordance with Preferred Reporting Items for Systematic Reviews and Meta-Analyses 2020 guidelines.Five databases(PubMed,Web of Science,EMBASE,EBSCOhost,and Cochrane Library)were searched up to March 2025.Eligible reviews included participants aged≤18 years,assessed TEPA interventions,and reported EF,CF,or MH outcomes.Methodological quality was assessed using A Measurement Tool to Assess Systematic Reviews 2.Data synthesis was stratified by intervention modality,and heterogeneity was evaluated using the I^(2)statistic.RESULTS A total of 11 systematic reviews and meta-analyses were included.Interventions using VR(2/2),game-based formats(2/2),biofeedback(2/2),and multicomponent programs(1/1)showed consistent evidence of improvements in EF and MH(e.g.,EF:6.92±3.86 vs 3.61±1.67,P<0.001).App-based interventions(3/3)demonstrated mixed or modest effects,while augmented reality-based formats showed limited efficacy.MH outcomes were most frequently improved(9/11 reviews),followed by EF(6/11 reviews)and CF(5/11 reviews).Heterogeneity ranged from moderate to high(I^(2)=42%-78%)across modalities.CONCLUSION TEPA significantly improves MH and selectively enhances executive and CF in youth.Immersive,interactive,and biofeedback-driven modalities are particularly effective.展开更多
In January 2025,the United States issued executive orders that could potentially curtail lesbian,gay,bisexual,transgender,queer,and other sexual and gender minorities(LGBTQ+)rights and federal aid to developing countr...In January 2025,the United States issued executive orders that could potentially curtail lesbian,gay,bisexual,transgender,queer,and other sexual and gender minorities(LGBTQ+)rights and federal aid to developing countries,such as public health programs under the United States Agency for International Development(USAID)[1,2].In the Philippines,USAID has played an important role in funding and supporting initiatives to address the country’s local HIV epidemic[2,3].展开更多
This longitudinal study examined the association between parental autonomy support and school-aged children’s adjustment across four major domains of school functioning,as well as the mediating role of children’s ex...This longitudinal study examined the association between parental autonomy support and school-aged children’s adjustment across four major domains of school functioning,as well as the mediating role of children’s executive function.Participants were 476 school-aged children(girl:49.2%,M_(age)=10.49 years,SD=1.32 years),who completed the Psychological Autonomy Support Scale,the Behavior Rating Inventory of Executive Function–2,and the Primary School Students’Psychological Suzhi Scale at baseline and at two subsequent follow-up assessments.Results from unconditional latent growth curve models and structural equation modeling indicated that paternal autonomy support was a significant predictor of children’s adjustment across all four school domains.In contrast,maternal autonomy support was significantly associated only with interpersonal adjustment.Both the intercept(initial level)and slope(rate of change)of children’s executive function significantly predicted their adjustment in all four domains.Notably,the initial level of executive function fully mediated the association between paternal autonomy support and school adjustment,whereas the rate of change in executive function did not serve as a significant mediator.Thesefindings underscore the importance of promoting parental autonomy-supportive behaviors-particularly among fathers-as a means to enhance children’s executive functioning and,consequently,their school adjustment.展开更多
Helio da Silva,a retired business executive from Brazil,single⁃handedly planted over 41,000 trees in his hometown of Sao Paulo over the last two decades.Flying over the Brazilian metropolis of Sao Paulo,it's tough...Helio da Silva,a retired business executive from Brazil,single⁃handedly planted over 41,000 trees in his hometown of Sao Paulo over the last two decades.Flying over the Brazilian metropolis of Sao Paulo,it's tough to miss the 3.2-kilometer⁃long and 100⁃meter⁃wide green strip of trees wedged between two of the city's busiest roads.展开更多
文摘The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks.
文摘To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta concept model of the C4ISR architecture is introduced.According to the meta concept model,we construct the executable meta models of the C4ISR architecture by extending the meta models of fUML.Then,we define the concrete syntax and executable activity algebra(EAA)semantics for executable models.The semantics functions are introduced to translating the syntax description of executable models into the item of EAA.To support the execution of models,we propose the executable rules which are the structural operational semantics of EAA.Finally,an area air defense of the C4ISR system is used to illustrate the feasibility of the approach.
基金supported by the Applied Basic Research Programs of Sichuan Province under Grant No. 2010JY0001the Fundamental Research Funds for the Central Universities under Grant No. ZYGX2010J068
文摘An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments.
基金supported by the National Key R&D Program of China(2018YFC0806900)the China Postdoctoral Science Foundation Funded Project(2018M633757)+1 种基金the Primary Research&Development Plan of Jiangsu Province(BE2016904,BE2017616,BE2018754,BE2019762)Jiangsu Province Postdoctoral Science Foundation Funded Project(2019K185).
文摘As the scale of current systems become larger and larger and their complexity is increasing gradually,research on executable models in the design phase becomes significantly important as it is helpful to simulate the execution process and capture defects of a system in advance.Meanwhile,the capability of a system becomes so important that stakeholders tend to emphasize their capability requirements when developing a system.To deal with the lack of official specifications and the fundamental theory basis for capability requirement,we propose a cooperative capability requirements(CCR)meta-model as a theory basis for researchers to refer to in this research domain,in which we provide detailed definition of the CCR concepts,associations and rules.Moreover,we also propose an executable framework,which may enable modelers to simulate the execution process of a system in advance and do well in filling the inconsistency and semantic gaps between stakeholders’requirements and their models.The primary working mechanism of the framework is to transform the Alf activity meta-model into the communicating sequential process(CSP)process meta-model based on some mapping rules,after which the internal communication mechanism between process nodes is designed to smooth the execution of behaviors in a CSP system.Moreover,a validation method is utilized to check the correctness and consistency of the models,and a self-fixing mechanism is used to fix the errors and warnings captured during the validation process automatically.Finally,a validation report is generated and fed back to the modelers for system optimization.
文摘One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious files.In this study,an exclusive set of 29 features was collected from trusted implementations,this set was used as a baseline to analyze the presented work in this research.A Decision Tree(DT)and Neural Network Multi-Layer Perceptron(NN-MLPC)algorithms were utilized during this work.Both algorithms were chosen after testing a few diverse procedures.This work implements a method of subgrouping features to answer questions such as,which feature has a positive impact on accuracy when added?Is it possible to determine a reliable feature set to distinguish a malicious PE file from a benign one?when combining features,would it have any effect on malware detection accuracy in a PE file?Results obtained using the proposed method were improved and carried few observations.Generally,the obtained results had practical and numerical parts,for the practical part,the number of features and which features included are the main factors impacting the calculated accuracy,also,the combination of features is as crucial in these calculations.Numerical results included,finding accuracies with enhanced values,for example,NN_MLPC attained 0.979 and 0.98;for DT an accuracy of 0.9825 and 0.986 was attained.
文摘Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on systems.One of the major challenges in tackling this problem is the complexity of malware analysis,which requires expertise from human analysts.Recent developments in machine learning have led to the creation of deep models for malware detection.However,these models often lack transparency,making it difficult to understand the reasoning behind the model’s decisions,otherwise known as the black-box problem.To address these limitations,this paper presents a novel model for malware detection,utilizing vision transformers to analyze the Operation Code(OpCode)sequences of more than 350000 Windows portable executable malware samples from real-world datasets.The model achieves a high accuracy of 0.9864,not only surpassing the previous results but also providing valuable insights into the reasoning behind the classification.Our model is able to pinpoint specific instructions that lead to malicious behavior in malware samples,aiding human experts in their analysis and driving further advancements in the field.We report our findings and show how causality can be established between malicious code and actual classification by a deep learning model,thus opening up this black-box problem for deeper analysis.
文摘The growing threat of malware,particularly in the Portable Executable(PE)format,demands more effective methods for detection and classification.Machine learning-based approaches exhibit their potential but often neglect semantic segmentation of malware files that can improve classification performance.This research applies deep learning to malware detection,using Convolutional Neural Network(CNN)architectures adapted to work with semantically extracted data to classify malware into malware families.Starting from the Malconv model,this study introduces modifications to adapt it to multi-classification tasks and improve its performance.It proposes a new innovative method that focuses on byte extraction from Portable Executable(PE)malware files based on their semantic location,resulting in higher accuracy in malware classification than traditional methods using full-byte sequences.This novel approach evaluates the importance of each semantic segment to improve classification accuracy.The results revealed that the header segment of PE files provides the most valuable information for malware identification,outperforming the other sections,and achieving an average classification accuracy of 99.54%.The above reaffirms the effectiveness of the semantic segmentation approach and highlights the critical role header data plays in improving malware detection and classification accuracy.
文摘BACKGROUND Treatment-resistant depression(TRD)has a poor response to clinical treatment.Patients with TRD do not respond adequately to standard antidepressants.Even after receiving a full dose and sufficient duration of combined antidepressant therapy,significant improvement is still difficult to achieve.At present,electroconvulsive therapy(ECT)remains a clinically effective method for treating refractory depression.A good anesthesia regimen can enhance its clinical efficacy.Actively exploring high-quality anesthesia regimens has become a current research hotspot.AIM To explore the effect of esketamine and etomidate anesthesia on the clinical efficacy of ECT for TRD.METHODS A total of 120 patients with TRD,treated at the Department of Psychiatry,The Second Affiliated Hospital of Shandong First Medical University,China between April 2020 and April 2024,were selected for the study.The patients were allocated at random into two groups using a random number table:The combination and control groups,with 60 patients in each group.Both groups underwent ECT;the combination group received esketamine and etomidate anesthesia,while the control group received etomidate anesthesia.The following parameters were compared between the two groups:Heart rate(HR);mean arterial pressure(MAP);peripheral capillary oxygen saturation(SpO2);initial and final threshold charges;and serum brain-derived neurotrophic factor(BDNF),nerve growth factor(NGF),5-hydroxytryptamine(5-HT),and interleukin-4(IL-4)levels.Neurological functions,basic executive function scores,and adverse reactions were compared during the treatment process.RESULTS During treatment,the maximum and minimum HR and MAP values in the combination group were markedly lower than those in the control group(P<0.05),whereas there was no significant difference in SpO2 between the two groups(P>0.05).During the treatment,there were no significant differences in the initial threshold charge and average duration of seizures during ECT between the two groups(P>0.05).However,the final threshold charge and total charge in the combination group were considerably lower than those in the control group(P<0.05).After treatment,the BDNF,NGF,5-HT,and IL-4 levels were evidently higher in the combination group than in the control group(P<0.05).During treatment,as the number of ECT sessions increased,both BRNAS and Measurement and Treatment Research to Improve Cognition in Schizophrenia Consensus Cognitive Battery(MCCB)scores increased,whereas Hamilton Depression Rating Scale(HAMD)-24 scores decreased in both groups.Starting from the third treatment session,the BRNAS and MCCB scores in the combination group were higher than in the control group,whereas the Hamilton Depression Scale-24 score was lower in the combination group than in the control group(P<0.05).After treatment,the Wisconsin Card Sorting Test scores and Tower of Hanoi test results in the combination group were significantly better than those in the control group(P<0.05).The occurrence of adverse reactions was compared between the two groups(P>0.05).CONCLUSION Esketamine and etomidate anesthesia during ECT for patients with TRD helps maintain stable vital signs during the treatment process,improves depressive symptoms,and enhances neurological and basic executive functions.
基金supported in part by the National Natural Science Foundation of China under Grant No.72264036,in part by the West Light Foundation of The Chinese Academy of Sciences under Grant No.2020-XBQNXZ-020Xinjiang University of Finance and Economics Postgraduate Innovation Project XJUFE2024K036.
文摘Purpose:Currently,different research conclusions exist about the relationship between relational capital and corporate innovation.The research aims to(1)reveal the actual relationship between executive alumni relations and firm innovation performance,(2)examine the moderating role of executive academic backgrounds,(3)analyze the paths for firms to leverage knowledge spillovers from regional universities to promote firm innovation by their geographic location.Design/methodology/approach:A social network approach is used to construct alumni relationship networks of A-share listed companies in Shanghai and Shenzhen,China.A two-way fixed effects model is used to assess the impact of firms’structural position in executive alumni networks on firms’innovation performance.In addition,the research also delves into the interactions between knowledge spillovers from geographic locations and executives’alumni networks,aiming to elucidate their combined effects on firms’innovation performance.Findings:This paper explores the curvilinear relationship between executive alumni networks’centrality and firm innovation within the Chinese context.It also finds that in the positive effect interval on the right side of the“U-shaped,”the industry with the highest number of occurrences is the high-tech industry.Moreover,it elucidates the moderating influence of executives’academic experience on the alumni networks-innovation nexus,offering a nuanced understanding of these dynamics.Lastly,we provide novel insights into optimizing resource allocation to leverage geographic knowledge spillovers for innovation.Research limitations:The study may not fully represent the broader population of firms,particularly small and medium-sized enterprises(SMEs)or unlisted companies.Future research could expand the sample to include a more diverse range of firms to enhance the generalizability of the findings.Practical implications:Firstly,companies can give due consideration to the alumni resources of executives in their personnel decisions,but they should pay attention to the rational use of resources.Secondly,universities should actively work with companies to promote knowledge transfer and collaboration.Originality/value:The findings help clarify the influence mechanism of firms’innovation performance,providing theoretical support and empirical evidence for firms to drive innovation at the executive alumni relationship network level.
基金funded by the Science and Technology Project of State Grid Jiangsu Electric Power Company Ltd.,grant number J2024169.
文摘Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments.
文摘Introduction: Stroke may have a negative impact on mental health and behavior. Cognitive disorders are common after stroke. They are rarely assessed in current clinical practice, particularly in our context. They constitute a real “invisible” handicap. In sub-Saharan Africa, we are not aware of any studies specifically assessing executive functions. These functions are at the heart of all adaptation processes to new or complex situations. This prompted the authors to carry out this study at the Ibrahima Pierre Ndiaye Neuroscience Department of the Fann National University Hospital Centre (Senegal). Objective and Methodology: The aim of this study was to assess and characterize post-stroke alterations in executive functions in our context. We conducted a descriptive cross-sectional study. It took place over a 4-month period from April 1 to August 31, 2021. Patients were matched to controls according to age, gender and educational level. Executive functions were assessed using the Frontal Assessment Battery (FAB). Results: A total of 30 patients with stroke were enrolled. These patients were matched to controls. The mean age of the patients was 46.87 ± 17.65 years. For the control group, it was 39.27 ± 12.33 years. The prevalence of executive function disorders was 20% in post-stroke patients. The majority of executive functions assessed were impaired. Sensitivity to interference and environmental autonomy were the only ones preserved. Conclusion: Impaired executive functions are common after stroke. They should be systematically assessed in all stroke patients to ensure optimal management.
文摘Compliance,as a very important aspect of corporate governance,has developed earlier in the world,while China's compliance management has developed relatively late and is currently lacking in development.However,many enterprises suffer serious losses without compliance management,especially import and export enterprises,which are forced to exit the market due to poor compliance management.This article is based on the urgent need of Chinese enterprises for compliance management,but the lack of research by scholars.It summarizes the literature on the factors affecting compliance,hoping to be helpful for the study of compliance management.
文摘As digital technology grows,it will improve accessibility to justice and legal protection for the differently abled and promote social justice.THE rapid development of digital technology is not only changing traditional working modes but also profoundly impacting the application of laws,evidence collection,trial process,and execution.Digital technologies can remedy many shortcomings in traditional judicial procedures,better protecting the legitimate rights and interests of people,especially people with disabilities.
基金supported by the Humanities and Social Sciences Research Planning Project of the Ministry of Education:“A Study on Private Capital and Bank Stability”(No.19YJC790162).
文摘Management innovation is a key driver of total factor productivity and plays a crucial role in developing new quality productive forces.As China’s capital market continues to develop,the prevalence of common ownership—investors who hold significant stakes in multiple firms—has grown,raising the question of how it influences corporate management innovation.This study empirically investigates this issue using panel data from A-share listed companies in China between 2014 and 2022.The findings reveal an inverted U-shaped relationship between common ownership and management innovation.Specifically,institutional common ownership exerts no significant effect,while non-institutional common ownership exhibits a significant inverted U-shaped influence.Mechanism analysis suggests that common ownership often appoints shared directors,supervisors,and senior executives across firms,which in turn significantly impacts corporate management innovation.Further analysis indicates that common ownership in the primary and tertiary industries significantly influences management innovation,whereas that in the secondary industry does not show such an effect.This study offers valuable insights for corporate governance,business management,and investor decision-making and provides important references for policymakers in formulating governance-related regulations.
基金Supported by the 2025 Undergraduate Research Project of the Shandong Society for Innovation and Development in Philosophy and Social Sciences,No.Z-DXS25007。
文摘BACKGROUND Physical activity(PA)is a key contributor to the neurocognitive and psychological development of children and adolescents.With the rapid integration of digital technologies in educational and recreational contexts,technology-enhanced PA(TEPA)interventions have emerged as promising tools for promoting mental and cognitive health.However,the effectiveness of various TEPA modalities—such as virtual reality(VR),mobile applications,and biofeedback systems—remains unclear.Prior findings are fragmented across systematic reviews with inconsistent methodologies.This umbrella review was conducted to synthesize current evidence and evaluate whether specific TEPA modalities yield differential benefits.We hypothesized that TEPA interventions with immersive and selfregulatory features provide greater enhancements in executive function(EF),cognitive function(CF),and mental health(MH)than passive or minimally interactive formats.AIM To determine the effects of TEPA interventions and modality-specific characteristics on EF,CF,and MH outcomes in children and adolescents.METHODS An umbrella review of systematic reviews and meta-analyses was conducted in accordance with Preferred Reporting Items for Systematic Reviews and Meta-Analyses 2020 guidelines.Five databases(PubMed,Web of Science,EMBASE,EBSCOhost,and Cochrane Library)were searched up to March 2025.Eligible reviews included participants aged≤18 years,assessed TEPA interventions,and reported EF,CF,or MH outcomes.Methodological quality was assessed using A Measurement Tool to Assess Systematic Reviews 2.Data synthesis was stratified by intervention modality,and heterogeneity was evaluated using the I^(2)statistic.RESULTS A total of 11 systematic reviews and meta-analyses were included.Interventions using VR(2/2),game-based formats(2/2),biofeedback(2/2),and multicomponent programs(1/1)showed consistent evidence of improvements in EF and MH(e.g.,EF:6.92±3.86 vs 3.61±1.67,P<0.001).App-based interventions(3/3)demonstrated mixed or modest effects,while augmented reality-based formats showed limited efficacy.MH outcomes were most frequently improved(9/11 reviews),followed by EF(6/11 reviews)and CF(5/11 reviews).Heterogeneity ranged from moderate to high(I^(2)=42%-78%)across modalities.CONCLUSION TEPA significantly improves MH and selectively enhances executive and CF in youth.Immersive,interactive,and biofeedback-driven modalities are particularly effective.
文摘In January 2025,the United States issued executive orders that could potentially curtail lesbian,gay,bisexual,transgender,queer,and other sexual and gender minorities(LGBTQ+)rights and federal aid to developing countries,such as public health programs under the United States Agency for International Development(USAID)[1,2].In the Philippines,USAID has played an important role in funding and supporting initiatives to address the country’s local HIV epidemic[2,3].
基金supported by the National Natural Science Foundation of China(CN)(Grant No.32071074).
文摘This longitudinal study examined the association between parental autonomy support and school-aged children’s adjustment across four major domains of school functioning,as well as the mediating role of children’s executive function.Participants were 476 school-aged children(girl:49.2%,M_(age)=10.49 years,SD=1.32 years),who completed the Psychological Autonomy Support Scale,the Behavior Rating Inventory of Executive Function–2,and the Primary School Students’Psychological Suzhi Scale at baseline and at two subsequent follow-up assessments.Results from unconditional latent growth curve models and structural equation modeling indicated that paternal autonomy support was a significant predictor of children’s adjustment across all four school domains.In contrast,maternal autonomy support was significantly associated only with interpersonal adjustment.Both the intercept(initial level)and slope(rate of change)of children’s executive function significantly predicted their adjustment in all four domains.Notably,the initial level of executive function fully mediated the association between paternal autonomy support and school adjustment,whereas the rate of change in executive function did not serve as a significant mediator.Thesefindings underscore the importance of promoting parental autonomy-supportive behaviors-particularly among fathers-as a means to enhance children’s executive functioning and,consequently,their school adjustment.
文摘Helio da Silva,a retired business executive from Brazil,single⁃handedly planted over 41,000 trees in his hometown of Sao Paulo over the last two decades.Flying over the Brazilian metropolis of Sao Paulo,it's tough to miss the 3.2-kilometer⁃long and 100⁃meter⁃wide green strip of trees wedged between two of the city's busiest roads.