期刊文献+
共找到564篇文章
< 1 2 29 >
每页显示 20 50 100
Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier
1
作者 Khaled Soliman Mohamed Sobh Ayman M.Bahaa-Eldin 《Computers, Materials & Continua》 SCIE EI 2024年第4期1419-1439,共21页
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins... The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks. 展开更多
关键词 Portable executable MALWARE intrusion detection CYBERSECURITY zero-day threats Host IntrusionDetection System(HIDS) machine learning Anomaly-based Intrusion Detection System(AIDS) deep learning
在线阅读 下载PDF
An executable modeling and analyzing approach to C4ISR architecture 被引量:4
2
作者 HE Hongyue ZHU Weixing +1 位作者 LI Ruiyang DENG Qiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第1期109-117,共9页
To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta c... To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta concept model of the C4ISR architecture is introduced.According to the meta concept model,we construct the executable meta models of the C4ISR architecture by extending the meta models of fUML.Then,we define the concrete syntax and executable activity algebra(EAA)semantics for executable models.The semantics functions are introduced to translating the syntax description of executable models into the item of EAA.To support the execution of models,we propose the executable rules which are the structural operational semantics of EAA.Finally,an area air defense of the C4ISR system is used to illustrate the feasibility of the approach. 展开更多
关键词 COMMAND control communication computer INTELLIGENCE SURVEILLANCE reconnaissance(C4ISR)architecture meta model executable model algebraic semantics
在线阅读 下载PDF
An Information Hiding Algorithm Based on Bitmap Resource of Portable Executable File 被引量:2
3
作者 Jie Xu Li-Jun Feng Ya-Lan Ye Yue Wu 《Journal of Electronic Science and Technology》 CAS 2012年第2期181-184,共4页
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some trad... An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments. 展开更多
关键词 Bitmap resources data embedding information hiding portable executable file.
在线阅读 下载PDF
An executable framework for modeling and validating cooperative capability requirements in emergency response system 被引量:1
4
作者 CHAI Lei WANG Zhixue +2 位作者 HE Ming HE Hongyue YU Minggang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第4期889-906,共18页
As the scale of current systems become larger and larger and their complexity is increasing gradually,research on executable models in the design phase becomes significantly important as it is helpful to simulate the ... As the scale of current systems become larger and larger and their complexity is increasing gradually,research on executable models in the design phase becomes significantly important as it is helpful to simulate the execution process and capture defects of a system in advance.Meanwhile,the capability of a system becomes so important that stakeholders tend to emphasize their capability requirements when developing a system.To deal with the lack of official specifications and the fundamental theory basis for capability requirement,we propose a cooperative capability requirements(CCR)meta-model as a theory basis for researchers to refer to in this research domain,in which we provide detailed definition of the CCR concepts,associations and rules.Moreover,we also propose an executable framework,which may enable modelers to simulate the execution process of a system in advance and do well in filling the inconsistency and semantic gaps between stakeholders’requirements and their models.The primary working mechanism of the framework is to transform the Alf activity meta-model into the communicating sequential process(CSP)process meta-model based on some mapping rules,after which the internal communication mechanism between process nodes is designed to smooth the execution of behaviors in a CSP system.Moreover,a validation method is utilized to check the correctness and consistency of the models,and a self-fixing mechanism is used to fix the errors and warnings captured during the validation process automatically.Finally,a validation report is generated and fed back to the modelers for system optimization. 展开更多
关键词 executable model capability requirement consistency validation Alf EPSILON
在线阅读 下载PDF
Impact of Portable Executable Header Features on Malware Detection Accuracy
5
作者 Hasan H.Al-Khshali Muhammad Ilyas 《Computers, Materials & Continua》 SCIE EI 2023年第1期153-178,共26页
One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious... One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious files.In this study,an exclusive set of 29 features was collected from trusted implementations,this set was used as a baseline to analyze the presented work in this research.A Decision Tree(DT)and Neural Network Multi-Layer Perceptron(NN-MLPC)algorithms were utilized during this work.Both algorithms were chosen after testing a few diverse procedures.This work implements a method of subgrouping features to answer questions such as,which feature has a positive impact on accuracy when added?Is it possible to determine a reliable feature set to distinguish a malicious PE file from a benign one?when combining features,would it have any effect on malware detection accuracy in a PE file?Results obtained using the proposed method were improved and carried few observations.Generally,the obtained results had practical and numerical parts,for the practical part,the number of features and which features included are the main factors impacting the calculated accuracy,also,the combination of features is as crucial in these calculations.Numerical results included,finding accuracies with enhanced values,for example,NN_MLPC attained 0.979 and 0.98;for DT an accuracy of 0.9825 and 0.986 was attained. 展开更多
关键词 AI driven cybersecurity artificial intelligence CYBERSECURITY Decision Tree Neural Network Multi-Layer Perceptron Classifier portable executable(PE)file header features
在线阅读 下载PDF
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers 被引量:1
6
作者 Sohail Khan Mohammad Nauman 《Big Data Mining and Analytics》 EI CSCD 2024年第2期485-499,共15页
Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on systems.One of the major challenges in tackling this problem is the c... Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on systems.One of the major challenges in tackling this problem is the complexity of malware analysis,which requires expertise from human analysts.Recent developments in machine learning have led to the creation of deep models for malware detection.However,these models often lack transparency,making it difficult to understand the reasoning behind the model’s decisions,otherwise known as the black-box problem.To address these limitations,this paper presents a novel model for malware detection,utilizing vision transformers to analyze the Operation Code(OpCode)sequences of more than 350000 Windows portable executable malware samples from real-world datasets.The model achieves a high accuracy of 0.9864,not only surpassing the previous results but also providing valuable insights into the reasoning behind the classification.Our model is able to pinpoint specific instructions that lead to malicious behavior in malware samples,aiding human experts in their analysis and driving further advancements in the field.We report our findings and show how causality can be established between malicious code and actual classification by a deep learning model,thus opening up this black-box problem for deeper analysis. 展开更多
关键词 machine learning MALWARE vision transformers Windows Protable executable(PE)
原文传递
基于相似准则的林业无土栽培基质混合分析
7
作者 沈嵘枫 钟文斌 +3 位作者 王沅栋 黄俊疆 张文悦 杨诗嘉 《森林工程》 北大核心 2025年第5期1034-1041,共8页
针对无土栽培基质生产过程中基质混合不充分和采用离散元法时因模型过大、颗粒数过多而导致仿真结果不精确的问题,通过建立相似理论搅拌模型,利用赫兹-明德林(无滑移)模型(Hertz-Mindlin(no slip))建立肥料与土壤颗粒仿真模型,对影响混... 针对无土栽培基质生产过程中基质混合不充分和采用离散元法时因模型过大、颗粒数过多而导致仿真结果不精确的问题,通过建立相似理论搅拌模型,利用赫兹-明德林(无滑移)模型(Hertz-Mindlin(no slip))建立肥料与土壤颗粒仿真模型,对影响混合器搅拌均匀性和效率的放料方式、搅拌式混合器叶片间距和搅拌器转速3个变量因素进行离散元仿真分析。结果表明,相似理论搅拌模型可用于仿真模型的缩放,达到减少计算量,提高仿真精度的效果;采用平铺的放料方式,由于上层颗粒会在重力的作用下加速颗粒间的混合,混合效果更佳;相似模型中叶片间较佳间距为20 mm;叶片转速在50 r/min时搅拌混合效果和经济性最佳;与人工搅拌相比,搅拌式混合器大大提高了混合效率和效果,且可以避免出现盲区。仿真分析结果可为搅拌式混合器的设计与优化提供理论参考。 展开更多
关键词 育苗基质 搅拌装置 相似准则 离散元分析 Event driven execution manager(EDEM)离散元仿真软件
在线阅读 下载PDF
Semantic Malware Classification Using Artificial Intelligence Techniques
8
作者 Eliel Martins Javier Bermejo Higuera +3 位作者 Ricardo Sant’Ana Juan Ramón Bermejo Higuera Juan Antonio Sicilia Montalvo Diego Piedrahita Castillo 《Computer Modeling in Engineering & Sciences》 2025年第3期3031-3067,共37页
The growing threat of malware,particularly in the Portable Executable(PE)format,demands more effective methods for detection and classification.Machine learning-based approaches exhibit their potential but often negle... The growing threat of malware,particularly in the Portable Executable(PE)format,demands more effective methods for detection and classification.Machine learning-based approaches exhibit their potential but often neglect semantic segmentation of malware files that can improve classification performance.This research applies deep learning to malware detection,using Convolutional Neural Network(CNN)architectures adapted to work with semantically extracted data to classify malware into malware families.Starting from the Malconv model,this study introduces modifications to adapt it to multi-classification tasks and improve its performance.It proposes a new innovative method that focuses on byte extraction from Portable Executable(PE)malware files based on their semantic location,resulting in higher accuracy in malware classification than traditional methods using full-byte sequences.This novel approach evaluates the importance of each semantic segment to improve classification accuracy.The results revealed that the header segment of PE files provides the most valuable information for malware identification,outperforming the other sections,and achieving an average classification accuracy of 99.54%.The above reaffirms the effectiveness of the semantic segmentation approach and highlights the critical role header data plays in improving malware detection and classification accuracy. 展开更多
关键词 MALWARE portable executable SEMANTIC convolutional neural networks
在线阅读 下载PDF
Effect of esketamine and etomidate anesthesia on neuroplasticity in electroconvulsive therapy for treatment-resistant depression
9
作者 Guo-Guang Zhao Jing Zhao +3 位作者 Yan Kong Ya-Ping Pang Xiao-Nan Zheng Yi-Wei Zhang 《World Journal of Psychiatry》 2025年第9期286-296,共11页
BACKGROUND Treatment-resistant depression(TRD)has a poor response to clinical treatment.Patients with TRD do not respond adequately to standard antidepressants.Even after receiving a full dose and sufficient duration ... BACKGROUND Treatment-resistant depression(TRD)has a poor response to clinical treatment.Patients with TRD do not respond adequately to standard antidepressants.Even after receiving a full dose and sufficient duration of combined antidepressant therapy,significant improvement is still difficult to achieve.At present,electroconvulsive therapy(ECT)remains a clinically effective method for treating refractory depression.A good anesthesia regimen can enhance its clinical efficacy.Actively exploring high-quality anesthesia regimens has become a current research hotspot.AIM To explore the effect of esketamine and etomidate anesthesia on the clinical efficacy of ECT for TRD.METHODS A total of 120 patients with TRD,treated at the Department of Psychiatry,The Second Affiliated Hospital of Shandong First Medical University,China between April 2020 and April 2024,were selected for the study.The patients were allocated at random into two groups using a random number table:The combination and control groups,with 60 patients in each group.Both groups underwent ECT;the combination group received esketamine and etomidate anesthesia,while the control group received etomidate anesthesia.The following parameters were compared between the two groups:Heart rate(HR);mean arterial pressure(MAP);peripheral capillary oxygen saturation(SpO2);initial and final threshold charges;and serum brain-derived neurotrophic factor(BDNF),nerve growth factor(NGF),5-hydroxytryptamine(5-HT),and interleukin-4(IL-4)levels.Neurological functions,basic executive function scores,and adverse reactions were compared during the treatment process.RESULTS During treatment,the maximum and minimum HR and MAP values in the combination group were markedly lower than those in the control group(P<0.05),whereas there was no significant difference in SpO2 between the two groups(P>0.05).During the treatment,there were no significant differences in the initial threshold charge and average duration of seizures during ECT between the two groups(P>0.05).However,the final threshold charge and total charge in the combination group were considerably lower than those in the control group(P<0.05).After treatment,the BDNF,NGF,5-HT,and IL-4 levels were evidently higher in the combination group than in the control group(P<0.05).During treatment,as the number of ECT sessions increased,both BRNAS and Measurement and Treatment Research to Improve Cognition in Schizophrenia Consensus Cognitive Battery(MCCB)scores increased,whereas Hamilton Depression Rating Scale(HAMD)-24 scores decreased in both groups.Starting from the third treatment session,the BRNAS and MCCB scores in the combination group were higher than in the control group,whereas the Hamilton Depression Scale-24 score was lower in the combination group than in the control group(P<0.05).After treatment,the Wisconsin Card Sorting Test scores and Tower of Hanoi test results in the combination group were significantly better than those in the control group(P<0.05).The occurrence of adverse reactions was compared between the two groups(P>0.05).CONCLUSION Esketamine and etomidate anesthesia during ECT for patients with TRD helps maintain stable vital signs during the treatment process,improves depressive symptoms,and enhances neurological and basic executive functions. 展开更多
关键词 DEPRESSION Electroconvulsive therapy Esketamine ETOMIDATE Neurological function Executive function
暂未订购
Executive alumni networks:Catalysts or constraints for innovation in China’s listed firms?
10
作者 Jinzhong Guo Jianan Liu +2 位作者 Moxin Li Xiaoling Liu Chengyong Liu 《Journal of Data and Information Science》 2025年第2期152-173,共22页
Purpose:Currently,different research conclusions exist about the relationship between relational capital and corporate innovation.The research aims to(1)reveal the actual relationship between executive alumni relation... Purpose:Currently,different research conclusions exist about the relationship between relational capital and corporate innovation.The research aims to(1)reveal the actual relationship between executive alumni relations and firm innovation performance,(2)examine the moderating role of executive academic backgrounds,(3)analyze the paths for firms to leverage knowledge spillovers from regional universities to promote firm innovation by their geographic location.Design/methodology/approach:A social network approach is used to construct alumni relationship networks of A-share listed companies in Shanghai and Shenzhen,China.A two-way fixed effects model is used to assess the impact of firms’structural position in executive alumni networks on firms’innovation performance.In addition,the research also delves into the interactions between knowledge spillovers from geographic locations and executives’alumni networks,aiming to elucidate their combined effects on firms’innovation performance.Findings:This paper explores the curvilinear relationship between executive alumni networks’centrality and firm innovation within the Chinese context.It also finds that in the positive effect interval on the right side of the“U-shaped,”the industry with the highest number of occurrences is the high-tech industry.Moreover,it elucidates the moderating influence of executives’academic experience on the alumni networks-innovation nexus,offering a nuanced understanding of these dynamics.Lastly,we provide novel insights into optimizing resource allocation to leverage geographic knowledge spillovers for innovation.Research limitations:The study may not fully represent the broader population of firms,particularly small and medium-sized enterprises(SMEs)or unlisted companies.Future research could expand the sample to include a more diverse range of firms to enhance the generalizability of the findings.Practical implications:Firstly,companies can give due consideration to the alumni resources of executives in their personnel decisions,but they should pay attention to the rational use of resources.Secondly,universities should actively work with companies to promote knowledge transfer and collaboration.Originality/value:The findings help clarify the influence mechanism of firms’innovation performance,providing theoretical support and empirical evidence for firms to drive innovation at the executive alumni relationship network level. 展开更多
关键词 Alumni networks Firm innovation PATENT Knowledge spillover EXECUTIVE
在线阅读 下载PDF
ADFEmu:Enhancing Firmware Fuzzing with Direct Memory Access(DMA)Input Emulation Using Concolic Execution and Large Language Models(LLMs)
11
作者 Yixin Ding Xinjian Zhao +3 位作者 Zicheng Wu Yichen Zhu Longkun Bai Hao Han 《Computers, Materials & Continua》 2025年第9期5977-5993,共17页
Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques inef... Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments. 展开更多
关键词 Fuzz testing firmware rehosting DMA concolic execution LLMs
在线阅读 下载PDF
Evaluation and Characterization of Executive Function Disorders after Stroke
12
作者 El Hadji Makhtar Ba Hilaire Dominique Ewodo Touna +16 位作者 Momar Camara Sokhna Seck Bocar Baila Diédhiou Racky Wade Fatoumata Ba Ndèye Awa Dieye Maimouna Dieye Ndiaga Matar Gaye Adjaratou Dieynabou Sow Anna Mbodj Basse Marieme Soda Diop Lala Bouna Seck Ousmane Cisse Khadim Fall Adama Koundoul Mbayang Ndiaye Aida Sylla 《Open Journal of Psychiatry》 2025年第1期16-23,共8页
Introduction: Stroke may have a negative impact on mental health and behavior. Cognitive disorders are common after stroke. They are rarely assessed in current clinical practice, particularly in our context. They cons... Introduction: Stroke may have a negative impact on mental health and behavior. Cognitive disorders are common after stroke. They are rarely assessed in current clinical practice, particularly in our context. They constitute a real “invisible” handicap. In sub-Saharan Africa, we are not aware of any studies specifically assessing executive functions. These functions are at the heart of all adaptation processes to new or complex situations. This prompted the authors to carry out this study at the Ibrahima Pierre Ndiaye Neuroscience Department of the Fann National University Hospital Centre (Senegal). Objective and Methodology: The aim of this study was to assess and characterize post-stroke alterations in executive functions in our context. We conducted a descriptive cross-sectional study. It took place over a 4-month period from April 1 to August 31, 2021. Patients were matched to controls according to age, gender and educational level. Executive functions were assessed using the Frontal Assessment Battery (FAB). Results: A total of 30 patients with stroke were enrolled. These patients were matched to controls. The mean age of the patients was 46.87 ± 17.65 years. For the control group, it was 39.27 ± 12.33 years. The prevalence of executive function disorders was 20% in post-stroke patients. The majority of executive functions assessed were impaired. Sensitivity to interference and environmental autonomy were the only ones preserved. Conclusion: Impaired executive functions are common after stroke. They should be systematically assessed in all stroke patients to ensure optimal management. 展开更多
关键词 POST-STROKE Mental Health Executive Functions Invisible Disability Senegal
暂未订购
A Comprehensive Review of Factors Influencing Compliance
13
作者 Renhong Liu Mohd Shukri Ab Yajd Jacquline Tham 《Proceedings of Business and Economic Studies》 2025年第2期342-346,共5页
Compliance,as a very important aspect of corporate governance,has developed earlier in the world,while China's compliance management has developed relatively late and is currently lacking in development.However,ma... Compliance,as a very important aspect of corporate governance,has developed earlier in the world,while China's compliance management has developed relatively late and is currently lacking in development.However,many enterprises suffer serious losses without compliance management,especially import and export enterprises,which are forced to exit the market due to poor compliance management.This article is based on the urgent need of Chinese enterprises for compliance management,but the lack of research by scholars.It summarizes the literature on the factors affecting compliance,hoping to be helpful for the study of compliance management. 展开更多
关键词 COMPLIANCE Influencing factors Internal control Executive compensation Shareholding structure
在线阅读 下载PDF
Digital Dividends
14
作者 TANG YA'NAN 《China Today》 2025年第2期64-67,共4页
As digital technology grows,it will improve accessibility to justice and legal protection for the differently abled and promote social justice.THE rapid development of digital technology is not only changing tradition... As digital technology grows,it will improve accessibility to justice and legal protection for the differently abled and promote social justice.THE rapid development of digital technology is not only changing traditional working modes but also profoundly impacting the application of laws,evidence collection,trial process,and execution.Digital technologies can remedy many shortcomings in traditional judicial procedures,better protecting the legitimate rights and interests of people,especially people with disabilities. 展开更多
关键词 LEGAL SHORTCOMINGS EXECUTION
在线阅读 下载PDF
The Impact of Common Ownership on Management Innovation
15
作者 Liu Fu Xu Kun 《Contemporary Social Sciences》 2025年第4期16-37,共22页
Management innovation is a key driver of total factor productivity and plays a crucial role in developing new quality productive forces.As China’s capital market continues to develop,the prevalence of common ownershi... Management innovation is a key driver of total factor productivity and plays a crucial role in developing new quality productive forces.As China’s capital market continues to develop,the prevalence of common ownership—investors who hold significant stakes in multiple firms—has grown,raising the question of how it influences corporate management innovation.This study empirically investigates this issue using panel data from A-share listed companies in China between 2014 and 2022.The findings reveal an inverted U-shaped relationship between common ownership and management innovation.Specifically,institutional common ownership exerts no significant effect,while non-institutional common ownership exhibits a significant inverted U-shaped influence.Mechanism analysis suggests that common ownership often appoints shared directors,supervisors,and senior executives across firms,which in turn significantly impacts corporate management innovation.Further analysis indicates that common ownership in the primary and tertiary industries significantly influences management innovation,whereas that in the secondary industry does not show such an effect.This study offers valuable insights for corporate governance,business management,and investor decision-making and provides important references for policymakers in formulating governance-related regulations. 展开更多
关键词 common ownership management innovation shared directors SUPERVISORS and senior executives
在线阅读 下载PDF
Effects of technology-enhanced physical activity on brain and mental health in youth:An umbrella review of meta-analyses
16
作者 Zi-Qi Wang Si-Yu Hong +4 位作者 Zi-Xuan Jia Yi Zhang Sha-Sha Ma Xian-Gui Bu Wen-Jun Wang 《World Journal of Psychiatry》 2025年第9期342-360,共19页
BACKGROUND Physical activity(PA)is a key contributor to the neurocognitive and psychological development of children and adolescents.With the rapid integration of digital technologies in educational and recreational c... BACKGROUND Physical activity(PA)is a key contributor to the neurocognitive and psychological development of children and adolescents.With the rapid integration of digital technologies in educational and recreational contexts,technology-enhanced PA(TEPA)interventions have emerged as promising tools for promoting mental and cognitive health.However,the effectiveness of various TEPA modalities—such as virtual reality(VR),mobile applications,and biofeedback systems—remains unclear.Prior findings are fragmented across systematic reviews with inconsistent methodologies.This umbrella review was conducted to synthesize current evidence and evaluate whether specific TEPA modalities yield differential benefits.We hypothesized that TEPA interventions with immersive and selfregulatory features provide greater enhancements in executive function(EF),cognitive function(CF),and mental health(MH)than passive or minimally interactive formats.AIM To determine the effects of TEPA interventions and modality-specific characteristics on EF,CF,and MH outcomes in children and adolescents.METHODS An umbrella review of systematic reviews and meta-analyses was conducted in accordance with Preferred Reporting Items for Systematic Reviews and Meta-Analyses 2020 guidelines.Five databases(PubMed,Web of Science,EMBASE,EBSCOhost,and Cochrane Library)were searched up to March 2025.Eligible reviews included participants aged≤18 years,assessed TEPA interventions,and reported EF,CF,or MH outcomes.Methodological quality was assessed using A Measurement Tool to Assess Systematic Reviews 2.Data synthesis was stratified by intervention modality,and heterogeneity was evaluated using the I^(2)statistic.RESULTS A total of 11 systematic reviews and meta-analyses were included.Interventions using VR(2/2),game-based formats(2/2),biofeedback(2/2),and multicomponent programs(1/1)showed consistent evidence of improvements in EF and MH(e.g.,EF:6.92±3.86 vs 3.61±1.67,P<0.001).App-based interventions(3/3)demonstrated mixed or modest effects,while augmented reality-based formats showed limited efficacy.MH outcomes were most frequently improved(9/11 reviews),followed by EF(6/11 reviews)and CF(5/11 reviews).Heterogeneity ranged from moderate to high(I^(2)=42%-78%)across modalities.CONCLUSION TEPA significantly improves MH and selectively enhances executive and CF in youth.Immersive,interactive,and biofeedback-driven modalities are particularly effective. 展开更多
关键词 Executive function Cognitive function Mental health Technology-enhanced physical activity YOUTH Umbrella review
暂未订购
HIV care services and the executive orders of the United States on USAID:Insights from the Philippines
17
作者 Rowalt Alibudbud 《Asian Pacific Journal of Tropical Medicine》 2025年第4期147-148,共2页
In January 2025,the United States issued executive orders that could potentially curtail lesbian,gay,bisexual,transgender,queer,and other sexual and gender minorities(LGBTQ+)rights and federal aid to developing countr... In January 2025,the United States issued executive orders that could potentially curtail lesbian,gay,bisexual,transgender,queer,and other sexual and gender minorities(LGBTQ+)rights and federal aid to developing countries,such as public health programs under the United States Agency for International Development(USAID)[1,2].In the Philippines,USAID has played an important role in funding and supporting initiatives to address the country’s local HIV epidemic[2,3]. 展开更多
关键词 executive orders USAID HIV care services hiv epidemic public health programs funding supporting initiatives United States
暂未订购
Parental autonomy support effects on children’s school adjustment:The longitudinal mediating effect of executive function
18
作者 Xia Hu Zhu Li +1 位作者 Yawen Shi Xiaopei Xing 《Journal of Psychology in Africa》 2025年第4期471-480,共10页
This longitudinal study examined the association between parental autonomy support and school-aged children’s adjustment across four major domains of school functioning,as well as the mediating role of children’s ex... This longitudinal study examined the association between parental autonomy support and school-aged children’s adjustment across four major domains of school functioning,as well as the mediating role of children’s executive function.Participants were 476 school-aged children(girl:49.2%,M_(age)=10.49 years,SD=1.32 years),who completed the Psychological Autonomy Support Scale,the Behavior Rating Inventory of Executive Function–2,and the Primary School Students’Psychological Suzhi Scale at baseline and at two subsequent follow-up assessments.Results from unconditional latent growth curve models and structural equation modeling indicated that paternal autonomy support was a significant predictor of children’s adjustment across all four school domains.In contrast,maternal autonomy support was significantly associated only with interpersonal adjustment.Both the intercept(initial level)and slope(rate of change)of children’s executive function significantly predicted their adjustment in all four domains.Notably,the initial level of executive function fully mediated the association between paternal autonomy support and school adjustment,whereas the rate of change in executive function did not serve as a significant mediator.Thesefindings underscore the importance of promoting parental autonomy-supportive behaviors-particularly among fathers-as a means to enhance children’s executive functioning and,consequently,their school adjustment. 展开更多
关键词 parental autonomy support executive function school adjustment longitudinal mediation
在线阅读 下载PDF
Sao Paulo's green guardian
19
作者 苏琳 《疯狂英语(新读写)》 2025年第2期54-55,77,78,共4页
Helio da Silva,a retired business executive from Brazil,single⁃handedly planted over 41,000 trees in his hometown of Sao Paulo over the last two decades.Flying over the Brazilian metropolis of Sao Paulo,it's tough... Helio da Silva,a retired business executive from Brazil,single⁃handedly planted over 41,000 trees in his hometown of Sao Paulo over the last two decades.Flying over the Brazilian metropolis of Sao Paulo,it's tough to miss the 3.2-kilometer⁃long and 100⁃meter⁃wide green strip of trees wedged between two of the city's busiest roads. 展开更多
关键词 single handedly retired business executive urban greening Sao Paulo green strip tree planting
在线阅读 下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部