期刊文献+
共找到14,251篇文章
< 1 2 250 >
每页显示 20 50 100
ADFEmu:Enhancing Firmware Fuzzing with Direct Memory Access(DMA)Input Emulation Using Concolic Execution and Large Language Models(LLMs)
1
作者 Yixin Ding Xinjian Zhao +3 位作者 Zicheng Wu Yichen Zhu Longkun Bai Hao Han 《Computers, Materials & Continua》 2025年第9期5977-5993,共17页
Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques inef... Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments. 展开更多
关键词 Fuzz testing firmware rehosting DMA concolic execution LLMs
在线阅读 下载PDF
The Current Situation and Trends of Trusted Execution Environment Applications
2
作者 Yanling Liu Yun Li 《Proceedings of Business and Economic Studies》 2025年第2期121-126,共6页
With the rapid development of digital technologies such as big data,cloud computing,and the Internet of Things(loT),data security and privacy protection have become the core challenges facing modern computing systems.... With the rapid development of digital technologies such as big data,cloud computing,and the Internet of Things(loT),data security and privacy protection have become the core challenges facing modern computing systems.Traditional security mechanisms are difficult to effectively deal with advanced adversarial attacks due to their reliance on a centralized trust model.In this context,the Trusted Execution Environment(TEE),as a hardware-enabled secure isolation technology,offers a potential solution to protect sensitive computations and data.This paper systematically discusses TEE's technical principle,application status,and future development trend.First,the underlying architecture of TEE and its core characteristics,including isolation,integrity,and confidentiality,are analyzed.Secondly,practical application cases of TEE in fields such as finance,the IoT,artificial intelligence,and privacy computing are studied.Finally,the future development direction of TEE is prospected. 展开更多
关键词 Trusted execution environment Data security Privacy protection Cloud computing
在线阅读 下载PDF
Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution
3
作者 Yan Cao Zhizhuang Zhou Yan Zhuang 《Computers, Materials & Continua》 2025年第7期1545-1565,共21页
Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are w... Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments. 展开更多
关键词 Dynamic symbolic execution opaque predicates code obfuscation
在线阅读 下载PDF
Efficient Task Allocation for Energy and Execution Time Trade-Off in Edge Computing Using Multi-Objective IPSO
4
作者 Jafar Aminu Rohaya Latip +2 位作者 Zurina Mohd Hanafi Shafinah Kamarudin Danlami Gabi 《Computers, Materials & Continua》 2025年第8期2989-3011,共23页
As mobile edge computing continues to develop,the demand for resource-intensive applications is steadily increasing,placing a significant strain on edge nodes.These nodes are normally subject to various constraints,fo... As mobile edge computing continues to develop,the demand for resource-intensive applications is steadily increasing,placing a significant strain on edge nodes.These nodes are normally subject to various constraints,for instance,limited processing capability,a few energy sources,and erratic availability being some of the common ones.Correspondingly,these problems require an effective task allocation algorithmto optimize the resources through continued high system performance and dependability in dynamic environments.This paper proposes an improved Particle Swarm Optimization technique,known as IPSO,for multi-objective optimization in edge computing to overcome these issues.To this end,the IPSO algorithm tries to make a trade-off between two important objectives,which are energy consumption minimization and task execution time reduction.Because of global optimal position mutation and dynamic adjustment to inertia weight,the proposed optimization algorithm can effectively distribute tasks among edge nodes.As a result,it reduces the execution time of tasks and energy consumption.In comparative assessments carried out by IPSO with benchmark methods such as Energy-aware Double-fitness Particle Swarm Optimization(EADPSO)and ICBA,IPSO provides better results than these algorithms.For the maximum task size,when compared with the benchmark methods,IPSO reduces the execution time by 17.1%and energy consumption by 31.58%.These results allow the conclusion that IPSO is an efficient and scalable technique for task allocation at the edge environment.It provides peak efficiency while handling scarce resources and variable workloads. 展开更多
关键词 Keyword edge computing energy consumption execution time particle swarm optimization task allocation
在线阅读 下载PDF
基于前后端联合分析的Java Web漏洞挖掘方法
5
作者 邹福泰 姜开达 +2 位作者 占天越 施纬 张亮 《计算机研究与发展》 北大核心 2026年第1期214-226,共13页
精准高效地挖掘Web应用当中存在的安全漏洞具有极高的研究价值。Web漏洞挖掘相关研究大多是针对PHP应用的,无法直接应用于Java Web漏洞挖掘。且现有的Web漏洞挖掘方法难以适应批量高效的需求,即难以在保持静态代码分析的性能下取得动态... 精准高效地挖掘Web应用当中存在的安全漏洞具有极高的研究价值。Web漏洞挖掘相关研究大多是针对PHP应用的,无法直接应用于Java Web漏洞挖掘。且现有的Web漏洞挖掘方法难以适应批量高效的需求,即难以在保持静态代码分析的性能下取得动态分析的精确度。为解决上述问题,提出了一种前后端联合分析的Web漏洞挖掘方法,利用前端解析提取污点源信息来帮助后端分析进行剪枝,提高漏洞覆盖率和检测性能;同时在漏洞挖掘时利用程序的动静态信息进行代码建模,结合数据流分析、污点分析、符号执行以及轻量动态求解技术完成漏洞的挖掘和验证,在引入较少开销前提下带来较大的效果提升。选取了CVE(common vulnerabilities and exposure)漏洞、开源CMS(content management system)以及开源社区应用中共105个Java Web漏洞对所提出的方法进行了实验,证明了各模块具有较好的分析效果,整体具有较强的漏洞挖掘能力。 展开更多
关键词 WEB安全 JAVA 漏洞挖掘 污点分析 符号执行
在线阅读 下载PDF
民事悬赏执行制度公权化的程序重构与机制创新
6
作者 靳建丽 姜鑫 《兰州文理学院学报(社会科学版)》 2026年第1期79-86,共8页
我国民事执行面临案件量激增与“查人找物难”的双重困境,探索悬赏执行制度的公权化路径对破解“执行难”具有重要意义。然而,现行悬赏执行制度因公权属性定位模糊,导致其在适用过程中存在地方规则冲突和运行低效等问题。在健全解决执... 我国民事执行面临案件量激增与“查人找物难”的双重困境,探索悬赏执行制度的公权化路径对破解“执行难”具有重要意义。然而,现行悬赏执行制度因公权属性定位模糊,导致其在适用过程中存在地方规则冲突和运行低效等问题。在健全解决执行难长效机制的背景下,应以明确公权属性为核心支点,优化制度机制:建立依职权启动程序,确立被执行人承担悬赏费用规则,配套精细化审查标准和高效审批程序,并搭建统一悬赏执行平台。通过对悬赏执行制度的公权化重构,使其真正成为破解“执行难”的重要工具。 展开更多
关键词 执行难 悬赏执行 悬赏公告 悬赏金
在线阅读 下载PDF
Development of a distributed and integratable manufacturing execution system framework 被引量:4
7
作者 杨浩 周娜 +1 位作者 朱剑英 罗翔 《Journal of Southeast University(English Edition)》 EI CAS 2003年第1期64-69,共6页
Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, d... Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, distributed, configurable, interoperable and maintainable. Moreover, the design patterns for the framework .are developed and a variety of functional components are designed by inheriting appropriate patterns. And then an application is constructed by invoking corresponding methods of related components. An MES system implementing the framework and design patterns can be facilely integrated with other manufacturing applications, such as enterprise resource planning (ERP) and floor control system (FCS) . 展开更多
关键词 manufacturing execution system framework design pattern distributed object-oriented remote method invocation
在线阅读 下载PDF
数字化转型与组织关系特征的适配协同效应对企业韧性的影响机制研究
8
作者 贾勇 高苡晨 傅倩汪琳 《华东经济管理》 北大核心 2026年第1期118-128,共11页
文章利用2012—2023年中国A股上市公司数据,基于技术适配理论,实证检验数字化转型与不同组织关系的适配协同效应对企业韧性的影响。结果表明:数字化转型与企业管理、集团管控、股东治理和供应链治理四个层面组织关系的适配协同效应有利... 文章利用2012—2023年中国A股上市公司数据,基于技术适配理论,实证检验数字化转型与不同组织关系的适配协同效应对企业韧性的影响。结果表明:数字化转型与企业管理、集团管控、股东治理和供应链治理四个层面组织关系的适配协同效应有利于企业韧性提升,即在高管薪酬业绩敏感性高、集团内部集权程度高、耐心资本占比高、供应链上下游匹配关系好时,数字化转型对企业韧性的赋能效果更好;数字化转型通过增强动态能力提升企业韧性,且动态能力具备关系适配协同效应的转化效能;数字化转型与不同层面组织关系的适配协同具有显著的供应链溢出效应。 展开更多
关键词 技术适配理论 数字化转型 企业韧性 高管薪酬业绩敏感性 耐心资本
在线阅读 下载PDF
环境公益诉讼中法律监督机关的角色定位及制度展开
9
作者 焦洪昌 黄钱卓尔特 《河北法学》 北大核心 2026年第1期16-35,共20页
检察公益诉讼制度自2015年试点开始,逐步在我国各个领域进行展开,到2018年生态环境损害赔偿诉讼制度试点的设立,我国环境公益诉讼制度逐步走向完善,但现在环境检察公益诉讼仍然存在一定的程序交叉,没有明确的顺位关系。随着《十四届全... 检察公益诉讼制度自2015年试点开始,逐步在我国各个领域进行展开,到2018年生态环境损害赔偿诉讼制度试点的设立,我国环境公益诉讼制度逐步走向完善,但现在环境检察公益诉讼仍然存在一定的程序交叉,没有明确的顺位关系。随着《十四届全国人大常委会立法规划》提出要审议检察公益诉讼法,如何厘清环境检察公益诉讼中各程序的地位成为迫在眉睫的问题。目前环境检察公益诉讼存在检察机关在生态环境损害赔偿诉讼中的定位不明确,行政公益诉讼中检察权侵入行政权,民事公益诉讼以审判权代替检察权行使等问题。从检察机关系法律监督机关这一宪法定位出发,在制度顺位上应当构建以生态环境损害赔偿诉讼的监督支持作用为第一顺位,以提起行政公益诉讼为第二顺位,以支持提起民事公益诉讼为第三顺位,以直接提起民事公益诉讼为第四顺位的制度方案,以最大程度避免行政权、审判权和检察权之间的竞合问题。 展开更多
关键词 检察公益诉讼 环境公益诉讼 角色定位 法律监督 行政权
原文传递
Optimization of RDF link traversal based query execution 被引量:2
10
作者 朱艳琴 花岭 《Journal of Southeast University(English Edition)》 EI CAS 2013年第1期27-32,共6页
Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal ba... Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal based query execution (RDF-LTE) approach, this paper discusses how the execution order of the triple pattern affects the query results and cost based on concrete SPARQL queries, and analyzes two properties of the web of linked data, missing backward links and missing contingency solution. Then three heuristic principles for logic query plan optimization, namely, the filtered basic graph pattern (FBGP) principle, the triple pattern chain principle and the seed URIs principle, are proposed. The three principles contribute to decrease the intermediate solutions and increase the types of queries that can be answered. The effectiveness and feasibility of the proposed approach is evaluated. The experimental results show that more query results can be returned with less cost, thus enabling users to develop the full potential of the web of linked data. 展开更多
关键词 web of linked data resource description framework link traversal based query execution (RDF-LTE) SPARQL query query optimization
在线阅读 下载PDF
Method for test case selection and execution of web application regression testing
11
作者 曹曦 许蕾 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期325-329,共5页
In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case select... In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case selection method for web application regression testing based on the control flow graph.This method is safe enough to the test case selection.On the base of features of request sequence in web application,the minimization technique and the priority of test cases are taken into consideration in the process of execution of test cases in regression testing for web application.The improved greedy algorithm is also raised resulting in optimization of execution of test cases.The experiments indicate that the number of test cases which need to be retested is reduced,and the efficiency of execution of test cases is also improved. 展开更多
关键词 regression testing web application test case selection control flow graph optimizing execution
在线阅读 下载PDF
从认知失衡到战略理性:气候风险如何影响企业绿色创新泡沫?
12
作者 米俊 张琪睿 +1 位作者 王迪 张琪 《灾害学》 北大核心 2026年第1期22-29,共8页
该文基于上市企业数据,实证检验气候风险对绿色创新泡沫的影响机制。研究发现,气候风险总体上显著抑制绿色创新泡沫,且在东/西部地区、国有企业、下游企业及重污染行业中抑制效应更强。中介效应显示,气候风险通过提升高管机会型环保认... 该文基于上市企业数据,实证检验气候风险对绿色创新泡沫的影响机制。研究发现,气候风险总体上显著抑制绿色创新泡沫,且在东/西部地区、国有企业、下游企业及重污染行业中抑制效应更强。中介效应显示,气候风险通过提升高管机会型环保认知加剧绿色创新泡沫,通过增强高管责任型环保认知抑制绿色创新泡沫。匹配效应显示,高管双元环保认知越接近平衡状态,对绿色创新泡沫抑制效应更大;平衡状态下,高管双元环保认知和绿色创新泡沫呈正“U”型;非平衡状态下,“低机会型环保认知-高责任型环保认知”对绿色创新泡沫抑制作用更大。此外,调节效应显示,海外背景高异质性情形,高管双元环保认知一致性越高,气候风险通过其对绿色创新泡沫的抑制效应越大。 展开更多
关键词 气候风险 绿色创新泡沫 机会型环保认知 责任型环保认知 高管海外背景
在线阅读 下载PDF
自主语言转换中的双语控制机制
13
作者 庄滨源 杨静 《心理科学进展》 北大核心 2026年第1期97-107,共11页
自主语言转换指双语者自发进行的语言转换。相较于强制性语言转换,自主语言转换在高词汇通达度和高语言自由度的情况下所带来的转换代价显著降低,甚至趋于消失。神经影像研究显示自主语言转换条件下抑制控制网络激活较弱,同时额外调动... 自主语言转换指双语者自发进行的语言转换。相较于强制性语言转换,自主语言转换在高词汇通达度和高语言自由度的情况下所带来的转换代价显著降低,甚至趋于消失。神经影像研究显示自主语言转换条件下抑制控制网络激活较弱,同时额外调动了与自我意愿和自发行为相关的脑机制。自主转换中的双语控制机制与二语熟练度、情境及个体的执行控制能力密切相关。未来研究需整合个体与环境因素,构建更精细的动态模型;结合真实行为模式和实验室测量,深化对神经机制探索;开展纵向追踪研究并关注产出−理解交互,推动自主语言转换在认知优势及学习效率等方面的转化与提升。 展开更多
关键词 自主语言转换 强制语言转换 抑制控制 语境 执行控制
在线阅读 下载PDF
ARCHITECTURE OF MANUFACTURING EXECUTION SYSTEM IN THE EXTENDED ENTERPRISE 被引量:6
14
作者 Song Haisheng College of Electronic and Mechanical Engineering, Hebei University of Science and Technology,Shijiazhuang 050054,China Wang Jiahai Zhang Shu Tongji University 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2002年第1期90-93,共4页
The extended enterprise is formed according to the philosophy of dispersednetworked manufacturing. Manufacturing execution system (MES) can close the information gap whichexists between device control system and produ... The extended enterprise is formed according to the philosophy of dispersednetworked manufacturing. Manufacturing execution system (MES) can close the information gap whichexists between device control system and production information management system. The functions andthe web-based architecture of the MES in the extended enterprise are introduced. Using thecooperating system models of object-oriented and distributed agents and CORBA, all objects keep touniform interface standards and are easily inserted to object request broker. The utilization ofdistributed MES in extended enterprise can adapt fast change of manufacturing environment andresource. It also can improve the independent management capability of manufacturing cell and theenterprise response capability to global economic competition. 展开更多
关键词 Extended enterprise Manufacturing execution system Dispersed networkedmanufacturing AGENT
在线阅读 下载PDF
基于分段函数的不透明谓词
15
作者 陈沈杰 王智昊 吴彪 《电子科技》 2026年第2期45-53,共9页
作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号... 作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号执行技术以及混淆后程序控制流较简单问题,文中提出了一种基于分段函数的不透明谓词。攻击动态符号执行存在的缺陷,利用分段函数使引入的变量收敛于设定值,以此构造不透明谓词,隐藏程序真实控制流。基于LLVM(Low Level Virtual Machine)框架实现了所提混淆系统,并进行了实验检测。实验结果表明,所提混淆方法有效增加了程序控制流的复杂度,能够抵御动态符号执行技术。相较于现有混淆系统,所提方法使程序的可维护度平均下降23.8%,具有更高的混淆强度。 展开更多
关键词 代码混淆系统 不透明谓词 虚假控制流 符号执行 静态分析 LLVM 逆向工程 控制流图
在线阅读 下载PDF
Material-flow Modeling Technology and Its Application in Manufacturing Execution Systems of Petrochemical Industry 被引量:4
16
作者 李备芳 刘鲁 +1 位作者 朱炜 荣冈 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2008年第1期71-78,共8页
The management and control of material flow forms the core of manufacturing execution systems (MES) in the petrochemical industry. The bottleneck in the application of MES is the ability to match the material-flow m... The management and control of material flow forms the core of manufacturing execution systems (MES) in the petrochemical industry. The bottleneck in the application of MES is the ability to match the material-flow model with the production processes. A dynamic material-flow model is proposed in this paper after an analysis of the material-flow characteristics of the production process in a petrochemical industry. The main material-flow events are described, including the movement, storage, shifting, recycling, and elimination of the materials. The spatial and temporal characters of the material-flow events are described, and the material-flow model is constructed. The dynamic material-flow model introduced herein is the basis for other subsystems in the MES. In addition, it is the subsystem with the least scale in MES. The dynamic-modeling method of material flow has been applied in the development of the SinoMES model. It helps the petrochemical plant to manage the entire flow information related to tanks and equipments from the aspects of measurement, storage, movement, and the remaining balance of the material. As a result, it matches the production process by error elimination and data reconciliation. In addition, it facilitates the integration of application modules into the MES and guarantees the potential development of SinoMES in future applications. 展开更多
关键词 manufacturing execution systems dynamic material-flow model material-flow events
在线阅读 下载PDF
Event-driven process execution model for process virtual machine 被引量:3
17
作者 WU Dong-yao WEI Jun GAO Chu-shu DOU Wen-shen 《计算机集成制造系统》 EI CSCD 北大核心 2012年第8期1675-1685,共11页
Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principle... Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM. 展开更多
关键词 business process modeling event-driven architecture process virtual machine service orchestration process execution language
在线阅读 下载PDF
Software Backdoor Analysis Based on Sensitive Flow Tracking and Concolic Execution 被引量:3
18
作者 XU Xin WANG Jiajie +2 位作者 CHENG Shaoyin ZHANG Tao JIANG Fan 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第5期421-427,共7页
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to ef... In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to effectively discover backdoor behaviors, such as stealing secret information and injecting evil data into system, with less false negatives. With concolic execution on predetermined path, the backdoor trigger condition can be extracted and analyzed to achieve high accuracy. BASEC has been implemented and experimented on several software backdoor samples widespread on the Internet, and over 90% of them can be detected. Compared with behavior-based and system-call-based detection methods, BASEC relies less on the historical sample collections, and is more effective in detecting software backdoors, especially those injected into software by modifying and recompiling source codes. 展开更多
关键词 software backdoor detection data flow tracking concolic execution malware detection
原文传递
Tension leg platform project execution 被引量:5
19
作者 Zhang Dagang Wang Chunsheng Zhang Tianyu 《Engineering Sciences》 EI 2013年第4期79-85,共7页
The first floating platform concept design work for South China Sea is undergoing in DMAR's office now. This tension leg platform has potential to become the first advanced floating production platform project. Pr... The first floating platform concept design work for South China Sea is undergoing in DMAR's office now. This tension leg platform has potential to become the first advanced floating production platform project. Project execution is always a challenge for floating system. This paper focuses on the critical elements of project execution for tension leg platform,and studies potential implications to future oil and gas exploration in South China Sea. There are many factors affecting successful execution of floating system project,including technical issues, engineering management,interface management,etc. There are also failure examples of project execution in the industry. The author has participated 28 large detailed projects and has gained extensive experience on floating projects,with ample hands-on project experiences. A detailed tension leg platform project study example and discussions in depth are presented for future project execution in China deepwater development. 展开更多
关键词 project execution deepwater project tension leg platform floating system project management
在线阅读 下载PDF
高管团队稳定性与企业杠杆操纵的关系研究
20
作者 王钰珺 《商业观察》 2026年第1期94-98,共5页
“去杠杆”是减少我国金融风险,促进经济长期稳定发展的重要举措之一。然而,近年来一些企业在“去杠杆”的过程中做出操纵杠杆的行为,误导利益相关者做出错误的判断或决策。从企业内部来看,高管团队稳定性是高管团队的重要特征之一。基... “去杠杆”是减少我国金融风险,促进经济长期稳定发展的重要举措之一。然而,近年来一些企业在“去杠杆”的过程中做出操纵杠杆的行为,误导利益相关者做出错误的判断或决策。从企业内部来看,高管团队稳定性是高管团队的重要特征之一。基于此,文章以我国2009—2023年A股上市公司为研究对象,探究上市公司高管团队稳定性对企业杠杆操纵的影响。研究发现:上市公司高管团队的稳定显著降低了企业杠杆操纵程度,且内部控制质量在其中发挥了中介作用。研究结论丰富了杠杆操纵及高管团队稳定性的相关研究,为从企业内部防范上市公司杠杆操纵行为提供一定的思路。 展开更多
关键词 高管团队稳定性 杠杆操纵 内部控制质量 降杠杆
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部