期刊文献+
共找到442篇文章
< 1 2 23 >
每页显示 20 50 100
Exploitable wave energy assessment based on ERA-Interim reanalysis data—A case study in the East China Sea and the South China Sea 被引量:11
1
作者 WAN Yong ZHANG Jie +1 位作者 MENG Junmin WANG Jing 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2015年第9期143-155,共13页
Wave energy resources assessment is a very important process before the exploitation and utilization of the wave energy. At present, the existing wave energy assessment is focused on theoretical wave energy conditions... Wave energy resources assessment is a very important process before the exploitation and utilization of the wave energy. At present, the existing wave energy assessment is focused on theoretical wave energy conditions for interesting areas. While the evaluation for exploitable wave energy conditions is scarcely ever performed. Generally speaking, the wave energy are non-exploitable under a high sea state and a lower sea state which must be ignored when assessing wave energy. Aiming at this situation, a case study of the East China Sea and the South China Sea is performed. First, a division basis between the theoretical wave energy and the exploitable wave energy is studied. Next, based on recent 20 a ERA-Interim wave field data, some indexes including the spatial and temporal distribution of wave power density, a wave energy exploitable ratio, a wave energy level, a wave energy stability, a total wave energy density, the seasonal variation of the total wave energy and a high sea condition frequency are calculated. And then the theoretical wave energy and the exploitable wave energy are compared each other; the distributions of the exploitable wave energy are assessed and a regional division for exploitable wave energy resources is carried out; the influence of the high sea state is evaluated. The results show that considering collapsing force of the high sea state and the utilization efficiency for wave energy, it is determined that the energy by wave with a significant wave height being not less 1 m or not greater than 4 m is the exploitable wave energy. Compared with the theoretical wave energy, the average wave power density, energy level, total wave energy density and total wave energy of the exploitable wave energy decrease obviously and the stability enhances somewhat. Pronounced differences between the theoretical wave energy and the exploitable wave energy are present. In the East China Sea and the South China Sea, the areas of an abundant and stable exploitable wave energy are primarily located in the north-central part of the South China Sea, the Luzon Strait, east of Taiwan, China and north of Ryukyu Islands; annual average exploitable wave power density values in these areas are approximately 10-15 kW/m; the exploitable coefficient of variation (COV) and seasonal variation (SV) values in these areas are less than 1.2 and 1, respectively. Some coastal areas of the Beibu Gulf, the Changjiang Estuary, the Hangzhou Bay and the Zhujiang Estuary are the poor areas of the wave energy. The areas of the high wave energy exploitable ratio is primarily in nearshore waters. The influence of the high sea state for the wave energy in nearshore waters is less than that in offshore waters. In the areas of the abundant wave energy, the influence of the high sea state for the wave energy is prominent and the utilization of wave energy is relatively difficult. The developed evaluation method may give some references for an exploitable wave energy assessment and is valuable for practical applications. 展开更多
关键词 wave energy assessment ERA-Interim reanalysis data exploitable wave energy theoretical waveenergy wave power density high sea state
在线阅读 下载PDF
Assessment of the exploitable biomass of thread herring(Opisthonema spp.)in northwestern Mexico
2
作者 Marcelino Ruiz-Dominguez Casimiro Quinonez-Velazquez +2 位作者 Dana Isela Arizmendi-Rodriguez Victor Manuel Gomez-Munoz Manuel Otilio Nevarez-Martinez 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2021年第9期53-65,共13页
In recent years,the small pelagic fishery on the Pacific northwest coast of Mexico has significantly increased fishing pressure on thread herring Opisthonema spp.This fishery is regulated using a precautionary approac... In recent years,the small pelagic fishery on the Pacific northwest coast of Mexico has significantly increased fishing pressure on thread herring Opisthonema spp.This fishery is regulated using a precautionary approach(acceptable biological catch(ABC)and minimum catch size).However,due to fishing dynamics,fish aggregation habits and increased fishing mortality,periodic biomass assessments are necessary to estimate ABC and assess the resource status.The Catch-MSY approach was used to analyze historical series of thread herring catches off the western Baja California Sur(BCS,1981–2018)and the Gulf of California(GC,1972–2018)to estimate exploitable biomass and target reference points in order to obtain catch quotas.According to the results,in GC,the maximum biomass reached in 1972(at the beginning of fishery)and minimum biomass reached in 2015;the estimated exploitable biomass for 2019 was 42.2×10^(4) t;and the maximum sustainable yield(MSY)was 15.4×10^(4) t.In the western BCS coast,the maximum biomass was reached in 1981(at the beginning of fishery)and minimum biomass was reached in 2017;the estimated exploitable biomass for 2019 was 3.2×10^(4) t;and the MSY was 1.2×10^(4) t.Both stocks showed a decrease in biomass over the past years and were currently near to point of full exploitation.The results suggest that the use of the Catch-MSY method is suitable to obtain annual biomass estimates,in order to establish an ABC,to know the current state of the resource,and to avoid overcoming the potential recovery of the stocks. 展开更多
关键词 Catch-MSY thread herring exploitable biomass estimate
在线阅读 下载PDF
ESTIMATION OF THEORETICAL POTENTIAL AND EXPLOITABLE QUANTITY OF CHINA'S OCEANIC THERMAL ENERGY
3
作者 Wu Wen Jiang Wenhao Research Professor, Guangzhou Institute of Energy Conversion, Academia Sinica, Guangzhou Research Associate, Guangzhou Institute of Energy Conversion, Academia Sinica, Guangzhou 《China Ocean Engineering》 SCIE EI 1989年第2期243-256,共14页
Two estimaton methods are used to calculate the theoretical reservoir potential of China's oceanic thermal energy. One is based on the measured temperature difference between the surface water and the deep water, ... Two estimaton methods are used to calculate the theoretical reservoir potential of China's oceanic thermal energy. One is based on the measured temperature difference between the surface water and the deep water, the other on the net radiation energy income from solar insolation either measured or deduced. The results from these two methods are compared and examined. Then, the maximum amount of the exploitable thermal energy is calculated based on the assumption of a Carnot cycle efficiency. In the process of estimation, such factors as water depth, seasonal water temperature variation and geographic location have been taken into account.The theoretical reservoir capacity and the exploitable quantity of the thermal energy of China's four seas are thus estimated separately. 展开更多
关键词 CYCLE ESTIMATION OF THEORETICAL POTENTIAL AND exploitable QUANTITY OF CHINA’S OCEANIC THERMAL ENERGY
在线阅读 下载PDF
3-D VARIABLE PARAMETER NUMERICAL MODEL FOR EVALUATION OF THE PLANNED EXPLOITABLE GROUNDWATER RESOURCE IN RE-GIONAL UNCONSOLIDATED SEDIMENTS 被引量:6
4
作者 LUO Zu-jiang WANG Yan 《Journal of Hydrodynamics》 SCIE EI CSCD 2012年第6期959-968,共10页
In order to correctly evaluate the exploitable groundwater resottrce in regional complex, thick Quaternary unconsolidated sediments, the whole Quaternary unconsolidated sediments are considered as a unified hydrogeolo... In order to correctly evaluate the exploitable groundwater resottrce in regional complex, thick Quaternary unconsolidated sediments, the whole Quaternary unconsolidated sediments are considered as a unified hydrogeological unit and a 3-D unsteady groundwater flow numerical model is adopted. Meanwhile, with the consideration of the dynamic changes of the porosity, the hydraulic conductivity and the specific storage with the groundwater level dropping during the exploitation process, an improved composite element seepage matrix adjustment method is applied to solve the unsteady flow problem of free surface. In order to eva- luate the exploitable groundwater resource in Cangzhou, Hebei Province, the hydrogeological conceptual model of Cangzhou is generalized to establish, a 3-D variable parameter numerical model of Cangzhou. Based on the prediction of the present groundwater exploitation, and by adjusting the groundwater exploitation layout, the exploitable groundwater resource is predicted. The model enjoys features like good convergence, good stability and high precision. 展开更多
关键词 exploitable quantity of groundwater resource variable parameters free surface 3-D numerical model
原文传递
Conserving threatened plant species with widespread distribution:A case study of lethal utilization of anticancer Nothapodytes trees in Asia
5
作者 Bishal Gurung Yan Zeng +6 位作者 Jia Tang Xing-Rong Peng Yu-Lin Xu Feng-Mao Yang Xiang-Hai Cai Jia Ge Gao Chen 《Plant Diversity》 2026年第1期1-15,共15页
The global burden of cancer,with over 19 million new cases annually,underscores the urgent need for effective therapies.Among the most promising anticancer compounds is camptothecin(CPT),a monoterpene alkaloid predomi... The global burden of cancer,with over 19 million new cases annually,underscores the urgent need for effective therapies.Among the most promising anticancer compounds is camptothecin(CPT),a monoterpene alkaloid predominantly derived from Nothapodytes species.Despite its significantpharmaceutical value,the exploitation of such Threatened Plant Species with Widespread Distribution(TPSWD),particularly driven by the global demand for natural compounds in anticancer therapies,presents a paradox in which their widespread distribution fails to ensure their secure conservation status.Furthermore,the lack of in-depth biogeographic and systematic studies complicates efforts to balance resource utilization with biodiversity preservation.The asymmetric distribution of CPT within plant taxa,along with limited knowledge of its biosynthetic pathways and the enzymes and genes involved,further hampers sustainable production.Here,we review the current knowledge on the production and protection of Nothapodytes,focusing on their plant resources,active ingredients,and natural drug derivatives.We also explore strategies for rescuing and sustainably utilizing Nothapodytes,including biotechnological advancements and integrated conservation practices.Finally,we propose future directions to address conservation challenges,ensuring a sustainable supply of CPT while safeguarding these TPSWD species. 展开更多
关键词 Anticancer compounds Cancer Nothapodytes CAMPTOTHECIN TPSWD exploitation
在线阅读 下载PDF
Mineral resources of Asia continent:Resource endowment,mining industry pattern,and contributions to the world economy
6
作者 Xi-feng Chen Gang Wang +2 位作者 Yan-xiong Mei Hai-jie Zhao Yan-yun Ma 《China Geology》 2026年第1期1-24,共24页
Mineral resources in Asia continent and its mining industry play a significant role in the economic growth and industrialization of both Asia and the world.Asia continent boasts the most comprehensive kinds of mineral... Mineral resources in Asia continent and its mining industry play a significant role in the economic growth and industrialization of both Asia and the world.Asia continent boasts the most comprehensive kinds of minerals,with reserves of at least 38 of over 80 widely used minerals worldwide accounting for more than30%of the global total reserves.Asia continent experienced three main tectonic evolution and mineralization stages:The Precambrian,the Paleozoic,and the Mesozoic to Cenozoic.The abundant mineral resources in this continent can be divided into seven first-order metallogenic belts(metallogenic domains),18 second-order metallogenic belts(metallogenic provinces),61 third-order metallogenic belts(metallogenic zones),and nine main minerogenetic series.Asia continent exhibits the most significant metallogenic specialization among all continents.Specifically,granite belts of Asia continent manifest pronounced metallogenic specialization of tin,rare metals,and porphyry Cu-Au-Mo deposits.Its maficultramafic rock belts and ophiolite belts display notable metallogenic specialization of lateritic nickel deposits and magmatic type chromite deposits,while its Mesozoic to Cenozoic basalt belts show remarkable metallogenic specialization of lateritic bauxite deposits.Consequently,many giant metallogenic belts were formed,including the Southeast Asian tin belt,the Qinghai-Xizang Plateau rare metal metallogenic belt,the Tethyan porphyry Cu-Au-Mo metallogenic belt,the circum-Pacific porphyry Cu-Au-Mo metallogenic belt,the Southeast Asian lateritic bauxite metallogenic belt,the Deccan Plateau lateritic bauxite metallogenic belt in India,the Southeast Asian lateritic nickel metallogenic belt,and the Tethyan magmatic type chromite metallogenic belt—all of which are significant metallogenic belts in Asia continent.Future mineral exploration in Asia should focus primarily on the Precambrian mineralization of ancient cratons,the Paleozoic mineralization of the Central Asian-Mongolian orogenic belt,and the Mesozoic to Cenozoic mineralization of the Tethyan and circum-Pacific mobile belts.Asia's mining industry not only underpins its own economic growth but also propels global economic development and industrialization,contributing significantly to the world economy.Asia boasts the highest production value of minerals,the largest annual production of minerals,and the greatest trade value of mineral products among all the continents,having emerged as the trade center of global mineral products and the center of the mining industry economy.China is identified as one of the few countries that possess the most comprehensive kinds of minerals,and its mining industry has supported and driven the economic development and industrialization of Asia and even the world.Standing as the largest mineral producer worldwide,China ranked first in the production of 28 mineral commodities in the world in 2022.Besides,China exhibits the highest annual production value of minerals and the largest trade value of mineral products among all countries.Therefore,China's demand for global mineral products influences the global supply and demand patterns of minerals and the world economic situation. 展开更多
关键词 Mineral resource endowment Minerogenetic series Metallogenic specialization Carbonate-type REE deposits Weathering-type REE deposits Hard rock-type lithium deposits Laterite nickel deposits Crystalline graphite deposits Magmatic nickel deposits Significant metallogenic belt Mining industry development pattern Mineral exploration and exploitation World economy Contribution Asia continent
在线阅读 下载PDF
From proof-of-concept to exploitable 被引量:1
7
作者 Yan Wang WeiWu +3 位作者 Chao Zhang Xinyu Xing Xiaorui Gong Wei Zou 《Cybersecurity》 CSCD 2019年第1期189-213,共25页
Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and sign... Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and significant manual efforts.To address this issue,automated techniques can be adopted.Existing solutions usually explore in depth the crashing paths,i.e.,paths taken by proof-of-concept(PoC)inputs triggering vulnerabilities,and assess exploitability by finding exploitable states along the paths.However,exploitable states do not always exist in crashing paths.Moreover,existing solutions heavily rely on symbolic execution and are not scalable in path exploration and exploit generation.In this paper,we propose a novel solution to generate exploit for userspace programs or facilitate the process of crafting a kernel UAF exploit.Technically,we utilize oriented fuzzing to explore diverging paths from vulnerability point.For userspace programs,we adopt a control-flow stitching solution to stitch crashing paths and diverging paths together to generate exploit.For kernel UAF,we leverage a lightweight symbolic execution to identify,analyze and evaluate the system calls valuable and useful for exploiting vulnerabilities.We have developed a prototype system and evaluated it on a set of 19 CTF(capture the flag)programs and 15 realworld Linux kernel UAF vulnerabilities.Experiment results showed it could generate exploit for most of the userspace test set,and it could also facilitate security mitigation bypassing and exploitability evaluation for kernel test set. 展开更多
关键词 EXPLOIT VULNERABILITY Taint analysis FUZZING Symbolic execution
原文传递
From proof-of-concept to exploitable
8
作者 Yan Wang WeiWu +3 位作者 Chao Zhang Xinyu Xing Xiaorui Gong Wei Zou 《Cybersecurity》 2018年第1期464-488,共25页
Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and sign... Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and significant manual efforts.To address this issue,automated techniques can be adopted.Existing solutions usually explore in depth the crashing paths,i.e.,paths taken by proof-of-concept(PoC)inputs triggering vulnerabilities,and assess exploitability by finding exploitable states along the paths.However,exploitable states do not always exist in crashing paths.Moreover,existing solutions heavily rely on symbolic execution and are not scalable in path exploration and exploit generation.In this paper,we propose a novel solution to generate exploit for userspace programs or facilitate the process of crafting a kernel UAF exploit.Technically,we utilize oriented fuzzing to explore diverging paths from vulnerability point.For userspace programs,we adopt a control-flow stitching solution to stitch crashing paths and diverging paths together to generate exploit.For kernel UAF,we leverage a lightweight symbolic execution to identify,analyze and evaluate the system calls valuable and useful for exploiting vulnerabilities.We have developed a prototype system and evaluated it on a set of 19 CTF(capture the flag)programs and 15 realworld Linux kernel UAF vulnerabilities.Experiment results showed it could generate exploit for most of the userspace test set,and it could also facilitate security mitigation bypassing and exploitability evaluation for kernel test set. 展开更多
关键词 EXPLOIT VULNERABILITY Taint analysis FUZZING Symbolic execution
原文传递
Water storage in underground mined-out space as a geothermal reservoir:Heat extraction performance and temperature evolution 被引量:1
9
作者 Cunli Zhu Yuejin Zhou +2 位作者 Jixiong Zhang Meng Li Zhen Li 《International Journal of Mining Science and Technology》 2025年第12期2089-2105,共17页
As mining depth increases,the temperature of the surrounding rock rises,drawing global attention to the potential for geothermal energy extraction from high-temperature water stored in collapsed rock masses-a prospect... As mining depth increases,the temperature of the surrounding rock rises,drawing global attention to the potential for geothermal energy extraction from high-temperature water stored in collapsed rock masses-a prospect that offers both promise and challenges.In response,this study proposes a functional backfilling method using mining solid waste to construct a high-porosity heat extraction space.The research integrates experiments,theoretical analysis,and simulations to examine the mechanical and permeability properties of solid waste backfill materials.It further aims to elucidate how flow velocity and initial temperature influence the evolution of the temperature field and the thermal performance.Results indicate that the backfill material achieves optimal mechanical strength with a glass fiber content of 10‰ and a length of 6 mm.Furthermore,the permeability of the solid waste backfill demonstrates a quadratic relationship with both axial and confining pressure.During the recovery stage,the temperature in the heat extraction space remains lower than that of the surrounding rock,with geothermal energy being extracted via convective heat transfer between the water medium and the rock.The amount of heat extracted shows a positive correlation with the flow velocity of the water medium and a negative correlation with its initial temperature. 展开更多
关键词 Mine geothermal energy Heat transfer mechanism Water storage and geothermal exploiting Deep mine space utilization
在线阅读 下载PDF
Barber Optimization Algorithm:A New Human-Based Approach for Solving Optimization Problems
10
作者 Tareq Hamadneh Belal Batiha +8 位作者 Omar Alsayyed Widi Aribowo Zeinab Montazeri Mohammad Dehghani Frank Werner Haider Ali Riyadh Kareem Jawad Ibraheem Kasim Ibraheem Kei Eguchi 《Computers, Materials & Continua》 2025年第5期2677-2718,共42页
In this study,a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm(BaOA).Inspired by the human interactions ... In this study,a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm(BaOA).Inspired by the human interactions between barbers and customers,BaOA captures two key processes:the customer’s selection of a hairstyle and the detailed refinement during the haircut.These processes are translated into a mathematical framework that forms the foundation of BaOA,consisting of two critical phases:exploration,representing the creative selection process,and exploitation,which focuses on refining details for optimization.The performance of BaOA is evaluated using 52 standard benchmark functions,including unimodal,high-dimensional multimodal,fixed-dimensional multimodal,and the Congress on Evolutionary Computation(CEC)2017 test suite.This comprehensive assessment highlights BaOA’s ability to balance exploration and exploitation effectively,resulting in high-quality solutions.A comparative analysis against twelve widely known metaheuristic algorithms further demonstrates BaOA’s superior performance,as it consistently delivers better results across most benchmark functions.To validate its real-world applicability,BaOA is tested on four engineering design problems,illustrating its capability to address practical challenges with remarkable efficiency.The results confirm BaOA’s versatility and reliability as an optimization tool.This study not only introduces an innovative algorithm but also establishes its effectiveness in solving complex problems,providing a foundation for future research and applications in diverse scientific and engineering domains. 展开更多
关键词 Optimization METAHEURISTIC barber HAIRSTYLE human-based algorithm exploration EXPLOITATION
在线阅读 下载PDF
Economic abuse as a female battering form:A cross-sectional study among physicians and nurses
11
作者 Elif Sarac Deniz Odabas 《World Journal of Psychiatry》 2025年第12期297-308,共12页
BACKGROUND Economic violence is a type of domestic violence in which an intimate partner attempts to oppress,restrict,or direct a female by exercising control over her financial resources.AIM To explore the impact of ... BACKGROUND Economic violence is a type of domestic violence in which an intimate partner attempts to oppress,restrict,or direct a female by exercising control over her financial resources.AIM To explore the impact of economic abuse on individual work performance and clarify the effective factors on financial exploitation among physicians and nurses.METHODS The study has a cross-sectional design,and 305 married,female physicians and nurses working in a university hospital were included.Data was collected with demographic characteristics forms,“Revised Scale of Economic Abuse”and“Individual Work Performance Questionnaire”.Pearson correlation,comparative analyses,and internal consistency reliability tests were used.RESULTS The average age was 39.04±9.41.Among the respondents 69.2%were nurses and 63.9%held a bachelor’s degree.The mean score for the Revised Scale of Economic Abuse was 2.80±4.73 while it was 3.86±0.60 for the Individual Work Performance Questionnaire.CONCLUSION Our study revealed no relationship between economic abuse and individual work performance,confirming that nurses are exposed to more economic abuse and exploitation than physicians and exhibit higher work performance. 展开更多
关键词 MARRIED FEMALE Physician Nurse Economic exploitation Restriction Work performance
暂未订购
From Serfdom to Freedom
12
作者 Li Nan 《China's Tibet》 2025年第3期10-14,共5页
Padma was 17 when the democratic reform was introduced in Xizang in 1959.Before the reform,the region had been ruled by feudal serfdom under a theocracy for centuries.Nearly one million serfs were subjected to estate-... Padma was 17 when the democratic reform was introduced in Xizang in 1959.Before the reform,the region had been ruled by feudal serfdom under a theocracy for centuries.Nearly one million serfs were subjected to estate-holders'cruel exploitation and oppression.Padma was one of them. 展开更多
关键词 SERFDOM democratic reform EXPLOITATION Xizang THEOCRACY FEUDALISM feudal serfdom FREEDOM
在线阅读 下载PDF
A Novel Approach Based on Recuperated Seed Search Optimization for Solving Mechanical Engineering Design Problems
13
作者 Sumika Chauhan Govind Vashishtha +1 位作者 Riya Singh Divesh Bharti 《Computer Modeling in Engineering & Sciences》 2025年第7期309-343,共35页
This paper introduces a novel optimization approach called Recuperated Seed Search Optimization(RSSO),designed to address challenges in solving mechanical engineering design problems.Many optimization techniques strug... This paper introduces a novel optimization approach called Recuperated Seed Search Optimization(RSSO),designed to address challenges in solving mechanical engineering design problems.Many optimization techniques struggle with slow convergence and suboptimal solutions due to complex,nonlinear natures.The Sperm Swarm Optimization(SSO)algorithm,which mimics the sperm’s movement to reach an egg,is one such technique.To improve SSO,researchers combined it with three strategies:opposition-based learning(OBL),Cauchy mutation(CM),and position clamping.OBL introduces diversity to SSO by exploring opposite solutions,speeding up convergence.CM enhances both exploration and exploitation capabilities throughout the optimization process.This combined approach,RSSO,has been rigorously tested on standard benchmark functions,real-world engineering problems,and through statistical analysis(Wilcoxon test).The results demonstrate that RSSO significantly outperforms other optimization algorithms,achieving faster convergence and better solutions.The paper details the RSSO algorithm,discusses its implementation,and presents comparative results that validate its effectiveness in solving complex engineering design challenges. 展开更多
关键词 Local search Cauchy mutation opposition-based learning EXPLORATION EXPLOITATION
在线阅读 下载PDF
Review of artificial intelligence applications in geothermal energy extraction from hot dry rock
14
作者 Kun Ji Hong Li +3 位作者 Yu Zhao Kaoshan Dai Sai Liu Chun'an Tang 《Deep Underground Science and Engineering》 2025年第4期651-672,共22页
The geothermal resources in hot dry rock(HDR)are considered the future trend in geothermal energy extraction due to their abundant reserves.However,exploitation of the resources is fraught with complexity and technica... The geothermal resources in hot dry rock(HDR)are considered the future trend in geothermal energy extraction due to their abundant reserves.However,exploitation of the resources is fraught with complexity and technical challenges arising from their unique characteristics of high temperature,high strength,and low permeability.With the continuous advancement of artificial intelligence(AI)technology,intelligent algorithms such as machine learning and evolutionary algorithms are gradually replacing or assisting traditional research methods,providing new solutions for HDR geothermal resource exploitation.This study first provides an overview of HDR geothermal resource exploitation technologies and AI methods.Then,the latest research progress is systematically reviewed in AI applications in HDR geothermal reservoir characterization,deep drilling,heat production,and operational parameter optimization.Additionally,this study discusses the potential limitations of AI methods in HDR geothermal resource exploitation and highlights the corresponding opportunities for AI's application.Notably,the study proposes the framework of an intelligent HDR exploitation system,offering a valuable reference for future research and practice. 展开更多
关键词 ALGORITHM artificial intelligence hot dry rock intelligent exploitation system OPTIMIZATION PREDICTION
原文传递
Gender-based economic violence and the exploitation of women:A deep dive
15
作者 Elif Sarac Deniz Odabas 《World Journal of Psychiatry》 2025年第3期58-65,共8页
Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of g... Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of gender-based violence.With definitions of economic violence broadening to encompass a range of coercive and manipulative behaviors-from financial abuse in domestic violence scenarios to the economic harassment faced by stay-at-home moms-understanding this form of exploitation is crucial for crafting effective interventions.This article aims to delve into various facets of economic violence,including its definition,prevalence,and the stark realities it creates for its victims.Following the search of international databases:Social Work Abstracts(EBSCO),Psychology Abstracts,Family and Women Studies Worldwide,Psychiatry Online,Psych INFO(including Psych ARTICLES),PubMed,Wiley,and Scopus,60 peer-reviewed articles that met all inclusion criteria were included in the paper.Our review clarifies that looking forward,the call for a comprehensive understanding of economic violence,enhanced legal frameworks,and the strengthening of supportive networks underscore the multidisciplinary approach required to combat this issue effectively. 展开更多
关键词 Gender based Domestic violence Economic violence EXPLOITATION WOMEN
暂未订购
Unveiling the dark side of leadership:How exploitative leadership undermines employees’work-related flow
16
作者 Lingnan Kong Nuo Chen +1 位作者 Ruiqi Wang Shunkun Yu 《Journal of Psychology in Africa》 2025年第3期335-343,共9页
This study examined how exploitative leadership undermines employees’experience of flow with work role overload and traditionalist values.Data were collected from 361 staff members across diverse industries in China(... This study examined how exploitative leadership undermines employees’experience of flow with work role overload and traditionalist values.Data were collected from 361 staff members across diverse industries in China(females=58.17%,mean age=32.14,SD=5.83).Structural equation modeling results indicated that exploitative leadership reduces employees’work-related flow via increased role overload.Furthermore,employees’traditionality level moderates the exploitative leadership effects on role overload.Specifically,employees with higher traditionality reported lower role overload when experiencing exploitative leadership,suggesting that cultural values may buffer its negative impact.This study contributes to understanding the mechanism and contextual factors linking exploitative leadership to work-related flow,filling a gap in the literature.Organizations are encouraged to reduce exploitative leadership behaviors through leadership development programs and to consider employees’value orientations when designing work environments. 展开更多
关键词 exploitative leadership role overload work-related flow traditionality
在线阅读 下载PDF
Patterns in Heuristic Optimization Algorithms: A Comprehensive Analysis
17
作者 Robertas Damasevicius 《Computers, Materials & Continua》 2025年第2期1493-1538,共46页
Heuristic optimization algorithms have been widely used in solving complex optimization problems in various fields such as engineering,economics,and computer science.These algorithms are designed to find high-quality ... Heuristic optimization algorithms have been widely used in solving complex optimization problems in various fields such as engineering,economics,and computer science.These algorithms are designed to find high-quality solutions efficiently by balancing exploration of the search space and exploitation of promising solutions.While heuristic optimization algorithms vary in their specific details,they often exhibit common patterns that are essential to their effectiveness.This paper aims to analyze and explore common patterns in heuristic optimization algorithms.Through a comprehensive review of the literature,we identify the patterns that are commonly observed in these algorithms,including initialization,local search,diversity maintenance,adaptation,and stochasticity.For each pattern,we describe the motivation behind it,its implementation,and its impact on the search process.To demonstrate the utility of our analysis,we identify these patterns in multiple heuristic optimization algorithms.For each case study,we analyze how the patterns are implemented in the algorithm and how they contribute to its performance.Through these case studies,we show how our analysis can be used to understand the behavior of heuristic optimization algorithms and guide the design of new algorithms.Our analysis reveals that patterns in heuristic optimization algorithms are essential to their effectiveness.By understanding and incorporating these patterns into the design of new algorithms,researchers can develop more efficient and effective optimization algorithms. 展开更多
关键词 Heuristic optimization algorithms design patterns INITIALIZATION local search diversity maintenance ADAPTATION STOCHASTICITY exploration EXPLOITATION search space metaheuristics
在线阅读 下载PDF
Linking proactive personality to strengths use: The mediator of psychological safety and the moderator of exploitative leadership
18
作者 Wenyin Yang Zhijie Xu Yang Liu 《Journal of Psychology in Africa》 2025年第1期43-49,共7页
Drawing upon the Conservation of Resources theory,this study investigated the relationship between proactive personality and strengths use,as well as the mediating role of psychological safety and the moderating role ... Drawing upon the Conservation of Resources theory,this study investigated the relationship between proactive personality and strengths use,as well as the mediating role of psychological safety and the moderating role of exploitative leadership within this relationship.Data were collected from 368 employees(females=57.61%;mean age=32.35;SD=6.31)working in various organizations in China at two points in time with a two-week interval.We conducted structural equation modeling and a moderated mediation path analysis to test our hypotheses.The results demonstrated that proactive personality is positively related to strengths use and psychological safety partially mediates the association of proactive personality and strengths use.Furthermore,this study also found that exploitative leadership weakens the direct relationship between proactive personality and psychological safety and the indirect relationship of proactive personality with strengths use through psychological safety.This study identified the underlying mechanisms between proactive personality and strengths use. 展开更多
关键词 proactive personality psychological safety exploitative leadership strengths use
在线阅读 下载PDF
A novel permeability calculation model to simultaneously quantify the impacts of pore and fracture with full feature size
19
作者 Minghui Li Banghong Zhang +4 位作者 Zhouqian Wu Shaochen Luo Jun Lu Dongming Zhang Heping Xie 《International Journal of Mining Science and Technology》 2025年第4期609-618,共10页
The permeability of rocks is of utmost importance in the exploitation of deep geological resources.Current characterizations of rock permeability typically consider the influence of either pores or fractures alone.How... The permeability of rocks is of utmost importance in the exploitation of deep geological resources.Current characterizations of rock permeability typically consider the influence of either pores or fractures alone.However,deep reservoir rock formations are subjected to complex environments with coupling of high temperature and stress.As a result,deep reservoir rocks possess a complex structure comprising of pores and fractures,making it challenging to understand their impact on permeability.Comprehending this relationship is vital for the secure and efficient exploitation of deep geological resources.This study presents a permeability calculation model that enables simultaneously quantify the impacts of pore and fracture with full feature size.The model independently considers large-scale fractures’fractal properties and tortuosity while also addressing the distribution and size of small-scale pores.A tortuosity expression that incorporates the effects of thermal damage has been developed using the pore geometric elasticity method.Considering the distinct contributions of pores and fractures to rock permeability,a comprehensive rock permeability calculation model is established.This model has two main strengths:it thoroughly characterizes the influence of pore structures on permeability at multiple scales and precisely details how fractal attributes of fractures affect permeability.To validate the applicability of the model,this study conducted seepage experiments and microscopic observations,capturing the variations in permeability under thermo-mechanical coupling,while quantifying the geometric characteristics and spatial distribution of pores and fractures within the rock.By comparing the measured permeability results,the theoretical values demonstrated a commendable fit.In comparison to previous models,this innovative approach more accurately captures various flow characteristics of the rock under the influence of thermo-mechanical coupling. 展开更多
关键词 Hot dry rock Geothermal exploitation PERMEABILITY Fracture-pore microstructure
在线阅读 下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部