160 research outputs found
Professional culture as vector of success
У статті розглянуто професійну культура як вектор формування успішної професійної самореалізації. На базі теоретичних матеріалів проаналізовано етимологію і визначення поняття «культура» дослідниками, сформульовано визначення поняття «професійна культура», розглянуто специфіку професійної культури та виділено її елементи. Визначено та охарактеризовано зміст та умови формування професійної культури вчителя, рівні сформованості професійної культури сучасного фахівця – низький, середній, високий. Підкреслюється роль майбутніх фахівців в якості суб'єкта професійної культури, які в процесі професійної діяльності реалізовують та створюють соціокультурні цінності. Ключові слова: діяльність, суспільство, особистість, професійна культура, рівні сформованості, майбутні фахівці.The article considers professional culture as a vector of formation of successful professional self-fulfillment. On the basis of theoretical material, is analyzed the etymology and definition of the phenomenon “culture” given by researchers, formulated the definition of “professional culture”, the specificity of professional culture and its elements are highlighted. The author defines and characterizes the contents and conditions of formation of the professional culture of teachers, levels of professional culture of modern specialist – low, medium and high. It is emphasized the role of future professionals as the subject of professional culture who in the professional activity implement and create socio-cultural values. Keywords: activity, personality, professional culture, levels of culture, future specialist
SaaS: A situational awareness and analysis system for massive android malware detection
A large amount of mobile applications (Apps) are uploaded, distributed and updated in various Android markets, e.g., Google Play and Huawei AppGallery every day. One of the ongoing challenges is to detect malicious Apps (also known as malware) among those massive newcomers accurately and efficiently in the daily security management of Android App markets. Customers rely on those detection results in the selection of Apps upon downloading, and undetected malware may result in great damages. In this paper, we propose a cloud-based malware detection system called SaaS by leveraging and marrying multiple approaches from diverse domains such as natural language processing (n-gram), image processing (GLCM), cryptography (fuzzy hash), machine learning (random forest) and complex networks. We firstly extract n-gram features and GLCM features from an App's smali code and DEX file, respectively. We next feed those features into training data set, to create a machine learning detect model. The model is further enhanced by fuzzy hash to detect whether inspected App is repackaged or not. Extensive experiments (involving 1495 samples) demonstrates that the detecting accuracy is more than 98.5%, and support a large-scale detecting and monitoring. Besides, our proposed system can be deployed as a service in clouds and customers can access cloud services on demand
Corrosion Performance of Embedded Steel Bar in Cl--contaminated Limestone Calcined Clay Cement (LC3) at initial stage of hydration
Limestone Calcined Clay Cement (LC3) presents brilliant properties in binding Cl- so that the embedded steel bars are probably protected in Cl--contaminated condition, which meets the need of sea sand application. However, the corrosion performance of steel bars embedded in LC3 paste with Cl‑ is unclear, especially in early age hydration. Thus, a series of experiments were carried out to evaluate the corrosion performance of steel bars on initial and hardened stages of hydration, including concentration of OH- and Cl- in real pore solution, open circuit potential (OCP) and chemical elements of steel bars. In terms of early age hydration, the OCP of steel bars and ions concentration in pore solution indicated that both specimens embedded in PC and LC3 pastes were at a highly corrosion state, however, elemental results showed that no obvious corrosion happened at this stage. With respect to hardened age hydration, visual corrosion could be seen on PC-embedded steel bars, with more Fe3+ and O2-, in comparison with LC3-embedded one, which was related to the much lower absolute OCP and Cl- concentration in pore solution. Overall, LC3 cement demonstrates protective effect on steel bar in special contaminated-Cl- concentration
Antitumor Activity of cGAMP via Stimulation of cGAS-cGAMP-STING-IRF3 Mediated Innate Immune Response
Immunotherapy is one of the key strategies for cancer treatment. The cGAS-cGAMP-STING-IRF3 pathway of cytosolic DNA sensing plays a pivotal role in antiviral defense. We report that the STING activator cGAMP possesses significant antitumor activity in mice by triggering the STING-dependent pathway directly. cGAMP enhances innate immune responses by inducing production of cytokines such as interferon-β, interferon-γ, and stimulating dendritic cells activation, which induces the cross-priming of CD8(+) T cells. The antitumor mechanism of cGAMP was verified by STING and IRF3, which were up-regulated upon cGAMP treatment. STING-deficiency dramatically reduced the antitumor effect of cGAMP. Furthermore, cGAMP improved the antitumor activity of 5-FU, and clearly reduced the toxicity of 5-FU. These results demonstrated that cGAMP is a novel antitumor agent and has potential applications in cancer immunotherapy
Extraction of instantaneous frequencies for signals with intersecting and intermittent trajectories
A multicomponent signal usually presents multiple trajectories with time-varying frequencies and amplitudes in a time–frequency distribution (TFD). One can extract the ridges corresponding to true signal components and then reconstruct them to recover signal signatures. Most current practices for ridge extraction assume that each trajectory runs throughout the entire time axis without cross-terms. However, this hypothesis is inconsistent with the truth of many measured signals. The increasing application occasions require further consideration of complicated intersecting and intermittent cases. This study addresses this issue and proposes a novel intersecting and intermittent trajectory tracking (IITT) approach. We first develop a data-driven method to effectively isolate peaks from noises in a TFD and generate a dependable peak spectrum. Then, we propose a dynamic optimization tracking function to decide upon the acceptance of the peaks corresponding to an individual component based on the purified spectrum. The IITT approach fully exploits the information from the raw signal without any prior knowledge while promising robustness to the variations of ridge numbers, ridges’ births and deaths, and its continuation and discontinuation. Two simulated and three measured signals are utilized to assess the performance of the proposed IITT. The success elements of the IITT are revealed and discussed in detail at the end of the paper
5 x 20 Gb/s III-V on silicon electroabsorption modulator array heterogeneously integrated with a 1.6nm channel-spacing silicon AWG
We demonstrate a five-channel wavelength division multiplexed modulator module that heterogeneously integrates a 1.6nm channel-spacing arrayed-waveguide grating and a 20Gbps electroabsorption modulator array, showing the potential for 100 Gbps capacity on a 1.5x0.5 mm(2) footprint
- …