586 research outputs found

    An Inquiry Into the Cultivation of Teachers’ Critical Thinking in Teacher Education and Teacher Professional Development Projects

    Get PDF
    Teacher education and teacher professional development programs often focus on the reinforcement of explicit knowledge, ignoring the improvement of implicit ability, such as critical thinking ability. There should not only be a course titled ‘How to develop critical thinking’, but critical thinking education should be integrated throughout teacher education or development programs. This paper tries to define a teacher’s critical thinking in pedagogical behaviors from the perspective of the role of being a teacher and clarify the connotation of a teacher’s critical thinking ability in his/her pedagogical work, which encompasses a multitude of essential elements, including thinking carefully, determining wisely and reflecting rationally. Corresponding initiatives are incorporated by means of cultivation of the awareness of critical thinking ability, development of critical thinking skills that permeate all aspects of the curriculum and revision of the syllabus and implementation process of training courses through evaluation and feedback

    The impact of cultural diversity and economic growth on the equalization of public cultural services——Empirical test based on spatial econometric model

    Get PDF
    The 13th Five Year Plan of the National Basic Public Service System plays an important role in promoting the equalization of basic public services in urban and rural areas. Based on the panel data of 242 prefecture level cities in 30 provinces of China from 2008 to 2018, this paper uses the spatial econometric model for empirical analysis. The study finds that the direct effect of cultural diversity on the equalization of public cultural services is negative and significant, that is, cultural diversity hinders the equalization of public cultural services in the region; the overall effect of economic growth on the equalization of public cultural services is positive and significant, and economic growth is indeed conducive to the promotion of public cultural services equal development in the region. Based on this, it is proposed that local governments should establish a differentiated supply system of public cultural products to effectively integrate local cultural resources, talents, volunteers and social organizations. We will increase financial investment in public cultural services and use government purchases to promote the gradual equalization of public cultural services in rural areas, border ethnic areas and urban rural fringe areas

    Improved Total Variation based Image Compressive Sensing Recovery by Nonlocal Regularization

    Full text link
    Recently, total variation (TV) based minimization algorithms have achieved great success in compressive sensing (CS) recovery for natural images due to its virtue of preserving edges. However, the use of TV is not able to recover the fine details and textures, and often suffers from undesirable staircase artifact. To reduce these effects, this letter presents an improved TV based image CS recovery algorithm by introducing a new nonlocal regularization constraint into CS optimization problem. The nonlocal regularization is built on the well known nonlocal means (NLM) filtering and takes advantage of self-similarity in images, which helps to suppress the staircase effect and restore the fine details. Furthermore, an efficient augmented Lagrangian based algorithm is developed to solve the above combined TV and nonlocal regularization constrained problem. Experimental results demonstrate that the proposed algorithm achieves significant performance improvements over the state-of-the-art TV based algorithm in both PSNR and visual perception.Comment: 4 Pages, 1 figures, 3 tables, to be published at IEEE Int. Symposium of Circuits and Systems (ISCAS) 201

    Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme

    Get PDF
    Telecare Medicine Information Systems (TMIS) provides flexible and convenient e-health care. However the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.’s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.’s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.’s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes

    A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP

    Get PDF
    Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is sought to enhance the security of SIP. Several attempts have been made to address the tradeoff problem between security and efficiency, but designing a successful authenticated key agreement protocol for SIP is still a challenging task from the viewpoint of both performance and security, because performance and security as two critical factors affecting SIP applications always seem contradictory. In this study, we employ biometrics to design a lightweight privacy preserving authentication protocol for SIP based on symmetric encryption, achieving a delicate balance between performance and security. In addition, the proposed authentication protocol can fully protect the privacy of biometric characteristics and data identity, which has not been considered in previous work. The completeness of the proposed protocol is demonstrated by Gong, Needham, and Yahalom (GNY) logic. Performance analysis shows that our proposed protocol increases efficiency significantly in comparison with other related protocols

    Research and Practice of Blended Teaching Mode Based on Network Teaching Platform—Taking Engine Principles as an Example

    Get PDF
    With the development of Internet information technology, a new educational model of “Internet + education” has emerged[1],It has promoted the reform of the university teaching classroom, and the hybrid teaching mode based on the online teaching platform will also enter the university classroom. In this paper, taking the engine principle course as an example, combines the school situation, teaching situation and learning situation of our school, and builds a hybrid teaching mode based on the online teaching platform. The construction and implementation of blended teaching mode are completed through the analysis of teaching content, teaching environment, teaching situation and teaching evaluation. It breaks the traditional teaching mode of teacher’s one-man show, realizes the dominant role of students and the leading role of teachers, stimulates students’ interest in learning, improves their independent learning ability, and ensures the quality of teaching

    Взаємодія вітамінів В1 і В2 у біосинтезі їх коферментних форм у щурів

    Get PDF
    Білим щурам лінії Вістар внутрішньочеревно вводили окремо або в різних співвідношеннях вітаміни В1 і В2 та вимірювали вплив кожного з них на інтенсивність біосинтезу коферментної форми іншого. Встановлено, що для даної пари вітамінів (В1 і В2 ) існує за цим показником оптимальне співвідношення: за вагою 6:1, за молярністю — 5:1. При цьому були використані дози вітамінів, близькі до фізіологічних (або терапевтичних).The Wistar line white rats were introduced individually or in different ratios vitamins В1 and В2 and measured the influence each of them on intensity of biosynthesis of coenzyme form of the other. It is established that there is an optimum ratio according to this index for this pair of vitamins В1 and В2 : after the weight 6:1, after the molarness — 5:1. The doses of vitamins close to physiological (or therapeutic) were used

    Generative Adversarial Networks Selection Approach for Extremely Imbalanced Fault Diagnosis of Reciprocating Machinery

    Get PDF
    At present, countless approaches to fault diagnosis in reciprocating machines have been proposed, all considering that the available machinery dataset is in equal proportions for all conditions. However, when the application is closer to reality, the problem of data imbalance is increasingly evident. In this paper, we propose a method for the creation of diagnoses that consider an extreme imbalance in the available data. Our approach first processes the vibration signals of the machine using a wavelet packet transform-based feature-extraction stage. Then, improved generative models are obtained with a dissimilarity-based model selection to artificially balance the dataset. Finally, a Random Forest classifier is created to address the diagnostic task. This methodology provides a considerable improvement with 99% of data imbalance over other approaches reported in the literature, showing performance similar to that obtained with a balanced set of data.National Natural Science Foundation of China, under Grant 51605406National Natural Science Foundation of China under Grant 7180104

    Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography

    Get PDF
    In order to provide secure remote access control, a robust and efficient authentication protocol should realize mutual authentication and session key agreement between clients and the remote server over public channels. Recently, Chun-Ta Li proposed a password authentication and user anonymity protocol by using smart cards, and they claimed that their protocol has satisfied all criteria required by remote authentication. However, we have found that his protocol cannot provide mutual authentication between clients and the remote server. To realize ‘real’ mutual authentication, we propose a two-factor remote authentication protocol based on elliptic curve cryptography in this paper, which not only satisfies the criteria but also bears low computational cost. Detailed analysis shows our proposed protocol is secure and more suitable for practical application
    corecore