The collaborative online international learning (COIL) model has been used in language education and other disciplines for over a decade and to date, there has been considerable research into the ...effects of COIL and the factors related to the effects. However, the majority of these studies have generally focused on one or more skills of the student participants, making it difficult for current researchers to see the overall picture of COIL-related research, while a review study of previous research can fill this gap. This review study provides an up-to-date systematic review of research on the positive and negative effects of COIL’s teaching model on students and its influencing factors. On the one hand, this study summaries the effects of COIL on students’ language skills, t non-verbal skills, and affect. On the other hand, the author also provides a brief account of the factors that influence these effects in COIL and the research gaps in COIL. Students have a better language learning environment in the process of COIL. From the perspective of language skills, COIL can improve students’ fundamental language skills, such as listening, speaking, reading, writing, and translation, and the language in real communication. In terms of non-linguistic skills, participants significantly improve their intercultural communication skills and digital literacy through COIL, and improve the 21st century super skills. Students also demonstrate greater emotional gains through COIL, reducing their anxiety about using a second/foreign language to communicate with international peers and increasing their confidence in expressing their views in a language other than their native tongue. Overall, COIL can positively impact students in various aspects and the impacts vary across individual and contextual factors. Research gaps and future research directions are discussed. Also, implications for teachers, students, institutions, and researchers are provided.
During oncogenesis,the hyper-activation of proto-oncogenes and defection of tumor suppressor genes(Zhao et al.,2012,2016a)can regulate cell proliferation,differentiation,apoptosis,and cell-to-cell ...communication(Balmain et al.,2003;Haber and Settleman,2007).Recent evidence has shown that non-coding RNAs, such as microRNAs (miRNAs) (Chen, 2005), and long non- coding RNAs (lncRNAs), can also act as oncogenes to initiate and promote cancer progression.
Power and Resistance Liu, Yining
SHS Web of Conferences,
01/2022, Letnik:
148
Conference Proceeding, Journal Article
Recenzirano
Odprti dostop
This paper analyses the Disney animated film Pocahontas through the lens of Said’s Orientalism and Spivak’s feminism in post-colonial theory. The film represents the interaction of power between the ...coloniser and the colonised people, a rebellion against the Oriental imaginary represented by the Third World people of Pocahontas. As the quintessential representative of the Indian people, such resistance and challenge is of great significance to the forced silence of the Third World people for reflection and self-reconstruction.
The real-time electricity consumption data can be used in value-added service such as big data analysis, meanwhile the single user's privacy needs to be protected. How to balance the data utility and ...the privacy preservation is a vital issue, where the privacy-preserving data aggregation could be a feasible solution. Most of the existing data aggregation schemes rely on a trusted third party (TTP). However, this assumption will have negative impact on reliability, because the system can be easily knocked down by the denial of service attack. In this paper, a practical privacy-preserving data aggregation scheme is proposed without TTP, in which the users with some extent trust construct a virtual aggregation area to mask the single user's data, and meanwhile, the aggregation result almost has no effect for the data utility in large scale applications. The computation cost and communication overhead are reduced in order to promote the practicability. Moreover, the security analysis and the performance evaluation show that the proposed scheme is robust and efficient.
As a next-generation power system, the smart grid can implement fine-grained smart metering data collection to optimize energy utilization. Smart meters face serious security challenges, such as a ...trusted third party or a trusted authority being attacked, which leads to the disclosure of user privacy. Blockchain provides a viable solution that can use its key technologies to solve this problem. Blockchain is a new type of decentralized protocol that does not require a trusted third party or a central authority. Therefore, this paper proposes a decentralized privacy-preserving data aggregation (DPPDA) scheme for smart grid based on blockchain. In this scheme, the leader election algorithm is used to select a smart meter in the residential area as a mining node to build a block. The node adopts Paillier cryptosystem algorithm to aggregate the user’s power consumption data. Boneh-Lynn-Shacham short signature and SHA-256 function are applied to ensure the confidentiality and integrity of user data, which is convenient for billing and power regulation. The scheme protects user privacy data while achieving decentralization, without relying on TTP or CA. Security analysis shows that our scheme meets the security and privacy requirements of smart grid data aggregation. The experimental results show that this scheme is more efficient than existing competing schemes in terms of computation and communication overhead.
As a cellular process that changes epithelial cells to mesenchymal cells, Epithelial-mesenchymal transition (EMT) plays important roles in development and cancer metastasis. Recent studies on cancer ...metastasis have identified many new susceptibility genes that control this transition. However, there is no comprehensive resource for EMT by integrating various genetic studies and the relationship between EMT and the risk of complex diseases such as cancer are still unclear. To investigate the cellular complexity of EMT, we have constructed dbEMT (http://dbemt.bioinfo-minzhao.org/), the first literature-based gene resource for exploring EMT-related human genes. We manually curated 377 experimentally verified genes from literature. Functional analyses highlighted the prominent role of proteoglycans in tumor metastatic cascades. In addition, the disease enrichment analysis provides a clue for the potential transformation in affected tissues or cells in Alzheimer's disease and Type 2 Diabetes. Moreover, the global mutation pattern of EMT-related genes across multiple cancers may reveal common cancer metastasis mechanisms. Our further reconstruction of the EMT-related protein-protein interaction network uncovered a highly modular structure. These results illustrate the importance of dbEMT to our understanding of cell development and cancer metastasis, and also highlight the utility of dbEMT for elucidating the functions of EMT-related genes.
Endogenous regeneration aims to rebuild and reinstate tissue function through enlisting natural self-repairing processes. Promoting endogenous regeneration by reducing tissue-damaging inflammatory ...responses while reinforcing self-resolving inflammatory processes is gaining popularity. In this approach, the immune system is recruited as the principal player to deposit a pro-reparative matrix and secrete pro-regenerative cytokines and growth factors. The natural wound healing cascade involves many immune system players (neutrophils, macrophages, T cells, B cells, etc.) that are likely to play important and indispensable roles in endogenous regeneration. These cells support both the innate and adaptive arms of the immune system and collectively orchestrate host responses to tissue damage. As the early responders during the innate immune response, macrophages have been studied for decades in the context of inflammatory and foreign body responses and were often considered a cell type to be avoided. The view on macrophages has evolved and it is now understood that macrophages should be directly engaged, and their phenotype modulated, to guide the timely transition of the immune response and reparative environment. One way to achieve this is to design immunomodulating biomaterials that can be placed where endogenous regeneration is desired and actively direct macrophage polarization. Upon encountering these biomaterials, macrophages are trained to perform more pro-regenerative roles and generate the appropriate environment for later stages of regeneration since they bridge the innate immune response and the adaptive immune response. This new design paradigm necessitates the understanding of how material design elicits differential macrophage phenotype activation. This review is focused on the macrophage-material interaction and how to engineer biomaterials to steer macrophage phenotypes for better tissue regeneration.
An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting messages for the vehicles on roads. However, as the data are transmitted in an insecure network, it is essential ...to use an authentication mechanism to protect the privacy of vehicle users. Recently, Ying et al. proposed an authentication protocol for IoV and claimed that the protocol could resist various attacks. Unfortunately, we discovered that their protocol suffered from an offline identity guessing attack, location spoofing attack, and replay attack, and consumed a considerable amount of time for authentication. To resolve these shortcomings, we propose an improved protocol. In addition, we provide a formal proof to the proposed protocol to demonstrate that our protocol is indeed secure. Compared with previous methods, the proposed protocol performs better in terms of security and performance.
The development of the Internet of Things (IoT) and 5th generation wireless network (5G) is set to push the smart agriculture to the next level since the massive and real-time data can be collected ...to monitor the status of crops and livestock, logistics management, and other important information. Recently, COVID-19 has attracted more human attention to food safety, which also has a positive impact on smart agriculture market share. However, the security and privacy concern for smart agriculture has become more prominent. Since smart agriculture implies working with large sets of data, which usually sensitive, some are even confidential, and once leakage it can expose user privacy. Meanwhile, considering the data publishing of smart agriculture helps the public or investors to real-timely anticipate risks and benefits, these data are also a public resource. To balance the data publishing and data privacy, in this article, a privacy-preserving data aggregation scheme with a flexibility property uses ElGamal Cryptosystem is proposed. It is proved to be secure, private, and flexible with the analysis and performance simulation.
With the spread of the Internet, the speed of data spread is getting faster and faster. It benefits us a lot but also brings us many potential security problems, especially the problem of privacy ...leakage. For example, more and more people choose to store their private images in the cloud. Secret image sharing as a significant method has been widely applied in protecting images in the cloud, which reduces the risks of data leakage and data loss. Generally, the secret image sharing scheme would encrypt the secret image into a series of shares and then stored these shares in a cloud. However, when this cloud has been attacked, the secret may meet a risk of leakage. A solution to solve the problem is that the generated shares are distributed storage in multiple clouds. Each cloud is independent and all clouds can have a collaboration to manage the secret image. To address this issue, a novel hierarchical secret image sharing scheme with multi-group joint management is proposed in this paper, which is suitable for protecting the security of the secret image by distributed storage over multiple clouds. In the proposed scheme, the secret image would be shared among multiple groups with different thresholds. The number of each group’s shareholders is determined by a sequence of thresholds. Therefore, the proposed scheme is a hierarchical secret image sharing scheme in which the secret image can be reconstructed if and only if the number of shares has met all threshold conditions. In addition, the generated shares have the same weight, which is more suitable for universal applicability. Both the system analysis and the simulation results prove that the proposed scheme is efficient and practical.