20 results on '"Guo, Yajuan"'
Search Results
2. FNDC3B, Targeted by miR-125a-5p and miR-217, Promotes the Proliferation and Invasion of Colorectal Cancer Cells via PI3K/mTOR Signaling
- Author
-
Li,Yilong, Yang,Jie, Wang,Hengyang, Qiao,Wei, Guo,Yongfeng, Zhang,Shengtao, and Guo,Yajuan
- Subjects
PI3K/mTOR ,microRNA ,proliferation ,colorectal cancer ,FNDC3B ,invasion ,OncoTargets and Therapy ,Original Research - Abstract
Yilong Li, Jie Yang, Hengyang Wang, Wei Qiao, Yongfeng Guo, Shengtao Zhang, Yajuan Guo First Department of General Surgery, Ninth Hospital of Xi’an, Xi’an 710054, Shaanxi, People’s Republic of ChinaCorrespondence: Yajuan GuoThe Ninth Hospital of Xi’an, No. 151, Eastern Section of South Second Ring Road, Xi’an 710054, Shaanxi, People’s Republic of ChinaEmail yajuanguo123@163.comBackground: Fibronectin type III domain containing 3B (FNDC3B) acts as an oncogene in various cancers, and abnormal expression of FNDC3B has been found in colorectal cancer (CRC). Our study aimed to illustrate the role of FNDC3B in CRC development.Methods: Through RT-qPCR and western blotting assays, the mRNA and protein expressions of target genes were measured. CCK-8 and MTT methods were used to detect cell proliferation. Invasion ability was determined using Transwell assay. TargetScan platform and luciferase reporter gene assay were performed to predict and validate the bindings between FNDC3B and miR-125a-5p or miR-217. Besides, the expression correlation was measured by Pearson’s Correlation analysis.Results: We found that FNDC3B was significantly upregulated in CRC tissues and tumor cell lines, and high expression of FNDC3B predicted a poor survival outcome. The bindings between FNDC3B and miR-125a-5p and miR-217 were respectively at the motifs of CUCAGGG and AUGCAGU. MiR-125a-5p and miR-217 were downregulated in CRC tissues, and both were negatively correlated with FNDC3B expression. Subsequently, the downregulated miR-125a-5p and miR-217 were confirmed as contributors FNDC3B upregulation in CRC. A loss-of-function assay demonstrated that FNDC3B knockdown inhibited the proliferation of CRC cells, while FNDC3B overexpression promoted the proliferation and invasion of tumor cells. Besides, we validated that PI3K/mTOR signaling was involved in the regulation of FNDC3B on the proliferation and invasion of CRC cells.Conclusion: Generally, our findings demonstrated that FNDC3B facilitated cell proliferation and invasion via PI3K/mTOR signaling, and further promoted CRC progression. The novel miR-125a-5p/FNDC3B and miR-217/FNDC3B axes might be new targets for CRC prognosis and therapy.Keywords: FNDC3B, colorectal cancer, proliferation, invasion, microRNA, PI3K/mTOR
- Published
- 2020
3. Research on the Application of Third-Party Enterprise inquiry Website and Civil Aviation Data Website in the Teaching of Airline Operation Management Courses
- Author
-
Kang Xinmeng and Guo Yajuan
- Subjects
Service (systems architecture) ,Computer science ,Aviation ,business.industry ,Teaching method ,Knowledge engineering ,Hospitality management studies ,Civil aviation ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Procurement ,Beijing ,ComputingMilieux_COMPUTERSANDEDUCATION ,Operations management ,business - Abstract
Because of the COVID-19, many courses have been transferred to telecast online courses. The application of this new network technology is a new experience for both teachers and students, and also gives more new attempts to teaching methods. In the study of aviation service, tourism management, civil aviation business and other majors, the course of airline operation management is an important professional course. In the teaching of civil aviation, there have always been problems such as strong professionalism and difficult knowledge of economic management. The course teaching is scripted and the lack of practical practice makes it difficult for students to understand the knowledge. In view of these problems, this article has carried on the certain teaching method innovation research. Two classes of Junior students majoring in tourism management in Beijing City University were selected to try to use the third- party enterprise query website and civil aviation data website to assist the teaching of airline operation management course, and good teaching results have been achieved. The results show that the third-party enterprise inquiry website is helpful for students to understand the organization and operation structure of airlines. Civil aviation data website can help students get familiar with the main data indicators of airline operation and management, so as to deepen the understanding and mastery of the above knowledge points.
- Published
- 2021
4. Assistance of Online Travel Website OTA and 3D Earth Software in Course Teaching of Geography of Air Transportation
- Author
-
Guo Yajuan and Kang Xinmeng
- Subjects
Class (computer programming) ,Service (systems architecture) ,Beijing ,business.industry ,Aviation ,Teaching method ,Knowledge engineering ,ComputingMilieux_COMPUTERSANDEDUCATION ,Hospitality management studies ,Public relations ,Space (commercial competition) ,business - Abstract
The teaching mode of many courses was converted to remote online live teaching in the spring semester of 2020 due to COVID-19. The application of the new network technology is a new experience for both teachers and students and provides new attempts at more teaching methods. The geography of air transportation is an important specialized course in the study of air service, tourism management, civil air transportation and other disciplines, which has been accompanied by many difficulties in geographic knowledge and the difficulty in spatial imagination of students in the teaching. In response to such problems, this paper conducted a research on the innovation of teaching methods. Freshmen from an undergraduate class majoring in tourism management at Beijing City University were selected and provided with course teaching of the geography of air transportation under the assistance of an online travel website OTA and 3D earth software, achieving good teaching results. The study found that the 3D earth software could help students understand difficulties in geographic knowledge in the three-dimensional space and master the IATA zoning and ten major route directions and that the online travel website OTA could help students familiarize themselves with airline names and their two-character codes, airport names and their three-character codes and the knowledge about flight transfers and thus deepen their understanding and mastery of the above geographic knowledge essentials.
- Published
- 2021
5. Research on Online Teaching Practice Based on Information Technology: A Case Study of the Course 'Human Resource Management'online Teaching during the COIVD-19 Pandemic
- Author
-
Gao Lina, Kang Xinmeng, Guo Yajuan, and Zhang Cheng
- Subjects
Information management ,Resource (project management) ,Knowledge management ,business.industry ,Computer science ,Human resource management ,Distance education ,ComputingMilieux_COMPUTERSANDEDUCATION ,Information technology ,The Internet ,Space (commercial competition) ,business ,Preference - Abstract
In March of 2020, based on the online resource evaluation and the preference survey from the students of the university, we officially and successfully launched the Human Resource Management courses by adopting information technology combined with the UMOOC platform, QQ Group Classroom, and WeChat Group online teaching platform. These three main online teaching platforms enable the teaching activities and teacher-student interactions available regardless of time or space limitations by creating a new path of education making good use of modern internet technology. It not only makes education accessible, useful and effective, and also raised the students' interests and passion for learning from an untraditional way. What's more, it also responses the requirement of the Ministry of Education to “suspend classes without stopping teaching and learning”. The purpose of the report is to analyze the application and its practical effects of the online teaching methods based on information technology in the University during this period.
- Published
- 2021
6. Big data Analysis and Research on the Affinity of Ideological and political Education in public account platform
- Author
-
Guo Yajuan and Gao Lina
- Subjects
Information management ,business.industry ,media_common.quotation_subject ,Big data ,Public relations ,Object (philosophy) ,Public account ,Political education ,Battlefield ,Message service ,Political science ,Ideology ,business ,media_common - Abstract
In recent years, WeChat public number platform has developed rapidly, and its influence as a propaganda caliber is also growing. To enhance the affinity of ideological and political education in colleges and universities, it is necessary to firmly grasp the main battlefield of public account platform. This paper takes the public accounts of 56 universities in Tianjin as the object of study, and makes text analysis and quantitative research on 500 articles involving in ideological and political education. Through the big data analysis of the public account, this paper reveals the current status, characteristics and influence of ideological and political education in the public account platform. On the basis of the above analysis, this paper puts forward some measures to improve the affinity of ideological and political education in the public account platform.
- Published
- 2021
7. The difference of pre-class preview time affects online teaching quality
- Author
-
Guo Yajuan and Kang Xinmeng
- Subjects
Class (computer programming) ,020205 medical informatics ,media_common.quotation_subject ,Teaching method ,05 social sciences ,050301 education ,Civil aviation ,Sample (statistics) ,Subject (documents) ,02 engineering and technology ,Computer-assisted web interviewing ,Upload ,ComputingMilieux_COMPUTERSANDEDUCATION ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics education ,Quality (business) ,Psychology ,0503 education ,media_common - Abstract
With the outbreak of COVID-19, many courses in Universities have to change from face-to-face teaching to online teaching. This new technology is a unique experience for teachers and students, making teachers have to explore new teaching methods. In the past, in colleges and universities, teachers generally did not provide students with subject materials in advance. This article hopes to make a change, and thus we selected 75 undergraduate students in two classes in a university in Beijing. Taking the subject of civil aviation cargo transportation as an example, we upload learning materials online in one class for the day ahead, and their students can preview the subject's difficulty. However, learning materials of other classes are upload four days in advance. The teacher first teaches basic theories according to the subject guide and then conducts online tests through questionnaires (via an online questionnaire distribution site: Wenjuanxing) to assess student results. The independent sample ‘student test method’ will be used to compare the students' scores in the two classes. Findings show that the students who previewed one day ahead of the class perform better than those who preview four days ahead of the class.
- Published
- 2020
8. Hybrid Teaching Practice Based on Internet Platforms —A Case Study of the Course'Introduction to Tourism'
- Author
-
Zhang Cheng, Kang Xinmeng, and Guo Yajuan
- Subjects
Class (computer programming) ,Higher education ,business.industry ,05 social sciences ,Teaching mode ,Course (navigation) ,Beijing ,0502 economics and business ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,Online teaching ,050211 marketing ,The Internet ,Sociology ,business ,050212 sport, leisure & tourism ,Tourism - Abstract
The course “Introduction to Tourism” at Beijing City University is an interactive course that relies on the UMOOC online teaching platform developed by Tsinghua University. This study obtained feedback from students and conducted t-tests to identify the significance of difference between a class had gone through the hybrid teaching mode reform and one that had not so as to explore the effect of the hybrid teaching mode in higher education.
- Published
- 2020
9. Wireless Signal Identification in 230MHz Band Based on Interference Cleaning and Convolutional Neural Network
- Author
-
Wenjiang Feng, Chonghai Yang, Daohua Zhu, Guo Yajuan, Qing Wu, and Wang Yucheng
- Subjects
Interference (communication) ,Computer science ,business.industry ,Noise (signal processing) ,Wireless ,Pattern recognition ,Time domain ,Artificial intelligence ,business ,Signal ,Convolutional neural network ,Subspace topology ,Signal subspace - Abstract
With the development of digital wireless communication technol-ogy, the wireless signal identification has been suffering from increasingly complex electromagnetic environment and higher spectrum utilization. In this paper, we propose a wireless signal identification method based on interference cleaning and convolutional neural network (CNN) in 230MHz Band. The method firstly analyzes the received signal in time domain, building feature data sets combined with amplitudes, phases, in-phase components and orthogonal components. The method then generalizes singular value decomposition(SVD) and subspace division to preserve signal subspace, eliminate noise subspace and interference compress subspace. Finally, it utilizes the data set to train the CNN and make the wireless signals' identification through the well-trained the CNN. The experimental results with different kinds of modulation show that this method can achieve high recognition accuracy and strong anti-noise ability.
- Published
- 2019
10. Application Prospect of Edge Computing in Smart Distribution
- Author
-
Chen Jinming, Chen Wu, Guo Yajuan, Jiao Hao, Nie Guoji, and Jiang Wei
- Subjects
Power management ,020203 distributed computing ,Transmission channel ,business.industry ,Computer science ,Computation ,Distributed computing ,Cloud computing ,02 engineering and technology ,Risk monitoring ,020401 chemical engineering ,0202 electrical engineering, electronic engineering, information engineering ,0204 chemical engineering ,business ,Low voltage ,Edge computing - Abstract
With the rapid development of smart distribution, a large number of intelligent devices and terminals have been installed. Cloud-based computation and control will be challenged with problems such as long delay, transmission channel congestion and personal privacy leakage. As a supplement to cloud computing, edge computing provides a new paradigm for intelligent processing on the edge nodes of network. Therefore, above problem can be solved effectively. In this paper, we first analyze the developing state and the applicability of edge computing in smart distribution. Subsequently, three typical application scenarios including smart low voltage district management, user power management, and distribution outside force damage risk monitoring are introduced. Finally, we discuss the challenges faced by application of edge computing in smart distribution and conclude the paper.
- Published
- 2018
11. Data-driven lean Management for Distribution Network
- Author
-
Guo Yajuan, Jiao Hao, and Chen Jinming
- Subjects
business.industry ,Computer science ,020209 energy ,Big data ,02 engineering and technology ,Asset (computer security) ,Industrial engineering ,Lean manufacturing ,Maintenance engineering ,Data modeling ,Data-driven ,Data visualization ,Data quality ,0202 electrical engineering, electronic engineering, information engineering ,business - Abstract
This paper proposes a concept of “data-driven, lean-oriented and closed-loop” management for distribution network and explain how to implement this kind of management, as shown in fig. 1Firstly, a big data platform is constructed to integrate and combine the multi-source data. Secondly, big data analysis technologies such as data mining, machine learning and data visualization are applied to solve problems in distribution network production. For example, accurate location of the fault can be found with help of multisource information from different devices and systems. And we can also be aware of the risk points in distribution network through history data analysis. Finally, this Paper explains how to promote lean management of distribution network in the fields of asset, operation, maintenance and investment based on the big data platform and big data analysis methods. In addition, the feedback procedure sets up a bridge between application and data collecting, which further improve the data quality. Those management measure have been piloted in several cities in Jiangsu. The result proves that they can improve power supply reliability and reduce operating costs significantly. Two practical cases are given to show how they work.
- Published
- 2018
12. Security Risk Analysis of Mobile Application in Power System
- Author
-
Zhou Chao, Huang Wei, Jiang Haitao, Guo Jing, and Guo Yajuan
- Subjects
Risk analysis ,Electric power system ,Risk analysis (engineering) ,Computer science - Published
- 2017
13. RETRACTED: Crystal structures of X B12H12 (X = Li, K, Ca) and hydrogen storage property of Na–(Li, K, Ca)–B–H system from first principles calculation
- Author
-
Guo YaJuan, Wu Hai-Shun, Ren Ying, Jia Jian-Feng, and Wang XiaoHua
- Subjects
Hydrogen storage ,Crystallography ,Chemistry ,General Physics and Astronomy ,Crystal structure ,Physical and Theoretical Chemistry - Published
- 2013
14. Research and application of load balance approach for distribution based on big data
- Author
-
Guo Yajuan, Sun Jian, Li Bin, Chen Jinming, and Yuan Yubo
- Subjects
Engineering ,Grid fault ,Distribution (number theory) ,Operations research ,business.industry ,020209 energy ,Big data ,Work (physics) ,02 engineering and technology ,Network reconfiguration ,Distribution transformer ,Quantitative model ,Reliability engineering ,0202 electrical engineering, electronic engineering, information engineering ,business - Abstract
For solving the common existence of feeder overload problem, a load balance approach based on big data is proposed in this paper. Because of the dynamic characteristics of distribution load, a feeder overload quantitative model is raised, while multi data sources are employed, such as total contents of feeder/distribution transformer load, grid fault information, business expanding plan, work/operation tickets etc. The approach changes the open/closed status of sectionalizing and tie switches of the overload feeder and its adjacent counterparts, calculates the comprehensive overload index of all the possible operation modes and chooses the most appropriate strategy. Example shows the effectiveness of this approach. This approach has been actually applied for the decision-making of Jiangsu distribution dispatching.
- Published
- 2016
15. Information security defense method of electric power control system based on digital watermark
- Author
-
Guo Yajuan, Zhou Chao, Jiang Haitao, Huang Wei, Bin Li, and Jinming Chen
- Subjects
Engineering ,Authentication ,business.industry ,Watermark ,Information security ,Computer security ,computer.software_genre ,law.invention ,Electric power system ,Relay ,law ,Cyclic redundancy check ,Data Protection Act 1998 ,business ,Digital watermarking ,computer ,Computer hardware - Abstract
This paper presents a network attack authentication method based on digital watermark technology, CRC16 as watermark is added to the original data, combined with the simulation model of the method of performance analysis. It is proved that the method can detect false data in real time conditions, provide a new choice for information security. At the same time, the performance of digital watermarking is analyzed in detail through simulation, and the feasibility and superiority of the method of real-time data protection based on the watermark is further demonstrated. The current and voltage are obtained by the simple simulation model, and the current and voltage waveforms are almost coincident with the embedded watermark. Taking the impedance locus of distance protection as an example, it is observed that the embedding of digital watermark does not affect the normal operation of relay protection. This method provides a new way of thinking for the security protection of power information network, especially for digital and intelligent power system.
- Published
- 2016
16. A New Security Reinforcement Technology of Mobile Application
- Author
-
Guo Yajuan, Jiang Haitao, Guo Jing, Chao Zhou, and Huang Wei
- Subjects
Engineering ,Software ,business.industry ,Software security assurance ,Embedded system ,medicine ,Systems design ,Android application ,medicine.symptom ,Android (operating system) ,business ,Reinforcement ,Confusion - Abstract
Android platform has gradually become the most popular mobile terminal operating system, while the number of software applications based on which is also quite amazing. At the time, the security threats are also increasing, and the degree of threat is gradually deepening. Therefore, we need to create an Android application security reinforcement system. This paper is a study on the new method of strengthening the mobile application. First of all, this paper introduces the risk that Android face and the core technology of software security reinforcement; then this decides the basic function of the reinforcement system, design and realize the dex reinforcement technology based on code confusion and bin file loading technology based on security shell technology. Finally, this paper carries out the implementation and testing of the system. The test results can be seen in Figure 5 and Figure 6, and the test results show that the dex file after code consolidation reinforcement cannot be successfully compiled source files and the corebin is from the disk. The proposed Android application security reinforcement system design is reasonable, and the security reinforcement system we designed achieves the expected goal.
- Published
- 2016
17. The Detection of Extra Matters on the Transmission Lines Based on the Filter Response and Appearance
- Author
-
Zhang Tianbing, Guo Yajuan, Hong Gongyi, and Yao Nan
- Subjects
Electric power transmission ,Computer science ,Sky ,business.industry ,media_common.quotation_subject ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Computer vision ,Artificial intelligence ,business ,Classifier (UML) ,ComputingMethodologies_COMPUTERGRAPHICS ,media_common - Abstract
In this paper, a detection method of extra matters on the transmission lines is proposed. Our method can be divided into two steps: the detection of the transmission lines and the detection of the sky. To locate the lines, we design a set of simple and efficient filters to obtain the candidates of the lines. Compared with the previous work using the length of the lines to perform the transmission lines classification, we use the color and texture features to make it more robust to the variation of the background. To recognize the sky, we first over-segment the image. Then, we design the color and texture features for the detection of the sky. Finally, these features are used to train the classifier of the sky. After the transmission lines and the sky are detected, we confirm whether there is extra matter on the transmission lines. The experimental results indicate that our algorithm can recognize the extra matters on transmission lines fast and accurately.
- Published
- 2014
18. Research on information security testing technology for smart Substations
- Author
-
Chen Hao, Guo Yajuan, Huang Wei, and Zhuang Ling
- Subjects
Engineering ,business.industry ,Information security ,Computer security ,computer.software_genre ,business ,computer - Published
- 2014
19. Research on information security system of waste terminal disposal process
- Author
-
Wang Ziying, Zhou Chao, Huang Wei, Guo Jing, and Guo Yajuan
- Subjects
020205 medical informatics ,Terminal (electronics) ,Waste management ,Process (engineering) ,Computer science ,020208 electrical & electronic engineering ,0202 electrical engineering, electronic engineering, information engineering ,02 engineering and technology ,Information security ,Construction engineering - Published
- 2017
20. Security attack detection algorithm for electric power gis system based on mobile application
- Author
-
Huang Wei, Renjun Feng, Zhou Chao, Guo Yajuan, and Wang Liming
- Subjects
020203 distributed computing ,business.industry ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,02 engineering and technology ,Electric power ,business ,Computer network - Published
- 2017
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.