This study investigates how orthographic,semantic and contextual variables—including word length,concreteness,and contextual support—impact on the processing and learning of new words in a second language(L2)when fi...This study investigates how orthographic,semantic and contextual variables—including word length,concreteness,and contextual support—impact on the processing and learning of new words in a second language(L2)when first encountered during reading.Students learning English as a foreign language(EFL)were recruited to read sentences for comprehension,embedded with unfamiliar L2 words that occurred once.Immediately after this,they received a form recognition test,a meaning recall test,and a meaning recognition test.Eye-movement data showed significant effects of word length on both early and late processing of novel words,along with effects of concreteness only on late-processing eye-tracking measures.Informative contexts were read slower than neutral contexts,yet contextual support did not show any direct influence on the processing of novel words.Interestingly,initial learning of abstract words was better than concrete words in terms of form and meaning recognition.Attentional processing of novel L2 words,operationalized by total reading time,positively predicted L2 learners’recognition of new orthographic forms.Taken together,these results suggest:1)orthographic,semantic and contextual factors play distinct roles for initial processing and learning of novel words;2)online processing of novel words contributes to L2 learners’initial knowledge of unfamiliar lexical items acquired from reading.展开更多
This paper proposes a new way to improve the performance of dependency parser: subdividing verbs according to their grammatical functions and integrating the information of verb subclasses into lexicalized parsing mod...This paper proposes a new way to improve the performance of dependency parser: subdividing verbs according to their grammatical functions and integrating the information of verb subclasses into lexicalized parsing model. Firstly,the scheme of verb subdivision is described. Secondly,a maximum entropy model is presented to distinguish verb subclasses. Finally,a statistical parser is developed to evaluate the verb subdivision. Experimental results indicate that the use of verb subclasses has a good influence on parsing performance.展开更多
Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes ...Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem.展开更多
Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor...Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor corresponding to the keyword. The PEKS is useful to keep the management of large data storages secure such as those in a cloud. In this paper, to protect against quantum computer attacks, we present a lattice-based identity-based encryption scheme with key- word search. We have proved that our scheme can achieve ciphertext indistinguishability in the random oracle model, and our scheme can also achieve trapdoor security. In particular, our scheme can designate a unique tester to test and return the search results, therefore it does not need a secure channel. To the best of our knowledge, our scheme is the first iden- tity-based encryption scheme with keyword search from lattice assumption.展开更多
Prefixation is a dynamic method of word formation in Bengali. Sometimes prefixes become derivational to create new words, which differ in part-of-speech and meaning from the words with which these are attached. Thus, ...Prefixation is a dynamic method of word formation in Bengali. Sometimes prefixes become derivational to create new words, which differ in part-of-speech and meaning from the words with which these are attached. Thus, prefixation acquires an identity of a morphodynamic process in the language through which new words take birth, while old words change their forms, functions, and meanings to increase lexical stock of Bengali. With reference to a large lexical database of prefixed words obtained from the Bengali corpus (Dash, 2009), this paper tries to explore the nature and type of morphosemantic processes that occur at the time of prefixation to highlight the patterns of change in forms and meaning of prefixed words. Also, it aims at laying a theoretical foundation about the nature of lexical generativity of prefixes used in formation of words. The application relevance of this study may be attested in descriptive linguistics, applied linguistics, and language technology, since analysis of forms and functions of prefixes supplies necessary information for developing text materials for Bengali language teaching, compiling dictionaries, designing systems for machine learning, and developing databases for machine translation. Indirectly, it ventilates into the nature of complexities embedded in linguistic generativity of the Bengali speakers展开更多
The involvement of rule-based computation is the focus of the past tense debate. The present masked priming study contributed to the debate by investigating how Chinese EFL learners processed regular English past tens...The involvement of rule-based computation is the focus of the past tense debate. The present masked priming study contributed to the debate by investigating how Chinese EFL learners processed regular English past tense forms. The results show that, for the past tense forms of relatively high frequency, at the early stage of processing, the highly proficient group can make use of morphological rule to decompose regular past tense forms. The lower proficiency level group, however, cannot decompose past tense forms. It is suggested that surface form frequency of past tense inflections and foreign language proficiency are the two factors that affect the way complex words are processed. Our data supports the dual-route model of Declarative-Procedural memory in the past tense debate.展开更多
文摘This study investigates how orthographic,semantic and contextual variables—including word length,concreteness,and contextual support—impact on the processing and learning of new words in a second language(L2)when first encountered during reading.Students learning English as a foreign language(EFL)were recruited to read sentences for comprehension,embedded with unfamiliar L2 words that occurred once.Immediately after this,they received a form recognition test,a meaning recall test,and a meaning recognition test.Eye-movement data showed significant effects of word length on both early and late processing of novel words,along with effects of concreteness only on late-processing eye-tracking measures.Informative contexts were read slower than neutral contexts,yet contextual support did not show any direct influence on the processing of novel words.Interestingly,initial learning of abstract words was better than concrete words in terms of form and meaning recognition.Attentional processing of novel L2 words,operationalized by total reading time,positively predicted L2 learners’recognition of new orthographic forms.Taken together,these results suggest:1)orthographic,semantic and contextual factors play distinct roles for initial processing and learning of novel words;2)online processing of novel words contributes to L2 learners’initial knowledge of unfamiliar lexical items acquired from reading.
基金the National Natural Science Foundation of China (No.60435020, 60575042 and 60503072).
文摘This paper proposes a new way to improve the performance of dependency parser: subdividing verbs according to their grammatical functions and integrating the information of verb subclasses into lexicalized parsing model. Firstly,the scheme of verb subdivision is described. Secondly,a maximum entropy model is presented to distinguish verb subclasses. Finally,a statistical parser is developed to evaluate the verb subdivision. Experimental results indicate that the use of verb subclasses has a good influence on parsing performance.
基金This research was supported by the National Science Foundation of China for Funding Projects (61173089,61472298) and National Statistical Science Program of China(2013LZ46).
文摘Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem.
基金supported by the National Natural Science Foundation of China (No.61370203)China Postdoctoral Science Foundation Funded Project (No.2017M623008)+1 种基金Scientific Research Starting Project of SWPU (No.2017QHZ023)State Scholarship Foundation of China Scholarship Council (No.201708515149)
文摘Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor corresponding to the keyword. The PEKS is useful to keep the management of large data storages secure such as those in a cloud. In this paper, to protect against quantum computer attacks, we present a lattice-based identity-based encryption scheme with key- word search. We have proved that our scheme can achieve ciphertext indistinguishability in the random oracle model, and our scheme can also achieve trapdoor security. In particular, our scheme can designate a unique tester to test and return the search results, therefore it does not need a secure channel. To the best of our knowledge, our scheme is the first iden- tity-based encryption scheme with keyword search from lattice assumption.
文摘Prefixation is a dynamic method of word formation in Bengali. Sometimes prefixes become derivational to create new words, which differ in part-of-speech and meaning from the words with which these are attached. Thus, prefixation acquires an identity of a morphodynamic process in the language through which new words take birth, while old words change their forms, functions, and meanings to increase lexical stock of Bengali. With reference to a large lexical database of prefixed words obtained from the Bengali corpus (Dash, 2009), this paper tries to explore the nature and type of morphosemantic processes that occur at the time of prefixation to highlight the patterns of change in forms and meaning of prefixed words. Also, it aims at laying a theoretical foundation about the nature of lexical generativity of prefixes used in formation of words. The application relevance of this study may be attested in descriptive linguistics, applied linguistics, and language technology, since analysis of forms and functions of prefixes supplies necessary information for developing text materials for Bengali language teaching, compiling dictionaries, designing systems for machine learning, and developing databases for machine translation. Indirectly, it ventilates into the nature of complexities embedded in linguistic generativity of the Bengali speakers
基金supported by Lanzhou Jiaotong University Young Scholar Science Foundation(No.2012044)~~
文摘The involvement of rule-based computation is the focus of the past tense debate. The present masked priming study contributed to the debate by investigating how Chinese EFL learners processed regular English past tense forms. The results show that, for the past tense forms of relatively high frequency, at the early stage of processing, the highly proficient group can make use of morphological rule to decompose regular past tense forms. The lower proficiency level group, however, cannot decompose past tense forms. It is suggested that surface form frequency of past tense inflections and foreign language proficiency are the two factors that affect the way complex words are processed. Our data supports the dual-route model of Declarative-Procedural memory in the past tense debate.