期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
《马氏文通》“加词”论析 被引量:2
1
作者 邵霭吉 《连云港师范高等专科学校学报》 2003年第4期1-4,共4页
"加词"是《马氏文通》中的一个术语,但它没有一个明确的定义,它包括好多内容,过去认为它有两种,或三种表现形式,文章则认为它至少有七种不同的表现形式,甚至还可包括这七种形式之外的内容。《马氏文通》的"加语"、&... "加词"是《马氏文通》中的一个术语,但它没有一个明确的定义,它包括好多内容,过去认为它有两种,或三种表现形式,文章则认为它至少有七种不同的表现形式,甚至还可包括这七种形式之外的内容。《马氏文通》的"加语"、"加读"、"加辞"实际上也是指的"加词"。 展开更多
关键词 《马氏文通》 “加词” 句法术语 句子成分
下载PDF
Orthographic,Semantic,and Contextual Influences on Initial Processing and Learning of Novel Words During Reading:Evidence From Eye Movements 被引量:2
2
作者 Wei YI Shiyi LU Robert DEKEYSER 《Chinese Journal of Applied Linguistics》 2022年第2期194-219,316,317,共28页
This study investigates how orthographic,semantic and contextual variables—including word length,concreteness,and contextual support—impact on the processing and learning of new words in a second language(L2)when fi... This study investigates how orthographic,semantic and contextual variables—including word length,concreteness,and contextual support—impact on the processing and learning of new words in a second language(L2)when first encountered during reading.Students learning English as a foreign language(EFL)were recruited to read sentences for comprehension,embedded with unfamiliar L2 words that occurred once.Immediately after this,they received a form recognition test,a meaning recall test,and a meaning recognition test.Eye-movement data showed significant effects of word length on both early and late processing of novel words,along with effects of concreteness only on late-processing eye-tracking measures.Informative contexts were read slower than neutral contexts,yet contextual support did not show any direct influence on the processing of novel words.Interestingly,initial learning of abstract words was better than concrete words in terms of form and meaning recognition.Attentional processing of novel L2 words,operationalized by total reading time,positively predicted L2 learners’recognition of new orthographic forms.Taken together,these results suggest:1)orthographic,semantic and contextual factors play distinct roles for initial processing and learning of novel words;2)online processing of novel words contributes to L2 learners’initial knowledge of unfamiliar lexical items acquired from reading. 展开更多
关键词 word processing/learning wordlength CONCRETENESS contextual support eye tracking
下载PDF
SUBDIVIDING VERBS TO IMPROVE SYNTACTIC PARSING 被引量:2
3
作者 Liu Ting Ma Jinshan Zhang Huipeng Li Sheng 《Journal of Electronics(China)》 2007年第3期347-352,共6页
This paper proposes a new way to improve the performance of dependency parser: subdividing verbs according to their grammatical functions and integrating the information of verb subclasses into lexicalized parsing mod... This paper proposes a new way to improve the performance of dependency parser: subdividing verbs according to their grammatical functions and integrating the information of verb subclasses into lexicalized parsing model. Firstly,the scheme of verb subdivision is described. Secondly,a maximum entropy model is presented to distinguish verb subclasses. Finally,a statistical parser is developed to evaluate the verb subdivision. Experimental results indicate that the use of verb subclasses has a good influence on parsing performance. 展开更多
关键词 Verb subdivision Maximum entropy model Syntactic parsing Natural language processing
下载PDF
Certificateless Public Key Encryption with Keyword Search 被引量:24
4
作者 PENG Yanguo CUI Jiangtao +1 位作者 PENG Changgen YING Zuobin 《China Communications》 SCIE CSCD 2014年第11期100-113,共14页
Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes ... Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem. 展开更多
关键词 provable secure certificateless public key encryption keyword search
下载PDF
Identity-Based Encryption with Keyword Search from Lattice Assumption 被引量:6
5
作者 Xiaojun Zhang Chunxiang Xu +1 位作者 Liming Mu Jie Zhao 《China Communications》 SCIE CSCD 2018年第4期164-178,共15页
Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor... Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor corresponding to the keyword. The PEKS is useful to keep the management of large data storages secure such as those in a cloud. In this paper, to protect against quantum computer attacks, we present a lattice-based identity-based encryption scheme with key- word search. We have proved that our scheme can achieve ciphertext indistinguishability in the random oracle model, and our scheme can also achieve trapdoor security. In particular, our scheme can designate a unique tester to test and return the search results, therefore it does not need a secure channel. To the best of our knowledge, our scheme is the first iden- tity-based encryption scheme with keyword search from lattice assumption. 展开更多
关键词 public key encryption keywordsearch ciphertext indistinguishability latticeassumption.
下载PDF
Lexical Generativity of Bengali Prefixes: A Corpus-Based Investigation
6
作者 Niladri Sekhar Dash 《Sino-US English Teaching》 2012年第5期1171-1180,共10页
Prefixation is a dynamic method of word formation in Bengali. Sometimes prefixes become derivational to create new words, which differ in part-of-speech and meaning from the words with which these are attached. Thus, ... Prefixation is a dynamic method of word formation in Bengali. Sometimes prefixes become derivational to create new words, which differ in part-of-speech and meaning from the words with which these are attached. Thus, prefixation acquires an identity of a morphodynamic process in the language through which new words take birth, while old words change their forms, functions, and meanings to increase lexical stock of Bengali. With reference to a large lexical database of prefixed words obtained from the Bengali corpus (Dash, 2009), this paper tries to explore the nature and type of morphosemantic processes that occur at the time of prefixation to highlight the patterns of change in forms and meaning of prefixed words. Also, it aims at laying a theoretical foundation about the nature of lexical generativity of prefixes used in formation of words. The application relevance of this study may be attested in descriptive linguistics, applied linguistics, and language technology, since analysis of forms and functions of prefixes supplies necessary information for developing text materials for Bengali language teaching, compiling dictionaries, designing systems for machine learning, and developing databases for machine translation. Indirectly, it ventilates into the nature of complexities embedded in linguistic generativity of the Bengali speakers 展开更多
关键词 Bengali PREFIX prefixation lexical generativity morphosemantics MEANING
下载PDF
The English Past Tense Debate in the Chinese EFL Learners' Mind:A Masked Priming Study
7
作者 魏大为 徐晋波 武和平 《Chinese Journal of Applied Linguistics》 2016年第2期185-198,247,共15页
The involvement of rule-based computation is the focus of the past tense debate. The present masked priming study contributed to the debate by investigating how Chinese EFL learners processed regular English past tens... The involvement of rule-based computation is the focus of the past tense debate. The present masked priming study contributed to the debate by investigating how Chinese EFL learners processed regular English past tense forms. The results show that, for the past tense forms of relatively high frequency, at the early stage of processing, the highly proficient group can make use of morphological rule to decompose regular past tense forms. The lower proficiency level group, however, cannot decompose past tense forms. It is suggested that surface form frequency of past tense inflections and foreign language proficiency are the two factors that affect the way complex words are processed. Our data supports the dual-route model of Declarative-Procedural memory in the past tense debate. 展开更多
关键词 past tense debate masked priming morphologicalprocessing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部