In the actual idioms teaching, most students feel that idioms are difficult to comprehend, memorize and make actual application just because the overall meanings of idioms are unpredictable. Since cognitive linguistic...In the actual idioms teaching, most students feel that idioms are difficult to comprehend, memorize and make actual application just because the overall meanings of idioms are unpredictable. Since cognitive linguistics is based on embodiment, it can change the abstract things into comparatively concrete things, which provides a shortest way to grasp these idioms. Actually, most idioms are based on conceptual metaphor and metonymy composed of conceptual mappings between the source domain and the target one. Therefore, this paper is trying to probe into the role of cognitive principles in idioms teaching, especially animal idioms from the contrastive analysis on Chinese "hu" idioms and English "lion" idioms.展开更多
Privacy protection for big data linking is discussed here in relation to the Central Statistics Office (CSO), Ireland's, big data linking project titled the 'Structure of Earnings Survey - Administrative Data Proj...Privacy protection for big data linking is discussed here in relation to the Central Statistics Office (CSO), Ireland's, big data linking project titled the 'Structure of Earnings Survey - Administrative Data Project' (SESADP). The result of the project was the creation of datasets and statistical outputs for the years 2011 to 2014 to meet Eurostat's annual earnings statistics requirements and the Structure of Earnings Survey (SES) Regulation. Record linking across the Census and various public sector datasets enabled the necessary information to be acquired to meet the Eurostat earnings requirements. However, the risk of statistical disclosure (i.e. identifying an individual on the dataset) is high unless privacy and confidentiality safe-guards are built into the data matching process. This paper looks at the three methods of linking records on big datasets employed on the SESADP, and how to anonymise the data to protect the identity of the individuals, where potentially disclosive variables exist.展开更多
This paper identifies metaphors in newspaper English, specifically the articles in China Daily, as the research object. Many linguists have studies metaphors in newspaper English, but research perspective is only limi...This paper identifies metaphors in newspaper English, specifically the articles in China Daily, as the research object. Many linguists have studies metaphors in newspaper English, but research perspective is only limited to the classification of metaphor, and not analyses the trends for each type of metaphor from the diachronic approach, therefore, this paper aims to make up for this deficiency. Thirty-six articles are randomly sampled from China Daily in the year of 2010, to make up a small corpus. Then the occurrence frequency of every kind of metaphor of recent years in this corpus is analyzed. Finally, it is found that the occurrence frequency of orientational metaphors shows a decreasing tendency, while those of the ontological and structural metaphors are relatively stable. We have found two reasons for this trend appears. Firstly, orientational metaphors are used less frequently, because they often appear when it comes to the description of numbers, and digital change itself has a lot of direct expression Secondly, structural metaphor and ontological metaphor are relatively stable, because the former helps the readers to understand the new things; the latter can expressed lively展开更多
We propose a scheme to realize quantum cloning of an unknown M-qudit equatorial-like entangled state. The first stage of the protocol requires teleportation. After the teleportation is accomplished, the receiver can r...We propose a scheme to realize quantum cloning of an unknown M-qudit equatorial-like entangled state. The first stage of the protocol requires teleportation. After the teleportation is accomplished, the receiver can reestablish the original state. In the second stage of the protocol, with the assistance (through a single-particle projective measurement) of the preparer, the perfect copy of an original state can be produced at the site of the sender. Our scheme requires a single maximally entangled qudit pair as the quantum channel and three dits classical communication. The scheme is feasible at the expense of consuming local resources which include M - 1 ancillary qudits introduced by the receiver and additional bi-qudit operations. Moreover, we construct a sort of unitary transformations which ensure ancillary qudits are not necessarily introduced by the sender. Comparing to the previous protocols, the proposed protocol is economical due to that the cost of both quantum nonlocal resources and classical communication is lowest.展开更多
Neural networks have been applied in various fields from signal processing, pattern recognition, associative memory to artifi- cial intelligence. Recently, nanoscale memristor has renewed interest in experimental real...Neural networks have been applied in various fields from signal processing, pattern recognition, associative memory to artifi- cial intelligence. Recently, nanoscale memristor has renewed interest in experimental realization of neural network. A neural network with a memristive synaptic weight is studied in this work. Dynamical properties of the proposed neural network are investigated through phase portraits, Poincar6 map, and Lyapunov exponents. Interestingly, the memristive neural network can generate hyperchaotic attractors without the presence of equilibrium points. Moreover, circuital implementation of such memristive neural network is presented to show its feasibility.展开更多
The quantification of the sheltering and exposure effects of non-uniform sediments has been widely achieved through hiding function models. Big challenge exists so far in the model parameter that is highly variable an...The quantification of the sheltering and exposure effects of non-uniform sediments has been widely achieved through hiding function models. Big challenge exists so far in the model parameter that is highly variable and differs greatly between laboratory flumes and field streams. This paper presents an improved surface-based hiding fimction. The force balance for particle inception was formulated and the allocation of the overall bed shear stress into each group of sediments was mimicked. The new hiding function was examined against and agrees well with the documented field and flume data. It was shown that the hiding fimction is closely related to the relative flow depth and the reference elevation in the velocity profile in addition to the bed material gradation. The power law of velocity profile that applies to both flume flows and natural streams can link the flume and field data together. The hiding function with b = 1/6 and b = 1/2 is applicable to natural streams and laboratory flumes, respectively. The value orb = 0.263 also works well for gravel bed rivers. The range of the reference elevation, namely z0 = 0.4Dm-1.4Dm, is recommended for either the flume or field data. The new hiding function contributes to addressing clearer physical meanings and a useful perspective for further improvement.展开更多
文摘In the actual idioms teaching, most students feel that idioms are difficult to comprehend, memorize and make actual application just because the overall meanings of idioms are unpredictable. Since cognitive linguistics is based on embodiment, it can change the abstract things into comparatively concrete things, which provides a shortest way to grasp these idioms. Actually, most idioms are based on conceptual metaphor and metonymy composed of conceptual mappings between the source domain and the target one. Therefore, this paper is trying to probe into the role of cognitive principles in idioms teaching, especially animal idioms from the contrastive analysis on Chinese "hu" idioms and English "lion" idioms.
文摘Privacy protection for big data linking is discussed here in relation to the Central Statistics Office (CSO), Ireland's, big data linking project titled the 'Structure of Earnings Survey - Administrative Data Project' (SESADP). The result of the project was the creation of datasets and statistical outputs for the years 2011 to 2014 to meet Eurostat's annual earnings statistics requirements and the Structure of Earnings Survey (SES) Regulation. Record linking across the Census and various public sector datasets enabled the necessary information to be acquired to meet the Eurostat earnings requirements. However, the risk of statistical disclosure (i.e. identifying an individual on the dataset) is high unless privacy and confidentiality safe-guards are built into the data matching process. This paper looks at the three methods of linking records on big datasets employed on the SESADP, and how to anonymise the data to protect the identity of the individuals, where potentially disclosive variables exist.
文摘This paper identifies metaphors in newspaper English, specifically the articles in China Daily, as the research object. Many linguists have studies metaphors in newspaper English, but research perspective is only limited to the classification of metaphor, and not analyses the trends for each type of metaphor from the diachronic approach, therefore, this paper aims to make up for this deficiency. Thirty-six articles are randomly sampled from China Daily in the year of 2010, to make up a small corpus. Then the occurrence frequency of every kind of metaphor of recent years in this corpus is analyzed. Finally, it is found that the occurrence frequency of orientational metaphors shows a decreasing tendency, while those of the ontological and structural metaphors are relatively stable. We have found two reasons for this trend appears. Firstly, orientational metaphors are used less frequently, because they often appear when it comes to the description of numbers, and digital change itself has a lot of direct expression Secondly, structural metaphor and ontological metaphor are relatively stable, because the former helps the readers to understand the new things; the latter can expressed lively
基金Supported by the National Basic Research Program of China (973 Program) under Grant No.2007CB311203the National Natural Science Foundation of China and the Research Grants Council of Hong Kong Joint Research Scheme under Grant No.60731160626+1 种基金the National Natural Science Foundation of China under Grant Nos.60873191, 60903152, 60821001the Fundamental Research Funds for the Central Universities under Grant No.BUPT2009RC0220 and the 111 Project under Grant No.B08004
文摘We propose a scheme to realize quantum cloning of an unknown M-qudit equatorial-like entangled state. The first stage of the protocol requires teleportation. After the teleportation is accomplished, the receiver can reestablish the original state. In the second stage of the protocol, with the assistance (through a single-particle projective measurement) of the preparer, the perfect copy of an original state can be produced at the site of the sender. Our scheme requires a single maximally entangled qudit pair as the quantum channel and three dits classical communication. The scheme is feasible at the expense of consuming local resources which include M - 1 ancillary qudits introduced by the receiver and additional bi-qudit operations. Moreover, we construct a sort of unitary transformations which ensure ancillary qudits are not necessarily introduced by the sender. Comparing to the previous protocols, the proposed protocol is economical due to that the cost of both quantum nonlocal resources and classical communication is lowest.
基金supported by Vietnam National Foundation for Science and Technology Development(NAFOSTED)(Grant No.102.99-2013.06)
文摘Neural networks have been applied in various fields from signal processing, pattern recognition, associative memory to artifi- cial intelligence. Recently, nanoscale memristor has renewed interest in experimental realization of neural network. A neural network with a memristive synaptic weight is studied in this work. Dynamical properties of the proposed neural network are investigated through phase portraits, Poincar6 map, and Lyapunov exponents. Interestingly, the memristive neural network can generate hyperchaotic attractors without the presence of equilibrium points. Moreover, circuital implementation of such memristive neural network is presented to show its feasibility.
基金the Beijing Municipal Science&Technology Project(Grant No.Z141100003614052)the National Natural Science Foundation of China(Grants No.51525901&51379100)as well as by China Ministry of Science and Technology(Grant No.2011CB409901)
文摘The quantification of the sheltering and exposure effects of non-uniform sediments has been widely achieved through hiding function models. Big challenge exists so far in the model parameter that is highly variable and differs greatly between laboratory flumes and field streams. This paper presents an improved surface-based hiding fimction. The force balance for particle inception was formulated and the allocation of the overall bed shear stress into each group of sediments was mimicked. The new hiding function was examined against and agrees well with the documented field and flume data. It was shown that the hiding fimction is closely related to the relative flow depth and the reference elevation in the velocity profile in addition to the bed material gradation. The power law of velocity profile that applies to both flume flows and natural streams can link the flume and field data together. The hiding function with b = 1/6 and b = 1/2 is applicable to natural streams and laboratory flumes, respectively. The value orb = 0.263 also works well for gravel bed rivers. The range of the reference elevation, namely z0 = 0.4Dm-1.4Dm, is recommended for either the flume or field data. The new hiding function contributes to addressing clearer physical meanings and a useful perspective for further improvement.