Although much is known about the benefits of providing creative writing courses to English learners, little research is available on Chinese ethnolinguistic minority learners’ creative writing in formal education. In...Although much is known about the benefits of providing creative writing courses to English learners, little research is available on Chinese ethnolinguistic minority learners’ creative writing in formal education. In response, this ethnographic study explored three ethnolinguistic minority learners’ engagement with a three-month elective English creative writing course at a Chinese university. Data(drafts, interviews, and reflection) were analyzed to reveal the three learners’ investment in creative writing and its impact. It was found that creative writing helped the learners to develop more confident writer identities, that they became more proficient in writing, and that their language proficiency also grew. The study suggests creative writing can serve as identity texts,which reflect back on their emergent creative writer identity, and can be a beneficial pedagogical option for ethnolinguistic minority learners.展开更多
How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the ...How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees.展开更多
By introducing multiparameter generalization of Bailey pair,the purpose of this paper is to find a number of new Rogers-Ramanujan-Bailey type identities.
It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocom...It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocombine two or more quantum protocols.To fill this gap,we propose a composed quantum protocol,containing bothquantum identity authentication and quantum key distribution,using squeezed states.Hence,not only the identity canbe verified,but also a new private key can be generated by our new protocol.We also analyze the security under anoptimal attack,and the efficiency,which is defined by the threshold of the tolerant error rate,using Gaussian errorfunction.展开更多
Based on the narratives of four Chinese university EFL teachers' research experiences, this study reports on the dynamic construction of their researcher identities and the crucial socioinstitutional and individual f...Based on the narratives of four Chinese university EFL teachers' research experiences, this study reports on the dynamic construction of their researcher identities and the crucial socioinstitutional and individual factors that have afforded and constrained researcher identity construction. The results presented different trajectories of researcher identity construction through the EFL teachers' three stages of research experiences (beginning, stagnation/ development, and struggle stages) in their professional lives. Academic learning contexts such as Master's and PhD programs were shown to be replete with factors that contributed to the development of researcher identity, while the institutional context and the broad social context in China were exposed to be greatly constraining. Motivation, publications, academic qualifications, and networking with researchers were four important individual factors that impacted the EFL teachers' researcher identity construction, The findings suggest that Chinese EFL teachers raise awareness of their researcher identities, make continuous critical reflections, and exercise agency to seek opportunities for development while governments and institutions should reform the current educational and promotion systems to support EFL teachers' research engagement.展开更多
This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string ...This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string representing their identities. The identity string is encoded as decoherence-free states(termed logical qubits), respectively, over the two collective noisy channels, which are used as decoy photons. By using the decoy photons, both the authentication of two users and the detection of eavesdropping were implemented. The use of logical qubits not only guaranteed the high fidelity of exchanged secret message, but also prevented the eavesdroppers to eavesdrop beneath a mask of noise.展开更多
Recent research on academic discourse has revealed the intersection of writing and writer identity construction. However, some terms that are being used in writer identity study are sometimes not only interchangeably ...Recent research on academic discourse has revealed the intersection of writing and writer identity construction. However, some terms that are being used in writer identity study are sometimes not only interchangeably used without making an explicit connection between them but also used in a way that may cause misunderstanding. The paper is intended to tease out four key terms, namely, stance, voice, self, and identity so that the respective role that each plays in academic written discourse can be differentiated on the one hand, and their interrelationship can be clarified on the other. It is hoped that such a panoramic picture can offer some pedagogical implications for academic writing teaching and research and provide some insights into the research on writer identity construction in academic written discourse as well.展开更多
文摘Although much is known about the benefits of providing creative writing courses to English learners, little research is available on Chinese ethnolinguistic minority learners’ creative writing in formal education. In response, this ethnographic study explored three ethnolinguistic minority learners’ engagement with a three-month elective English creative writing course at a Chinese university. Data(drafts, interviews, and reflection) were analyzed to reveal the three learners’ investment in creative writing and its impact. It was found that creative writing helped the learners to develop more confident writer identities, that they became more proficient in writing, and that their language proficiency also grew. The study suggests creative writing can serve as identity texts,which reflect back on their emergent creative writer identity, and can be a beneficial pedagogical option for ethnolinguistic minority learners.
基金partially supported by the Fundamental Research Funds for the Central Universities of China under Grant No.2015JBM034the China Scholarship Council Funds under File No.201407095023
文摘How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees.
基金Supported by the National Natural Science Foundation of China(10771093)
文摘By introducing multiparameter generalization of Bailey pair,the purpose of this paper is to find a number of new Rogers-Ramanujan-Bailey type identities.
基金Supported by the National Natural Science Foundation of China under Grant No. 60872052
文摘It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocombine two or more quantum protocols.To fill this gap,we propose a composed quantum protocol,containing bothquantum identity authentication and quantum key distribution,using squeezed states.Hence,not only the identity canbe verified,but also a new private key can be generated by our new protocol.We also analyze the security under anoptimal attack,and the efficiency,which is defined by the threshold of the tolerant error rate,using Gaussian errorfunction.
文摘Based on the narratives of four Chinese university EFL teachers' research experiences, this study reports on the dynamic construction of their researcher identities and the crucial socioinstitutional and individual factors that have afforded and constrained researcher identity construction. The results presented different trajectories of researcher identity construction through the EFL teachers' three stages of research experiences (beginning, stagnation/ development, and struggle stages) in their professional lives. Academic learning contexts such as Master's and PhD programs were shown to be replete with factors that contributed to the development of researcher identity, while the institutional context and the broad social context in China were exposed to be greatly constraining. Motivation, publications, academic qualifications, and networking with researchers were four important individual factors that impacted the EFL teachers' researcher identity construction, The findings suggest that Chinese EFL teachers raise awareness of their researcher identities, make continuous critical reflections, and exercise agency to seek opportunities for development while governments and institutions should reform the current educational and promotion systems to support EFL teachers' research engagement.
基金supported by the Science and Technology Support Project of Sichuan Province of China(Grant No.2013GZX0137)the Fund for Young Persons Project of Sichuan Province of China(Grant No.12ZB017)+2 种基金the National Natural Science Foundation of China(Grant No.61100205)the Project of the Fundamental Research Funds for the Central Universities of China(Grant No.2013RC0307)the Cryptography Basic Development of the National"Twelfth Five-Year Plan" of China on Cryptographic Theory(Grant No.MMJJ201301004)
文摘This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string representing their identities. The identity string is encoded as decoherence-free states(termed logical qubits), respectively, over the two collective noisy channels, which are used as decoy photons. By using the decoy photons, both the authentication of two users and the detection of eavesdropping were implemented. The use of logical qubits not only guaranteed the high fidelity of exchanged secret message, but also prevented the eavesdroppers to eavesdrop beneath a mask of noise.
基金supported by China National Social Sciences Grant entitled “A Genre-based Study of the Dynamic Interdiscursive System in Chinese and English Professional Discourse”(NO.17BYY033)
文摘Recent research on academic discourse has revealed the intersection of writing and writer identity construction. However, some terms that are being used in writer identity study are sometimes not only interchangeably used without making an explicit connection between them but also used in a way that may cause misunderstanding. The paper is intended to tease out four key terms, namely, stance, voice, self, and identity so that the respective role that each plays in academic written discourse can be differentiated on the one hand, and their interrelationship can be clarified on the other. It is hoped that such a panoramic picture can offer some pedagogical implications for academic writing teaching and research and provide some insights into the research on writer identity construction in academic written discourse as well.