To promote the efficiency of knowledge base retrieval based on description logic, the concept of assertional graph (AG), which is directed labeled graph, is defined and a new AG-based retrieval method is put forward...To promote the efficiency of knowledge base retrieval based on description logic, the concept of assertional graph (AG), which is directed labeled graph, is defined and a new AG-based retrieval method is put forward. This method converts the knowledge base and query clause into knowledge AG and query AG by making use of the given rules and then makes use of graph traversal to carry out knowledge base retrieval. The experiment indicates that the efficiency of this method exceeds, respectively, the popular RACER and KAON2 system by 0.4% and 3.3%. This method can obviously promote the efficiency of knowledge base retrieval.展开更多
With the development of the Internet, the Internet language-a new social variant of language comes into being. Owing to its distinctive features, the Internet language draws extensive attention and evokes dispute. Sho...With the development of the Internet, the Internet language-a new social variant of language comes into being. Owing to its distinctive features, the Internet language draws extensive attention and evokes dispute. Should we make laws to restrict its development or be magnanimous and tolerant? The present authors think that the dispute reflects the clash between the traditional culture and the "fast food" culture. The two cultures would co-exist harmoniously and co-develop healthily only if we cherish the law in the development of language and grasp the indirect correlation between them.展开更多
As one of the important phases of language acquisition process, vocabulary acquisition has great impact on one's language competence and communication competence. However, there are still some problems in students' ...As one of the important phases of language acquisition process, vocabulary acquisition has great impact on one's language competence and communication competence. However, there are still some problems in students' vocabulary acquisition. This paper first discusses the current problems in vocabulary teaching, and then analyzes some laws in vocabulary acquisition, and at last it discusses the advantages of making use of Internet in vocabulary teaching, which aims to find a possible solution to the problems.展开更多
The present study employed a quantitative and network approach to detect alignment effects in second language(L2) continuation tasks designed on the xu-argument(Wang, 2016). The materials used in this study were 6 sub...The present study employed a quantitative and network approach to detect alignment effects in second language(L2) continuation tasks designed on the xu-argument(Wang, 2016). The materials used in this study were 6 sub-corpora consisting of two selected input stories and two groups of L2 written production based on two continuation tasks. During continuation, the participants were required to continue in English a story with its ending removed, with one group reading and continuing the Chinese version and the other group the English version, and then switching their roles in the two tasks. Results show that the alignment effect differs across the two versions of continuation. Specifically, compared with the Chinese-version continuation, L2 learners produced more use of unigrams and bigrams similar to the input story in terms of lexical items, frequency and ranking correlations in the English-version task;on the other hand, the English-version continuation can facilitate generating linguistic networks that are much closer to the native English networks. Moreover, this research corroborates that written production in L2 continuation tasks can be influenced by input content.展开更多
The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructu...The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.展开更多
High frequency(HF) communication is widely spread due to some merits like easy deployment and wide communication coverage. Spectrum prediction is a promising technique to facilitate the working frequency selection and...High frequency(HF) communication is widely spread due to some merits like easy deployment and wide communication coverage. Spectrum prediction is a promising technique to facilitate the working frequency selection and enhance the function of automatic link establishment. Most of the existing spectrum prediction algorithms focus on predicting spectrum values in a slot-by-slot manner and therefore are lack of timeliness. Deep learning based spectrum prediction is developed in this paper by simultaneously predicting multi-slot ahead states of multiple spectrum points within a period of time. Specifically, we first employ supervised learning and construct samples depending on longterm and short-term HF spectrum data. Then, advanced residual units are introduced to build multiple residual network modules to respectively capture characteristics in these data with diverse time scales. Further, convolution neural network fuses the outputs of residual network modules above for temporal-spectral prediction, which is combined with residual network modules to construct the deep temporal-spectral residual network. Experiments have demonstrated that the approach proposed in this paper has a significant advantage over the benchmark schemes.展开更多
Among the human users of the Internet of Things,the hearing-impaired is a special group of people for whom normal information expression forms,such as voice and video are unaccessible,and most of them have some diffic...Among the human users of the Internet of Things,the hearing-impaired is a special group of people for whom normal information expression forms,such as voice and video are unaccessible,and most of them have some difficulty in understanding information in text form.The hearing-impaired are accustomed to receiving information expressed in sign language.For this situation,a new information expression form for the Internet of Things oriented toward the hearing-impaired is proposed in this paper,and the new expression is based on sign language video synthesis.Under the sign synthesis frame,three modules are necessary:constructing database,searching for appropriate sign language video units and transition units,and generating interpolated frames.With this method,text information could be transformed into sign language expression for the hearing-impaired.展开更多
This paper discribes a data representation for WordNet 2.1 based on Web Ontology Language (OWL). The main components of WordNet database are transformed as classes in OWL, and the relations between synsets or lexcial ...This paper discribes a data representation for WordNet 2.1 based on Web Ontology Language (OWL). The main components of WordNet database are transformed as classes in OWL, and the relations between synsets or lexcial words are transformed as OWL properties. Our conversion is based on the data file of WordNet instead of the Prolog database. This work can be used to enrich the work in progress of standard conversion of WordNet to the RDF/OWL representation at W3C.展开更多
Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect...Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given展开更多
The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in term...The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in terms of its communicative purposes, move features as well as linguistic specialties, with the aim of presenting the generic structure of the B2B website and its principal linguistic features contributing to the realization of its communicative purposes. It is demonstrated that the B2B website is one instance of the promotional genres and it has a lot in common with advertisement English and "netsneak" in the aspect of lexico-grammatical features.展开更多
Quadratic Discrimination Function (QDF) is commonly used in speech emotion recognition, which proceeds on the premise that the input data is normal distribution. In this paper, we propose a transformation to normali...Quadratic Discrimination Function (QDF) is commonly used in speech emotion recognition, which proceeds on the premise that the input data is normal distribution. In this paper, we propose a transformation to normalize the emotional features, emotion recognition. Features based on prosody then derivate a Modified QDF (MQDF) to speech and voice quality are extracted and Principal Component Analysis Neural Network (PCANN) is used to reduce dimension of the feature vectors. The results show that voice quality features are effective supplement for recognition, and the method in this paper could improve the recognition ratio effectively.展开更多
We developed and tested an improved neural network to predict the average concentration of PM10(particulate matter with diameter smaller than 10 ?m) several hours in advance in summer in Beijing.A genetic algorithm op...We developed and tested an improved neural network to predict the average concentration of PM10(particulate matter with diameter smaller than 10 ?m) several hours in advance in summer in Beijing.A genetic algorithm optimization procedure for optimizing initial weights and thresholds of the neural network was also evaluated.This research was based upon the PM10 data from seven monitoring sites in Beijing urban region and meteorological observation data,which were recorded every 3 h during summer of 2002.Two neural network models were developed.Model I was built for predicting PM10 concentrations 3 h in advance while Model II for one day in advance.The predictions of both models were found to be consistent with observations.Percent errors in forecasting the numerical value were about 20.This brings us to the conclusion that short-term fluctuations of PM10 concentrations in Beijing urban region in summer are to a large extent driven by meteorological conditions.Moreover,the predicted results of Model II were compared with the ones provided by the Models-3 Community Multiscale Air Quality(CMAQ) modeling system.The mean relative errors of both models were 0.21 and 0.26,respectively.The performance of the neural network model was similar to numerical models,when applied to short-time prediction of PM10 concentration.展开更多
Routing policies specification language (RPSL) allows a network operator to specify routing policies at various levels in the Internet hierarchy, for example at the autonomous system (AS) level. At the same time, poli...Routing policies specification language (RPSL) allows a network operator to specify routing policies at various levels in the Internet hierarchy, for example at the autonomous system (AS) level. At the same time, policies can be specified with sufficient detail in RPSL so that the low level router configurations can be generated from them. This paper is a discussion on using the RPSL to describe routing policies of relative AS in the Internet routing registry (IRR). We first analyze the relationships between a pair of ASes, and then explain how to specify various relative AS routing policies in RPSL. At last, we show an example of configuring routing policies using RtConfig that is a tool developed by the Routing Arbiter Project (RAP).展开更多
Even though various wireless Net- work Access Technologies (NATs) with dif- ferent specifications and applications have been developed in the recent years, no single wireless technology alone can satisfy the any- ti...Even though various wireless Net- work Access Technologies (NATs) with dif- ferent specifications and applications have been developed in the recent years, no single wireless technology alone can satisfy the any- time, anywhere, and any service wire- less-access needs of mobile users. A real seamless wireless mobile environment is only realized by considering vertical and horizontal handoffs together. One of the major design issues in heterogeneous wireless networks is the support of Vertical Handoff (VHO). VHO occurs when a multi-interface enabled mobile terminal changes its Point of Attachment (PoA) from one type of wireless access technology to another, while maintaining an active session. In this paper we present a novel multi-criteria VHO algorithm, which chooses the target NAT based on several factors such as user preferences, system parameters, and traf- tic-types with varying Quality of Service (QoS) requirements. Two modules i.e., VHO Neces- sity Estimation (VHONE) module and target NAT selection module, are designed. Both modules utilize several "weighted" users' and system's parameters. To improve the robust- ness of the proposed algorithm, the weighting system is designed based on the concept of fuzzy linguistic variables.展开更多
Learning English requires an English environment, but it is impossible for us to communicate with the English speaking people face-to-face frequently, Computer network can he said to narrow the distance between people...Learning English requires an English environment, but it is impossible for us to communicate with the English speaking people face-to-face frequently, Computer network can he said to narrow the distance between people from the space, turn the world into a global village, and provide people in the world with more and more convenient opporttmities. The use of computer-aided English teaching can make up for the deficiencies of the traditional English teaching methods, which will greatly improve English teaching. In this paper, in view of the perspective of psycholinguistics to analyze common English pod cast, network language and foreign learning phenomenon.展开更多
The main purpose of this paper looks to examine notable inconsistencies in language and practice between production practices in film, television, Internet and related production models. The disconnect between actual ...The main purpose of this paper looks to examine notable inconsistencies in language and practice between production practices in film, television, Internet and related production models. The disconnect between actual production practices and how they are describedis notably affected by advances in technology. Furthermore, practitioners insider language usage, and a lack of understanding between process verses exhibition contributes to the divide within theory and practice of these models. By inspecting how traditional entertainment content is physically produced, making comparisons with the most common production models, the realms of production practices and terminology bring clarity and consistency. The language distinction illuminates any production process and is certainly critical for the producer responsible for putting together an experienced crew to shoot the project and vice versa concerning anyone looking for a job in those communities. Content creation for public consumption is expensive to produce, thus requires experienced people who must perform specific tasks on time and on budget, achieving entertainment goals and bringing in a profitable return. Understanding this information about production models is vital to the student or anyone preparing to be a part of the entertainment community.展开更多
With the unique erggdicity, i rregularity, and.special ability to avoid being trapped in local optima, chaos optimization has been a novel global optimization technique and has attracted considerable attention for a...With the unique erggdicity, i rregularity, and.special ability to avoid being trapped in local optima, chaos optimization has been a novel global optimization technique and has attracted considerable attention for application in various fields, such as nonlinear programming problems. In this article, a novel neural network nonlinear predic-tive control (NNPC) strategy baseed on the new Tent-map chaos optimization algorithm (TCOA) is presented. Thefeedforward neural network'is used as the multi-step predictive model. In addition, the TCOA is applied to perform the nonlinear rolling optimization to enhance the convergence and accuracy in the NNPC. Simulation on a labora-tory-scale liquid-level system is given to illustrate the effectiveness of the proposed method.展开更多
Interaction is one of the crucial features of multl-agent systems, in which there are two kinds of interaction: agent-to-agent and human-to-agent. In order to unify the two kinds of interaction while designing multi-...Interaction is one of the crucial features of multl-agent systems, in which there are two kinds of interaction: agent-to-agent and human-to-agent. In order to unify the two kinds of interaction while designing multi-agent systems, this paper introduces Q language-a scenario description language for designing interaction among agents and humans. Based on Q, we propose an integrating interaction framework system for multi-agent coordination, in which Q scenarios are used to uniformly describe both kinds of interactions. Being in accordance to the characteristics of Q language, the Q-based framework makes the interaction process open and easily understood by the users. Additionally, it makes specific applications of multi-agent systems easy to be established by application designers. By applying agent negotiation in agent-mediated e-commerce and agent cooperation in interoperable information query on the Semantic Web, we illustrate how the presented framework for multi-agent coordination is implemented in concrete applications. At the same time, these two different applications also demonstrate usability of the presented framework and verify validity of Q language.展开更多
In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applicati...In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applications and encrypted traffic, the currently available approaches can not perform well for all kinds of network data. In this paper, we propose a novel stream pattern matching technique which is not only easily deployed but also includes the advantages of different methods. The main idea is: first, defining a formal description specification, by which any series of data stream can be unambiguously descrbed by a special stream pattern; then a tree representation is constructed by parsing the stream pattern; at last, a stream pattern engine is constructed with the Non-t-mite automata (S-CG-NFA) and Bit-parallel searching algorithms. Our stream pattern analysis system has been fully prototyped on C programming language and Xilinx Vn-tex2 FPGA. The experimental results show the method could provides a high level of recognition efficiency and accuracy.展开更多
基金The National Natural Science Foundation of China(No.69975010,60374054),the National Research Foundation for the Doctoral Program of Higher Education of China (No.20050007023).
文摘To promote the efficiency of knowledge base retrieval based on description logic, the concept of assertional graph (AG), which is directed labeled graph, is defined and a new AG-based retrieval method is put forward. This method converts the knowledge base and query clause into knowledge AG and query AG by making use of the given rules and then makes use of graph traversal to carry out knowledge base retrieval. The experiment indicates that the efficiency of this method exceeds, respectively, the popular RACER and KAON2 system by 0.4% and 3.3%. This method can obviously promote the efficiency of knowledge base retrieval.
文摘With the development of the Internet, the Internet language-a new social variant of language comes into being. Owing to its distinctive features, the Internet language draws extensive attention and evokes dispute. Should we make laws to restrict its development or be magnanimous and tolerant? The present authors think that the dispute reflects the clash between the traditional culture and the "fast food" culture. The two cultures would co-exist harmoniously and co-develop healthily only if we cherish the law in the development of language and grasp the indirect correlation between them.
文摘As one of the important phases of language acquisition process, vocabulary acquisition has great impact on one's language competence and communication competence. However, there are still some problems in students' vocabulary acquisition. This paper first discusses the current problems in vocabulary teaching, and then analyzes some laws in vocabulary acquisition, and at last it discusses the advantages of making use of Internet in vocabulary teaching, which aims to find a possible solution to the problems.
文摘The present study employed a quantitative and network approach to detect alignment effects in second language(L2) continuation tasks designed on the xu-argument(Wang, 2016). The materials used in this study were 6 sub-corpora consisting of two selected input stories and two groups of L2 written production based on two continuation tasks. During continuation, the participants were required to continue in English a story with its ending removed, with one group reading and continuing the Chinese version and the other group the English version, and then switching their roles in the two tasks. Results show that the alignment effect differs across the two versions of continuation. Specifically, compared with the Chinese-version continuation, L2 learners produced more use of unigrams and bigrams similar to the input story in terms of lexical items, frequency and ranking correlations in the English-version task;on the other hand, the English-version continuation can facilitate generating linguistic networks that are much closer to the native English networks. Moreover, this research corroborates that written production in L2 continuation tasks can be influenced by input content.
文摘The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.
基金supported in part by the National Natural Science Foundation of China (Grants No. 61501510 and No. 61631020)Natural Science Foundation of Jiangsu Province (Grant No. BK20150717)+2 种基金China Postdoctoral Science Foundation Funded Project (Grant No. 2016M590398 and No.2018T110426)Jiangsu Planned Projects for Postdoctoral Research Funds (Grant No. 1501009A)Natural Science Foundation for Distinguished Young Scholars of Jiangsu Province (Grant No. BK20160034)
文摘High frequency(HF) communication is widely spread due to some merits like easy deployment and wide communication coverage. Spectrum prediction is a promising technique to facilitate the working frequency selection and enhance the function of automatic link establishment. Most of the existing spectrum prediction algorithms focus on predicting spectrum values in a slot-by-slot manner and therefore are lack of timeliness. Deep learning based spectrum prediction is developed in this paper by simultaneously predicting multi-slot ahead states of multiple spectrum points within a period of time. Specifically, we first employ supervised learning and construct samples depending on longterm and short-term HF spectrum data. Then, advanced residual units are introduced to build multiple residual network modules to respectively capture characteristics in these data with diverse time scales. Further, convolution neural network fuses the outputs of residual network modules above for temporal-spectral prediction, which is combined with residual network modules to construct the deep temporal-spectral residual network. Experiments have demonstrated that the approach proposed in this paper has a significant advantage over the benchmark schemes.
基金supported by the National Natural Science Foundation of China(Nos.60825203,60973056,60973057,U0935004)National Technology Support Project(2007BAH13B01)+2 种基金Beijing Municipal Natural Science Foundation(4102009)Scientific Research Common Program of Beijing Municipal Commission of Education(KM200710005023)PHR(IHLB)
文摘Among the human users of the Internet of Things,the hearing-impaired is a special group of people for whom normal information expression forms,such as voice and video are unaccessible,and most of them have some difficulty in understanding information in text form.The hearing-impaired are accustomed to receiving information expressed in sign language.For this situation,a new information expression form for the Internet of Things oriented toward the hearing-impaired is proposed in this paper,and the new expression is based on sign language video synthesis.Under the sign synthesis frame,three modules are necessary:constructing database,searching for appropriate sign language video units and transition units,and generating interpolated frames.With this method,text information could be transformed into sign language expression for the hearing-impaired.
基金Project supported by the National Natural Science Foundation of China (No. 60373080)the 985 Project of Zhejiang University, China
文摘This paper discribes a data representation for WordNet 2.1 based on Web Ontology Language (OWL). The main components of WordNet database are transformed as classes in OWL, and the relations between synsets or lexcial words are transformed as OWL properties. Our conversion is based on the data file of WordNet instead of the Prolog database. This work can be used to enrich the work in progress of standard conversion of WordNet to the RDF/OWL representation at W3C.
基金the National Natural Science Foundation of China
文摘Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given
文摘The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in terms of its communicative purposes, move features as well as linguistic specialties, with the aim of presenting the generic structure of the B2B website and its principal linguistic features contributing to the realization of its communicative purposes. It is demonstrated that the B2B website is one instance of the promotional genres and it has a lot in common with advertisement English and "netsneak" in the aspect of lexico-grammatical features.
基金the Ministry of Education Fund (No: 20050286001)Ministry of Education "New Century Tal-ents Support Plan" (No:NCET-04-0483)Doctoral Foundation of Ministry of Education (No:20050286001).
文摘Quadratic Discrimination Function (QDF) is commonly used in speech emotion recognition, which proceeds on the premise that the input data is normal distribution. In this paper, we propose a transformation to normalize the emotional features, emotion recognition. Features based on prosody then derivate a Modified QDF (MQDF) to speech and voice quality are extracted and Principal Component Analysis Neural Network (PCANN) is used to reduce dimension of the feature vectors. The results show that voice quality features are effective supplement for recognition, and the method in this paper could improve the recognition ratio effectively.
基金Funded by the High Technology Project(863) of the Ministry of Science and Technology of China(No. 2006AA06A305,6,7)
文摘We developed and tested an improved neural network to predict the average concentration of PM10(particulate matter with diameter smaller than 10 ?m) several hours in advance in summer in Beijing.A genetic algorithm optimization procedure for optimizing initial weights and thresholds of the neural network was also evaluated.This research was based upon the PM10 data from seven monitoring sites in Beijing urban region and meteorological observation data,which were recorded every 3 h during summer of 2002.Two neural network models were developed.Model I was built for predicting PM10 concentrations 3 h in advance while Model II for one day in advance.The predictions of both models were found to be consistent with observations.Percent errors in forecasting the numerical value were about 20.This brings us to the conclusion that short-term fluctuations of PM10 concentrations in Beijing urban region in summer are to a large extent driven by meteorological conditions.Moreover,the predicted results of Model II were compared with the ones provided by the Models-3 Community Multiscale Air Quality(CMAQ) modeling system.The mean relative errors of both models were 0.21 and 0.26,respectively.The performance of the neural network model was similar to numerical models,when applied to short-time prediction of PM10 concentration.
文摘Routing policies specification language (RPSL) allows a network operator to specify routing policies at various levels in the Internet hierarchy, for example at the autonomous system (AS) level. At the same time, policies can be specified with sufficient detail in RPSL so that the low level router configurations can be generated from them. This paper is a discussion on using the RPSL to describe routing policies of relative AS in the Internet routing registry (IRR). We first analyze the relationships between a pair of ASes, and then explain how to specify various relative AS routing policies in RPSL. At last, we show an example of configuring routing policies using RtConfig that is a tool developed by the Routing Arbiter Project (RAP).
文摘Even though various wireless Net- work Access Technologies (NATs) with dif- ferent specifications and applications have been developed in the recent years, no single wireless technology alone can satisfy the any- time, anywhere, and any service wire- less-access needs of mobile users. A real seamless wireless mobile environment is only realized by considering vertical and horizontal handoffs together. One of the major design issues in heterogeneous wireless networks is the support of Vertical Handoff (VHO). VHO occurs when a multi-interface enabled mobile terminal changes its Point of Attachment (PoA) from one type of wireless access technology to another, while maintaining an active session. In this paper we present a novel multi-criteria VHO algorithm, which chooses the target NAT based on several factors such as user preferences, system parameters, and traf- tic-types with varying Quality of Service (QoS) requirements. Two modules i.e., VHO Neces- sity Estimation (VHONE) module and target NAT selection module, are designed. Both modules utilize several "weighted" users' and system's parameters. To improve the robust- ness of the proposed algorithm, the weighting system is designed based on the concept of fuzzy linguistic variables.
文摘Learning English requires an English environment, but it is impossible for us to communicate with the English speaking people face-to-face frequently, Computer network can he said to narrow the distance between people from the space, turn the world into a global village, and provide people in the world with more and more convenient opporttmities. The use of computer-aided English teaching can make up for the deficiencies of the traditional English teaching methods, which will greatly improve English teaching. In this paper, in view of the perspective of psycholinguistics to analyze common English pod cast, network language and foreign learning phenomenon.
文摘The main purpose of this paper looks to examine notable inconsistencies in language and practice between production practices in film, television, Internet and related production models. The disconnect between actual production practices and how they are describedis notably affected by advances in technology. Furthermore, practitioners insider language usage, and a lack of understanding between process verses exhibition contributes to the divide within theory and practice of these models. By inspecting how traditional entertainment content is physically produced, making comparisons with the most common production models, the realms of production practices and terminology bring clarity and consistency. The language distinction illuminates any production process and is certainly critical for the producer responsible for putting together an experienced crew to shoot the project and vice versa concerning anyone looking for a job in those communities. Content creation for public consumption is expensive to produce, thus requires experienced people who must perform specific tasks on time and on budget, achieving entertainment goals and bringing in a profitable return. Understanding this information about production models is vital to the student or anyone preparing to be a part of the entertainment community.
基金Supported by the National Natural Science Foundation of China (No.60374037, No.60574036), the Program for New Century Excellent Talents in University of China (NCET), the Specialized Research Fund for the Doctoral Program of Higher Education of China (No.20050055013), .and the 0pening Project Foundation of National Lab of Industrial Control Technology (No.0708008).
文摘With the unique erggdicity, i rregularity, and.special ability to avoid being trapped in local optima, chaos optimization has been a novel global optimization technique and has attracted considerable attention for application in various fields, such as nonlinear programming problems. In this article, a novel neural network nonlinear predic-tive control (NNPC) strategy baseed on the new Tent-map chaos optimization algorithm (TCOA) is presented. Thefeedforward neural network'is used as the multi-step predictive model. In addition, the TCOA is applied to perform the nonlinear rolling optimization to enhance the convergence and accuracy in the NNPC. Simulation on a labora-tory-scale liquid-level system is given to illustrate the effectiveness of the proposed method.
文摘Interaction is one of the crucial features of multl-agent systems, in which there are two kinds of interaction: agent-to-agent and human-to-agent. In order to unify the two kinds of interaction while designing multi-agent systems, this paper introduces Q language-a scenario description language for designing interaction among agents and humans. Based on Q, we propose an integrating interaction framework system for multi-agent coordination, in which Q scenarios are used to uniformly describe both kinds of interactions. Being in accordance to the characteristics of Q language, the Q-based framework makes the interaction process open and easily understood by the users. Additionally, it makes specific applications of multi-agent systems easy to be established by application designers. By applying agent negotiation in agent-mediated e-commerce and agent cooperation in interoperable information query on the Semantic Web, we illustrate how the presented framework for multi-agent coordination is implemented in concrete applications. At the same time, these two different applications also demonstrate usability of the presented framework and verify validity of Q language.
基金This work is supported by the following projects: National Natural Science Foundation of China grant 60772136, 111 Development Program of China NO.B08038, National Science & Technology Pillar Program of China NO.2008BAH22B03 and NO. 2007BAH08B01.
文摘In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applications and encrypted traffic, the currently available approaches can not perform well for all kinds of network data. In this paper, we propose a novel stream pattern matching technique which is not only easily deployed but also includes the advantages of different methods. The main idea is: first, defining a formal description specification, by which any series of data stream can be unambiguously descrbed by a special stream pattern; then a tree representation is constructed by parsing the stream pattern; at last, a stream pattern engine is constructed with the Non-t-mite automata (S-CG-NFA) and Bit-parallel searching algorithms. Our stream pattern analysis system has been fully prototyped on C programming language and Xilinx Vn-tex2 FPGA. The experimental results show the method could provides a high level of recognition efficiency and accuracy.