Fluency on oral English has always been the goal of Chinese English learners. Language corpuses offer great convenience to language researches. Prefabricated chunks are a great help for learners to achieve oral Englis...Fluency on oral English has always been the goal of Chinese English learners. Language corpuses offer great convenience to language researches. Prefabricated chunks are a great help for learners to achieve oral English fluency. With the help of computer software, chunks in SECCL are categorized. The conclusion is in the process of chunks acquiring, emphasis should be on content-related chunks, especially specific topic-related ones. One effective way to gain topic-related chunks is to build topic-related English corpus of native speakers.展开更多
In order to enhance the quality of vertical handoff in an overlay wireless network, multiple attributes are taken into account when optimizing the vertical handoff decision including user-based and network-based QoS f...In order to enhance the quality of vertical handoff in an overlay wireless network, multiple attributes are taken into account when optimizing the vertical handoff decision including user-based and network-based QoS factors. In this paper, we develop a novel vertical handoff algorithm in an integrated 3G cellular and Wireless LAN networks. The proposed algorithm can adjust the weight of each QoS attribute dynamically as the networks change, trace the network condition and choose the optimal access point at transient regions. Simulation results show that this algorithm is able to provide accurate handoff decision, resulting in small unnecessary handoff numbers, good performance of throughput and handoff delay in heterogeneous environments.展开更多
The debate on the marketization of discourse in higher education has sparked and sustained interest among researchers in discourse and education studies across a diversity of contexts.While most research in this line ...The debate on the marketization of discourse in higher education has sparked and sustained interest among researchers in discourse and education studies across a diversity of contexts.While most research in this line has focused on marketized discourses such as advertisements,little attention has been paid to promotional discourse in public institutions such as the About us texts on Chinese university websites.The goal of the present study is twofold:first,to describe the generic features of the university About us texts in China;and second,to analyze how promotional discourse is interdiscursively incorporated in the discourse by referring to the broader sociopolitical context.Findings have indicated five main moves:giving an overview,stressing historical status,displaying strengths,pledging political and ideological allegiance,and communicating goals and visions.Move 3,displaying strengths,has the greatest amount of information and can be further divided into six sub-moves which presents information on campus facilities,faculty team,talent cultivation,disciplinary fields construction,academic research,and international exchange.The main linguistic and rhetorical strategies used in these moves are analyzed and discussed.展开更多
In Delay Tolerant Networks (DTNs), establishing routing path from a source node to a destination node may not be possible, so the opportunistic routings are widely used. The energy and buffer constraints are general i...In Delay Tolerant Networks (DTNs), establishing routing path from a source node to a destination node may not be possible, so the opportunistic routings are widely used. The energy and buffer constraints are general in DTNs composed of the mobile phones or Pads. This paper proposes a novel opportunistic routing protocol, denoted by Large Opporturioty (LAOP), for the energy and buffer constrained DTNs. The objective of LAOP is to reach many receivers of a message with a small number of transmissions. By LAOP, the sender floods a message when the number of its neighbors is not less than a threshold. We compare the delivery performance of LAOP with other four widely used Delay or Disruption Tolerant Network (DTN) routing protocols, Direct Delivery, Epidemic routing, SprayAndWait and PRoPHET and demonstrate that LAOP can improve the delivery performance and decrease the delivery latency simultaneously.展开更多
Objective:This study provides a preliminary evaluation of the usability and acceptability of a mobile application(sexual assault care algorithm,SACA).Methods:An explanatory sequential mixed methods research was used.A...Objective:This study provides a preliminary evaluation of the usability and acceptability of a mobile application(sexual assault care algorithm,SACA).Methods:An explanatory sequential mixed methods research was used.A quantitative survey was followed up by a qualitative study.A convenience sample of participants(n=4)was recruited.The research was conducted on a one-on-one basis.In the quantitative phase,a random assignment technique was used to divide four participants into two groups of two participants each.Post-Study System Usability Questionnaire(PSSUQ)and Acceptability e-Scale were used to collect quantitative data.In the qualitative phase,interview,observation,and documentation were used to collect qualitative data.Data were analyzed both quantitative and qualitatively.The qualitative data were linked with the initial quantitative data to determine how the follow-up qualitative data helped explain the initial quantitative results.Results:The quantitative results suggested that SACA has high usability(5.05±1.83)and acceptability(3.81±1.22).The qualitative results further indicate that the participants thought SACA was easy to use and useful,and most of them would recommend it to others.Areas of improvement include adding features that would calculate and validate the elapsed time since the sexual assault,adding explanations to some buttons,and providing training.Conclusions:Our findings highlight the value of using a mixed methods research design to conduct a usability and acceptability test.Nurses are more likely to adopt a new technology for their evidencebased practice when the technology is easy to use and useful and requires less time to find the right piece of guideline evidence.Individualized training needs to be designed based on users'characteristics.展开更多
This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus ...This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.展开更多
Based on the theory of polymorphic virtual S-box, the paper presents a symmetric key exchange protocol to solve the problem of session keys delete shared in the computational complexity temporary trading scenario. Bot...Based on the theory of polymorphic virtual S-box, the paper presents a symmetric key exchange protocol to solve the problem of session keys delete shared in the computational complexity temporary trading scenario. Both parties jointly construct a highly nonlinear SPN core algorithm. The paper the connotation of polymorphic cipher theory, making use of the method of self-compiler based expansion factor to collect random parameter sets held by each of the parties containing its own information 5-tuple private keys array Kpa[5] and Kpb[5].The more efficient polymorphism virtual S-box is constructed. The method of secret split for the public key cryptography features can be implemented by symmetry cipher system. The research results will provide a theoretical basis to solve the key exchange problems for short- term communications partner based on symmetric cryptography.展开更多
The present paper defines interdiscursivity as the mixing of diverse genres, discourses, or styles in a single text. It also traces the origin of interdiscursivity and takes it as a special kind of intertextuality. Th...The present paper defines interdiscursivity as the mixing of diverse genres, discourses, or styles in a single text. It also traces the origin of interdiscursivity and takes it as a special kind of intertextuality. Then the paper gives a review of interdiscursivity studies in literary and non-literary fields. The former is usually conducted from the stylistic approach, while the latter from the CDA (critical discourse analysis) approach. The contributions and limitations of the previous studies are also summarized with the purpose of presenting an objective picture of the research. Based upon the detailed review, the paper offers some perspectives for the future research. It is hoped that this will shed some light on our understanding of interdiscursivity.展开更多
Ancient Greece having survived uninterruptedly through centuries, consists an incontestably cultural capital of overriding importance for the global community and especially for Greece itself. Mythical elements usuall...Ancient Greece having survived uninterruptedly through centuries, consists an incontestably cultural capital of overriding importance for the global community and especially for Greece itself. Mythical elements usually become frameworks or structures, in which Greek literary tradition encodes Greek national virtues and promotes nationalistic goals. On the other hand, myth's adaptations to different chrono-topes generate diversified cultural reception, adjusted to the era and the audience's expectations. The mythical figures are constantly invested in different conceptual schemata, which correspond to the altered way of thinking. Myth is also usually embedded in or underlies fantasy genre, which becomes a vehicle for utterances on women's rights. In this paper, we are going to examine closely three "fantasy" novels for children with mythical intertextual elements: The Fortunate lsles (1989), Torch (1987), and Sirena (1998), whose plot takes place in Greece and we will try to explore: (1) how is Greekness being perceived and presented; and (2) how is female identity being introjected or depicted, in order to find out if the subversive potential of the fantasy genre reworks and rationalizes femininity and Greekness, which have for so long been exploited by the patriarchal or nationalistic status quo.展开更多
We propose using the concept of decisive moment in order to deconstruct the obvious ideological effects found in discourse. The subject is constituted in enunciation, and its polysemic discourse clashes with the trans...We propose using the concept of decisive moment in order to deconstruct the obvious ideological effects found in discourse. The subject is constituted in enunciation, and its polysemic discourse clashes with the transparency of meaning. According to Pêcheux (1988), the contradictions in discourse simultaneously establish regularity and instability of meanings, leading it to misunderstanding, to the event. Photography destabilizes that which is already formulated and brings out that which is new, the unexpected meaning, the decisive moment. We analyze this process in the picture by Sebastiao Salgado---"The cradle of inequality lies in the inequality of the cradle". (CAPES-BEX 4394/10-0, FAPESP 09/54417-4, CNPq.)展开更多
Understanding that Homer's Odyssey (1998) has a feminine perspective, this paper intends to explore the Greek epic placing queen Penelope as the protagonist, observing, mainly, the narratological shifts in the stor...Understanding that Homer's Odyssey (1998) has a feminine perspective, this paper intends to explore the Greek epic placing queen Penelope as the protagonist, observing, mainly, the narratological shifts in the story grammar, duration and character elaboration. This study also uses Paul Ricoeur's The Rule of Metaphor (2008) to analyze the episode of the shroud in Homer's Odyssey. Ricoeur sees metaphor in three distinct levels: the level of lexis where he bases himself in the works of Aristotle; the level of phrase in which he recurs to the structuralist linguistician l^mile Benveniste; and the metaphor in the level of discourse, when Ricoeur himself devises an elaborate study of the figure of speech. Penelope's weaving can be understood as a representation of discourse and of the feminine. Such analogy transcends the stereotype she is often given and defines a new role for the character in the epic.展开更多
文摘Fluency on oral English has always been the goal of Chinese English learners. Language corpuses offer great convenience to language researches. Prefabricated chunks are a great help for learners to achieve oral English fluency. With the help of computer software, chunks in SECCL are categorized. The conclusion is in the process of chunks acquiring, emphasis should be on content-related chunks, especially specific topic-related ones. One effective way to gain topic-related chunks is to build topic-related English corpus of native speakers.
基金Acknowledgements This work is supported by Key Program of National Natural Science Foundation of China Grant No. 60832009.
文摘In order to enhance the quality of vertical handoff in an overlay wireless network, multiple attributes are taken into account when optimizing the vertical handoff decision including user-based and network-based QoS factors. In this paper, we develop a novel vertical handoff algorithm in an integrated 3G cellular and Wireless LAN networks. The proposed algorithm can adjust the weight of each QoS attribute dynamically as the networks change, trace the network condition and choose the optimal access point at transient regions. Simulation results show that this algorithm is able to provide accurate handoff decision, resulting in small unnecessary handoff numbers, good performance of throughput and handoff delay in heterogeneous environments.
基金This study is supported by the Chinese Ministry of Education(MOE)Humanities and Social Science Research Funding(20YJA740050)the MOE Key Research Project of Humanities and Social Science(16JJD740006)conducted by the Center for Linguistics and Applied Linguistics(CLAL),Guangdong University of Foreign Studies(GDUFS).We would like to thank the reviewers for their comments and suggestions on earlier versions of this manuscript.
文摘The debate on the marketization of discourse in higher education has sparked and sustained interest among researchers in discourse and education studies across a diversity of contexts.While most research in this line has focused on marketized discourses such as advertisements,little attention has been paid to promotional discourse in public institutions such as the About us texts on Chinese university websites.The goal of the present study is twofold:first,to describe the generic features of the university About us texts in China;and second,to analyze how promotional discourse is interdiscursively incorporated in the discourse by referring to the broader sociopolitical context.Findings have indicated five main moves:giving an overview,stressing historical status,displaying strengths,pledging political and ideological allegiance,and communicating goals and visions.Move 3,displaying strengths,has the greatest amount of information and can be further divided into six sub-moves which presents information on campus facilities,faculty team,talent cultivation,disciplinary fields construction,academic research,and international exchange.The main linguistic and rhetorical strategies used in these moves are analyzed and discussed.
基金This work was supported by the National Natural Science Foundation of China under Grants No. 61100208, No. 61100205 the Natural Science Foundation of Jiangsu under Grant No. BK2011169. Pietro lio was supported by the EU FP7 project RECOGNITION: Relevance and Cognition for Self-Awareness in a Content-Centric Intemet.
文摘In Delay Tolerant Networks (DTNs), establishing routing path from a source node to a destination node may not be possible, so the opportunistic routings are widely used. The energy and buffer constraints are general in DTNs composed of the mobile phones or Pads. This paper proposes a novel opportunistic routing protocol, denoted by Large Opporturioty (LAOP), for the energy and buffer constrained DTNs. The objective of LAOP is to reach many receivers of a message with a small number of transmissions. By LAOP, the sender floods a message when the number of its neighbors is not less than a threshold. We compare the delivery performance of LAOP with other four widely used Delay or Disruption Tolerant Network (DTN) routing protocols, Direct Delivery, Epidemic routing, SprayAndWait and PRoPHET and demonstrate that LAOP can improve the delivery performance and decrease the delivery latency simultaneously.
基金The development of the application for SACA was partially supported by funding from the Upstate Foundation,a 501(c)3 nonfor-profit corporation (upstatefoundation.org)
文摘Objective:This study provides a preliminary evaluation of the usability and acceptability of a mobile application(sexual assault care algorithm,SACA).Methods:An explanatory sequential mixed methods research was used.A quantitative survey was followed up by a qualitative study.A convenience sample of participants(n=4)was recruited.The research was conducted on a one-on-one basis.In the quantitative phase,a random assignment technique was used to divide four participants into two groups of two participants each.Post-Study System Usability Questionnaire(PSSUQ)and Acceptability e-Scale were used to collect quantitative data.In the qualitative phase,interview,observation,and documentation were used to collect qualitative data.Data were analyzed both quantitative and qualitatively.The qualitative data were linked with the initial quantitative data to determine how the follow-up qualitative data helped explain the initial quantitative results.Results:The quantitative results suggested that SACA has high usability(5.05±1.83)and acceptability(3.81±1.22).The qualitative results further indicate that the participants thought SACA was easy to use and useful,and most of them would recommend it to others.Areas of improvement include adding features that would calculate and validate the elapsed time since the sexual assault,adding explanations to some buttons,and providing training.Conclusions:Our findings highlight the value of using a mixed methods research design to conduct a usability and acceptability test.Nurses are more likely to adopt a new technology for their evidencebased practice when the technology is easy to use and useful and requires less time to find the right piece of guideline evidence.Individualized training needs to be designed based on users'characteristics.
文摘This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.
基金the National Natural Science Foundation of China under Grant No.61272038 and No.61340059,Zhengzhou Academician Workstation Funded Projects,the Education Department of Henan Province Science and Technology Research Project,Key Project of Science and Technology Research,the Doctor Fund of Zhengzhou University of Light Industry
文摘Based on the theory of polymorphic virtual S-box, the paper presents a symmetric key exchange protocol to solve the problem of session keys delete shared in the computational complexity temporary trading scenario. Both parties jointly construct a highly nonlinear SPN core algorithm. The paper the connotation of polymorphic cipher theory, making use of the method of self-compiler based expansion factor to collect random parameter sets held by each of the parties containing its own information 5-tuple private keys array Kpa[5] and Kpb[5].The more efficient polymorphism virtual S-box is constructed. The method of secret split for the public key cryptography features can be implemented by symmetry cipher system. The research results will provide a theoretical basis to solve the key exchange problems for short- term communications partner based on symmetric cryptography.
文摘The present paper defines interdiscursivity as the mixing of diverse genres, discourses, or styles in a single text. It also traces the origin of interdiscursivity and takes it as a special kind of intertextuality. Then the paper gives a review of interdiscursivity studies in literary and non-literary fields. The former is usually conducted from the stylistic approach, while the latter from the CDA (critical discourse analysis) approach. The contributions and limitations of the previous studies are also summarized with the purpose of presenting an objective picture of the research. Based upon the detailed review, the paper offers some perspectives for the future research. It is hoped that this will shed some light on our understanding of interdiscursivity.
文摘Ancient Greece having survived uninterruptedly through centuries, consists an incontestably cultural capital of overriding importance for the global community and especially for Greece itself. Mythical elements usually become frameworks or structures, in which Greek literary tradition encodes Greek national virtues and promotes nationalistic goals. On the other hand, myth's adaptations to different chrono-topes generate diversified cultural reception, adjusted to the era and the audience's expectations. The mythical figures are constantly invested in different conceptual schemata, which correspond to the altered way of thinking. Myth is also usually embedded in or underlies fantasy genre, which becomes a vehicle for utterances on women's rights. In this paper, we are going to examine closely three "fantasy" novels for children with mythical intertextual elements: The Fortunate lsles (1989), Torch (1987), and Sirena (1998), whose plot takes place in Greece and we will try to explore: (1) how is Greekness being perceived and presented; and (2) how is female identity being introjected or depicted, in order to find out if the subversive potential of the fantasy genre reworks and rationalizes femininity and Greekness, which have for so long been exploited by the patriarchal or nationalistic status quo.
文摘We propose using the concept of decisive moment in order to deconstruct the obvious ideological effects found in discourse. The subject is constituted in enunciation, and its polysemic discourse clashes with the transparency of meaning. According to Pêcheux (1988), the contradictions in discourse simultaneously establish regularity and instability of meanings, leading it to misunderstanding, to the event. Photography destabilizes that which is already formulated and brings out that which is new, the unexpected meaning, the decisive moment. We analyze this process in the picture by Sebastiao Salgado---"The cradle of inequality lies in the inequality of the cradle". (CAPES-BEX 4394/10-0, FAPESP 09/54417-4, CNPq.)
文摘Understanding that Homer's Odyssey (1998) has a feminine perspective, this paper intends to explore the Greek epic placing queen Penelope as the protagonist, observing, mainly, the narratological shifts in the story grammar, duration and character elaboration. This study also uses Paul Ricoeur's The Rule of Metaphor (2008) to analyze the episode of the shroud in Homer's Odyssey. Ricoeur sees metaphor in three distinct levels: the level of lexis where he bases himself in the works of Aristotle; the level of phrase in which he recurs to the structuralist linguistician l^mile Benveniste; and the metaphor in the level of discourse, when Ricoeur himself devises an elaborate study of the figure of speech. Penelope's weaving can be understood as a representation of discourse and of the feminine. Such analogy transcends the stereotype she is often given and defines a new role for the character in the epic.