Giora proposed that general principle of salience: salient comprehension of figurative and meanings are processed first and literal language be governed by a more meaning salience determines the type of processing in...Giora proposed that general principle of salience: salient comprehension of figurative and meanings are processed first and literal language be governed by a more meaning salience determines the type of processing invoked. According to the Graded Salience Hypothesis, processing familiar metaphors should involve the activation of both their metaphoric and literal meanings, regardless of the type of context in which they are embedded. Processing less familiar metaphors should activate the literal meaning in both types of contexts; however, in the literally biased context, it should be the only one activated. Processing familiar idioms in context biased towards the idiomatic meaning should evoke their figurative meaning almost exclusively, because their figurative meaning is much more salient than their literal meaning. However, processing less familiar idioms in an idiomatic context should activate both their literal and idiomatic meanings because both meanings enjoy similar salience status.展开更多
In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, wh...In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, which usually contain some sensitive information of personal or analysis, will result in leakage of user privacy. Therefore, it is becoming increasingly important to protect privacy information in data publishing. In this paper, we focus on the multi-type self-identified format-preserving encryption. First, we introduce a multi-type self-identified format-preserving encryption system and discuss the encryption of various types of data in this system. Then, for the format preserving encryption(FPE) about Chinese name, we study from the encryption model construction and basic encryption scheme. The format-preserving encryption model about Chinese name is constructed and the concept of the name library is presented. Based on this, it is used to not only limit the message space to reduce complexity, but also ensure the cipher in accordance with the Chinese naming habits. In addition, according to the encryption and decryption model, format-preserving encryption process of Chinese name is designed. In order to add new names, the algorithm of name space expansion is proposed. Based on the Prefix, this paper put forward an algorithm named Cycle-Prefix, which enhances the security and dynamics of FPE by using two adjustment factors and the circular encryption. Compared with the traditional Prefix algorithm, experiments show that Cycle-Prefix can not only complete the task of FPE for Chinese name, but also encrypt same plain text into different ciphers under the premise of similar efficiency with Prefix.展开更多
Although investigating metaphors in advertising is gaining in popularity, there are still certain unresolved arguments, such as the interaction between elements of different modalities. This study,composed of three be...Although investigating metaphors in advertising is gaining in popularity, there are still certain unresolved arguments, such as the interaction between elements of different modalities. This study,composed of three behavioral experiments, aims to identify how verbal anchoring(literal anchoring, metaphor anchoring and unrelated anchoring) influences the processing of pictorial metaphors in advertising, by observing the cognitive and affective indicators, advertising comprehension and advertising likeability. The results showed 1) that metaphors in pictorial modality were recognized more quickly than those in verbal modality, 2) that verbal anchoring facilitated participants ’ comprehending and appreciating of pictorial metaphors and 3) that literally-anchored metaphors with a moderate level of novelty yielded the most favorable cognitive responses. The study not only enriches the existing theoretical framework of multimodal metaphors in advertising, but also proposes an optimal match between pictorial metaphors and verbal elements, for advertisers and manufacturers to design effective multimodal advertisements.展开更多
Hidden Markov Model(HMM) is a main solution to ambiguities in Chinese segmentation anti POS (part-of-speech) tagging. While most previous works tot HMM-based Chinese segmentation anti POS tagging eonsult POS infor...Hidden Markov Model(HMM) is a main solution to ambiguities in Chinese segmentation anti POS (part-of-speech) tagging. While most previous works tot HMM-based Chinese segmentation anti POS tagging eonsult POS informatiou in contexts, they do not utilize lexieal information which is crucial for resoMng certain morphologieal ambiguity. This paper proposes a method which incorporates lexieal information and wider context information into HMM. Model induction anti related smoothing technique are presented in detail. Experiments indicate that this technique improves the segmentation and tagging accuracy by nearly 1%.展开更多
A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by ad...A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by adjusting the weights of neurons in the designed neural network. When extracting the watermark extraction, those coefficients would be extracted by wavelet decomposition. With the trained multilayer feed forward neural network, the watermark would be obtained finally by measuring the weights of neurons. Experimental results show that the average error coding rate is only 6% for the proposed scheme and compared with other classical algorithms on the same tests, it is indicated that the proposed algorithm hashigher robustness, better invisibility and less loss on precision.展开更多
In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all...In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all the keywords in the data collection.We then calculate the relevance scores of the elements in the similarity keyword sets by the widely used tf-idf theory.Leveraging both the similarity keyword sets and the relevance scores,we present a new secure and efficient treebased index structure for privacy-preserving top-k keyword similarity search.To prevent potential statistical attacks,we also introduce a two-server model to separate the association between the index structure and the data collection in cloud servers.Thorough analysis is given on the validity of search functionality and formal security proofs are presented for the privacy guarantee of our solution.Experimental results on real-world data sets further demonstrate the availability and efficiency of our solution.展开更多
Literature continues to generate controversies as to what it is and what it is for. That is one of the reasons for the proliferation of "literary theories." The notion is here placed between quotation marks because ...Literature continues to generate controversies as to what it is and what it is for. That is one of the reasons for the proliferation of "literary theories." The notion is here placed between quotation marks because it does not mean the same thing to all the scholars in the field. Some regard it in the same way that theory functions in the sciences, where it focuses on the object it is associated with. For example, the atomic theory of matter is concerned with the internal constitution or the characterizing properties of matter. Others, however, are looking beyond the object towards the reader and the extra-textual environment. The approaches to literary studies which look beyond the individual work to outside phenomena are many and increasing all the time as new issues and concerns arrive on the social scene. Issues of climate change are fairly topical now; and criticism is already responding with such ideas as eco-criticism. The question of the identity of the literary object has to be kept in the front burner, so that it is not swamped by the many different interests which attach to literature from time to time. Bringing attention back to the literary work is the central concern of this paper; and we are doing this by way of the metaphors of perception often used with respect to the literary work as these suggest that the work is something to focus on, rather than to see through to something else. Finally, I elaborate the concept of integrity as an appurtenance of the literary text that attracts and holds the gaze.展开更多
A multi-character recognition method based on hidden Markov model (HMM) was presented. The method can reduce the calculation load of correlation and improve recognition accuracy compared with singlecharacter recogni...A multi-character recognition method based on hidden Markov model (HMM) was presented. The method can reduce the calculation load of correlation and improve recognition accuracy compared with singlecharacter recognition in video. The characteristics used for recognizing include the shape character, the color character, the texture character and so on. Even our human being generally uses these characteristics to recognize objects in practice..4, recognition experiment of 17 fishes was carried out in the paper. The experimental results demonstrate the high veracity of the multi-character recognition algorithm. Together with the tracking process, it can handle dynamic objects, so the multi-character recognition is more like the human recognition, and has great application value.展开更多
We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can u...We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can use his private key to control all the watermarking parameters freely.Neither original data cube nor the watermark is required in watermark detection.Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability,robustness and efficiency.Our results show that the scheme performs well in actual applications.展开更多
文摘Giora proposed that general principle of salience: salient comprehension of figurative and meanings are processed first and literal language be governed by a more meaning salience determines the type of processing invoked. According to the Graded Salience Hypothesis, processing familiar metaphors should involve the activation of both their metaphoric and literal meanings, regardless of the type of context in which they are embedded. Processing less familiar metaphors should activate the literal meaning in both types of contexts; however, in the literally biased context, it should be the only one activated. Processing familiar idioms in context biased towards the idiomatic meaning should evoke their figurative meaning almost exclusively, because their figurative meaning is much more salient than their literal meaning. However, processing less familiar idioms in an idiomatic context should activate both their literal and idiomatic meanings because both meanings enjoy similar salience status.
基金supported by the National Natural Science Foundation of China under Grant(No.61772085),(No.61672109),(No.1472024)and.(No.61532012)
文摘In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, which usually contain some sensitive information of personal or analysis, will result in leakage of user privacy. Therefore, it is becoming increasingly important to protect privacy information in data publishing. In this paper, we focus on the multi-type self-identified format-preserving encryption. First, we introduce a multi-type self-identified format-preserving encryption system and discuss the encryption of various types of data in this system. Then, for the format preserving encryption(FPE) about Chinese name, we study from the encryption model construction and basic encryption scheme. The format-preserving encryption model about Chinese name is constructed and the concept of the name library is presented. Based on this, it is used to not only limit the message space to reduce complexity, but also ensure the cipher in accordance with the Chinese naming habits. In addition, according to the encryption and decryption model, format-preserving encryption process of Chinese name is designed. In order to add new names, the algorithm of name space expansion is proposed. Based on the Prefix, this paper put forward an algorithm named Cycle-Prefix, which enhances the security and dynamics of FPE by using two adjustment factors and the circular encryption. Compared with the traditional Prefix algorithm, experiments show that Cycle-Prefix can not only complete the task of FPE for Chinese name, but also encrypt same plain text into different ciphers under the premise of similar efficiency with Prefix.
基金supported by the National Social Science Foundation of China (Grant No. 19BYY088)。
文摘Although investigating metaphors in advertising is gaining in popularity, there are still certain unresolved arguments, such as the interaction between elements of different modalities. This study,composed of three behavioral experiments, aims to identify how verbal anchoring(literal anchoring, metaphor anchoring and unrelated anchoring) influences the processing of pictorial metaphors in advertising, by observing the cognitive and affective indicators, advertising comprehension and advertising likeability. The results showed 1) that metaphors in pictorial modality were recognized more quickly than those in verbal modality, 2) that verbal anchoring facilitated participants ’ comprehending and appreciating of pictorial metaphors and 3) that literally-anchored metaphors with a moderate level of novelty yielded the most favorable cognitive responses. The study not only enriches the existing theoretical framework of multimodal metaphors in advertising, but also proposes an optimal match between pictorial metaphors and verbal elements, for advertisers and manufacturers to design effective multimodal advertisements.
基金国家高技术研究发展计划(863计划),the National Natural Science Foundation of China
文摘Hidden Markov Model(HMM) is a main solution to ambiguities in Chinese segmentation anti POS (part-of-speech) tagging. While most previous works tot HMM-based Chinese segmentation anti POS tagging eonsult POS informatiou in contexts, they do not utilize lexieal information which is crucial for resoMng certain morphologieal ambiguity. This paper proposes a method which incorporates lexieal information and wider context information into HMM. Model induction anti related smoothing technique are presented in detail. Experiments indicate that this technique improves the segmentation and tagging accuracy by nearly 1%.
文摘A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by adjusting the weights of neurons in the designed neural network. When extracting the watermark extraction, those coefficients would be extracted by wavelet decomposition. With the trained multilayer feed forward neural network, the watermark would be obtained finally by measuring the weights of neurons. Experimental results show that the average error coding rate is only 6% for the proposed scheme and compared with other classical algorithms on the same tests, it is indicated that the proposed algorithm hashigher robustness, better invisibility and less loss on precision.
基金supported partly by the following funding agencies:the National Natural Science Foundation(No.61170274)the Innovative Research Groups of the National Natural Science Foundation(No.61121061)+1 种基金the National Key Basic Research Program of China (No.2011CB302506)Youth Scientific Research and Innovation Plan of Beijing University of Posts and Telecommunications(No. 2013RC1101)
文摘In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all the keywords in the data collection.We then calculate the relevance scores of the elements in the similarity keyword sets by the widely used tf-idf theory.Leveraging both the similarity keyword sets and the relevance scores,we present a new secure and efficient treebased index structure for privacy-preserving top-k keyword similarity search.To prevent potential statistical attacks,we also introduce a two-server model to separate the association between the index structure and the data collection in cloud servers.Thorough analysis is given on the validity of search functionality and formal security proofs are presented for the privacy guarantee of our solution.Experimental results on real-world data sets further demonstrate the availability and efficiency of our solution.
文摘Literature continues to generate controversies as to what it is and what it is for. That is one of the reasons for the proliferation of "literary theories." The notion is here placed between quotation marks because it does not mean the same thing to all the scholars in the field. Some regard it in the same way that theory functions in the sciences, where it focuses on the object it is associated with. For example, the atomic theory of matter is concerned with the internal constitution or the characterizing properties of matter. Others, however, are looking beyond the object towards the reader and the extra-textual environment. The approaches to literary studies which look beyond the individual work to outside phenomena are many and increasing all the time as new issues and concerns arrive on the social scene. Issues of climate change are fairly topical now; and criticism is already responding with such ideas as eco-criticism. The question of the identity of the literary object has to be kept in the front burner, so that it is not swamped by the many different interests which attach to literature from time to time. Bringing attention back to the literary work is the central concern of this paper; and we are doing this by way of the metaphors of perception often used with respect to the literary work as these suggest that the work is something to focus on, rather than to see through to something else. Finally, I elaborate the concept of integrity as an appurtenance of the literary text that attracts and holds the gaze.
基金the National Natural Science Foundation of China (No.60675024)
文摘A multi-character recognition method based on hidden Markov model (HMM) was presented. The method can reduce the calculation load of correlation and improve recognition accuracy compared with singlecharacter recognition in video. The characteristics used for recognizing include the shape character, the color character, the texture character and so on. Even our human being generally uses these characteristics to recognize objects in practice..4, recognition experiment of 17 fishes was carried out in the paper. The experimental results demonstrate the high veracity of the multi-character recognition algorithm. Together with the tracking process, it can handle dynamic objects, so the multi-character recognition is more like the human recognition, and has great application value.
基金the National Natural Science Foundation of China(No.60703032)the National High Technology Research and Development Program(863)of China(No.2007AA01Z456)
文摘We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can use his private key to control all the watermarking parameters freely.Neither original data cube nor the watermark is required in watermark detection.Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability,robustness and efficiency.Our results show that the scheme performs well in actual applications.