The dominant error source of mobile terminal location in wireless sensor networks (WSNs) is the non-line-of-sight (NLOS) propagation error. Among the algorithms proposed to mitigate the influence of NLOS propagati...The dominant error source of mobile terminal location in wireless sensor networks (WSNs) is the non-line-of-sight (NLOS) propagation error. Among the algorithms proposed to mitigate the influence of NLOS propagation error, residual test (RT) is an efficient one, however with high computational complexity (CC). An improved algorithm that memorizes the light of sight (LOS) range measurements (RMs) identified memorize LOS range measurements identified residual test (MLSI-RT) is presented in this paper to address this problem. The MLSI-RT is based on the assumption that when all RMs are from LOS propagations, the normalized residual follows the central Chi-Square distribution while for NLOS cases it is non-central. This study can reduce the CC by more than 90%.展开更多
The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Infor...The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Information (PII) and other confidential or protected information that may have been memorized during training, specifically during a fine-tuning or customization process. We describe different black-box attacks from potential adversaries and study their impact on the amount and type of information that may be recovered from commonly used and deployed LLMs. Our research investigates the relationship between PII leakage, memorization, and factors such as model size, architecture, and the nature of attacks employed. The study utilizes two broad categories of attacks: PII leakage-focused attacks (auto-completion and extraction attacks) and memorization-focused attacks (various membership inference attacks). The findings from these investigations are quantified using an array of evaluative metrics, providing a detailed understanding of LLM vulnerabilities and the effectiveness of different attacks.展开更多
Working memory is one of the essential higher cognitive functions that actively holds behaviorally-relevant information essential for guiding subsequent actions. It includes subsystems that store and manipulate single...Working memory is one of the essential higher cognitive functions that actively holds behaviorally-relevant information essential for guiding subsequent actions. It includes subsystems that store and manipulate singlemode or multi-modal sensory information, e.g., spatial information, visual images, auditory scenes, olfactory objects, or any combination of these. In addition to merely holding a certain amount of information for a short period of time, as is generally believed, the cognitive processes involved are far more complex, including the executive and attentional control of short-term memory, permitting interim integration, and the processing, disposal, and retrieval of information. Evolution-wise, working memory is essential for the behavioral flexibility that allows humans and animals to quickly adapt to rapidly changing environments.展开更多
The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Infor...The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Information (PII) and other confidential or protected information that may have been memorized during training, specifically during a fine-tuning or customization process. This inadvertent leakage of sensitive information typically occurs when the models are subjected to black-box attacks. To address the growing concerns of safeguarding private and sensitive information while simultaneously preserving its utility, we analyze the performance of Targeted Catastrophic Forgetting (TCF). TCF involves preserving targeted pieces of sensitive information within datasets through an iterative pipeline which significantly reduces the likelihood of such information being leaked or reproduced by the model during black-box attacks, such as the autocompletion attack in our case. The experiments conducted using TCF evidently demonstrate its capability to reduce the extraction of PII while still preserving the context and utility of the target application.展开更多
Memorization has been long viewed as a bad practice or the opposite of meaningful learning.A survey on the role of memorization in ESL/EFL learning is carried out in Vestal Middle School,Binghamton High School and Bin...Memorization has been long viewed as a bad practice or the opposite of meaningful learning.A survey on the role of memorization in ESL/EFL learning is carried out in Vestal Middle School,Binghamton High School and Binghamton University under the guidance of Professor Jennifer Brondell.The result shows that a majority of subjects were found to emphasize the important role of memorization as a strategy in helping students to obtain better accuracy and fluency,use language knowledge reserve,and gain more self-confidence.展开更多
Words acquisition should be the most decisive and basic part, though modern English education does not take enough attention, especially in college English teaching. A recent survey on the Internet reveals that colleg...Words acquisition should be the most decisive and basic part, though modern English education does not take enough attention, especially in college English teaching. A recent survey on the Internet reveals that college students are worrying about their words power very much, eager to find an efficient and effective way. Hence, various modes of word memorizing methods are collected and a brief classification and remark are available. By an overall analysis of those methods, a new approach compromised by different kinds of methods turns out. This new approach completely abides by the philosophy of pragmatism, and every idea with practical use will be introduced to it, e.g. psychology of language and so on.展开更多
Hypnosis is more and more used in many fields in modern society. The article suggests hypotheses and some problems about the use of hypnosis in foreign language teaching from 7 aspects: application of hypnosis in att...Hypnosis is more and more used in many fields in modern society. The article suggests hypotheses and some problems about the use of hypnosis in foreign language teaching from 7 aspects: application of hypnosis in attention; application of hypnosis in keeping best study state; application of hypnosis in English teaching; application of hypnosis in avoiding mother tongue influence; application of hypnosis in memorizing; application of hypnosis in inputting knowledge; application of hypnosis in mentality hint.展开更多
To put more information into a difference scheme of a differential equation for making an accurate prediction, a new kind of time integration scheme, known as the retrospective (RT) scheme, is proposed on the basis of...To put more information into a difference scheme of a differential equation for making an accurate prediction, a new kind of time integration scheme, known as the retrospective (RT) scheme, is proposed on the basis of the memorial dynamics. Stability criteria of the scheme for an advection equation in certain conditions are derived mathematically. The computations for the advection equation have been conducted with its RT scheme. It is shown that the accuracy of the scheme is much higher than that of the leapfrog (LF) difference scheme.展开更多
The findings of the study indicate that students prefer to engage in the vocabulary learning strategies that would be most appealing to them and that would entail less manipulation of the language. Of the four vocabul...The findings of the study indicate that students prefer to engage in the vocabulary learning strategies that would be most appealing to them and that would entail less manipulation of the language. Of the four vocabulary memorizing strategies cited in the study (rote repetition, structural associations, semantic strategies, and mnemonic keyword techniques), students apparently tended to favor the second and the third ones, though rote repetition remains appealing to some of them. Mnemonic devices such as keyword method were rather unpopular to most of the students because they would involve the learners in more active performance of the target language.展开更多
In this article, the author proposed guesses about memorizing, basing on the observation of hypnosis and its application on acquisition of vocabulary, and advanced the concepts of meaningful decoding and meaning rebui...In this article, the author proposed guesses about memorizing, basing on the observation of hypnosis and its application on acquisition of vocabulary, and advanced the concepts of meaningful decoding and meaning rebuilding, which are the two main courses in mem- orizing.展开更多
In this paper, upon the pictographic theory and the behaviorist theory, based on Xiang's(2007) pictographic memorizing method, the author designs the corresponding procedure of the senior high school English vocab...In this paper, upon the pictographic theory and the behaviorist theory, based on Xiang's(2007) pictographic memorizing method, the author designs the corresponding procedure of the senior high school English vocabulary teaching. This research results show that, the application of the pictographic memorizing method in senior high school English vocabulary teaching is feasible and the teaching effect is relatively good.展开更多
A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino ...A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However,human memorability constrains the number of keys. Single sign-on server,key hashing,key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name,but numeric 4-digit passcode,key hashing,key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts.展开更多
Based on empirical research and qualitative analysis, this paper aims to explore the effects of interlingual strategies on L2 vocabulary teaching. The results show that, during L2 vocabulary teaching process, the prop...Based on empirical research and qualitative analysis, this paper aims to explore the effects of interlingual strategies on L2 vocabulary teaching. The results show that, during L2 vocabulary teaching process, the proper application of interlingual strategies can effectively facilitate the memorization of new words, and the bilingual method (both English explanation and Chinese translation) is welcomed by most subjects. Therefore, using L1 as a means of semantization or as a tool for checking and validating L2 learners' understanding of word meaning should not be completely rejected, especially for adult Chinese EFL learners.展开更多
The Memorable Tourist Experience(MTE)is a scientific concept within the studies on tourism that is developed based on several related constructions:Perceived Confidence,Sincerity,Authenticity,and Satisfaction.This wor...The Memorable Tourist Experience(MTE)is a scientific concept within the studies on tourism that is developed based on several related constructions:Perceived Confidence,Sincerity,Authenticity,and Satisfaction.This work takes this model established by the work of Dr.Babak Taheri in 2018 on Monuments World Heritage of UNESCO,adopting an alternative data collection method to the face-to-face survey.Therefore,this work takes as a source of data the reviews collected in the recommendation platform TripAdvisor,working the same constructions of the MTE,with the collection of similar terms and the relationships between them.In order to highlight the terms,a first step is established with the use of Natural Language Processing(NLP),followed by the use of Machine Learning(ML)techniques to generate the relationships between the constructors defined in the models.The study makes a comparison using the method,in immaterial nature such as a flamenco show in the city of Seville;Flamenco has been declared by UNESCO an intangible World Heritage Site since 2010.The results of the study go in two directions:on the one hand to find similarities in the study of the specific MTE of both monuments with the hypotheses worked in the original model of Taheri.In addition to highlighting possible distinctive elements of each case and,and furthermore within the value contribution of the visit when it is led by an official tour guide,on the other hand,give presence to the model of obtaining data by reviews as a complementary data source of any tourist study.The data collection and analysis from both NLP and ML techniques permit the scientific study and the tourist operators to develop better value propositions to users and understanding of heterogeneous behaviors in the tourism industry.The study of reviews within the MTE allows identifying the stimulus that leads the user to choose an activity and hire it.These studies are extendable to other industries and business models,given the importance that references acquire within the consumer willing to buy.For the scientific community,the use of ML is a solid way to initiate studies on behavioral models,supplement them,and accept or reject hypotheses.When the source of the data is taken from free expressions,such as reviews,the appearance of bias in the behavior is attenuated.展开更多
Traditional ways of English learning such as memorizing a certain couple of words and reciting from the word list seem much easier than developing a useful vocabulary for L2 learners. However, learners complain that t...Traditional ways of English learning such as memorizing a certain couple of words and reciting from the word list seem much easier than developing a useful vocabulary for L2 learners. However, learners complain that they have suffered from couples of difficulties as the words are easy to be forgotten. Compare with the ways of mechanical memorizing, it argues that providing L2 learners with the development of useful lexical knowledge such as semantic information and morphological structure is more effective in the process of language acquisition. Moreover, developing a useful lexical knowledge is far more complicated for English learners.展开更多
Different teaching philosophies derive from different cultural background.There are many differences between American and Chinese teaching philosophies because of their different cultural background.Under the guidance...Different teaching philosophies derive from different cultural background.There are many differences between American and Chinese teaching philosophies because of their different cultural background.Under the guidance of different philosophies,there are different teaching styles between American and Chinese Classroom teaching.展开更多
At the beginning of June, 2012, I had the honor to join a CAFIU team to visit Canada and the United States, which was my first visit to this continent across the shining ocean.As an English major, I am not a stranger ...At the beginning of June, 2012, I had the honor to join a CAFIU team to visit Canada and the United States, which was my first visit to this continent across the shining ocean.As an English major, I am not a stranger to the American society, politics and culture. As a girl born in the 1980s, my peers grew up with展开更多
Vocabulary memorization is the most basic for English learners.Schema theory and chunking theory,which are both based on psychology,provide guidance for English vocabulary memorization.This thesis analyzes and discuss...Vocabulary memorization is the most basic for English learners.Schema theory and chunking theory,which are both based on psychology,provide guidance for English vocabulary memorization.This thesis analyzes and discusses the theories respectively and explores how they are applied to learners who take English as their second language,in accordance with the characteristics of human memory process.It aims at raising learning efficiency when students are memorizing new words and expressions on the basis of their cognition ability.展开更多
基金supported by the State Key Program of National Natural Science of China (Grant No.60532030)the New Century Excellent Talents in University (Grant No.NCET-08-0333)the Natural Science Foundation of Shandong Province (Grant No.Y2007G10)
文摘The dominant error source of mobile terminal location in wireless sensor networks (WSNs) is the non-line-of-sight (NLOS) propagation error. Among the algorithms proposed to mitigate the influence of NLOS propagation error, residual test (RT) is an efficient one, however with high computational complexity (CC). An improved algorithm that memorizes the light of sight (LOS) range measurements (RMs) identified memorize LOS range measurements identified residual test (MLSI-RT) is presented in this paper to address this problem. The MLSI-RT is based on the assumption that when all RMs are from LOS propagations, the normalized residual follows the central Chi-Square distribution while for NLOS cases it is non-central. This study can reduce the CC by more than 90%.
文摘The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Information (PII) and other confidential or protected information that may have been memorized during training, specifically during a fine-tuning or customization process. We describe different black-box attacks from potential adversaries and study their impact on the amount and type of information that may be recovered from commonly used and deployed LLMs. Our research investigates the relationship between PII leakage, memorization, and factors such as model size, architecture, and the nature of attacks employed. The study utilizes two broad categories of attacks: PII leakage-focused attacks (auto-completion and extraction attacks) and memorization-focused attacks (various membership inference attacks). The findings from these investigations are quantified using an array of evaluative metrics, providing a detailed understanding of LLM vulnerabilities and the effectiveness of different attacks.
文摘Working memory is one of the essential higher cognitive functions that actively holds behaviorally-relevant information essential for guiding subsequent actions. It includes subsystems that store and manipulate singlemode or multi-modal sensory information, e.g., spatial information, visual images, auditory scenes, olfactory objects, or any combination of these. In addition to merely holding a certain amount of information for a short period of time, as is generally believed, the cognitive processes involved are far more complex, including the executive and attentional control of short-term memory, permitting interim integration, and the processing, disposal, and retrieval of information. Evolution-wise, working memory is essential for the behavioral flexibility that allows humans and animals to quickly adapt to rapidly changing environments.
文摘The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Information (PII) and other confidential or protected information that may have been memorized during training, specifically during a fine-tuning or customization process. This inadvertent leakage of sensitive information typically occurs when the models are subjected to black-box attacks. To address the growing concerns of safeguarding private and sensitive information while simultaneously preserving its utility, we analyze the performance of Targeted Catastrophic Forgetting (TCF). TCF involves preserving targeted pieces of sensitive information within datasets through an iterative pipeline which significantly reduces the likelihood of such information being leaked or reproduced by the model during black-box attacks, such as the autocompletion attack in our case. The experiments conducted using TCF evidently demonstrate its capability to reduce the extraction of PII while still preserving the context and utility of the target application.
文摘Memorization has been long viewed as a bad practice or the opposite of meaningful learning.A survey on the role of memorization in ESL/EFL learning is carried out in Vestal Middle School,Binghamton High School and Binghamton University under the guidance of Professor Jennifer Brondell.The result shows that a majority of subjects were found to emphasize the important role of memorization as a strategy in helping students to obtain better accuracy and fluency,use language knowledge reserve,and gain more self-confidence.
文摘Words acquisition should be the most decisive and basic part, though modern English education does not take enough attention, especially in college English teaching. A recent survey on the Internet reveals that college students are worrying about their words power very much, eager to find an efficient and effective way. Hence, various modes of word memorizing methods are collected and a brief classification and remark are available. By an overall analysis of those methods, a new approach compromised by different kinds of methods turns out. This new approach completely abides by the philosophy of pragmatism, and every idea with practical use will be introduced to it, e.g. psychology of language and so on.
文摘Hypnosis is more and more used in many fields in modern society. The article suggests hypotheses and some problems about the use of hypnosis in foreign language teaching from 7 aspects: application of hypnosis in attention; application of hypnosis in keeping best study state; application of hypnosis in English teaching; application of hypnosis in avoiding mother tongue influence; application of hypnosis in memorizing; application of hypnosis in inputting knowledge; application of hypnosis in mentality hint.
基金The project supported by the National Key Program for Developing Basic Sciences (G1999043408 and G1998040901-1)the National Natural Sciences Foundation of China (40175024 and 40035010)
文摘To put more information into a difference scheme of a differential equation for making an accurate prediction, a new kind of time integration scheme, known as the retrospective (RT) scheme, is proposed on the basis of the memorial dynamics. Stability criteria of the scheme for an advection equation in certain conditions are derived mathematically. The computations for the advection equation have been conducted with its RT scheme. It is shown that the accuracy of the scheme is much higher than that of the leapfrog (LF) difference scheme.
文摘The findings of the study indicate that students prefer to engage in the vocabulary learning strategies that would be most appealing to them and that would entail less manipulation of the language. Of the four vocabulary memorizing strategies cited in the study (rote repetition, structural associations, semantic strategies, and mnemonic keyword techniques), students apparently tended to favor the second and the third ones, though rote repetition remains appealing to some of them. Mnemonic devices such as keyword method were rather unpopular to most of the students because they would involve the learners in more active performance of the target language.
文摘In this article, the author proposed guesses about memorizing, basing on the observation of hypnosis and its application on acquisition of vocabulary, and advanced the concepts of meaningful decoding and meaning rebuilding, which are the two main courses in mem- orizing.
文摘In this paper, upon the pictographic theory and the behaviorist theory, based on Xiang's(2007) pictographic memorizing method, the author designs the corresponding procedure of the senior high school English vocabulary teaching. This research results show that, the application of the pictographic memorizing method in senior high school English vocabulary teaching is feasible and the teaching effect is relatively good.
文摘A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However,human memorability constrains the number of keys. Single sign-on server,key hashing,key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name,but numeric 4-digit passcode,key hashing,key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts.
文摘Based on empirical research and qualitative analysis, this paper aims to explore the effects of interlingual strategies on L2 vocabulary teaching. The results show that, during L2 vocabulary teaching process, the proper application of interlingual strategies can effectively facilitate the memorization of new words, and the bilingual method (both English explanation and Chinese translation) is welcomed by most subjects. Therefore, using L1 as a means of semantization or as a tool for checking and validating L2 learners' understanding of word meaning should not be completely rejected, especially for adult Chinese EFL learners.
文摘The Memorable Tourist Experience(MTE)is a scientific concept within the studies on tourism that is developed based on several related constructions:Perceived Confidence,Sincerity,Authenticity,and Satisfaction.This work takes this model established by the work of Dr.Babak Taheri in 2018 on Monuments World Heritage of UNESCO,adopting an alternative data collection method to the face-to-face survey.Therefore,this work takes as a source of data the reviews collected in the recommendation platform TripAdvisor,working the same constructions of the MTE,with the collection of similar terms and the relationships between them.In order to highlight the terms,a first step is established with the use of Natural Language Processing(NLP),followed by the use of Machine Learning(ML)techniques to generate the relationships between the constructors defined in the models.The study makes a comparison using the method,in immaterial nature such as a flamenco show in the city of Seville;Flamenco has been declared by UNESCO an intangible World Heritage Site since 2010.The results of the study go in two directions:on the one hand to find similarities in the study of the specific MTE of both monuments with the hypotheses worked in the original model of Taheri.In addition to highlighting possible distinctive elements of each case and,and furthermore within the value contribution of the visit when it is led by an official tour guide,on the other hand,give presence to the model of obtaining data by reviews as a complementary data source of any tourist study.The data collection and analysis from both NLP and ML techniques permit the scientific study and the tourist operators to develop better value propositions to users and understanding of heterogeneous behaviors in the tourism industry.The study of reviews within the MTE allows identifying the stimulus that leads the user to choose an activity and hire it.These studies are extendable to other industries and business models,given the importance that references acquire within the consumer willing to buy.For the scientific community,the use of ML is a solid way to initiate studies on behavioral models,supplement them,and accept or reject hypotheses.When the source of the data is taken from free expressions,such as reviews,the appearance of bias in the behavior is attenuated.
文摘Traditional ways of English learning such as memorizing a certain couple of words and reciting from the word list seem much easier than developing a useful vocabulary for L2 learners. However, learners complain that they have suffered from couples of difficulties as the words are easy to be forgotten. Compare with the ways of mechanical memorizing, it argues that providing L2 learners with the development of useful lexical knowledge such as semantic information and morphological structure is more effective in the process of language acquisition. Moreover, developing a useful lexical knowledge is far more complicated for English learners.
文摘Different teaching philosophies derive from different cultural background.There are many differences between American and Chinese teaching philosophies because of their different cultural background.Under the guidance of different philosophies,there are different teaching styles between American and Chinese Classroom teaching.
文摘At the beginning of June, 2012, I had the honor to join a CAFIU team to visit Canada and the United States, which was my first visit to this continent across the shining ocean.As an English major, I am not a stranger to the American society, politics and culture. As a girl born in the 1980s, my peers grew up with
文摘Vocabulary memorization is the most basic for English learners.Schema theory and chunking theory,which are both based on psychology,provide guidance for English vocabulary memorization.This thesis analyzes and discusses the theories respectively and explores how they are applied to learners who take English as their second language,in accordance with the characteristics of human memory process.It aims at raising learning efficiency when students are memorizing new words and expressions on the basis of their cognition ability.