The historical and cultural districts of a city serve as important cultural heritage and tourism resources.This paper focused on four such districts in Yangzhou and performed semantic analysis on online public comment...The historical and cultural districts of a city serve as important cultural heritage and tourism resources.This paper focused on four such districts in Yangzhou and performed semantic analysis on online public comments using ROST CM6 software.According to the high frequency words,attention preference of district site elements,activities and feelings in Yangzhou historical and cultural districts were analyzed.Through the analysis of semantic network and public emotional tendency,the relationship between the protection and utilization of Yangzhou historical and cultural districts and the perception and demand of users were discussed,and some suggestions for the protection,utilization and renewal of historical and cultural districts were put forward.展开更多
This paper is attempted to explore advanced English teaching from perspective of text analysis. It involves the introduction of culture background, the application of genre-based approach, the appreciation of writing ...This paper is attempted to explore advanced English teaching from perspective of text analysis. It involves the introduction of culture background, the application of genre-based approach, the appreciation of writing style and the analysis of textual structure through sample studies.展开更多
Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are a...Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are authentication,integrity verication,and tampering detection of the digital contents.In this paper,text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents.The proposed approach embeds and detects the watermark logically without altering the original English text document.Based on hidden Markov model(HMM),the fourth level order of the word mechanism is used to analyze the contents of the given English text to nd the interrelationship between the contexts.The extracted features are used as watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,the proposed approach has been implemented and validated with attacked English text.Experiments were performed using four standard datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the tampering detection accuracy of our method against all kinds of tampering attacks.Comparison results show that our proposed approach outperforms all the other baseline approaches in terms of tampering detection accuracy.展开更多
Purpose:Changes in the world show that the role,importance,and coherence of SSH(social sciences and the humanities)will increase significantly in the coming years.This paper aims to monitor and analyze the evolution(o...Purpose:Changes in the world show that the role,importance,and coherence of SSH(social sciences and the humanities)will increase significantly in the coming years.This paper aims to monitor and analyze the evolution(or overlapping)of the SSH thematic pattern through three funding instruments since 2007.Design/methodology/approach:The goal of the paper is to check to what extent the EU Framework Program(FP)affects/does not affect research on national level,and to highlight hot topics from a given period with the help of text analysis.Funded project titles and abstracts derived from the EU FP,Slovenian,and Estonian RIS were used.The final analysis and comparisons between different datasets were made based on the 200 most frequent words.After removing punctuation marks,numeric values,articles,prepositions,conjunctions,and auxiliary verbs,4,854 unique words in ETIS,4,421 unique words in the Slovenian Research Information System(SICRIS),and 3,950 unique words in FP were identified.Findings:Across all funding instruments,about a quarter of the top words constitute half of the word occurrences.The text analysis results show that in the majority of cases words do not overlap between FP and nationally funded projects.In some cases,it may be due to using different vocabulary.There is more overlapping between words in the case of Slovenia(SL)and Estonia(EE)and less in the case of Estonia and EU Framework Programmes(FP).At the same time,overlapping words indicate a wider reach(culture,education,social,history,human,innovation,etc.).In nationally funded projects(bottom-up),it was relatively difficult to observe the change in thematic trends over time.More specific results emerged from the comparison of the different programs throughout FP(top-down).Research limitations:Only projects with English titles and abstracts were analyzed.Practical implications:The specifics of SSH have to take into account—the one-to-one meaning of terms/words is not as important as,for example,in the exact sciences.Thus,even in co-word analysis,the final content may go unnoticed.Originality/value:This was the first attempt to monitor the trends of SSH projects using text analysis.The text analysis of the SSH projects of the two new EU Member States used in the study showed that SSH’s thematic coverage is not much affected by the EU Framework Program.Whether this result is field-specific or country-specific should be shown in the following study,which targets SSH projects in the so-called old Member States.展开更多
This paper attempts to explore how cohesion is realized by meanings of reference in text analysis. Through analyzing some aspects of reference, especially personal reference and demonstrative reference, we know that r...This paper attempts to explore how cohesion is realized by meanings of reference in text analysis. Through analyzing some aspects of reference, especially personal reference and demonstrative reference, we know that reference is a text characteristic beyond sentences. It contributes to the development of a text and makes the text more cohesive, communicative and accurate. Of course, reference in cohesion is not used separately, it is closely related with other aspects of text analysis, and they cooperate and restrain each other and perform functions together. So translators are required to have the competence of understanding and applying reference, ellipsis and other cohesive device from the viewpoint of texts level with the combination of other aspects in text analysis, then texts can be more cohesive, coherent and acceptable.展开更多
Different from other studies, the paper makes some attempts to combine text analysis with developing students' English thinking ability. Based on the view that English thinking ability is connected with improving ove...Different from other studies, the paper makes some attempts to combine text analysis with developing students' English thinking ability. Based on the view that English thinking ability is connected with improving overall language abilities such as listening, speaking, reading, writing and translating, the paper proposes approaches to develop English thinking ability as well as syntactic fluency. The paper presents a hypothesis: The development of a text is the author's train of thought. If one wants to acquire the thinking way used by author, the indirect but efficient approach is to analyze the texts written by the authors. If we want to develop students' thinking ability, the way is to analyze the various texts rather than to give the list of text developing principles. Therefore, the key to the problem is how to analyze text so as to improve students' thinking ability? Michael Stubbs in his Discourse Analysis wrote, "Predict ability may be the single most important feature of human communication, precisely since it is central not only to all level of language; but also central to meaning and to thinking in general. Predictions are possible because language is structured. Such intuitive predictions are in turn a crucial part of our data in setting up language structures." According to the view given by Michael Stubbs, the paper offers three approaches to analyzing texts.展开更多
This paper is an attempt to discuss the relationship between genre and the thematic progression. Through qualitative analysis of the short story Necklace of Maupassant, it is found that narrative texts always use the ...This paper is an attempt to discuss the relationship between genre and the thematic progression. Through qualitative analysis of the short story Necklace of Maupassant, it is found that narrative texts always use the linear theme pattern and the constant theme pattern, and sometimes the derived theme pattern and other patterns are also used to facilitate the text coherence and the plot development. Thematic progression in various fields has been studied extensively, but the analysis aims to short story is less than text coherence and other aspects. And there are some implications to teaching, writing, reading, and translation.展开更多
The Great Gatsby is universally recognized as one of the masterpieces in the world literature. This thesis adopts the methods of comparison, contrast, and quotation to explore why Great Gatsby is great. This thesis an...The Great Gatsby is universally recognized as one of the masterpieces in the world literature. This thesis adopts the methods of comparison, contrast, and quotation to explore why Great Gatsby is great. This thesis analyzes the text from the three aspects:the greatness in Gatsby's economic success, the greatness in Gatsby's perseverance of love, the greatness of Gatsby's personality. In this way, the readers can understand the great Gatsby's greatness.展开更多
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem...This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.展开更多
Discourse pragmatics interprets the context-specific meaning of communicative events underlining texts in use. It is a cross-disciplinary study based on pragmatics, social linguistics and discourse analysis. This pape...Discourse pragmatics interprets the context-specific meaning of communicative events underlining texts in use. It is a cross-disciplinary study based on pragmatics, social linguistics and discourse analysis. This paper uses the theories and dynamic descriptions of conversation analysis and thematic structure analysis to examine two real texts for their textual and interpersonal meanings in order to illustrate the necessity as well as the feasibility of applying modern linguistic theories in transforming traditional methods of language teaching.展开更多
Recent text generation methods frequently learn node representations from graph‐based data via global or local aggregation,such as knowledge graphs.Since all nodes are connected directly,node global representation en...Recent text generation methods frequently learn node representations from graph‐based data via global or local aggregation,such as knowledge graphs.Since all nodes are connected directly,node global representation encoding enables direct communication between two distant nodes while disregarding graph topology.Node local representation encoding,which captures the graph structure,considers the connections between nearby nodes but misses out onlong‐range relations.A quantum‐like approach to learning bettercontextualised node embeddings is proposed using a fusion model that combines both encoding strategies.Our methods significantly improve on two graph‐to‐text datasets compared to state‐of‐the‐art models in various experiments.展开更多
With the remarkable growth of textual data sources in recent years,easy,fast,and accurate text processing has become a challenge with significant payoffs.Automatic text summarization is the process of compressing text...With the remarkable growth of textual data sources in recent years,easy,fast,and accurate text processing has become a challenge with significant payoffs.Automatic text summarization is the process of compressing text documents into shorter summaries for easier review of its core contents,which must be done without losing important features and information.This paper introduces a new hybrid method for extractive text summarization with feature selection based on text structure.The major advantage of the proposed summarization method over previous systems is the modeling of text structure and relationship between entities in the input text,which improves the sentence feature selection process and leads to the generation of unambiguous,concise,consistent,and coherent summaries.The paper also presents the results of the evaluation of the proposed method based on precision and recall criteria.It is shown that the method produces summaries consisting of chains of sentences with the aforementioned characteristics from the original text.展开更多
This paper analyzes 1,662 travelogues about the Wulong tourism destination from the Mafengwo platform using literature research and network text analysis.The goal is to identify the driving factors affecting Wulong’s...This paper analyzes 1,662 travelogues about the Wulong tourism destination from the Mafengwo platform using literature research and network text analysis.The goal is to identify the driving factors affecting Wulong’s tourism service experience and suggest improvements.By extracting high-frequency words and analyzing emotions from the travelogues,tourists’conceptions and perceptions were identified and the factors affecting the tourism service experience in Wulong were summarized into six categories:tourism resource attractions,tourism transportation,tourism facilities and digital services,cultural charms,special cuisines,and environmental ambiance.Tourists’emotional perceptions of Wulong are primarily positive,with negative perceptions mainly related to unsatisfactory tourism facilities and digital services in the Wulong scenic area.This study helps the Wulong tourist destination understand the issues and deficiencies in tourists’service experiences,providing significant guidance for improving service quality and offering data support for service marketing and optimization.展开更多
In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authenticati...In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents.The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach(SAMMZWA).Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach.The SAMMZWA approach embeds and detects the watermark logically without altering the original text document.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SAMMZWA has been implemented and validated with attacked Arabic text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods.展开更多
In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The thir...In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The third gram of alphanumeric of the Markov model has been used with text-watermarking technologies to improve the performance and accuracy of tampering detection issues which are limited by the existing works reviewed in the literature of this study.The third-grade level of the Markov model has been used in this method as natural language processing technology to analyze an English text and extract the textual characteristics of the given contexts.Moreover,the extracted features have been utilized as watermark information and then validated with the attacked English text to detect any suspected tampering occurred on it.The embedding mechanism of CAZWNLP method will be achieved logically without effects or modifying the original text document to embed a watermark key.CAZWNLP has been implemented using VS code IDE with PHP.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach.展开更多
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a...Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering.展开更多
In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for ...In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing.The HFDATAI solution technically integrates and senses the watermark without modifying the original text.The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated,null-watermarking approach to enhance the proposed approach’s efficiency,accuracy,and intensity.The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of the Arabic language.In addition,the features of the interrelationship among text contexts and characteristics of watermark information extraction that is used later validated for detecting any tampering of the Arabic-text attacked.The HFDATAI strategy was introduced based on PHP with included IDE of VS code.Experiments of four separate duration datasets in random sites illustrate the fragility,efficacy,and applicability of HFDATAI by using the three common tampering attacks i.e.,insertion,reorder,and deletion.The HFDATAI was found to be effective,applicable,and very sensitive for detecting any possible tampering on Arabic text.展开更多
In this paper,the text analysis-based approach RTADZWA(Reliable Text Analysis and Digital Zero-Watermarking Approach)has been proposed for transferring and receiving authentic English text via the internet.Second leve...In this paper,the text analysis-based approach RTADZWA(Reliable Text Analysis and Digital Zero-Watermarking Approach)has been proposed for transferring and receiving authentic English text via the internet.Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it.Text analysis and text zero-watermarking techniques have been integrated by RTADZWA approach to improving the performance,accuracy,capacity,and robustness issues of the previous literature proposed by the researchers.The RTADZWA approach embeds and detects the watermark logically without altering the original text document to embed a watermark.RTADZWA has been implemented using PHP with VS code IDE.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach.展开更多
Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research issue.The main challenges faced by researchers are how ...Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research issue.The main challenges faced by researchers are how to hide the information within the text to use it later for authentication and attacks tampering detection without effects on the meaning and size of the given digital text.In this paper,an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on theArabic text transmitted online via an Internet network.Towards this purpose,the accuracy of tampering detection and watermark robustness has been improved of the proposed method as compared with the existing approaches.In the proposed method,both embedding and extracting of the watermark are logically implemented,which causes no change in the digital text.This is achieved by using the third level and alphanumeric strategy of the Markov model as a text analysis technique for analyzing the Arabic contents to obtain its features which are considered as the digital watermark.This digital watermark will be used later to detecting any tampering of illegal attack on the received Arabic text.An extensive set of experiments using four data sets of varying lengths proves the effectiveness of our approach in terms of detection accuracy,robustness,and effectiveness under multiple random locations of the common tampering attacks.展开更多
Hemingway’s In Another Country expresses rich ideological connotation with extremely concise language,and reveals the cruelty of war and the huge trauma caused by war to human body and mind.This paper explores the mu...Hemingway’s In Another Country expresses rich ideological connotation with extremely concise language,and reveals the cruelty of war and the huge trauma caused by war to human body and mind.This paper explores the multiple meanings of“an⁃other”in this short story by analyzing the background,environment,character identity,social relationship and personal concept.展开更多
基金the Open Project of China Grand Canal Research Institute,Yangzhou University(DYH202211)Jiangsu Provincial Social Science Applied Research Excellent Project(22SYB-053).
文摘The historical and cultural districts of a city serve as important cultural heritage and tourism resources.This paper focused on four such districts in Yangzhou and performed semantic analysis on online public comments using ROST CM6 software.According to the high frequency words,attention preference of district site elements,activities and feelings in Yangzhou historical and cultural districts were analyzed.Through the analysis of semantic network and public emotional tendency,the relationship between the protection and utilization of Yangzhou historical and cultural districts and the perception and demand of users were discussed,and some suggestions for the protection,utilization and renewal of historical and cultural districts were put forward.
文摘This paper is attempted to explore advanced English teaching from perspective of text analysis. It involves the introduction of culture background, the application of genre-based approach, the appreciation of writing style and the analysis of textual structure through sample studies.
基金The author extends his appreciation to the Deanship of Scientic Research at King Khalid University for funding this work under grant number(R.G.P.2/55/40/2019),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.
文摘Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are authentication,integrity verication,and tampering detection of the digital contents.In this paper,text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents.The proposed approach embeds and detects the watermark logically without altering the original English text document.Based on hidden Markov model(HMM),the fourth level order of the word mechanism is used to analyze the contents of the given English text to nd the interrelationship between the contexts.The extracted features are used as watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,the proposed approach has been implemented and validated with attacked English text.Experiments were performed using four standard datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the tampering detection accuracy of our method against all kinds of tampering attacks.Comparison results show that our proposed approach outperforms all the other baseline approaches in terms of tampering detection accuracy.
文摘Purpose:Changes in the world show that the role,importance,and coherence of SSH(social sciences and the humanities)will increase significantly in the coming years.This paper aims to monitor and analyze the evolution(or overlapping)of the SSH thematic pattern through three funding instruments since 2007.Design/methodology/approach:The goal of the paper is to check to what extent the EU Framework Program(FP)affects/does not affect research on national level,and to highlight hot topics from a given period with the help of text analysis.Funded project titles and abstracts derived from the EU FP,Slovenian,and Estonian RIS were used.The final analysis and comparisons between different datasets were made based on the 200 most frequent words.After removing punctuation marks,numeric values,articles,prepositions,conjunctions,and auxiliary verbs,4,854 unique words in ETIS,4,421 unique words in the Slovenian Research Information System(SICRIS),and 3,950 unique words in FP were identified.Findings:Across all funding instruments,about a quarter of the top words constitute half of the word occurrences.The text analysis results show that in the majority of cases words do not overlap between FP and nationally funded projects.In some cases,it may be due to using different vocabulary.There is more overlapping between words in the case of Slovenia(SL)and Estonia(EE)and less in the case of Estonia and EU Framework Programmes(FP).At the same time,overlapping words indicate a wider reach(culture,education,social,history,human,innovation,etc.).In nationally funded projects(bottom-up),it was relatively difficult to observe the change in thematic trends over time.More specific results emerged from the comparison of the different programs throughout FP(top-down).Research limitations:Only projects with English titles and abstracts were analyzed.Practical implications:The specifics of SSH have to take into account—the one-to-one meaning of terms/words is not as important as,for example,in the exact sciences.Thus,even in co-word analysis,the final content may go unnoticed.Originality/value:This was the first attempt to monitor the trends of SSH projects using text analysis.The text analysis of the SSH projects of the two new EU Member States used in the study showed that SSH’s thematic coverage is not much affected by the EU Framework Program.Whether this result is field-specific or country-specific should be shown in the following study,which targets SSH projects in the so-called old Member States.
文摘This paper attempts to explore how cohesion is realized by meanings of reference in text analysis. Through analyzing some aspects of reference, especially personal reference and demonstrative reference, we know that reference is a text characteristic beyond sentences. It contributes to the development of a text and makes the text more cohesive, communicative and accurate. Of course, reference in cohesion is not used separately, it is closely related with other aspects of text analysis, and they cooperate and restrain each other and perform functions together. So translators are required to have the competence of understanding and applying reference, ellipsis and other cohesive device from the viewpoint of texts level with the combination of other aspects in text analysis, then texts can be more cohesive, coherent and acceptable.
文摘Different from other studies, the paper makes some attempts to combine text analysis with developing students' English thinking ability. Based on the view that English thinking ability is connected with improving overall language abilities such as listening, speaking, reading, writing and translating, the paper proposes approaches to develop English thinking ability as well as syntactic fluency. The paper presents a hypothesis: The development of a text is the author's train of thought. If one wants to acquire the thinking way used by author, the indirect but efficient approach is to analyze the texts written by the authors. If we want to develop students' thinking ability, the way is to analyze the various texts rather than to give the list of text developing principles. Therefore, the key to the problem is how to analyze text so as to improve students' thinking ability? Michael Stubbs in his Discourse Analysis wrote, "Predict ability may be the single most important feature of human communication, precisely since it is central not only to all level of language; but also central to meaning and to thinking in general. Predictions are possible because language is structured. Such intuitive predictions are in turn a crucial part of our data in setting up language structures." According to the view given by Michael Stubbs, the paper offers three approaches to analyzing texts.
文摘This paper is an attempt to discuss the relationship between genre and the thematic progression. Through qualitative analysis of the short story Necklace of Maupassant, it is found that narrative texts always use the linear theme pattern and the constant theme pattern, and sometimes the derived theme pattern and other patterns are also used to facilitate the text coherence and the plot development. Thematic progression in various fields has been studied extensively, but the analysis aims to short story is less than text coherence and other aspects. And there are some implications to teaching, writing, reading, and translation.
文摘The Great Gatsby is universally recognized as one of the masterpieces in the world literature. This thesis adopts the methods of comparison, contrast, and quotation to explore why Great Gatsby is great. This thesis analyzes the text from the three aspects:the greatness in Gatsby's economic success, the greatness in Gatsby's perseverance of love, the greatness of Gatsby's personality. In this way, the readers can understand the great Gatsby's greatness.
文摘This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.
文摘Discourse pragmatics interprets the context-specific meaning of communicative events underlining texts in use. It is a cross-disciplinary study based on pragmatics, social linguistics and discourse analysis. This paper uses the theories and dynamic descriptions of conversation analysis and thematic structure analysis to examine two real texts for their textual and interpersonal meanings in order to illustrate the necessity as well as the feasibility of applying modern linguistic theories in transforming traditional methods of language teaching.
基金supported by the National Natural Science Foundation of China under Grant(62077015)the Key Laboratory of Intelligent Education Technology and Application of Zhejiang Province,Zhejiang Normal University,Zhejiang,China,the Key Research and Development Program of Zhejiang Province(No.2021C03141)the National Key R&D Program of China under Grant(2022YFC3303600).
文摘Recent text generation methods frequently learn node representations from graph‐based data via global or local aggregation,such as knowledge graphs.Since all nodes are connected directly,node global representation encoding enables direct communication between two distant nodes while disregarding graph topology.Node local representation encoding,which captures the graph structure,considers the connections between nearby nodes but misses out onlong‐range relations.A quantum‐like approach to learning bettercontextualised node embeddings is proposed using a fusion model that combines both encoding strategies.Our methods significantly improve on two graph‐to‐text datasets compared to state‐of‐the‐art models in various experiments.
文摘With the remarkable growth of textual data sources in recent years,easy,fast,and accurate text processing has become a challenge with significant payoffs.Automatic text summarization is the process of compressing text documents into shorter summaries for easier review of its core contents,which must be done without losing important features and information.This paper introduces a new hybrid method for extractive text summarization with feature selection based on text structure.The major advantage of the proposed summarization method over previous systems is the modeling of text structure and relationship between entities in the input text,which improves the sentence feature selection process and leads to the generation of unambiguous,concise,consistent,and coherent summaries.The paper also presents the results of the evaluation of the proposed method based on precision and recall criteria.It is shown that the method produces summaries consisting of chains of sentences with the aforementioned characteristics from the original text.
基金Master’s Degree Innovation Project of Chongqing University of Science and Technology“Research on the Emotional Value of Tourists in Ethnic Tourism Sites:The Case of Yotkan Old Town”(Project No.YKJCX2320907).
文摘This paper analyzes 1,662 travelogues about the Wulong tourism destination from the Mafengwo platform using literature research and network text analysis.The goal is to identify the driving factors affecting Wulong’s tourism service experience and suggest improvements.By extracting high-frequency words and analyzing emotions from the travelogues,tourists’conceptions and perceptions were identified and the factors affecting the tourism service experience in Wulong were summarized into six categories:tourism resource attractions,tourism transportation,tourism facilities and digital services,cultural charms,special cuisines,and environmental ambiance.Tourists’emotional perceptions of Wulong are primarily positive,with negative perceptions mainly related to unsatisfactory tourism facilities and digital services in the Wulong scenic area.This study helps the Wulong tourist destination understand the issues and deficiencies in tourists’service experiences,providing significant guidance for improving service quality and offering data support for service marketing and optimization.
基金the Deanship of Scientific Research at King Khalid University for funding this work under grant number(R.G.P.2/55/40/2019),Received by Fahd N.Al-Wesabi.www.kku.edu.sa。
文摘In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents.The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach(SAMMZWA).Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach.The SAMMZWA approach embeds and detects the watermark logically without altering the original text document.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SAMMZWA has been implemented and validated with attacked Arabic text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number(R.G.P.2/55/40/2019)Received by Fahd N.Al-Wesabi.www.kku.edu.sa。
文摘In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The third gram of alphanumeric of the Markov model has been used with text-watermarking technologies to improve the performance and accuracy of tampering detection issues which are limited by the existing works reviewed in the literature of this study.The third-grade level of the Markov model has been used in this method as natural language processing technology to analyze an English text and extract the textual characteristics of the given contexts.Moreover,the extracted features have been utilized as watermark information and then validated with the attacked English text to detect any suspected tampering occurred on it.The embedding mechanism of CAZWNLP method will be achieved logically without effects or modifying the original text document to embed a watermark key.CAZWNLP has been implemented using VS code IDE with PHP.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP.1/147/42),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.
文摘Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(G.R.P./14/42),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.
文摘In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing.The HFDATAI solution technically integrates and senses the watermark without modifying the original text.The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated,null-watermarking approach to enhance the proposed approach’s efficiency,accuracy,and intensity.The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of the Arabic language.In addition,the features of the interrelationship among text contexts and characteristics of watermark information extraction that is used later validated for detecting any tampering of the Arabic-text attacked.The HFDATAI strategy was introduced based on PHP with included IDE of VS code.Experiments of four separate duration datasets in random sites illustrate the fragility,efficacy,and applicability of HFDATAI by using the three common tampering attacks i.e.,insertion,reorder,and deletion.The HFDATAI was found to be effective,applicable,and very sensitive for detecting any possible tampering on Arabic text.
基金The author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(R.G.P.2/25/42),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.
文摘In this paper,the text analysis-based approach RTADZWA(Reliable Text Analysis and Digital Zero-Watermarking Approach)has been proposed for transferring and receiving authentic English text via the internet.Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it.Text analysis and text zero-watermarking techniques have been integrated by RTADZWA approach to improving the performance,accuracy,capacity,and robustness issues of the previous literature proposed by the researchers.The RTADZWA approach embeds and detects the watermark logically without altering the original text document to embed a watermark.RTADZWA has been implemented using PHP with VS code IDE.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP.1/53/42),Received by Mohammed Alamgeer.www.kku.edu.sa。
文摘Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research issue.The main challenges faced by researchers are how to hide the information within the text to use it later for authentication and attacks tampering detection without effects on the meaning and size of the given digital text.In this paper,an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on theArabic text transmitted online via an Internet network.Towards this purpose,the accuracy of tampering detection and watermark robustness has been improved of the proposed method as compared with the existing approaches.In the proposed method,both embedding and extracting of the watermark are logically implemented,which causes no change in the digital text.This is achieved by using the third level and alphanumeric strategy of the Markov model as a text analysis technique for analyzing the Arabic contents to obtain its features which are considered as the digital watermark.This digital watermark will be used later to detecting any tampering of illegal attack on the received Arabic text.An extensive set of experiments using four data sets of varying lengths proves the effectiveness of our approach in terms of detection accuracy,robustness,and effectiveness under multiple random locations of the common tampering attacks.
文摘Hemingway’s In Another Country expresses rich ideological connotation with extremely concise language,and reveals the cruelty of war and the huge trauma caused by war to human body and mind.This paper explores the multiple meanings of“an⁃other”in this short story by analyzing the background,environment,character identity,social relationship and personal concept.