Guangdong University of Foreign Studies is a public university in Guangzhou, Guangdong, China. Guangdong University of Foreign Studies, which enjoys a high degree ofinternationalization, is a birthplace of competent graduates of internationalcaliber. It leads South China in the research of foreign languages andcultures, overseas economy and trade, and international strategies. The universityoffers 61 bachelor-degree specialties and teaches 18 foreign languages. In2014, it boasted 20189 undergraduate students and 2818 postgraduate anddoctoral students, and over 12000 students of continuing education and overseasstudents. The school has a state-level key discipline and seven province-level keydisciplines. The state-level key discipline of Foreign Language and Literatureis given priority in the third-phase development of Guangdong province’s Project 211 . The school has established close ties with a host ofinternational organizations and leading academic agencies. As South China’sfirst university that signed a cooperation memorandum with the United Nations,it is one of the world’s 21 universities qualified to supply competent interpretersand translators to the international organization. It is also the only universityof foreign languages in China that is included in Campus Asia. Wikipedia.
Wang J.,Guangdong University of foreign Studies |
Xiong X.,Jiangxi Normal University
Chaos | Year: 2012
A general fractional-order dynamical network model for synchronization behavior is proposed. Different from previous integer-order dynamical networks, the model is made up of coupled units described by fractional differential equations, where the connections between individual units are nondiffusive and nonlinear. We show that the synchronous behavior of such a network cannot only occur, but also be dramatically different from the behavior of its constituent units. In particular, we find that simple behavior can emerge as synchronized dynamics although the isolated units evolve chaotically. Conversely, individually simple units can display chaotic attractors when the network synchronizes. We also present an easily checked criterion for synchronization depending only on the eigenvalues distribution of a decomposition matrix and the fractional orders. The analytic results are complemented with numerical simulations for two networks whose nodes are governed by fractional-order Lorenz dynamics and fractional-order Rössler dynamics, respectively. © 2012 American Institute of Physics.
Ma Q.-H.,Guangdong University of foreign Studies |
Peari J.,University of Zagreb
Computers and Mathematics with Applications | Year: 2011
By means of a new linear Gronwall-Bellman inequality on time scales and an elementary inequality, the bounds on the solutions of a class of new nonlinear two-dimensional dynamic systems on time scales are obtained. © 2010 Elsevier Ltd. All rights reserved.
Chen A.,Henan University |
Wang J.,Guangdong University of foreign Studies
Nonlinear Analysis: Real World Applications | Year: 2012
This paper is concerned with the L2-L∞ controller design problem for delayed linear systems. We first propose a novel class of continuous-time multiple delayed linear systems. The time-delays are assumed to be time-varying continuously differentiable functions, which appear in the state and control input simultaneously. By using the LyapunovKrasovskii functional approach and Jensen integral inequality technique, a sufficient condition for the existence of an L2L∞ controller is formulated in the form of linear matrix inequalities (LMIs). When these LMIs are feasible, the L2L∞ controller is explicitly presented. Finally, a numerical example is provided to demonstrate the effectiveness and feasibility of the developed controller design procedures. © 2011 Elsevier Ltd. All rights reserved.
Peng S.,Zhaoqing University |
Yu S.,Deakin University |
Yang A.,Guangdong University of foreign Studies
IEEE Communications Surveys and Tutorials | Year: 2014
Smartphones are pervasively used in society, and have been both the target and victim of malware writers. Motivated by the significant threat that presents to legitimate users, we survey the current smartphone malware status and their propagation models. The content of this paper is presented in two parts. In the first part, we review the short history of mobile malware evolution since 2004, and then list the classes of mobile malware and their infection vectors. At the end of the first part, we enumerate the possible damage caused by smartphone malware. In the second part, we focus on smartphone malware propagation modeling. In order to understand the propagation behavior of smartphone malware, we recall generic epidemic models as a foundation for further exploration. We then extensively survey the smartphone malware propagation models. At the end of this paper, we highlight issues of the current smartphone malware propagation models and discuss possible future trends based on our understanding of this topic. © © 2014 IEEE.
Fan C.,Guangdong University of foreign Studies
Journal of Convergence Information Technology | Year: 2012
Fractal image coding methods are based on a greedy algorithm known as collage coding. In this paper, techniques and the fast algorithm that can reduce greatly the complexity of the algorithm and improve the computation efficiency of the local search are proposed. Also, it was shown that the fast local search algorithm used was able to reduce the searching time. The new fast fractal encoding algorithm for the processes of searching and matching is proposed in fractal image compression in this paper. The number of domain blocks searched to find the best match for each range block and corresponding encoding time are much reduced by elimination domain blocks not searching using the current minimum distortion and variance difference between the range block and domain block. The algorithm produces a completely identical fractal encoding to that of the conventional full search in reduced time.
Pang G.,Guangdong University of foreign Studies |
Jiang S.,Guangdong University of foreign Studies
Information Processing and Management | Year: 2013
In this paper, a Generalized Cluster Centroid based Classifier (GCCC) and its variants for text categorization are proposed by utilizing a clustering algorithm to integrate two wellknown classifiers, i.e., the K-nearest-neighbor (KNN) classifier and the Rocchio classifier. KNN, a lazy learning method, suffers from inefficiency in online categorization while achieving remarkable effectiveness. Rocchio, which has efficient categorization performance, fails to obtain an expressive categorization model due to its inherent linear separability assumption. Our proposed method mainly focuses on two points: one point is that we use a clustering algorithm to strengthen the expressiveness of the Rocchio model; another one is that we employ the improved Rocchio model to speed up the categorization process of KNN. Extensive experiments conducted on both English and Chinese corpora show that GCCC and its variants have better categorization ability than some state-ofthe- art classifiers, i.e., Rocchio, KNN and Support Vector Machine (SVM). © 2012 Elsevier Ltd. All rights reserved.
Wang J.W.,Guangdong University of foreign Studies |
Zhang Y.B.,Hangzhou Dianzi University
Physics Letters, Section A: General, Atomic and Solid State Physics | Year: 2010
The topic of fractional calculus is enjoying growing interest among mathematicians, physicists and engineers in recent years. For complex network consisting of more than two fractional-order systems, however, it is difficult to establish its synchronization behavior. In this Letter, we study the synchronized motions in a star network of coupled fractional-order systems in which the major element is coupled to each of the noninteracting individual elements. On the basis of the stability theory of linear fractional-order differential equations, we derive a sufficient condition for the stability of the synchronization behavior in such a network. Furthermore, we verify our theoretical results by numerical simulations of star-coupled network with fractional-order chaotic nodes. © 2010 Elsevier B.V. All rights reserved.
Ran Y.,Guangdong University of foreign Studies
Journal of Pragmatics | Year: 2013
This study focuses on the metapragmatic negation bushi+. (S). +. V. +. (NP) as a rapport-oriented mitigating device in Chinese interpersonal interaction. After a review of the literature about metapragmatics and Searle's (1969, 1976) categories about speech acts, a classification is made about this construction in terms of the verb force. Some features are found and contextual functions are explored at both explicit and implicit levels. Interpersonal constraints or pragmatic motivations are then discussed so as to explain why the construction is considered a rapport-oriented mitigating device, helping reduce or lessen the negative illocutionary forces or unwelcome effects of what follows in interpersonal interaction.Negation is found sentential in a standard way and metapragmatic in a nonstandard way. This study is about the latter which cannot be treated as negation per se although there is a negation marker bushi 'not', it pragmatically implies " it is not S that V (NP), but (because) ..." as a conventionalized speaker meaning. On the meta level, the speaker is making an explicit statement of " I'm not performing the speech act of V" or " it's not I/we/he who V (you/him)" . However, it cannot be treated as a standard negation in terms of the performative force. The initiated speech act of this construction expresses the speaker's intent of doing V or V-ing, such as " blaming" , " criticizing" , " abusing" or " threatening" , what follows or precedes the construction is quite offensive or face-threatening for the hearer in context, by so doing interpersonal purposes are implied. Thus, I call this a metapragmatic construction, which is a non-denial of speaker intention, and consider it a rapport-oriented mitigating device in terms of its interpersonal purposes since it helps to manage interpersonal relationship in interaction. It is a literal violation of the Gricean Maxim of Quality since it shows on an explicit level that 'saying is doing its opposite' but the flouting or violation does not create implicatures in the Gricean sense (Grice, 1975) that have important communicative functions, and to some degree this challenges the 'saying-is-doing' claim made by Austin (1975). © 2012 Elsevier B.V.
Yang J.,Pennsylvania State University |
Yang J.,Guangdong University of foreign Studies |
Li P.,Pennsylvania State University
PLoS ONE | Year: 2012
Are explicit versus implicit learning mechanisms reflected in the brain as distinct neural structures, as previous research indicates, or are they distinguished by brain networks that involve overlapping systems with differential connectivity? In this functional MRI study we examined the neural correlates of explicit and implicit learning of artificial grammar sequences. Using effective connectivity analyses we found that brain networks of different connectivity underlie the two types of learning: while both processes involve activation in a set of cortical and subcortical structures, explicit learners engage a network that uses the insula as a key mediator whereas implicit learners evoke a direct frontal-striatal network. Individual differences in working memory also differentially impact the two types of sequence learning. © 2012 Yang, Li.
Zhang J.,Guangdong University of foreign Studies
Proceedings of 2010 International Conference on Intelligent Control and Information Processing, ICICIP 2010 | Year: 2010
The traditional dynamic time warping (DTW) algorithm structure was improved and applied to the embedded speech recognition system. Experimental results show that the improved DTW algorithm effectively reduces the amount of data to be processed and the recognition time, improving the system speed and recognition rate. The algorithm shows more advantage as the number of signal to be recognized increases. © 2010 IEEE.