Time filter

Source Type

Guangzhou, China

Guangdong University of Foreign Studies is a public university in Guangzhou, Guangdong, China. Guangdong University of Foreign Studies, which enjoys a high degree ofinternationalization, is a birthplace of competent graduates of internationalcaliber. It leads South China in the research of foreign languages andcultures, overseas economy and trade, and international strategies. The universityoffers 61 bachelor-degree specialties and teaches 18 foreign languages. In2014, it boasted 20189 undergraduate students and 2818 postgraduate anddoctoral students, and over 12000 students of continuing education and overseasstudents. The school has a state-level key discipline and seven province-level keydisciplines. The state-level key discipline of Foreign Language and Literatureis given priority in the third-phase development of Guangdong province’s Project 211 . The school has established close ties with a host ofinternational organizations and leading academic agencies. As South China’sfirst university that signed a cooperation memorandum with the United Nations,it is one of the world’s 21 universities qualified to supply competent interpretersand translators to the international organization. It is also the only universityof foreign languages in China that is included in Campus Asia. Wikipedia.

Fan C.,Guangdong University of foreign Studies
Journal of Convergence Information Technology | Year: 2012

Fractal image coding methods are based on a greedy algorithm known as collage coding. In this paper, techniques and the fast algorithm that can reduce greatly the complexity of the algorithm and improve the computation efficiency of the local search are proposed. Also, it was shown that the fast local search algorithm used was able to reduce the searching time. The new fast fractal encoding algorithm for the processes of searching and matching is proposed in fractal image compression in this paper. The number of domain blocks searched to find the best match for each range block and corresponding encoding time are much reduced by elimination domain blocks not searching using the current minimum distortion and variance difference between the range block and domain block. The algorithm produces a completely identical fractal encoding to that of the conventional full search in reduced time. Source

Wang J.W.,Guangdong University of foreign Studies | Zhang Y.B.,Hangzhou Dianzi University
Physics Letters, Section A: General, Atomic and Solid State Physics | Year: 2010

The topic of fractional calculus is enjoying growing interest among mathematicians, physicists and engineers in recent years. For complex network consisting of more than two fractional-order systems, however, it is difficult to establish its synchronization behavior. In this Letter, we study the synchronized motions in a star network of coupled fractional-order systems in which the major element is coupled to each of the noninteracting individual elements. On the basis of the stability theory of linear fractional-order differential equations, we derive a sufficient condition for the stability of the synchronization behavior in such a network. Furthermore, we verify our theoretical results by numerical simulations of star-coupled network with fractional-order chaotic nodes. © 2010 Elsevier B.V. All rights reserved. Source

Peng S.,Zhaoqing University | Yu S.,Deakin University | Yang A.,Guangdong University of foreign Studies
IEEE Communications Surveys and Tutorials | Year: 2014

Smartphones are pervasively used in society, and have been both the target and victim of malware writers. Motivated by the significant threat that presents to legitimate users, we survey the current smartphone malware status and their propagation models. The content of this paper is presented in two parts. In the first part, we review the short history of mobile malware evolution since 2004, and then list the classes of mobile malware and their infection vectors. At the end of the first part, we enumerate the possible damage caused by smartphone malware. In the second part, we focus on smartphone malware propagation modeling. In order to understand the propagation behavior of smartphone malware, we recall generic epidemic models as a foundation for further exploration. We then extensively survey the smartphone malware propagation models. At the end of this paper, we highlight issues of the current smartphone malware propagation models and discuss possible future trends based on our understanding of this topic. © © 2014 IEEE. Source

Yang J.,Pennsylvania State University | Yang J.,Guangdong University of foreign Studies | Li P.,Pennsylvania State University
PLoS ONE | Year: 2012

Are explicit versus implicit learning mechanisms reflected in the brain as distinct neural structures, as previous research indicates, or are they distinguished by brain networks that involve overlapping systems with differential connectivity? In this functional MRI study we examined the neural correlates of explicit and implicit learning of artificial grammar sequences. Using effective connectivity analyses we found that brain networks of different connectivity underlie the two types of learning: while both processes involve activation in a set of cortical and subcortical structures, explicit learners engage a network that uses the insula as a key mediator whereas implicit learners evoke a direct frontal-striatal network. Individual differences in working memory also differentially impact the two types of sequence learning. © 2012 Yang, Li. Source

Ran Y.,Guangdong University of foreign Studies
Journal of Pragmatics | Year: 2013

This study focuses on the metapragmatic negation bushi+. (S). +. V. +. (NP) as a rapport-oriented mitigating device in Chinese interpersonal interaction. After a review of the literature about metapragmatics and Searle's (1969, 1976) categories about speech acts, a classification is made about this construction in terms of the verb force. Some features are found and contextual functions are explored at both explicit and implicit levels. Interpersonal constraints or pragmatic motivations are then discussed so as to explain why the construction is considered a rapport-oriented mitigating device, helping reduce or lessen the negative illocutionary forces or unwelcome effects of what follows in interpersonal interaction.Negation is found sentential in a standard way and metapragmatic in a nonstandard way. This study is about the latter which cannot be treated as negation per se although there is a negation marker bushi 'not', it pragmatically implies " it is not S that V (NP), but (because) ..." as a conventionalized speaker meaning. On the meta level, the speaker is making an explicit statement of " I'm not performing the speech act of V" or " it's not I/we/he who V (you/him)" . However, it cannot be treated as a standard negation in terms of the performative force. The initiated speech act of this construction expresses the speaker's intent of doing V or V-ing, such as " blaming" , " criticizing" , " abusing" or " threatening" , what follows or precedes the construction is quite offensive or face-threatening for the hearer in context, by so doing interpersonal purposes are implied. Thus, I call this a metapragmatic construction, which is a non-denial of speaker intention, and consider it a rapport-oriented mitigating device in terms of its interpersonal purposes since it helps to manage interpersonal relationship in interaction. It is a literal violation of the Gricean Maxim of Quality since it shows on an explicit level that 'saying is doing its opposite' but the flouting or violation does not create implicatures in the Gricean sense (Grice, 1975) that have important communicative functions, and to some degree this challenges the 'saying-is-doing' claim made by Austin (1975). © 2012 Elsevier B.V. Source

Discover hidden collaborations