Tian X.,Anyang University, South Korea |
Wang Y.,University of Foreign Languages
Proceedings - 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010 | Year: 2010
This paper discusses the classification and relationship of course knowledge nodes, building the network of knowledge nodes, setting appropriate teaching strategies according to different types of knowledge nodes, and established courseware pages using HCI template in which screen layout and color use is defined. Finally, methods and experience of developing network courseware were described combined with the course-data structure. © 2010 IEEE.
Liu J.,CAS Institute of Computing Technology |
Liu J.,University of Chinese Academy of Sciences |
Liu J.,University of Foreign Languages |
Xu H.,CAS Institute of Computing Technology |
And 3 more authors.
Xitong Fangzhen Xuebao / Journal of System Simulation | Year: 2016
The traditional construction methods about semantic knowledge base cost a lot of manpower and material resources. In addition, knowledge is difficult to acquire timely updates. In view of the deficiency, a new semantic representation model was put forward based on semantic ontology and hypergraph theory which was named dynamic knowledge network. Then, this model was described in detail, which included theoretical basis and model elements. Under the guidance of the model, the extraction methods and storage structure were studied about semantic knowledge. A Chinese semantic knowledge base was semi-automatic constructed using Chinese 360 Encyclopedia data which could efficiently provide semantic knowledge for Chinese information processing. © 2016, The Editorial Board of Journal of System Simulation. All right reserved.
Zhao G.-S.,University of Foreign Languages |
Cheng Q.-F.,University of Foreign Languages |
Sun Y.-L.,National University of Defense Technology
Tongxin Xuebao/Journal on Communications | Year: 2015
To construst a minimum-cost network hardening (MCNH) scheme in large-scale network, a stochastic loose optimize strategy based algorithm (MCNHA-SLOS) was proposed, and its effectiveness was analyzed. MCNHA-SLOS was a near-optimal approximation algorithm, which could achieve iterative computations in the array of sparse spaces of the whole plan space, so that the near-optimal scheme must exist in the low cost plan space. Instantiation analysis and experimental results show that the MCNHA-SLOS algorithm to be efficient, precision controllable and asymptotically optimal, and thus very applicable for large-scale network. ©, 2015, Editorial Board of Journal on Communications. All right reserved.
Zhang F.,University of Foreign Languages |
Liu W.,University of Foreign Languages |
Liu W.,National University of Defense Technology |
Bi Y.,University of Foreign Languages
International Journal on Smart Sensing and Intelligent Systems | Year: 2013
The problem of WordNet-based ontology construction was widely investigated and many effective methods have been proposed in China. The utilizations of the hierarchy structure of WordNet, the digraph structure of WordNet and auxiliary resources are main measures in the methods. Usually, the methods are facing three fundamental difficulties, the computation of semantic similarity, the construction of core ontology and the development of auxiliary resources. Through our reviews of previous researches, we find several inadequacies such as low utilization ratio of WordNet and the lack of standardized evaluation and give some suggestions for future works.
Wang Y.,University of Foreign Languages |
Ding L.,University of Foreign Languages |
Ren Q.,University of Foreign Languages |
Yang C.,National University of Defense Technology
Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology | Year: 2015
The algorithm of extracting quadratic expressions in the pre-processing phase of cube attack with quadratic test was enhanced to optimize the attack efficiency. The variation of secret keys was introduced into cube attack, which makes the model much more flexible. At the same time, with the help of the trade-off between time and space, the complexity of extracting quadratic terms was reduced by storing the results of the constant and linear terms. The improved method was applied to the simplified PRESENT and Trivium algorithms and it turns out that the attack efficiency is enhanced obviously. ©, 2015, National University of Defense Technology. All right reserved.
Liu Q.,National University of Defense Technology |
Zhao G.-S.,University of Foreign Languages |
Wang X.-D.,National University of Defense Technology |
Zhou X.-M.,National University of Defense Technology
Ruan Jian Xue Bao/Journal of Software | Year: 2014
Cognitive radio technology is regarded as the most promising technique to solve the problem of ultra-low utilization efficiency of wireless spectrum resources. Based on this technology, cognitive radio networks (CRNs) effectively improve utilization efficiency of licensed spectrum through dynamic spectrum access. However, the resultant dynamic channel availability significantly increases the difficulty in networking for CRNs. Rendezvous aims at providing common media for communication between users, which is the foundation of networking in wireless networks. This paper introduces the basic concept and characteristics of rendezvous in CRNs and dissect the challenges and concerned performance metrics in design of rendezvous schemes. According to the proposed classification criteria and system models, the related research work on rendezvous schemes are analyzed in depth. Finally, open problems in rendezvous schemes design are discussed to point out future research trends and focuses. © Copyright 2014, Institute of Software, the Chinese Academy of Science. All rights reserved.
Yang D.,University of Foreign Languages
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014
The previous studies on the causative alternation can be divided into the derivational and non-derivational approaches. The cross-linguistic facts show that the former fails to provide an adequate account of the relationship between the causative and unaccusative alternates. However, the latter approach also faces some problems. In this paper we abandon the former and make a revision to the latter based on the theory proposed by Huang et al.(2009). We argue that the causative and unaccusative variants share one and the same root which conceptualizes different types of events and selects different eventive light verbs, resulting in two lexical items with different ways of argument realization. © Springer International Publishing Switzerland 2014
Wang W.,University of Foreign Languages |
Li H.-X.,University of Foreign Languages
Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology | Year: 2011
With the help of quantum computation operator, a quantum secret sharing scheme based on polarized single photons is proposed. Efficiency analysis indicates that all qubits can be used in the secret sharing. With the permutation operator and quantum entanglement, the protocol can resist the middleman attack effectively. By using the auxiliary qubit, the protocol can detect the Trojan horse attack with high probability. The extension of the permutation operator shows the scheme which contains n pairs is feasible and applicable.
Ma Y.,University of Foreign Languages |
Yi M.,University of Foreign Languages
International Conference on Logistics, Engineering, Management and Computer Science, LEMCS 2014 | Year: 2014
Russian speech recognition is an important research focus. Starting from the basic principles of speech recognition, this article puts forward a basic HMM recognition system and analyzes the application of HMM in this system. It points out that Russian text corpus and speech corpus are the guarantee of high recognition rate. By experiments and comparison, we find some methods for further improvement, especially the optimization of recognition algorithm and its combination with Russian, which are the focus for future research. © 2014. The authors - Published by Atlantis Press.
Zhang J.,University of Foreign Languages
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2013
As a closed word class with higher prominence, antonymous compounds are unique and self-contained in the modern Chinese vocabulary system. The internal semantic structure of antonymous compounds is unpredictable from the meaning of their components and surface grammatical structure, which presents three different conceptual hierarchies. © 2013 Springer-Verlag.