474 research outputs found
The Application of Conceptual Metaphor in English Vocabulary Teaching
As the basic unit of expression, vocabulary is the foundation of English and is closely related to students’ overall language ability. However, many teachers tend to teach English vocabulary in traditional way, simply listing words with little attention to context in daily instruction. As a result, students mechanically memorize words without understanding the connotation and extension of words, which frequently leads to misunderstandings in vocabulary comprehension and inflexible vocabulary application. To solve this problem, this study considers cognitive linguistics as the guide to exploring vocabulary teaching based on conceptual metaphor. Following the definition, mechanism, and classification of conceptual metaphor, it makes an overview of both the international and Chinese studies concerning the application of conceptual metaphor in English vocabulary teaching, and finds that the lack of empirical research, the small sample size, the short time of experiment, the uncomprehensive research results and students’ different ability to accept this teaching method remain to be further solved. This contributes to the existing problems in vocabulary teaching and cultivating students’ competence in cognitive acquisition
Transit Route Planning for Megacities Based on Demand Density of Complex Networks
The aim of this work is to investigate the simplifica-tion of public transport networks (PTNs) for megacities and the optimisation of route planning based on the de-mand density of complex networks. A node deletion rule for network centre areas and a node merging rule for net-work border areas in the PTN are designed using the de-mand density of complex networks. A transit route plan-ning (TRP) model is established, which considers the demands of direct passengers, transfer passengers at the same stop and transfer passengers at different stops, and aims at maximising the transit demand density of a PTN. An optimisation process for TRP is developed based on the ant colony optimisation (ACO). The proposed method was validated through a sample application in Handan City in China. The results indicate that urban PTNs can be simplified while retaining their local attributes to a great extent. The hierarchical structure of the network is more obvious, and the layer-by-layer planning of routes can be effectively used in TRP. Moreover, the operating efficiency and service level of urban PTNs can be en-hanced effectively
On the Security Bootstrapping in Named Data Networking
By requiring all data packets been cryptographically authenticatable, the
Named Data Networking (NDN) architecture design provides a basic building block
for secured networking. This basic NDN function requires that all entities in
an NDN network go through a security bootstrapping process to obtain the
initial security credentials. Recent years have witnessed a number of proposed
solutions for NDN security bootstrapping protocols. Built upon the existing
results, in this paper we take the next step to develop a systematic model of
security bootstrapping: Trust-domain Entity Bootstrapping (TEB). This model is
based on the emerging concept of trust domain and describes the steps and their
dependencies in the bootstrapping process. We evaluate the expressiveness and
sufficiency of this model by using it to describe several current bootstrapping
protocols
Sovereign: User-Controlled Smart Homes
Smart homes made up of Internet of Things (IoT) devices have seen wide
deployment in recent years, with most, if not all, of them controlled by remote
servers in the cloud. Such designs raise security and privacy concerns for end
users. We believe that the current situation has largely resulted from lacking
a systematic home IoT framework to support localized end user control.
To let end users take back the control of smart homes, we propose Sovereign,
an IoT system framework that allows users to securely control home IoT systems
without depending on a cloud backend. Unlike existing solutions, Sovereign
networks home IoT devices and applications using named data with
application-level semantics; the names are then used to construct security
mechanisms. Users define security policies and these policies are then executed
by the localized security modules. We implement Sovereign as a pub/sub based
development platform together with a prototype local IoT controller. Our
preliminary evaluation shows that Sovereign provides an easy-to-use systematic
solution to secure smart homes under user control without imposing noticeable
overhead
Accurate Guidance Method and App Development for Assigning Parking Spaces Based on Indoor Wi-Fi
Existing parking guidance systems only provide road guidance outside the parking lot but do not provide accurate guidance to specific parking spaces inside the parking lot. By using a Kalman filter, the Grubbs test, and a neural network algorithm to improve the RSSI-based location fingerprint identification technology, an accurate location method based on indoor Wi-Fi is obtained, which implements precise route guidance and a reverse search function for parking spaces. We utilize Beidou positioning to develop a Gaode map for outdoor navigation and use an integrated system of ultrasonic detector/indicators and ground locks to manage parking spaces. Through the secondary development of an Android system and the application of a MySql database, an app for precise parking guidance was developed. The system makes full use of the Internet and parking information, eliminates information asymmetry, improves the utilization ratio of the urban static traffic resources, allocates parking spaces in real-time, breaks information islands, provides parking search and recommendation functions for users, achieves parking information-sharing, and effectively improves parking efficiency and the parking utilization ratio
- …