474 research outputs found

    The Application of Conceptual Metaphor in English Vocabulary Teaching

    Get PDF
    As the basic unit of expression, vocabulary is the foundation of English and is closely related to students’ overall language ability. However, many teachers tend to teach English vocabulary in traditional way, simply listing words with little attention to context in daily instruction. As a result, students mechanically memorize words without understanding the connotation and extension of words, which frequently leads to misunderstandings in vocabulary comprehension and inflexible vocabulary application. To solve this problem, this study considers cognitive linguistics as the guide to exploring vocabulary teaching based on conceptual metaphor. Following the definition, mechanism, and classification of conceptual metaphor, it makes an overview of both the international and Chinese studies concerning the application of conceptual metaphor in English vocabulary teaching, and finds that the lack of empirical research, the small sample size, the short time of experiment, the uncomprehensive research results and students’ different ability to accept this teaching method remain to be further solved. This contributes to the existing problems in vocabulary teaching and cultivating students’ competence in cognitive acquisition

    Transit Route Planning for Megacities Based on Demand Density of Complex Networks

    Get PDF
    The aim of this work is to investigate the simplifica-tion of public transport networks (PTNs) for megacities and the optimisation of route planning based on the de-mand density of complex networks. A node deletion rule for network centre areas and a node merging rule for net-work border areas in the PTN are designed using the de-mand density of complex networks. A transit route plan-ning (TRP) model is established, which considers the demands of direct passengers, transfer passengers at the same stop and transfer passengers at different stops, and aims at maximising the transit demand density of a PTN. An optimisation process for TRP is developed based on the ant colony optimisation (ACO). The proposed method was validated through a sample application in Handan City in China. The results indicate that urban PTNs can be simplified while retaining their local attributes to a great extent. The hierarchical structure of the network is more obvious, and the layer-by-layer planning of routes can be effectively used in TRP. Moreover, the operating efficiency and service level of urban PTNs can be en-hanced effectively

    On the Security Bootstrapping in Named Data Networking

    Full text link
    By requiring all data packets been cryptographically authenticatable, the Named Data Networking (NDN) architecture design provides a basic building block for secured networking. This basic NDN function requires that all entities in an NDN network go through a security bootstrapping process to obtain the initial security credentials. Recent years have witnessed a number of proposed solutions for NDN security bootstrapping protocols. Built upon the existing results, in this paper we take the next step to develop a systematic model of security bootstrapping: Trust-domain Entity Bootstrapping (TEB). This model is based on the emerging concept of trust domain and describes the steps and their dependencies in the bootstrapping process. We evaluate the expressiveness and sufficiency of this model by using it to describe several current bootstrapping protocols

    Sovereign: User-Controlled Smart Homes

    Get PDF
    Smart homes made up of Internet of Things (IoT) devices have seen wide deployment in recent years, with most, if not all, of them controlled by remote servers in the cloud. Such designs raise security and privacy concerns for end users. We believe that the current situation has largely resulted from lacking a systematic home IoT framework to support localized end user control. To let end users take back the control of smart homes, we propose Sovereign, an IoT system framework that allows users to securely control home IoT systems without depending on a cloud backend. Unlike existing solutions, Sovereign networks home IoT devices and applications using named data with application-level semantics; the names are then used to construct security mechanisms. Users define security policies and these policies are then executed by the localized security modules. We implement Sovereign as a pub/sub based development platform together with a prototype local IoT controller. Our preliminary evaluation shows that Sovereign provides an easy-to-use systematic solution to secure smart homes under user control without imposing noticeable overhead

    Accurate Guidance Method and App Development for Assigning Parking Spaces Based on Indoor Wi-Fi

    Get PDF
    Existing parking guidance systems only provide road guidance outside the parking lot but do not provide accurate guidance to specific parking spaces inside the parking lot. By using a Kalman filter, the Grubbs test, and a neural network algorithm to improve the RSSI-based location fingerprint identification technology, an accurate location method based on indoor Wi-Fi is obtained, which implements precise route guidance and a reverse search function for parking spaces. We utilize Beidou positioning to develop a Gaode map for outdoor navigation and use an integrated system of ultrasonic detector/indicators and ground locks to manage parking spaces. Through the secondary development of an Android system and the application of a MySql database, an app for precise parking guidance was developed. The system makes full use of the Internet and parking information, eliminates information asymmetry, improves the utilization ratio of the urban static traffic resources, allocates parking spaces in real-time, breaks information islands, provides parking search and recommendation functions for users, achieves parking information-sharing, and effectively improves parking efficiency and the parking utilization ratio
    corecore