Words acquisition should be the most decisive and basic part, though modern English education does not take enough attention, especially in college English teaching. A recent survey on the Internet reveals that colleg...Words acquisition should be the most decisive and basic part, though modern English education does not take enough attention, especially in college English teaching. A recent survey on the Internet reveals that college students are worrying about their words power very much, eager to find an efficient and effective way. Hence, various modes of word memorizing methods are collected and a brief classification and remark are available. By an overall analysis of those methods, a new approach compromised by different kinds of methods turns out. This new approach completely abides by the philosophy of pragmatism, and every idea with practical use will be introduced to it, e.g. psychology of language and so on.展开更多
The findings of the study indicate that students prefer to engage in the vocabulary learning strategies that would be most appealing to them and that would entail less manipulation of the language. Of the four vocabul...The findings of the study indicate that students prefer to engage in the vocabulary learning strategies that would be most appealing to them and that would entail less manipulation of the language. Of the four vocabulary memorizing strategies cited in the study (rote repetition, structural associations, semantic strategies, and mnemonic keyword techniques), students apparently tended to favor the second and the third ones, though rote repetition remains appealing to some of them. Mnemonic devices such as keyword method were rather unpopular to most of the students because they would involve the learners in more active performance of the target language.展开更多
In this article, the author proposed guesses about memorizing, basing on the observation of hypnosis and its application on acquisition of vocabulary, and advanced the concepts of meaningful decoding and meaning rebui...In this article, the author proposed guesses about memorizing, basing on the observation of hypnosis and its application on acquisition of vocabulary, and advanced the concepts of meaningful decoding and meaning rebuilding, which are the two main courses in mem- orizing.展开更多
In this paper, upon the pictographic theory and the behaviorist theory, based on Xiang's(2007) pictographic memorizing method, the author designs the corresponding procedure of the senior high school English vocab...In this paper, upon the pictographic theory and the behaviorist theory, based on Xiang's(2007) pictographic memorizing method, the author designs the corresponding procedure of the senior high school English vocabulary teaching. This research results show that, the application of the pictographic memorizing method in senior high school English vocabulary teaching is feasible and the teaching effect is relatively good.展开更多
When China and Singapore exchanged formal handshakes in 1990,few could have imagined that 35 years later,a Data Science undergraduate named Hu Yunxin would be happily counting hawker-centre noodles while memorizing re...When China and Singapore exchanged formal handshakes in 1990,few could have imagined that 35 years later,a Data Science undergraduate named Hu Yunxin would be happily counting hawker-centre noodles while memorizing regression formulas along Clementi Road.Yet it is precisely these small,personal stories that breathe life into grand diplomatic milestones.In celebration of the anniversary,I spoke with Yunxin—freshly returned from her first year at the National University of Singapore(NUS)—to discover how the Lion City looks through Chinese eyes.展开更多
Dear Xu Shengli,You asked me about learning English.Now I'd like to tell you how you should learn English.First,you should often read English aloud and try your best to learn important something1 by heart.So you c...Dear Xu Shengli,You asked me about learning English.Now I'd like to tell you how you should learn English.First,you should often read English aloud and try your best to learn important something1 by heart.So you can remember them easy2 and form a good habit of thinking in English.Second,you should listen a lot and communicate with others in English.With3 this way,both your listening ability and your spoken English will be improved.Third,you should keep a diary in English every day.I hope that the advice will be useful to you.展开更多
The interplay of academic atmosphere,learning motivation,and strategies inherently influences English learning.Effective vocabulary acquisition strategies significantly influence the achievements of English acquisitio...The interplay of academic atmosphere,learning motivation,and strategies inherently influences English learning.Effective vocabulary acquisition strategies significantly influence the achievements of English acquisition.Vocabulary mastery,a cornerstone of middle school English education,raises a critical question:How can vocabulary strategies optimize students’memory,understanding,and vocabulary application?This article elaborates on the importance and characteristics of vocabulary learning in Chinese junior high schools,analyzes definitions and theories of learning strategies,and proposes specific vocabulary approaches tailored to junior high school students in rural-urban fringe areas.展开更多
The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Infor...The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Information (PII) and other confidential or protected information that may have been memorized during training, specifically during a fine-tuning or customization process. We describe different black-box attacks from potential adversaries and study their impact on the amount and type of information that may be recovered from commonly used and deployed LLMs. Our research investigates the relationship between PII leakage, memorization, and factors such as model size, architecture, and the nature of attacks employed. The study utilizes two broad categories of attacks: PII leakage-focused attacks (auto-completion and extraction attacks) and memorization-focused attacks (various membership inference attacks). The findings from these investigations are quantified using an array of evaluative metrics, providing a detailed understanding of LLM vulnerabilities and the effectiveness of different attacks.展开更多
The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Infor...The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Information (PII) and other confidential or protected information that may have been memorized during training, specifically during a fine-tuning or customization process. This inadvertent leakage of sensitive information typically occurs when the models are subjected to black-box attacks. To address the growing concerns of safeguarding private and sensitive information while simultaneously preserving its utility, we analyze the performance of Targeted Catastrophic Forgetting (TCF). TCF involves preserving targeted pieces of sensitive information within datasets through an iterative pipeline which significantly reduces the likelihood of such information being leaked or reproduced by the model during black-box attacks, such as the autocompletion attack in our case. The experiments conducted using TCF evidently demonstrate its capability to reduce the extraction of PII while still preserving the context and utility of the target application.展开更多
Hypnosis is more and more used in many fields in modern society. The article suggests hypotheses and some problems about the use of hypnosis in foreign language teaching from 7 aspects: application of hypnosis in att...Hypnosis is more and more used in many fields in modern society. The article suggests hypotheses and some problems about the use of hypnosis in foreign language teaching from 7 aspects: application of hypnosis in attention; application of hypnosis in keeping best study state; application of hypnosis in English teaching; application of hypnosis in avoiding mother tongue influence; application of hypnosis in memorizing; application of hypnosis in inputting knowledge; application of hypnosis in mentality hint.展开更多
Memorization has been long viewed as a bad practice or the opposite of meaningful learning.A survey on the role of memorization in ESL/EFL learning is carried out in Vestal Middle School,Binghamton High School and Bin...Memorization has been long viewed as a bad practice or the opposite of meaningful learning.A survey on the role of memorization in ESL/EFL learning is carried out in Vestal Middle School,Binghamton High School and Binghamton University under the guidance of Professor Jennifer Brondell.The result shows that a majority of subjects were found to emphasize the important role of memorization as a strategy in helping students to obtain better accuracy and fluency,use language knowledge reserve,and gain more self-confidence.展开更多
Many aposematic insect species advertise their toxicity to potential predators using olfactory and auditory signals, in addition to visual signals, to produce a multimodal warning display. The olfactory signals in the...Many aposematic insect species advertise their toxicity to potential predators using olfactory and auditory signals, in addition to visual signals, to produce a multimodal warning display. The olfactory signals in these displays may have interesting effects, such as eliciting innate avoidance against novel colored prey, or improving learning and memory of defended prey. However, little is known about the effects of such ancillary signals when they are auditory rather than olfactory. The few studies that have investigated this question have provided conflicting results. The current study sought to clarify and extend understanding of the effects of prey auditory signals on avian predator responses. The domestic chick Gallus gallus domesticus was used as a model avian predator to examine how the defensive buzzing sound of a bumblebee Bombus terrestris affected the chick's innate avoidance behavior, and the learning and memory of prey avoidance. The results demonstrate that the buzzing sound had no effect on the predator's responses to unpalatable aposematically colored crumbs, suggesting that the agitated buzzing of B. terrestris may provide no additional protection from avian predators .展开更多
To put more information into a difference scheme of a differential equation for making an accurate prediction, a new kind of time integration scheme, known as the retrospective (RT) scheme, is proposed on the basis of...To put more information into a difference scheme of a differential equation for making an accurate prediction, a new kind of time integration scheme, known as the retrospective (RT) scheme, is proposed on the basis of the memorial dynamics. Stability criteria of the scheme for an advection equation in certain conditions are derived mathematically. The computations for the advection equation have been conducted with its RT scheme. It is shown that the accuracy of the scheme is much higher than that of the leapfrog (LF) difference scheme.展开更多
Working memory is one of the essential higher cognitive functions that actively holds behaviorally-relevant information essential for guiding subsequent actions. It includes subsystems that store and manipulate single...Working memory is one of the essential higher cognitive functions that actively holds behaviorally-relevant information essential for guiding subsequent actions. It includes subsystems that store and manipulate singlemode or multi-modal sensory information, e.g., spatial information, visual images, auditory scenes, olfactory objects, or any combination of these. In addition to merely holding a certain amount of information for a short period of time, as is generally believed, the cognitive processes involved are far more complex, including the executive and attentional control of short-term memory, permitting interim integration, and the processing, disposal, and retrieval of information. Evolution-wise, working memory is essential for the behavioral flexibility that allows humans and animals to quickly adapt to rapidly changing environments.展开更多
A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino ...A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However,human memorability constrains the number of keys. Single sign-on server,key hashing,key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name,but numeric 4-digit passcode,key hashing,key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts.展开更多
The exploration of novel photo/thermal-responsive nonvolatile memorizers will be beneficial for energysaving memories.Herein,new<110>-oriented perovskites using single template melamine,i.e.,[(MLAI-H_(2))(PbX_(4...The exploration of novel photo/thermal-responsive nonvolatile memorizers will be beneficial for energysaving memories.Herein,new<110>-oriented perovskites using single template melamine,i.e.,[(MLAI-H_(2))(PbX_(4))]_n(X=Br (α-1),Cl (α-2),MLAI=melamine) have been prepared and their structures upon irradiation of visible light have been investigated.They have been fabricated as nonvolatile memory devices with structures of ITO/[(MLAI-H_(2))(PbX_(4))]_n/PMMA/Ag (device-1:X=Br,device-2:X=Cl),which can exhibit unique visible light-triggered binary nonvolatile memory performances.Interestingly,the silent or working status can be monitored by visible chromisms.Furthermore,the light-triggered binary resistive switching mechanisms of these ITO/[(MLAI-H_(2))(PbX_(4))]_n/PMMA/Ag memory devices have been clarified in terms of EPR,fluorescence,and single-crystal structural analysis.The presence of light-activated traps in<110>-oriented[(MLAI-H_(2))(PbX_(4))]_n perovskites are dominated in the appearance of light-triggered resistive switching behaviors,based on which the inverted internal electrical fields can be established.According to the structural analysis,the more distorted PbX_6octahedra,higher corrugated<110>-oriented perovskite sheets,and more condensed organic-inorganic packing in Br-containing perovskite are beneficial for the stabilization of light-activated traps,which lead to the better resistive switching behavior of device-1.This work can pave a new avenue for the establishment of novel energy-saving nonvolatile memorizers used in aerospace or military industries.展开更多
The dominant error source of mobile terminal location in wireless sensor networks (WSNs) is the non-line-of-sight (NLOS) propagation error. Among the algorithms proposed to mitigate the influence of NLOS propagati...The dominant error source of mobile terminal location in wireless sensor networks (WSNs) is the non-line-of-sight (NLOS) propagation error. Among the algorithms proposed to mitigate the influence of NLOS propagation error, residual test (RT) is an efficient one, however with high computational complexity (CC). An improved algorithm that memorizes the light of sight (LOS) range measurements (RMs) identified memorize LOS range measurements identified residual test (MLSI-RT) is presented in this paper to address this problem. The MLSI-RT is based on the assumption that when all RMs are from LOS propagations, the normalized residual follows the central Chi-Square distribution while for NLOS cases it is non-central. This study can reduce the CC by more than 90%.展开更多
文摘Words acquisition should be the most decisive and basic part, though modern English education does not take enough attention, especially in college English teaching. A recent survey on the Internet reveals that college students are worrying about their words power very much, eager to find an efficient and effective way. Hence, various modes of word memorizing methods are collected and a brief classification and remark are available. By an overall analysis of those methods, a new approach compromised by different kinds of methods turns out. This new approach completely abides by the philosophy of pragmatism, and every idea with practical use will be introduced to it, e.g. psychology of language and so on.
文摘The findings of the study indicate that students prefer to engage in the vocabulary learning strategies that would be most appealing to them and that would entail less manipulation of the language. Of the four vocabulary memorizing strategies cited in the study (rote repetition, structural associations, semantic strategies, and mnemonic keyword techniques), students apparently tended to favor the second and the third ones, though rote repetition remains appealing to some of them. Mnemonic devices such as keyword method were rather unpopular to most of the students because they would involve the learners in more active performance of the target language.
文摘In this article, the author proposed guesses about memorizing, basing on the observation of hypnosis and its application on acquisition of vocabulary, and advanced the concepts of meaningful decoding and meaning rebuilding, which are the two main courses in mem- orizing.
文摘In this paper, upon the pictographic theory and the behaviorist theory, based on Xiang's(2007) pictographic memorizing method, the author designs the corresponding procedure of the senior high school English vocabulary teaching. This research results show that, the application of the pictographic memorizing method in senior high school English vocabulary teaching is feasible and the teaching effect is relatively good.
文摘When China and Singapore exchanged formal handshakes in 1990,few could have imagined that 35 years later,a Data Science undergraduate named Hu Yunxin would be happily counting hawker-centre noodles while memorizing regression formulas along Clementi Road.Yet it is precisely these small,personal stories that breathe life into grand diplomatic milestones.In celebration of the anniversary,I spoke with Yunxin—freshly returned from her first year at the National University of Singapore(NUS)—to discover how the Lion City looks through Chinese eyes.
文摘Dear Xu Shengli,You asked me about learning English.Now I'd like to tell you how you should learn English.First,you should often read English aloud and try your best to learn important something1 by heart.So you can remember them easy2 and form a good habit of thinking in English.Second,you should listen a lot and communicate with others in English.With3 this way,both your listening ability and your spoken English will be improved.Third,you should keep a diary in English every day.I hope that the advice will be useful to you.
文摘The interplay of academic atmosphere,learning motivation,and strategies inherently influences English learning.Effective vocabulary acquisition strategies significantly influence the achievements of English acquisition.Vocabulary mastery,a cornerstone of middle school English education,raises a critical question:How can vocabulary strategies optimize students’memory,understanding,and vocabulary application?This article elaborates on the importance and characteristics of vocabulary learning in Chinese junior high schools,analyzes definitions and theories of learning strategies,and proposes specific vocabulary approaches tailored to junior high school students in rural-urban fringe areas.
文摘The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Information (PII) and other confidential or protected information that may have been memorized during training, specifically during a fine-tuning or customization process. We describe different black-box attacks from potential adversaries and study their impact on the amount and type of information that may be recovered from commonly used and deployed LLMs. Our research investigates the relationship between PII leakage, memorization, and factors such as model size, architecture, and the nature of attacks employed. The study utilizes two broad categories of attacks: PII leakage-focused attacks (auto-completion and extraction attacks) and memorization-focused attacks (various membership inference attacks). The findings from these investigations are quantified using an array of evaluative metrics, providing a detailed understanding of LLM vulnerabilities and the effectiveness of different attacks.
文摘The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Information (PII) and other confidential or protected information that may have been memorized during training, specifically during a fine-tuning or customization process. This inadvertent leakage of sensitive information typically occurs when the models are subjected to black-box attacks. To address the growing concerns of safeguarding private and sensitive information while simultaneously preserving its utility, we analyze the performance of Targeted Catastrophic Forgetting (TCF). TCF involves preserving targeted pieces of sensitive information within datasets through an iterative pipeline which significantly reduces the likelihood of such information being leaked or reproduced by the model during black-box attacks, such as the autocompletion attack in our case. The experiments conducted using TCF evidently demonstrate its capability to reduce the extraction of PII while still preserving the context and utility of the target application.
文摘Hypnosis is more and more used in many fields in modern society. The article suggests hypotheses and some problems about the use of hypnosis in foreign language teaching from 7 aspects: application of hypnosis in attention; application of hypnosis in keeping best study state; application of hypnosis in English teaching; application of hypnosis in avoiding mother tongue influence; application of hypnosis in memorizing; application of hypnosis in inputting knowledge; application of hypnosis in mentality hint.
文摘Memorization has been long viewed as a bad practice or the opposite of meaningful learning.A survey on the role of memorization in ESL/EFL learning is carried out in Vestal Middle School,Binghamton High School and Binghamton University under the guidance of Professor Jennifer Brondell.The result shows that a majority of subjects were found to emphasize the important role of memorization as a strategy in helping students to obtain better accuracy and fluency,use language knowledge reserve,and gain more self-confidence.
文摘Many aposematic insect species advertise their toxicity to potential predators using olfactory and auditory signals, in addition to visual signals, to produce a multimodal warning display. The olfactory signals in these displays may have interesting effects, such as eliciting innate avoidance against novel colored prey, or improving learning and memory of defended prey. However, little is known about the effects of such ancillary signals when they are auditory rather than olfactory. The few studies that have investigated this question have provided conflicting results. The current study sought to clarify and extend understanding of the effects of prey auditory signals on avian predator responses. The domestic chick Gallus gallus domesticus was used as a model avian predator to examine how the defensive buzzing sound of a bumblebee Bombus terrestris affected the chick's innate avoidance behavior, and the learning and memory of prey avoidance. The results demonstrate that the buzzing sound had no effect on the predator's responses to unpalatable aposematically colored crumbs, suggesting that the agitated buzzing of B. terrestris may provide no additional protection from avian predators .
基金The project supported by the National Key Program for Developing Basic Sciences (G1999043408 and G1998040901-1)the National Natural Sciences Foundation of China (40175024 and 40035010)
文摘To put more information into a difference scheme of a differential equation for making an accurate prediction, a new kind of time integration scheme, known as the retrospective (RT) scheme, is proposed on the basis of the memorial dynamics. Stability criteria of the scheme for an advection equation in certain conditions are derived mathematically. The computations for the advection equation have been conducted with its RT scheme. It is shown that the accuracy of the scheme is much higher than that of the leapfrog (LF) difference scheme.
文摘Working memory is one of the essential higher cognitive functions that actively holds behaviorally-relevant information essential for guiding subsequent actions. It includes subsystems that store and manipulate singlemode or multi-modal sensory information, e.g., spatial information, visual images, auditory scenes, olfactory objects, or any combination of these. In addition to merely holding a certain amount of information for a short period of time, as is generally believed, the cognitive processes involved are far more complex, including the executive and attentional control of short-term memory, permitting interim integration, and the processing, disposal, and retrieval of information. Evolution-wise, working memory is essential for the behavioral flexibility that allows humans and animals to quickly adapt to rapidly changing environments.
文摘A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However,human memorability constrains the number of keys. Single sign-on server,key hashing,key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name,but numeric 4-digit passcode,key hashing,key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts.
基金financially supported by the Natural Science Foundation of Fujian Province(Nos.2021J02007,2021J01553)Fujian Science&Technology Innovation Laboratory for Optoelectronic Information of China(No.2021ZR148)。
文摘The exploration of novel photo/thermal-responsive nonvolatile memorizers will be beneficial for energysaving memories.Herein,new<110>-oriented perovskites using single template melamine,i.e.,[(MLAI-H_(2))(PbX_(4))]_n(X=Br (α-1),Cl (α-2),MLAI=melamine) have been prepared and their structures upon irradiation of visible light have been investigated.They have been fabricated as nonvolatile memory devices with structures of ITO/[(MLAI-H_(2))(PbX_(4))]_n/PMMA/Ag (device-1:X=Br,device-2:X=Cl),which can exhibit unique visible light-triggered binary nonvolatile memory performances.Interestingly,the silent or working status can be monitored by visible chromisms.Furthermore,the light-triggered binary resistive switching mechanisms of these ITO/[(MLAI-H_(2))(PbX_(4))]_n/PMMA/Ag memory devices have been clarified in terms of EPR,fluorescence,and single-crystal structural analysis.The presence of light-activated traps in<110>-oriented[(MLAI-H_(2))(PbX_(4))]_n perovskites are dominated in the appearance of light-triggered resistive switching behaviors,based on which the inverted internal electrical fields can be established.According to the structural analysis,the more distorted PbX_6octahedra,higher corrugated<110>-oriented perovskite sheets,and more condensed organic-inorganic packing in Br-containing perovskite are beneficial for the stabilization of light-activated traps,which lead to the better resistive switching behavior of device-1.This work can pave a new avenue for the establishment of novel energy-saving nonvolatile memorizers used in aerospace or military industries.
基金supported by the State Key Program of National Natural Science of China (Grant No.60532030)the New Century Excellent Talents in University (Grant No.NCET-08-0333)the Natural Science Foundation of Shandong Province (Grant No.Y2007G10)
文摘The dominant error source of mobile terminal location in wireless sensor networks (WSNs) is the non-line-of-sight (NLOS) propagation error. Among the algorithms proposed to mitigate the influence of NLOS propagation error, residual test (RT) is an efficient one, however with high computational complexity (CC). An improved algorithm that memorizes the light of sight (LOS) range measurements (RMs) identified memorize LOS range measurements identified residual test (MLSI-RT) is presented in this paper to address this problem. The MLSI-RT is based on the assumption that when all RMs are from LOS propagations, the normalized residual follows the central Chi-Square distribution while for NLOS cases it is non-central. This study can reduce the CC by more than 90%.