We present a method to leverage radical for learning Chinese character embedding. Radical is a semantic and phonetic component of Chinese character. It plays an important role as characters with the same radical usually have similar semantic meaning and grammatical usage. However, existing Chinese processing algorithms typically regard word or character as the basic unit but ignore the crucial radical information. In this paper, we fill this gap by leveraging radical for learning continuous representation of Chinese character. We develop a dedicated neural architecture to effectively learn character embedding and apply it on Chinese character similarity judgement and Chinese word segmentation. Experiment results show that our radical-enhanced method outperforms existing embedding learning algorithms on both tasks.
As part of a national rotavirus surveillance activity, we collected fecal specimens from 3,177 children with acute diarrhea in 10 regions of China between April 1998 and April 2000 and screened them for rotavirus. Rotavirus was detected in 41% (n ؍ 1,305) of specimens, and in these, G1 was the predominant serotype (72.6%), followed by G3 (14.2%), G2 (12.1%), G4 (2.5%), G9 (0.9%), and G untypeable (0.7%). Among 327 G-typed strains tested for P genotype, 14 different P-G combinations were identified, with the globally common strains P
[8]G1, P[4]G2, P[8]G3, and P[8]G4 representing 75.6% of all typed rotavirus strains. Among the uncommon strains, 11 were P[6]G9, and others included P[6]G1, P[6]G3, and five novel P-G combinations (P[9]G1, P[4]G1, P[4]G3, P[4]G4, and P[8]G2).Our results indicate that while the common rotavirus strains remain predominant, the diversity of strains is much greater than was previously recognized.
Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the “Hash_64” field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution.
Stateful Inspection has become a classical technology for network firewall. Existing session table architectures of Stateful Inspection firewalls cause high time cost of timeout processing. A new architecture is proposed. The new architecture divides a session entry into two separate parts, and designs different data structures for each other. On the base of multi-queue architecture, dynamical timeouts according to available resource improve securities of protected hosts against SYN flood attack. Experimental results show that the new architecture can work well in Gigabit Ethernet network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.