Neural-Based Chinese Pinyin Aided Input Method with Customizable Association

Total Page:16

File Type:pdf, Size:1020Kb

Neural-Based Chinese Pinyin Aided Input Method with Customizable Association Moon IME: Neural-based Chinese Pinyin Aided Input Method with Customizable Association Yafang Huang1;2;∗, Zuchao Li1;2;∗, Zhuosheng Zhang1;2, Hai Zhao1;2;y 1Department of Computer Science and Engineering, Shanghai Jiao Tong University 2Key Laboratory of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China fhuangyafang, charlee, [email protected], [email protected] Abstract tion outputs from IME predication may undoubt- edly lead to incomparable user typing experience, Chinese pinyin input method engine which motivates this work. (IME) lets user conveniently input Chi- Modern IMEs are supposed to extend P2C with nese into a computer by typing pinyin association functions that additionally predict the through the common keyboard. In addi- next series of characters that the user is attempting tion to offering high conversion quality, to enter. Such IME extended capacity can be gen- modern pinyin IME is supposed to aid us- erally fallen into two categories: auto-completion er input with extended association func- and follow-up prediction. The former will look tion. However, existing solutions for such up all possible phrases that might match the us- functions are roughly based on oversim- er input even though the input is incomplete. For plified matching algorithms at word-level, example, when receiving a pinyin syllable “bei”, whose resulting products provide limit- auto-completion module will predict “¬” (bei- ed extension associated with user input- jing, Beijing) or “Ìo” (beijing, Background) as s. This work presents the Moon IME, a a word-level candidate. The second scenario is pinyin IME that integrates the attention- when a user completes entering a set of words, in based neural machine translation (NMT) which case the IME will present appropriate collo- model and Information Retrieval (IR) to cations for the user to choose. For example, after offer amusive and customizable associa- the user selects “¬” (Beijing) from the candi- tion ability. The released IME is im- date list in the above example, the IME will show plemented on Windows via text services a list of collocations that follows the word Beijing, framework. such as “” (city), “eД (Olympics). This paper presents the Moon IME, a pinyin 1 Introduction IME engine with an association cloud platform, which integrates the attention-based neural ma- Pinyin is the official romanization representation chine translation (NMT) model with diverse asso- for Chinese and pinyin-to-character (P2C) which ciations to enable customizable and amusive user concerts the inputted pinyin sequence to Chinese typing experience. character sequence is the core module of all pinyin Compared to its existing counterparts, Moon based IMEs. Previous works in kinds of literature IME has extraordinarily offered the following only focus on pinyin to the character itself, pay- promising advantages: ing less attention to user experience with associa- • It is the first attempt that adopts attentive NMT tive advances, let along predictive typing or auto- method to achieve P2C conversion in both IME matic completion. However, more agile associa- research and engineering. ∗ These authors contribute equally. y Corresponding au- • It provides a general association cloud plat- thor. This paper was partially supported by National Key Re- search and Development Program of China (No. 2017YF- form which contains follow-up-prediction and ma- B0304100), National Natural Science Foundation of China chine translation module for typing assistance. (No. 61672343 and No. 61733011), Key Project of Nation- • With an information retrieval based module, it al Society Science Foundation of China (No. 15-ZDA041), The Art and Science Interdisciplinary Funds of Shanghai Jiao realizes fast and effective auto-completion which Tong University (No. 14JCRZ04). can help users type sentences in a more convenient 140 Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics-System Demonstrations, pages 140–145 Melbourne, Australia, July 15 - 20, 2018. c 2018 Association for Computational Linguistics Pinyin Pinyin Association Question List Answering Candidates Candidates Text Services Moon Input List List Machine Framework Method Engine Translation Conversion Results Auto- Association Completion Platform 输入拼音,根据拼音得到一系 Pinyin 列 hou xuan da an ConversionResults Pinyin Text NMT-based Customized Segmentation P2C Conversion Knowledge Base Figure 1: Architecture of the proposed Moon IME. and efficient manner. As (Zhang et al., 2017) proves that P2C con- • With a powerful customizable design, the version of IME may benefit from decoding longer association cloud platform can be adapted to pinyin sequence for more efficient inputting. any specific domains such as the fields of law When a given pinyin sequence becomes longer, and medicine which contain complex specialized the list of the corresponding legal character se- terms. quences will significantly reduce. Thus, we train The rest of the paper is organized as follows: our P2C model with segmented corpora. We used Section 2 demonstrates the details of our system. baseSeg (Zhao et al., 2006) to segment all tex- Section 3 presents the feature functions of our re- t, and finish the training in both word-level and alized IME. Some related works are introduced in character-level. Section 4. Section 5 concludes this paper. NMT-based P2C module Our P2C module is 2 System Details implemented through OpenNMT Toolkit3 as we formulize P2C as a translation between pinyin and Figure 1 illustrates the architecture of Moon IME. character sequences. Given a pinyin sequence X The Moon IME is based on Windows Text Ser- and a Chinese character sequence Y , the encoder vices Framework (TSF) 1. Our Moon IME extends 2 of the P2C model encodes pinyin representation in the Open-source projects PIME with three main word-level, and the decoder is to generate the tar- components: a) pinyin text segmentation, b) P2C get Chinese sequence which maximizes P (Y jX) conversion module, c) IR-based association mod- using maximum likelihood training. ule. The nub of our work is realizing an engine to The encoder is a bi-directional long short- stably convert pinyin to Chinese as well as giving term memory (LSTM) network (Hochreiter and reasonable association lists. Schmidhuber, 1997). The vectorized inputs are 2.1 Input Method Engine fed to forward LSTM and backward LSTM to ob- tain the internal features of two directions. The Pinyin Segmentation For a convenient refer- output for each input is the concatenation of the ence, hereafter a character in pinyin also refers to ! −! − two vectors from both directions: h = h k h . an independent syllable in the case without caus- t t t ing confusion, and word means a pinyin syllable Our decoder is based on the global attention- sequence with respect to a true Chinese word. al model proposed by (Luong et al., 2015) which takes the hidden states of the encoder into con- 1 TSF is a system service available as a redistributable for sideration when deriving the context vector. The Windows 2000 and later versions of Windows operation sys- tem. A TSF text service provides multilingual support and probability is conditioned on a distinct contex- delivers text services such as keyboard processors, handwrit- t vector for each target word. The context vec- ing recognition, and speech recognition. 2https://github.com/EasyIME/PIME 3http://opennmt.net 141 tor is computed as a weighted sum of previously text classification and information retrieval. The hidden states. The probability of each candidate TF (term-frequency) term is simply a count of the word as being the recommended one is predicted number of times a word appearing in a given con- using a softmax layer over the inner-product be- text, while the IDF (invert document frequency) tween source and candidate target characters. term puts a penalty on how often the word appears Our model is initially trained on two dataset- elsewhere in the corpus. The final TF-IDF score s, namely the People’s Daily (PD) corpus and is calculated by the product of these two terms, Douban (DC) corpus. The former is extracted which is formulated as: N from the People’s Daily from 1992 to 1998 that TF-IDF(w; d; D) = f(w; d) × log jfd2D:w2dgj has word segmentation annotations by Peking U- where f(w; d) indicates the number of times word niversity. The DC corpus is created by (Wu et al., w appearing in context d, N is the total number 2017) from Chinese open domain conversations. of dialogues, and the denominator represents the One sentence of the DC corpus contains one com- number of dialogues in which the word w appears. plete utterance in a continuous dialogue situation. In the IME scenario, the TF-IDF vectors are The statistics of two datasets is shown in Table1. first calculated for the input context and each of With character text available, the needed parallel the candidate responses from the corpus. Given corpus between pinyin and character texts is auto- a set of candidate response vectors, the one with matically created following the approach proposed the highest cosine similarity to the context vector by (Yang et al., 2012). is selected as the output. For Recall @ k, the top k candidates are returned. In this work, we only Chinese Pinyin make use of the top 1 matched one. # MIUs 5.04M PD # Vocab 54.3K 41.1K 3 User Experience Advantages # MIUs 1.00M DC 3.1 High Quality of P2C # Vocab 50.0K 20.3K We utilize Maximum Input Unit (MIU) Accuracy Table 1: MIUs count and vocab size statistics of our training (Zhang et al., 2017) to evaluate the quality of our data. PD refers to the People’s Daily, TP is TouchPal corpus. P2C module by measuring the conversion accura- cy of MIU, whose definition is the longest unin- Here is the hyperparameters we used: (a) deep terrupted Chinese character sequence inside a sen- LSTM models, 3 layers, 500 cells, (c) 13 epoch tence.
Recommended publications
  • Desktop Migration and Administration Guide
    Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Last Updated: 2021-05-05 Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Marie Doleželová Red Hat Customer Content Services [email protected] Petr Kovář Red Hat Customer Content Services [email protected] Jana Heves Red Hat Customer Content Services Legal Notice Copyright © 2018 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Chinese Pinyin Aided IME, Input What You Have Not Keystroked Yet
    Chinese Pinyin Aided IME, Input What You Have Not Keystroked Yet Yafang Huang1;2, Hai Zhao1;2;∗, 1Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China 2Key Laboratory of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China [email protected], [email protected] ∗ Abstract between pinyin syllables and Chinese characters. (Huang et al., 2018; Yang et al., 2012; Jia and Chinese pinyin input method engine (IME) Zhao, 2014; Chen et al., 2015) regarded the P2C as converts pinyin into character so that Chinese a translation between two languages and solved it characters can be conveniently inputted into computer through common keyboard. IMEs in statistical or neural machine translation frame- work relying on its core component, pinyin- work. The fundamental difference between (Chen to-character conversion (P2C). Usually Chi- et al., 2015) work and ours is that our work is a nese IMEs simply predict a list of character fully end-to-end neural IME model with extra at- sequences for user choice only according to tention enhancement, while the former still works user pinyin input at each turn. However, Chi- on traditional IME only with converted neural net- nese inputting is a multi-turn online procedure, work language model enhancement. (Zhang et al., which can be supposed to be exploited for fur- 2017) introduced an online algorithm to construct ther user experience promoting. This paper thus for the first time introduces a sequence- appropriate dictionary for P2C. All the above men- to-sequence model with gated-attention mech- tioned work, however, still rely on a complete in- anism for the core task in IMEs.
    [Show full text]
  • Input for Winforms
    ComponentOne Input for WinForms ComponentOne, a division of GrapeCity 201 South Highland Avenue, Third Floor Pittsburgh, PA 15206 USA Website: http://www.componentone.com Sales: [email protected] Telephone: 1.800.858.2739 or 1.412.681.4343 (Pittsburgh, PA USA Office) Trademarks The ComponentOne product name is a trademark and ComponentOne is a registered trademark of GrapeCity, Inc. All other trademarks used herein are the properties of their respective owners. Warranty ComponentOne warrants that the media on which the software is delivered is free from defects in material and workmanship, assuming normal use, for a period of 90 days from the date of purchase. If a defect occurs during this time, you may return the defective media to ComponentOne, along with a dated proof of purchase, and ComponentOne will replace it at no charge. After 90 days, you can obtain a replacement for the defective media by sending it and a check for $2 5 (to cover postage and handling) to ComponentOne. Except for the express warranty of the original media on which the software is delivered is set forth here, ComponentOne makes no other warranties, express or implied. Every attempt has been made to ensure that the information contained in this manual is correct as of the time it was written. ComponentOne is not responsible for any errors or omissions. ComponentOne’s liability is limited to the amount you paid for the product. ComponentOne is not liable for any special, consequential, or other damages for any reason. Copying and Distribution While you are welcome to make backup copies of the software for your own use and protection, you are not permitted to make copies for the use of anyone else.
    [Show full text]
  • China's Shanzhai Entrepreneurs Hooligans Or
    China’s Shanzhai Entrepreneurs Hooligans or Heroes? 《中國⼭寨企業家:流氓抑或是英雄》 Callum Smith ⾼林著 Submitted for Bachelor of Asia Pacific Studies (Honours) The Australian National University October 2015 2 Declaration of originality This thesis is my own work. All sources used have been acknowledGed. Callum Smith 30 October 2015 3 ACKNOWLEDGEMENTS I am indebted to the many people whose acquaintance I have had the fortune of makinG. In particular, I would like to express my thanks to my hiGh-school Chinese teacher Shabai Li 李莎白 for her years of guidance and cherished friendship. I am also grateful for the support of my friends in Beijing, particularly Li HuifanG 李慧芳. I am thankful for the companionship of my family and friends in Canberra, and in particular Sandy 翟思纯, who have all been there for me. I would like to thank Neil Thomas for his comments and suggestions on previous drafts. I am also Grateful to Geremie Barmé. Callum Smith 30 October 2015 4 CONTENTS ACKNOWLEDGEMENTS ................................................................................................................................ 3 ABSTRACT ........................................................................................................................................................ 5 INTRODUCTION .............................................................................................................................................. 6 THE EMERGENCE OF A SOCIOCULTURAL PHENOMENON ...................................................................................................
    [Show full text]
  • The Challenge of Chinese Character Acquisition
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Faculty Publications: Department of Teaching, Department of Teaching, Learning and Teacher Learning and Teacher Education Education 2017 The hC allenge of Chinese Character Acquisition: Leveraging Multimodality in Overcoming a Centuries-Old Problem Justin Olmanson University of Nebraska at Lincoln, [email protected] Xianquan Chrystal Liu University of Nebraska - Lincoln, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/teachlearnfacpub Part of the Bilingual, Multilingual, and Multicultural Education Commons, Chinese Studies Commons, Curriculum and Instruction Commons, Instructional Media Design Commons, Language and Literacy Education Commons, Online and Distance Education Commons, and the Teacher Education and Professional Development Commons Olmanson, Justin and Liu, Xianquan Chrystal, "The hC allenge of Chinese Character Acquisition: Leveraging Multimodality in Overcoming a Centuries-Old Problem" (2017). Faculty Publications: Department of Teaching, Learning and Teacher Education. 239. http://digitalcommons.unl.edu/teachlearnfacpub/239 This Article is brought to you for free and open access by the Department of Teaching, Learning and Teacher Education at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Faculty Publications: Department of Teaching, Learning and Teacher Education by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Volume 4 (2017)
    [Show full text]
  • Actionscript 3.0 Cookbook.Pdf
    ActionScript 3.0 Cookbook By Joey Lott, Darron Schall, Keith Peters ............................................... Publisher: O'Reilly Pub Date: October 01, 2006 ISBN: 0-596-52695-4 Pages: 592 Table of Contents | Index Well before Ajax and Microsoft's Windows Presentation Foundation hit the scene, Macromedia offered the first method for building web pages with the responsiveness and functionality of desktop programs with its Flash-based "Rich Internet Applications". Now, new owner Adobe is taking Flash and its powerful capabilities beyond the Web and making it a full-fledged development environment. Rather than focus on theory, the ActionScript 3.0 Cookbook concentrates on the practical application of ActionScript, with more than 300 solutions you can use to solve a wide range of common coding dilemmas. You'll find recipes that show you how to: Detect the user's Flash Player version or their operating system Build custom classes Format dates and currency types Work with strings Build user interface components Work with audio and video Make remote procedure calls using Flash Remoting and web services Load, send, and search XML data And much, much more ... Each code recipe presents the Problem, Solution, and Discussion of how you can use it in other ways or personalize it for your own needs, and why it works. You can quickly locate the recipe that most closely matches your situation and get the solution without reading the whole book to understand the underlying code. Solutions progress from short recipes for small problems to more complex scripts for thornier riddles, and the discussions offer a deeper analysis for resolving similar issues in the future, along with possible design choices and ramifications.
    [Show full text]
  • Strategic Social Media Tools and Increasing Engagement
    Strategic Social media tools and increasing engagement Soolcio D I ST RI C T CO UN C IL In this guide 1. How to make best use ofyour time and money 2. What's in your social media too/kit? 3. How can you increase engagement? Soolcio D I ST RI C T CO UN C IL 1. Investment should you focus your time and money? Soolcio D I ST RI C T CO UN C IL Let’s think about 1. Platforms 3. Photography 2. Planning 4. Promotions Soolcio D I ST RI C T CO UN C IL 1. Platforms Always better to do fewer platforms, brilliantly You don't have to be everywhere, all the time! Think: Where is my audience? Soolcio D I ST RI C T CO UN C IL ------------------- ----------- 9!.!Je! · little_aae_kitchen ti II ~• • • • little_acre_kitchen • Follow eny oc •, d • Origi al io little_acre_kitchen ; PY F D Y! ; Biscoff brownies o t e counter! I you vould like to book a house old table or the veeken t en ge i touch! 01480 46405 □ eve s@hallandco en desig .co.uk 3w simply_rose711 Are hese available for take away? 3 1 like Rep y (? 0 Y/ Lik by cambridgejuiceco an 75 others e Q ddacommen ... Huntingdonshire- DISTRICT COUNCIL 2. Planning Put time aside to think: • What type ofcontent you'll post • What you won't post about! • Who's going to do it • What will be sustainable Soolcio D I ST RI C T CO UN C IL SOCIAL MEDIA CHECKLIST Planning Maybe you're new to social media - or you want to take a fresh 2.
    [Show full text]
  • Windows Powershell Best Practices Windows Powershell Best Practices
    Windows PowerShell Best Practices Windows PowerShell Best Practices Expert recommendations, pragmatically applied Automate system administration using Windows PowerShell best practices—and optimize your operational efficiency. With this About the Author practical guide, Windows PowerShell expert and instructor Ed Ed Wilson, MCSE, CISSP, is a well-known Wilson delivers field-tested tips, real-world examples, and candid scripting expert and author of “Hey Windows Scripting Guy!”—one of the most popular advice culled from administrators across a range of business and blogs on Microsoft TechNet. He’s written technical scenarios. If you’re an IT professional with Windows several books on Windows scripting PowerShell experience, this book is ideal. for Microsoft Press, including Windows PowerShell 2.0 Best Practices and Windows PowerShell Scripting Guide. Discover how to: PowerShell • Use Windows PowerShell to automate Active Directory tasks • Explore available WMI classes and methods with CIM cmdlets • Identify and track scripting opportunities to avoid duplication • Use functions to encapsulate business logic and reuse code • Design your script’s best input method and output destination • Test scripts by checking their syntax and performance • Choose the most suitable method for running remote commands • Manage software services with Desired State Configuration Wilson BEST PRACTICES microsoft.com/mspress ISBN 978-0-7356-6649-8 U.S.A. $59.99 55999 Canada $68.99 [Recommended] 9 780735 666498 Operating Systems/Windows Server Celebrating 30 years! Ed Wilson 666498_Win_PowerShell_Best_Practices.indd 1 4/11/14 10:30 AM Windows PowerShell Best Practices Ed Wilson 666498_book.indb 1 12/20/13 10:50 AM Published with the authorization of Microsoft Corporation by: O’Reilly Media, Inc.
    [Show full text]
  • Powershell Notes for Professionals ™
    PowerShell Notes for Professionals ™ PowerShellNotes for Professionals 100+ pages of professional hints and tricks Disclaimer This is an unocial free book created for educational purposes and is GoalKicker.com not aliated with ocial PowerShell™ group(s) or company(s). Free Programming Books All trademarks and registered trademarks are the property of their respective owners Contents About ................................................................................................................................................................................... 1 Chapter 1: Getting started with PowerShell .................................................................................................... 2 Section 1.1: Allow scripts stored on your machine to run un-signed ........................................................................ 2 Section 1.2: Aliases & Similar Functions ....................................................................................................................... 2 Section 1.3: The Pipeline - Using Output from a PowerShell cmdlet ........................................................................ 3 Section 1.4: Calling .Net Library Methods .................................................................................................................... 4 Section 1.5: Installation or Setup .................................................................................................................................. 5 Section 1.6: Commenting ..............................................................................................................................................
    [Show full text]
  • The Challenge of Chinese Character Acquisition: Leveraging Multimodality in Overcoming a Centuries-Old Problem
    The Emerging Learning Design Journal Volume 4 Issue 1 Article 1 February 2018 The Challenge of Chinese Character Acquisition: Leveraging Multimodality in Overcoming a Centuries-Old Problem Justin Olmanson University of Nebraska Lincoln Xianquan Liu University of Nebraska Lincoln Follow this and additional works at: https://digitalcommons.montclair.edu/eldj Part of the Instructional Media Design Commons Recommended Citation Olmanson, Justin and Liu, Xianquan (2018) "The Challenge of Chinese Character Acquisition: Leveraging Multimodality in Overcoming a Centuries-Old Problem," The Emerging Learning Design Journal: Vol. 4 : Iss. 1 , Article 1. Available at: https://digitalcommons.montclair.edu/eldj/vol4/iss1/1 This Article is brought to you for free and open access by Montclair State University Digital Commons. It has been accepted for inclusion in The Emerging Learning Design Journal by an authorized editor of Montclair State University Digital Commons. For more information, please contact [email protected]. Volume 4 (2017) pgs. 1-9 Emerging Learning http://eldj.montclair.edu eld.j ISSN 2474-8218 Design Journal The Challenge of Chinese Character Acquisition: Leveraging Multimodality in Overcoming a Centuries-Old Problem Justin Olmanson and Xianquan Liu University of Nebraska Lincoln 1400 R St, Lincoln, NE 68588 [email protected] May 23, 2017 ABSTRACT For learners unfamiliar with character-based or logosyllabic writing systems, the process of developing literacy in written Chinese poses significantly more obstacles than learning
    [Show full text]
  • NY IME Instructions
    Selecting Simplified Input Method To type in simplified characters, click on the arrow to the right of the selected input language at the top left corner of your screen. Then select "Chinese (Simplified)" from the drop-down list that appears, as shown below. Please note that after each time you select a language, you must use your mouse to reposition your cursor inside the response box before you can begin typing. Note: You may also toggle between your selected Chinese input method and English by using the key code CTRL+SPACEBAR. IMPORTANT: Once you have selected a Chinese input language, if you press SHIFT, your keyboard will type in English until you press SHIFT again to resume Chinese input. Text Entry and Character Selection 1. Use the keyboard to type the pronunciation of the desired Chinese character in Simplified Chinese. As you type, a long window will appear with numbered character options, as shown in the example below. If you do not see the desired character in the window, type additional letters or use the mouse to click on the black arrow at the end of the window to see another set of character options. 2. If the first character shown is the desired character, press SPACEBAR to select it. To select another character, use the mouse to click on the character in the window or type the number that corresponds to the desired character. 3. The character you selected will now appear in the response box. Press ENTER or SPACEBAR to confirm the character and move the cursor forward.
    [Show full text]
  • Chinats Language Input System in the Digital Age Affects Childrents Reading Development
    China’s language input system in the digital age affects children’s reading development Li Hai Tan1,2, Min Xu1, Chun Qi Chang, and Wai Ting Siok2 State Key Laboratory of Brain and Cognitive Sciences, Department of Linguistics, and Shenzhen Institute of Research and Innovation, University of Hong Kong, Hong Kong Edited by Dale Purves, Duke–National University of Singapore Graduate Medical School, Singapore, and approved December 5, 2012 (received for review August 7, 2012) Written Chinese as a logographic system was developed over 3,000 analysis of characters and to establish their representation in long- y ago. Historically, Chinese children have learned to read by learning term memory (21–25). to associate the visuo-graphic properties of Chinese characters with Severe reading difficulty arises when children fail to establish lexical meaning, typically through handwriting. In recent years, a cohesive reading circuit that links orthography, phonology, and however, many Chinese children have learned to use electronic meaning. Reading difficulty is defined as an unexpectedly low communication devices based on the pinyin input method, which reading ability in people who have adequate nonverbal intelligence, associates phonemes and English letters with characters. When have acquired typical schooling, and have experienced sufficient children use pinyin to key in letters, their spelling no longer depends sociocultural opportunities (1–12). Estimates of prevalence of se- on reproducing the visuo-graphic properties of characters that are vere reading difficulty in English range from 5% to 17% (3, 8, 11, indispensable to Chinese reading, and, thus, typing in pinyin may 13). Severe reading difficulty has also been found in Chinese conflict with the traditional learning processes for written Chinese.
    [Show full text]