Isolation Forest

Total Page:16

File Type:pdf, Size:1020Kb

Isolation Forest Isolation Forest Fei Tony Liu, Kai Ming Ting Zhi-Hua Zhou Gippsland School of Information Technology National Key Laboratory Monash University, Victoria, Australia for Novel Software Technology {tony.liu},{kaiming.ting}@infotech.monash.edu.au Nanjing University, Nanjing 210093, China [email protected] Abstract anomalies. Notable examples such as statistical methods [11], classification-based methods [1], and clustering-based Most existing model-based approaches to anomaly de- methods [5] all use this general approach. Two major draw- tection construct a profile of normal instances, then iden- backs of this approach are: (i) the anomaly detector is opti- tify instances that do not conform to the normal profile as mized to profile normal instances, but not optimized to de- anomalies. This paper proposes a fundamentally different tect anomalies—as a consequence, the results of anomaly model-based method that explicitly isolates anomalies in- detection might not be as good as expected, causing too stead of profiles normal points. To our best knowledge, the many false alarms (having normal instances identified as concept of isolation has not been explored in current liter- anomalies) or too few anomalies being detected; (ii) many ature. The use of isolation enables the proposed method, existing methods are constrained to low dimensional data iForest, to exploit sub-sampling to an extent that is not fea- and small data size because of their high computational sible in existing methods, creating an algorithm which has a complexity. linear time complexity with a low constant and a low mem- This paper proposes a different type of model-based ory requirement. Our empirical evaluation shows that iFor- method that explicitly isolates anomalies rather than profiles est performs favourably to ORCA, a near-linear time com- normal instances. To achieve this, our proposed method plexity distance-based method, LOF and Random Forests in takes advantage of two anomalies’ quantitative properties: terms of AUC and processing time, and especially in large i) they are the minority consisting of fewer instances and data sets. iForest also works well in high dimensional prob- ii) they have attribute-values that are very different from lems which have a large number of irrelevant attributes, those of normal instances. In other words, anomalies are and in situations where training set does not contain any ‘few and different’, which make them more susceptible to anomalies. isolation than normal points. We show in this paper that a tree structure can be constructed effectively to isolate every single instance. Because of their susceptibility to isolation, 1 Introduction anomalies are isolated closer to the root of the tree; whereas normal points are isolated at the deeper end of the tree. This Anomalies are data patterns that have different data char- isolation characteristic of tree forms the basis of our method acteristics from normal instances. The detection of anoma- to detect anomalies, and we call this tree Isolation Tree or lies has significant relevance and often provides critical ac- iTree. tionable information in various application domains. For The proposed method, called Isolation Forest or iFor- example, anomalies in credit card transactions could signify est, builds an ensemble of iTrees for a given data set, then fraudulent use of credit cards. An anomalous spot in an as- anomalies are those instances which have short average path tronomy image could indicate the discovery of a new star. lengths on the iTrees. There are only two variables in this An unusual computer network traffic pattern could stand method: the number of trees to build and the sub-sampling for an unauthorised access. These applications demand size. We show that iForest’s detection performance con- anomaly detection algorithms with high detection perfor- verges quickly with a very small number of trees, and it mance and fast execution. only requires a small sub-sampling size to achieve high de- Most existing model-based approaches to anomaly de- tection performance with high efficiency. tection construct a profile of normal instances, then iden- Apart from the key difference of isolation versus pro- tify instances that do not conform to the normal profile as filing, iForest is distinguished from existing model-based [11, 1, 5], distance-based [6] and density-based methods [4] in the follow ways: • The isolation characteristic of iTrees enables them to build partial models and exploit sub-sampling to an extent that is not feasible in existing methods. Since a large part of an iTree that isolates normal points is not needed for anomaly detection; it does not need to be constructed. A small sample size produces better iTrees because the swamping and masking effects are reduced. (a) Isolating xi (b) Isolating xo • iForest utilizes no distance or density measures to de- tect anomalies. This eliminates major computational cost of distance calculation in all distance-based meth- ods and density-based methods. • iForest has a linear time complexity with a low constant and a low memory requirement. To our best knowledge, the best-performing existing method achieves only approximate linear time complexity with high memory usage [13]. • iForest has the capacity to scale up to handle extremely large data size and high-dimensional problems with a large number of irrelevant attributes. This paper is organised as follows: In Section 2, we demonstrate isolation at work using an iTree that recursively partitions data. A new anomaly score based on iTrees is also proposed. In Section 3, we describe the characteristic of this method that helps to tackle the problems of swamping and masking. In Section 4, we provide the algorithms to con- (c) Average path lengths converge struct iTrees and iForest. Section 5 empirically compares this method with three state-of-the-art anomaly detectors; we also analyse the efficiency of the proposed method, and Figure 1. Anomalies are more susceptible to report the experimental results in terms of AUC and pro- isolation and hence have short path lengths. cessing time. Section 6 provides a discussion on efficiency, Given a Gaussian distribution (135 points), and Section 7 concludes this paper. (a) a normal point xi requires twelve random partitions to be isolated; (b) an anomaly xo re- 2 Isolation and Isolation Trees quires only four partitions to be isolated. (c) averaged path lengths of xi and xo converge In this paper, the term isolation means ‘separating an in- when the number of trees increases. stance from the rest of the instances’. Since anomalies are ‘few and different’ and therefore they are more susceptible to isolation. In a data-induced random tree, partitioning of instances are repeated recursively until all instances are iso- To demonstrate the idea that anomalies are more suscep- lated. This random partitioning produces noticeable shorter tible to isolation under random partitioning, we illustrate paths for anomalies since (a) the fewer instances of anoma- an example in Figures 1(a) and 1(b) to visualise the ran- lies result in a smaller number of partitions – shorter paths dom partitioning of a normal point versus an anomaly. We in a tree structure, and (b) instances with distinguishable observe that a normal point, xi, generally requires more attribute-values are more likely to be separated in early par- partitions to be isolated. The opposite is also true for the titioning. Hence, when a forest of random trees collectively anomaly point, xo, which generally requires less partitions produce shorter path lengths for some particular points, then to be isolated. In this example, partitions are generated by they are highly likely to be anomalies. randomly selecting an attribute and then randomly selecting a split value between the maximum and minimum values of iTree BST the selected attribute. Since recursive partitioning can be Proper binary trees Proper binary trees represented by a tree structure, the number of partitions re- External node termination Unsuccessful search quired to isolate a point is equivalent to the path length from Not applicable Successful search the root node to a terminating node. In this example, the path length of xi is greater than the path length of xo. Table 1. List of equivalent structure and oper- Since each partition is randomly generated, individual ations in iTree and Binary Search Tree (BST) trees are generated with different sets of partitions. We av- erage path lengths over a number of trees to find the ex- pected path length. Figure 1(c) shows that the average path unsuccessful search in BST. We borrow the analysis from lengths of xo and xi converge when the number of trees in- BST to estimate the average path length of iTree. Given a creases. Using 1000 trees, the average path lengths of xo data set of n instances, Section 10.3.3 of [9] gives the aver- and xi converge to 4.02 and 12.82 respectively. It shows that anomalies are having path lengths shorter than normal age path length of unsuccessful search in BST as: instances. c(n) = 2H(n − 1) − (2(n − 1)/n), (1) Definition : Isolation Tree. Let T be a node of an isola- tion tree. T is either an external-node with no child, or an where H(i) is the harmonic number and it can be estimated internal-node with one test and exactly two daughter nodes by ln(i) + 0.5772156649 (Euler’s constant). As c(n) is the (Tl,Tr). A test consists of an attribute q and a split value p average of h(x) given n, we use it to normalise h(x). The such that the test q < p divides data points into Tl and Tr. anomaly score s of an instance x is defined as: Given a sample of data X = {x , ..., x } of n in- − E(h(x)) 1 n s(x, n) = 2 c(n) , (2) stances from a d-variate distribution, to build an isolation tree (iTree), we recursively divide X by randomly select- where E(h(x)) is the average of h(x) from a collection of ing an attribute q and a split value p, until either: (i) the isolation trees.
Recommended publications
  • Originally, the Descendants of Hua Xia Were Not the Descendants of Yan Huang
    E-Leader Brno 2019 Originally, the Descendants of Hua Xia were not the Descendants of Yan Huang Soleilmavis Liu, Activist Peacepink, Yantai, Shandong, China Many Chinese people claimed that they are descendants of Yan Huang, while claiming that they are descendants of Hua Xia. (Yan refers to Yan Di, Huang refers to Huang Di and Xia refers to the Xia Dynasty). Are these true or false? We will find out from Shanhaijing ’s records and modern archaeological discoveries. Abstract Shanhaijing (Classic of Mountains and Seas ) records many ancient groups of people in Neolithic China. The five biggest were: Yan Di, Huang Di, Zhuan Xu, Di Jun and Shao Hao. These were not only the names of groups, but also the names of individuals, who were regarded by many groups as common male ancestors. These groups first lived in the Pamirs Plateau, soon gathered in the north of the Tibetan Plateau and west of the Qinghai Lake and learned from each other advanced sciences and technologies, later spread out to other places of China and built their unique ancient cultures during the Neolithic Age. The Yan Di’s offspring spread out to the west of the Taklamakan Desert;The Huang Di’s offspring spread out to the north of the Chishui River, Tianshan Mountains and further northern and northeastern areas;The Di Jun’s and Shao Hao’s offspring spread out to the middle and lower reaches of the Yellow River, where the Di Jun’s offspring lived in the west of the Shao Hao’s territories, which were near the sea or in the Shandong Peninsula.Modern archaeological discoveries have revealed the authenticity of Shanhaijing ’s records.
    [Show full text]
  • Negotiation Philosophy in Chinese Characters
    6 Ancient Wisdom for the Modern Negotiator: What Chinese Characters Have to Offer Negotiation Pedagogy Andrew Wei-Min Lee* Editors’ Note: In a project that from its inception has been devoted to second generation updates, it is instructive nonetheless to realize how much we have to learn from the past. We believe Lee’s chapter on Chinese characters and their implications for negotiation is groundbreaking. With luck, it will prove to be a harbinger of a whole variety of new ways of looking at our field that will emerge from our next round of discussion. Introduction To the non-Chinese speaker, Chinese characters can look like a cha- otic mess of dots, lines and circles. It is said that Chinese is the most difficult language in the world to learn, and since there is no alpha- bet, the struggling student has no choice but to learn every single Chinese character by sheer force of memory – and there are tens of thousands! I suggest a different perspective. While Chinese is perhaps not the easiest language to learn, there is a very definite logic and sys- tem to the formation of Chinese characters. Some of these characters date back almost eight thousand years – and embedded in their make-up is an extraordinary amount of cultural history and wisdom. * Andrew Wei-Min Lee is founder and president of the Leading Negotiation Institute, whose mission is to promote negotiation pedagogy in China. He also teaches negotiation at Peking University Law School. His email address is an- [email protected]. This article draws primarily upon the work of Feng Ying Yu, who has spent over three hundred hours poring over ancient Chinese texts to analyze and decipher the make-up of modern Chinese characters.
    [Show full text]
  • English Versions of Chinese Authors' Names in Biomedical Journals
    Dialogue English Versions of Chinese Authors’ Names in Biomedical Journals: Observations and Recommendations The English language is widely used inter- In English transliteration, two-syllable Forms of Chinese Authors’ Names nationally for academic purposes. Most of given names sometimes are spelled as two in Biomedical Journals the world’s leading life-science journals are words (Jian Hua), sometimes as one word We recently reviewed forms of Chinese published in English. A growing number (Jianhua), and sometimes hyphenated authors’ names accompanying English- of Chinese biomedical journals publish (Jian-Hua). language articles or abstracts in various abstracts or full papers in this language. Occasionally Chinese surnames are Chinese and Western biomedical journals. We have studied how Chinese authors’ two syllables (for example, Ou-Yang, Mu- We found considerable inconsistency even names are presented in English in bio- Rong, Si-Ma, and Si-Tu). Editors who are within the same journal or issue. The forms medical journals. There is considerable relatively unfamiliar with Chinese names were in the following categories: inconsistency. This inconsistency causes may mistake these compound surnames for • Surname in all capital letters followed by confusion, for example, in distinguishing given names. hyphenated or closed-up given name, for surnames from given names and thus cit- China has 56 ethnic groups. Names example, ing names properly in reference lists. of minority group members can differ KE Zhi-Yong (Chinese Journal of In the current article we begin by pre- considerably from those of Hans, who Contemporary Pediatrics) senting as background some features of constitute most of the Chinese population. GUO Liang-Qian (Chinese Chinese names.
    [Show full text]
  • Delong Zuo Associate Professor Department of Civil and Environmental Engineering Texas Tech University
    Curriculum Vitae Delong Zuo Associate Professor Department of Civil and Environmental Engineering Texas Tech University Box 41023, Texas Tech University, Lubbock, TX 79409-1023 Phone: (806) 834-6535; Fax: (806) 742-3446; Email: [email protected] GENERAL INFORMATION Education Ph.D. in Civil Engineering May 2005 The Johns Hopkins University Dissertation: "Understanding Wind- and Rain-Wind-Induced Stay Cable Vibrations" Advisor: Professor Nicholas P. Jones Master of Science in Civil Engineering May 2003 The Johns Hopkins University Master of Science in Structural Engineering April 1999 Chongqing Jiaotong University, Chongqing, China Bachelor of Engineering in Civil Engineering (with highest honor) July 1996 Chongqing Jiaotong University, Chongqing, China Professional Experience Associate Professor of Civil Engineering September 2012 – Present Texas Tech University Assistant Professor of Civil Engineering September 2006 – August 2012 Texas Tech University Postdoctoral Fellow April 2005 –August 2006 Department of Civil Engineering The Johns Hopkins University Visiting Scholar August 2002 - August 2004 Department of Civil and Environmental Engineering University of Illinois at Urbana-Champaign Selected Honors and Awards Faculty Research Award 2010 Department of Civil and Environmental Engineering Texas Tech University Meyerhoff Fellowship 1999-2000 The Johns Hopkins University Curriculum Vitae Wufu-Zhenhua Scholarship 1999 Department of Transportation, China RESEARCH PROJECTS Sponsored by Federal Agencies: P1. Department of Energy Optimization of Wind Turbine Performance (Announced, subcontract from Alstom Power, Inc.) September 2014-August, 2015 PI: Delong Zuo, Co-PI: John Schroeder Total Award of $148,483 (50%) P2. National Science Foundation Development of a Practical Model for Wind- and Rain-Wind-Induced Stay Cable Vibrations September 2009 – August 2012 PI: Delong Zuo Total Award of $150,529 (100%) P3.
    [Show full text]
  • From Translation to Adaptation: Chinese Language Texts and Early Modern Japanese Literature
    From Translation to Adaptation: Chinese Language Texts and Early Modern Japanese Literature Nan Ma Hartmann Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2014 © 2014 Nan Ma Hartmann All rights reserved ABSTRACT From Translation to Adaptation: Chinese Language Texts and Early Modern Japanese Literature Nan Ma Hartmann This dissertation examines the reception of Chinese language and literature during Tokugawa period Japan, highlighting the importation of vernacular Chinese, the transformation of literary styles, and the translation of narrative fiction. By analyzing the social and linguistic influences of the reception and adaptation of Chinese vernacular fiction, I hope to improve our understanding of genre development and linguistic diversification in early modern Japanese literature. This dissertation historically and linguistically contextualizes the vernacularization movements and adaptations of Chinese texts in the seventeenth to eighteenth centuries, showing how literary importation and localization were essential stimulants and also a paradigmatic shift that generated new platforms for Japanese literature. Chapter 1 places the early introduction of vernacular Chinese language in its social and cultural contexts, focusing on its route of propagation from the Nagasaki translator community to literati and scholars in Edo, and its elevation from a utilitarian language to an object of literary and political interest. Central figures include Okajima Kazan (1674-1728) and Ogyû Sorai (1666-1728). Chapter 2 continues the discussion of the popularization of vernacular Chinese among elite intellectuals, represented by the Ken’en School of scholars and their Chinese study group, “the Translation Society.” This chapter discusses the methodology of the study of Chinese by surveying a number of primers and dictionaries compiled for reading vernacular Chinese and comparing such material with methodologies for reading classical Chinese.
    [Show full text]
  • Man Hua Zuo P N Ke Xian Li De Qiu Fang Wei J N Keion Shouno Zou Zh Yue Gu Ng Tiao Li Gett Robo Xu N Hu Sh Ng Mai Yue Gu Ng Ji Mian
    MAN HUA ZUO P N KE XIAN LI DE QIU FANG WEI J N KEION SHOUNO ZOU ZH YUE GU NG TIAO LI GETT ROBO XU N HU SH NG MAI YUE GU NG JI MIAN PDF-33MHZPNKXLDQFWJNKSZZYGNTLGRXNHSNMYGNJM16 | Page: 133 File Size 5,909 KB | 10 Oct, 2020 TABLE OF CONTENT Introduction Brief Description Main Topic Technical Note Appendix Glossary PDF File: Man Hua Zuo P N Ke Xian Li De Qiu Fang Wei J N Keion Shouno Zou Zh Yue Gu Ng Tiao Li Gett 1/3 Robo Xu N Hu Sh Ng Mai Yue Gu Ng Ji Mian - PDF-33MHZPNKXLDQFWJNKSZZYGNTLGRXNHSNMYGNJM16 PDF File: Man Hua Zuo P N Ke Xian Li De Qiu Fang Wei J N Keion Shouno Zou Zh Yue Gu Ng Tiao Li Gett 2/3 Robo Xu N Hu Sh Ng Mai Yue Gu Ng Ji Mian - PDF-33MHZPNKXLDQFWJNKSZZYGNTLGRXNHSNMYGNJM16 Man Hua Zuo P N Ke Xian Li De Qiu Fang Wei J N Keion Shouno Zou Zh Yue Gu Ng Tiao Li Gett Robo Xu N Hu Sh Ng Mai Yue Gu Ng Ji Mian e-Book Name : Man Hua Zuo P N Ke Xian Li De Qiu Fang Wei J N Keion Shouno Zou Zh Yue Gu Ng Tiao Li Gett Robo Xu N Hu Sh Ng Mai Yue Gu Ng Ji Mian - Read Man Hua Zuo P N Ke Xian Li De Qiu Fang Wei J N Keion Shouno Zou Zh Yue Gu Ng Tiao Li Gett Robo Xu N Hu Sh Ng Mai Yue Gu Ng Ji Mian PDF on your Android, iPhone, iPad or PC directly, the following PDF file is submitted in 10 Oct, 2020, Ebook ID PDF-33MHZPNKXLDQFWJNKSZZYGNTLGRXNHSNMYGNJM16.
    [Show full text]
  • Performing Chinese Contemporary Art Song
    Performing Chinese Contemporary Art Song: A Portfolio of Recordings and Exegesis Qing (Lily) Chang Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy Elder Conservatorium of Music Faculty of Arts The University of Adelaide July 2017 Table of contents Abstract Declaration Acknowledgements List of tables and figures Part A: Sound recordings Contents of CD 1 Contents of CD 2 Contents of CD 3 Contents of CD 4 Part B: Exegesis Introduction Chapter 1 Historical context 1.1 History of Chinese art song 1.2 Definitions of Chinese contemporary art song Chapter 2 Performing Chinese contemporary art song 2.1 Singing Chinese contemporary art song 2.2 Vocal techniques for performing Chinese contemporary art song 2.3 Various vocal styles for performing Chinese contemporary art song 2.4 Techniques for staging presentations of Chinese contemporary art song i Chapter 3 Exploring how to interpret ornamentations 3.1 Types of frequently used ornaments and their use in Chinese contemporary art song 3.2 How to use ornamentation to match the four tones of Chinese pronunciation Chapter 4 Four case studies 4.1 The Hunchback of Notre Dame by Shang Deyi 4.2 I Love This Land by Lu Zaiyi 4.3 Lullaby by Shi Guangnan 4.4 Autumn, Pamir, How Beautiful My Hometown Is! by Zheng Qiufeng Conclusion References Appendices Appendix A: Romanized Chinese and English translations of 56 Chinese contemporary art songs Appendix B: Text of commentary for 56 Chinese contemporary art songs Appendix C: Performing Chinese contemporary art song: Scores of repertoire for examination Appendix D: University of Adelaide Ethics Approval Number H-2014-184 ii NOTE: 4 CDs containing 'Recorded Performances' are included with the print copy of the thesis held in the University of Adelaide Library.
    [Show full text]
  • Names of Chinese People in Singapore
    101 Lodz Papers in Pragmatics 7.1 (2011): 101-133 DOI: 10.2478/v10016-011-0005-6 Lee Cher Leng Department of Chinese Studies, National University of Singapore ETHNOGRAPHY OF SINGAPORE CHINESE NAMES: RACE, RELIGION, AND REPRESENTATION Abstract Singapore Chinese is part of the Chinese Diaspora.This research shows how Singapore Chinese names reflect the Chinese naming tradition of surnames and generation names, as well as Straits Chinese influence. The names also reflect the beliefs and religion of Singapore Chinese. More significantly, a change of identity and representation is reflected in the names of earlier settlers and Singapore Chinese today. This paper aims to show the general naming traditions of Chinese in Singapore as well as a change in ideology and trends due to globalization. Keywords Singapore, Chinese, names, identity, beliefs, globalization. 1. Introduction When parents choose a name for a child, the name necessarily reflects their thoughts and aspirations with regards to the child. These thoughts and aspirations are shaped by the historical, social, cultural or spiritual setting of the time and place they are living in whether or not they are aware of them. Thus, the study of names is an important window through which one could view how these parents prefer their children to be perceived by society at large, according to the identities, roles, values, hierarchies or expectations constructed within a social space. Goodenough explains this culturally driven context of names and naming practices: Department of Chinese Studies, National University of Singapore The Shaw Foundation Building, Block AS7, Level 5 5 Arts Link, Singapore 117570 e-mail: [email protected] 102 Lee Cher Leng Ethnography of Singapore Chinese Names: Race, Religion, and Representation Different naming and address customs necessarily select different things about the self for communication and consequent emphasis.
    [Show full text]
  • CJK NACO Searching
    1/13/2017 CJK NACO Searching Prepared by Ryan Finnerty and Shi Deng, UC San Diego Library With assistance by Hideyuki Morimoto, Columbia University Libraries Thanks to Erica Chang (Univ. of Hawai’i) and Sarah Byun (LC) for providing Korean examples and search tips. NACO Searching: Purpose & Outlines • Keep the database clean by searching before contributing • Discuss why searching is important with CJK examples • To prevent duplicate NARs • To prevent conflict in authorized access points and variant access points • To gather information from existing bibliographic records • To identify existing records that may need to be evaluated and re‐coded for RDA • To identify bibliographic records that may need BFM • Searching tips in Connexion 2 1 1/13/2017 Why Search? To Prevent Duplicate NARs • Duplicates are normally created by inefficient searching and the 24‐ hour upload gap in the Name authority file. • Before creating a name authority record: 1. Search the OCLC authority file for the authorized access point, including variant forms of the access point. 2. In addition, search WorldCat for bibliographic records that contain the authorized access point or variant forms. • If you put your record in a save file, remember to search again if more than 24 hours have passed. • If you encounter duplicate records in the authority file, be sure to notify your NACO Coordinator so the records can be reported to LC. 3 Duplicate NARs for Personal Names (1) • 24 hours rule: If you put your record in a save file, remember to search again if more than 24 hours have passed. Entered: May 16, 2016 Entered: May 10, 2016 010 no2016066120 010 n 2016025569 046 ǂf 1983 ǂ2 edtf 046 ǂf 1983 ǂ2 edtf 1001 Tanaka, Yūsuke, ǂd 1983‐ 1001 Tanaka, Yūsuke, ǂd 1983‐ 4001 田中祐輔, ǂd 1983‐ 4001 田中祐輔, ǂd 1983‐ 670 Gendai Chūgoku no Nihongo kyōikushi, 2015: 670 Gendai Chūgoku no Nihongo kyōikushi, 2015: ǂbt.p.
    [Show full text]
  • The Acquisition of Mandarin Prosody by American Learners of Chinese As a Foreign Language
    The Acquisition of Mandarin Prosody by American Learners of Chinese as a Foreign Language (CFL) Dissertation Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Graduate School of The Ohio State University By Chunsheng Yang, B.A., M.A. Graduate Program in East Asian Languages and Literatures The Ohio State University 2011 Dissertation Committee: Dr. Marjorie K.M. Chan, Advisor Dr. Mary E. Beckman Dr. Cynthia Clopper Dr. Mineharu Nakayama Copyright by Chunsheng Yang 2011 ABSTRACT In the acquisition of second language (L2) or foreign language (FL) pronunciation, learners not only learn how to pronounce consonants and vowels (tones as well, in the case of tone languages, such as Mandarin Chinese), they also learn how to produce the vowel reduction, vowel-consonant co-articulation, and prosody. Central to this dissertation is prosody, which refers to the way that an utterance is broken up into smaller units, and the acoustic patterns of each unit at different levels, in terms of fundamental frequency (F0), duration and amplitude. In L2 pronunciation, prosody is as important as -- if not more important than -- consonants and vowels. This dissertation examines the acquisition of Mandarin prosody by American learners of Chinese as a Foreign Language (CFL). Specifically, it examines four aspects of Mandarin prosody: (1) prosodic phrasing (i.e., breaking up of utterances into smaller units); (2) surface F0 and duration patterns of prosodic phrasing in a group of sentence productions elicited from L1 and L2 speakers of Mandarin Chinese; (3) patterns of tones errors in L2 Mandarin productions; and (4) the relationship between tone errors and prosodic phrasing in L2 Mandarin.
    [Show full text]
  • 1 a Syntactic Approach to the Grammaticalization of the Modal Marker Dāng 當 in Middle Chinese Barbara Meisterernst, National
    A syntactic approach to the grammaticalization of the modal marker dāng 當 in Middle Chinese Barbara Meisterernst, National Tsing Hua University, Taiwan [email protected] In this paper, I discuss the grammaticalization of the Chinese modal verb dāng from a lexical verb into a deontic modal marker and a future marker as a case of upward movement to one or more functional categories in the sense of Roberts and Roussou (2003). Evidence for a func- tional category outside vP hosting deontic modality comes from the deontic negative markers of Archaic Chinese, from the semantic scope of negation (following Cormack and Smith 2002), from the syntax of wh-adverbials, and from the relative order of necessity modals and possibil- ity modals. 1. Modal markers in Chinese • Modal markers in Late Archaic Chinese (5th – 2nd c. BCE) as a clear instantiation of grammaticalization. → Grammaticalization can range from → lexical verb → modal verb → markers of deontic and/or epistemic modality → future mark- ers. → The first modal displaying this development: the verb kě 可 ‘possible, can’. (1) a. 有無父之國則可也。」 (Zuozhuan, Huan 16.5.3) (LAC) Yŏu wú fù zhī guó zé kě yě Have not.have father GEN state then possible SFP ‘If there is a country without fathers, then it is possible.’ b. 匹夫猶未可動,而況諸侯乎! (Zhuangzi 4.2.1) (LAC) Pǐfū yóu wèi kě dòng, ér kuàng zhūhóu hū Commoner still NEGasp KE move, CON rather feudal.lord SFP/Q ‘If even a commoner cannot be moved, even less can a feudal lord!’ c. 臣違君命者,亦不可不殺也。」 (Guoyu, Luyu shang) (LAC) Chén wéi jūn mìng zhě, yì bù kě bù shā yě subject oppose ruler order REL, also NEG KE NEG kill SFP ‘A subject who opposes the order of his ruler must also be killed.’ • Poly-functionality of most modals in Modern Chinese, Tsai (e.g.
    [Show full text]
  • Supplementary Material (ESI) for Chemical Communications
    Electronic Supplementary Material (ESI) for Dalton Transactions. This journal is © The Royal Society of Chemistry 2015 Electronic Supplementary Information for Dalton Transactions This journal is (c) The Royal Society of Chemistry 2015 Electronic Supplementary Information (ESI) Macrocyclic dinuclear, helical, layer and 3-D Ag(I) complexes - - constructed from AgX (X = NO3 and ClO4 ) and flexible bis(pyridyl) ligands with chelating spacer: syntheses, structures and photoluminescence properties Jing Huang, Zhao-Peng Deng, Ying-Hui Xiao, Li-Hua Huo*, Shu-Nan Zhao, Fa-Yuan Ge and Shan Gao* Electronic Supplementary Information for Dalton Transactions This journal is (c) The Royal Society of Chemistry 2015 Fig. S1 3-D supramolecular network of 1 extended by the lattice water molecules (green balls). Fig. S2 3-D supramolecular network of 2 extended by hydrogen-bonding interactions (green dashed lines). Electronic Supplementary Information for Dalton Transactions This journal is (c) The Royal Society of Chemistry 2015 Fig. S3 3-D supramolecular networks of 3 (left) and 4 (right) extended by hydrogen-bonding interactions (green dashed lines). Fig. S4 Left: Extension of dinuclear units into layer motif through π···π (green dashed lines) and anion···π interactions (violet dashed lines). The hydrogen-bonding and weak Ag···O interactions were denoted as black and double-colored dash lines. Right: 3-D host-guest supramolecular network of 5 extended by hydrogen-bonding interactions (green dashed lines). Electronic Supplementary Information for Dalton Transactions This journal is (c) The Royal Society of Chemistry 2015 Fig. S5 3-D microporous networks of 6 (left) and 7 (right) showing the small channels along b- or a-axis.
    [Show full text]