Arxiv:1711.01889V2 [Cs.CV] 29 Mar 2018 Than 20,000), Increasing Novel Characters (E.G

Total Page:16

File Type:pdf, Size:1020Kb

Arxiv:1711.01889V2 [Cs.CV] 29 Mar 2018 Than 20,000), Increasing Novel Characters (E.G RADICAL ANALYSIS NETWORK FOR ZERO-SHOT LEARNING IN PRINTED CHINESE CHARACTER RECOGNITION Jianshu Zhang, Yixing Zhu, Jun Du and Lirong Dai National Engineering Laboratory for Speech and Language Information Processing University of Science and Technology of China, Hefei, Anhui, P. R. China [email protected], [email protected], [email protected], [email protected] ABSTRACT Chinese characters have a huge set of character categories, more than 20,000 and the number is still increasing as more and more novel characters continue being created. However, the enormous characters can be decomposed into a compact set of about 500 fundamental and structural radicals. This pa- per introduces a novel radical analysis network (RAN) to rec- ognize printed Chinese characters by identifying radicals and analyzing two-dimensional spatial structures among them. testing procedure The proposed RAN first extracts visual features from input by employing convolutional neural networks as an encoder. Then a decoder based on recurrent neural networks is em- ployed, aiming at generating captions of Chinese characters by detecting radicals and two-dimensional structures through a { stl { 尸 d { 龷 八 } } d { 几 又 } } a spatial attention mechanism. The manner of treating a Chi- nese character as a composition of radicals rather than a single Fig. 1: The comparison between the conventional whole-character character class largely reduces the size of vocabulary and en- based methods and the proposed RAN method. ables RAN to possess the ability of recognizing unseen Chi- nese character classes, namely zero-shot learning. we propose a novel radical analysis network (RAN) to gener- Index Terms— Chinese characters, radical analysis, ate captions for recognition of Chinese characters. RAN has zero-shot learning, encoder-decoder, attention two distinctive properties compared with traditional methods: 1) The size of the radical vocabulary is largely reduced com- 1. INTRODUCTION pared with the character vocabulary; 2) It is a novel zero-shot learning of Chinese characters which can recognize unseen The recognition of Chinese characters is an intricate problem Chinese characters in the recognition stage because the cor- due to a large number of existing character categories (more responding radicals and spatial relationships are learned from arXiv:1711.01889v2 [cs.CV] 29 Mar 2018 than 20,000), increasing novel characters (e.g. the character other seen characters in the training stage. Fig. 1 illustrates “Duang” created by Jackie Chan) and complicated internal a clear comparison between traditional methods and RAN structures. However, most conventional approaches [1] can for recognizing Chinese characters. In the traditional meth- only recognize about 4,000 commonly used characters with ods, the classifier takes the character input as a single picture no capability of handling unseen or newly created characters. and tries to learn a mapping between the input picture and Also each character sample is treated as a whole without con- a pre-defined class. If the testing character class is unseen sidering the similarity and internal structures among different in training samples, like the character in red dashed rectan- characters. gle in Fig. 1, it will be misclassified. While RAN attempts It is well-known that all Chinese characters are composed to imitate the manner of recognizing Chinese characters as of basic structural components, called radicals. Only about Chinese learners. For example, before asking children to re- 500 radicals [2] are adequate to describe more than 20,000 member and recognize Chinese characters, Chinese teachers Chinese characters. Therefore, it is an intuitive way to de- first teach them to identify radicals, understand the meaning compose Chinese characters into radicals and describe their of radicals and grasp the possible spatial structures between spatial structures as captions for recognition. In this paper, them. Such learning way is more generative and helps im- prove the memory ability of students to learn so many Chi- a d stl str sbl nese characters, which is perfectly adopted in RAN. As the example in top-right part of Fig. 1 shows, the six training samples contain ten different radicals and exhibit top-bottom, left-right and top-left-surround spatial structures. When en- sl sb st s w countering the unseen character during testing, RAN can still generate the corresponding caption of that character (i.e. the bottom-right rectangle of Fig. 1) as it has already learned the essential radicals and structures. Technically, the enormous Fig. 2: Graphical representation of ten common spatial structures Chinese characters, as well as the newly created characters between Chinese radicals. can all be identified by a compact set of radicals and spatial structures learned in the training stage. In the past few decades, lots of efforts have been made in cjk-decomp 1, we decompose Chinese characters into cor- for radical-based Chinese character recognition. [3] over- responding captions. Regarding to spatial structures among segmented characters into candidate radicals and could only radicals, we show ten common structures in Fig. 2 where “a” handle the left-right structure. [4] first detected separate rad- represents a left-right structure, “d” represents a top-bottom icals and then employed a hierarchical radical matching structure, “stl” represents a top-left-surround structure, “str” method to recognize a Chinese character. Recently, [5] also represents a top-right-surround structure, “sbl” represents a tried to detect position-dependent radicals using a deep resid- bottom-left-surround structure, “sl” represents a left-surround ual network with multi-labeled learning. Generally, these ap- structure, “sb” represents a bottom-surround structure, “st” proaches have difficulties when dealing with the complicated represents a top-surround structure, “s” represents a surround 2D structures between radicals and do not focus on the recog- structure and “w” represents a within structure. nition of unseen character classes. We use a pair of braces to constrain a single structure in Regarding to the network architecture, the proposed character caption. Taking “stl” as an example, it is captioned RAN is an improved version of the attention-based encoder- as “stl f radical-1 radical-2 g”. Usually, like the common decoder model in [6]. We employ convolutional neural net- instances mentioned above, a structure is described by two works (CNN) [7] as the encoder to extract high-level visual different radicals. However, as for some unique structures, features from input Chinese characters. The decoder is re- they are described by three or more radicals. current neural networks with gated recurrent units (GRU) [8] which converts the high-level visual features into output char- 3. NETWORK ARCHITECTURE OF RAN acter captions. We adopt a coverage based spatial attention model built in the decoder to detect the radicals and internal The attention based encoder-decoder model first learns to en- two-dimensional structures simultaneously. The GRU based code input into high-level representations. A fixed-length decoder also performs like a potential language model aiming context vector is then generated via weighted summing the to grasp the rules of composing Chinese character captions high-level representations. The attention performs as the after successfully detecting radicals and structures. The main weighting coefficients so that it can choose the most relevant contributions of this study are summarized as follows: parts from the whole input for calculating the context vec- • We propose RAN for the zero-shot learning of Chinese tor. Finally, the decoder uses this context vector to generate character recognition, solving the problem of handling variable-length output sequence word by word. The frame- unseen or newly created characters. work has been extensively applied to many applications in- cluding machine translation [9], image captioning [10, 11], • We describe how to caption Chinese characters based video processing [12] and handwriting recognition [13–15]. on detailed analysis of Chinese radicals and structures. • We experimentally demonstrate how RAN performs on 3.1. CNN encoder recognizing seen/unseen Chinese characters and show its efficiency through attention visualization. In this paper, we evaluate RAN on printed Chinese charac- ters. The inputs are greyscale images and the pixel value is normalized between 0 and 1. The overall architecture of RAN 2. RADICAL ANALYSIS is shown in Fig. 3. We employ CNN as the encoder which is proven to be a powerful model to extract high-quality visual Compared with enormous Chinese character categories, the features from images. Rather than extracting features after amount of radical categories is quite limited. It is declared in a fully connected layer, we employ a CNN framework con- GB13000.1 standard [2], which is published by National Lan- taining only convolution, pooling and activation layers, called guage Committee of China, that 20902 Chinese characters are composed of 560 different radicals. Following the strategy 1https://github.com/amake/cjk-decomp a { where g denotes a softmax activation function over all the stl { words in the vocabulary, h denotes a maxout activation func- 尸 K× m m×n m×D d tion, Wo 2 2 , Ws 2 , Wc 2 , and E { R R R 龷 denotes the embedding matrix, m and n are the dimensions 八 of embedding and GRU decoder. } } The decoder adopts two unidirectional GRU layers to cal- d { culate the hidden state st: 几 又 } ^s = GRU (y ; s ) (4) } t t−1 t−1 1.input 2.CNN encoder 3.RNN decoder with attention 4.output ct = fcatt (^st; A) (5) st = GRU (ct;^st) (6) Fig. 3: The overall architecture of RAN for printed Chinese charac- ter recognition. The purple, blue and green rectangles are examples where st−1 denotes the previous hidden state, ^st is the predic- of attention visualization when predicting the words that are of the tion of current GRU hidden state, and f denotes the cover- same color in output caption. catt age based spatial attention model (Section 3.2.2).
Recommended publications
  • Copyright Undertaking
    Copyright Undertaking This thesis is protected by copyright, with all rights reserved. By reading and using the thesis, the reader understands and agrees to the following terms: 1. The reader will abide by the rules and legal ordinances governing copyright regarding the use of the thesis. 2. The reader will use the thesis for the purpose of research or private study only and not for distribution or further reproduction or any other purpose. 3. The reader agrees to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage. IMPORTANT If you have reasons to believe that any materials in this thesis are deemed not suitable to be distributed in this form, or a copyright owner having difficulty with the material being included in our database, please contact [email protected] providing details. The Library will look into your claim and consider taking remedial action upon receipt of the written requests. Pao Yue-kong Library, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong http://www.lib.polyu.edu.hk DAJIANGYOU: MEDIA PRACTICES OF VERNACULAR CREATIVITY IN POSTDIGITAL CHINA GABRIELE DE SETA Ph.D The Hong Kong Polytechnic University 2016 The Hong Kong Polytechnic University Department of Applied Social Sciences Dajiangyou: Media practices of vernacular creativity in postdigital China Gabriele de Seta A thesis submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy August 2015 Certificate of Originality I hereby declare that this thesis is my own work and that, to the best of my knowledge and belief, it reproduces no material previously published or written, nor material that has been accepted for the award of any other degree or diploma, except where due acknowledgement has been made in the text.
    [Show full text]
  • Zhao Rugua'nın Zhufanzhi Adlı Eserine Göre XII-XIII. Yüzyılda Orta
    T.C. ANKARA ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ TARİH (ORTAÇAĞ TARİHİ) ANABİLİM DALI Zhao Rugua’nın Zhufanzhi Adlı Eserine Göre XII-XIII. Yüzyılda Orta Doğu Kentleri ve Ticari Emtia Yüksek Lisans Tezi Shan-Ju LIN Ankara-2015 T.C. ANKARA ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ TARİH (ORTAÇAĞ TARİHİ) ANABİLİM DALI Zhao Rugua’nın Zhufan Zhi Adlı Eserine Göre XII-XIII. Yüzyılda Orta Doğu Kentleri ve Ticari Emtia Yüksek Lisans Tezi Shan-Ju LIN Tez Danışmanı Doç. Dr. Hatice ORUÇ Ankara-2015 T.C. ANKARA ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ TARİH (ORTAÇAĞ TARİHİ) ANABİLİM DALI Zhao Rugua'nın Zhufanzhi Adlı Eserine Göre 12-13. Yüzyılda Ortadoğu Kentleri Ve Ticari Emtia Yüksek Lisans Tezi Tez Danışmanı: 0 u ç Tez Jürisi Üyeleri Adı ve Soyadı İmzası L Ç Tez Sınavı Tarihi .?K.J.?£.L2P... TÜRKİYE CUMHURİYETİ ANKARA ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ MÜDÜRLÜĞÜNE Bu belge ile, bu tezdeki bütün bilgilerin akademik kurallara etik davranış ilkelerine uygun olarak toplanıp sunulduğunu beyan ederim. Bu kural ve ilkelerin gereği olarak, çalışmada bana ait olmayan tüm veri, düşünce ve sonuçları andığımı ve kaynağını gösterdiğimi ayrıca beyan ederim. (....../....../200...) Tezi Hazırlayan Öğrencinin Adı ve Soyadı .................................................... İmzası .................................................... ĠÇĠNDEKĠLER ÖNSÖZ ........................................................................................................................ 4 GĠRĠġ ..........................................................................................................................
    [Show full text]
  • Yixuan Wang, Licheng Ying, Gegen Xiao, Jiahui Yan, Xiaoxu Li, Shuangting He, and Aosong Lin
    APPENDIX: IMPORTANT NETWORK INCIDENTS FROM 2014 TO 2015 Yixuan Wang, Licheng Ying, Gegen Xiao, Jiahui Yan, Xiaoxu Li, Shuangting He, and Aosong Lin TMALL “DOUBLE ELEVEN” SALES NEARLY 100 BILLION Since 2009, Ali Baba Group’s Tmall (then called Taobao Mall) has started to build the “Double Eleven” shopping festival. By 2015, the “Double Eleven” has spread from Tmall to the whole e-commerce platform, from domestic to global, and has become a shopping carnival for the online shopping force from e-commerce marketing day. On November 11, 2015, snapping up took place in the first minute and 12 seconds, and the turn- over reached 1 billion yuan. In the first 12 minutes and 28 seconds, the trading volume reached 10 billion yuan. As of 00:00 on the 12th, the transaction amount reached 91.217 billion yuan. In 2015, the “Double Eleven” event not only renewed the global 24-hour retail record of single e-commerce in terms of sales but also presented some new changes and features. First, wireless transactions have jumped to become the main bat- tleground for e-commerce consumption with 68% of orders. Tmall adds a lot of shopping experience to the mobile phone, whether it is from shop- ping settings, shaking or giving red envelopes. Mobile phones are becoming more and more people’s consumption tools, and the entire shopping experience has been fully integrated from the traditional PC to the mobile at an extremely fast speed. Secondly, cross-border business is Y. Wang • L. Ying • G. Xiao • J. Yan • X. Li • S. He • A.
    [Show full text]
  • Précis of the Grammar of Chinese Characters*
    Précis of The Grammar of Chinese Characters* James Myers National Chung Cheng University http://personal.ccu.edu.tw/~lngmyers/ 2019/7/11 0. Introduction The title of Myers (2019) is meant literally: Chinese characters really do seem to have a mentally active and productive grammar, with striking similarities to the morphology and phonology of signed and spoken languages. This paper simply sketches out the key points made in the book, one section per chapter. Section 1 outlines previous analyses of Chinese characters, which already reveal grammar-like properties. Section 2 argues that characters have morphological operations akin to affixation, compounding, and reduplication. Section 3 argues that characters also have phonology (of a silent sort, as in sign languages), which describes abstract formal regularities in strokes and overall character shape. Section 4 provides corpus-based evidence for the productivity of many of the above regularities, and Section 5 provides experimental evidence. Section 6 first considers possible explanations for character grammar and then sketches out how the idea might be useful beyond theoretical linguistics. 1. Chinese character grammar: The very idea In this section I review the nature of Chinese characters and the nature of grammar, then link them together. Chinese characters (漢字 hànzì) are written symbols that almost always represent a single spoken morpheme (hence a single syllable) in Sinitic languages, including Mandarin. They have also been adapted and modified for non-Sinitic languages like Japanese (where 漢字 is pronounced kanji), Korean, and Vietnamese (see Handel, 2019). Most of my discussion will focus on so-called TRADITIONAL CHARACTERS, by far the longest-lived Chinese orthographic system, but now restricted mainly to Hong Kong, Macau, and Taiwan.
    [Show full text]
  • PAN Localization Survey of Language Computing in Asia 2005
    Survey of Language Computing in Asia 2005 Sarmad Hussain Nadir Durrani Sana Gul Center for Research in Urdu Language Processing National University of Computer and Emerging Sciences www.nu.edu.pk www.idrc.ca Published by Center for Research in Urdu Language Processing National University of Computer and Emerging Sciences Lahore, Pakistan Copyrights © International Development Research Center, Canada Printed by Walayatsons, Pakistan ISBN: 969-8961-00-3 This work was carried out with the aid of a grant from the International Development Research Centre (IDRC), Ottawa, Canada, administered through the Centre for Research in Urdu Language Processing (CRULP), National University of Computer and Emerging Sciences (NUCES), Pakistan. ii To the languages which will be lost before they are saved iii iv Preface This report is an effort to document the state of localization in Asia. There are a lot of different initiatives undertaken to localize technology across Asia. However, no study surveys the extent of work completed. It is necessary to document the status to formulate effective and coordinated strategies for further development. Therefore, current work was undertaken to collect the available data to baseline local language computing in Asia. This work has been done through PAN Localization project. There are about 2200 languages spoken in Asia. It is difficult to undertake the task of documenting the status of all these languages. Twenty languages are being surveyed to assess the level of language computing across Asia. The selected languages have official status in Asian countries of Middle East, South, South East and East Asia. The selection has been done to cover a variety of scripts and languages of Asia, but is eventually arbitrary.
    [Show full text]
  • China Story Yearbook 2016: Control Are Members Of, Or Associated with CIW
    CONTROL 治 EDITED BY Jane Golley, Linda Jaivin, AND Luigi Tomba C HINA S TORY YEARBOOK 2 0 16 © The Australian National Univeristy (as represented by the Australian Centre on China in the World) First published May 2017 by ANU Press The Australian National University Acton ACT 2601, Australia Email: [email protected] This title is also available online at press.anu.edu.au National Library of Australia Cataloguing-in-Publication entry Title: Control / Jane Golley, Linda Jaivin, and Luigi Tomba, editors. ISBN: 9781760461195 (paperback); 9781760461201 (ebook) Series: China story yearbook; 2016. Subjects: Zhongguo gong chan dang--Discipline | China--Environment policy--21st century | China--Social conditions--21st century | China--Economic conditions--21st century | China--Politics and government--21st century. Other Creators/Contributors: Golley, Jane, editor. | Jaivin, Linda, editor. Tomba, Luigi, editor. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying or otherwise, without the prior permission of the publisher. This publication is made available as an Open Educational Resource through licensing under a Creative Commons Attribution Non-Commercial Share Alike 3.0 Australia Licence: https://creativecommons.org/licenses/by-nc-sa/3.0/au/ Note on Visual Material All images in this publication have been fully accredited. As this is a non-commercial publication, certain images have been used under a Creative Commons
    [Show full text]
  • APPENDIX: the 36 Oaths of China's Triad Societies
    APPENDIX: The 36 Oaths of China's Triad Societies 1. Mter having entered the Hong Gates I must treat the parents and relatives of my sworn brothers as mine own kin. I shall suffer death by five thunderbolts if I do not keep this oath. 2. I shall assist my sworn brothers to bury their parents and brothers by offering financial or physical assistance. I shall be killed by five thunderbolts if I pretend to have no knowledge of their troubles. 3. When Hong brothers visit my house I shall provide them with board and lodging. I shall be killed by a myriad of swords if I treat them as strangers. 4. I will always acknowledge my Hong brothers when they identify themselves. If I ignore them I shall be killed by a myriad of swords. 5. I shall not disclose the secrets of the Hong family, not even to my parents, brothers or wife. I shall never disclose the secrets for money. I shall be killed by a myriad of swords if I do so. 6. I shall never betray my sworn brothers. If, through a misunder­ standing, I have caused the arrest of one of my brothers, I must release him immediately. If I break this oath I will be killed by five thunderbolts. 7. I will offer assistance to my sworn brothers who are in trouble, in order that they may pay their passage fee. If I break this oath, may I be killed by five thunderbolts. 8. I must not cause harm or bring trouble to my sworn brothers or Incense Master.
    [Show full text]
  • Nie Memes 18-06-2018
    Tilburg University Memes, Communities, and Continuous Change Nie, Hua Publication date: 2018 Document Version Publisher's PDF, also known as Version of record Link to publication in Tilburg University Research Portal Citation for published version (APA): Nie, H. (2018). Memes, Communities, and Continuous Change: Chinese Internet Vernacular Explained. Ridderprint BV. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 28. sep. 2021 Memes, Communities, and Continuous Change Chinese Internet Vernacular Explained Memes, Communities, and Continuous Change Chinese Internet Vernacular Explained PROEFSCHRIFT ter verkrijging van de graad van doctor aan Tilburg University op gezag van de rector magnificus, prof. dr. E.H.L. Aarts, in het openbaar te verdedigen ten overstaan van een door het college voor promoties aangewezen commissie in de Ruth First Zaal van de Universiteit op maandag 18 juni 2018 om 14.00 uur door Hua Nie geboren te Chongqing, China Promotores: Prof.
    [Show full text]
  • Ye Xian and Her Sisters. the Role of a Tang Story in the Cinderella
    ADVERTIMENT. Lʼaccés als continguts dʼaquesta tesi queda condicionat a lʼacceptació de les condicions dʼús establertes per la següent llicència Creative Commons: http://cat.creativecommons.org/?page_id=184 ADVERTENCIA. El acceso a los contenidos de esta tesis queda condicionado a la aceptación de las condiciones de uso establecidas por la siguiente licencia Creative Commons: http://es.creativecommons.org/blog/licencias/ WARNING. The access to the contents of this doctoral thesis it is limited to the acceptance of the use conditions set by the following Creative Commons license: https://creativecommons.org/licenses/?lang=en Corso di Dottorato di ricerca in Studi sull’Asia e sull’Africa ciclo 30 Tesi di Ricerca in cotutela con Universitat Autónoma de Barcelona Ye Xian and her sisters The role of a Tang story in the Cinderella Cycle SSD: L-OR/21 Coordinatore del Dottorato Ca’ Foscari ch. prof. Patrick Heinrich Coordinatore del Dottorato UAB ch. prof. Amelia Sáiz López Supervisore ch. prof. Marco Ceresa Supervisore cotutela ch. prof. Antonio Paoliello Dottoranda Mila Moioli Matricola 773354 Ye Xian and her sisters The role of a Tang story in the Cinderella Cycle Mila Moioli Doctoral thesis UAB director: Antonio Paoliello Ca’ Foscari director: Marco Ceresa Tutor: Jordi Más Coordinator Uab: Amelia Sáiz López Coordinator Ca’ Foscari: Patrick Heinrich Departament de Traducció, d'Interpretació i d'Estudis de l'Àsia Oriental, 2017/2018 To my boyfriend and my mum, who are always there. To my friends and family, who have always been there. To my tutors who were always there. To my dad, who is no longer there. iv Abstract and key words Ye Xian is the protagonist of a story written in the Tang dynasty (618-907 CE) which has been defined as “the Chinese Cinderella” and “the first written Cinderella”.
    [Show full text]
  • The English Translation of Chinese Internet Catchwords from Memetic Pespective
    ISSN 1927-0232 [Print] Higher Education of Social Science ISSN 1927-0240 [Online] Vol. 11, No. 4, 2016, pp. 44-49 www.cscanada.net DOI:10.3968/9135 www.cscanada.org The English Translation of Chinese Internet Catchwords From Memetic Pespective HUI Min[a],*; SUN Guifang [b]; ZHANG Lei[c] [a]Professor, School of Foreign Languages, Shandong Normal University, people’s daily communication, reflecting the unique Jinan, China. Chinese phenomenon. As a part of Internet language, [b]Lecturer, English Department, Shandong Vocational College of Electronic Technology, Jinan, China. Internet catchwords refer to a special kind of unique, vivid [c] BA Candidate, School of Foreign Languages, Shandong Normal and novel language with their creators as netizens, which University, Jinan, China. are usually inspired by hot social events and quickly *Corresponding author. spread from the Internet to people’s daily conversation. Supported by Projects of Chinese Ministry of Education (14YJA740013, As a language variety, Chinese Internet catchwords are 15YJA752018); Project of National University Students’ endowed with its own characteristics, which pose great Innovation and Entrepreneurship (201610445273). difficulties for the better understanding of foreigners. The English translation of Chinese Internet catchwords Received 16 August 2016; accepted 5 October 2016 Published online 26 October 2016 is both important and beneficial in this fast-developing information society, especially for intercultural communicators. Abstract Internet catchword is a kind of newly created language with its peculiar characteristics. Language and meme are 1. MEMETICS interdependent. Language is a kind of meme and meme is Memetics is a newly developed theory of evolution, which embodied in language. Both Chinese memes and English is primarily used to interpret cultural heredity.
    [Show full text]