Residual Likelihood Forests 1

Total Page:16

File Type:pdf, Size:1020Kb

Residual Likelihood Forests 1 YAN ZUO, TOM DRUMMOND: RESIDUAL LIKELIHOOD FORESTS 1 Residual Likelihood Forests Yan Zuo ARC Centre of Excellence for Robotic [email protected] Vision, Monash University, Australia Tom Drummond [email protected] Abstract This paper presents a novel ensemble learning approach called Residual Likelihood Forests (RLF). Our weak learners produce conditional likelihoods that are sequentially optimized using global loss in the context of previous learners within a boosting-like framework (rather than probability distributions that are measured from observed data) and are combined multiplicatively (rather than additively). This increases the efficiency of our strong classifier, allowing for the design of classifiers which are more compact in terms of model capacity. We apply our method to several machine learning classification tasks, showing significant improvements in performance. When compared against sev- eral ensemble approaches including Random Forests and Gradient Boosted Trees, RLFs offer a significant improvement in performance whilst concurrently reducing the required model size. 1 Introduction Ensemble and Boosting methods such as Random Forests [3] and AdaBoost [19] are often recognized as some of the best out-of-the-box classifiers, consistently achieving state-of- the-art performance across a wide range of computer vision tasks including applications in image classification [1], semantic segmentation [22], object recognition [12] and data clus- teringarXiv:2011.02086v1 [stat.ML] 4 Nov 2020 [16]. The success of these methods is attributed to their ability to learn models (strong learners) which possess low bias and variance through the combination of weakly correlated learners (weak learners). Forests reduce variance through averaging its weak learners over the ensemble. Boosting, on the other hand, looks towards reducing both bias and variance through sequentially optimizing under conditional constraints. The commonality between both approaches is in the way each learner is constructed: both methods use a top-down induction algorithm (such as CART [4]) which greedily learns decision nodes in a recursive manner. This approach is known to be suboptimal in terms of objective maximization as there are no guarantees that a global loss is being minimized [14]. In practice, this type of optimization requires the non-linearity offered by several (very) deep trees, which results in redundancy in learned models with large overlaps of information between weak learners. To address these limitations, the ensemble approaches of [11, 20] have utilized gradient information within a boosting framework. This allows weak learners to be fit via pseudo- residuals or to a set of adaptive weights and allows for the minimization of a global loss via gradient descent. Whilst these methods have demonstrated improved performance over their © 2020. The copyright of this document resides with its authors. It may be distributed unchanged freely in print or electronic forms. 2 YAN ZUO, TOM DRUMMOND: RESIDUAL LIKELIHOOD FORESTS Random Forest counterpart, they are more susceptible to overfitting, making them harder to tune. An alternative approach proposed by [17] tried to retain Random Forests as a baseline classifier, employing a global refinement technique combined with leaf pruning to gain im- provements in performance and reduce model size. However, this method still required the relatively large overhead of constructing the original Random Forest before refinement can be performed (with an additional overhead associated with global refinement and pruning). In this work, we propose a method which constructs a decision forest that benefits from the boosting approach of creating complementary weak learners through minimizing a global loss, yet retains the simplicity in model tuning of Random Forests. Our approach monoton- ically decreases the loss function of the ensemble using a novel, top-down induction al- gorithm, which unlike CART, accounts for the mutual information between weak learners already in the ensemble. Empirically, we extensively evaluate our approach across multiple datasets against several ensemble and boosting baselines. Our results show that our method improves classification performance at a higher parameter efficiency. The main contributions of this paper are as follows: • We propose a novel ensemble learning framework that includes a novel induction algo- rithm which accounts for the mutual information between weak learners it constructs. • Theoretically, we show that our method allows optimization to occur in closed-form (in contrast to existing gradient boosting methods), which simplifies model tuning. • Empirically, we show that our method offers dramatic reductions in required model size. Further, we show that our approach outperforms several competing boosting and ensemble baselines across 5 standard machine learning datasets. 2 Related Work 2.1 Random Forests RFs became popular in the literature due to their flexibility and robustness when dealing with data-driven learning problems [6]. RFs were first developed by [15] to overcome the variance and stability issues found in binary decision trees by randomly choosing the subspace of features for tree training. This method was refined by [3], where the bootstrap aggregating technique of [2] was combined with the random feature selection of RFs. [13] developed Extremely Randomized Trees, where both the attribute and cut-point of the input feature were randomized. [22] applied RFs to the semantic segmentation problem, using them as a global image classifier to quickly and efficiently provide priors to be pipelined into the system developed in [21]. 2.2 Boosting The work of [18] first introduced the concept of boosting using an algorithm that selectively combined several weak hypotheses into a single strong hypothesis. [8] extended this algo- rithm to combine the outputs of all weak hypotheses. These methods however, did not take advantage of the adaptability of weak learners. This was addressed by [9] with Adaptive Boosting, where each subsequent weak learner introduced to the strong learner is biased to favor misclassified training samples using high-weight data points. [5] extended on this YAN ZUO, TOM DRUMMOND: RESIDUAL LIKELIHOOD FORESTS 3 concept of adaptable boosting by offering an alternative to using weights, formulating the method as a gradient descent problem with a specialized loss function. 3 Preliminaries Conventional decision trees consist of internal decision nodes and terminal leaf nodes. The internal nodes of each decision tree are a set of Nd decision nodes, D = fd0;··· ;dNd −1g, each of which holds a decision function di(x;qi), where qi are the parameters for decision node i in the tree. For binary decision trees, the decision function for each decision node i is defined as di(x;qi) : X! [0;1], which routes a sample to a left or right subtree. Collectively, the decision nodes route data, x, through the tree until a terminal leaf node is reached: ` = d(x;Q). Here, d signifies the routing function which directs data x to the terminal leaf node `, given the tree’s decision node parameters Q. For classification, the leaf nodes Q in a decision tree contain class label probability distri- butions, q = Q(`). These distributions are formed from the training data and accompanying ground truth class labels. For a terminal leaf node `, the stored probability value for class j is given as: N ∑n cn; j q j = Q(`) j = (1) N` where N` is the total number of samples routed into leaf node ` and cn; j is the observed class label for sample n in class j: ( 1; if sample n has class label j cn; j = (2) 0; otherwise Typically, the decision nodes of the tree are chosen such that resulting distributions gener- ated give the best split according to some purity measure (i.e. entropy or the Gini index [3]). A conventional decision forest is an ensemble of Nt number of decision trees. It delivers a final prediction for the input x by routing x through each decision tree in the ensemble to a leaf node and taking the average prediction delivered by each tree: Nt 1 t t t Pj = ∑Q (d (x;Q )) j (3) Nt t where Qt , d t and Qt are the respective distributions, routing functions and parameters of tree t in the ensemble. 4 Residual Likelihood Forests First, we motivate our proposed approach using the following simple classification exam- ple involving two weak learners evaluating some input data. To keep our notation concise, 1 2 we denote p j and p j to represent the probabilities assigned by each weak learner for the underlying class label j given the input. Given that the prior is uniform over classes, the correct approach to combining these two weak learners depends on the correlation between the assigned probabilities from each weak learner. 4 YAN ZUO, TOM DRUMMOND: RESIDUAL LIKELIHOOD FORESTS 1 2 If p j and p j are independent of one another, the correct class probability should be given by the normalized product for the class j: 1 2 p j p j Pj = (4) Nc 1 2 ∑k pk pk where Nc is the number of classes. However, when the two weak learners are fully correlated, 1 2 the assigned probabilities from each weak learner would be the same and p j = p j. In this instance, applying Eq.4 would result in an incorrect estimate of the class probabilities as the normalized squared distribution and we should instead simply average their marginal distributions. 4.1 Weak Learners Generating Likelihoods In practice, probability distributions 1p and 2p will rarely be fully independent or fully cor- related. As such, deciding the amount each weak learner should contribute to the strong classifier’s prediction is a non-trivial task. Typically, ensemble methods combine their weak learners by averaging their marginal distributions [2,8, 18], relying on the law of large num- bers to get a good estimate of the underlying distribution of the data and smooth out variance between learners. The correlation between learners can be problematic if we wish to have a consistent approach for correctly combining weak learners within an ensemble since the approach that should be adopted depends on this correlation.
Recommended publications
  • Narrative Inquiry Into Chinese International Doctoral Students
    Volume 16, 2021 NARRATIVE INQUIRY INTO CHINESE INTERNATIONAL DOCTORAL STUDENTS’ JOURNEY: A STRENGTH-BASED PERSPECTIVE Shihua Brazill Montana State University, Bozeman, [email protected] MT, USA ABSTRACT Aim/Purpose This narrative inquiry study uses a strength-based approach to study the cross- cultural socialization journey of Chinese international doctoral students at a U.S. Land Grant university. Historically, we thought of socialization as an institu- tional or group-defined process, but “journey” taps into a rich narrative tradi- tion about individuals, how they relate to others, and the identities that they carry and develop. Background To date, research has employed a deficit perspective to study how Chinese stu- dents must adapt to their new environment. Instead, my original contribution is using narrative inquiry study to explore cross-cultural socialization and mentor- ing practices that are consonant with the cultural capital that Chinese interna- tional doctoral students bring with them. Methodology This qualitative research uses narrative inquiry to capture and understand the experiences of three Chinese international doctoral students at a Land Grant in- stitute in the U.S. Contribution This study will be especially important for administrators and faculty striving to create more diverse, supportive, and inclusive academic environments to en- hance Chinese international doctoral students’ experiences in the U.S. Moreo- ver, this study fills a gap in existing research by using a strength-based lens to provide valuable practical insights for researchers, practitioners, and policymak- ers to support the unique cross-cultural socialization of Chinese international doctoral students. Findings Using multiple conversational interviews, artifacts, and vignettes, the study sought to understand the doctoral experience of Chinese international students’ experience at an American Land Grant University.
    [Show full text]
  • Is Shuma the Chinese Analog of Soma/Haoma? a Study of Early Contacts Between Indo-Iranians and Chinese
    SINO-PLATONIC PAPERS Number 216 October, 2011 Is Shuma the Chinese Analog of Soma/Haoma? A Study of Early Contacts between Indo-Iranians and Chinese by ZHANG He Victor H. Mair, Editor Sino-Platonic Papers Department of East Asian Languages and Civilizations University of Pennsylvania Philadelphia, PA 19104-6305 USA [email protected] www.sino-platonic.org SINO-PLATONIC PAPERS FOUNDED 1986 Editor-in-Chief VICTOR H. MAIR Associate Editors PAULA ROBERTS MARK SWOFFORD ISSN 2157-9679 (print) 2157-9687 (online) SINO-PLATONIC PAPERS is an occasional series dedicated to making available to specialists and the interested public the results of research that, because of its unconventional or controversial nature, might otherwise go unpublished. The editor-in-chief actively encourages younger, not yet well established, scholars and independent authors to submit manuscripts for consideration. Contributions in any of the major scholarly languages of the world, including romanized modern standard Mandarin (MSM) and Japanese, are acceptable. In special circumstances, papers written in one of the Sinitic topolects (fangyan) may be considered for publication. Although the chief focus of Sino-Platonic Papers is on the intercultural relations of China with other peoples, challenging and creative studies on a wide variety of philological subjects will be entertained. This series is not the place for safe, sober, and stodgy presentations. Sino- Platonic Papers prefers lively work that, while taking reasonable risks to advance the field, capitalizes on brilliant new insights into the development of civilization. Submissions are regularly sent out to be refereed, and extensive editorial suggestions for revision may be offered. Sino-Platonic Papers emphasizes substance over form.
    [Show full text]
  • Clans at Bukit Pasoh the Clan Associations of Bukit Pasoh Were, and Still Are, Integral to Their Respective Communities
    Chinatown Stories | Updated as of August 2019 Clans At Bukit Pasoh The clan associations of Bukit Pasoh were, and still are, integral to their respective communities. In 19th and early 20th century Singapore, social services were sorely lacking. This was where the clan associations played a vital role: providing a community and invaluable support for fellow immigrants of common ancestry, surname or language, or those who were from the same hometown. Beyond social functions, some of these clans founded schools, provided scholarships, and supported local arts and culture. They also assisted members with important life events such as weddings and funerals. These clan associations used to be concentrated along certain streets in Chinatown, such as Bukit Pasoh Road. Even though their numbers are fast dwindling today due to diminishing membership and high operating costs, the few that remain at Bukit Pasoh such as Gan Clan, Tung On Wui Kun, Koh Clan and Chin Kang Huay Kuan have adapted to the times. They continue to pool resources to promote Chinese culture, guard their heritage and benefit the community. Gan Clan This kinship clan’s early years were fraught with obstacles. Dating from 1926, it was established for immigrants with the surname Gan (颜, Yan in Mandarin) and was known as the Lu Guo Tang (鲁国堂) Gan Clan Association. During the Japanese Occupation, it ceased operations, but re-registered itself as an association after 1948. However, it dissolved again as a result of weak organisational structure. Undeterred, founding chairman Gan Yue Cheng (颜有政) suggested reviving the clan during a banquet in 1965.
    [Show full text]
  • Verbal Projection of Comparable Translations of a Detective Story
    Contrastive PragmaticS 2 (2021) 106–132 brill.com/jocp Verbal Projection of Comparable Translations of a Detective Story Yan Wang Lecturer, Department of Translation, Faculty of Arts, The Chinese University of Hong Kong, Hong Kong, China [email protected] Abstract Based on the systemic functional framework, this paper attempts to compare verbal projection in two comparable translated texts of a detective story entitled A Scandal in Bohemia, one from the early 20th century (henceforth TT1) and the other from the early 21st century (henceforth TT2). Approximately one hundred years apart, these two translations are strikingly different in their language use, with classical Chinese being used in TT1 and plain (colloquial) Chinese being used in TT2. By analysing and comparing the lexicogrammatical features of the verbal clauses in the two translated texts, this paper summarises the choices made by the translators in these two differ- ent historical moments: when translating the source text, TT1 translators show more flexibility by incorporating more addition and omission into their translation than TT2 translators. Keywords comparable translations – verbal projection – translators’ choices 1 Introduction to Verbal Projection As detailed by Halliday and Matthiessen (2004; 2014) and Halliday and McDonald (2004), there are six process types in English and four in Chinese. However, not all these process types will be dealt with in this paper, only ver- bal types will be studied. As the study is centred around a detective story, which is narrated by using a large number of dramatised dialogues, it is worth © YAN WANG, 2020 | doi:10.1163/26660393-bja10016 This is an open access article distributed under the terms of the CC BY 4.0Downloaded license.
    [Show full text]
  • Molecular Cancer Therapeutics | Small Molecule Therapeutics
    Published OnlineFirst November 19, 2019; DOI: 10.1158/1535-7163.MCT-19-0183 MOLECULAR CANCER THERAPEUTICS | SMALL MOLECULE THERAPEUTICS ERK Inhibitor LY3214996 Targets ERK Pathway–Driven Cancers: A Therapeutic Approach Toward Precision Medicine A C Shripad V. Bhagwat, William T. McMillen, Shufen Cai, Baohui Zhao, Matthew Whitesell, Weihua Shen, Lisa Kindler, Robert S. Flack, Wenjuan Wu, Bryan Anderson, Yan Zhai, Xiu-Juan Yuan, Meghann Pogue, Robert D. Van Horn, Xi Rao, Denis McCann, Andrew J. Dropsey, Jason Manro, Jennie Walgren, Eunice Yuen, Michael J. Rodriguez, Gregory D. Plowman, Ramon V. Tiu, Sajan Joseph, and Sheng-Bin Peng ABSTRACT ◥ The ERK pathway is critical in oncogenesis; aberrations in inhibited the pharmacodynamic biomarker, phospho-p90RSK1, components of this pathway are common in approximately 30% in cells and tumors, and correlated with LY3214996 exposures of human cancers. ERK1/2 (ERK) regulates cell proliferation, and antitumor activities. In in vitro cell proliferation assays, differentiation, and survival and is the terminal node of the sensitivity to LY3214996 correlated with ERK pathway aberra- pathway. BRAF- and MEK-targeted therapies are effective in tions. LY3214996 showed dose-dependent tumor growth inhi- BRAF V600E/K metastatic melanoma and lung cancers; however, bition and regression in xenograft models harboring ERK path- responses are short-lived due to emergence of resistance. Reac- way alterations. Importantly, more than 50% target inhibition for tivation of ERK signaling is central to the mechanisms of upto8to16hourswassufficient for significant tumor growth acquired resistance. Therefore, ERK inhibition provides an inhibition as single agent in BRAF- and KRAS-mutant models. opportunity to overcome resistance and leads to improved LY3214996 also exhibited synergistic combination benefitwitha efficacy.
    [Show full text]
  • FORMULA INDEX by CHAPTER Formulas Are Listed Alphabetically on P
    FORMULA INDEX BY CHAPTER Formulas are listed alphabetically on p. 629 GROUP 1. EXOGENOUS WIND DISORDERS 1A. EXOGENOUS WIND-COLD (Common Cold – Cold Type) 2 Classical Formulas: Chuan Xiong Cha Tiao San chuān xiōng chá tiáo săn (川芎茶调 ) 4 Ge Gen Tang gé gēn tāng (葛根汤 ) 6 Gui Zhi Tang guì zhī tāng (桂枝汤 ) 8 Jing Fang Bai Du San jīng fáng bài dú săn (荆防败毒散 ) 10 Ren Shen Bai Du San rén shēn bài dú săn (人参败毒散 ) 12 Other: 14 1B. PATHOGENIC WIND-HEAT (Common Cold – Mild Heat Type) 15 Classical Formulas: Chai Ge Jie Ji Tang chái gé jiĕ jī tāng (柴葛解肌汤 ) 16 Sang Ju Yin sāng jú yĭn (桑菊饮 ) 18 Yin Qiao San yín qiào săn (银翘散 ) 20 Other: 21 1C. NASAL AND EAR CONGESTION 22 Classical Formulas: Cang Er Zi San cāng ěr zǐ sǎn (苍耳子散 ) 24 Xin Yi Wan xīn yí wán (辛夷丸 ) 26 Modern Formulas: Bi Min Gan Wan (Pe Min Kan) bí mǐn gǎn wán (鼻敏感丸 ) 28 Bi Yan Pian bí yán piān (鼻炎片 ) 30 Children’s Ear Formula (GF) 31 Other: 32 iv Essential Chinese Formulas Formula Index by Chapter GROUP 2: FORMULAS THAT CLEAR HEAT 2A. HEAT-TOXINS & DAMP-HEAT TOXINS 33 (Viral and Bacterial Infections; Common Cold; Influenza) Classical Formulas: Da Huang Mu Dan Pi Tang dà huáng mŭ dān pí tāng (大黄牡丹皮汤 ) 36 Huang Lian Jie Du Tang huáng lián jiĕ dú tāng (黄连解毒汤 ) 38 Nei Xiao Luo Li Wan nèi xiāo luǒ lì wán (内消瘰沥丸 ) 40 Pu Ji Xiao Du Yin pŭ jì xiāo dú yĭn (普济消毒饮 ) 42 Wu Wei Xiao Du Yin wŭ wèi xiāo dú yĭn (五味消毒饮 ) 44 Xi Gua Shuang (Watermelon Frost) xī guā shuāng (西瓜霜 ) 46 Modern Formulas: Chuan Xin Lian Wan chuān xīn lián wán (穿心莲丸 ) 48 Gan Mao Ling gǎn mào líng (感冒灵 ) 50 Zhong Gan Ling zhòng gǎn líng (重 感灵 ) 52 Other: 54 2B.
    [Show full text]
  • ABSTRACT YAN, ZHUO. S-Parameter
    ABSTRACT YAN, ZHUO. S-Parameter Based Binary Multimode Interconnect Design Methodology and Implementation. (Under the direction of Dr. Paul D. Franzon). As higher density of interconnects and packages are demanded, crosstalk noise is becoming more important in input/output (I/O) design. Multimode signaling (or modal signaling) offers the ability to improve wiring density with almost zero crosstalk. To make best use of crosstalk cancelling by multimode signaling in real world applications, practical channels including packages, sockets, and printed circuit boards (PCBs) need to be considered. However, optimum implementation of a realistic multimode signaling sub- system requires a systematic approach to co-design the circuits and the interconnect channel. This dissertation describes a design methodology for multimode signaling circuit/channel co-design. It is based on a new transceiver design, referred to as “binary multimode interconnect” because the coder/decoder (CODEC) is implemented only in the transmitter to produce conventional binary signals at receiver input with no further decoding needed. It was simulated to operate at an aggregate bandwidth of 16 Gbps and at a power efficiency of 5.6 mW/Gbps in 130 nm CMOS (which would scale with process technology). This was combined with an S-Parameter based CODEC derivation method. A fully tunable multimode signaling transceiver is designed to implement the CODEC. Both the CODEC coefficients and individual channel timing parameters are tunable. The methodology is as follows; first the set of baseline CODEC coefficients and timing parameters are derived from the S- parameters extracted from the baseline channel design. Then the different components in the channel are tuned for high density and impedance characteristics so as to minimize root mean square (RMS) jitter and bit error rate.
    [Show full text]
  • Linguistic Composition and Characteristics of Chinese Given Names DOI: 10.34158/ONOMA.51/2016/8
    Onoma 51 Journal of the International Council of Onomastic Sciences ISSN: 0078-463X; e-ISSN: 1783-1644 Journal homepage: https://onomajournal.org/ Linguistic composition and characteristics of Chinese given names DOI: 10.34158/ONOMA.51/2016/8 Irena Kałużyńska Sinology Department Faculty of Oriental Studies University of Warsaw e-mail: [email protected] To cite this article: Kałużyńska, Irena. 2016. Linguistic composition and characteristics of Chinese given names. Onoma 51, 161–186. DOI: 10.34158/ONOMA.51/2016/8 To link to this article: https://doi.org/10.34158/ONOMA.51/2016/8 © Onoma and the author. Linguistic composition and characteristics of Chinese given names Abstract: The aim of this paper is to discuss various linguistic and cultural aspect of personal naming in China. In Chinese civilization, personal names, especially given names, were considered crucial for a person’s fate and achievements. The more important the position of a person, the more various categories of names the person received. Chinese naming practices do not restrict the inventory of possible given names, i.e. given names are formed individually, mainly as a result of a process of onymisation, and given names are predominantly semantically transparent. Therefore, given names seem to be well suited for a study of stereotyped cultural expectations present in Chinese society. The paper deals with numerous subdivisions within the superordinate category of personal name, as the subclasses of surname and given name. It presents various subcategories of names that have been used throughout Chinese history, their linguistic characteristics, their period of origin, and their cultural or social functions.
    [Show full text]
  • One Optimized I/O Configuration Per HPC Application
    One Optimized I/O Configuration per HPC Application: Leveraging the Configurability of Cloud Mingliang Liu, Jidong Zhai and Yan Zhai Department of Computer Science and Technology, Tsinghua University {liuml07,zhaijidong,zhaiyan920}@gmail.com Xiaosong Ma Department of Computer Science, North Carolina State University Computer Science and Mathematics Department, Oak Ridge National Laboratory [email protected] Wenguang Chen Department of Computer Science and Technology, Tsinghua University [email protected] ABSTRACT released cluster compute instances (CCIs) in July 2010 [3,6], There is a trend to migrate HPC (High Performance Com- to explicitly target HPC applications by offering dedicated puting) applications to cloud platforms, such as the Ama- physical node allocation, powerful CPUs, and improved in- zon EC2 Cluster Compute Instances (CCIs). While existing terconnection. research has mainly focused on the performance impact of Even with such new cloud platforms provided for HPC virtualized environments and interconnect technologies on workloads, the efficiency and cost-effectiveness of cloud com- parallel programs, we suggest that the configurability en- puting for HPC applications are still to be determined [7]. abled by clouds is another important dimension to explore. For example, our recent evaluation indicates that although Unlike on traditional HPC platforms, on a cloud-resident the EC2 CCIs are able to provide significantly better perfor- virtual cluster it is easy to change the I/O configurations, mance compared to earlier instance classes, small message such as the choice of file systems, the number of I/O nodes, dominated applications suffer from the long communication and the types of virtual disks, to fit the I/O requirements of latency on cloud platforms [1].
    [Show full text]
  • Being a Woman in China Today: a Demography of Gender
    Special feature China perspectives Being a Woman in China Today: A Demography of Gender ISABELLE ATTANÉ ABSTRACT: The aim of this article is on the one hand, to draw up a socio-demographic inventory of the situation of Chinese women in the prevailing early twenty-first century context of demographic, economic, and social transition, and on the other hand, to draw attention to the paradoxical effects of these transitions whilst taking into account the diversity of the realities women are experiencing. In conclusion, it raises the possibility of changes in gender relationships in China, where there are, and will continue to be, fewer women than men, particularly in adulthood. KEYWORDS: China, demography, gender, status of women, education, employment, demographic masculinity, discrimination against women. I do not think that men and women are on an equal footing. I live in favourable to them, thereby testifying to an unquestionable deterioration a world dominated by men, and I sense this impalpable pressure in certain aspects of their situation. every day. It’s not that men don’t respect us. My husband cooks for The aim of this article is to draw up a socio-demographic inventory of the me and does a lot around the house, but I still feel male chauvinism situation of Chinese women in the prevailing early twenty-first century con- in the air. In truth, men do not really consider us to be their intellec- text of demographic, economic, and social transition on the one hand, and tual equals. on the other hand, to draw attention to the paradoxical effects of these Cao Chenhong, senior manager in a Beijing company.
    [Show full text]
  • Names of Chinese People in Singapore
    101 Lodz Papers in Pragmatics 7.1 (2011): 101-133 DOI: 10.2478/v10016-011-0005-6 Lee Cher Leng Department of Chinese Studies, National University of Singapore ETHNOGRAPHY OF SINGAPORE CHINESE NAMES: RACE, RELIGION, AND REPRESENTATION Abstract Singapore Chinese is part of the Chinese Diaspora.This research shows how Singapore Chinese names reflect the Chinese naming tradition of surnames and generation names, as well as Straits Chinese influence. The names also reflect the beliefs and religion of Singapore Chinese. More significantly, a change of identity and representation is reflected in the names of earlier settlers and Singapore Chinese today. This paper aims to show the general naming traditions of Chinese in Singapore as well as a change in ideology and trends due to globalization. Keywords Singapore, Chinese, names, identity, beliefs, globalization. 1. Introduction When parents choose a name for a child, the name necessarily reflects their thoughts and aspirations with regards to the child. These thoughts and aspirations are shaped by the historical, social, cultural or spiritual setting of the time and place they are living in whether or not they are aware of them. Thus, the study of names is an important window through which one could view how these parents prefer their children to be perceived by society at large, according to the identities, roles, values, hierarchies or expectations constructed within a social space. Goodenough explains this culturally driven context of names and naming practices: Department of Chinese Studies, National University of Singapore The Shaw Foundation Building, Block AS7, Level 5 5 Arts Link, Singapore 117570 e-mail: [email protected] 102 Lee Cher Leng Ethnography of Singapore Chinese Names: Race, Religion, and Representation Different naming and address customs necessarily select different things about the self for communication and consequent emphasis.
    [Show full text]
  • Formation of the Traditional Chinese State Ritual System of Sacrifice To
    religions Article Formation of the Traditional Chinese State Ritual System of Sacrifice to Mountain and Water Spirits Jinhua Jia 1,2 1 College of Humanities, Yangzhou University, Yangzhou 225009, China; [email protected] 2 Department of Philosophy and Religious Studies, University of Macau, Macau SAR, China Abstract: Sacrifice to mountain and water spirits was already a state ritual in the earliest dynasties of China, which later gradually formed a system of five sacred peaks, five strongholds, four seas, and four waterways, which was mainly constructed by the Confucian ritual culture. A number of modern scholars have studied the five sacred peaks from different perspectives, yielding fruitful results, but major issues are still being debated or need to be plumbed more broadly and deeply, and the whole sacrificial system has not yet drawn sufficient attention. Applying a combined approach of religious, historical, geographical, and political studies, I provide here, with new discoveries and conclusions, the first comprehensive study of the formational process of this sacrificial system and its embodied religious-political conceptions, showing how these geographical landmarks were gradually integrated with religious beliefs and ritual-political institutions to become symbols of territorial, sacred, and political legitimacy that helped to maintain the unification and government of the traditional Chinese imperium for two thousand years. A historical map of the locations of the sacrificial temples for the eighteen mountain and water spirits is appended. Keywords: five sacred peaks; five strongholds; four seas; four waterways; state ritual system of sacrifice; Chinese religion; Chinese historical geography Citation: Jia, Jinhua. 2021. Formation of the Traditional Chinese State Ritual System of Sacrifice to Mountain and Water Spirits.
    [Show full text]