580 research outputs found

    Measuring Lexical Richness through Type-Token Curve: a Corpus-Based Analysis of Arabic and English Texts

    Get PDF
    WordSmith Tools (5.0) is used to analyze samples from texts of different genres written by eight different authors. These texts are grouped into two corpora: Arabic and English. The Arabic corpus includes textual samples from the Qur'an, Al-Sahifa al-Sajjadiyya ( a prayer manual), Modern Standard Arabic (Mistaghanmy's novel Chaos of Sensations) and Imam Ali's Nahjul-Balagah (Peak of Eloquence). The English Corpus comprises The New Testament, Conrad's Heart of Darkness, Dickens' David Copperfield, and Eliot's Adam Bede. Each textual sample is statistically analyzed to find about its lexical richness or vocabulary size. The number of tokens (total number of words) and the number of types (distinct vocabulary words) are counted for each sample. Then both numbers are plotted against each other using Microsoft Office Excel diagrams. The resulted curves in both corpora give a vivid idea about the lexical richness of each textual sample. They open an active avenue to compare between the different authors in terms of their vocabulary size and the range at which they begin to exhaust their linguistic repertoire by repetition. The curves for Imam Ali's Nahjul-Balagah (Arabic corpus) and Conrad's Heart of Darkness (English corpus) rise up high reaching the maximum. By contrast, Qur'anic Verses and The New Testament have the lowest curve for the ritualistic quality of their texts. Keywords: corpus stylistics, type-token curve, lexical richnes

    The Themes of 'Proactivity' and 'Reactivity' in Achebe's 'Marriage is a Private Affair'

    Get PDF
    The present study sets out to investigate the themes of 'proactivity' and 'reactivity' in Chinua Achebe's 'Marriage is a Private Affair'. First, definitions for these concepts are established, and then the main characters' responses which run in their speeches and actions are pored over considering these definitions. Throughout the present study, 'proactivity' and 'reactivity' are construed as conscious cognitive choices rather than personality traits and acting proactively or reactively (assertively or submissively) is beheld as contextually bound and as determined by what floats on the surface rather than by what hides in the unconscious. Drawing upon the critiques of the concepts of 'proactivity' and 'reactivity', and having in mind that 'proactivity' and 'reactivity', as their lexical meanings may suggest, are two ends for the same dimension of doing something, one could safely claim that despite all Nene's(a character) proactive efforts to cultivate friendship with her in-laws, only after going some way towards the traditional position and reacting positively to the socially- imposed patterns considered to be crucial determinants of her acceptance in the extended family network she is admitted in the cosmopolitan Ibo community. Finding her feet there, she partakes in the construction of a new more open and accommodating Ibo identity. Two other important themes that seem to emerge strongly in the present study are that marriage is a tribal matter that should be framed within allegiance and respect for family traditions and religious affiliation, and that family can tackle any problem if its members stand as one strong front against any external antagonistic power

    Authorship Verification in Arabic using Function Words: A Controversial Case Study of Imam Ali's Book Peak of Eloquence

    Get PDF
    This paper addresses the viability of two multivariate methods (Principal Components Analysis and Cluster Analysis) in verifying the disputed authorship of a famous Arabic religious book called (Nahjul-Balagha/ Peak of Eloquence). This book occupies an exceptional position in the history of the huge debates held between the two basic Islamic sectors: Sunni'e and Shia. Therefore, it represents a serious challenge to the viability of the multivariate techniques in resolving certain types of historical and sectarian conflicts and controversies. Furthermore, verifying the authorship of this book could be a good opportunity to find out whether there are certain quantitative techniques of attribution that hold for different languages such as English and Arabic. Function words have been targeted in this paper as possible indicators of the author's identity. Accordingly, a set of Arabic function words would be tested using WordSmith Tools (version 5). It turned out that the multivariate techniques are most likely robust for addressing the type of issues raised about Nahjul-Balagha. Besides, it appeared that the statistical patterns of function word usages are quite sensitive to genre in Arabic. Keywords: authorship attribution, authorship verification, stylometrics, computational stylistics

    An Experiment in Plagiarism Detection in Academic Research Articles Using Attributional Techniques

    Get PDF
    There are certain overlapping aspects that brings plagiarism detection and authorship attribution together in one basket. Suspected cases of plagiarism can be interpreted as special cases of disputed or misattributed  authorship. Being so, the same techniques used to resolve doubtful cases of attribution can be used to investigate any potential existence of plagiarism. Principal components analysis and cluster analysis (henceforth PCA and CA) are among the popular statistical techniques used to proceed with various  attributional scenarios. These two techniques are used throughout this paper to explore the patterns of function words displayed in seventeen samples of one specific genre (academic research articles). A survey is conducted over various cases of academic attribution: academic writing in English as a First Language and as a Second Language, and even cases of research articles with mixed authorship. Function words have been targeted in this paper as possible indicators of the author's identity. Accordingly a set of English function words is tested using WordSmith Tools (version 5.0). It turned out that the multivariate techniques (represented by PCA and CA) are most likely robust for addressing the type of issues raised about plagiarism and authorship attribution. Besides, it appeared that the statistical patterns of function words usage are rather relevant markers to deal with various scenarios of potential cases of plagiarism. This could explain the three different clusters plotted in the data environment for Halliday's samples, the Phillippine's samples together with his collaboratively authored ones, and the Iraqi's suspected samples that represented a highly potential case of plagiarism. Keywords: Authorship Attribution, Plagiarism Detection, Authorship Verificatio

    Variations In Tooth Size, Dental Arch Dimensions And Shape Among Malay School Children.

    Get PDF
    Nisbah saiz gigi merupakan satu cara diagnostik yang sah untuk membuat andaian tentang hasil rawatan dan ia juga dapat mengurangkan keperluan untuk membuat diagnostik untuk kes-kes yang rumit. Tooth size ratio represents an important diagnostic tool for prediction of treatment outcomes and may also limit the necessity for diagnostic setups in complex cases

    THE RELATIONSHIP BETWEEN PROLACTIN LEVEL AND THE DURATION OF LACTATIONAL AMENORRHOEA IN LACTATING SUDANESE WOMEN

    Get PDF
    Background: This study aimed to assess the relationship between the prolactin (PRL) level and the duration of lactational amenorrhoea in lactating Sudanese women. Methods: Sudanese women (135) from Omdurman area with different ages (18-41 years) and stages of lactation were included, 61 of them participated by giving venous blood samples and filling a questionnaire, while the others by filling the questionnaire only. Pregnant women, contraceptives users, and hypothyroid patients were excluded. The subjects were divided into lactational amenorrhoeic (Group I), and lactating menstruating subjects (Group II). Then each group was subdivided according to the duration of lactation into: - Lactating for six months or less. Lactating for more than six months. Prolactin level was measured using radioimmunoassay (RIA). Results: In this study the mean prolactin level in-group I (2934.99 mU/L) was significantly higher compared with group II (707.46 mU/L) (P<0.05). For the duration of lactation, PRL level in the first six months was higher (4414 mU/L), (1506.60 mU/L) in group I, and group II respectively, while this level decreased after six months (1538 mU/L), (517.19 mU/L) for the two groups. Also we found that factors like breast-feeding patterns, utilization of supplementary foods, and the number of parities had a significant effect on the duration of lactational amenorrhoea. Conclusions: There was a positive relationship between PRL level and the duration of lactational amenorrhoea (r=0.39)

    New Algorithm for Generating Complex Password to Be Applied in Several Applications

    Get PDF
    The proposed paper present new algorithm for generate complex key or complex password that can be used in the information security, which is the most important filed in computer science today. This algorithm contains many stages; these stages promote formation of an efficient password that requests in many applications such as website, social networks and applications under any operating system. Always this applications needs to change the classic and traditional methods that are supposed responsible of provides maximum security for applications users. The system will produce password has nothing any relation  with the initial password and the second important feature is any little change in initial password even if the change was substitutions places lead to different result, thus the proposed system achieves confusion and diffusion. Keywords: complex password, key generation, information securit

    Image encryption algorithm based on the density and 6D logistic map

    Get PDF
    One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are generated depending on the chaotic logistic with the image density to encrypt the gray and color images, and the second stage is the decryption, which is the opposite of the encryption process to obtain the original image. The proposed method has been tested on two standard gray and color images publicly available. The test results indicate to the highest value of peak signal-to-noise ratio (PSNR), unified average changing intensity (UACI), number of pixel change rate (NPCR) are 7.7268, 50.2011 and 100, respectively. While the encryption and decryption speed up to 0.6319 and 0.5305 second respectively
    corecore