2,301 research outputs found

    Mirroring Effects and the Water Code: A Cognitive-Semantic Approach to Natural Morphology in the Religious-Cultural Context

    Get PDF
    Word formation is an important part of the morphology and vocabulary building. However, the systematic study of the word formation has not been widely enough and there were few studies which looked at the religious words and their formation. In this study, we looked at the word formation of a limited class of words, but significant in their cultural and religious importance. The question of why some religious words across many different languages are apparently similar is responded here. In fact, we proposed the mirroring effect as a systematic way of word formation which particularly affects the words in religious framework. Our framework in the natural morphology and the results are therefore applied cross-linguistically to other languages. This study therefore shed light on the field of morphology and semantics and solves some of the problems regarding the observed similarity of words and word formation processes across languages

    Rajdeep Singh, the Peace Poet: Analysis of Figurative Language Used in ‘La paz que venga con fuerza’ Poem by Rajdeep Singh

    Get PDF
    This paper deals with the ideological and cultural positioning of Iranian poet Rajdeep Singh in his famous poem “La paz que venga con fuerza”. We adopt the emerging branch of linguistics, called cognitive analysis, and we also develop a semantic map in order to uncover the great ocean of metaphors in the poem. He is one of the few Middle-Eastern poets who write primarily in Spanish and English, leading the poetical new wave in Iran. One of the goals of the present study is to expose some of the implied meanings and ideological stances the poet adopted concerning the peace and also the linguistic choices he used to twist meanings and create environment for mystic thoughts. The present analysis disposes of different cognitive tools which, after being applied, show clearly how the poet aesthetically used different macro-structural and micro-structures devices to deliver his sincere call for the inner peace in the modern life. Keywords: poem, cognitive analysis, semantics, ideology, peace, macro-structural meaning, content analysis DOI: 10.7176/JLLL/53-0

    Error Analysis of Persian Learners of Hausa Language: Cognitive Approach to Errors

    Get PDF
    Error analysis is the tool to discover the cognitive processing every learner goes through in order to learn the second language. In our study, we examine the situation for Persian learners of Hausa. The results showed both transfer and inter-lingual errors.  After analyzing the inter-lingual errors, we encountered with a distinct type of error, tense compounding error. Therefore, we could build up further the cognitive processing to see where and how this error occurs. From the teaching perspective, we analyzed the areas where errors occur more frequently and we introduced some teaching strategies to facilitate students learning. Furthermore, we contrasted the phonological system between Persian and Hausa to interpret the phonological errors and to find ways to deal with these errors. Keywords: cognitive processing, teaching, inter-lingual errors, error analysis, phonology, Persian, Hausa, Afro-Asiatic languag

    Solubilization of organic dyes in surfactant micelles

    Get PDF

    Booms, Busts, and Fraud

    Get PDF
    We examine firm managers' incentives to commit fraud in a model where firms seek funding from investors and investors can monitor firms at a cost in order to get more precise information about firm prospects. We show that fraud incentives are highest when business conditions are good, but not too good: in exceptionally good times, even weaker firms can get funded without committing fraud, whereas in bad times investors are more vigilant and it is harder to commit fraud successfully. As investors' monitoring costs decrease, the region in which fraud occurs shifts towards better business conditions. It follows that if business conditions are sufficiently strong, a decrease in monitoring costs actually increases the prevalence of fraud. If investors can only observe current business conditions with noise, then the incidence of fraud will be highest when investors begin with positive expectations that are disappointed ex post. Finally, increased disclosure requirements can exacerbate fraud. Our results shed light on the incidence of fraud across the business cycle and across different sectors.Boom, Credit Cycle, Fraud, Monitoring

    Guru Nanak: Life, Lessons & Relevancy

    Get PDF
    This senior project is centered on understanding the thought of Nanak the founder of Sikhism. It consist of historiography of Nanak, and understanding the core of Nanak\u27s thought as centered around G-d\u27s Immanenc

    The Application of the Religious Freedom Restoration Act to Appearance Regulations that Presumptively Prohibit Observant Sikh Lawyers from Joining the U.S. Army Judge Advocate General Corps

    Get PDF
    Observant Sikh lawyers are presumptively prohibited from joining the U.S. Army Judge Advocate General (JAG) Corps because they cannot satisfy the Army\u27s appearance regulations. This essay argues that this presumptive prohibition violates the Religious Freedom Restoration Act (RFRA). Under RFRA, the federal government may substantially burden an individual\u27s exercise of religion only if it demonstrates that its application of the burden furthers a compelling governmental interest by the least restrictive means.\u27 The Army\u27s appearance regulations are designed to promote two interests-uniformity and safety. In the course of furthering these interests, the Army\u27s appearance regulations effectively preclude observant Sikhs from joining the U.S. Army JAG Corps. The Sikh religion requires its male followers to wear turbans and forbids all of its followers from cutting their hair. Both requirements purportedly interfere with the Army\u27s asserted interests in uniformity and safety. This purported interference forms the basis for a conclusion that observant Sikhs are appropriately excluded from joining the U.S. Army JAG Corps. This essay argues against the necessity of such a conclusion by demonstrating that under RFRA (1) the Army does not have a compelling interest in disallowing exceptions to its appearance regulations, and (2) the Army\u27s appearance regulations do not constitute the least restrictive means of promoting safety. Because the Army\u27s appearance regulations violate RFRA, they must be amended to allow for the accommodation of observant Sikhs in the U.S. Army JAG Corps

    Relay-Linking Models for Prominence and Obsolescence in Evolving Networks

    Full text link
    The rate at which nodes in evolving social networks acquire links (friends, citations) shows complex temporal dynamics. Preferential attachment and link copying models, while enabling elegant analysis, only capture rich-gets-richer effects, not aging and decline. Recent aging models are complex and heavily parameterized; most involve estimating 1-3 parameters per node. These parameters are intrinsic: they explain decline in terms of events in the past of the same node, and do not explain, using the network, where the linking attention might go instead. We argue that traditional characterization of linking dynamics are insufficient to judge the faithfulness of models. We propose a new temporal sketch of an evolving graph, and introduce several new characterizations of a network's temporal dynamics. Then we propose a new family of frugal aging models with no per-node parameters and only two global parameters. Our model is based on a surprising inversion or undoing of triangle completion, where an old node relays a citation to a younger follower in its immediate vicinity. Despite very few parameters, the new family of models shows remarkably better fit with real data. Before concluding, we analyze temporal signatures for various research communities yielding further insights into their comparative dynamics. To facilitate reproducible research, we shall soon make all the codes and the processed dataset available in the public domain
    • 

    corecore