An Interpersonal Meaning Study of two Excerpts from Adichie’s Half of a Yellow Sun: A Systemic Functional Approach

2018 ◽  
Vol 10 (3) ◽  
pp. 36
Author(s):  
Daniel T. Yokossi

Using the Hallidayan Systemic Functional Linguistics (SFL), this article seeks to carry out a theoretically founded analysis of two extracts from Chimamanda Ngozi Adichie’s Half of a Yellow Sun to decode both her world view and ideology behind her writing for a better understanding of the whole novel with a view to making her message accessible to the laymen. The quantitative research method employed by the study has helped to recap the linguistic features of the analyzed excerpts in a statistical table paving the way to their interpretation via the qualitative method. The study has interestingly arrived at impressive results. Among others, it is to be highlighted that Adichie has written Half of a Yellow Sun to get important messages across. To descend to particulars, the analysis has unveiled that unkindness, wickedness, violence, heartlessness and mistrustfulness are some of the evils that the Nigeria-Biafra war has resulted into. As a result, by writing this award winning novel, Adichie aims at giving advice to her contemporaries and, more precisely, to the Nigerian current and future political leaders for the country brighter future. Adichie’s selections of modality in the studied excerpts reveal the possibility of new developments of the bygone civil war. The high rate of circumstantial adjuncts has contributed to improve the texts experiential density, and complements other strategies used by Adichie to make her novel very well written in mode. Indeed, these are just some of the results the present research work has arrived at; more remain to be discovered in the section devoted to the interpretation of findings in this paper. The study has interestingly opened up to such further research horizons as experiential meaning, textual meaning, pragmatic transfer, code switching, code mixing to name but just a few of them.

Author(s):  
Wei Qi Yan ◽  
Xiaotian Wu ◽  
Feng Liu

Despite research work achieving progress in preserving the privacy of user profiles and visual surveillance, correcting problems in social media have not taken a great step. The reason is the lack of effective modelling, computational algorithms, and resultant evaluations in quantitative research. In this article, the authors take social media into consideration and link users together under the umbrella of social networks so as to exploit a way that the potential problems related to media privacy could be solved. The author's contributions are to propose tensor product-based progressive scrambling approaches for privacy preservation of social media and apply our approaches to the given social media which may encapsulate privacy before being viewed so as to achieve the goal of privacy preservation in anonymity, diverse and closeness. These approaches fully preserve the media information of the scrambled image and make sure it is able to be restored. The results show the proposed privacy persevering approaches are effective and have outstanding performance in media privacy preservation.


2020 ◽  
Vol 6 (1) ◽  
pp. 121-139
Author(s):  
Justice Ray Achoanya Ayam

Higher education governance, legal and regulatory regimes in Ghana remain an important factor in the ever-complex higher educational landscape and its attendant funding challenges. The increased global demand for higher education reforms further strengthens the importance of higher education governance, legal and regulatory framework role in assuring sustainable funding of higher education. The purpose of this study is to measure the relationship between the governance and regulatory variables influence on financial sustainability. The research work utilises quantitative research methodology with a well validated research instrument to undertake this correlational study. The study outcome revealed a statistically significant relationship between the combined effects of the variables whiles two out of the eight variables were found be significant in predicting best fit equation for financial sustainability. The research recommendations should afford higher education practitioners the opportunity to undertake relevant reforms of the current governance, legal and regulatory practices in the country.


Author(s):  
Shirin Zubair ◽  
Rija Ahsan

This research paper explores linguistic techniques employed by Fawzia Afzal-Khan in her memoir Lahore with Love: Growing up with Girlfriends, Pakistani Style (LWL) to challenge patriarchal norms and structures. The theoretical frameworks used for this research are drawn from structural linguistics including the works of Mills (1995), Spender (1980), as well as French Poststructuralists: Cixous (1975) and Irigaray (1985). Through analysis of the linguistic features of her narrative such as tropes, metaphors, imagery, wordplay, polyphony, genre-mixing, and code-mixing, the paper strives to illustrate the alternative writing style of the memoirist.  The objective is to reveal that her linguistic and stylistic methods differ from the dominant structural and patriarchal writing styles, and mark her feminine individuality expressed thematically and stylistically in her memoir. The significance of our approach is that our analysis of her narrative is informed by a combination of the literary insights of the French feminists along with the ideas gained from the discipline of feminist linguistics and feminist stylistics. We hope that this paper goes some way in filling the research gap in the domain of Pakistani women’s memoir-writing: an emerging arena of literary studies which is ignored and dismissed both in its literary merit and political significance. 


2021 ◽  
Vol 4 ◽  
pp. 26
Author(s):  
Layo Olaluwoye

Existing studies on code-switching have mainly been carried out among English/Chinese bilinguals. Studies on English/Yoruba/Pidgin English bilinguals with emphasis on code-mixing and code-switching on the Internet have been grossly insufficient. Therefore, this study reveals the surface features of code-switching among Yoruba/English/Pidgin English bilinguals in the Nigerian Online Community on Facebook. For theoretical framework, we relied on insights from Halliday’s (1994) functional theory of language.  Five types of surface features were identified: simplified lexicon and sentences, non-adherence to the use of tones/diacritics, inconsistencies of spellings and words, unnecessary lengthening of letters, and tolerance of surface errors. The study has revealed the distinctive features of code-switching in the Nigerian Online Community page on Facebook. These linguistic features have thrown more light on the characteristics of the language use on the Facebook forum and how the posters use the codes in their speech repertoire to achieve this


2020 ◽  
Vol 5 (1) ◽  
pp. 21
Author(s):  
Luluk Iswati ◽  
Pratomo Widodo

Slogan is one of the powerful tools to advertise e-commerce products and services. The power of slogan to promote commodities lies primarily on the language style that it employs. This study is aimed at analyzing the linguistic feautures in 38 e-commerce slogans that are popular in Indonesia. The data were analyzed quantitatively and qualitatively. Quantitatively, the data were calculated regarding the frequency of each identified linguistic features: semantic devices, syntactic devices, phonetic devices, orthographic devices, syntactic errors, code-mixing, and moods. Qualitatively, the data were verbally analyzed, described, and discussed. The findings show that regarding linguistic devices, the most prevalent case is semantic device (self-reference). Concerning syntactic errors, the most apparent errors relate to word order typology and ommission of articles & prepositions. Speaking of code-mixing, the most frequently used term is the word ‘online’. In relation to moods, the most dominant mood is declarative. This study suggests further study with a wider context of data


INFERENSI ◽  
2015 ◽  
Vol 9 (2) ◽  
pp. 417
Author(s):  
Purwanto Purwanto

This study aimed to start an effort to evaluate the quality of thesis institutionally. The purpose of this study is to determine the quality of the thesis and determine the achievement of the quality of the thesis as a research work. This study is a descriptive evaluation. The study was conducted at the Department of PAI FITK IAIN Surakarta. The results showed several things. First, the majority of PAI student thesis in 2012 used qualitative research methods. Second, the quality of PAI student thesis in 2012 were generally good, on the thesis that uses quantitative and qualitative research methods. Third, the thesis uses quantitative research methods have a higher quality index than the thesis that uses qualitative research methods. Fourth, for the thesis used quantitative research methods showing the low quality of the elements present in the background of the problem and framework of thinking. Fifth, for the thesis used qualitative research methods showing the low quality of the elements contained in the title of the study andbackground of the problem


2021 ◽  
Author(s):  
Florance G ◽  
R.J Anandhi

The internet is faced with many problems daily, one of them is decrement in network bandwidth because of Distributed Denial of Service (DDoS) attack on host server, which deplete host resources. Researchers has been invented many protection mechanisms such as detection, trace back, prevention, reaction, and characterization are in case of DDoS attacks, which will control the number of malicious packets received by the victim. But it does not provide efficient detection technique with high rate in real time network infrastructure. Thus, modern technologies are prepared on Mininet network simulators, which give more impact to simulate the real network. The architecture of Software Defined Networks (SDN) and OpenFlow architecture is used to demonstrate a programmable network model and centralized management of real network. In this research work, we provide design of software defined network (SDN) using mininet simulator and security issues related to the Software Defined Network.


2021 ◽  
Vol 02 (09) ◽  
pp. 76-79
Author(s):  
Sayyora Yuldashovna Pulatova ◽  

In this paper, linguistic features of tea drinking in Uzbek and English languages from the consumption point of view are studied. Based on gastronomic discourse theory on comparative and cross-cultural methods as a special type of communication associated with the state of food resources and the processes of consumption by the way the people interact with tea. Moreover, compared with tea drinking traditions of Uzbek and English peoples’ communication, examples are comparatively given as well. The research work can provide theoretical and practical basis for the further research.


Author(s):  
Paula Rodríguez-Abruñeiras ◽  
Jesús Romero-Barranco

The present paper deals with a proposal for enhancing students’ engagement in the course ‘History of the English Language’ of the Degree in English Studies (Universitat de València). For the purpose, the traditional lectures will be combined with a research project carried out by groups of students (research teams) in which two digital tools will be used: electronic linguistic corpora and YouTube. Electronic linguistic corpora, on the one hand, will allow students to discover the diachronic development of certain linguistic features by looking at real data and making conclusions based on frequencies by themselves. YouTube, on the other, is a most appropriate online environment where students will share a video lecture so that their classmates can benefit from the research work they did, fostering peer-to-peer learning. The expected results are to make students more autonomous in their learning process, as they will be working on their project from the very beginning of the course; and to engage them more effectively since they will be working in a format that resembles what they do at their leisure time.


Extensive use of the Internet coupled with tremendous growth in database applications have created a huge demand for database security. The concepts of e-governance, e-commerce, e-business, e-learning, and digital libraries are already in place and evolving across poles. This raises various concomitant threats such as illegal copying, illegal redistribution, tampering, forgery and authentication of copyrighted digital assets. Digital Watermarking is an effective technique which can be introduced for solving the above mentioned threats. Based on the detection of the Watermark, the ownership and the integrity of the data can be asserted. Database Watermarking techniques are generally classified into two: i.e., Robust or Fragile. Robust watermarking techniques are designed for copyright protection and fragile watermarking techniques are for authentication or integrity checking of data. Watermarking schemes for relational databases authentication are almost fragile in nature. These algorithms do not allow any legitimate modification of the data. In most of the cases, innocent distortions such as tuple and/or attribute sorting may be considered as tampering. In this paper, the research work proposes a novel semi-fragile watermarking technique for tamper detection of relational databases. The new semi-fragile scheme can detect and localize malicious modifications, while allowing authorized updates. Theoretical analysis and experimental results demonstrate that common database attacks can be detected with high rate of success.


Sign in / Sign up

Export Citation Format

Share Document