Preferred Language
Articles
/
SxYUDYwBVTCNdQwCn_fy
INFINITIVAL AND GERUNDIAL CONSTRUCTIONS OF ASPECTUAL VERBS IN SELECTED BRITISH AND AMERICAN NOVELS
...Show More Authors

Abstract Infinitives and gerunds are non-finite verb forms which cannot be indicated by tense, number, or person. The construction of non-finite verbs is intricate because of their nature of meanings, forms, and functions. The major problem is that both infinitival and gerundial complements have identical functions and occupy identical positions in the sentences. Thus, there is a confusion in using an infinitival and gerundial forms after aspectual verbs. The selection of either one of these two forms as complements is controlled syntactically or semantically. Moreover, both forms can be used usually with similar predicate but with neat difference in meaning. In addition, there are problems with controlling the use of aspect, since aspectual verbs have specific syntactic and semantic restrictions. The study aims at investigating the use of infinitival and gerundial constructions and of aspectual verbs in selected British and American Novels, and identifying the syntactic and semantic behvior of aspectual verbs. The following procedures will be followed in the present study. Providing a theoretical background of the infinitival and gerundial complements and of aspectual verbs. Selecting the data from British and American novels, and analzing the novels according to the model of Smith (1997) about the classification of aspectual verbs. It has been concluded that the infinitive has been used more in the American novel, while the gerund has been used more in the British novel. The perfective viewpoint has been utilized more in the British novel, while the imperfective viewpoint has been utilized more in the American novel in the grammatical aspect. The high percentage of infinitive and imperfective viewpoint in the American novel clarifies the tendency to indicate an uncompleted action, while the high percentage of gerund and perfective viewpoint in the British novel clarifies the tendency to indicate a completed action. Stative and Activity verbs in the lexical aspect have been formed the highest percentage in both British and American novels in spite of the differences in the frequency of these verbs between novels. The following procedures will be followed in the present study. Providing a theoretical background of the infinitival and gerundial complements and of aspectual verbs. Selecting the data from British and American novels, and analzing the novels according to the model of Smith (1997) about the classification of aspectual verbs. It has been concluded that the infinitive has been used more in the American novel, while the gerund has been used more in the British novel. The perfective viewpoint has been utilized more in the British novel, while the imperfective viewpoint has been utilized more in the American novel in the grammatical aspect. The high percentage of infinitive and imperfective viewpoint in the American novel clarifies the tendency to indicate an uncompleted action, while the high percentage of gerund and perfective viewpoint in the British novel clarifies the tendency to indicate a completed action. Stative and Activity verbs in the lexical aspect have been formed the highest percentage in both British and American novels in spite of the differences in the frequency of these verbs between novels.

Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Science International
USING CRYPTOANALYSIS POLICIES AND TECHNIQUES TO CREATE STRONG PASSWORD
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Lamport
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
Computations for the groups SL(2,81) and SL(2,729)
...Show More Authors

For any group G, we define G/H (read” G mod H”) to be the set of left cosets of H in G and this set forms a group under the operation (a)(bH) = abH. The character table of rational representations study to gain the K( SL(2,81)) and K( SL(2, 729)) in this work.

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Sep 02 2017
Journal Name
Journal Of Engineering
Estimation Curve Numbers using GIS and Hec-GeoHMS Model
...Show More Authors

Recently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevati

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
Globalisation and its Impact on North Korean political Regime
...Show More Authors

Abstract Globalization dominated in the last decade of the twentieth century and the eve of the third millennium over economic,politics,psychology,culture,communications and information sciences,it's a historical phenomenon refer to many important transitions in humanitarian life.It foxes on that state has illusion its historical role in the psychologist,economic and political buldings. Globalization issue and its influence in North Korea put a spotlight on political,economic and cultural situations,the political system resists any change with many limitations on political freedoms,human rights and political multiplicity.Libralism trends and free market are so weaken when it comparing within the bad economic situation of the coun

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
The political dimension Engineering social characteristics and Alssayashllansan community
...Show More Authors

تستهدف هذه الدراسة وبشكل أساس، الكشف عن طبيعة وخصائص البعد السياسي لهندسة/صناعة الخصائص الاجتماعية والسياسية للإنسان والمجتمع، بوصفها العملية المسؤولة عن تصميم هذه الخصائص وصناعتها وتغييرها جزئيا أو كليا، دون أبعادها الأخرى المتعددة والمتنوعة، لا لمجرد الانسياق وراء دوافع الرغبة الذاتية، أو اعتبارات التخصص الدقيق وأحكامه، لأن معهما أيضا، بل وقبلهما أحيانا، دوافع واعتبارات أخرى موضوع

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
Production mechanisms and their implications for Iraqi theater techniques
...Show More Authors

Theatrical production mechanisms were determined according to the extents of the theatrical performance, the directing plan, and the ideas that the theatrical performance seeks to convey to the audience. Accordingly, theatrical production mechanisms differ between one theatrical performance and another according to the requirements of each of them and the surrounding circumstances that accompany the production of theatrical performance, and in order to search for production mechanisms and their repercussions on the show. Theatrical The current research was divided into four chapters, namely (Chapter One - Methodology), which identified the research problem in the following question: What are the production mechanisms and their implicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Typographic Accomplishment between the Manual Skill and Contemporary Technology
...Show More Authors

     The typographic accomplishment is the most important means of cognitive communication and carries a message from the sender to the recipient which serves a certain objective functionally, economically and advertisingly.

            The design of typographic accomplishment depends on two different techniques, the first is manual, which depends on the skill, training and individual achievement of the designer and his ability to design and produce typographic accomplishment with manual skill effects. The second one is the contemporary digitization which is represented by computers, programs and printers attached to them. The problem of the current resear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF