Preferred Language
Articles
/
SxYUDYwBVTCNdQwCn_fy
INFINITIVAL AND GERUNDIAL CONSTRUCTIONS OF ASPECTUAL VERBS IN SELECTED BRITISH AND AMERICAN NOVELS
...Show More Authors

Abstract Infinitives and gerunds are non-finite verb forms which cannot be indicated by tense, number, or person. The construction of non-finite verbs is intricate because of their nature of meanings, forms, and functions. The major problem is that both infinitival and gerundial complements have identical functions and occupy identical positions in the sentences. Thus, there is a confusion in using an infinitival and gerundial forms after aspectual verbs. The selection of either one of these two forms as complements is controlled syntactically or semantically. Moreover, both forms can be used usually with similar predicate but with neat difference in meaning. In addition, there are problems with controlling the use of aspect, since aspectual verbs have specific syntactic and semantic restrictions. The study aims at investigating the use of infinitival and gerundial constructions and of aspectual verbs in selected British and American Novels, and identifying the syntactic and semantic behvior of aspectual verbs. The following procedures will be followed in the present study. Providing a theoretical background of the infinitival and gerundial complements and of aspectual verbs. Selecting the data from British and American novels, and analzing the novels according to the model of Smith (1997) about the classification of aspectual verbs. It has been concluded that the infinitive has been used more in the American novel, while the gerund has been used more in the British novel. The perfective viewpoint has been utilized more in the British novel, while the imperfective viewpoint has been utilized more in the American novel in the grammatical aspect. The high percentage of infinitive and imperfective viewpoint in the American novel clarifies the tendency to indicate an uncompleted action, while the high percentage of gerund and perfective viewpoint in the British novel clarifies the tendency to indicate a completed action. Stative and Activity verbs in the lexical aspect have been formed the highest percentage in both British and American novels in spite of the differences in the frequency of these verbs between novels. The following procedures will be followed in the present study. Providing a theoretical background of the infinitival and gerundial complements and of aspectual verbs. Selecting the data from British and American novels, and analzing the novels according to the model of Smith (1997) about the classification of aspectual verbs. It has been concluded that the infinitive has been used more in the American novel, while the gerund has been used more in the British novel. The perfective viewpoint has been utilized more in the British novel, while the imperfective viewpoint has been utilized more in the American novel in the grammatical aspect. The high percentage of infinitive and imperfective viewpoint in the American novel clarifies the tendency to indicate an uncompleted action, while the high percentage of gerund and perfective viewpoint in the British novel clarifies the tendency to indicate a completed action. Stative and Activity verbs in the lexical aspect have been formed the highest percentage in both British and American novels in spite of the differences in the frequency of these verbs between novels.

Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of The College Of Education For Women
The relationship between the muslim authorities and prominent Christian personalities within their territories
...Show More Authors

 

The prophet said that it anybody burdened any of the people or the book more than they could endure he would ben his opponent until the day of judgment.

-under the rightly guided caliphs the Christians had much freedom .this is shown by a letter attributed to ishu-yab III. The Nestorian catholics.

-The third caliph,Uthman favoured the Christians either because of the spcial skills or abilities which they possessed or through the imfluence of his Christian wife Na'ila.

-Under the early Umayyade,the christiansins the Isalamic umma had as much freedom as they had previously enjoyed under the best of their Christians governments because they restorted their churches and appointed many Christians to the

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Mathematical connection skills and their relationship with productive thinking among secondary school students
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (220)
Crossref (218)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Composites Science
Sawdust-Based Concrete Composite-Filled Steel Tube Beams: An Experimental and Analytical Investigation
...Show More Authors

Incorporating waste byproducts into concrete is an innovative and promising way to minimize the environmental impact of waste material while maintaining and/or improving concrete’s mechanical characteristics and strength. The proper application of sawdust as a pozzolan in the building industry remains a significant challenge. Consequently, this study conducted an experimental evaluation of sawdust as a fill material. In particular, sawdust as a fine aggregate in concrete offers a realistic structural and economical possibility for the construction of lightweight structural systems. Failure under four-point loads was investigated for six concrete-filled steel tube (CFST) specimens. The results indicated that recycled lightweight co

... Show More
View Publication
Scopus (5)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref