Language ecology is the interactions between the environment and language. Such a discipline, ‘language ecology’ or ‘ecolinguistics has been founded by Einar Haugen’. Accordingly, the study aims at qualitatively reviewing the theoretical and conceptual issues surrounding the subject of language ecology by tracing the roots of language ecology. It further highlights the fundamental inconsistencies between how the concept of ecology is perceived in sociology and biology, and is applied to language, particularly, transposing the main central concepts of bio-ecology, such as relationship/interaction, environment, and organism to human language and theory of ecological-linguistic. The theory wavers among placing the focus on the organism, interrelation and the interaction. It mainly considers language ecology as a metaphor, but infrequently treats language ecology as a science field. Since the theory does not clearly delimit its object, its relationships with the neighboring scientific fields have been undecided. Moreover, the grand scope of the theories includes severe challenges in the empirical research that are limited to available resources and time. The principle, holistic, dynamic and multi-faceted perception of ecolinguistics forms a valuable correction to linguistic approaches, focusing only on language as a synchronically, static, and autonomous, quasi-invariable system.
New series of metal ions complexes have been prepared from the new ligand [4-Amino-N-(5-methyl-isaxazol-3-yl)-benzenesulfonamide] derived from Sulfamethoxazole and 3-aminophenol. Accordingly, mono-nuclear Mn(II), Fe(III), Co (II), and Rh(III) complexes were prepared by the reaction of previous ligand with MnCl2.4H2O, CoCl2.6H2O, FeCl3.6H2O and RhCl3H2O, respectively. The compounds have been characterized by Fourier-transform infrared (FTIR), ultraviolet–visible (UV–vis), mass, 1H-, and 13C-nuclear magnetic resonance (NMR) spectra and thermo gravimetric analysis (TGA& DSC) curve, Bohr magnetic (B.M.), elemental microanal
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreElectro-kinetic remediation technology is one of the developing technologies that offer great promise for the cleanup of soils contaminated with heavy metals. A numerical model was formulated to simulate copper (Cu) transport under an electric field using one-dimensional diffusion-advection equations describing the contaminant transport driven by chemical and electrical gradients in soil during the electro-kinetic remediation as a function of time and space. This model included complex physicochemical factors affecting the transport phenomena, such as soil pH value, aqueous phase reaction, adsorption, and precipitation. One-dimensional finitedifference computer program successfully predicted meaningful values for soil pH profiles and Cu
... Show MoreAn experimental and theoretical works were carried out to model the wire condenser in the domestic refrigerator by calculating the heat transfer coefficient and pressure drop and finding the optimum performance. The two methods were used for calculation, zone method, and an integral method. The work was conducted by using two wire condensers with equal length but different in tube diameters, two refrigerants, R-134a and R-600a, and two different compressors matching the refrigerant type. In the experimental work, the optimum charge was found for the refrigerator according to ASHRAE recommendation. Then, the tests were done at 32˚C ambient temperature in a closed room with dimension (2m*2m*3m). The results showed that th
... Show MoreWhile conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).
Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this
Anemia of chronic disease (ACD) and iron deficiency anemia (IDA) are the two most important types of anemia in rheumatoid arthritis (RA). Functional iron deficiency in ACD can be attributed to overexpression of the main iron regulatory hormone hepcidin leading to diversion of iron from the circulation into storage sites resulting in iron-restricted erythropoiesis. The aim is to investigate the role of circulating hepcidin and to uncover the frequency of IDA in RA. The study included 51 patients with RA. Complete blood counts, serum iron, total iron binding capacity, ferritin, and hepcidin- 25 were assessed. ACD was found in 37.3% of patients, IDA in 11.8%, and combined (ACD/IDA) in 17.6%. Serum hepcidin was higher in ACD than in con
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More