The purpose of this paper is to shed light on the concept of fuzzy logic ,its application in linguistics ,especially in language teaching and the fuzziness of some lexical items in English.
Fuzziness means that the semantic boundaries of some lexical items are indefinite and ideterminate.Fuzzy logic provides a very precise approach for dealing with this indeterminacy and uncertainty which grows (among other reasons) out of human behavior and the effect of society.
The concept of fuzzy logic has emerged in the development of the theory of fuzzy set by Lotfi Zadeh(a professor of computer science at the university of California) in 1965.It can be thought of as the application side of the fuzzy set theory. In linguistics, few scholars have dealt with this phenomenon, among them, Lakoff (1972), Labov (1973), and Aitchison (1994). Consequently, very little literature is available on this concept in linguistics. The researcher has to collect bits of information scattered in various fields of knowledge.
The paper is of three sections: section one surveys briefly some of the semantic terms which are closely related to lexical fuzziness, since it is a problem of meaning by nature, like denotation versus connotation and intension versus extension. Section two is of two main parts. The first explores in detail the emergence of fuzzy logic, shedding light on its development and the criticism to it. The second part is devoted to lexical fuzziness, trying to discover its characteristics, the reasons behind its existence in languages, its relation to other similar concepts like vagueness, its application in teaching a second language and some other related titles.
Shifting Sand of English in Iraq language Policy and Planning
In this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the
... Show MoreLearning a foreign language is a highly interactive process, and a belief that communicative activities foster a great amount of linguistic production provides language practice and opportunities for negotiation of meaning during communicative exchanges. Thus, this study examines what benefits learner-centered classroom setting offers compared with that of teacher–centered classroom, and how less proficient learners accomplish their tasks and activities with scaffolded help during interaction with the help of proficient classmates and under the guidance of a skilful person, i.e., the teacher. The subjects participating in this study are 30 Iraqi 4th year college students in the Department of English, College of Arts , Univer
... Show MoreThe non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration. chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha
... Show MoreA novel azo dye ligand namely (2-(pyridin-3-yldiazenyl)naphthalen-1-ol (HPYNA), was synthesized by the coupling reaction of diazonium salt of 3-aminopyridine with naphthol. The palladium(II) complex for HPYNA ligand was prepared by reacting palladium(II) ions with the HPYNA ligand. These synthesized compounds were characterized using different techniques, including mass, 1H-NMR, infrared, and UV-Vis spectroscopy. The infrared results show that the azo ligand reacts as a bidentate via the oxygen atom of phenol and nitrogen atom of the azo group. The palladium(II) complex is square-planer with diamagnetic properties depending on the results of electronic transitions and magnetic sensitivity. The HPYNA ligand and palladium complex show
... Show MoreRe-use of the byproduct wastes resulting from different municipal and industrial activities in the reclamation of contaminated water is real application for green projects and sustainability concepts. In this direction, the synthesis of composite sorbent from the mixing of waterworks and sewage sludge coated with new nanoparticles named “siderite” (WSSS) is the novelty of this study. These particles can be precipitated from the iron(II) nitrate using waterworks sludge as alkaline agent and source of carbonate. Characterization tests using X-ray diffraction (XRD), scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) mapping revealed that the coating process was c
This research is a critical methodological study deals with some Quranic verses abrogative,abrogated.
by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the in the holy Quraan.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More