Le mot anglais code switching ou l’équivalent français alternance codique est un terme très utilisé dans des recherches qui traitent des problèmes en sociolinguistique. Le bilingue dispose, dans son répertoire linguistique, de moyens de communication qui lui permettent d’adapter son langage à des situations de communication plus variées que ceux du monolingue. Le code-switching ou l’alternance codique qui est un lieu de structuration de stratégies de communication en est un moyen indispensable.
L’alternance codique dans la conversation est l’utilisation d’un mot ou plus appartenant à une langue B à l’intérieur d’une phrase qui appartient à une langue A. Dans la plupart des cas, le locuteur se sert de l’alternance codique pour réitérer son message, répondre à l’affirmation de quelqu’un d’autre etc. comme l’a souligné Gumperz (1989).
Dans cette recherche, tout d’abord, nous allons tenter de définir le terme code switching ou l’alternance codique. Ensuite, nous allons mettre en évidence des différents types d’alternance codique comme l’alternance interphrastique (entre les phrases), l’alternance intraphrastique et l’alternance extraphrastique. Enfin,nous allons mettre l’accent sur l’alternance codique dans la conversation tout en essayant de répondre à la question posée par Fishman (1965) à savoir : qui parle, quelle langue, avec qui, et quand ? une question qui caractérise la situation de communication chez le bilingue. Nous essaierons de dégager les raisons qui amènent les interlocuteurs et à pratiquer le code-switching au cours de l’interaction (conversation). Nous mettrons ainsi l’accent sur les facteurs linguistiques et extralinguistiques qui ont une répercussion sur leur choix linguistique.
The research revolves around the methodology of the historian Ibn Wasil
(d.697 AH) in dealing with the Mongolian invasion through his book
“Mafrej al-Karroub fi Akhbar Bani Ayyub
In order to achieve overall balance in the economy to be achieved in different markets and at one time (market commodity, monetary and labor market and the balance of payments and public budget), did not provide yet a model from which to determine the overall balance in the economy and the difficulty of finding the inter-relationship between all these markets and put them applied in the form of allowing the identification of balance in all markets at once.
One of the best models that have dealt with this subject is a model
(LM-BP-IS), who teaches balance in the commodity market and money market and balance of payments and the importance of this issue This research tries to shed light on the reality
The researcher wanted in this research to shed light on one of the epistemological readings of the Quranic text, which is the reading of the Arabized Japanese researcher (Toshihiko Izutsu) in his book (God and Man in the Qur’an) and to explain what he has and what is on it.
The summary of the facts in which he came out is that the knowledge reading of Toshihiko towards the Qur’anic text is old in concept. The oldest people have dealt with it in their works and what their pens have learned about, except that they have eaten and studied them under many headings such as: proportionality, consistency, systems and the like in terms, and the researcher has sought thro
... Show MoreThe aim of the research is to diagnose the methods of enhancing the value of citizenship in children through the interactive life process in educational institutions; the descriptive approach was used to achieve the objective by identifying social theories that corresponded to the national value or the theoretical principles of citizenship education. The study focused on educational activities and their role in establishing values, national educational philosophy in interactive activities, as well as the presentation of previous studies on the subject of citizenship, and maps of each of the strategies of active learning, skills in the process of interactive life in the field of education, Institutions that have the responsibility to prom
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreLA TRANSGRESSION CHEZ RIMBAUD Lecture de I' aspect de Transgression dans Marine
Abstract
The twentieth century French novel had undergo a significant change that took the form of a radical move from the traditional son who follows his father to one who no way prevalent in the classical French novel. The new son in the 2Oth century novel finds himself emotionally attached which both became a new trend and approach in novel writing.
Marcel Proust's novel which can be considered a source of inspiration for most of 2Oth century novelists is a good example of the mother supremacy which is crystal clear from the first page through its parts and chapters till the last page. In fact, Proust had written a completely different novel from the Balzacian conventions. Unlike the latter's novels, Pro
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThis study aims to know the degree of importance and the availability of the enhancing specifications of the educational process, and the way its objectives are achieved. Such a step involves using educational techniques, laying the selection foundations, knowing the methods of their employment and tracking the obstacles that limit this employment in teaching Arabic to non-native speakers. To achieve these objectives, the study followed a descriptive approach, and collected the necessary data through an integrated questionnaire prepared for the purpose of describing the phenomenon or topic. This approach was adopted, as it is characterized by being comprehensive, focuses on collecting data related and necessary to the topic under study.
... Show More