scholarly journals The loss of poetic effects: From indeterminate to conventionalised meaning

2016 ◽  
Vol 25 (1) ◽  
pp. 54-71
Author(s):  
Héloïse Vande Wiele

This study investigates the diachronic evolution of poetic figurative language and some of its aesthetic effects. It suggests that poetic expressions can lose their poetic force over time as they conventionalise through repetition. A hypothesis based on the concept of poetic effects developed in Relevance Theory (Pilkington, 2000; Sperber and Wilson, 1995 [1989]) and on the theory of semantic change (Traugott and Dasher, 2002) is proposed to explain this phenomenon. This hypothesis was successfully tested through three case studies, in which French idiomatic expressions that have originated in poetry were shown to have progressively lost their aesthetic power and to have become cliché phrases as they were gaining a clearer, more determinate and conventional meaning. The methodology makes use of various sources to determine the poetic power of an expression and its change through time: literary critiques, newspaper corpora, Google Ngram graphs, translations into foreign languages and date of appearance in the dictionaries.

2021 ◽  
Vol 17 (3) ◽  
pp. 1-38
Author(s):  
Lauren Biernacki ◽  
Mark Gallagher ◽  
Zhixing Xu ◽  
Misiker Tadesse Aga ◽  
Austin Harris ◽  
...  

There is an increasing body of work in the area of hardware defenses for software-driven security attacks. A significant challenge in developing these defenses is that the space of security vulnerabilities and exploits is large and not fully understood. This results in specific point defenses that aim to patch particular vulnerabilities. While these defenses are valuable, they are often blindsided by fresh attacks that exploit new vulnerabilities. This article aims to address this issue by suggesting ways to make future defenses more durable based on an organization of security vulnerabilities as they arise throughout the program life cycle. We classify these vulnerability sources through programming, compilation, and hardware realization, and we show how each source introduces unintended states and transitions into the implementation. Further, we show how security exploits gain control by moving the implementation to an unintended state using knowledge of these sources and how defenses work to prevent these transitions. This framework of analyzing vulnerability sources, exploits, and defenses provides insights into developing durable defenses that could defend against broader categories of exploits. We present illustrative case studies of four important attack genealogies—showing how they fit into the presented framework and how the sophistication of the exploits and defenses have evolved over time, providing us insights for the future.


Author(s):  
Leif M. Burge ◽  
Laurence Chaput-Desrochers ◽  
Richard Guthrie

Pipelines can be exposed at water crossings where rivers lower the channel bed. Channel bed scour may cause damage to linear infrastructure such as pipelines by exposing the pipe to the flow of water and sediment. Accurate estimation of depth of scour is therefore critical in limiting damage to infrastructure. Channel bed scour has three main components: (1) general scour, (2) bed degradation, and (3) pool depth. General scour is the temporary lowering of the channel bed during a flood event. Channel bed degradation is the systematic lowering of a channel bed over time. Pool depth is depth of pools below the general bed elevation and includes the relocation of pools that result from river dynamics. Channel degradation is assessed in the field using indicators of channel incision such as channel bed armoring and bank characteristics, through the analysis of long profiles and sediment transport modelling. Pool depth is assessed using long profiles and channel movement over time. The catastrophic nature of bed lowering due to general scour requires a different assessment. A design depth of cover is based on analysis of depth of scour for a given return period (eg. 100-years). There are three main steps to predict general scour: (1) regional flood frequency analysis, (2) estimation of hydraulic variables, and (3) scour depth modelling. Typically, four scour models are employed: Lacey (1930), Blench (1969), Neill (1973), and Zeller (1981), with the average or maximum value used for design depth. We provide herein case studies for potential scour for pipeline water crossings at the Little Smoky River and Joachim Creek, AB. Using the four models above, and an analysis of channel degradation and pool depth, the recommended minimum depth of cover of 0.75 m and 0.142 m, respectively, were prescribed. Variability between scour models is large. The general scour model results varied from 0.45 m and 0.75 m for the Little Smoky River and 0.16 m to 0.51 m for Joachim Creek. While these models are more than 30 years old and do not adequately account for factors such as sediment mobility, they nevertheless do provide usable answers and should form part of the usual toolbox in water crossing scour calculations.


SAGE Open ◽  
2017 ◽  
Vol 7 (4) ◽  
pp. 215824401774671
Author(s):  
Abdel Rahman Mitib Altakhaineh

This study investigates the phonological, semantic, and pragmatic features of acronyms in Arabic. Acronyms in Arabic have appeared quite recently as a result of globalization and exposure to or contact with, mainly, English via radio stations and TV channels, which are broadcasting in English and in some countries, for example, Morocco in both English and French. Through in-depth analysis, it has been observed that acronyms in Arabic are subject to different restrictions: (a) The phonological combinations are formed on the basis of Arabic templates; hence, should be compatible with Arabic phonotactics, for example, consonant clusters should be broken up by vowels; (b) the connotation of the acronyms should not be negative; and (c) in conformity with relevance theory, when the acronyms are homophonous to existing words, the former maximize contextual effects with minimum processing effort. The fact that they appear in certain contexts also reduces the processing effort. It has also become evident that the period between the establishment of the movement or party and the first use of the acronym decreases over time, provided that the acronyms are frequently mentioned in the media. The examination of acronyms in different languages shows that acronymization is quite pervasive cross-linguistically; this may suggest that not any word-formation process can easily spread; it needs to be prevalent and potentially universal.


2019 ◽  
Vol 5 (1) ◽  
pp. 11-42
Author(s):  
Teodor Petrič

AbstractIn this paper psycholinguistic and emotional properties of 619 German idiomatic expressions are explored. The list of idiomatic expressions has been adapted from Citron et al. (2015), who have used it with German native speakers. In our study the same idioms were evaluated by Slovene learners of German as a foreign language. Our participants rated each idiom for emotional valence, emotional arousal, familiarity, concreteness, ambiguity (literality), semantic transparency and figurativeness. They also had the task to describe the meaning of the German idioms and to rate their confidence about the attributed meaning. The aims of our study were (1) to provide descriptive norms for psycholinguistic and affective properties of a large set of idioms in German as a second language, (2) to explore the relationships between psycholinguistic and affective properties of idioms in German as a second language, and (3) to compare the ratings of the German native speakers studied in Citron et al. (2015) with the ratings of the Slovene second language learners from our study. On one hand, the results of the Slovene participants show many similarities with those of of the German native speakers, on the other hand, they show a slight positivity bias and slightly shallower emotional processing of the German idioms. Our study provides data that could be useful for future studies investigating the role of affect in figurative language in a second language setting (methodology, translation science, language technology).


2014 ◽  
Vol 11 (2) ◽  
pp. 461-480 ◽  
Author(s):  
Nuno Castela ◽  
Paulo Dias ◽  
Marielba Zacarias ◽  
José Tribolet

Business process models are often forgotten after their creation and its representation is not usually updated. This appears to be negative as processes evolve over time. This paper discusses the issue of business process models maintenance through the definition of a collaborative method that creates interaction contexts enabling business actors to discuss about business processes, sharing business knowledge. The collaboration method extends the discussion about existing process representations to all stakeholders promoting their update. This collaborative method contributes to improve business process models, allowing updates based in change proposals and discussions, using a groupware tool that was developed. Four case studies were developed in real organizational environment. We came to the conclusion that the defined method and the developed tool can help organizations to maintain a business process model updated based on the inputs and consequent discussions taken by the organizational actors who participate in the processes.


2014 ◽  
Vol 29 (2) ◽  
pp. 114-127 ◽  
Author(s):  
Anne Quaadgras ◽  
Peter Weill ◽  
Jeanne W Ross

As digitization becomes pervasive, many organizations struggle to drive value from the growing number of IT-related opportunities. We show how the drivers of IT value creation can be framed as firm-wide commitments to a set of IT capabilities. On the basis of 20 published case studies, we identify a small set of IT decisions that organizations must make to use IT to successfully enhance their impact. We group these decisions into a framework of four commitments. Making these commitments helps organizations reinforce what really matters over time, which in turn helps focus the attention of their employees. We demonstrate, via a survey of 210 publicly traded firms, that firms which are more effective in making these four commitments have higher business impact from IT, which in turn correlates with higher financial performance. We suggest the construct of commitment is a step toward unifying the IT value literature and creating an overarching concept that brings together many of the important management practices identified in previous work.


Author(s):  
Alfonso Siano ◽  
Mario Siglioccolo ◽  
Carmela Tuccillo ◽  
Francesca Conte

This chapter investigates the possible relationships between cultural institutions (museums, theatres, libraries etc.) and companies, which have been increasingly occurring in the last years. While cultural institutions have been progressively needing to acquire financial resources and managerial skills to survive and valorise their activities, at the same time companies are trying new ways to differentiate their image, by means of associating it with the cultural sector. The adoption of a descriptive-normative approach enables the identification of many kinds of collaboration (patronage and corporate philanthropy, volunteer program and payroll giving, cause related marketing, cultural sponsorship, co-branding, licensing and merchandising, electronic relationships, and finally, partnership), distinguished according to the intensity and duration over time. For each relationship, mutual benefits and disadvantages are described in detail, even with the support of real case studies. This joint consideration of the various possible relationships aims to provide an overall view of the issue considered, which differentiates this contribution from the literature so far produced.


Author(s):  
Frank Schimmelfennig ◽  
Thomas Winzen ◽  
Tobias Lenz ◽  
Jofre Rocabert ◽  
Loriana Crasnic ◽  
...  

This chapter introduces the case studies. It describes the rationale for studying cases, our case selection, and the structure of the case study chapters. The case studies offer an opportunity to examine the conditions under which international organizations establish international parliamentary institutions (IPIs) in more detail, take into account alternative configurations of conditions for IPI establishment, and trace the processes of strategic democratic legitimation. In addition, the cases include some of the rare cases of empowerment, in which IPIs increase their authority over time. The case selection aims at a diverse set of cases representing positive and negative cases of IPI establishment, a variety of world regions and historical periods, and stark variation across the conditions of parliamentarization.


2018 ◽  
pp. 124-177
Author(s):  
Laura Kounine

This chapter deals with the role of the self and conscience in defending oneself against the charge of witchcraft. To add depth to intellectual concepts—and teleologies—of the self, we must understand how the individual self was understood, felt, and experienced. Particularly for the crime of witchcraft, the crux of the trial was premised on the moral question of what kind of person would commit such a crime. Those on trial for witchcraft in the Lutheran duchy of Württemberg invoked the idioms of ‘mind’, ‘conscience’, ‘heart’, or ‘self’ in constructing their defence. Through four case studies, ranging from 1565 to 1678, this chapter examines the different ways in which people could conceptualize their person, and shows that change over time in the ‘development’ of the modern self was not a uniform or directly linear pattern.


Sign in / Sign up

Export Citation Format

Share Document