Sunday, January 26, 2020

Importance of Using the ACARS System

Importance of Using the ACARS System Abbreviations ACARS: Aircraft Communication Addressing and Reporting System ADS-B: Automatic dependent surveillance broadcast CMU: Communication Management Unit CDU: Control Display Unit FMS: Flight Management System ATC: Air Traffic Control AOC: Aeronautical Operational Control AAC: Airline Administrative Control NOTAM: Notice to Airmen VHF: Very High Frequency VDL: VHF Data Link MAC: Message Authentication Code AES: Advance Encryption Standard SHA: Secure Hash Algorithm CA: Certificate Authority ICAO: International Civil Aviation Organisation IPsec: Internet Protocol Security In this report the importance of using the ACARS system in the communication between the aircrafts and the ground units such as Air traffic control (ATC), aeronautical operational control (AOC) and airline administrative Control (AAC). (2) Also, the need of securing the communication channel against passive and active attackers will be identified and analysed. The ACARS system is used to transmit data both from aircraft to ground and from ground to aircraft. The data transmitted from the aircraft to the ATC will communicate requests and receipts for clearances and instructions when the aircraft is on the ground, during the phases of take-off and landing and finally during the time the aircraft is in the air. The ACARS is system is also used for communication between the aircrafts and the AOC and AAC ground units. The data transmitted between these three entities is about various aspects of the aircraft, weather information and observations, NOTAMS, flight plan and any diversion from the flight plan, technical performance, possible system failures and any special information regarding the flight and its passengers. ACARS system to transmit data to the ground receivers, the FMC hardware is used on newer aircrafts or the CDU on older ones. The communication is accomplished by using the FMS unit and a small printer in the aircrafts and similar hardware on the ground. The FMS transmits the data to either a satellite or a ground antennas, regarding the altitude of the aircraft. After either the satellite or the antenna will transmit the data through the communication network to the appropriate ground unit using a private network. Due to the reason that these data are crucial and must not be altered or even sometimes monitored by unauthorised users the security of the communication channel and the data should be the top priority of the airlines. To achieve that the data transmitted should always maintain the three major aspects of information security which are: Confidentiality Integrity Availability During the early years of the aviation industry communication channels were only needed between the ATC and the pilots. There were no ways to transmit data regarding the aircrafts avionic systems, engines and integrity, mainly due to the reason that there was not such advanced technology, on both the communication channels and on the aircrafts. The only communication channel available was the VHF channels that in our days is the least trusted protocol. As the aircrafts developed, the boundaries were extended, and led to a rapid increase in air traffic. In order to co-op with this, the aircrafts manufacturers decided to improve the quality and quantity of the systems aboard the aircrafts in order to protect them from mid-air collisions and also help the ATCs to manage the traffic easier. From the moment that the aviation instruments on board the aircraft changed from analogue to digital, a breakthrough was achieved, leading many companies to develop software and hardware that allowed the improvement of the communication and data transmission between the aircrafts and the ground. Along with these improvements, the aircrafts critical systems were able to continuously provide the data recorder information regarding their condition. During this phase the CPDLC was developed in order to minimize the acoustic misunderstandings (6) provided accountability and made the communication easier, more efficient and safer to transmit and receive l ong messages (6). Although in my opinion this system would make the communication between the pilots and the ATC easier and safer, it wasnt widely used because of security threats like message manipulation or injection (6) that were not possible to be detected. Also, a major backdoor to the system in my opinion was that there was no authentication leading to eavesdropping or spoof clearances (6). For the improvement of safety and to be able to improve the accident investigations, the authorities decided that it would be helpful, that these data should be transmitted to the ground and in order to improve the communications between the aircrafts and the ATCs, a new system was developed, which is called ACARS. Along with it new techniques of communication and data transmission were introduced that allowed the aircraft, ATCs and airlines headquarters to communicate with each other by sending short texts. ACARS was introduced during the 80s and as the years passed it became very popular among the airlines. It allowed direct communication between aircrafts and ATCs for requesting and receiving instructions and clearances. The ability of communicating between the aircraft and the AOC and AAC was introduced, that allowed the exchange of information about the weather, possible issues with the aircrafts systems, NOTAMs, passenger information, etc. In the early years of aviation, the computers were not very capable in intercepting or manipulating a message that was transmitted and therefore there was little need for that system to be secure. As the years pass and computers became stronger, together with the knowledge of people, possible unauthorised monitoring of message transmission or even manipulating the messages transmitted between the aircrafts and the ground was a threat to aviation. In order to solve this issues, security mechanisms were placed in order to protect the communication channels and the data transmitted. The security mechanisms placed, are updated regularly in order to maintain the information secure against new threats and attackers. The difficulty of maintaining a secure communication channel is becoming greater, due to the reason that the cost of hardware that allow you to monitor the information transmitted by aircrafts are very cheap and easily accessible. This together with the increasing knowledge of people on how to use them the wrong way and with the intention to cause harm for various reasons, makes the work of the ones trying to protect these systems, very difficult and crucial for the safety of the passengers and aircraft crew lives. As the workload for the pilots in command increased greatly due to the increased traffic, reduction of the crew members in aircrafts and the need to maximize profit without undermining safety and in order to protect the pilots from making mistakes or forget to complete the necessary steps for the safe conduct of a flight, researchers were working on a new way of communication between the aircraft and the ground operations. That software was ACARS and was developed in the 1980s. ACARS is a digital datalink system (3) that allows the pilots, ATC and the airlines headquarters to exchange short messages no matter of the location of the aircraft around the world. In order to achieve that the aircraft is equipped with an avionics computer which is called Communications Management Unit (CMU), a control display unit (CDU) and a printer. The CMU was designed to be able to send and receive digital messages (3) regarding aspects of the flight, instructions and clearances from the ATC, weather forecasts, NOTAMs and information to and from the companys headquarters regarding the aircrafts performance and special needs about the passengers. In order to achieve the level of communication needed, the ACARS system is using different types of communication media. The two media used to communicate between the aircraft and the ground by using satellites when the aircrafts are at higher altitudes and radio antennas at lower altitudes. Before the first implementations of the ACARS system, the communication between the aircrafts and the ground was performed by VHF voice channels. As the technology advanced, new way of communication were developed. During the first periods of implementation of the ACARS system the ARINC organisation, developed a service that a allowed for the VHF communication service to be upgraded by a new service that allowed the use of digital telex formats (3) to the VHF communication channel. During the 90s this led to the standardization of a VHF Digital Link. As the implementation of the ACARS software by airliners became widespread, new services were developed in order to make the communication channels more efficient. SITA company, during this phase had developed a large ground communication network that was connecting places around the world. In order to further enhance the abilities of ACARS, SITA integrated their ground communication network to be able and cooperate with ACARS already existing communication channels between aircraft and ground. In my opinion the ACARS system was designed very cleverly because it was able to cooperate with many types of aircraft communications equipment such as VHF, Inmarsat, sitcom, iridium satellite, VDL and high frequency data link (6). More detailed, SITA managed to merge both VHF and VDL air to ground communication channel together with the ground network it had already developed and to provide an end to end communication channel between aircrafts and ground operations no matter the type of flights. Both short haul and long haul routes were supported. Figure .1 ACARS Setup (9) ACARS security is very important for the safe conduct of flights. Two different types of security were implemented. The first one was called DSP-based architecture and is only capable to protect ACARS messages during transmission from the aircraft to the ground, leaving the ground network unprotected and risking attacks from hackers open. For that reason, there is an end to end security architecture was proposed and developed. In order for the security of the ACARS system to be complete it will have to maintain confidentiality, integrity and availability to the information transmitted at all times, both in the communication channel between the aircraft and the ground and also in the ground network. On the end to end solution proposed in the article The Approach of ACARS Data Encryption and Authentication (5), The proposed security will be using symmetric and asymmetric cryptography, a hybrid system that could solve the problems of using just one of the methods of cryptography, along with digital signatures to provide adequate privacy and integrity (5) to the messages. The issues that came up with the symmetric cryptography were that in order to communicate with each other, a key had to be exchanged between the sender and the recipients of the message. This unique key was designed to be known just by the sender and the recipient of the message in order to protect it from unauthorized users. This proved to be very difficult to maintain secure due to the large number of users that are using ACARS to communicate. On the other hand, asymmetric cryptography was able to solve this problem but it required the use of a large size keys that led to a rather large amount of bandwidth requi red just for the exchange of the keys that kept secure the communication, which was a problem due to the limited amount of bandwidth the ACARS system was designed to require. This hybrid system that was proposed, made use of a key derivation algorithm called Elliptic Curve Diffie-Hellman which is using an elliptic curve and certain points in order to find the private key. By using the elliptic curve along with the private key, it was able to generate the public key of both the aircraft and the ground station (sender and recipient). By using this technique, the communication channel was secure because it was very difficult for the attacker to find the private key even though the exchange of public key is intercepted (5). For the receiver to be able to decrypt and use the private key a key derivation function is needed which in this case is the MAC. In order to provide encryption to the data transmitted the AES algorithm is used in combination with the SHA 256 algorithm. The number 256 after the SHA acronym means the length of the random binary sequence that is used as the key for the AES (5) algorithm. Due to the reason of the limited bandwidth that ACARS is designed to be using, the message data transmitted and the necessary data transmitted to provide security should be compressed as much as possible. In order to do so every letter, number or symbol will have to be encoded to a 6bit stream during the encryption phase. In order for the recipient to be able to decode it and read the correct message, the MAC of the encrypted data will have to be read and be decrypted to an ACARS readable character. Also, the correct MAC value will have to be calculated in order for the message to be authenticated. During the testing phase of the above end to end security mechanism, eavesdropping was possible to be done but no actual data were able to be read, due to the AES that was used in the encryption of the message, so confidentiality was achieved. Privacy was also achieved because if the message was manipulated, the MAC value would have been changed and the recipient would have detected the change in value. Finally for the digital signature to be correct, the assumptions that the CA was trustworthy had to be made. Wireless Communication Security Due to the reason that the main communication channel between the aircraft and the ground stations will always be wireless, some necessary aspects of security will always have to exist in order to able to say that the channel is secure. According to the authors of the article (7), in order for a security protocol be acceptable, it must meet some requirements. The first one is the mutual entity authentication which is able to provide security by identifying the sender and the receiver. Also, the Asymmetric algorithms are very critical according to my opinion, regarding the key distribution that will allow the sender and the receiver authenticate each other messages. Next in order to prevent unauthorised people to access the communication channel, the two parties must agree to the keys used and to be able to confirm them when needed along with being able to control them, maintain the key freshness (7) so no replay attacks could be performed and also to protect secrets of old communications in the case that an unauthorised person gains access to a session key. All the above aspects, in my opinion are critical in order to maintain privacy in the communication channel. According to the article (7) which I agree with, some compromises should be taken in order to have the security options tailored to the needs of your systems. In our case the ACARS system was designed to have a small amount of load in transmitting data and therefore and IPsec with fixed pre-shared keys (7) would be very helpful because it has limited data exchanged in order to provide security. On the other hand, protocols based on asymmetric cryptosystems (7) are able to provide better security but in a higher data load cost. Wireless Communication Threat Model In order to be able to provide better solutions in the wireless communication channel, we must be able to identify the threat that are possible to be faced during the transfer of data. In order to do so we must have a threat model that is tailored to our needs. In order to create a threat model, we must also know the adversaries capabilities. In the case of wireless networks according to the article (8) authors, which are the one that ACARS uses, the adversary usually has the ability to receive and transmit data (8), should be able to monitor the network and in order to do the previous two, he must have knowledge on how the network was setup. Commonly, if the attacker is able to eavesdrop a wireless, he will be able to inject traffic (8) into the network. All of the above capabilities in my opinion are depended to the knowledge he has and to the money he is willing to spend in order to be able to perform such tasks. The main attacks he can perform to a wireless network has to do with spoofing attacks (8), replay attacks (8) which I believe is easily solved by the freshness aspect of security, eavesdropping (8) compromise or introduction of nodes, wireless jamming (8) and finally a denial of service (8) attack by increasing extremely the load of the network. ACARS Security per Honeywell Per Honeywell, ACARS is using a message security system that is able to provide message authentication, confidentiality and data integrity, which are the basic aspects that need to be protected. Based on an ICAO document regarding the security plan a public key infrastructure and other cryptographic algorithms are used in order to protect the data transmitted. More specifically, according to the ARINC specification 823 (4) the security of the messages is split in two different parts. The first part was published on 2007 and contains everything regarding the framework of the security, such as algorithms, protocols and message formats. The second parts are about the key management of this security mechanism and was published 1 year later and contains information regarding the key life cycle and the how a certificate is managed. Furthermore, two different security provisions were developed and each of them had different characteristics regarding the mechanisms used in order to protect the data transmitted. The first one is called ATN/OSI Security and it was described in the ICAO document 9880. This kind of security foresight used digital signatures which uses the Elliptic Curve Diffie-Hellman cryptographic algorithm combined with a SHA256 in order to generate and verify the signatures. As for Message authentication, it uses hashed MAC with a 32bit MAC length. A key agreement is used in order to share the public key that will then be used in order for the recipient to be able to derive the secret key and be able to decode the message sent. The second one is called ACARS Security ARINC 823. This one also uses the digital signatures in order to sign the message and the specifications of the digitals signatures are similar to the first security foresight, making use of the elliptic curve Diffie-Hellman algorithm combined with a SHA256 for the signature generation and verification. Again, for the message authentication a hashed MAC is being used but in this case the length of the MAC is not standard. It could be 32 bit, 64 bit or even 128 bit, with the default one to be the 32 bit. The main difference between the two security foresights is that the previous didnt require a confidentiality mechanism to be in place. On the other hand, this one uses for encryption and AES128 cipher algorithm that is mainly used to encrypt and decrypt the messages. Finally, the key establishment mechanism is similar on both security foresights, meaning that both of them use an elliptic curve Diffie-Hellman with SHA256 algorithm to provide the communication channel with a secret key agreement, shared public key and the derivation of the secret key. Threats As the technology is improved, the computers become more powerful, leading in the implementation of better security mechanisms but also in increasing amount of computing power that possible attackers have in their hands. This along with the ability given to the public to be able to track the flights using the ADS-B can have possible backdoors that can threaten the safety of the flights. The main use of this surveillance technology is for the improvement of the safety and efficiency of the flights. This technology also lead to the creation of a web application and smartphone application, that gave the ability to anyone to be able to track any aircraft in the world that had this technology active. Anyone with a cheap hardware setup could receive the information sent to the ground by the aircrafts. If an attacker is able to intercept these signals, he is able to perform passive attacks like eavesdropping the communications or furthermore, block the response from the ATC (jamming) and finally send his response back (message injection), could result in the attacker to be able to perform an active attack and penetrate the aircrafts navigation system. Another possible attack according the article (6) this attacks could result in the virtually modifying the trajectory of an aircraft (6). After the attacker, has gained access to the aircraft systems, he can receive information via the ACARS system. If the ACARS system is not protected correctly, the attacker will be able to exploit the systems and either insert false information to the avionics or just attach a virus or malware and have a constant access to the aircrafts avionics and information. Furthermore, the attacker could gain access to the FMS he will be able to mess with the navigation and flight planning such as waypoints, altitudes, speeds, alternate the destination airport of the flight etc. This will result to the attacker being in complete control of the aircraft, with the pilots not being able to do much in order to gain back the control of the aircraft. Although the ACARS system was updated regularly and the ACARS AMS was developed in order to provide end to end security, many airlines decided to not use it and instead provide some security by obscurity (6), which according to my opinion could lead in more risks and better security because no one has tested the security algorithms that are used and therefore if there is any vulnerability in the security algorithm, the company will never be aware of it, leaving the communication channel open to zero day attacks. The cost of the hardware needed to complete such an attack is not high. Using online shopping web applications or other sellers, the possible attacker will be able to buy the necessary hardware such as FMS hardware, air to ground transmitters, ACARS manager hardware and other hardware, in order to perform such an attack. By using one of the most known flight simulator software, combined with the necessary hardware and finally by exploiting any vulnerabilities in the security of ACARS and FMS systems, they can manage to gain control of the aircraft with low cost. There are many ways the attacker could gain access or perform attacks against the aircrafts. These ways may include attacks via the internet by exploiting bugs in web applications, vulnerabilities against software, SQL injections to databases or other vulnerabilities that are not fixed in mobile applications. There are two different threat models according to the authors of the article On perception and reality in the wireless air traffic communication security (6). The two different threat models are the traditional aviation threat model (6) and the Modern threat model (6). The main difference between these two according the article are that the software-defined radios are widely available to the public and along with them to possible attackers and the change between analogue instruments and digital instruments, with the second ones to give the ability to the users to transmit more data in electronic form. These could lead to an increase in the abilities hackers to eavesdrop, modify and inject data on the communications channel. The traditional threat model is used from when the first forms of communication were implemented in aviation. As years passed the communication channels were improved and the amount of data that was transmitted increased rapidly. The authors of the article characterize the article as naÃÆ'Â ¯ve (6) of the reasons of inferior technological capabilities and financial capabilities, requirement of inside knowledge and the use of analog communication. (6). I can agree with their opinion because I believe that indeed the threat model is very old and due to the new technologies, along with the low cost of a setup that could allow to interfere with the communications of an aircraft, the risk will be much higher. The second threat model is the modern threat model. It has major changes from the first one due to the increased digitalisation and automation (6) of the aircrafts communication channels. Also, the increased technological capabilities (6) such as cheap hardware could lead to possible attacks that could not be performed when the first threat model was developed. Finally, people could easily gain aviation knowledge (6) from the internet, flight simulator software, which could increase the seriousness of the attacks that could be performed. For the above reasons and from my own experience with aviation knowledge and flight simulator software, I would agree that this model is more up to date and more tailored to identify the threats that todays aircraft face. Concluding on the above-mentioned information, the aviation world and more specifically the security of the aircrafts, crews and passengers are far from safe. This is because even with the security measures that are already researched, the airlines do not always implement them. Also, the technology required and the cost of acquiring such technology makes it easier for attackers to perform either passive or active attacks against aircrafts. The above when combined with the knowledge of an attacker can lead to great threats against the aircrafts. In order to maintain the aviation world safe, the need to reassess the risk of attacks under realistic system models and the development of appropriate countermeasures (6) should be identified and embraced along with new end to end security implementations are proposed and if approved implemented by airlines. Such security mechanisms must be tested in order to be totally sure that all vulnerabilities are patched and that it will never have a backdoor that could allow an attacker to perform an attack. In my opinion in order to be able to be sure that a security mechanisms that will be placed is totally secure, we must first learn our adversaries, understand their capabilities, intentions, motive and upon all knowledge and financial state. Next, we must understand what passive and active attacks an adversary can perform. If we manage to understand the above aspects of our adversaries, then we must understand what has to be done in order to prevent them from launching an attack against the aircraft- ground communications channel and ground network. By having the necessary information about the adversaries and the protection mechanisms that we can implement, then we must evaluate those already implemented and find ways to enhance them. References Smith, M., M. Strohmeier, V. Lenders, and I. Martinovic. On the security and privacy of ACARS. (016 Integrated Communications Navigation and Surveillance (ICNS)): 1-27. Web. 15 Feb. 2017. Aircraft Communications, Addressing and Reporting System. Aircraft Communications, Addressing and Reporting System SKYbrary Aviation Safety. N.p., n.d. Web. 14 Feb. 2017. Aircraft Communications Addressing and Reporting System (ACARS). Aircraft Communications Addressing and Reporting System (ACARS). N.p., n.d. Web. 14 Feb. 2017. Olive, Michael . ACARS Message Security (AMS) as a Vehicle for Validation of ICAO Doc. 9880 Part IV-B Security Requirements. Proc. of ICAO ACP WG-M Meeting, Belgium, Brussels. N.p.: n.p., n.d. 1-12. Print. Yue, M., and X. Wu. The Approach of ACARS Data Encryption and Authentication. 2010 International Conference on Computational Intelligence and Security (2010): 556-60. Web. 10 Feb. 2017. Strohmeier, Martin, Matthias Schafer, Rui Pinheiro, Vincent Lenders, and Ivan Martinovic. On Perception and Reality in Wireless Air Traffic Communication Security. IEEE Transactions on Intelligent Transportation Systems (2016): 1-20. Web. Akram, Raja Naeem, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, and Serge Chaumette. Security and performance comparison of different secure channel protocols for Avionics Wireless Networks. 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC) (2016): n. pag. Web. Akram, Raja Naeem, Konstantinos Markantonakis, Royal Holloway, Sharadha Kariyawasam, Shahid Ayub, Amar Seeam, and Robert Atkinson. Challenges of security and trust in Avionics Wireless Networks. 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC) (2015): n. pag. Web. Network Graphic. Digital image. ATC Data Link News. N.p., n.d. Web. 17 Feb. 2017.

Friday, January 17, 2020

A Brief Introduction to Methods of Word Formation in English

A Brief Introduction to Methods of Word Formation in English I. Introduction Linguistics is the scientific study of human language. Linguistics can be broadly broken into three categories or subfields of study: language form, language meaning, and language in context. The earliest known activities in descriptive linguistics have been attributed to Panini around 500 BCE, with his analysis of Sanskrit in Ashtadhyayi. The first subfield of linguistics is the study of language structure, or grammar. This focuses on the system of ruled followed by the users of a language.It includes the study of morphology (the formation and composition of words), syntax (the formation and composition of phrases and sentences from these words), and phonology (sound system). Phonetics is a related branch of linguistics concerned with the actual properties of speech sounds and nonspeech sounds, and how they are produced and perceived. This paper is going to concentrate on part of morphology word formation, of the English language. Generally, in linguistics, word formation is the creation of a new word.Word formation is sometimes contrasted with semantic change, which is a change in a single word’s meaning. The boundary between word formation and semantic change can be difficult to define: a new use of an old word can be seen as a new word derived from an old one and identical to it in form. Word formation can also be contrasted with the formation of idiomatic expressions, although words can be formed from multi-word phrases. There are various mechanisms of word formation and this paper is going to present them in detail with necessary explanations and examples. II. Methods of Word Formations 1. Agglutination.In contemporary linguistics, agglutination usually refers to the kind of morphological derivation in which there is a one-to-one correspondence between affixes and syntactical categories. Language that use agglutination widely are called agglutinative languages. Agglutinati ve languages are often contrasted both with language in which syntactic structure is expressed solely by means of word order and auxiliary words (isolating language) and with languages in which a single affix typically express several syntactic categories and a single category may be expressed by several different affixes (as is the case in the inflectional or fusional anguage). However, both fusional and isolating language may use agglutinative in the most-often-used constructs, and use agglutination heavily in certain contexts, such as word derivation. This is the case in English, which has an agglutinated plural maker – (e)s and derived words such as shame ·less ·ness. 2. Back-formation In etymology, back-formation is the process of creating a new lexeme, usually by removing actual or supposed affixes. The resulting neologism is called a back-formation, a term coined by James Murray in 1889.Back-formation is different from clipping – back-formation may change th e part of speech or the word’s meaning, whereas clipping creates shortened words from longer words, but does not change the part of speech or the meaning of the word. For example, the noun resurrection was borrowed from Latin, and the verb resurrect was the back-formed hundreds of years later from it by removing the ion suffix. This segmentation of resurrection into resurrect + ion was possible because English had examples of Latinate words in the form of verb and verb + -ion pairs, such as opine/opinion.These became the pattern for many more such pairs, where a verb derived from a Latin supine stem and a noun ending in ion entered the language together, such as insert/insertion, project/projection, etc. Back-formation may be similar to the reanalyzes of folk etymologies when it rests on an erroneous understanding of the morphology of the longer word. For example, the singular noun asset is a back-formation from the plural assets. However, assets is originally not a plural: i t is a loan-word from Anglo-Norman asetz (modern French assez).The –s was reanalyzed as a plural suffix. Many words came into English by this route: Pease was once a mass noun but was reinterpreted as a plural, leading to the back-formation pea. The noun statistic was likewise a back-formation from the field of study statistics. In Britain, the verb burgle came into use in the 19th century as a back-formation from burglar (which can be compared to the North American verb burglarize formed by suffixation). Even though many English words are formed this way, new coinages may sound strange, and are often used for humorous effect.For example, gruntled (from disgruntled) would be considered a barbarism, and used only in humorous contexts, such as by P. G. Wodehouse, who wrote â€Å"I wouldn’t say he was disgruntled, but by no stretch of the imagination could be described as gruntled†. He comedian George Gobel regularly used original back-formations in his humorous mo nologues. Bill Bryson mused that the English language would be richer if we could call a tidy-haired person shevelled – as an opposite to dishevelled. In the American sitcom Scrubs, the character Turk once said when replying to Dr. Cox, â€Å"I don’t disdain you!It’s quite the opposite – I dain you. † Back-formations frequently begin in colloquial use and only gradually become accepted. For example, enthuse (from enthusiasm) is gaining popularity, though it is still considered substandard by some today. The immense celebrations in Britain at the news of the relief of the Siege of Marketing briefly created the verb to maffick, meaning to celebrate both extravagantly and publicly. â€Å"Maffick† is a back-formation from Mafeking, a place-name that was treated humorously as a gerund or participle. There are many other examples of back-formation in the English language. . Acronym An acronym is an abbreviation formed from the initial components i n a phrase or a word. These components may be individual letters (as in CEO) or parts of words (as in Benelux and Ameslan). There is no universal agreement on the precise definition of various names for such abbreviations nor on written usage. In English and most other languages, such abbreviations historically had limited use, but they became much more common in the 20th century. Acronyms are a type of word formation process, and they are viewed as a subtype of blending.There are many different types of the word-formation process acronym. Here are several pairs of them. (1) Pronounced as a word, containing only initial letters, like the followings. AIDS: acquired immune deficiency syndrome NATO: North Atlantic Treaty Organization Scuba: self-contained underwater breathing apparatus Laser: Light Amplification by Stimulated Emission of Radiation (2) Pronounced as a word, containing non-initial letters Amphetamine: alpha-mehyl-phenethylamine Interpol: International Criminal Police Org anization Nabisco: National Biscuit Company 3)Pronounced as a word, containing a mixture of initial and non-initial letters Necco: New England Confectionery Company Radar: radio detection and ranging 4. Clipping In linguistics, clipping is the word formation process which consists in the reduction of a word to one of its parts. Clipping is also known as â€Å"truncation† or â€Å"shortening†. According to Marchand, clippings are not coined as words belonging to the standard vocabulary of a language. They originate as terms off a special group like schools, army, police, the medical profession, etc. in the intimacy of a milieu where a hint is sufficient to indicate the whole. For example, exam(ination), math(ematics), and lab(oratory) originated in school lang. while clipping terms of some influential groups can pass into common usage, becoming part of Standard English, clipping of a society unimportant class or group will remain group slang. Also, clipping mainly consi sts of the following types: back clipping, fore-clipping, middle clipping and complex clipping. (1) Back clipping Back clipping is the most common type, in which the beginning is retained.The unclipped original may be either a simple or a composite. Examples are: ad (advertisement), cable (cablegram), doc (doctor), exam (examination), fax (facsimile), gas (gasoline), gym(gymnastics, gymnasium), memo (memorandum), mutt(muttonhead), pub (public house), pop (popular music). (2) Fore-clipping Fore-clipping retains the final part. Examples are: chute (parachute), coon (raccoon), gator (alligator), phone (telephone), pike (turnpike), varsity (university). (3) Middle-clipping In middle clipping, the middle of the word is retained.Examples are: flu (influenza), jams or jammies (pajamas/pyjamas), polly (Apollinairs), shrink (head-shrinker), tec (detective). (4) Complex clipping Clipped dorms are also used in compounds. One part of the original compound most often remains intact. Examples are : cablegram (cable telegram), opart (optical art), org-man (organization man), and linocut (linoleum cut). Sometimes both halves of a compound are clipped as in navicert (navigation certification). In these cases it is difficult to know whether the resultant formation should be treated as a clipping or as a blend, for the border between the two types is not always clear.According to Bauer, the easiest way to draw the distinction is to say that those forms which retain compound stress are clipped compound, whereas those that take simple word stress are not. By this criterion bodbiz, Chicom, Comsymp, Intelsat, midcult, pro-am, photo op, sci-fi, and sitcom are all compounds made of clippings. 5. Semantic loan A semantic loan is a process of borrowing semantic meaning (rather than lexical items) from another language, very similar to the formation of calques.In this case, however, the complete word in the borrowing language already exists; the change is that its meaning is extended to i nclude another meaning its existing translation has in the leading language. Calques, loanwords and semantic loans are often grouped roughly under the phrase â€Å"borrowing†. Semantic loans often occur when two language are in close contact. 6. Compound In linguistics, a compound is a lexeme that consists of more than one stem, compounding or composition is the word formation that creates compound lexemes.Compounding or word-compounding refers to the faculty and device of a language to form new words by combing or putting together old words. In other words, compound, compounding or word-compounding occurs when a person attaches two or more words together to make them one word. The meanings of the words interrelate from the meanings of the words in isolation. Also, there is incorporation formation. Incorporation is a phenomenon by which a word, usually a verb, forms a kind of compound with, for instance, its direct object or adverbial modifier, while retaining its original sy ntactic function.Incorporation is central to many polysynthetic languages such as those found in North America, but polysynthetic does not necessary imply incorporation. Neither does the presence of incorporation in a language imply that that language is polysynthetic. Though not regularly. English shows some instrument incorporation, as in breastfeed, and direct object incorporation, as in babysit. Etymologically, such verbs in English are usually back-formations: the verbs breastfeed and babysit are formed from the adjective breast-fed and the noun babysitter respectively.Incorporation and pain compounding many be fuzzy categories: consider backstabbing, name-calling, and axe-murder. In many cases, a phrase with an incorporated noun carries a different meaning with respect to the equivalent phrase where the noun is not incorporated into the verb. The difference seems to hang around the generality and definiteness of the statement. The incorporated phrase is usually generic and ind efinite, while the non-incorporated one is more specific. 7. ConversionIn linguistics, conversion, also called zero derivation, is a kind of word transformation: specifically, it is the creation of a word (of a new word class) from an existing word (of a different word class) without any change in form. For example, the noun green in golf (referring to a putting-green) is derived ultimately from the adjective green. Conversions from adjectives to nouns and vice versa are both very common and unnotable in English: much more remarked upon is the creation of a verb by converting a noun or other word (e. g. , the adjective clean becomes the verb to clean). 8. LoanwordA loanword (or loan word) is a word borrowed from a donor language and incorporated into a recipient language. By contrast, a calque or loan translation is a related concept where the meaning or idiom is borrowed rather than the lexical item itself. The word loanword is itself a calque of the German Lehnwort, while calque i s a loanword from French. The terms borrow and loanword, although traditional, conflict with the ordinary meaning of those words because nothing is returned to the donor languages. However, note that this metaphor is not isolated to the concept of loanwords, but also found in the idiom â€Å"to borrow an idea. An additional issue with the term loanword is that it implies that the loaning is limited to one single word as opposed to deja vu, an English loanword from French. While this phrase may be used as one lexical item by English speakers, that is to say, an English speaker would not say only deja to convey the meaning associated with the full term deja vu, in the donor language (French), speakers would be aware of the phrase consisting of two words. For simplicity, adopt/adoption or adapt/adaption are used by many linguists, either in parallel to, or in preference to, these words.Some researchers also use the term lexical borrowing. Some English loanwords remain relatively faith ful to the donor language’s phonology, even though a particular phoneme might not exist or have contrastive status in English. The majority of English affixes, such as -un, –ing, and –ly, were present in older forms in Old English. However, a few English affixes are borrowed. For example, the agentive suffix –er, which is very prolific, is borrowed unlimitedly from Latin- arius. The English verbal suffix –ize comes from Greek –izein via Latin –izare. 9.Onomatopoeia Onomatopoeia (common term is sound word) refers to the property of such words. Common occurrences of onomatopoeia include animal noises, such as â€Å"oink† or â€Å"meow† or â€Å"roar† or â€Å"chirp†. Some other very common English-language examples include hiccup, zoom, bang, beep, moo, and splash. Machines and their sounds are also often described with onomatopoeia, as in honk or beep-beep for the horn of an automobile, and vroom or brum for the engine. When someone speaks of a mishap involving an audible arcing of electricity, the word â€Å"zap† is often used.For animal sounds, words like quack (duck), moo (cow), bark or woof (dog), roar (lion), meow or purr (cat) and baa (sheep) are typically used in English. Some of these words are used both as nouns and as verbs. Sometimes things are named from the sounds they make. In English, for example, there is the universal fastener which is named for the onomatopoeia of the sound it makes: the zip (in the UK) or zipper (in the U. S. ). many birds are named after their calls, such as the Bobwhite quail, the Weero, the Morepork, the killdeer, chickadee, the cuckoo, the chiffchaff, the whooping crane and the whip-poor-will. 0. Phono-semantic matching Phono-semantic matching (PSM) is a linguistic term referring to camouflaged borrowing in which a foreign word is matched with a phonetically and semantically similar pre-existent native word/root. It may alternatively be de fined as the entry of a multisourced neologism that preserves both the meaning and the proximate sound of the parallel expression in the source language, using pre-existent words/roots of the target language. Phono-semantic matching is distinct from calquing. While calquing includes (semantic) translation, it does not consist of phonetic matching (i. . retaining the proximate sound of the borrowed word through matching it with a similar-sounding pre-existent word/morpheme in the target language). Phone-semantic matching is also distinct from homophonic translation, which retains only the sound, and not the semantics. 11. Eponym An eponym is a person or thing, whether real or fictional, after which a particular place, tribe, era, discovery. Or other item is named or thought to be named. Eponyms are aspects of etymology. There are different types of eponym which come from various area.Places and towns can also be given an eponymous name through a relationship (real or imagined) to an important figure. Peloponnesus, for instance, was said to derive its name from the Greek god Pelops. In historical times, new towns have often been named (and older communities renamed) after their founders, discoverers, or after notable individuals. Examples include Vancouver, British Columbia, named after the explorer George Vancouver; and Prince Albert, Saskatchewan, originally called Isbister’s Settlement but renamed after Queen Victoria’s husband and consort in 1866.Also, in science and technology, discoveries and innovations are often named after the discoverer (or supposed discoverer) to honor some other influential workers. Examples are Avogadro’s number, he Diesel engine, Alzheimer’s disease, and the Apgar score. Because proper nouns are capitalized in English, the usual default for eponyms is to capitalize the eponymous part of a term. The common-noun part is not capitalized (unless it is part of a title or it is the first word in a sentence). F or example, in Parkinson disease (named after James Parkinson), Parkinson is capitalized, but disease is not.However, some eponymous adjectives are nowadays entered in many dictionaries as lowercases when they have evolved a common status, no longer deriving their meaning from the proper-noun origin. For example, Herculean when referring to Hercules himself, but often herculean when referring to the figurative generalized extension sense. For any given term, one dictionary may enter only lowercase or only cap, whereas other dictionaries may recognize the capitalized version as a variant, either equally common as, or less common than, the first-listed styling (marked with labels such as â€Å"or†, â€Å"also†, â€Å"often† or â€Å"sometimes†).English can use either genitive case or attributive position to indicate the adjectival nature of the eponymous part of the term. (In other words, that part may be either possessive or nonpossessive. ) Thus Parkinson ’s disease and Parkinson disease are both acceptable. Medical dictionaries have been shifting toward nonpossessive styling in recent decades, thus Parkinson disease is more likely to be used in the latest medical literature (especially in post prints) than is Parkinson’s disease. American and British English spelling differences can occasionally apply to eponyms.For example, American style would typically be cesarean section whereas British style would typically be caesarean section. III. Conclusion In a word, there are several ways of word-formation in the English language. However, not all these ways are isolated from each other. In fact, some of them all overlapped which means that a new word may be considered as a result of different ways of formation. Also, understanding these various methods of forming a new word, as an integrated component of linguistics, enables us to dig out the hidden rules behind thousands of new emerging words.Therefore, although many new w ords would appear as the world move on and new technologies are developed, people are able to grasp these new words with ease because of these word-formation rules. Meanwhile, people are exposed to different accesses of forming new words with already existing ones to express the unexpected phenomenon or tectonics in the future. Works cited: (1) Crystal, David. A Dictionary of Linguistics and Phonetics, Sixth Edition, Blackwell Publishers, 2008. (2) Fischer, Roswitha.Lexical change in present-day English: A corpus-based study of the motivation, institutionalization, and productivity of creative neologisms. 1998 (3) Marchand, Hans. The Categories and Types of Present-Day English Word-formation. Munchen: C. H. Beck'sche Verlagsbuchhandlung,1969 (4) Ghil'ad Zuckermann,  Language Contact and Lexical Enrichment in Israeli Hebrew, Palgrave Macmillan, 2003 (5) Baker, Mark C. The Polysynthesis Parameter. Oxford: Oxford University Press,1998 (6) Mithun, Marianne. The evolution of noun incor poration. Language,  1984 A Brief Introduction to Methods of Word Formation in English A Brief Introduction to Methods of Word Formation in English I. Introduction Linguistics is the scientific study of human language. Linguistics can be broadly broken into three categories or subfields of study: language form, language meaning, and language in context. The earliest known activities in descriptive linguistics have been attributed to Panini around 500 BCE, with his analysis of Sanskrit in Ashtadhyayi. The first subfield of linguistics is the study of language structure, or grammar. This focuses on the system of ruled followed by the users of a language.It includes the study of morphology (the formation and composition of words), syntax (the formation and composition of phrases and sentences from these words), and phonology (sound system). Phonetics is a related branch of linguistics concerned with the actual properties of speech sounds and nonspeech sounds, and how they are produced and perceived. This paper is going to concentrate on part of morphology word formation, of the English language. Generally, in linguistics, word formation is the creation of a new word.Word formation is sometimes contrasted with semantic change, which is a change in a single word’s meaning. The boundary between word formation and semantic change can be difficult to define: a new use of an old word can be seen as a new word derived from an old one and identical to it in form. Word formation can also be contrasted with the formation of idiomatic expressions, although words can be formed from multi-word phrases. There are various mechanisms of word formation and this paper is going to present them in detail with necessary explanations and examples. II. Methods of Word Formations 1. Agglutination.In contemporary linguistics, agglutination usually refers to the kind of morphological derivation in which there is a one-to-one correspondence between affixes and syntactical categories. Language that use agglutination widely are called agglutinative languages. Agglutinati ve languages are often contrasted both with language in which syntactic structure is expressed solely by means of word order and auxiliary words (isolating language) and with languages in which a single affix typically express several syntactic categories and a single category may be expressed by several different affixes (as is the case in the inflectional or fusional anguage). However, both fusional and isolating language may use agglutinative in the most-often-used constructs, and use agglutination heavily in certain contexts, such as word derivation. This is the case in English, which has an agglutinated plural maker – (e)s and derived words such as shame ·less ·ness. 2. Back-formation In etymology, back-formation is the process of creating a new lexeme, usually by removing actual or supposed affixes. The resulting neologism is called a back-formation, a term coined by James Murray in 1889.Back-formation is different from clipping – back-formation may change th e part of speech or the word’s meaning, whereas clipping creates shortened words from longer words, but does not change the part of speech or the meaning of the word. For example, the noun resurrection was borrowed from Latin, and the verb resurrect was the back-formed hundreds of years later from it by removing the ion suffix. This segmentation of resurrection into resurrect + ion was possible because English had examples of Latinate words in the form of verb and verb + -ion pairs, such as opine/opinion.These became the pattern for many more such pairs, where a verb derived from a Latin supine stem and a noun ending in ion entered the language together, such as insert/insertion, project/projection, etc. Back-formation may be similar to the reanalyzes of folk etymologies when it rests on an erroneous understanding of the morphology of the longer word. For example, the singular noun asset is a back-formation from the plural assets. However, assets is originally not a plural: i t is a loan-word from Anglo-Norman asetz (modern French assez).The –s was reanalyzed as a plural suffix. Many words came into English by this route: Pease was once a mass noun but was reinterpreted as a plural, leading to the back-formation pea. The noun statistic was likewise a back-formation from the field of study statistics. In Britain, the verb burgle came into use in the 19th century as a back-formation from burglar (which can be compared to the North American verb burglarize formed by suffixation). Even though many English words are formed this way, new coinages may sound strange, and are often used for humorous effect.For example, gruntled (from disgruntled) would be considered a barbarism, and used only in humorous contexts, such as by P. G. Wodehouse, who wrote â€Å"I wouldn’t say he was disgruntled, but by no stretch of the imagination could be described as gruntled†. He comedian George Gobel regularly used original back-formations in his humorous mo nologues. Bill Bryson mused that the English language would be richer if we could call a tidy-haired person shevelled – as an opposite to dishevelled. In the American sitcom Scrubs, the character Turk once said when replying to Dr. Cox, â€Å"I don’t disdain you!It’s quite the opposite – I dain you. † Back-formations frequently begin in colloquial use and only gradually become accepted. For example, enthuse (from enthusiasm) is gaining popularity, though it is still considered substandard by some today. The immense celebrations in Britain at the news of the relief of the Siege of Marketing briefly created the verb to maffick, meaning to celebrate both extravagantly and publicly. â€Å"Maffick† is a back-formation from Mafeking, a place-name that was treated humorously as a gerund or participle. There are many other examples of back-formation in the English language. . Acronym An acronym is an abbreviation formed from the initial components i n a phrase or a word. These components may be individual letters (as in CEO) or parts of words (as in Benelux and Ameslan). There is no universal agreement on the precise definition of various names for such abbreviations nor on written usage. In English and most other languages, such abbreviations historically had limited use, but they became much more common in the 20th century. Acronyms are a type of word formation process, and they are viewed as a subtype of blending.There are many different types of the word-formation process acronym. Here are several pairs of them. (1) Pronounced as a word, containing only initial letters, like the followings. AIDS: acquired immune deficiency syndrome NATO: North Atlantic Treaty Organization Scuba: self-contained underwater breathing apparatus Laser: Light Amplification by Stimulated Emission of Radiation (2) Pronounced as a word, containing non-initial letters Amphetamine: alpha-mehyl-phenethylamine Interpol: International Criminal Police Org anization Nabisco: National Biscuit Company 3)Pronounced as a word, containing a mixture of initial and non-initial letters Necco: New England Confectionery Company Radar: radio detection and ranging 4. Clipping In linguistics, clipping is the word formation process which consists in the reduction of a word to one of its parts. Clipping is also known as â€Å"truncation† or â€Å"shortening†. According to Marchand, clippings are not coined as words belonging to the standard vocabulary of a language. They originate as terms off a special group like schools, army, police, the medical profession, etc. in the intimacy of a milieu where a hint is sufficient to indicate the whole. For example, exam(ination), math(ematics), and lab(oratory) originated in school lang. while clipping terms of some influential groups can pass into common usage, becoming part of Standard English, clipping of a society unimportant class or group will remain group slang. Also, clipping mainly consi sts of the following types: back clipping, fore-clipping, middle clipping and complex clipping. (1) Back clipping Back clipping is the most common type, in which the beginning is retained.The unclipped original may be either a simple or a composite. Examples are: ad (advertisement), cable (cablegram), doc (doctor), exam (examination), fax (facsimile), gas (gasoline), gym(gymnastics, gymnasium), memo (memorandum), mutt(muttonhead), pub (public house), pop (popular music). (2) Fore-clipping Fore-clipping retains the final part. Examples are: chute (parachute), coon (raccoon), gator (alligator), phone (telephone), pike (turnpike), varsity (university). (3) Middle-clipping In middle clipping, the middle of the word is retained.Examples are: flu (influenza), jams or jammies (pajamas/pyjamas), polly (Apollinairs), shrink (head-shrinker), tec (detective). (4) Complex clipping Clipped dorms are also used in compounds. One part of the original compound most often remains intact. Examples are : cablegram (cable telegram), opart (optical art), org-man (organization man), and linocut (linoleum cut). Sometimes both halves of a compound are clipped as in navicert (navigation certification). In these cases it is difficult to know whether the resultant formation should be treated as a clipping or as a blend, for the border between the two types is not always clear.According to Bauer, the easiest way to draw the distinction is to say that those forms which retain compound stress are clipped compound, whereas those that take simple word stress are not. By this criterion bodbiz, Chicom, Comsymp, Intelsat, midcult, pro-am, photo op, sci-fi, and sitcom are all compounds made of clippings. 5. Semantic loan A semantic loan is a process of borrowing semantic meaning (rather than lexical items) from another language, very similar to the formation of calques.In this case, however, the complete word in the borrowing language already exists; the change is that its meaning is extended to i nclude another meaning its existing translation has in the leading language. Calques, loanwords and semantic loans are often grouped roughly under the phrase â€Å"borrowing†. Semantic loans often occur when two language are in close contact. 6. Compound In linguistics, a compound is a lexeme that consists of more than one stem, compounding or composition is the word formation that creates compound lexemes.Compounding or word-compounding refers to the faculty and device of a language to form new words by combing or putting together old words. In other words, compound, compounding or word-compounding occurs when a person attaches two or more words together to make them one word. The meanings of the words interrelate from the meanings of the words in isolation. Also, there is incorporation formation. Incorporation is a phenomenon by which a word, usually a verb, forms a kind of compound with, for instance, its direct object or adverbial modifier, while retaining its original sy ntactic function.Incorporation is central to many polysynthetic languages such as those found in North America, but polysynthetic does not necessary imply incorporation. Neither does the presence of incorporation in a language imply that that language is polysynthetic. Though not regularly. English shows some instrument incorporation, as in breastfeed, and direct object incorporation, as in babysit. Etymologically, such verbs in English are usually back-formations: the verbs breastfeed and babysit are formed from the adjective breast-fed and the noun babysitter respectively.Incorporation and pain compounding many be fuzzy categories: consider backstabbing, name-calling, and axe-murder. In many cases, a phrase with an incorporated noun carries a different meaning with respect to the equivalent phrase where the noun is not incorporated into the verb. The difference seems to hang around the generality and definiteness of the statement. The incorporated phrase is usually generic and ind efinite, while the non-incorporated one is more specific. 7. ConversionIn linguistics, conversion, also called zero derivation, is a kind of word transformation: specifically, it is the creation of a word (of a new word class) from an existing word (of a different word class) without any change in form. For example, the noun green in golf (referring to a putting-green) is derived ultimately from the adjective green. Conversions from adjectives to nouns and vice versa are both very common and unnotable in English: much more remarked upon is the creation of a verb by converting a noun or other word (e. g. , the adjective clean becomes the verb to clean). 8. LoanwordA loanword (or loan word) is a word borrowed from a donor language and incorporated into a recipient language. By contrast, a calque or loan translation is a related concept where the meaning or idiom is borrowed rather than the lexical item itself. The word loanword is itself a calque of the German Lehnwort, while calque i s a loanword from French. The terms borrow and loanword, although traditional, conflict with the ordinary meaning of those words because nothing is returned to the donor languages. However, note that this metaphor is not isolated to the concept of loanwords, but also found in the idiom â€Å"to borrow an idea. An additional issue with the term loanword is that it implies that the loaning is limited to one single word as opposed to deja vu, an English loanword from French. While this phrase may be used as one lexical item by English speakers, that is to say, an English speaker would not say only deja to convey the meaning associated with the full term deja vu, in the donor language (French), speakers would be aware of the phrase consisting of two words. For simplicity, adopt/adoption or adapt/adaption are used by many linguists, either in parallel to, or in preference to, these words.Some researchers also use the term lexical borrowing. Some English loanwords remain relatively faith ful to the donor language’s phonology, even though a particular phoneme might not exist or have contrastive status in English. The majority of English affixes, such as -un, –ing, and –ly, were present in older forms in Old English. However, a few English affixes are borrowed. For example, the agentive suffix –er, which is very prolific, is borrowed unlimitedly from Latin- arius. The English verbal suffix –ize comes from Greek –izein via Latin –izare. 9.Onomatopoeia Onomatopoeia (common term is sound word) refers to the property of such words. Common occurrences of onomatopoeia include animal noises, such as â€Å"oink† or â€Å"meow† or â€Å"roar† or â€Å"chirp†. Some other very common English-language examples include hiccup, zoom, bang, beep, moo, and splash. Machines and their sounds are also often described with onomatopoeia, as in honk or beep-beep for the horn of an automobile, and vroom or brum for the engine. When someone speaks of a mishap involving an audible arcing of electricity, the word â€Å"zap† is often used.For animal sounds, words like quack (duck), moo (cow), bark or woof (dog), roar (lion), meow or purr (cat) and baa (sheep) are typically used in English. Some of these words are used both as nouns and as verbs. Sometimes things are named from the sounds they make. In English, for example, there is the universal fastener which is named for the onomatopoeia of the sound it makes: the zip (in the UK) or zipper (in the U. S. ). many birds are named after their calls, such as the Bobwhite quail, the Weero, the Morepork, the killdeer, chickadee, the cuckoo, the chiffchaff, the whooping crane and the whip-poor-will. 0. Phono-semantic matching Phono-semantic matching (PSM) is a linguistic term referring to camouflaged borrowing in which a foreign word is matched with a phonetically and semantically similar pre-existent native word/root. It may alternatively be de fined as the entry of a multisourced neologism that preserves both the meaning and the proximate sound of the parallel expression in the source language, using pre-existent words/roots of the target language. Phono-semantic matching is distinct from calquing. While calquing includes (semantic) translation, it does not consist of phonetic matching (i. . retaining the proximate sound of the borrowed word through matching it with a similar-sounding pre-existent word/morpheme in the target language). Phone-semantic matching is also distinct from homophonic translation, which retains only the sound, and not the semantics. 11. Eponym An eponym is a person or thing, whether real or fictional, after which a particular place, tribe, era, discovery. Or other item is named or thought to be named. Eponyms are aspects of etymology. There are different types of eponym which come from various area.Places and towns can also be given an eponymous name through a relationship (real or imagined) to an important figure. Peloponnesus, for instance, was said to derive its name from the Greek god Pelops. In historical times, new towns have often been named (and older communities renamed) after their founders, discoverers, or after notable individuals. Examples include Vancouver, British Columbia, named after the explorer George Vancouver; and Prince Albert, Saskatchewan, originally called Isbister’s Settlement but renamed after Queen Victoria’s husband and consort in 1866.Also, in science and technology, discoveries and innovations are often named after the discoverer (or supposed discoverer) to honor some other influential workers. Examples are Avogadro’s number, he Diesel engine, Alzheimer’s disease, and the Apgar score. Because proper nouns are capitalized in English, the usual default for eponyms is to capitalize the eponymous part of a term. The common-noun part is not capitalized (unless it is part of a title or it is the first word in a sentence). F or example, in Parkinson disease (named after James Parkinson), Parkinson is capitalized, but disease is not.However, some eponymous adjectives are nowadays entered in many dictionaries as lowercases when they have evolved a common status, no longer deriving their meaning from the proper-noun origin. For example, Herculean when referring to Hercules himself, but often herculean when referring to the figurative generalized extension sense. For any given term, one dictionary may enter only lowercase or only cap, whereas other dictionaries may recognize the capitalized version as a variant, either equally common as, or less common than, the first-listed styling (marked with labels such as â€Å"or†, â€Å"also†, â€Å"often† or â€Å"sometimes†).English can use either genitive case or attributive position to indicate the adjectival nature of the eponymous part of the term. (In other words, that part may be either possessive or nonpossessive. ) Thus Parkinson ’s disease and Parkinson disease are both acceptable. Medical dictionaries have been shifting toward nonpossessive styling in recent decades, thus Parkinson disease is more likely to be used in the latest medical literature (especially in post prints) than is Parkinson’s disease. American and British English spelling differences can occasionally apply to eponyms.For example, American style would typically be cesarean section whereas British style would typically be caesarean section. III. Conclusion In a word, there are several ways of word-formation in the English language. However, not all these ways are isolated from each other. In fact, some of them all overlapped which means that a new word may be considered as a result of different ways of formation. Also, understanding these various methods of forming a new word, as an integrated component of linguistics, enables us to dig out the hidden rules behind thousands of new emerging words.Therefore, although many new w ords would appear as the world move on and new technologies are developed, people are able to grasp these new words with ease because of these word-formation rules. Meanwhile, people are exposed to different accesses of forming new words with already existing ones to express the unexpected phenomenon or tectonics in the future. Works cited: (1) Crystal, David. A Dictionary of Linguistics and Phonetics, Sixth Edition, Blackwell Publishers, 2008. (2) Fischer, Roswitha.Lexical change in present-day English: A corpus-based study of the motivation, institutionalization, and productivity of creative neologisms. 1998 (3) Marchand, Hans. The Categories and Types of Present-Day English Word-formation. Munchen: C. H. Beck'sche Verlagsbuchhandlung,1969 (4) Ghil'ad Zuckermann,  Language Contact and Lexical Enrichment in Israeli Hebrew, Palgrave Macmillan, 2003 (5) Baker, Mark C. The Polysynthesis Parameter. Oxford: Oxford University Press,1998 (6) Mithun, Marianne. The evolution of noun incor poration. Language,  1984

Thursday, January 9, 2020

How Accurate Was the New World - 1434 Words

how historically accurate is the new world 1.) How historically accurate was the movie you watched? How do you know? Did any inaccuracies affect your perception of history? The new world was accurate for the most part, but there were few inaccuracies that occurred during the movie. For one, it is not historically proven that the relationship between Pocahontas and John Smith was a romance relationship, as portrayed in the movie. In The New World, Smith leaves Jamestown because of orders from the king, when in reality it has been proven he left Jamestown in 1609 because of a wounded knee when his powder horn exploded. In the movie Pocahontas is shown being given over to the settlers, this is inaccurate because Pocahontas was kidnapped†¦show more content†¦The English used their resources, and what they had around them, which they soon realized were rivers full of clams and fish. They explored further down the land to explore their territory, and learn of any vulnerable passages. Yet another thing that helped them is that the settlers kept receiving new supplies from England, and new men, and soon women, to help them farm and make up for the l oss of men during the winter. The settlers planted a food source, corn, which was a stable food income for them which reduced their risks of starvation.they had learned from the Indians as well as received help from them, as on how to farm, and received gifts from them, that helped them through the settlement. The English had built a town more civilized and modern, then what the Indians had, making it easier for them to protect themselves from the enemy, as well as keeping the enemy out, and them out of harm’s way. Lastly, they build houses that acted as windbreakers which helped many survive the cold winter. 4.) What aspects of their past did characters in your film carry with them into the mysterious future? Aspects of the past that the characters of The New World carried with themselves into the future is their actions, and behavior toward each other, the way they treated one another, with love, care, and respect. Pocahontas carried her spirituality,Show MoreRelatedEssay on Journalistic Responsibility and the Media1042 Words   |  5 Pageslistening to the news on the radio, reading the newspaper, or watching local news are all considered a form of journalism. Lately, the demand for newspapers and the amount of people whom get their information from newspapers has lessened greatly. As a matter of fact, in a report by the New York Times, in 2009, newspaper sales have dropped 7% from 2008. To add on that, web site audiences had increased 10.5% that year alone. However, I believe that the need for traditional and accurate news reportageRead MoreHow was the Gupta Empire (India) scientifically advanced? Describes scientific achievements of the time.1594 Words   |  7 Pagesthe technologies of the Gupta Empire (320-467), such as the development of a more accurate value for pi, the perfection of the modern numeral and decimal system; surgery, inoculation, the formulation of medical guides and a better calendar; and lunar astronomy, will be discussed in detail. First we will deal with the area of mathematics. One of the most recognized achievements of the Gupta period was the highly accurate calculation of pi, made by the renowned mathematician Aryabhata. Before this timeRead MoreThe Importance Of Animal Testing1240 Words   |  5 Pages Animal testing has long played a part in the science of testing, and it still plays a very important role in the medical world. Testing on animals in order to create a cure for AIDS is one thing, but testing on animals for human vanity is another. Animal testing is used to test the safety of a product. It has kept some very unsafe substances out of the cosmetic world. However, in this day in age, animal testing is not the only way to test the safety of a product. Animal testing in cosmetics hasRead MoreThe Concept of Mimesis in Platos Allegory of the Cave1160 Words   |  5 Pagesidea of mimesis is that a certain medium is a representation of reality. The concept of mimesis extends to art, media, and other texts. Mimesis also creates a sense of false reality, as often the art appears and is can be taken as real as the real world. In Plato’s Allegory of the Cave, the concept of mimesis is explained and through analysis of the novel and several other pieces of work can the impl ications and effects of mimesis be grasped. In The Allegory of the Cave, Plato’s concept that art isRead MorePrint Newspapers Are Becoming A Thing Of The Past933 Words   |  4 PagesIn today’s world, technology is present in every facet of our lives. The media is no exception. Print newspapers are becoming a thing of the past, with new digital, online news taking its place. This change in how we get our news comes with both advantages and drawbacks. While some may prefer printed news, there’s no denying the news is slower and has less ability to change. And while digital articles are quicker to publish and allow for user comments they can sometimes be less accurate when initiallyRead MoreArguments Of Proponents And Opponents Of The Safe And Accurate Food Labeling Act1744 Words   |  7 Pagesproponents and opponents of the Safe and Accurate Food Labeling Act. This paper will now analyze each issue to determine the strengths and weakness of each side’s argument. One argument that proponents make a bout genetically modified food is that they are no different than natural foods. An argument that opponents make is that genetically modified organisms have not been tested enough because they are fairly new and some scientist truly don’t have an understanding of how it will affect humans bodies differentlyRead MoreEssay On Saving Private Ryan1495 Words   |  6 PagesSaving Private Ryan Historical Accuracy In World War Two a brave group of United States, Canadian, and English troops made a last push against Germany who had invaded France. Many soldiers from the United States died fighting for their country among soldiers from other countries. The U.S. suffered almost 2000 casualties at Omaha Beach. The movie â€Å"Saving Private Ryan† includes scenes from Omaha Beach among other places. The movie Saving Private Ryan has many historical accuracies and is also historicallyRead MoreThe Keeping of Time Essay1355 Words   |  6 Pagesprominent of these is the keeping of accurate time measurements, which creates organized schedules to construct a prosperous business. (Galileo.) The first occasion time was measured in the most simple of ways goes back all the way to B.C.E. with sun dials. It was only until Galileo decided to measure time more than just looking at the sun for time of day. Galileo thought of the idea of the pendulum a device used to measure time. Though the pendulum was not very accurate, the very idea of one began theRead MoreUsa World Bank Essay1644 Words   |  7 PagesProblem Solution: USA World Bank United World Bank (UWB) has experienced success in numerous worldwide ventures but is in need of developing profitable new products to expand market share. Some form of descriptive statistics is needed in order for them to be successful in organizing, summarizing accurately and presenting correct data to the board members. This paper will outline how UWB can use research and statistical concepts to help frame the right problem, define end state goals, identity alternativesRead MoreLetter from Trenches971 Words   |  4 PagesA letter from the trenches Grade 9 Humanities - Assessment Task AOI: Health and Social Education Imagine you are a soldier fighting in the First World War in 1915†¦ Your character could be in the trenches on the Western Front as: British, French or German soldier a native conscript from one of the colonies in Africa or Asia a volunteer from a commonwealth ally like Canada or South Africa Alternatively, your character could be: a German or Russian soldier on the Eastern Front a Turkish

Wednesday, January 1, 2020

I Am Applying Intersectionality And The Sociological...

I am applying intersectionality and the sociological imagination to my intersecting identities: class, gender, and ethnicity. By employing intersectionality and the sociological imagination, I am analyzing how my positionality affected my personal experiences while connecting those events with society. I also included five peer-reviewed articles as supporting evidence. Kimberlà © Williams Crenshaw is an African American scholar, civil rights advocate, and law professor who developed the term intersectionality (Merriam-Webster 2017; Wikipedia 2017). Intersectionality is a theory that examines the intersecting point in which oppressive institutions (like racism, sexism, and classism) and one’ social categorization (such as race, gender, and†¦show more content†¦However, intersectionality gained prominence later (the 1980s and 90s) through African American feminist scholars, Crenshaw and Patricia Hill Collins, who criticized white feminists who failed to see that their skin color provided them with advantages that are not often offered to black feminists (Norris; Murphy-Erby; Zajiceck 2007). In time, intersectionality transitioned from an individual group’s experience (black women’s identity/ discrimination) to a larger framework. C. Wright Mills was an American sociologist who created the model of the sociological imagination. The Sociological imagination is a sociological outlook that links one’s experiences with societal occurrences. The Model consists of two components: â€Å"personal troubles† and â€Å"social issues,† as Mills puts it in â€Å"The Promise† an excerpt from his book The Sociological Imagination (1959,1; 1959, 3). â€Å"Personal troubles† is a micro experience which occurs at an individual level, in relation to others, and within the limits of a social setting (Mills 1959, 5). While â€Å"social issues,† is a macro involvement that surpasses an individual status and focuses on social structures and social/historical life (Mills 1959, 5; Cammer-Bechtold 2017). By connecting the two components, one realizes that broader social, historical conditions influence personal matters. To explain the sociological imagination, Mills used unemployment as an exam ple