Saturday, August 31, 2019
Biases and Judgment in the Hiring Process Essay
Recently, a new case manager for the radiology department in the hospital was hired. In order to maintain the good name of the hospital, our honored organization, and for it to stand for its very highly valued services and unequalled reputation, it is only inherent that we evaluate our practices. In this regard, yours truly is making a self-evaluation process as to the dignity and reasonability on the decision to hire Mr. Smith as a case manager over the rest of the eight final candidates. Deciding as to which one to choose among the many outstanding candidates was a difficult ordeal. Aside from this obvious task on selecting which, among the original seventeen (17) applicants, and narrowing them into eight (8) final candidates, is the best and the most suitable case-manager-to-be, there are other issues at hand that need to be addressed given my position. The two most dominant of these issues that yours truly needed to strongly consider are biases and egocentrism. Although Barton (2001) noted that ââ¬Å"everyone has biasesâ⬠, it is not an excuse not to minimize it or be aware of it and prevent it from happening. On the other hand, egocentrism happens when one ââ¬Å"can only view the world from their perspective and finds it difficult to understand any otherâ⬠. (Oakley 18) Biases and egocentrism are so inherent that they need to be warded off every time a major decision, such as hiring a key organization manager, is to be made. Combating oneââ¬â¢s bias is not simple but as long as there is patience, it can at least be reduced to its minimum level. In the case of yours truly, the following major measures are applied in order to succeed in eliminating or at least minimizing bias: a. Identifying the issue at hand and getting informed as much as possible, b. Not adhering to stereotyping and discrimination (age, gender, sexual orientation, physical appearance, ethnic origin, etcetera; and c. Applying the ââ¬Å"scientific methodâ⬠Once a person has enough knowledge about something, he or she is not easy to be deceived, especially by his or her own biases. Stereotyping and discrimination is so strong in this society, thus, yours truly always make a checklist in avoiding all these types of biases or causes of biases. The ââ¬Å"Scientific Methodâ⬠always works in reducing or eliminating bias. This means that yours truly always see to it to ccollect useful data by means of observing and experimenting, then formulate and test hypothesis. Even though this may sound so technical but it can be applied on almost every situation. As for egocentrism, almost the same procedures are applied in order to eliminate it during a decision-making process. Moreover, one simple rule applies here as well: the Golden Rule while stepping into someoneââ¬â¢s shoes. For situations where yours truly believe that egocentrism may takeover, the idea comes to mind carrying the solution. This solution is in the form of inner examining voice asking, ââ¬Å"If I am in his or her situation, how would I like to be treated? â⬠Thus, it is a mixed golden rule and empathy. The answer to the question always reduces/eliminates egocentricity. Decisions by expedience are considered as foundations of this organization. Decisions based on reflections give this organization its emotion and meaning. Thus, yours truly also utilize both, around 80% of decisions are expedience-based and the rest are based upon reflection. It is always important though, during the entire decision-making process to ââ¬Å"ensure that subjective decisions about omitting some subjects from the analysis do not cause biasâ⬠(Peat, 2001, p. 200) Decision-making is difficult and determination is important in succeeding. There are also factors deterring a person to perfect his/her decision-making abilities but once these factors are identified and admitted by the decision-maker, there are various ways to combat them.
Friday, August 30, 2019
Nick Names Formation in Lendang Nangka Sasak Menu-Mene Varity and Arabic Languages
NICK NAMES FORMATION IN LENDANG NANGKA SASAK MENU-MENE VARITY AND ARABIC LANGUAGES A Research Writting An NT Language and Culture Final Assignment Lecturer : Dr. Kamaludin Yusra By Samsul Bahri/12J012060/A ENGLISH EDUCATION GRADUATE PROGRAM MATARAM UNIVERSITY 2013 Acknowledgement I would like to express my gratefull and appreciation to my honourable lecturer Dr. Kamaludin Yusra, who would like to wait patiently for months for a word from me, then respond sympatically and constsructively within days. This assigment is written to accomplish a final task for Nusa Tenggara Languages Culture and Contact.I am interested to focus my study on Sasak varity nicknames formation as I found them important points to discuss to defining how nicknames in Sasak varity language are formed. So far I found it is hard to do this as the previous research for this merely. I tried hard to focus this research because lack of academic writting background knowledge and references. These are my become obstacles to do this research writting. But this first experience I hope will be my best teacher to do better in the future. I am afraid there are some mistakes in this simple research proposal, I do hope there will be some suggestions to make it better.Samsul Bahri CONTENTS Acknoledgementi Contentsii A. Introduction1 B. Research Questions3 C. Review of Literarture3 D. Research Methodology10 * Population10 * Sample11 * Data Collection11 * Data Analysis11 E. Discussion 11 F. Conclussion55 References Nick Names Formation in Lendang Nangka Sasak Menu-mene Varity and Arabic Languages Abstract This research paper discussed about nicknames formation in LendangNangka Sasak meno-mene dialect and Arabic nicnames. Most of sasak names are influenced by Arabic names as Islam is predominantly religion for Lendang Nangka village inhabitats.As names is identity of a person its has very strategic role for human being. Naming custom varies greatly from people to people. Terms relates personal names such as p ersonal name, family names, given names and Nick name. The nicknames formation in some cases similar to Arabic language. In Lendang Nangka Sasak meno-mene language. The meaning of Nicknames also has it own place in the dialect. A nickname is usually familiar or humorous but sometimes pointed or cruel name given to a person or place . Nicknames formations in the dialect through process of truncation (shortened), phonological process(replacing a stressed vowel and a onsonant), psychical characteristic and attributes. Nicknames also related to close friend and social solidarity. While in Arabic nicknames formation has its own way to form it. This research uses descriptive research methodology. The method used in this research is descriptive method. The goal of this research is to describe the formation, structure and meaning of the names in Lendang Nangka Sasak meno-mene varity language and Arabic. The population of this research the inhabitants of Lendang Nangka village. This reserac h studies about the personal names and nicknames. There are 6357 names.The data are gained from primary and secondary sources. Keywords: Sasak varity, Arabic, Personal Names, Nicknames, formation, truncation, phonological, Physical Characteristic, Lendang Nangka, menu-mene dialect. A. Introduction A name is inseparable circumstance to human being, place or thing. A name is a word or term used for identification. Names can identify a class or category of things, or a single thing, either uniquely, or within a given context. A personal name identifies a specific unique and identifiable individual person. Though Indonesia is home to many diverse ethnic groups and languages.Those exaggerated the varies greatly between these groups in names. The dominant ethnic group is the Malay people (whose languages include Indonesian, Javanese). Generally, all Indonesians have one or more given names. Some ethnic groups also use a family name or clan name, other groups use a patronym. Some Indonesia ns have neither a family name nor a patronym. (Salahudin Ahmad,1999). Personal names are considered as important part for personal identity. Sasak people consider names has special meaning, and there is a special practise to do in naming new born baby as one of the life cycle in Sasak people.As predominantly religion, islamic naming system influences most of Sasak names. Islam is closely relate to arabic naming system although it is not totally influenced the Sasak names. Islamic naming system are used commonly in Sasak muslim good followers. Lendang Nangka village inhabitants are muslim. The inhabitants of Lendang Nangka village are consider as moderate muslim. This makes sense that naming system is not totally following Islamic naming system although many of the people in the villages use Arabic names such as Muhammad, Ahmad, Abdurrahman, Abdullah, Wahid, Syafiââ¬â¢i, Siti Aisah, Siti Hadijah, Mariam, etc. nd some others Arabic root terms such as Nurul Hayati, Nurul Aini, Laitu l Fitri which they considered as Islamic naming systems. On the other hand many personal names are influenced by non Arabic names, western, Hindus and Javanese, or by their own creation naming systems. And the last naming system is naming by local Sasak names (although there is no written rules about this but this is just based on the local story and information). Relate to the topic of this research a name in short form is called Nickname.According to Free Online Dictionary(2009): nickname is a descriptive name added to or replacing the actual name of a person, place, or thing. Where as The Wordsworth Concise English Dictionary(1988) defines Nickname as a name given in contempt or sportive familiarity. A nickname is ââ¬Å"a usually familiar or humorous but sometimes pointed or cruel name given to a person or placeâ⬠(Oxford Dictionary Online, 2012), as a supposedly appropriate replacement for or addition to the proper nameâ⬠.Nicknames may based on a person's name or vari ous attributes such as (in majority the example taken from American names) : Tittle (ââ¬Å"Bonesâ⬠for a forensic scientist,â⬠Docâ⬠for a doctor ,â⬠Sparkyâ⬠for an electrician, Geek for a computer technician, ââ¬Å"Sargeâ⬠for a military Sergeant, Moneybags for a wealthy person, Sir or Ma'am for a person of a higher rank); Physical characteristics (Weight: ââ¬Å"Fatsoâ⬠or ââ¬Å"Slimâ⬠for a person who is overweight or thin, respectively. Height: ââ¬Å"Beanpoleâ⬠for a person who is tall, ââ¬Å"Shortieâ⬠or ââ¬Å"small-fryâ⬠for a short person. Haircolour: ââ¬Å"Redâ⬠, ââ¬Å"Gingerâ⬠, ââ¬Å"Rangaâ⬠, or ââ¬Å"Blueyâ⬠for a person with red hair. Blondieâ⬠a girl with blonde hair. Baldness: ââ¬Å"Chrome domeâ⬠for a person whose scalp reflects the light. Complexion: ââ¬Å"Pinkyâ⬠for a person with Rosacea, ââ¬Å"Zitâ⬠or ââ¬Å"pizza-faceâ⬠for severe acne, various racial s lurs for skin color. ; Personality (Talkative: ââ¬Å"Motormouthâ⬠, ââ¬Å"Chatterboxâ⬠, ââ¬Å"Ratchet-Jawâ⬠, ââ¬Å"ChattyKathyâ⬠Cautious: ââ¬Å"Nervous Nellieâ⬠Pessimistic: ââ¬Å"Sad Sackâ⬠Negative: ââ¬Å"Debbie Downerâ⬠, Glamorous: ââ¬Å"Stunning Signeâ⬠, Boring: ââ¬Å"Plain Janeâ⬠, Typical: ââ¬Å"Average Joeâ⬠. This Research paper focuses on the analysis of nick names formation in Lendang Nangka Sasak meno-mene varity and Arabic languages.This topic is based on the personal names of Sasak and their relationship to Arabic personal names. As we know naming system in Sasak names are moslty influnce by religious aspects. So far I found that it an interesting topic to disscuss about nick names formation as it is merely found the academic writting of how the Sasak nick name are formed. I prefer to specify the Sasak menu mene varity as it is my origin language and it is interesting to relate the naming system with Arabic as bo th of them uses mostly use Arabic personal names as the inhabitants considered Islam belivers.B. Research Question * What are the naming systems in Sasak meno-mene varity and Arabic language? * What are the meaning of Lendang Nangka Sasak Meno-mene varity and Arabic personal names? * How are Arabic and Lendang Nangka Sasak meno-mene varity nicknames formed? * Does Arabic nicknames formations contribute to Lendang Nangka Sasak nicknames formations? C. Review of Literature According to Merriam-Webster (2012) name is Word or phrase that constitutes the distinctive designation of a person or thing . By a name we can identify each other.In general term, a name is a label for a noun ââ¬â a person, place or thing. Naming customs vary greatly from people to people. Some names carry information about our roots, such as family or clan names, which are generally inherited. Terms relates personal names such as personal name ,family names, given names and Nick name. In some cases they are ve ry simple, such as those of many Indonesians names who use just a single name. On the other hand, names could also be very complex such traditional Chinese (Wikipedia, 2007).A given name, in Western contexts often referred to as a first name, is a personal name that specifies and differentiates between members of a group of individuals, especially in a family, all of whose members usually share the same family name or surname. Arabic names were historically based on a long naming system; most Arabs did not simply have given/middle/family names, but a full chain of names. This system was in use throughout the Arab world. The given name is always followed by the father's first name, then the father's family surname. Example Name Muhammad ibn Saeed ibn Abd al-Aziz al-Filasteeni. Wikipedia, 2007). The study of personal names has attracted a number of scholars over the years. There are many views regarding the way in which personal names are bestowed. This section aims to provide a overv iew of what previous scholars have found as far as personal naming is concerned. Scholars such as Koopman (1986; 1989), Thipa (1983; 1987), Herbert (1990; 1995), Saarelma-Maunumaa (1996; 1999), Stayt (1931), Monnig (1967), Mbiti (1969), Moyo (1996), Kimeyi (1989), Dickens (1985) and Bosch and De Klerk (1995) have based their discussions on some of the personal naming patterns.As far as African traditional culture is concerned, the selection of personal names is influenced by many factors. Most of these factors are diverse among cultures; nevertheless, there are some areas where they overlap. Jayaraman (2005: 176) provides the following explanation of the Hindu tradition of personal naming practices: a name not only reveals a personââ¬â¢s self-identity, but also his or her cultural, sectarian, varna, and caste identities. Further, it is believed to signal oneââ¬â¢s spiritual worth not only in this world, but also in the next.In everyday life, Hindus give great significance to a personal name. As this study on Tshiven? a names will reveal, the naming ceremony of a child is an important event. It is also traditionally one of the major life circle rituals for a Hindu. In Southern India, it is usually performed on the twelfth day of a childââ¬â¢s life. Customarily, some Hindus, who believe that even days are lucky for girls and uneven ones lucky for boys, hold that a boy should be named on the eleventh day and a girl on the twelfth.When the ceremony is to occur, and mainly in the case of the first child, both the fatherââ¬â¢s and the motherââ¬â¢s relatives visit the house where the mother gave birth (usually her natal home). Here, the guests are entertained with traditional sweets specially prepared for the occasion. There are various considerations in the choice of a name. However, one essential element in the selection of a name in all parts of India is the birth star of a person. Most Hindus consult an astrologer to decide the appropriate name.In the south, as in other parts of India, names may tell of the joy and expectations of parents of newborn children. For example, if a child is born to a couple many years after marriage, he may be endearingly named after some precious metal or gem, such as Ratnam (diamond), Sona (gold), Banghru (gold) or Muthu (pearl). Naming may also be related to other family experiences. For example, in Tamilnadu, if a family has experienced high child mortality, a surviving child may be named Pichi (gift of god) if male, or Pichiamma if female. Elements of idiosyncrasy and creativity are also apparent in Indian naming customs.For example, an eminent professor of Telugu in Andhra Pradesh gave his daughter one of the longest names encountered: Sri Arunachala Kadambavana Sundari Prasunnamba Kanyaka (the blessed virgin who is beautiful and carries with her the radiance of sunshine, the fragrance of garden flowers, and the presence of God). Bean (1980:309), in his research on the bestowal of childrenâ â¬â¢s names, found that it is often the duty of the parents, but may also be the duty of a senior kinsman or of a ritual specialist, and the participation of members of a larger community is also required ( e. . Ga names are bestowed by the senior patriarchal relatives). Beanââ¬â¢s (1980) view that the role of the ritual forms part of a childââ¬â¢s acceptance into his family group, is in a way similar to views given by other scholars such as Mbiti (1967), Monnig (1967), Koopman (1989) and Stayt (1931) on the role of the rituals that accompany name-giving ceremonies. Andrei A. Avram paper looks into the structural properties of Japanese and English truncated names. Name truncation is considered to be a word-formation process and is analyzed from the perspective of Prosodic Morphology.Japanese and English truncated names are shown to be subject to strict prosodic requirements. Also discussed is the relation between name truncation and prosodic minimality in the two languages. Abigail study the ways in which truncation in Indonesian enriches our understanding of possible patterns of prosodic morphology and the nature of prosodic word requirements. The structure of the paper is first describe the patterns of truncation in Indonesian. He consider the question of word minimality and evidence for word minimality based on the stress facts of Indonesian.He describe and consider the implications of two classes of subminimal words in Indonesian, including a class of words containing schwa and the short forms of terms of address and personal names. Both of these classes of words highlight the fact that word well-formedness and word minimality may be violable properties. He return to the question of truncation as prosodic morphology and briefly consider the Indonesian facts in light of recent theoretical claims about the nature of truncation. Langendonck (2008) made a nice survey to prove the universality of sources of surnames.Accordingly, they are derived roughly from the same sources across linguistically and culturally unrelated languages. For instance, in the English speaking countries, most surnames of British origin fall into several types: occupations (eg Smith, Baker), personal characteristics (eg Short, Brown), geographical features (eg Hill, Lee) place names (eg Flint, Hamilton) patronymicsii(eg Richardson, Johnson) matronymics (eg Marriott from Mary) and paternal, from patronage (eg Hickman meaning Hick's man). In French, people are named, following the same traditions: Legrand( the tall), le Carpentier (carpenter), le Parisien(from Paris).The same sources of surnames are true of the Spanish-speaking countries: Delgado (thin), Molinero(miller), Aleman from (Germany). In Russian, one finds the same: Tolstoy (fat or stout), Portnov (tailor),Moskova (from Moscow). Romanians follow the same procedures in deriving their surnames: Barbu(bushy bearded), Fieraru(Smith), Munteanu(from the mountains) Moldoveanu(from Moldova). In Netherlands , the Dutch adopt the same path in forming theirs : De Groot(the great), Van Weert( of the city Weert) (ibid). During the pre-Islamic period and onward, Arabs used to follow certain traditions in choosing their personal names.Roughly, the same traditions have been followed in modern Arabic dialects. In classical Arabiciv, some names were chosen by tribes for various reasons: (1) to threaten their enemies (eg Muqatil: fighter, Ghalib: winner, Asad: lion) (2) to express their optimism of their sons (eg Sa6yd: happy, Malik: owner, Najy: rescued) (3) to involve the sense of roughness of land or trees (eg :al a : thorny tree, hajar: stone) or (4) the newly born child is named depending on what his father comes across while the child's mother is being in labour.For instance, if the father meets a fox, the child will be named accordingly: Thalaba. The same holds true of dog: kalib, crow: Ghurab (Ibin Duraid, d. 321H ,nd:5f) (see also Althaââ¬â¢aliby, d. 430 H, 2007: 406f) Ibin Qutaybah( d. 276 H, 1999:67) adds that some people's names are taken from names of plants(eg alqamah: colocynth) others from people's characteristics or attributes(eg al-kareem: generous, al-shuja6: brave). In the Arabian Peninsula, females were named as males. This is attributed to the fact that the tribal societies at that time need e seen greater in number by others so that they would think a lot before invading each other. After the rise of Islam, the tradition of naming persons by the use of plants' or animals' names went on; and other factors for naming had become involved. For instance, beautiful names were chosen (al-Rabii: Spring) and got widely spread due to the Prophet's position against the choice of ugly names. He (P. B. W. H) recommended that parents should select beautiful names that bring happiness and satisfaction to newly born children.In surveying the traditions that Arabs followed in naming persons during the pre- and post-Islamic period, one finds that the same traditions have been roughly adopted by modern Arabic native speakers (Murad, 1984:36, 46). Al-Samaray (1961:4) adheres to a rather distinct view in that classical Arabic is no longer the variety spoken all over the Arab homeland i. e. different Arabic colloquial dialects are in use. This has had its impact on the way the PNs are used or chosen in every Arabic speaking country (see 2. 2. 1 below). However, Al-Samaray (p. ) does not state that the traditional ways of naming became totally absent(see 2. 2. 2 below). Ulaiq (2001:12ff) further indicates that PNs in SA and modern Arabic dialects are attributed to: 1. Natural phenomena (eg Qamar; the moon, kawkab: planet, Hilal; Crescent) 2. The sequential order of the newborn child which has sometimes a part to play in naming him or her(eg Faryd; the unique, Walyd; the alone, Rabia; the fourth). 3. Well-known or outstanding figures such as poets, heroes, wise men, presidents, artists or leaders (e. g Siina; Avicenna; Saladdiin, AbdulNasir). . Gran dfathers' or grandmothers' names to glorify them specially the eldest son. 5. Harmony of the names so as to be of the same musical tone of the family members (eg Ranny, Rajjy, Wally, Haddy). 6. Particular occasions or events(eg Ramadhan: the fasting month, Najjah; success, Zilzal: earthquake) 7. The fear of envy in that ugly names are attributed to infants (as some people believe) to keep them away from being envied. Nevertheless, this tradition has become of a very minor role to play due to the spread of education and knowledge in the Arab homeland.Sasak is a Western Malayo-Polynesian language spoken on the island of Lombok, Nusa Tenggara Barat province in eastern Indonesia (Austin, 2000, 2001). It is closely related to Samawa (spoken on the western half of Sumbawa Island to the east of Lombok) and Balinese, and sub-groups with them as a member of the Western-Malayo-Polynesian branch of Austronesian . Relate to this research, the study of Sasak language has been done by many resear chers, but in the other hand the study about Sasak nicknames is very hard to find.Acoodring to Austin (2000, 2001) Sasak language shows a wide range of local dialect variation in lexicon and syntax, which is the topic of ongoing investigation. There is also sociolectal variation with high, middle and low speech styles (Nothofer, 2000). Data for this paper is drawn from the Central and Southern varieties identified by their speakers as Meno-Mene, Meriaq-Meriku and Menu-Meni Sasak. As predominantly Islam believer Sasak and Arab people they mostly based their naming system on Islamic principles.The fact that this is the right of the father is shown by the principle that the child is ascribed and attributed to the father, as Allaah says, ââ¬Å"Call them (adopted sons) by (the names of) their fathers, that is more just in the Sight of Allaahâ⬠. It is also allowed for the parents to allow others to name the child, since our Prophet (SAW) used to name some of the children of his Comp anions. The name should carry a good and praiseworthy meaning as the Messenger (SAW) said, ââ¬Å"On the Day of Resurrection, you will be called by your names and your fathers names, so make your names good. (Abu Dawood) It is recommended to call oneself a servant of Allaah (Abdullaah) or the servant of any of the names of Allaah. Then it is recommended to name a child after a prophet, due to the hadeeth, ââ¬Å"call yourselves by the names of the Prophetsâ⬠(Abu Dawood) and the hadeeth, ââ¬Å"a son was born to me this night and I called him after my forefather Ibraaheemâ⬠(Muslim) Then it is recommended to name the child after any pious person in the hope that it will become like him/her. Then it is recommended to name by any name which has good meaning.It is forbidden to name a child with a name that denote servitude to other than Allaah, for example Abd an-Nabi, Abd ar-Rasool etc, just as it is forbidden to name them with names that are particular to the Unbelievers li ke George, Michael, Susan etc. The names of tyrants and evil personalities should be avoided such as Fir'awn, Qaroon, Abu Lahab etc.. Likewise it is disliked to name with the names of the Surahs of the Qur'aan like ââ¬ËTaa Haa' or ââ¬ËYaa Seen' as is reported from Imaam Maalik and others. There is no authentic hadeeth which ascribes the above two as being names of the Prophet (SAW).As the influencing of globalization era, naming sytem also influences Lendang Nangka Sasak naming system. It is very common to find personal naming influnced by western names such, Heri from Harry, Linda, Tina, Sandi etc. More examples of differents names are presented in appendixes and in next discussion. D. Research Methodology This research uses descriptive research methodology. The method used in this research is descriptive method. The goal of this research is to describe the formation, structure and meaning of the names in Lendang Nangka Sasak meno-mene varity language and Arabic.A similar vi ew is expressed by Djaya Sudarma (2006:16). He said that this method is a descriptive overview of the characteristics of the data accurately in accordance with the nature of the data itself. The statement was supported by Sudaryanto Djayasudarma (1993:62) who argued that the descriptive method focused on giving a full overview on the actual state of the object under investigation. This study also used qualitative approach. this study is also related to research data that is not in the form of numbers, but in the form of words or phrases (Sudaryanto, 1993:62).Sudaryanto opinion is supported by Arikunto (1998:193) who states that qualitative research is a desecriptive research because this study attempted to describe the data with the words or phrases that are separated by categories to obtain conclusions. Based on the explanation above, the writer can say that the research is descriptive qualitative research means is intended to provide a clear picture of the process of the formation , structure and phrase user names Lendang Nangka Sasak menu- mene varity * Population The population of this research is the inhabitants of Lendang Nangka village.Relates to the topic of this research the total names of the subject are 6357 names of Lendang Nangka inhabitants personal names. * Sample From total 6357 names there one hundreds personal names are taken as sample. Those samples are catagorized as first 100 hundred the most popular names in Lendang Nangka village * Data Collection There are two sources of data collection : Primary and secondary data. The primary data are obtained directly from local people of Lendang Nangka village by questioning to the paticipants and observation. Secondary Data source are taken from monography of local village office.Data source are in the form list of names local inhabitants. The number of the is 6357 personal names in the village (appendixâ⬠¦ ). Those total names will be group into the group of similarities of each names(appendix â⬠¦ ). * Data Analisys. After all data are obtained the next step is to analize the data. Analysis is an effort to study and process the data to find out the conclussion. Each group will be analized based on their formation and the form of the names, and their originals. All data are put into some cataogries: 1. Their similarities pharase and sylabble 2. Base 3.Ending word or prosodic 4. Meaning After all data are determined to their group. The next step is to analyse the process of each names become nicknames based on phenomena and observation. After all data collected , the next process is sorting names into their catagory using spread sheet Ms-Office Excell 2007 sorting system. For further analysis will be discussed in disscussion part . E. Disscussion The topic of this discussion will focus on the study of Lendang Nangka Sasak menu-mene varity names while on the other hand Arabic names disscus in not too deep discussion and analyis.The discussion will also be based on some t heories and names. 1. Names Generally a name is a label for a noun ââ¬â a person, place or thing. More specifically a name is a label for a specific person, place or thing. These are sometimes called proper names. A name is a word or term used for identification. Names can identify a class or category of things, or a single thing, either uniquely, or within a given context. According to Merriam-Webster(2012) name is Word or phrase that constitutes the distinctive designation of a person or thing . By a name we can identify each other.In general term, a name is a label for a noun ââ¬â a person, place or thing. : look at the following examples: | Person| * Heri * Megawati Sukarno Putri * Harun Al-Rasyid * Lalu Serinata * TGH. Muhammad Zainul Majdi| Name ââ¬âââ¬â Noun| Thing| * Meja (Table) * Harimau (Tiger) * Lendang Nangka | | Place| * Hotel * Lombok Sumbawa * Lendang Nangka * Bima| 2. Personal names Relate to personal names, naming customs vary greatly from people to people. Some names carry information about our roots, such as family or clan names, which are generally inherited.Terms relates personal names such as personal name , family names, given names and Nick name. In some cases they are very simple, such as those of many Indonesians names who use just a single name. On the other hand, names could also be very complex such traditional Chinese(Wikipedia, 2007). A given name, in Western contexts often referred to as a first name, is a personal name that specifies and differentiates between members of a group of individuals, especially in a family, all of whose members usually share the same family name or surname.Arabic names were historically based on a long naming system; most Arabs did not simply have given/middle/family names, but a full chain of names. This system was in use throughout the Arab world. The given name is always followed by the father's first name, then the father's family surname. Example Name Muhammad ibn Saeed ibn Abd al-Aziz al-Filasteeni. Sasak people naming system is considered as simple naming system such Muhammmad Amin, Aminah, Hadijah, Amir Masââ¬â¢ud, Samsul Bahri. The names mostly influences by Arabic names or words as most Sasak people are moslem.While in Greek using more complete name as follows: personal name(s) + patronymic + family name e. g. a son whose fatherââ¬â¢s name was Georgios might be called Spyros Georgiou Kyprianos same as in Bulgarian names: personal name(s) + patronymic + family. e. g. Emil Petrov Christov (Wikipedia, 2007). A modern Chinese usually has (1) a surname (ââ¬Å"family nameâ⬠) or xing and (2) a given name (ââ¬Å"first nameâ⬠or ââ¬Å"Christian nameâ⬠), or ming (or mingzi ), always in that order. Thus Deng Xiaoping is Mr. Deng with the personal name Xiaoping the same way John Jones is Mr.Jones with the personal name John. (Lelia, 1961). 3. Sasak language, personal names and origins a. Sasak language. The Sasak language is spoken on the island of Lombok (immediately east of Bali) by around 2. 5 million speakers (roughly 85% of the population of Lombok, which was recorded as 2,950,105 in 2005. It shows great internal variation, both geographical and social, with a complex linguistic ecology (Austin 2003) Sasak has traditionally been classified into five dialects: meno mene, ngeno-ngene, meriyaq-meriku, kuto-kute, and nggeto-nggete.However, this classification does not seem to accommodate the reality of the actual variation existing in Sasak, because there are also other dialects such as menu-meni and menung-mening. For instance, menu-meni speakers do not always agree to be in the category of meno-mene speakers, although the reason for this is hard to tell (Mahyuni, 2007). As Mahyuni stated that menu-meni speakers do not always agree to be in the category of ngeno-ngene speakers. I preassumed, The sasak language which the people in Lendang Nangka (Where I live) east Lombok may categorized as meno-meni speakers even t hough located in the region of ngeno-ngene dialect.Despite of category by A. Teeuw. In circumstance of geographic location, Lendang Nangka is surrounded by ngeno-ngene dialect speakers such, Jurit village in the east, Danger village in the south, Sangiang in the west and Borok Lelet in the north. Based on historical information, the inhabitantsââ¬â¢ anchestor of Lendang Nangka were from the area of district Kopang Central Lombok (where as it is considered as menu-mene dialect speakers). b. Sasak personal Names In fact, Sasak do not generally use the Western naming practice of a given first name and a family last name nor arabic system which is consist of full chain of names.In general, the form Sasak personal names fall into the following categories: * A single name: Sahnep, Mahrap, Mahyan, Marep, Serinata, Sahnun, Sapnah, Riadah, Muhammad, Ahmad, Abdullah, Lasmi, Sintiawati, Kartika, Indra, Subawae, etc. * Two (or more) names without a family name: Muhammad Safiââ¬â¢i, Siti A minah, Safaril Ahyak, Yusran Ahmadi, Samsul Hadi, Laelatul Fitri. * Names for documentary system (marital certificate, passport, birth certificate): This category is based on Indonesian formal rule. A name following by fatherââ¬â¢s name: Sahudin bin Muhammad (M), Fitriah binti Sahidun (F). Names based on the first child ( After a spouse has their first child bornt). Amaq/mamiq Sahudin (First child name is Sahudin, while Amaq means father so meaning The father of Sahudin). While the wife could be Inaq/Meme Sahudin (Inaq means mother so meaning the mother of Sahudin. In fact the of the father has his own personal name Abdurrahman or the motherââ¬â¢s personal name Aminah. * Noble personal name Lalu is added before a male personal name, such as: Lalu Suparlan, Lalu Serinate. Baiq is added before female personal name, such as: Baiq Hikmah, Baiq Mustiare. c. Origin of Sasak names.There is not specific informations about the original Sasak Names in spite of the fact that some of Sasa k names are not found in other language names (Sahnep, Mahrep, Segep, Sinarep, Senep, Sahne, Amsiah, Rumlah, Sene, Selihan, Mahnan, Serinate (? ). The following description of the origin of Sasak names which are based on the language, culture and religious influences: * Arabic word derived names Since Islam is the main religion for Sasak people , it is veryobviously to find Arabic first names as personal names in Sasak names such as Abdullah, Abdurrahman, Siti Aminah, Siti Hadijah. * Sanskrit derived namesAs the influenced of former ruler of Balinese in Lombok we will find some similarities in Sasak and Balinese such as in language and culture. Sanskrit derived names-names that may sound Hindu-influenced such as Indra, Bayu, Surya, Wisnu, Rama, , Bima, Dewi, Sri, Laksmi, Saraswati, Sintawati, etc. * Popular and Honored person Names Sasak people also use personal names following popular names taken honored person such as names of former presidents (Sukarno, Suharto, Megawati, Habibi) , celebrity names (Desi Ratnasari, Rano Karno, Herman Felani, Anjasmara), sport champions names (Alan Budi kusuma, Verawaty, Rudi Hartono). Etc. * Western namesDue to the influence of Western popular culture and celebrities, many non- Sasaksalso have shortened Western names like Sandy, Ricky, Alan, Meri (Marry), Linda, Amanda, Cindy,Heri (Harry), Meri (Marry), Sintia (Chintia) etc. The names can be found through Sasak family in suburb even in rural community. * Parents own Creation names. Some parents created their child names with their own idea and meaning. Such as persons who were born in certain times . Juliawati for a person who was born in July, Agustina in August, Oktaviana in October, Ramadani in Ramadhan month, Laelatul Fitri in the night before Iedl Fitri day, Purnawati in full moon night. . Lendang Nangka Sasak Meno-mene varity 100 Top names. So far there is no specific rules in Sasak naming sytem. Since most of Sasak people are muslim naming system is much closely relate d to Arabic names, although it is not totally follow the personal naming system for Arab people. Sasak personal names are similar to most Indonesian moslem names although some names appear as they are influences by western and Hindus names. Some other names are created by parents own creation which they based on other peoples names, time, place, nature, plants or thing they considered good names.The top 100 hundred names of 6357 names mostly used in Lendang Nangka Sasak village as shown in the following table: Table. 1. Top 100 names in Lendang Nangka Sasak Meno-mene varity No. | NAMES| Total names| %| No. | NAMES| Total names| %| 1| SAMSUL (+ â⬠¦. )| 37| 0. 58| 51| anti| 11| 0. 17| 2| Abdullah (+â⬠¦ )| 34| 0. 53| 52| DIAN| 11| 0. 17| 3| SUMIATI| 29| 0. 46| 53| HAERIAH| 11| 0. 17| 4| JUMAKYAH| 27| 0. 42| 54| HARNI| 11| 0. 17| 5| JUNAIDI| 25| 0. 39| 55| LINA| 11| 0. 17| 6| MULIANI| 23| 0. 36| 56| MARIANI| 11| 0. 17| 7| SAPRI| 22| 0. 35| 57| NURUL AENI| 11| 0. 17| 8| Agus+| 20 | 0. 31| 58| RIPAAH| 11| 0. 7| 9| ahmad+| 20| 0. 31| 59| SAMSUDIN| 11| 0. 17| 10| ERNA( +)| 20| 0. 31| 60| SENIWATI| 11| 0. 17| 11| LIA| 20| 0. 31| 61| SUPRIADI| 11| 0. 17| 12| Aisah| 19| 0. 30| 62| ZAKIAH| 11| 0. 17| 13| RIZAL| 19| 0. 30| 63| Adi| 10| 0. 16| 14| SRI ASMAWATI+| 19| 0. 30| 64| ana| 10| 0. 16| 15| MULIADI| 18| 0. 28| 65| HAERUNI| 10| 0. 16| 16| NURHASANAH| 18| 0. 28| 66| HENDRI| 10| 0. 16| 17| HAMDIAH| 17| 0. 27| 67| HERI| 10| 0. 16| 18| IRWAN| 17| 0. 27| 68| HERIANTO| 10| 0. 16| 19| ROHANI| 17| 0. 27| 69| HERMAN| 10| 0. 16| 20| EKA| 16| 0. 25| 70| JULIANA| 10| 0. 16| 21| HAERANI| 16| 0. 25| 71| LIANA| 10| 0. 16| 2| NURHAYATI| 16| 0. 25| 72| MAHYUNI| 10| 0. 16| 23| ROZI| 16| 0. 25| 73| MAWARDI| 10| 0. 16| 24| Aminah| 15| 0. 24| 74| PAJRI| 10| 0. 16| 25| At| 15| 0. 24| 75| PATIMAH| 10| 0. 16| 326| IDA| 15| 0. 24| 76| RONI| 10| 0. 16| 27| MAHNUN| 15| 0. 24| 77| ROSIDI| 10| 0. 16| 28| NURUL +| 15| 0. 24| 78| SALMIAH| 10| 0. 16| 29| SAPIAH| 15| 0. 24| 79| SUHAILI| 10| 0. 16| 30| SURIANI| 15| 0. 24| 80| YANTI| 10| 0. 16| 31| Ani| 14| 0. 22| 81| YULIANI| 10| 0. 16| 32| NUR| 14| 0. 22| 82| ZAKRAH| 10| 0. 16| 33| NURAENI| 14| 0. 22| 83| Ahyar | 9| 0. 14| 34| YULIANA| 14| 0. 22| 84| andri+| 9| 0. 14| 35| Andi| 13| 0. 0| 85| ari| 9| 0. 14| 36| JUMARTI| 13| 0. 20| 86| DEDI| 9| 0. 14| 37| RINA| 13| 0. 20| 87| IWAN| 9| 0. 14| 38| Anah| 12| 0. 19| 88| MAHINUN| 9| 0. 14| 39| DEWI| 12| 0. 19| 89| NURUL| 9| 0. 14| 40| DIANA| 12| 0. 19| 90| PENDI| 9| 0. 14| 41| EDI| 12| 0. 19| 91| RIANAH| 9| 0. 14| 42| ELI| 12| 0. 19| 92| RIKA| 9| 0. 14| 43| HAMDI| 12| 0. 19| 93| SAHNUN| 9| 0. 14| 44| JOHAERIAH| 12| 0. 19| 94| SITI+| 9| 0. 14| 45| LINDA| 12| 0. 19| 95| SUMARNI| 9| 0. 14| 46| MARNI| 12| 0. 19| 96| SUPARDI| 9| 0. 14| 47| MULIANA| 12| 0. 19| 97| US| 9| 0. 14| 48| PADLI| 12| 0. 19| 98| anto| 8| 0. 13| 49| RENI| 12| 0. 19| 99| AYU| 8| 0. 3| 50| SAPRUDIN| 12| 0. 19| 100| HALIMAH| 8| 0. 13| | à | à | à | à | OTHERS| à | 79. 05| The following table data is to d escribe the use of Arabic names Abdullah which is popular as Arabic name, the total number of inhabitants using Abdullah first names is 36 people: e. Other popular form of Lendang Nangka Sasak Meno-mene varity. From the analysis of the data it is found that many of Sasak personal names characteristic has similar final sylables such as ,-udin, -ni, -di, -man, -ti, -ah, -na, -wan. The following are data show names with the characteristic above: * Names with final sylable uââ¬âdin Names with final sylable di * Names with final sylable ââ¬âman * Names with end sylable ââ¬âna * Names with end sylable ââ¬ârun * Names with end sylable ââ¬â wan * Names with end sylable -un * Names with end sylable ââ¬âto and ââ¬â no * Names with end sylable ââ¬âah By observing the data above mostly naming system in Sasak meno-mene are very simple and it is tend to have similar names by using similar final sylables. 4. Arabic names, meaning and origins Arabic names were histor ically based on a long naming system; most Arabs did not simply have given/middle/family names, but a full chain of names.This system was in use throughout the Arab world. The given name is always followed by the father's first name, then the father's family surname. Some surnames have a pre-fix of ibn- meaning son of (ould- in Mauritania) The surnames follow similar rules defining a relation to a clan, family, place etc. Some Arab countries have differences due to historic rule by the Ottoman Empire or due to being a different minority. For example : * Muhammad ibn Saeed ibn Abd al-Aziz al-Filasteeni Ism ââ¬â Muhammad (Proper name). Muhammad: praised. Nasab ââ¬â Saeed (Father's name). Saeed: happy Nasab ââ¬â Abd al-Aziz (Grandfather's name).Abd al-Aziz: Servant of the Magnificient. Nisbah ââ¬â al-Filasteenee (The Palestinian). Filasteen: Palestine. Muhammad Saeed, son of Abdul-Aziz, the Palestinian This person would simply be referred to as ââ¬Å"Muhammadâ⬠or by relating him to his first-born son, e. g. :â⬠Abu Kareemâ⬠(father of Kareem). To signify respect or to specify which Muhammad one is speaking about, the name could be lengthened to the extent necessary or desired. During the pre-Islamic period and onward, Arabs used to follow certain traditions in choosing their personal names. Roughly, the same traditions have been followed in modern Arabic dialects.In classical Arabiciv, some names were chosen by tribes for various reasons: (1) to threaten their enemies (eg Muqatil: fighter, Ghalib: winner, Asad: lion) (2) to express their optimism of their sons (eg Sa6yd: happy, Malik: owner, Najy: rescued) (3) to involve the sense of roughness of land or trees (eg ala : thorny tree,hajar: stone) or (4) the newly born child is named depending on what his father comes across while the child's mother is being in labour. For instance, if the father meets a fox, the child will be named accordingly: Thalaba. The same holds true of dog: k alib, crow: Ghurab (Ibin Duraid, d. 21H ,nd:5f) Ibin Qutaybah(d. 276 H,1999:67) adds that some people's names are taken from names of plants(eg alqamah: colocynth) others from people's characteristics or attributes(eg al-kareem: generous, al-shuja: brave). In the Arabian Peninsula, females were named as males. This is attributed to the fact that the tribal societies at that time need be seen greater in number by others so that they would think a lot before invading each other. After the rise of Islam, the tradition of naming persons by the use of plants' or animals' names went on; and other factors for naming had become involved.For instance, beautiful names were chosen (al-Rabii: Spring) and got widely spread due to the Prophet's position against the choice of ugly names. He (P. B. W. H) recommended that parents should select beautiful names that bring happiness and satisfaction to newly born children. In surveying the traditions that Arabs followed in naming persons during the pre - and post-Islamic period, one finds that the same traditions have been roughly adopted by modern Arabic native speakers (Murad, 1984:36, 46). Al-Samaray (1961:4) adheres to a rather distinct view in that classical Arabic is no longer the variety spoken all over the Arab homeland i. . different Arabic colloquial dialects are in use. This has had its impact on the way the PNs are used or chosen in every Arabic speaking country (see 2. 2. 1 below). However, Al-Samaray (p. 5) does not state that the traditional ways of naming became totally absent(see 2. 2. 2 10 below). Ulaiq (2001:12ff) further indicates that personal names in SA and modern Arabic dialects are attributed to: 1. Natural phenomena (eg Qamar; the moon, kawkab: planet, Hilal; crescent) 2. The sequential order of the newborn child which has sometimes a part to play in naming him or her(eg Faryd; the unique, Wayd; the alone, Rabia; the fourth). . Well-known or outstanding figures such as poets, heroes, wise men, presidents, artists or leaders (eg Siina; Avicenna; Saladdiin, AbdulNasir). 4. Grandfathers' or grandmothers' names to glorify them specially the eldest son. 5. Harmony of the names so as to be of the same musical tone of the family members (eg Ranny, Rajjy, Wally, Haddy). 6. Particular occasions or events(eg Ramadhan: the fasting month, Najjah; success, Zilzal: earthquake) 7. The fear of envy in that ugly names are attributed to infants (as some people believe) to keep them away from being envied.Nevertheless, this tradition has become of a very minor role to play due to the spread of education and knowledge in the Arab homeland. 5. Nicknames According to Oxford Dictionary A nickname is ââ¬Å"a usually familiar or humorous but sometimes pointed or cruel name given to a person or place, as a supposedly appropriate replacement for or addition to the proper name, or a name similar in origin and pronunciation from the original name. A nickname is sometimes considered desirable, symbolising a for m of acceptance, but can often be a form of ridicule. Nicknames in Sasak language relates to definition above is quiet similar in function and meaning.The topic disscussion in this research relates to Nicknames formation in Lendang Nangka Sasak meno mene varity comparing to nick names formation in Arabic. This topic become the main discussion because most of Lendang Nangka inhabitants personal names are influenced by Arabic naming system. 5. 1. Nicknames formation. As the main focus on this response paper, nicknames formation is based on Lendang Nangka Sasak meno-mene varity. Nicknames formation in Sasak meno-mene varity in LendangNangka has some characteristics: 5. 2. Truncation the given names Truncation means to shorten by or as if by cutting off. The free dictionary online) 5. 2. 1. Truncate the base name by separate back part of base name as illustrated below: Base namenickname (truncated) ââ¬â Gunilahilok ââ¬â Haeriahiok ââ¬â Sinarepayep ââ¬â Sadahadok Nickname s (Truncated names) shows tendency to begin with a consonant and end with consonant, even their base starts with a consonant and end with a consonant. While the others following nicknames(truncated) names tend to begin with a consonant and ends with a consonant even the base names starts with a vowel and ends with a consonant: Base namenickname ââ¬â Aminahminok ââ¬â Andipendot ââ¬â Aguscegos ââ¬â Akramkeram ââ¬â Amircemor ââ¬â Amingemong Abdillahdilok ââ¬â Ahmad gamek 5. 2. 2. Truncate the primary stressed syllable of the names as follows: Base namesNicknames (truncated names) ââ¬â Atââ¬â¢harhar ââ¬â Rukiahkiah/kiok ââ¬â Sakdahdah/dok ââ¬â Samsulsul -SamsudinSam 5. 2. 3. Truncate the secondary stressed syllable of the names as in the following example: Base namesNicknames (truncated names) ââ¬â Samsudinudin ââ¬â Tarminimini ââ¬â Hamdandan ââ¬â Jumlahlah/lok 5. 2. 4. Truncate names on the segmental of onset consonants rep lace randomly: Base namesNicknames (truncated names) ââ¬â SakdahCedok ââ¬â MuhamadGamek ââ¬â SirCing ââ¬â HasimTacim ââ¬â MahrepGayep 5. 2. 5. Phonological Process. Stressed vowels occasionally change /a:/ into /o/ as follows : Base namenickname -Abdillahdilok -Samsiahsiok -Aminahinok -Rukiahkiok * Changing stressed vowel /a:/ into // ? Base name Nicknames -SatriawanAwen -SuparmanMamen -JarkasiKejer -SunardiSuner -AhmadAmek -JumakyahJumeââ¬â¢ * Changing stressed vowel /i/ into /o/ as follows: Base name Nicknames -Mulyandiendot ââ¬â Mulianienoââ¬â¢ ââ¬â Muliaticetot ââ¬â Santisentot ââ¬â Samsul Hadiedot * Consonants may also be subject to change. /s/ is replaced by /c/ in middle position: Base name nick name -NasirAcing -HasanAcan Muhasimacim -Muhsankucan -MuhsinKucin -LusianiUci -HasanahCanok -MahsunAcun * /r/ is replaced by /? / at the close position Base name Nicknames -Munirning -Tahiraââ¬â¢ing -Zakiraking -JaharAhang -MunawarAweng * / r/ is replaced by /y/ in the mid position Base name Nicknames -Idrusyus -Zakrahayah/ayok -Mustarahgayek -Mahrupayup -Mahrapayap -Mehrameyam -Sahrumayum -Sahuriuyi * /k/ is replaced by /h/ at the close position Base name Nicknames -ZakrahAyok ââ¬â Hasanahcanok ââ¬â Riadahadok ââ¬â Sakdahcedok ââ¬â Ramdahmendok ââ¬â Sakdiahdiok ââ¬â Abdillahdilok ââ¬â Darmilahilok Sapirahirok ââ¬â Jumlahjlok * /b/ is replaced by /p/ at the close position Base namenickname -Zaenabjenap ââ¬â Assegabsegep ââ¬â Mustajabajap ââ¬â Rajabajap ââ¬â Habibabip * /z/ is replaced by /j/ at the onset position Base namenickname ââ¬â ZaenabJenap ââ¬â Zulkarnainkejung ââ¬â Zaenuddinjen ââ¬â Zarkasikejer ââ¬â Zulkiplijul * /l/ is replaced by /ng/ at the close position Base name nickname -Samsulancung ââ¬â Sulhiahcung ââ¬â Mulianahmung ââ¬â Yulianiyung * /f/ is replaced by /p/ at the random position Base name nickname ââ¬â Gafarapar â⠬â Irfanipan ââ¬â Sarifayip ââ¬â Mussannifsanip ââ¬â Halifalip 5. 2. 6.Nicknames also formed by dropping a consonant in random position, as described below: Base name nickname -Ehsanesan -Irfanipan -Ilhamiham -Ahsipasip -Mahsanasan 5. 2. 7. Nicknames formation also made by giving attributes to specific person such as following: ââ¬â Kaktuan is for a person who has done hajj for example: Base namenicknames -Hajjah Kurniawatikak tuan kur -Haji Abdillahkak tuan dilok -Hajjah Samsiahkak tuan iok * Tuaq(uncle) and inaqrari (aunt) is to address someone feel close related to the speaker even he is not a relative of the speaker, as following example: Base namenicknames Salehtuaq aleh -Zaenuddintuaq jen -Syamsiahinaq rari iok -Rumlahinaq rari melok * Semeton/meton/ton (brother/sister) usually refers to male is to address between friends at same age and to show friendliness, even though they are not relatives in between and usually meton or ton is stand alone without nicknam es. * Arik/adik (younger brother/sister)usually refers to male is to address to younger person and to show friendliness, even though they are not relatives in between and usually arik or adik is stand alone without nicknames. Kakak/akakArik/adik (older brother/sister) usually refers to male/female is to address to younger person and to show friendliness, even though they are not relatives in between and usually kakakor kak is stand alone without nicknames. * Amaq keke /bapak keke(father) usually refers to male is to address to elder married person and to show friendliness, even though they are not relatives in between and often amaq keke or bapak keke is stand alone without nicknames to show closer feeling. Inaq keke (mother) usually refers to address to elder married person and to show friendliness, even though they are not relatives in between and usually arik or adik is stand alone without nicknames. without to show closer feeling. 5. 2. 8. Nicknames also formed by physical chara cteristic and personality such as: -ââ¬Å"Dakohâ⬠for a person who is overweight -ââ¬Å"keyekâ⬠for a person who is thin,. -ââ¬Å"ranjo or beloâ⬠for a person who is tall, -ââ¬Å"cendek or dendek/dandakâ⬠for short person. -ââ¬Å"Bijangâ⬠, ââ¬Å"ambokâ⬠for a person with blonde hair and grey hair respectively. ââ¬Å"butakâ⬠for a person with bald head. -ââ¬Å"melongâ⬠is for big eyes person. -ââ¬Å"birengâ⬠for a person with dark skin, -ââ¬Å"bodakâ⬠for a person with white skin. ; Personality; -ââ¬Å"nyerencengâ⬠is for talkative person, -ââ¬Å"belekeâ⬠, is for a person who laugh a lot -ââ¬Å"kemboââ¬â¢Ã¢â¬ is for easy crying person ââ¬â ââ¬Å"bingisâ⬠for high tempered person. 6. Nick Names in Arabic. According to Zawaedah : Studying nicknames relates to Arab world is important for national security because they are used as aliases. Instead of using oneââ¬â¢s real name, one may use a nicknam e to hide their identity.A term for such usage is ââ¬Å"nom de guerreâ⬠(i. e. war name). Resistance fighters, terrorists, and guerilla fighters use pseudonyms to hide their identities and protect themselves and their families from harm. A nickname is a name that identifies a person, place, or event that is different from the formal given name of the referent. Nicknames are often not legally registered in oneââ¬â¢s official documents. Examples: Muammar Qathafi: Al? Akh al? Aqid ââ¬ËBrother Colonelââ¬â¢ Amin al? qawmiyyah al? Arabiyyah: ââ¬ËKeeper of Arab Nationalismââ¬â¢ Sahib al? Kitab al? Akhdar : ââ¬ËOwner of the Green Bookââ¬â¢Zuwaedah stated that Studying nicknames is important for national security because they are used as aliases. Instead of using oneââ¬â¢s real name, one may use a nickname to hide their identity. A term for such usage is ââ¬Å"nom de guerreâ⬠(i. e. war name). Resistance fighters, terrorists, and guerilla fighters use pseu donyms to hide their identities and protect themselves and their families from harm. Understanding the pseudonyms used by radical groups sheds light on their future intentions, perceptions, motivations, and connection to the cause. (Guidere, 2006).Abu Hamza al-Muhajir (Abu Ayyub Al-Misri) : chief of Al-Qaeda in Iraq. Hamza Ibn Abd Al? Muttalib: Prophet Mohammadââ¬â¢s uncle. One of the bravest protectors of Islam. Muhajir: he immigrated to Iraq to fight. Or it could refer to ââ¬Å"hijraâ⬠of companions of Mohammad from Mecca to Medina. In Arab world nicknames are used for : * Friendly daily conversations (face to face, on the phone, letters, e- mails, etc). Used for endearment or respect. * Monarchs may be known by other nicknames. * ââ¬ËNabazââ¬â¢ nicknames used to insult others (ex. Enemies), or used in the formation of swear words. Concealing identity: * Computer users: Chartrooms, e? mails, blogs, used asââ¬Å"usernamesâ⬠. * Literary pen names ââ¬âpublishi ng authors. * Stage names (ism shuhra)? actors, singers, dancers, etc. * Criminals, terrorists, etc (takhallus) ââ¬âespecially the leaders have pseudonyms. 7. Types of Arabic nicknames 1. Asmaââ¬â¢ Dalââ¬â¢ Hypocoristics 2. Kunya Abu X 3. Nasab Ibn X patronymics 4. Laqab description 5. Nisba origin of person 6. Nabaz insulting names 1. Asmaââ¬â¢ Dal Hypocoristics Arabic hypocoristic formation is very generative. Generation is largely based on the root of the name (Zawaydeh and Davis, 1999). Khalidâ⬠has the following Jordanian and Egyptian nicknames: * Khalluuude * Khalkuleeh * Khaluudi * Khalluuude * Khukhu * Khalkhul * Dido * Khokha When a full name has an affixal consonant, be it a prefix, suffix, or infix, the affixal consonant does not appear in the hypocoristic. Hypocoristic contains only root consonants, regardless of what other consonants may be in the name. * MuhammadHammud * AhmadHammud * HamidHammud 2. Kunya In the Arab tradition, after a person gets mar ried and has a child, s/he is called by the name of his eldest son (or daughter). Abu Muhammad ââ¬Ëfather of Muhammadââ¬â¢ * Um Muhammad ââ¬Ëmother of Muhammadââ¬â¢ Highly used in the Arab World, and Muslims in general (ex: Afghanistan, Pakistan). Some Kunyas are metaphorical. The second word uses a positive or negative attribute. * Abu Al? Khayrââ¬Ëfather of goodnessââ¬â¢ * Abu Dhubabââ¬Ëfather of fliesââ¬â¢ Not every Abu X is just a nickname. It could be also a surname. Ex. Palestinian surnames: * Abu Hadeedaââ¬Ëfather of ironââ¬â¢ * Abu Minshaarââ¬Ëfather of a sawââ¬â¢ * Abu Shamââ¬â¢aââ¬Ëfather of a candleââ¬â¢ Used daily as an honorific to show respect to elders. Used by young men to address each other, for fun.Even one who is not married, or doesnââ¬â¢t have a son may be called Abu X. As a ââ¬Å"nom de guerreâ⬠. For example, ââ¬Å"Abuâ⬠nicknames were popular among PLO leaders. * YasirArafat Abu Ammar * MahmoudAbbasAb u Mazen A terrorist may be known by a Kunya name. in India, the nickname ââ¬Å"Abu Al? Qamaâ⬠was used by a member of the terrorist group Lashkar? e? Taiba in the Mumbai terror attacks 3. Nasab Nasab is a patronymic or a metronymic name. The word ââ¬Å"Ibnâ⬠or ââ¬Å"bintâ⬠(i. e. son/ daughter of) followed by the fatherââ¬â¢s name. Was used more frequently as an alias in historic times.The person was known as ââ¬Å"son of Xâ⬠instead of his first name. A chain of names reflects oneââ¬â¢s genealogical ancestors. Example: * Ibn Khaldoun ââ¬â- : Abd ar? Rahmanibn Muhammad ibn Muhammad ibn Muhammad ibnal? Hasan ibn Muhammad ibn Jabir ibn Muhammad ibn Ibrahim ibn Abd ar? Rahman ibn Khaldun. Nasab .. current usage It is a standard way of reporting names in Saudi Arabia, and the Arabian Gulf. The head of the House of Saud:Muhammad bin Saud bin Muhammad bin Muqrinbin Murkhanbin Ibrahim bin Musa bin Rabiââ¬â¢abin Maniââ¬â¢bin Rabiââ¬â¢aal? MuraydiAl ? Durââ¬â¢aal? banafiAl?Adnani Used online as alias names. Next word could be a colloquial or MSA adjective, a noun, a personââ¬â¢s name, or a place name. * Ibn Falastineââ¬Ëson of Palestineââ¬â¢ * Ibn Hajarââ¬Ëson of a stoneââ¬â¢ 4. Laqab This is a description of the person, that could be considered a title of nobility. It is often a two-word phrase, which often indicates the personââ¬â¢s occupation, importance, or appearance. Originally, it was used as a nickname, and later adopted to be a title given to important people. * Sayfal? Din ââ¬ËThe sword of the religionââ¬â¢ * Nasiral? Dawlaââ¬Ëthe helper of the dynastyââ¬â¢ * Al? Jahizââ¬Ëthe goggle? eyedââ¬â¢A physical or personal quality. The phrase could be metaphorical. These could also be used as surnames. Al? Tawilââ¬Ëthe tall oneââ¬â¢(could be a surname) Al? Andalibal? Asmarââ¬Ëthe dark nightingaleââ¬â¢(Singer Abd Al? HalimHafiz) * Expressing adoration or reliance on God, or li neage to the Prophet. Some use compound structures with words such as ââ¬Å"Allahâ⬠, ââ¬Å"Abdâ⬠, ââ¬Å"al-Dinâ⬠, ââ¬Å"al-Islamâ⬠, ââ¬Å"al-Dawlahâ⬠, or words used in titles: * Al? Raââ¬â¢is Al? Muââ¬â¢minââ¬Ëthe faithful presidentââ¬â¢Anwar Al? Sadat * Amir Al? Muââ¬â¢mininââ¬Ëprince of the believersââ¬â¢HusniMubarak * Sayfal? Islamââ¬Ësword of Islamââ¬â¢Osama Bin Laden 5. NisbaAn adjective derived from the place of origin, birth, residence, or occupation. It could be also a clan, tribe, or family. Formed by adding ââ¬âiyy/-iy at the end of the word. Usually preceded by al- definite article. This form is also used for surnames. * Abu Ayyubal? Misri (from Egypt) * Salahal? Din Al? Ayyoubi (founder of Ayyoubi dynasty ââ¬â conquered crusaders) * Al? Ansari: fighters born in Iraq (Ansaral? Sunna group) * This type of structure is used frequently to coin new surname aliases. 6. Nabaz Nabaz could be metaphors that are used to describe somebody that is disliked or considered to be an enemy. Jihadi style writings use such metaphors abundantly. Comparing the process of nicknames formation in Sasak meno-mene varity and Arabic, both process in nicknames formation in general it is quite different. The process of formation nicknames basis in Arabic is basis those six basis. This basis is not common in Sasak meno-mene varity. F. Conclussion From the discussion we can conclude as follows: * Personal names in Lendang Sasak meno-mene varity mostly influenced by Arabic word and names. * Arabic names and Sasak names has similarities relates to Islamic way system of naming based on the hadist. There is no special rules in Sasak meno-mene varity in forming nick names compare to Arabic nicknames which on those 6 basis. * Most of Sasak nicknames formation are not influenced by Arabic nicknames formation. Sasak Personal names * Muhammad (personal names) become Amek (Nickname) While in Arabic names: * Muhammad (persona l names) becaome Hammuud (Nickname). * The similarity in nicknames formation is in the Arab tradition, after a person gets married and has a child, s/he is called by the name of his eldest son (or daughter). * Abu Muhammad ââ¬Ëfather of Muhammadââ¬â¢ Um Muhammad ââ¬Ëmother of Muhammadââ¬â¢ While in Sasak tradition after a person get married he / she is called by his ledest son (or daughter) * Amaq Udin ââ¬Å"father of Udinâ⬠* Inaq Udin ââ¬Å" mother of Udinâ⬠* Mamiq Bambang ââ¬Å" father of Bambangâ⬠* Meme Santi ââ¬Å" mother of Santiâ⬠* Based on my onservation and analysis I found that the nicknames formation in Lendang Nangka nicknames varity are based on Truncation of personal names, phonological changing process, physical characteristic, attributions in term of social solidarity, friendliness and intimate. BiblographyIbin Duraid(d. 321H,n. d)Al-Ishtiqaq(Derivation). Revised by AbdulSalam Harron. Cairo: Al-Khanachy Publishing House. Ibin Qu taybah (d. 267H. 1999) Adeb Al-Katib( The Writer's Literature). Beirut: Al-Resalah Publishers. Jaszezolt, K. M. (2002) Semantics and Pragmatics: Meaning in Language and Discourse. London: Longman. John and Levitt, J. (1975) ââ¬Å"People Have Namesâ⬠in Wallace, A. & Stageberg, N. (eds. ) Introductory Readings on Language. New York: Rinehart and Winston. pp146-154. Dictionary of Islamic Terms. Damascus: Dar Al-Yamamah. Langendock,V. 2008) Theory and Typology of Proper Names. http //www. degruyter. de/cont/. Retrived on 17th of January 2008. Murad, A. K. ( 1984) Asma? Al-Nass: Ma anyha wa ASbab Al-Tasmiah Biha( People's Names: Their Meanings and Reasons of Naming by them). Vol. I. Baghdad: Dar Al-Huriah for Printing. Nina(2008) A Survey of the History of English Place Names. http //www. sca. org. Retrieved on 19th of February 2008. Pollock,J. L. (1982) Language and Thought. New Jersey: Princeton University Press. Al-Samaray, I. (1961)â⬠Al-alamâ⬠(Proper Names) in Journa l of Faculty of Arts Vol. III.Baghdad University. pp3 -18. AlTha aliby,A. A. (d. 430H. 2007)Fiqih Al-lUghah wa Sirru Al-rabiah(Language Philology and the Secret of Arabic). Beirut: DarAl-Maââ¬â¢rifah. Ulaiq,B. M. (2001)Al-Wafy fi Al-asma? Al-arabiah wa Ma6anyha( The Complete Text in Arabic Personal Names and their Meanings). Beirut: Dar Al-amra?. Ullmann,S. (1962)Semantics: An Introduction to the Science of Meaning. Oxford. Basil Blackwell. http://en. wikipedia. org/wiki/Nickname. Accesed on :11/1/2012 7:25:30 PM http://oxforddictionaries. com/definition/english/nickname. 2012 Oxford University Press.
Thursday, August 29, 2019
Humanism and Christian Belief: Change in the 15th Century Essay
Considering that humanism is a movement wherein a focus upon the capabilities of humanity has fueled a myriad of changes in society, it would be rather expectable for one to assume that such a movement was in direct conflict with Christian belief. Interestingly though, Christianity and Humanism did not necessarily lead into philosophical conflicts wherein one would remain while the other weakened or abolished. Instead, humanism brought forth beneficial if not entirely positive changes to the manner in which Christian faith is both interpreted and expressed. In this sense, throughout the following discussion, the impacts of humanism upon Christian belief during the 15th century would be delineated and thoroughly explained. Humanism is associated with a significant shift in the manner through which the world is understood. For example, instead of merely relying upon the interconnections of Greek philosophical texts with Christian concepts, those who embodied humanism instead engaged in a re-evaluation of such accounts without consideration of any external criteria (Blei 63). In addition, the Christian Bible also underwent a similar process of analysis. Scholars during the 15th century realized the need to gain a better comprehension of the Bible through an assessment of Biblical accounts in its original form; superior translations of Hebrew and Greek Bibles were accomplished through such a pursuit (Blei 65). As a result, of such scholarly and faith driven endeavors, the Church eventually came under scrutiny. Desiderius Erasmus, a notable figure in 15th century humanism, enabled the society to realize the errors of Church. In particular, his published books challenged the appropriateness of abuses and the ineptness of some Church authorities in accomplishing the responsibilities of their positions (Blei 65). Through such means, as well as through the presence of unaltered versions of the Bible made accessible to the public, a notable change in the perception of Christians manifested. In particular, instead of merely relying upon the preaching of priests and considering the ways of the Church as undoubtedly faithful to the Bible, people began to question the Church even further. The wealth and power of the Church during such times became a common cause of challenges and questions from the public (Blei 66). Challenging the ways of the Church is not indicative of a waning focus upon Christian beliefs but rather highlights the desire to be truly faithful and worthy in the eyes of God. From being driven by the Church and its authorities, Christian belief and faith once again became rooted entirely from the most sacred text in such a religion, the Bible. As a matter of fact, such a change became the reason for the emergence of the Reformation in the 16th century (Blei 69). Therefore, while it would be impossible to identify all the specific changes brought forth by humanism to Christian belief throughout the 15th century, it is evident that the movement reoriented Christian belief from one that is manipulated by the leaders of the Church to one that is reflected and supported entirely by the Bible.
Wednesday, August 28, 2019
Managing Decision Making and Decision Support Essay
Managing Decision Making and Decision Support - Essay Example This paper will mainly look at the association flanked by the REM and OR and SSM. The issue learns on JB Casting will be used from side to side out to exemplify the relationship flanked by the theories and the methodologies. "Management in order system is necessary for creating spirited firms, organization global corporation, and providing helpful products and services to clientele." (Laudon, 2002, P1) It provides in order figure of reports and displays to executives. For instance, sales managers may employ their computer workstations to obtain sales consequences of their foodstuffs and to the right of entry weekly sales psychoanalysis reports, and then assesses sales made by every seller. "Management in order systems arose in the 1970s to centre on computer-based in order systems meant at managers." (Laudon, 2002, P15). Since of the growths of the Internet, globalisations of a deal, and the rise of in order economies have to get better the role of in order system in commerce and management. And then it wants pays notice to organisation management in order that issues raised by sociology, finances, surroundings and psychology. "An association is a stable, official social arrangement that takes capital fr om the surroundings and procedure them to create outputs." (Laudon, 2002, P87) This essay will be assessing the payment of Management in order System to Organisations. ... Organizational Environment Organizations always are livelihood in a various and altering environment. The executives of the association will catch the helpful information and resource from the surroundings to attain managerial objectives. We can look upon the organization as an unlocking scheme which interacts with the surroundings. Through planning, association, most important, making-decision, managers attempt to change and manage elements in the surroundings. Today's surroundings admiration additional multifaceted and unbalanced, it leads managerial management also experiences very far above the ground uncertainty and vagueness. As a successful director, you should use theoretical skills to forecast surroundings, personal skills to resolve disagreement in managerial civilization or worldwide relationship, and technological skills to direct uncertain in order. When boss meet new surroundings and new confront which had never occurred, how do they resolve evils by means of their management skills and information and referring from particulars which had happened Today managers have to focus on environment altering, they will totally appreciate and manage the environment to have effectual management in the association. The piece of writing includes there sectors. The first division presents how unsure surroundings do and the surroundings affect the organization life. The next division gives a figure of examples to explain that beneath the uncertain surroundings, executives weaken the lucid psychoanalysis. The third sector, the author wants to find additional effectual approaches to make your mind up difficulty under the unsure and ambiguous surroundings.Ã Ã
Tuesday, August 27, 2019
Tragedy and Survival of the Armenian Church Essay
Tragedy and Survival of the Armenian Church - Essay Example Thus in the nineteenth century the country was divided by Russia and Turkey. The years under Russia and Turkey were marked with genocide and oppression. Difficult was the life of the Armenians under the Turkish rule. They were treated as servants of the Ottoman Empire, suffered constant attacks of the Muslim bands and were deprived of the basic human rights. The interference of the Western Powers trying to protect the Christian nation did not help much, all the edicts promulgated by Sultan being not supported by any concrete measures. Little effect was produced by international San Stefano and Berlin treaties of 1978. The situation became only harder, so that in 1890 the Armenians organized the forces of their own, those being political parties Clarion and the Armenian Revolutionary Federation. However, this only served as a pretext for massive massacres organized by Sultan Abduhamid. The massacres of 1894-1895 in the province of Mush brought away lives of many Armenians, and nearly 100,000 took refuge in Russian Armenia, The Balkans and Americas. In 1909 the massacre in Adana again brought away lives of the Armenians. The tyrannical rule of Sultan Abduhamid was overthrown in 1908. The Young Turks, the party that came to power, were largely assisted by the Armenian people, who hoped to see better times with the new regime. Their hopes were not to come to life. The Young Turks also had a dream, that being of the creation of monolithic Turkish Empire. They wanted their nation to be pure from alien cultures and traditions. That policy was called pan-Turanism. The Young Turks understood that Armenians would resist turkization. So it was decided to put an end to the Armenian Question destroying or deporting all the Armenians from Western Armenia. However, Armenian people were not aware of those plans and were preparing a program of reforms that was to give them a kind of
Ancient culture Essay Example | Topics and Well Written Essays - 500 words
Ancient culture - Essay Example Also, the civilizations were laddered and followed through a hierarchy. The kings called for extending their territories, hence, subsequently formed a territorial organization that guaranteed their ascendancy and supremacy. The early civilizations have expanded to the following civilizations with the emergence of Greece that greatly influenced the Roman Empire that survived for roughly 1,300 years. [Last Name] 2 recovered are the Warka Vase, the Mycenae and the Capitoline Wolf. ââ¬Å"The Warka Vase or alternatively called as Uruk Vase, is a carved alabaster stone vessel found in the temple complex of the Sumerian goddess Inanna.â⬠It is deemed to be one of the oldest extant works that was believed to have predominantly existed from 3,200 to 3000 BC. It was carved with symbolical details like some cultivated grains, oxen and nude males that implied thievery and renewal. The second artwork is the Mycenae which is an archaeological spot in Greece. It is located about 90 km south west and is bounded by two Greek cities: Argos in the south and Corinth which is 48 km towards the north. Its name, Mycenae, was actually a re-enacted name for its ancient name Mukanai. Albeit it was erected by the people of Greece, its name was taken from some pre-Greek settlers. The third and last artwork is the Capitoline Wolf. It is one of the most symbolical artworks during the prehistoric time s. ââ¬Å"It is a 5th century BC Etruscan statue that is made of bronze cast in the lower Tiber valley.â⬠On it is a female wolf ââ¬Å"suckling a pair of human twin boys, representing the legendary founders of the city of Rome.â⬠All three artworks were identical in motive, that is, essentially symbolical in nature that depicts supreme powers as well as exploitation and an accompanying reformation on the ancient civilizations. Nevertheless, unlike the Warka Vase and the Capitoline Wolf, the second
Monday, August 26, 2019
Analyzing Culture Researching Subculture Essay Example | Topics and Well Written Essays - 2500 words
Analyzing Culture Researching Subculture - Essay Example Despite the size and purpose of any subculture, one needs to be aware of the fact that it could leave a significant impact on the society and furthermore could present the possibility of proving to be life altering in the long run. This paper seeks to conduct a research into the origin of Bosozoku and how influential this subculture is in today's society - not only in Japan but also, the rest of the world. To begin with, it focuses on the starting place of the Japanese subculture called Bosozoku, when it started and by whom it was started. This has been critically analyzed to study the main purpose of their subculture and how is has changed over time. Secondly, this paper concentrates on how influential Bosozoku is within Japan and what lies behind the influence and the growth. Thirdly, it focuses on the impact it has on the rest of the world, especially the USA. Before introducing this subculture, it would be imperative to talk about the emerging trends. The rising volume of teenagers showing interest and rendering involvement to modified cars and motorbikes, boy racers and midnight rides are no longer an issue in today's society. But the question that needs to be answered pertains to where it all started and by whom. (Greenfield, 1995) In tandem with this perspective is a corresponding and rather common view is that a causal relationship exists between the policing system and low crime rates in Japan. According to these views, subcultures need to be reduced to a state where they hold minimal significance in Japan. However, numerous, visible, and significant subcultural formations continue to peacefully and unobtrusively exist in these parts. These include groupings of street youths, Bosozoku (hot-rodder) groups, and Yakuza, which may be further described as networks of male adult criminal organizations. (Sato, 1991) Bosozoku, a Japanese subculture has immensely grown to influence the Japanese society in the last 10 to 15 years (Jachim, 1993); from adults to even teenagers. Having originated as a bunch of bored bikers who went by the name of Kaminari - zoku, the Bosozokus have branched out as a group that believes in adorning themselves in traditional Japanese garb and boasting of a contrasting cosmopolitan perspective as well. The cities generally find them cruising around in sophisticated, and more often than not, bikes that are illegally modified, with an intention that seemingly revolves around teasing the local police in the peaceful suburbs. So why aren't they being taken to task The answer to that might have something to do with the implication that they might share connections with the Japanese underworld, otherwise known as Yakuza, as well as the Uyoku. That explains why most people are scared of them and regard them as dangerous. (Jachim, 1993; p. 277) Most of the assumptions that exist in the Western world regarding Japanese crime control seem to be based on notions of a specific Japanese "shame culture," in which social pressures force all individuals to conform to these laws and norms revolving around, or dictated by these subcultures. The subculture popularly referred to as "The Bosozoku - speed tribes" - basically consists of Japan's discontented youth. The Bosozoku have been around since Japan's rebirth as an industrial power after World War II; starting on September the 6th, 1959, when
Sunday, August 25, 2019
Comparison Between Energy Modeling Soft wares for Sustainable Building Article
Comparison Between Energy Modeling Soft wares for Sustainable Building Design - Article Example The importance of these building energy programs cannot be denied. These types of software provide users the real-time information of building performance like the use of energy, temperature, costs, humidity, and demand of energy. Some of the soft wares are IESVE, ECOTECT, HAP, REQUEST and ENERGYPLUS These tools have brought a lot of benefits energy modeling on your building such as ECOTECT is considered to be an entire environmental design software that has features for cost analysis, lighting, thermal, solar and interface for 3D modeling. ECOTECT has made the efficiency analysis more accurate and easy. It is based on the idea that environmental design ideology is most successfully addressed throughout the conceptual process of design. The tool provides necessary analytical and visual advice from the simple drawing model to more detailed model. The model is totally capable to handle effortless shading models to complete scaled cityscapes., ECOTECT is fine at coaching the beginner designers to design numerous significant concepts essential for competent building design. Broad assistance files and tutorials are also given with the ECOTECT. It has 3d CAD interface, which allows support of the simplest drawing design to extremely compound 3D models. It has the ability to import DXF and 3DS files. It can be run on Windows XP, 2000, 98 and 95. It can also execute on Visual PC or Mac. It permits the user to test the design ideas at the abstract phases by giving an important examination advice like whether the modeling geometry and data are used in a wrong way or which one is more important than the other. The build-in help file tends to inform the users about the errors or important tasks to do. EnergyPlus is basically a modular tool that is designed by gathering the abilities DOE-2.1 and BLAST. It is actually used as a simulation engine. It takes simple text files as input and output.
Saturday, August 24, 2019
Quality Engineering Management of 3D Printing Research Proposal
Quality Engineering Management of 3D Printing - Research Proposal Example The introduction of the 3D printer has been one of the most remarkable examples of technological advancements through which, the users are allowed to transform any form of digital file into a physical product of three-dimensional innovations. 3D printing is highly customizable and the users can produce their desired three-dimensional objects according to their choices. The development of 3D printing has served beneficial for various manufacturing industries, creative industries, as well as within the dimension of research and education. However, there are various challenges and problems of 3D printing technology, essential to solving in order to improve the quality of output, which will be discussed in the research study. 3D printing has contributed much to the industrial sectors and individuals with its technology through which, a digital file can easily be converted into a three dimensional object. However, there are certain problems encountered when implementing the technology tha t is negatively affecting the users to obtain a desired and reliable outcome. 3D printing is used almost in every manufacturing industry such as automobiles, apparels, aircraft and firearms among others.Moreover, the technology has also contributed much in the film industries for adding various special effects to creations, especially when developing animated movies. The problems in the technology of 3D printing will negatively influence the output produced by these industries that will ultimately affect the performance of the industries.
Friday, August 23, 2019
The Theory of Market Mechanism Case Study Example | Topics and Well Written Essays - 1000 words
The Theory of Market Mechanism - Case Study Example Due to a fall in the rental, the supply of flats also declines, however, the quantity demanded of flats increases. This follows from the law of demand and supply. As a result, there is a gap between demand and supply or in other words, there arises a shortage in the market for dwelling spaces. This shortage is not a natural outcome but created by the suppliers or the landlords which result in an excess demand situation. This shortage generates scope for black marketing of flats at a higher rental. From the land lord's point of view, the creation of shortage is quite justifiable because the cost of maintenance and electricity has remained the same. In the process of black marketing, the flats are rented out at market clearing rental or even more. Since dwelling place is a necessary item for any consumer, the tenants are ready to pay the excess amount above the ceiling price. Thus there is discrimination because some are getting the flats at the Government determined rental whereas some have to pay out a huge amount. Thus there is a reverse effect of what the Government intended. Here the concept of economic rent also comes into play. Because of the price ceiling, a number of landlords are not willing to rent out their space, they are restricted from entering the market in fear of loss. Now suppose the Government decides to remove the ceiling and the rental price is determined by market mechanism, there will be huge opposition from both landlords and tenants because those who we re getting the flats at lower rent will oppose and again the landlords who were operating in the black market will passively support the tenants who were opposing. This is because the landlords are better off in a black market where they extract huge profit. The lobbying cost, lawyer fees, public relation costs are substantial.
Thursday, August 22, 2019
Alternative solutions for internet censorship in Australia Essay Example for Free
Alternative solutions for internet censorship in Australia Essay This report was commissioned to elaborate other alternative methods that can be used to monitor internet information in Australia without incorporating internet filtration as the Australian government proposes. The future of Australian children has been compromised by the immoral vices that the use of the internet perpetuates. Moreover, organizations, customers and innovators have also suffered from this paradigm which advocates for phishing, on-line identity theft and piracy among others. Therefore, the report advocates for the use of technology, political power, moral ethics and civil libertarians. These methods are not liable to scrutiny and criticism as they do not impede the first amendment bill of the constitution which advocates for freedom of expression among other concerns explained in the report. Furthermore, the report evaluates this range of methods and concludes that it would be ideal to implement the technology method. Introduction Advancement in technology has increased the reliance of internet as a means of entertainment and education source. It has also encompassed the education curriculum, social, economic and political activities creating both a positive and a negative impact. We have been able to succeed and are actually grateful because most of the information and technological know how can be retrieved with ease. However, our children and business enterprises have been adversely affected by the increased internet sexual harassment, privacy invasion, cyber-bullying, on-line identity theft, piracy and phishing just to mention a few in the unending list. In the event our children have developed aggressive attitudes which advocates for delinquent behaviours. On the other hand children that have experienced internet sexual harassment and bullying among others become depressed and thus are cut out from social life and its benefits. This explains the increased rates of teenage suicidal attempts in Australia (Australian Government 2007). Therefore, the government has taken a further step in an attempt of curbing this predicament by introducing mandatory internet filtration to all internet services at home, in schools and public computers used by he Australian children. The government also plans to prepare the Australian children on strategies of being responsible cyber-citizens, protecting their identity while on-line, understanding the impact of their actions on others while using the internet, responding to cyber-bulling and invasion of their privacy among other negative internet vices. To achieve this the government plans to launch education curriculum that provides first rate cyber-safety education programs and educate parents on the negative vices prevailed by the internet thus ensuring their children use the internet responsibly. Furthermore, the government plans to use the blacklist formulated by the Australia Communications and Media Authority (ACMA) to ensure harmful information is not availed to the children, establish a Youth Advisory Group (YAG) to easily access information affecting children on-line and to do further research on cyber- safety issues in Australia among others (Australian Government 2007). This initiative has been met with mixed reactions as some citizens support the idea while others reject the move critically analysing it. Critics view the move as a lash to the development and welfare of the citizens in terms of internet use because internet censorship will reduce the speed of the internet, the initiative is not effective because people will still be able to access the prohibited information through the use of proxy services and web services just to mention a few. The initiative will also violate the first amendment bill which advocates for freedom of expression. The country will waste a huge sum of its capital through the implementation of this impractical solution because approximately USD 22billion of tax payersââ¬â¢ money will be used to implement this initiative. Furthermore, the criteria that will be used to determine the appropriate age to use the internet, the appropriateness of information on the internet and determining a comprehensive blacklist are in question. Therefore, to anal the dilemma the government is facing this report will elaborate on alternative methods of internet censorship other than internet filtration that can be used (Harvey 2009b). Alternative solutions To end the conflicts that have arisen because of the proposal of incorporating compulsory Internet Service provider (ISP) filtering in the country the government should implement other alternatives such as use of technology, political power, moral ethics and civil libertarian to implement internet censorship as outlined below. Technology The government can utilize the available technology to help implement their strategies on internet censorship rather than using internet filtration. It can establish websites that teach and warn adults and children on the dangers prevailed by the internet and how to avoid them. Alternatively it can take the initiative of funding such programs that have already being established. This method will be effective as the probability of people using the internet to access such information is high. The method is also cost effective as such initiatives have been implemented in other countries for example USA and proved to be efficient. Also the government will easily be able to avail on-line safety rules to the vicinity of children such as using passwords, meeting people met through the internet with the consent or accompaniment of parents and avoiding giving out personal information. For instance the Business Software Alliance (BSA) has enable to alert and educate e-tailers and customers on the dangers of internet such as auction site frauds, counterfeiting, identity theft and phishing among others and effective ways of preventing being victims of the above vices. BSA has established a website were they offer their learning and safe guarding tips by displaying stories from victims and tips of avoiding such incidents (Lindroth 2008). Moreover, programs that allow parents to personally regulate internet information availed to their children should be used. This will prevent the government from formulating legislations that violated constitutional rights such as freedom of speech and expression. It will also allow the development of this technology thus benefiting the country and improving the welfare of the population at large. For example US citizens have been able to enjoy the benefits of using glubble a Firefox browser plug-in that has enabled parents to create a safe browsing environment for their kids. The technology is easy to use, fast to install, helps parents to manipulate internet information at the vicinity of their children and enable their children to have the appropriate on-line experience. Furthermore, it does not limit internet information that is important to adults but harmful to children such as family planning tips. Therefore, the government should capitalize on such mechanisms by offering their support either politically or economically (Gary 2009). Political power The government is politically empowered thus has the power to control legislations and policies that regulate this country. Therefore, it should use this opportunity to formulate policies that will enable attainment of cyber-security without contradicting on legislations that had been previously formulated. For instance use of plug-ins and programs that will allow parents and public utilities where children are predominate users of the internet will increase intellectual property infringement therefore, legislations that will protect owners innovation should be stipulated allowing effective use of trade marks, patents and copyright laws among others thus expand the rights of these intellectual property holders. This will encourage innovators thus increase the variety of the advanced technology to consumers. Furthermore, it will increase the competitive nature of the economy of Australia both locally and in the world market. The government should also stipulate mechanisms that will take stern action against culprits who are caught perpetuating cyber-bulling, internet sexual harassment and stealing peoples identity. The government should also avail easy mechanisms for reporting vices that curb cyber-safety. This will serve as a warning to prospective culprits and thus decrease the number of such incidents. Also children will grow up morally as they will avoid practising such vices because this initiative will effectively tame them. Victims of such vices, parents, and children will willingly surrender information concerning such culprits to the relevant authority because of the assurance that effective action will be taken (Harvey 2009a). Moral ethics Most of the activities and information in the internet are morally wrong as they violate ethics and human norms. Therefore, another mechanism that can be used to increase cyber-safety is educating and guiding the population and children in particular on moral vices that can be adopted, thus enabling the adherence and respect of business, religious, social and moral ethics. For example more incidents of school children participating in social networking sites that perpetuate immoral behaviour such as pornography and prostitution are evident therefore, learning institutions should formulate policies that will effectively deal with school children that participate in such incidents and break school rules. Parents on the other hand should develop engaging relationships with their children to be able to further instil the moral principles that they learn and adopt from their school environment. Therefore, the school administration should work hand in hand with the government to clearly outline guidelines that will discipline students in regards to information availed and collected from the internet. The collation that will be formed will also help parents and the general Australian population to access such guidelines thus further perpetuate adherence to moral ethics and human norms (Madson 2005). It is quite evident that teachers nowadays use social networking sites for education purposes. Therefore, teachers should ensure that they effectively elaborate to their students how they intend to communicate to them and the necessary instructions that they should follow when logged into such sites to prevent them from accessing information that is not related to education and perpetuates immorality. Alternatively the school administration should establish websites which should be regularly monitored where teachers and students can communicate. Moreover, the learning institutions should implement educative programs that will educate the students on issues related to on-line- safety and the responsible ways of using Facebook and MySpace among others. Furthermore, policies that will effectively deal with students that perpetuate and practice cyber-bullying should be enacted. This responsibility should not only be left to the school administration and the government, other bodies such as religious institutions, public conferences and gatherings, activists and ethicist should also advocate for the adherence of moral ethics and human norms through the use of mechanisms such as safety conversation (McMahon 2008). Civil libertarian The government should also not ignore the role played by civil libertarians rather they should work hand in hand with them. This will further help them to ensure cyber-safety in Australia is emanated and thus protect the innocence and rights of children. This is because civil libertarians fight for the rights and respect of computer and network users by encouraging those involved to register with them thus regulates their activities. Therefore when formulating new legislations or changing those that already exists the government should engage such organizations thus the policies that will be formulated will be at the best interest of all stakeholders. For instance the Electronic Frontier Foundation in US provides legal assistance to companies or organizations that have out rightly been denied their constitutional rights by implementation of impractical legislations. In the event the organization promotes the US laws and allows efficient incorporation of advanced technology into the country. However, it indirectly regulates the information in the internet by offering legal support to organizations that avail useful information which is not harmful to the social being and economic welfare of the community and the country. Therefore, Australia should implement this example and follow suit as cyber-security will be enhanced while protecting and respecting the constitutional and human rights of its citizens (Swidorski 2003). Conclusion From the above facts it is quite clear that all the above principles should be implemented to effectively implement internet censorship. Each principle covers a specific area of enhancing cyber-safety in the country and among the citizens. The role that the government and politicians in general can play in the attempt of protecting Australian children from internet immoral vices without developing conflicts is outlined. However, the government also needs to work hand in hand with the school administration, teachers, parents and civil libertarians to efficiently enhance on-line security and educate Australian children on mechanisms of being responsible cyber-citizens. Also as we aim to be a world class country we will have to incorporate more sophisticated technology which is mainly attained from the reliance of the internet therefore, this subject should be researched regularly to enable formulation of policies that are relevant to the current technology in the country. In the event the country will be able to attain the technology without restrictions that may curb its development. Therefore, from my own opinion it is ideal for the government to implement the technology method which will go hand in hand with the development objective of the country because it will be cheaper to incorporate, it will be easier to regulate internet information at the disclosure of children while still gaining access to information that will help in improving the welfare of the community and country at large and human rights will not be violated as a result of internet censorship which I do not support. Word Count: 2189 List of references Australian Government (2007), Attitudes and behaviour of young people on-line, Research Summary. Available at http://www. minister. dcita. gov. au/_data/assets/pdf_file/73394/research_summary- web. pdf [Accessed on 28th, May, 2009]. Gary, J. (2009), ââ¬Å"Short range plug-ins work best in US,â⬠Automotive Engineer, 34(3), p. 49. Harvey, S. (2009a), Australian internet censorship in practice, Available at http://www. pingudownunder. com/blog/2009/03/19/australian-internet-censorship-in- practice/ [Accessed on 28th, May, 2009] Harvey, S. (2009b), Issues with re-establishing identity after natural disasters, Available at http://www. pingudownunder. com/blog/index. php [Accessed on 28th, May, 2009] Lindroth, L. (2008), ââ¬Å"How to improve on-line safety,â⬠Teaching Pre K-8, 28(7), p20. Madson, W. (2005), Internet censorship, Available at http://www. rense. com/general69/intercens. htm [Accessed on 28th, May, 2009] McMahon, F. (2008), ââ¬Å"Smooth operator,â⬠Digital Content Producer, 34(11), pp. 30-33. Swidorski, C. (2003), ââ¬Å"Political science, the Labour Movement, and the struggle for freedom of expression,â⬠New Political Science, 22(3), pp. 319-340.
Wednesday, August 21, 2019
Effect of Ph on Green Pea Germination Essay Example for Free
Effect of Ph on Green Pea Germination Essay Effect of pH on Green Pea Germination Objective: To determine how pH affects the germination of green peas and to examine the degree of germination within each pH level. We will do this by using various buffer solutions (along with distilled water) to grow green peas. Hypothesis: We expected that the group of peas that encountered a pH of 7 to have the most and highest degree of germination. Materials: tap water buffer solutions pH 3,5, 7, 1 distilled water 50 greens peas trays paper towels beakers Procedure: Wrap 25 peas (25 peas = 1 group) in paper towels. Place each group in 2. Pour 10 mL of tap water and 30 mL of distilled water or buffer solution onto each group of peas 3. 4. Add tap water accordingly to keep peas moist After one week, add another 20mL of distilled water or buffer solution onto each group of peas. 5. Observe amount of germination and degree of germination (length of the shoots) PH3 PH5 Distilled Water PH7 PH9 PHII Number Germinated 17 24 Number not Germinated Number of peas with shoots that were at least 1 inch long 14
Subscribe to:
Posts (Atom)