• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Code model and the inferential model

Extracts from this document...

Introduction

Code model and the inferential model

There are 2 different models of linguistic communication, the classic model, the code-model and the inferential model.

Code model:

The communicator encodes the message, by a signal, that the hearer than decodes. Sentences are just complex signals that encode messages.

                             signals

image00.png

                                  code

                             messages

The speaker selects the message and transmits the corresponding signal, which is received and decoded at the other end, when all goes well, the result of the reproduction in the receiver of the original message.

On this approach, the communication is guaranteed as long as both individuals are functioning correctly, each has an identical copy of the code, and the signal is not destroyed.

The code model exists in the nature, it is correct for animal communication.

e.g.: bee dance, which used to indicate the direction and distance of nectar.

Q: But how do human communicate?

Example:

Mary is angry with Peter and she doesn’t want to talk to him. When he tries to engage her in conversation, she might:

  1. stare ostentatiously at the ceiling.
...read more.

Middle

Which, if any, of Mary’s actions encode exactly her meaning?

Some of human communication can be achieved without any code.

Language is a code, which vastly increases the possibilities of human communication.

What is conveyed by linguistic communication goes beyond what is coded.

The communicator’s actions provide clues to the meaning, which the hearer must infer.

Inferential model:

Grice (1975)

Communication can be achieved without a code by individuals who can infer each other’s intentions.

The communicator’s behaviour is treated as a piece of evidence about the intentions.

Evidences may be compatible with several different hypotheses and the interpreter’s job to construct the best hypothesis to explain the communicator’s behaviour, the interpretation of non-verbal communication, like the action, involves inference to the best explanation by the intelligent guesswork, rather than decoding of signals by use of code.

An utterance is a piece of evidence of the speaker’s meaning.

Decoding the linguistic sentence meaning is seen as just one part of the process of comprehension.

...read more.

Conclusion

Example:

Peter: I’m beat!

Mary: Ok, let’s go back home.

Is the meaning that Peter and Mary associate with the word “beat” is the same. It may be that, for Peter, “beat” means an extreme fatigue, while for Mary, “beat” is simply a synonym of “tired”. In any event, Peter says, “I’m beat,” not in order to indicate a degree of fatigue that this term might encode, but in order to indicate contextually both his wish to return home and the reason for it, namely his fatigue. The level of fatigue that may justify one’s desire to return home depends on the situation: it is not the same at a party among friends, while taking a stroll, or at work. In Peter’s utterance, then, “beat” indicates the level of fatigue which, in the situation of the utterance, is relevant in that it justifies Peter’s wish. It is not necessary that the codes between interlocutors be identical; nor is it sufficient. Consider the following dialogue:

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Traffic Light Simulation and Machine Code Program.

    Off Line Computer resources that will be connected and made available at some later time. Off line resources do not need interaction with the user. On Line Computer resources that are connected and can be accessed with a negligible or short time delay.

  2. Phong Shading and Gouraud Shading The standard reflection model in computer graphics that ...

    The viewing transformation is specified with gluLookAt(). The arguments for this command indicate where the camera (or eye position) is placed, where it is aimed, and which way is up. The arguments used here place the camera at (0, 0, 5), aim the camera lens towards (0, 0, 0), and specify the up-vector as (0, 1, 0).

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    { black = black + 1; } else { black = black - 1; } } } if (black > 60) modified_value = 0; else modified_value = 1; // 0 - black; 1 - white //use power function and assign the value storage_vector = storage_vector + (pow (bas,value))* modified_value; }

  2. Windows Communication foundatio

    * The Client (Found in the File MathsClient) There is also the search engine for the database which has also been created using the WCF framework and these are found in the files: * The Host (found in the file SearchHost)

  1. So in order to understand what the main areas where organisation should be aware ...

    * ICMP error Message Quenching RFC 1812 25 suggests limiting the rate at which various error messages are sent. Only a few operating systems are known to follow this RFC. An attacker can use this to send UDP packets to a random, high UDP port and count the number of unreachable messages received within a given amount of time.

  2. The purpose of this project is to discuss the issues associated with the deployment ...

    In subsequent WAP specification releases, the WAP Forum addressed interoperability, established a certification program, and added various features in response to changes in market requirements and improvements in networks, devices and new technologies. WAP 2.0 is a next-generation set of specifications that, like previous releases, marks the WAP Forum's ongoing efforts to adopt the most recent Internet standards and protocols.

  1. This project intends to clarify the encapsulation process and the tunnelling protocol technologies used ...

    Also the different tunnelling protocol technologies used [COSIU98] such as: * Internet Protocol Security (IPSec) is a standard created to add security to TCP/IP networking * Point-to-Point -tunnelling Protocol (PPTP) is strictly a tunnelling protocol and does not include encryption or key-management mechanisms * Layer 2 Tunnelling Protocol (L2TP)

  2. Analyse the pressures that have confronted the 'German model' of industrial relations in the ...

    Today, at the end of the 1990s, in spite of the virtues of the German model the pressures on the system to change are overwhelming. Employers increasingly resign from the employers' confederation or undercut- often illegally- terms and conditions provided by collective agreements.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work