In phonology, a chain shift is a phenomenon in which several sounds move stepwise along a phonetic scale. The sounds involved in a chain shift can be ordered into a "chain" in such a way that, after the change is complete, each phoneme ends up sounding like what the phoneme before it in the chain sounded like before the change. The rules making up a chain shift are said to be in counterfeeding order.
For example, if in some language the three vowel phonemes undergo a change such that becomes , becomes , and becomes , those three changes would constitute a chain shift and could be summarized as
: → → →
A pull chain is a chain shift in which the phoneme at the "leading" edge of the chain changes first. In this example, the chain shift would be a pull chain if changed to first, opening up a space at the position of which then moved to fill. A push chain is a chain shift in which the phoneme at the "end" of the chain moves first: in this example, if moved toward , creating a "crowding" effect and causing to move toward , and so forth.
: ( →) → → (→ ) → and → → (→ ) →
A chain shift may affect only one regional dialect of a language, or it may begin in a particular regional dialect and then expand beyond the region in which it originated. A recent regional chain shift in English is the Northern Cities Vowel Shift, which is confined to the "Inland North" region of the United States.
Although a typical chain shift is a set of vowel shifts, chain shifts can also occur in consonants. A famous example of such a shift is the well-known First Germanic Sound Shift or Grimm's Law, in which the Proto-Indo-European voiceless stop consonants became fricatives, the plain voiced stops became voiceless, and the breathy voiced stops became plain voiced. Another is the High German consonant shift which separated Old High German from other West Germanic dialects such as Old English, Old Frisian, and Old Saxon.
Nzebi (or Njebi), a Bantu language of Gabon, has the following chain shift, triggered morphophonologically by certain tense/aspect suffixes:
{| | || → || || → || || → || |- | || || || || || → || |- | || || || → || || → || |}
Examples (Guthrie 1968) follow:
:{| ! Underlying form !! Chain-shifted form |- | "to work" || → |- | "to give" || → |- | "to carry" || → |- | "to refuse" || → |- | "to go down" || → |- | "to arrive" || → |- | "to hide oneself" || → |}
Another example of a chain from Bedouin Hijazi Arabic involves vowel raising and deletion:
{| | || → || || → || deletion |}
In nonfinal open syllables, raises to while in the same position is deleted.
Synchronic chain shifts may be circular. An example of this is Xiamen tone or Taiwanese tone sandhi:
{| | 53 || → || 44 || → || 22 || → || 21 || → || 53 |}
The contour tones are lowered to a lower tone, and the lowest tone (21) circles back to the highest tone (53).
Synchronic chain shifts are an example of the theoretical problem of phonological opacity. Although easily accounted for in a derivational rule-based phonology, its analysis in standard parallel Optimality Theory is problematic.
Category:Historical linguistics Category:Phonology
This text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.
The World News (WN) Network, has created this privacy statement in order to demonstrate our firm commitment to user privacy. The following discloses our information gathering and dissemination practices for wn.com, as well as e-mail newsletters.
We do not collect personally identifiable information about you, except when you provide it to us. For example, if you submit an inquiry to us or sign up for our newsletter, you may be asked to provide certain information such as your contact details (name, e-mail address, mailing address, etc.).
When you submit your personally identifiable information through wn.com, you are giving your consent to the collection, use and disclosure of your personal information as set forth in this Privacy Policy. If you would prefer that we not collect any personally identifiable information from you, please do not provide us with any such information. We will not sell or rent your personally identifiable information to third parties without your consent, except as otherwise disclosed in this Privacy Policy.
Except as otherwise disclosed in this Privacy Policy, we will use the information you provide us only for the purpose of responding to your inquiry or in connection with the service for which you provided such information. We may forward your contact information and inquiry to our affiliates and other divisions of our company that we feel can best address your inquiry or provide you with the requested service. We may also use the information you provide in aggregate form for internal business purposes, such as generating statistics and developing marketing plans. We may share or transfer such non-personally identifiable information with or to our affiliates, licensees, agents and partners.
We may retain other companies and individuals to perform functions on our behalf. Such third parties may be provided with access to personally identifiable information needed to perform their functions, but may not use such information for any other purpose.
In addition, we may disclose any information, including personally identifiable information, we deem necessary, in our sole discretion, to comply with any applicable law, regulation, legal proceeding or governmental request.
We do not want you to receive unwanted e-mail from us. We try to make it easy to opt-out of any service you have asked to receive. If you sign-up to our e-mail newsletters we do not sell, exchange or give your e-mail address to a third party.
E-mail addresses are collected via the wn.com web site. Users have to physically opt-in to receive the wn.com newsletter and a verification e-mail is sent. wn.com is clearly and conspicuously named at the point of
collection.If you no longer wish to receive our newsletter and promotional communications, you may opt-out of receiving them by following the instructions included in each newsletter or communication or by e-mailing us at michaelw(at)wn.com
The security of your personal information is important to us. We follow generally accepted industry standards to protect the personal information submitted to us, both during registration and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100 percent secure, however. Therefore, though we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.
If we decide to change our e-mail practices, we will post those changes to this privacy statement, the homepage, and other places we think appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.
If we make material changes to our e-mail practices, we will notify you here, by e-mail, and by means of a notice on our home page.
The advertising banners and other forms of advertising appearing on this Web site are sometimes delivered to you, on our behalf, by a third party. In the course of serving advertisements to this site, the third party may place or recognize a unique cookie on your browser. For more information on cookies, you can visit www.cookiecentral.com.
As we continue to develop our business, we might sell certain aspects of our entities or assets. In such transactions, user information, including personally identifiable information, generally is one of the transferred business assets, and by submitting your personal information on Wn.com you agree that your data may be transferred to such parties in these circumstances.