02154nlm0 22002531i 450 001001300000010001600013100003900029101000600068102000600074105001600080135001600096200011100112210004100223215000900264230002300273301001600296305005900312330112100371336007501492700001301567856009301580856011701673856011001790HARMA 208206a9782336458489a20241221d2024 u y0frea0103 baafreafrea z 001z adrun nnnauauaaThe Epic Of El Hadj Umar - Vibrant African Oral Narratives from Gambiab[Ressource électronique]fSamba DiopaPariscEditions L'Harmattand2024a264 p.a[Données textuelles]a9782336458472aVersion électronique de l'édition papier : 9782336458472aThe story of Omar Tall, a hero also known under the appellation of El Hadj Omar (or Umar), is well known. The same goes for the epic story that bears the same name. The action takes place in the Senegambia region which abounds with oral traditions. Omar left his native village of Halwaar in the northern region of Fuuta. He then travelled across the length and width of West Africa, making it all the way to Mecca; during his trip, he visited Nigeria and Egypt. Several languages are used in these epic texts : Mandinka, Wolof, Pulaar, and Arabic. In the Sahel region, Omar converted the local populations to Islam and, if needs be, by using the sword. However, in this great epic story, the action takes place mainly in Gambia; moreover, the Gambia episode is not well known, hence the additional interest of this book. In the final analysis, The epic of El Hadj Umar is a living tradition, still sung, chanted, recited, and in psalmody mode; the story is crossed from start to finish by: orality, mythology, hagiography, and history. Furthermore, the epic story reflects the current cultural reality of West Africa.aType de ressource électronique : données textuelles et iconographiquesaSamba Diop40uhttps://www.editions-harmattan.fr/catalogue/couv/9782336458472r.jpg2Image de couverture40uhttps://www.harmatheque.com/downloadebook/9782336458472zAccès après authentification2Télécharger au format PDF40uhttps://www.harmatheque.com/readebook/9782336458472zAccès après authentification2Lire ce livre en ligne