Preferred Language
Articles
/
jcolang-853
Negation marker in Standard Persian : a typological analysis based on Givon’s functional model: عامل نفی در زبان فارسی معیار: بررسی رده‌شناختی براساس مدل نقش‌ گرایی گیون
...Show More Authors

 Abstract:

Typological analysis about  the negation marker  in different languages is one of the fields of research that has attracted much attention.  In Persian language, this constituent has been analysed from different aspects. This study aimed to analyse  different aspects of negation marker  in  the adjectives,  the noun phrases and  the verb phrases based on typological analysis.  Many studies have been revealed that  the negation in adjectives has shown lexically and morphologically. In the noun phrases, /hich/  has used as a negative marker necessarily marking the verb phrase as negative too. In the verb phrases, negation occurs morphologically by the addition of the prefix /na/(no) or its variations. In  the modal auxiliaries /khastan/ and /tawanestan/(can), aspectual auxiliary /budan/ (be) and lexicalized auxiliary /bayad/(must) negative marker occurs either before the auxiliary or before the main verb. Moreover, in the modal auxiliary /shodan/(will be)  and the lexicalized word /shayad/ (perhaps)  only the main verb is negated. However, aspectual auxiliary /dashtan/ (to have) has shown a different behavior in that its negative form and the negative form of the modal auxiliary become neutral. Negation filed in the  verb phrases and morphological negative adjectives is narrow and only a portion of negative proposition falls under the field of negation while negative field in the noun phrases is broad and includes the entire proposition.

Keywords: Typological analysis, negation marker  ,syntactic negation , emphatic negation, field  of negation

چکیده:

بررسی رده‌شناختی سازه نفی در زبان‌های گوناگون بسیار مورد توجه قرار گرفته است. در زبان فارسی این سازه از بسیاری جهات قابل بررسی می‌باشد. این پژوهش کوشیده است با نگاهی رده‌شناختی به سازه نفی، جنبه‌های مختلف عامل نفی در صفات، گروه‌های اسمی و گروه‌های فعلی را بررسی کند. بررسی‌ها نشان می‌دهند نفی در صفات به صورت ساخت‌واژی و واژگانی اتفاق می‌افتد. نفی در گروه‌های اسمی به کمک عامل منفی "هیچ" صورت می‌پذیرد که با منفی‌شدن اسم یا گروه اسمی، فعل نیز الزاما منفی می‌شود. در گروه‌های فعلی نفی به صورت ساختواژی با افزودن پیشوند "نـ" اتفاق می‌افتد. در فعل‌های معین وجه‌نمای "خواستن و توانستن"، فعل معین نمودنمای "بودن" و فعل معین واژگانی‌شده "باید" سازه منفی هم پیش از فعل معین قرار می‌گیرد هم پیش از فعل واژگانی. در فعل معین  وجه‌نمای "شدن" و فعل واژگانی‌شده "شاید"، تنها فعل واژگانی منفی می‌شود. فعل معین  نمودنمای "داشتن" رفتار متفاوتی از خود به نمایش می‌گذارد و تقابل صورت منفی این فعل نمودنما با صورت منفی وجه‌نمای آن خنثی می‌شود. سیطره عامل نفی در گروه‌های فعلی و صفات منفی ساخت‌واژی محدود بوده و تنها بخشی از گزاره را در بر می‌گیرد. در صورتی‌که سیطره نفی در گروه‌های اسمی گسترده و  دربرگیرنده همه گزاره است.

Received on 23/6/2023 

Accepted on 20/8/2023 

Published on 2/1/2024

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Creative accounting practices for supply contracts and the role of internal audit in reducing them: An exploratory study on a sample of industrial companies in Iraq
...Show More Authors

Abstract:

                The internal control is the tool through which it is possible to verify and ensure the implementation of tasks in accordance with the established plans and programs and to evaluate the level of performance that is implemented within the different companies.

A guarantee from the supplier with the absence of a specialized technical committee that follows up the stages of implementing the contract and disbursing all amounts of financial dues to the supplier before completing the implementation of the contract and overlooking the non-implementation of some clauses of the contract by the committee in charge of

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Technology Usage in English Language Teaching and Learning: Reality and Dream
...Show More Authors

The aim of the study is to diagnose the real level of technology usage in teaching and learning EFL at university from teachers and students’ viewpoints, and see if it is possible to achieve something of the researchers’ dream - accessing top universities. Two questionnaires have been used to measure the range of technology usage in Colleges of Education for Women, Baghdad and Iraqi Universities, and College of Basic Education. The results have shown that the reality of using technology is still away from the dream. The results have been ascribed to two reasons: The first is the little knowledge of using technology in teaching, and the second is that technology is not included in the curriculum.

View Publication Preview PDF
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Demand Priority in a Power System With Wind Power Contribution Load Shedding Scheme Based
...Show More Authors

The load shedding  scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy  resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control & Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Sun Apr 23 2017
Journal Name
International Conference Of Reliable Information And Communication Technology
Classification of Arabic Writer Based on Clustering Techniques
...Show More Authors

Arabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio

... Show More
Scopus (6)
Scopus
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (20)
Crossref (19)
Scopus Crossref