Preferred Language
Articles
/
jcolang-750
The Linguistic Characteristics In The Morphology ( Nominal Suffixes ) Of a Number Of ( Khoryat or Hoyrat ) Printed By The Poet Kamal Mustafa Daquqli: Kemal Mustafa Dakuk ̕ lunun Basılmayan Bazı Hoyratlarında Şekil Bilgisi Özelliklerin ( İsim Durum Ekleri )
...Show More Authors

The present study, entitled “ linguistic characteristics (the morphology - nominal suffixes ) of a number of (Quriyat or koyrat ) by the poet Kamal Mustafa Daquqli, aims at studying and making a comparison between  Turkmen dialect written and spoken forms that show many of the hidden language structures. Similarly, the study sheds light on the poet as one of the most prominent literary figures in Turkmenistan literature.

Turkman Quriyat is one of Turkman blank verse significant forms. Apart from (songs and Quriyat) and until the 19th C., folk poetry has been stalled for a long time but reclaimed its literary high position in the middle of the 20th C.

The study introduction briefly discusses Turkman literature and traces its variant forms, studies the morphology - nominal suffixes of a number of (Quriyat or koyrat ), and  makes a comparison between Turkman and Turkish language through number of given examples. Moreover, it presents a faithful reproduction of a number of unpublished original Quriyat with the necessary alterations to suit Turkman language. During the course of the dictionary writing, a special importance is given to the meanings of Quriyat words that have different form and meaning in modern Turkish language.

The conclusion sums up the basic characteristics of Turkman language.

Özet

          Şiirimizin başlangıcı sayılan hoyrat bir duygu ve düşünceyi özgün yollarıyla dile getiren, yedi heceli, dört veya daha fazla mısralı bir halk şiiri türüdür. Hoyrat kendine özgü (özel) müzüğü ile mertlik havası uyandıran, sevda gurbet, sevinç keder, yas, yurt sevgisi, kin ve benzer duyguları işleyen, sanat kavramının klasik unsurlarıyla beslenmiş bir halk edebiyatıdır. Hoyrat bizim Irak Türkmen Edebiyat̕ında çok geniş yer tutar yüksek sanat anlayışı ve aynıca duygusunun bir sonucu olarak edebi sanatların varlığını kayıt eder. Irak Türkmen halk edebiyatının kimliği sayılan hoyrat şüphesiz halk şiirinin en güçlü örneğidir. Fakat halk edebiyatı mahsülleri arasınd bölge halkının tapmacalar dediği bilmeceler önemli bir yer tutar. Bir kısmı manzum olan tapmacalar gibi eskiler sözü, yani atasözü de Irak mensur Türkmenlerinin yaşadığı alanlarda  canlılığını sürdürür. Halk edebiyatı mahsulleri arasında nükteler, Molla Nasrettin nükteleri, dualar, beddualar, dilek ve temenni  sözler ilgi çeker. Ancak  Halk  edebiyatının nesir örnekleri için, bölge halkı arasında matal denilen  masallar  başta gelir. Uzun hikâye, destan veya efsâne türü açısından. Türkmenler arasında yaşayan ve günümüze ulaşan örneklere tesadüf edilmemiştir. Bilinen tek uzun hikâye Arzu ile Kanber atalıdır.

          Kerkük Türkmen ağzının güzel nesir örneği olan bu masal, Halk edebiyatı metinleri arasında verilmiştir. Türkmen Halk edebiyatı çocuk masalları  bakımından  da zenginlik arzeder. Kemal Mustafa Dakuk̕ lu yıllar boyu içli hoyratlar kaleme almıştır, yazdığı basılmayan hoyratları toplayarak ve akrabaları ile görüşüp hayatı hakkında bilgi toplayı, hoyratları topluyup bir çalışma olarak hazırladım. Çalışma giriş, dil özelliklerinde isim durum ekleri, basılmayan hoyratlar ve sözlükten oluşmaktadır .Girişte Türkmen edebiyatı hakkında bilgiler vermeye çalıştım , basılmayan hoyratları yazdım , daha sonra Kerkük ağzının şekil bilgisinin (isim işletme eklerinin) özelliklerini verip çalışmaya esas olmakla birlikte karşılaştırmalar yapılmıştır. Karşılaştırmada standart Türkiye Türkçesi esas alınmış, Anadolu ağızlarına değinilmiştir. Son olarak hoyratlada geçen kelimelerden standart Türkiye Türkçesine göre önemli şekil ve anlam ayrılıkları gösterenlerle yazı dilinde bulunmayanlar yer almaktadır. Bu çalışmayı yazdığım sürede maddi ve manevi desteklerini üzerimdem esirgemiyen ailem bana her konuda yardım ettiklerinden minnattarım. Bu çalışmanın gerçekleşmesinde değerli bilgilerini benimle paylaşan kendilerine ne zaman danışsam bana  zamanlarını ayırıp sabırla ve büyük bir ilgiyle bana faydalı ola bilmek için ilk olarak Kemal DAKUK̕LUNUN gelini olan (Zeynep Abbas) öğrencime , şairin kendi özel defterinden basılmamış hoyratlarını bana getirdiği için sonsuz şukranlarımı sunmaktayım.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 24 2025
Journal Name
Plos One
Assessment of the bypass of obturation materials beyond fractured instruments after using different obturation techniques in simulated curved canals (An in-vitro study)
...Show More Authors

This study evaluated the extent to which obturation materials bypass fractured endodontic instruments positioned in the middle and apical thirds of severely curved simulated root canals using different obturation techniques. Sixty resin blocks with simulated root canals were used, each with a 50° curvature, a 6.5 mm radius of curvature, and a length of 16.5 mm, prepared to an ISO #15 diameter and taper. Canals were shaped using ProTaper Universal files (Dentsply Maillefer) attached to an X-smart Plus endo motor (Dentsply), set at 3.5 Ncm torque and 250 rpm, up to size S2 at working length. To simulate fractures, F2 and F3 files were weakened 3 mm from the tip, then twisted to break in the apical and middle sections of the canal, re

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Education And Scientific Studies
Studying the effect of laser stress in combination with mannitol on some morphological parameters of cabbage (Brassica oleracea var L. capitata) In vitro
...Show More Authors

Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Frequency inborn error of mitochondrial function in Mosul and Kurdistan region: the Frequency inborn error of mitochondrial function in Mosul and Kurdistan region
...Show More Authors

This work aimed to estimate the frequency of mitochondrial inborn errors of metabolism (MIEMs) in patients presenting with family history and IEM-picture who referred for advance IEM assay in Mosul province and Kurdistan region. This study was observational study conducted on 364 cases referred from different general /or private pediatric clinics with unexplained sign and symptoms and suspension of mitochondrial dysfunction. The study included 364 children with an age ranging from 1 month to 1 year. Started from January 2018 to January 2020. All patients referred with their full history review, notes about their clinical examination, and laboratory investigations including blood ammonia, serum lactate/ pyruvate, arterial blood gases. In

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Advances On Computational Intelligence In Energy
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
...Show More Authors

Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Asphaltene Precipitation Investigation Using a Screening Techniques for Crude Oil Sample from the Nahr-Umr Formation/Halfaya Oil Field
...Show More Authors

Many oil and gas processes, including oil recovery, oil transportation, and petroleum processing, are negatively impacted by the precipitation and deposition of asphaltene. Screening methods for determining the stability of asphaltenes in crude oil have been developed due to the high cost of remediating asphaltene deposition in crude oil production and processing. The colloidal instability index, the Asphaltene-resin ratio, the De Boer plot, and the modified colloidal instability index were used to predict the stability of asphaltene in crude oil in this study. The screening approaches were investigated in detail, as done for the experimental results obtained from them. The factors regulating the asphaltene precipitation are different fr

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Wed Oct 21 2015
Journal Name
Integrated Journal Of Engineering Research And Technology
A HYBRID CUCKOO SEARCH AND BACK-PROPAGATION ALGORITHMS WITH DYNAMIC LEARNING RATE TO SPEED UP THE CONVERGENCE (SUBPL) ALGORITHM
...Show More Authors

BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.

Publication Date
Sun Dec 17 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study Using the Passive Solar Chimney for Evaporative Cooling With PCM and CFM as a Thermal Energy Storage
...Show More Authors

 

      In this work, a test room was built in Baghdad city, with (2*1.5*1.5) m3  in dimensions, while the solar chimneys (SC) were designed with aspect ratio (ar) bigger than 12. Test room was supplied by many solar collectors; vertical single side of air pass with ar equals 25, and tilted 45o double side of air passes with ar equals 50 for each pass, both collectors consist of flat thermal energy storage box collector (TESB) that covered by transparent clear acrylic sheet, third type of collector is array of evacuated tubular collectors with thermosyphon in 45o instelled  in the bottom of TESB of vertical SC. The TESB was

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 03 2021
Journal Name
021 8th International Conference On Computing For Sustainable Global Development (indiacom)
Tilting-rotors Quadcopters: A New Dynamics Modelling and Simulation based on the Newton-Euler Method with Lead Compensator Control
...Show More Authors

Scopus (18)
Scopus
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref (1)
Scopus Crossref