Preferred Language
Articles
/
jcolang-853
Negation marker in Standard Persian : a typological analysis based on Givon’s functional model: عامل نفی در زبان فارسی معیار: بررسی رده‌شناختی براساس مدل نقش‌ گرایی گیون
...Show More Authors

 Abstract:

Typological analysis about  the negation marker  in different languages is one of the fields of research that has attracted much attention.  In Persian language, this constituent has been analysed from different aspects. This study aimed to analyse  different aspects of negation marker  in  the adjectives,  the noun phrases and  the verb phrases based on typological analysis.  Many studies have been revealed that  the negation in adjectives has shown lexically and morphologically. In the noun phrases, /hich/  has used as a negative marker necessarily marking the verb phrase as negative too. In the verb phrases, negation occurs morphologically by the addition of the prefix /na/(no) or its variations. In  the modal auxiliaries /khastan/ and /tawanestan/(can), aspectual auxiliary /budan/ (be) and lexicalized auxiliary /bayad/(must) negative marker occurs either before the auxiliary or before the main verb. Moreover, in the modal auxiliary /shodan/(will be)  and the lexicalized word /shayad/ (perhaps)  only the main verb is negated. However, aspectual auxiliary /dashtan/ (to have) has shown a different behavior in that its negative form and the negative form of the modal auxiliary become neutral. Negation filed in the  verb phrases and morphological negative adjectives is narrow and only a portion of negative proposition falls under the field of negation while negative field in the noun phrases is broad and includes the entire proposition.

Keywords: Typological analysis, negation marker  ,syntactic negation , emphatic negation, field  of negation

چکیده:

بررسی رده‌شناختی سازه نفی در زبان‌های گوناگون بسیار مورد توجه قرار گرفته است. در زبان فارسی این سازه از بسیاری جهات قابل بررسی می‌باشد. این پژوهش کوشیده است با نگاهی رده‌شناختی به سازه نفی، جنبه‌های مختلف عامل نفی در صفات، گروه‌های اسمی و گروه‌های فعلی را بررسی کند. بررسی‌ها نشان می‌دهند نفی در صفات به صورت ساخت‌واژی و واژگانی اتفاق می‌افتد. نفی در گروه‌های اسمی به کمک عامل منفی "هیچ" صورت می‌پذیرد که با منفی‌شدن اسم یا گروه اسمی، فعل نیز الزاما منفی می‌شود. در گروه‌های فعلی نفی به صورت ساختواژی با افزودن پیشوند "نـ" اتفاق می‌افتد. در فعل‌های معین وجه‌نمای "خواستن و توانستن"، فعل معین نمودنمای "بودن" و فعل معین واژگانی‌شده "باید" سازه منفی هم پیش از فعل معین قرار می‌گیرد هم پیش از فعل واژگانی. در فعل معین  وجه‌نمای "شدن" و فعل واژگانی‌شده "شاید"، تنها فعل واژگانی منفی می‌شود. فعل معین  نمودنمای "داشتن" رفتار متفاوتی از خود به نمایش می‌گذارد و تقابل صورت منفی این فعل نمودنما با صورت منفی وجه‌نمای آن خنثی می‌شود. سیطره عامل نفی در گروه‌های فعلی و صفات منفی ساخت‌واژی محدود بوده و تنها بخشی از گزاره را در بر می‌گیرد. در صورتی‌که سیطره نفی در گروه‌های اسمی گسترده و  دربرگیرنده همه گزاره است.

Received on 23/6/2023 

Accepted on 20/8/2023 

Published on 2/1/2024

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 07 2015
Journal Name
European Chemical Bulletin
DETERMINATION OF CANCER ANTIGEN CA15-3 AND ALPHA FETO PROTEIN (AFP) LEVELS AS TUMOR MARKER IN PATIENTS WITH BREAST AND PROSTATE CANCER
...Show More Authors

European Chemical Bulletin (ISSN 2063-5346) is a peer-reviewed journal that publishes original research papers, short communications, and review articles in all areas of chemistry. European Chemical Bulletin has eight sections, namely

View Publication
Publication Date
Sat Jun 01 2024
Journal Name
Pakistan Journal Of Criminology
Artificial Intelligence Technology in the Field of Modern Forensic Evidence: Brain Fingerprinting as a Model
...Show More Authors

Brain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining

... Show More
View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Useing the Hierarchical Cluster Analysis and Fuzzy Cluster Analysis Methods for Classification of Some Hospitals in Basra
...Show More Authors

In general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As t

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The role of the leader in empowering workers Application study in a sample of Iraqi telecom companies - Asia-Cell model
...Show More Authors

 

Abstract

Leadership has now become a process for applying methods and techniques that make the Organization at the top of its competitive pyramid a greater market share. Leadership has become a focus for all leaders and managers، and leaders and managers are increasingly seeking to develop their skills and leadership skills. The research started with a clear problem of specific questions to ensure that the general objective of the research is to describe the characteristics of the leader and to clarify the dimensions of empowering the workers and to highlight the role of the leader in empowering the workers. The study examines the relation between the role of the leader in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 03 2011
Journal Name
Journal Of Educational And Psychological Researches
The effect of critical listening in teaching reading on developing students critical thinking at Kurdish Language Department
...Show More Authors

Students' passive listening to their teacher's reading is one of main
reasons behindtheir weakness in the reading skill which in its turn may
hinderachieving the in desired objectives.
When exploiting critical thinking, which will lead to deeper
understanding of the intellectual content, in learning and accurate and
correct students' outcomes.
Active listening allows paying attention to the speaker, asking him,
arguing with him, judging what he says, and making decision on what
he says. For this reason, the researcher felt the need for preforming a
study to identify the effect of critical listening on developing students'
critical thinking at reading in the Kurdish language department.
The researcher has

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
2017 12th International Conference For Internet Technology And Secured Transactions (icitst)
A novel multimedia-forensic analysis tool (M-FAT)
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Vibration Analysis of a Composite Plate with Delamination
...Show More Authors

The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
Analysis of a harvested discrete-time biological models
...Show More Authors

This work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.

Scopus (6)
Scopus
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Geomechanics Analysis of Well Drilling Instability: A Review
...Show More Authors

Wellbore instability is a significant problem faced during drilling operations and causes loss of circulation, caving, stuck pipe, and well kick or blowout. These problems take extra time to treat and increase the Nonproductive Time (NPT). This paper aims to review the factors that influence the stability of wellbores and know the methods that have been reached to reduce them. Based on a current survey, the factors that affect the stability of the wellbore are far-field stress, rock mechanical properties, natural fractures, pore pressure, wellbore trajectory, drilling fluid chemicals, mobile formations, naturally over-pressured shale collapse, mud weight, temperature, and time. Also, the most suitable ways to reduce well

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF