Preferred Language
Articles
/
jcolang-853
Negation marker in Standard Persian : a typological analysis based on Givon’s functional model: عامل نفی در زبان فارسی معیار: بررسی رده‌شناختی براساس مدل نقش‌ گرایی گیون
...Show More Authors

 Abstract:

Typological analysis about  the negation marker  in different languages is one of the fields of research that has attracted much attention.  In Persian language, this constituent has been analysed from different aspects. This study aimed to analyse  different aspects of negation marker  in  the adjectives,  the noun phrases and  the verb phrases based on typological analysis.  Many studies have been revealed that  the negation in adjectives has shown lexically and morphologically. In the noun phrases, /hich/  has used as a negative marker necessarily marking the verb phrase as negative too. In the verb phrases, negation occurs morphologically by the addition of the prefix /na/(no) or its variations. In  the modal auxiliaries /khastan/ and /tawanestan/(can), aspectual auxiliary /budan/ (be) and lexicalized auxiliary /bayad/(must) negative marker occurs either before the auxiliary or before the main verb. Moreover, in the modal auxiliary /shodan/(will be)  and the lexicalized word /shayad/ (perhaps)  only the main verb is negated. However, aspectual auxiliary /dashtan/ (to have) has shown a different behavior in that its negative form and the negative form of the modal auxiliary become neutral. Negation filed in the  verb phrases and morphological negative adjectives is narrow and only a portion of negative proposition falls under the field of negation while negative field in the noun phrases is broad and includes the entire proposition.

Keywords: Typological analysis, negation marker  ,syntactic negation , emphatic negation, field  of negation

چکیده:

بررسی رده‌شناختی سازه نفی در زبان‌های گوناگون بسیار مورد توجه قرار گرفته است. در زبان فارسی این سازه از بسیاری جهات قابل بررسی می‌باشد. این پژوهش کوشیده است با نگاهی رده‌شناختی به سازه نفی، جنبه‌های مختلف عامل نفی در صفات، گروه‌های اسمی و گروه‌های فعلی را بررسی کند. بررسی‌ها نشان می‌دهند نفی در صفات به صورت ساخت‌واژی و واژگانی اتفاق می‌افتد. نفی در گروه‌های اسمی به کمک عامل منفی "هیچ" صورت می‌پذیرد که با منفی‌شدن اسم یا گروه اسمی، فعل نیز الزاما منفی می‌شود. در گروه‌های فعلی نفی به صورت ساختواژی با افزودن پیشوند "نـ" اتفاق می‌افتد. در فعل‌های معین وجه‌نمای "خواستن و توانستن"، فعل معین نمودنمای "بودن" و فعل معین واژگانی‌شده "باید" سازه منفی هم پیش از فعل معین قرار می‌گیرد هم پیش از فعل واژگانی. در فعل معین  وجه‌نمای "شدن" و فعل واژگانی‌شده "شاید"، تنها فعل واژگانی منفی می‌شود. فعل معین  نمودنمای "داشتن" رفتار متفاوتی از خود به نمایش می‌گذارد و تقابل صورت منفی این فعل نمودنما با صورت منفی وجه‌نمای آن خنثی می‌شود. سیطره عامل نفی در گروه‌های فعلی و صفات منفی ساخت‌واژی محدود بوده و تنها بخشی از گزاره را در بر می‌گیرد. در صورتی‌که سیطره نفی در گروه‌های اسمی گسترده و  دربرگیرنده همه گزاره است.

Received on 23/6/2023 

Accepted on 20/8/2023 

Published on 2/1/2024

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Analyzing current and future direction of non-oil primary balance: Case Study of Iraq Using Exponential Smoothing model
...Show More Authors

In recent years, non-oil primary balance indicator has been given considerable financial important in rentier state. It highly depends on this indicator to afford a clear and proper picture of public finance situation in term of appropriate and sustainability in these countries, due to it excludes the effect of oil- rental from compound of financial accounts which provide sufficient information to economic policy makers of how economy is able to create potential added value and then changes by eliminating one sided shades of economy. In Iraq, since, 2004, the deficit in value of this indicator has increased, due to almost complete dependence on the revenues of the oil to finance the budget and the obvious decline of the non-oil s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Analysis on the Applicability of Meta-Heuristic Searching Techniques for Automated Test Data Generation in Automatic Programming Assessment
...Show More Authors

Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Study Impact of Some Factors on Daily Number of Hours Providing of Electricity in Baghdad City Using Path Analysis
...Show More Authors

دُرِست العوامل المؤثرة في عدد ساعات تجهيز الكهرباء في مدينة بغداد، وتكونت عينة الدراسة من (365) مشاهدة يومية لعام 2018، وتمثلت بستة متغيرات استعملت في الدراسة. كان الهدف الرئيس هو دراسة العلاقة بين هذه المتغيرات، وتقدير تأثيرات المتغيرات التنبؤية في المتغير التابع (عدد ساعات تجهيز الكهرباء في مدينة بغداد). ولتحقيق ذلك استعملت نمذجة المعادلات الهيكلية/ تحليل المسار وبرنامج AMOS

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The impact of governmental consumer spending on the development of the current account balance in Iraq for the period (1990-2014) using ARDL model
...Show More Authors

To avoid the negative effects due to inflexibility of the domestic production inresponse to the increase in government consumption expenditure leads to more  imports to meet the increase in domestic demand resulting from the increase in government consumption expenditure. Since the Iraqi economy economy yield unilateral depends on oil revenues to finance spending, and the fact government consumer spending is a progressive high flexibility the increase in overall revenues, while being a regressive flexibility is very low in the event of reduced public revenues, and therefore lead to a deficit in the current account position. And that caused the deficit for imbalance are the disruption of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Analysis of the clause relations in the presidential presuasion in a war against Iraq
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Multi-level analysis applications in business studies
...Show More Authors

The current research aims to provide a conceptual and applied frame  on the subject of multi- level analysis in the research of business administration. The research tries to address some of the problems that befall the preparation of research and studies at the Arab level and local level, where the unity of theory and measurement and analysis, as well as clarify  the various types of conceptual constructs and give researchers the ability to  distinguish different models related to the level of analysis. On the other hand, this research  provides an example of 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Arab World English Journal
Genre-Based Analysis of Selected Political Debates: A Discourse Analysis Study
...Show More Authors

The researchers of the present study have conducted a genre analysis of two political debates between American presidential nominees in the 2016 and 2020 elections. The current study seeks to analyze the cognitive construction of political debates to evaluate the typical moves and strategies politicians use to express their communicative intentions and to reveal the language manifestations of those moves and strategies. To achieve the study’s aims, the researchers adopt Bhatia’s (1993) framework of cognitive construction supported by van Emeren’s (2010) pragma-dialectic framework. The study demonstrates that both presidents adhere to this genre structuring to further their political agendas. For a positive and promising image

... Show More
View Publication Preview PDF
Clarivate Crossref