Preferred Language
Articles
/
jcolang-853
Negation marker in Standard Persian : a typological analysis based on Givon’s functional model: عامل نفی در زبان فارسی معیار: بررسی رده‌شناختی براساس مدل نقش‌ گرایی گیون
...Show More Authors

 Abstract:

Typological analysis about  the negation marker  in different languages is one of the fields of research that has attracted much attention.  In Persian language, this constituent has been analysed from different aspects. This study aimed to analyse  different aspects of negation marker  in  the adjectives,  the noun phrases and  the verb phrases based on typological analysis.  Many studies have been revealed that  the negation in adjectives has shown lexically and morphologically. In the noun phrases, /hich/  has used as a negative marker necessarily marking the verb phrase as negative too. In the verb phrases, negation occurs morphologically by the addition of the prefix /na/(no) or its variations. In  the modal auxiliaries /khastan/ and /tawanestan/(can), aspectual auxiliary /budan/ (be) and lexicalized auxiliary /bayad/(must) negative marker occurs either before the auxiliary or before the main verb. Moreover, in the modal auxiliary /shodan/(will be)  and the lexicalized word /shayad/ (perhaps)  only the main verb is negated. However, aspectual auxiliary /dashtan/ (to have) has shown a different behavior in that its negative form and the negative form of the modal auxiliary become neutral. Negation filed in the  verb phrases and morphological negative adjectives is narrow and only a portion of negative proposition falls under the field of negation while negative field in the noun phrases is broad and includes the entire proposition.

Keywords: Typological analysis, negation marker  ,syntactic negation , emphatic negation, field  of negation

چکیده:

بررسی رده‌شناختی سازه نفی در زبان‌های گوناگون بسیار مورد توجه قرار گرفته است. در زبان فارسی این سازه از بسیاری جهات قابل بررسی می‌باشد. این پژوهش کوشیده است با نگاهی رده‌شناختی به سازه نفی، جنبه‌های مختلف عامل نفی در صفات، گروه‌های اسمی و گروه‌های فعلی را بررسی کند. بررسی‌ها نشان می‌دهند نفی در صفات به صورت ساخت‌واژی و واژگانی اتفاق می‌افتد. نفی در گروه‌های اسمی به کمک عامل منفی "هیچ" صورت می‌پذیرد که با منفی‌شدن اسم یا گروه اسمی، فعل نیز الزاما منفی می‌شود. در گروه‌های فعلی نفی به صورت ساختواژی با افزودن پیشوند "نـ" اتفاق می‌افتد. در فعل‌های معین وجه‌نمای "خواستن و توانستن"، فعل معین نمودنمای "بودن" و فعل معین واژگانی‌شده "باید" سازه منفی هم پیش از فعل معین قرار می‌گیرد هم پیش از فعل واژگانی. در فعل معین  وجه‌نمای "شدن" و فعل واژگانی‌شده "شاید"، تنها فعل واژگانی منفی می‌شود. فعل معین  نمودنمای "داشتن" رفتار متفاوتی از خود به نمایش می‌گذارد و تقابل صورت منفی این فعل نمودنما با صورت منفی وجه‌نمای آن خنثی می‌شود. سیطره عامل نفی در گروه‌های فعلی و صفات منفی ساخت‌واژی محدود بوده و تنها بخشی از گزاره را در بر می‌گیرد. در صورتی‌که سیطره نفی در گروه‌های اسمی گسترده و  دربرگیرنده همه گزاره است.

Received on 23/6/2023 

Accepted on 20/8/2023 

Published on 2/1/2024

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Pharmaceutical Wastewater Treatment Associated with Renewable Energy Generation in Microbial Fuel Cell Based on Mobilized Electroactive Biofilm on Zeolite Bearer
...Show More Authors

In this study, a novel application of lab-scale dual chambered air-cathode microbial fuel cell (MFC) has been developed for simultaneous bio-treatment of real pharmaceutical wastewater and renewable electricity generation. The microbial fuel cell (MFC) was provided with zeolite-packed anodic compartment and a cation exchange membrane (CEM) to separate the anode and cathode. The performance of the proposed MFC was evaluated in terms of COD removal and power generation based on the activity of the bacterial consortium in the biofilm mobilized on zeolite bearer. The MFC was fueled with real pharmaceutical wastewater having an initial COD concentration equal to 800 mg/L and inoculated with anaerobic aged sludge. Results demo

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Renzulli Model on Achievement and Holistic Thinking among Fifth Grade Students in the Holy Quran and Islamic Education
...Show More Authors

The present study aims at identifying the effect of Renzulli model on achievement and holistic thinking among the fifth grade students in the Holy Quran and Islamic Education. The experimental method with partial control was used, and the sample was chosen randomly. The sample consisted of (62) students distributed into experimental and control groups. 164 behavioral goals were formulated based on Bloom's first three levels taxonomy (knowledge and comprehension, application, analysis and installation, and evaluation). The researchers designed a post-test to measure the achievement of students in the subject of Holy Quran and Islamic Education which consisted of (40) objective items and a measure of holistic thinking which consisted of (3

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Computational Design And Engineering
CFD analysis of phase-change material-based heat storage with dimple-shaped fins: evaluation of fin configuration and distribution pattern
...Show More Authors
Abstract<p>Phase-change materials (PCMs) have a remarkable potential for use as efficient energy storage means. However, their poor response rates during energy storage and retrieval modes require the use of heat transfer enhancers to combat these limitations. This research marks the first attempt to explore the potential of dimple-shaped fins for the enhancement of PCM thermal response in a shell-and-tube casing. Fin arrays with different dimensions and diverse distribution patterns were designed and studied to assess the effect of modifying the fin geometric parameters and distribution patterns in various spatial zones of the physical domain. The results indicate that increasing the number of </p> ... Show More
View Publication
Scopus (11)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Analysis of Stuck Pipe Incidents in Khabaz Field
...Show More Authors

There are many events which causes nonproductive time (NPT) in the drilling industry. The mostly effective in this NPT is pipe sticking event. A considerable amount of time and resources can be spent in efforts to free a stuck pipe. In addition, Unsuccessful fishing operations results in costly alternatives including side-tracking. The drilling in Khabaz oil field poses many operational challenges among of them stuck pipe , lost circulation, flow of salt water during drilling, and hole caving. Stuck pipe can be considered the quite difficult problem in Khabaz oil field due to associated incidents which lead to NPT activities.
Well Khabaz -34 was selected to study the problem of stuck pipe in this field. An analysis of stuck pipe event

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
An Application Domain Based on General Object Oriented Software Models
...Show More Authors

Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 21 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
Emotion Recognition Based on Mining Sub-Graphs of Facial Components
...Show More Authors

Facial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) f

... Show More
View Publication Preview PDF
Crossref (1)
Crossref