Preferred Language
Articles
/
jcolang-853
Negation marker in Standard Persian : a typological analysis based on Givon’s functional model: عامل نفی در زبان فارسی معیار: بررسی رده‌شناختی براساس مدل نقش‌ گرایی گیون
...Show More Authors

 Abstract:

Typological analysis about  the negation marker  in different languages is one of the fields of research that has attracted much attention.  In Persian language, this constituent has been analysed from different aspects. This study aimed to analyse  different aspects of negation marker  in  the adjectives,  the noun phrases and  the verb phrases based on typological analysis.  Many studies have been revealed that  the negation in adjectives has shown lexically and morphologically. In the noun phrases, /hich/  has used as a negative marker necessarily marking the verb phrase as negative too. In the verb phrases, negation occurs morphologically by the addition of the prefix /na/(no) or its variations. In  the modal auxiliaries /khastan/ and /tawanestan/(can), aspectual auxiliary /budan/ (be) and lexicalized auxiliary /bayad/(must) negative marker occurs either before the auxiliary or before the main verb. Moreover, in the modal auxiliary /shodan/(will be)  and the lexicalized word /shayad/ (perhaps)  only the main verb is negated. However, aspectual auxiliary /dashtan/ (to have) has shown a different behavior in that its negative form and the negative form of the modal auxiliary become neutral. Negation filed in the  verb phrases and morphological negative adjectives is narrow and only a portion of negative proposition falls under the field of negation while negative field in the noun phrases is broad and includes the entire proposition.

Keywords: Typological analysis, negation marker  ,syntactic negation , emphatic negation, field  of negation

چکیده:

بررسی رده‌شناختی سازه نفی در زبان‌های گوناگون بسیار مورد توجه قرار گرفته است. در زبان فارسی این سازه از بسیاری جهات قابل بررسی می‌باشد. این پژوهش کوشیده است با نگاهی رده‌شناختی به سازه نفی، جنبه‌های مختلف عامل نفی در صفات، گروه‌های اسمی و گروه‌های فعلی را بررسی کند. بررسی‌ها نشان می‌دهند نفی در صفات به صورت ساخت‌واژی و واژگانی اتفاق می‌افتد. نفی در گروه‌های اسمی به کمک عامل منفی "هیچ" صورت می‌پذیرد که با منفی‌شدن اسم یا گروه اسمی، فعل نیز الزاما منفی می‌شود. در گروه‌های فعلی نفی به صورت ساختواژی با افزودن پیشوند "نـ" اتفاق می‌افتد. در فعل‌های معین وجه‌نمای "خواستن و توانستن"، فعل معین نمودنمای "بودن" و فعل معین واژگانی‌شده "باید" سازه منفی هم پیش از فعل معین قرار می‌گیرد هم پیش از فعل واژگانی. در فعل معین  وجه‌نمای "شدن" و فعل واژگانی‌شده "شاید"، تنها فعل واژگانی منفی می‌شود. فعل معین  نمودنمای "داشتن" رفتار متفاوتی از خود به نمایش می‌گذارد و تقابل صورت منفی این فعل نمودنما با صورت منفی وجه‌نمای آن خنثی می‌شود. سیطره عامل نفی در گروه‌های فعلی و صفات منفی ساخت‌واژی محدود بوده و تنها بخشی از گزاره را در بر می‌گیرد. در صورتی‌که سیطره نفی در گروه‌های اسمی گسترده و  دربرگیرنده همه گزاره است.

Received on 23/6/2023 

Accepted on 20/8/2023 

Published on 2/1/2024

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Performance of humidity sensor based on photonic crystal fiber interferometer
...Show More Authors

Photonic Crystal Fiber Interferometers (PCFIs) are greatly used
for sensing applications. This work presents the fabrication and
characterization of a relative humidity sensor based on Mach-
Zehnder Interferometer (MZI), which operates in reflection mode.
The humidity sensor operation based on the adsorption and
desorption of water vapour at the silica-air interface within the PCF.
The fabrication of this sensor is simple, it only includes splicing and
cleaving the PCF with SMF.PCF (LMA-10) with a certain length
spliced to SMF (Corning-28).
The spectrum of PCFI exhibits good sensitivity to humidity
variations. The PCFI response is observed for a range of humidity
values from (27% RH to 85% RH), the positi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Mon Aug 01 2022
Journal Name
Mathematics
Face Recognition Algorithm Based on Fast Computation of Orthogonal Moments
...Show More Authors

Face recognition is required in various applications, and major progress has been witnessed in this area. Many face recognition algorithms have been proposed thus far; however, achieving high recognition accuracy and low execution time remains a challenge. In this work, a new scheme for face recognition is presented using hybrid orthogonal polynomials to extract features. The embedded image kernel technique is used to decrease the complexity of feature extraction, then a support vector machine is adopted to classify these features. Moreover, a fast-overlapping block processing algorithm for feature extraction is used to reduce the computation time. Extensive evaluation of the proposed method was carried out on two different face ima

... Show More
View Publication
Scopus (34)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Thu Oct 01 2009
Journal Name
2009 Ieee Symposium On Industrial Electronics & Applications
ITTW: T-way minimization strategy based on intersection of tuples
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jun 04 2024
Journal Name
Computation
High-Performance Krawtchouk Polynomials of High Order Based on Multithreading
...Show More Authors

Orthogonal polynomials and their moments serve as pivotal elements across various fields. Discrete Krawtchouk polynomials (DKraPs) are considered a versatile family of orthogonal polynomials and are widely used in different fields such as probability theory, signal processing, digital communications, and image processing. Various recurrence algorithms have been proposed so far to address the challenge of numerical instability for large values of orders and signal sizes. The computation of DKraP coefficients was typically computed using sequential algorithms, which are computationally extensive for large order values and polynomial sizes. To this end, this paper introduces a computationally efficient solution that utilizes the parall

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Automatic Identification of Ear Patterns Based on Convolutional Neural Network
...Show More Authors

Biometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jul 01 2011
Journal Name
Engineering And Technology Journal
Off-Line Arabic Signature Recognition Based on Invariant Moments Properties
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More