conspiracy in azarbaijani turkish

نویسندگان

سید محمّد رضی نژاد

دانشجوی دکتری دانشگاه تهران محمود بی جن خان

دانشیار گروه زبانشناسی دانشگاه تهران

چکیده

in this article, conspiracy which has been introduced by kisseberth (1970) is studied in azarbaijani turkish. sometimes, in a language or some languages, certain rules are used to avoid a special output or they try to reach a specific structure in the output. although these rules are apparently different processes, they have the same target which is accepting or rejecting a special structure in the output. in other words, when two or more rewrite rules directly or indirectly support some constraint on surface forms, they are involved in a conspiracy. in this article, conspiracy is first explained based on examples from persian. then, it is shown that in turkish, in order to avoid adjacent vowels and to accept obligatory counter principle (ocp), processes of vowel epenthesis and vowel deletion are in conspiracy. finally, constraints involved in this process and their ranking in this language will be delineated.

Sign up for free to access the full text

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A FST Description of Noun and Verb Morphology of Azarbaijani Turkish

We give a FST description of nominal and finite verb morphology of Azarbaijani Turkish. We use a hybrid approach where nominal inflection is expressed as a slot-based paradigm and major parts of verb inflection are expressed as optional paths on the FST. We collapse adjective and noun categories in a single nominal category as they behave similarly as far as their paradigms are concerned. Thus,...

متن کامل

Conspiracy theories in science.

Conspiracy theories are easy to propagate and difficult to refute. Fortunately, until a decade or so ago, few serious conspiracy theories haunted the natural sciences. More recently, however, conspiracy theories have begun to gain ground and, in some cases, have struck a chord with a public already mistrustful of science and government. Conspiracy theorists—some of them scientifically trained—h...

متن کامل

Conspiracy in bacterial genomes

The rank ordered distribution of the codon usage frequencies for 123 bacteriae is best fitted by a three parameters function that is the sum of a constant, an exponential and a linear term in the rank n. The parameters depend (two parabolically) from the total GC content. The rank ordered distribution of the amino acids is fitted by a straight line. The Shannon entropy computed over all the cod...

متن کامل

Sibling Conspiracy Number Search

For some two-player games (e.g. Go), no accurate and inexpensive heuristic is known for evaluating leaves of a search tree. For other games (e.g. chess), a heuristic is known (sum of piece values). For other games (e.g. Hex), only a local heuristic — one that compares children reliably, but nonsiblings poorly — is known (cell voltage drop in the Shannon/Anshelevich electric circuit model). In t...

متن کامل

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023