Abstract. In this scientific work, we investigate the problem of the practical necessity of achieving the adequacy of translation activities with active translation from Russian into Arabic in various fields of translation. Based on the material of the latest suffix vocabulary, a serious attempt is made to clarify and specify the rules for the development of translator's intuition when translating from Russian into Arabic and vice versa. Based on the material collected by the latest suffix vocabulary, we try to make an attempt to reveal the role of suffix word creation in highlighting the general rules for achieving translation equivalence. The paper examines the process of creating words in multi-family languages, the difference between the suffix of the Russian language in terms of the way words are formed and the concept from what is available in the Arabic language. The ability of each of these two languages to inflectional dissection of words is analyzed very deeply, as a result of which the adequacy of translation is realized .
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show Moreالعدد: دراسة مقارنة بين اللغة الاسبانية والعربية.
Discretionary Punishment, Public Regulation, Interest
Teachers' self-efficacy plays a very important role in the process of teaching English language, and teachers have primary role in determining what is needed or what would work best with their students. The sample consists of eighty-seven English language teachers in secondary schools in Baghdad/Kaarkh2. Self-efficacy questionnaire of fifteen items was constructed. Face, content validity and reliability were verified. Then, pupils' marks for the first semester were taken as their achievement.The main finding of the study indicates that:
English language teachers' self-efficacy has effect on their pupils' achievement.
In the light of the findings of the present study, several conclusions, recommendations and suggestions for further
A simple, accurate, and cost-efficient UV-Visible spectrophotometric method has been developed for the determination of naphazoline nitrate (NPZ) in pure and pharmaceutical formulations. The suggested method was based on the nucleophilic substitution reaction of NPZ with 1,2-naphthoquinone-4-sulfonate sodium salt in alkaline medium at 80°C to form an orange/red-colored product of maximum absorption (λmax) at 483 nm. The stoichiometry of the reaction was determined via Job's method and limiting logarithmic method, and the mechanism of the reaction was postulated. Under the optimal conditions of the reaction, Beerʼs law was obeyed within the concentration range 0.5–50 μg/mL, the molar absorptivity value (ε) was 5766.5 L × mol–1 × c
... Show MoreA method is developed for the determination of iron (III) in pharmaceutical preparations by coupling cloud point extraction (CPE) and UV-Vis spectrophotometry. The method is based on the reaction of Fe(III) with excess drug ciprofloxacin (CIPRO) in dilute H2SO4, forming a hydrophobic Fe(III)- CIPRO complex which can be extracted into a non-ionic surfactant Triton X-114, and iron ions are determined spectrophotometrically at absorption maximum of 437 nm. Several variables which impact on the extraction and determination of Fe (III) are optimized in order to maximize the extraction efficiency and improve the sensitivity of the method. The interferences study is also considered to check the accuracy of the procedure. The results hav
... Show MoreThis paper considers and proposes new estimators that depend on the sample and on prior information in the case that they either are equally or are not equally important in the model. The prior information is described as linear stochastic restrictions. We study the properties and the performances of these estimators compared to other common estimators using the mean squared error as a criterion for the goodness of fit. A numerical example and a simulation study are proposed to explain the performance of the estimators.
The research aims to determine the impact of employees’ retention strategy on organizational memory. This research is historical, descriptive, and analytical. The sample consists of 158 faculty members in five private colleges in Baghdad. The technique used to analyze the data is SEM (Structural Equation Modeling), and SPSS (Statistical Package for the Social Sciences). The research concludes that the employees retaining strategy plays a vital role in retaining employees and hence maintains organizational memory. The findings and recommendations of this research assure the administrations of private colleges that employees retention strategy play a vital role in retaining its employee and hence maintains organizational memory. T
... Show More