Abstract. In this scientific work, we investigate the problem of the practical necessity of achieving the adequacy of translation activities with active translation from Russian into Arabic in various fields of translation. Based on the material of the latest suffix vocabulary, a serious attempt is made to clarify and specify the rules for the development of translator's intuition when translating from Russian into Arabic and vice versa. Based on the material collected by the latest suffix vocabulary, we try to make an attempt to reveal the role of suffix word creation in highlighting the general rules for achieving translation equivalence. The paper examines the process of creating words in multi-family languages, the difference between the suffix of the Russian language in terms of the way words are formed and the concept from what is available in the Arabic language. The ability of each of these two languages to inflectional dissection of words is analyzed very deeply, as a result of which the adequacy of translation is realized .
Specialized banks provide their banking activities to their customers at interest rates that are determined according to the approved bank policy, which is almost similar to most or most banks. To satisfy the financial desires of customers and at the same time it is a source of the bank's profits, However, these banks have been introduced to new services that they provide with the funds of the Central Bank initiative launched at the beginning of (2016) to address the economic stagnation that befell the country due to the (financial security) crisis that the country faced in 2014. To put forward initiatives amounting to nearly (15) trillion dinars, which were put forward through private commercial and Islamic banks and specialized
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreEn el contexto de la disponibilidad léxica, Esta investigación surge de la necesidad de enseñar, a los estudiantes extranjeros de comunicación que cursan sus estudios en nuestra universidad, el español especializado que realmente necesitan. La metodología disponibilidad léxica ofrece una oportunidad en cuanto a la elaboración de los manuales.
Abstract
This article presents the lexical availability as a practical tool, this research can be exploited didactically in the teaching of vocabulary as a foreign languages LE.
August Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreDuring the 2016–2017 and 2017–2018 winter semesters, researchers from the College of Agricultural Engineering Sciences at the University of Baghdad conducted a field experiment at the university’s research station. This inquiry set out to examine how spraying wheat plants with vitamins B9 (Folic acid) and E (Tocopherol) affected certain yield characteristics (Al-Fourat variety). The studies were set up as three repetitions of a factorial experiment using a Randomized Full Block Design. Vitamin E was sprayed at 0, 1, and 2 ml.L-1, while vitamin B9 was sprayed at 0, 1, and 3 ml.L-1 (0, 250, and 500 mg. L-1). While the
This study seeks to shed light on the aspects of visual pollution and its impact on the aesthetics of the town of Al-Eizariya known to suffer from the phenomenon. In order to identify the real causes of the problem which develops in various forms and patterns, threatening not only the aesthetic appearance of the towns, but also causes the emergence of new problems and phenomena that will have negative repercussions on the population. The researcher uses the analytical descriptive method to analyze the phenomenon of visual pollution in terms of reality, development, manifestations and spread and uses photos which document the visual pollution and its impact on the aesthetics of the known. The study concluded the existence of a strong rela
... Show More