Abstract. In this scientific work, we investigate the problem of the practical necessity of achieving the adequacy of translation activities with active translation from Russian into Arabic in various fields of translation. Based on the material of the latest suffix vocabulary, a serious attempt is made to clarify and specify the rules for the development of translator's intuition when translating from Russian into Arabic and vice versa. Based on the material collected by the latest suffix vocabulary, we try to make an attempt to reveal the role of suffix word creation in highlighting the general rules for achieving translation equivalence. The paper examines the process of creating words in multi-family languages, the difference between the suffix of the Russian language in terms of the way words are formed and the concept from what is available in the Arabic language. The ability of each of these two languages to inflectional dissection of words is analyzed very deeply, as a result of which the adequacy of translation is realized .
fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreThis study examines the relationship between the increase in the number of tourists coming to Tunisia and GDP during the period 1995-2017, using the methodology of joint integration, causal testing and error correction model. The research found the time series instability of the logarithm of the number of tourists coming to Tunisia and the output logarithm but after applying the first differences, these chains become stable, THUS these time series are integrated in the first differences. Using the Johansson method, we found the possibility of a simultaneous integration relationship between the logarithm of the number of tourists coming to Tunisia and the logarithm of GDP in Tunisia, and there is a causal relationship in one direc
... Show MoreCommunity detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo
... Show Moreالحركات والحروف تؤلفان نظام الكلمة في اللغة العربية
This research aims to know the impact of leadership integrity as explanatory variable including its dimensions (courage, asceticism, justice, rationality, and humanity) on organizational conflict as responding variable. This research depended on the descriptive-constructive approach through the responses of a sample of (79) employees from (Real Estate Office of The State) in Al-Najaf province. The analyzing of the study done by using (Smart PLS) program to calculate (R2, t, p). Many results have been concluded and one of them, there is significant impact correlation of the leadership integrity on organizational conflict. There are many suggestions have been reached depending on the results reached and one of them is the necess
... Show MoreAfter the twenty – first century become necessary for us motorcade era in educational a chevements by searching for the best strategies and teaching methods and techniques artotalbagesh resorting to the strategy
Did not use in use in the teaching of the foreseeable material general by voice and teaching perspective for the student of the class fourth science
In particular ,so the researcher asking the question follows:
Can the peer education strategy to have an impact in perspective drawing skill development ?
From here it demonstrated the importance of current research know the impact of p
... Show Moreتعد مراجعة النظير واحدة من الأســاليب الحديثة فــي مجال الرقابة والتدقيق ونشــأة كأداة لقياس مــدى فاعليــة الرقابــة علــى الجــودة هو لبنة أساسية في إدارة الجودة الشاملة ووسيلة لتحســين أدوات الرقابــة المعمول بها، وللتحقق من مدى الانسجام بين المعايير الدولية للأجهزة العليا للرقابة المالية والمحاسبة والاجراءات المعمول بها من قبل الاجهزة العليا للرقابة وعليه فأن مراجعة النظير أداة تستخدم ف
... Show MoreThe research aims at introducing accountability creative and the factors influencing or helping to Do in Iraqi companies, was launched two assumptions first that he was effect with significance to a number of factors in the direction of departments in Iraqi companies to practice creative accounting , were selected (9) factors believed to researchers it's most influential, and second that there importance of significance for a number of ways or methods to prevent or combat creative accounting , and the purpose of testing hypotheses have been designed questionnaire was distributed to a sample of 48 individual practitioners accountable in Iraqi companies and auditors in charge of auditing the accounts of those companies , after anal
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More