Colors are universal, and throughout the ages, they have been associated with
various religious, social and spiritual meanings. They symbolize a galaxy of things
to designate certain ideas or symbols that are sometimes contradictory.
The present study is an attempt to investigate colors, their meanings and
symbolism, and the approaches to translating color idioms from English into
Arabic. It fathoms one of the thorny areas for translation theorists let alone
practitioners. Various definitions, classifications of types and symbolism across
cultures are provided. After reviewing idioms and methods of translating them, a
survey of 114 sentences that include color idioms was conducted to see which
method is mostly adopted by professionals. The survey has revealed that, among
the methods available for the translator, the most common strategy in translating
color idioms from English into Arabic is paraphrase, followed by loan translation.
In addition, the equivalent effect principle sought by Nida (1964) would not be
achieved and the color element found in the source language is lost in translation,
simply because it has neither linguistic nor cultural correspondent equivalent in the
target language.
A common approach to the color image compression was started by transform
the red, green, and blue or (RGB) color model to a desire color model, then applying
compression techniques, and finally retransform the results into RGB model In this
paper, a new color image compression method based on multilevel block truncation
coding (MBTC) and vector quantization is presented. By exploiting human visual
system response for color, bit allocation process is implemented to distribute the bits
for encoding in more effective away.
To improve the performance efficiency of vector quantization (VQ),
modifications have been implemented. To combines the simple computational and
edge preservation properties of MBTC with high c
Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
Background: This clinical trial aims to evaluate the color changes of direct resin composite veneer (DCV) restorations based on spectrophotometric analysis of 4 different types of resin composites between the baseline immediately after polishing and after one year of follow-up. Materials and methods: 28 patients were assessed for eligibility for participation, aged between 18 and 38 years old, who indicated for DCV restorations in anterior maxillary teeth were considered for participation in this study. In total, 25 patients who met the inclusion criteria were selected (6 males and 19 females, mean age: 20.9 at the time of restoration placement), and 3 patients were excluded. Partic
... Show MoreIn this paper, a new high-performance lossy compression technique based on DCT is proposed. The image is partitioned into blocks of a size of NxN (where N is multiple of 2), each block is categorized whether it is high frequency (uncorrelated block) or low frequency (correlated block) according to its spatial details, this done by calculating the energy of block by taking the absolute sum of differential pulse code modulation (DPCM) differences between pixels to determine the level of correlation by using a specified threshold value. The image blocks will be scanned and converted into 1D vectors using horizontal scan order. Then, 1D-DCT is applied for each vector to produce transform coefficients. The transformed coefficients will be qua
... Show MoreThis research deals with an important grammatical section of the Qur'anic grammar, which is the working names the work of acts in the Quranic grammar in the studies of Iraqi researchers from 1968 to 200 AD.
The study of working names working verb in the Koran of the important studies, especially among Iraqi researchers, the Iraqi researcher has presented detailed studies related to working names particles action verb in the Koran, and my research is studying this important grammatical section of the Koranic grammar, which is the working names working verb in The Holy Quran in the books of Iraqi researchers and their theses from 1968-2000. I studied in the preface working names of the act, and what the Iraqi res
The current study aimed to identify the difficulties faced by the student in mathematics and possible proposals to address these difficulties. The study used a descriptive method also used the questionnaire to collect data and information were applied to a sample of (163) male and female teachers. The results of the study found that the degree of difficulties in learning mathematics for the fifth and sixth grades is high for some paragraphs and intermediate for other paragraphs, included the student's field. The results also revealed that there were no statistically significant differences at the level of significance (α = 0.05) between the responses of the members of the study sample from male and female teachers to the degree of diffi
... Show MoreThe current work was undertaken to obtain the crude extract of PPO and laccase enzyme from the leaves of Malva parviflora. All leaves were washed with tap water, then the extraction was performed to acquire the crude extract’s enzymes. One gram of Malva parviflora leaves was homogenized in various volumes of distilled water (1:10, 1:5, and 1:2 w: v). The results showed that polyphenol oxidase and laccase with a ratio of 1:10 (w:v) gave the highest specific activity of 112.3 with 0.394 U/mg proteins. In addition, Malva parviflora leaves were homogenized with several types of buffers with two concentration (0.2 and 0.1 M) for PPO and laccase extraction. These buffers were potassium
... Show MoreArabic calligraphy has a special status as one of the most important oriental arts, which has been enhanced by the Islamic value. The Arabic fonts have been diverse in their classification into soft lines such as Diwani, thuluth and patch lines and others, and geometrical lines such as Kufic lines and their various types. The contemporary artist was also able to adapt the Arabic calligraphy of all kinds in the construction of the painting or line formations, especially after the development of the artistic digital techniques and computer software. Here comes the role of the industrial designer as being more in touch with the practical, technical and productive life, which requires great care in adapting the line formations of the Arabic
... Show MoreThis article is devoted to the cognitive study of ironic metonymy in Russian and Arabic. Metonymy and irony have traditionally been seen as parallel linguistic phenomena. But their formation and interpretation are based on different cognitive mechanisms. At the formal and functional level, metonymy and irony have a number of significant differences. Metonymy is an artistic technique, the mechanism of which is based on obvious, easily traced connections between objects and phenomena of the surrounding world. Irony is a satirical technique or a rhetorical figure that is used to create a certain artistic image, aimed at forming the hidden meaning of the statement. A native speaker intuitively feels the difference between metonymy and irony
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More