Colors are universal, and throughout the ages, they have been associated with
various religious, social and spiritual meanings. They symbolize a galaxy of things
to designate certain ideas or symbols that are sometimes contradictory.
The present study is an attempt to investigate colors, their meanings and
symbolism, and the approaches to translating color idioms from English into
Arabic. It fathoms one of the thorny areas for translation theorists let alone
practitioners. Various definitions, classifications of types and symbolism across
cultures are provided. After reviewing idioms and methods of translating them, a
survey of 114 sentences that include color idioms was conducted to see which
method is mostly adopted by professionals. The survey has revealed that, among
the methods available for the translator, the most common strategy in translating
color idioms from English into Arabic is paraphrase, followed by loan translation.
In addition, the equivalent effect principle sought by Nida (1964) would not be
achieved and the color element found in the source language is lost in translation,
simply because it has neither linguistic nor cultural correspondent equivalent in the
target language.
Generally, direct measurement of soil compression index (Cc) is expensive and time-consuming. To save time and effort, indirect methods to obtain Cc may be an inexpensive option. Usually, the indirect methods are based on a correlation between some easier measuring descriptive variables such as liquid limit, soil density, and natural water content. This study used the ANFIS and regression methods to obtain Cc indirectly. To achieve the aim of this investigation, 177 undisturbed samples were collected from the cohesive soil in Sulaymaniyah Governorate in Iraq. Results of this study indicated that ANFIS models over-performed the Regression method in estimating Cc with R2 of 0.66 and 0.48 for both ANFIS and Regre
... Show MoreObjective: To evaluate the therapeutic activity of probiotics mixture of Lactobacillus plantarum and Lactobacillus acidophilus towards Cryptosporidium infection in experimentally infected mice. Oocysts of Cryptosporidium were separated from the stool of humans to infect mice. Methods: Forty male albino mice were split equally into four groups, every group contained 10 mice, the group I (early treated group), were treated from the 1st day from infection to the 11th post-infection, group II (late treated group), were treated from the 4th day from infection to the 15th post-infection, and group (III) (untreated group), were mice considered as a positive control group. Results: It was showed that daily application of a mixture of L. plantarum w
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreThe Ground Penetrating Radar (GPR) is frequently used in pavement engineering
for road pavement inspection. The main objective of this work is to validate
nondestructive, quick and powerful measurements using GPR for assessment of subgrade
and asphalt /concrete conditions. In the present study, two different antennas
(250, 500 MHz) were used. The case studies are presented was carried in University
of Baghdad over about 100m of paved road. After data acquisition and radar grams
collection, they have been processed using RadExplorer V1.4 software
implementing different filters with the most effective ones (time zero adjustment and
DC removal) in addition to other interpretation tool parameters.
The interpretatio
The idea of using slender Reinforced Concrete (RC) columns with cross-shaped (+-shaped) instead of columns with square-shaped was discussed in this paper. The use of +-shaped columns provides many architectural and structural advantages, such as avoiding prominent columns edges and improved the structural response of member. Therefore, this study explores the structural response of slender +-shaped columns experimentally and numerically by nonlinear finite element analysis using Abaqus simulation tools. The results showed an excellent convergence in strength between numerical and test results with an average standard deviation of 0.05 and 0.07. Besides that, the use of +-shaped column
A microbial desalination cell (MDC) is a new approach to bioelectrochemical systems. It provides a more sustainable way to electrical power production, saltwater desalination, and wastewater treatment at the same time. This study examined three operation modes of the MDC: chemical cathode, air cathode, and biocathode MDC, to give clear sight of this system's performance. The experimental work results for these three modes were recorded as power densities generation, saltwater desalination rates, and COD removal percentages. For the chemical cathode MDC, the power density was 96.8 mW/m2, the desalination rate was 84.08 ppm/hr, and the COD removal percentage was 95.94%. The air cathode MDC results were different
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More