Preferred Language
Articles
/
jcolang-191
Melody in Translation of a Selection of Persian Poetry لحن موسیقی در ترجمۀ نمونه های از شعر فارسی
...Show More Authors

     ترجمۀ شعر به آهنگ موسیقی از شاهکارهای فکری که تولیدی علمی ترجمی می آراید به شمار میرود ، چیزی مورد نا راحتی  ونومیدی نسبت به مترجم وجود ندارد ، اگر وی در این راه با تلاش کردنی سیر می رود تا ثمره های آن ترجمه می چیند .

روش پژوهشگر در آنچه از ترجمۀ ابیات شعر فارسی بر آمد ، روشی نوینی می داند  که آن بر هماهنگی آواز الفاظ با یکدیگر اتکای می کند  تا ترجمه دارای آوازی وهماهنگی ، به مرتبه ای موسیقای شعر نزدیکی می رود بدون به کار بردن بحور شعر است ، پژوهشگر پاینده ای را بنیاد کرد و از خلال آن توانست به میدان ترجمۀ خود برای ابیات شعرسر آغازی کند این پاینده عبارتند از : (ما طابَ لحنهُ حَسُنَ سماعهُ – هر چه آهنگیش خوب است  حتماً شنیدن آن خوب است)

    پژوهشگر به سخنان یأس آمیزان هم نخورد که ترجمۀ شعر امر نا ممکن گفتند بلکه خود را به روش گروه خوش بینندگان گرفت که ابیات عرفانی وتعلیمی حکمی ترجمه کرد ، که با آن طرز زندگی و دوست داری خود منسجم می نماید .

هر گاه مترجم از لحاظ حقیقتش نزدیکتر بسوی شیوۀ شاعر بود ، مسلماً اثر ترجمی بهتر میشود ، بر سبیل مثال مترجمی که تصوف را دوست دارد حتماً در ترجمۀ ابیات صوفی بهتر از مترجم غیر روحانی می باشد . از این رو پژوهشگر ابیاتی که با فکرش وعلمش هماهنگی بُرد گزین کرد ، از لحاظ تأثر خود به حقیقت آنچه شاعر نظم کرد .

Translation of poetry into poetry is a matter that some regarded it as being impossible, others sees it a preferable thing. The researcher follows the second stand of view. He set out from a basis he established for his research which he termed; (what has a preferable melody must be preferable for hearing), without deep diving into meters and measures of poetry.

     What the researcher presented in this research may be regarded pure intellectual output, as he has adopted a distinctive form of unified rhyme in his translation like that of the doubled Arabic form, and the Persian duals, because this form has the musicality and tune that delight the audience, stir their joy, cheerfulness and shake their feelings.

      The researcher has translated the true feelings Wisdom and Gnostic verses which had sprang from a pure being. He lived and loved them, therefore, he translated them with a melody and rhythm that stir joy in their hearers hearts, because of the beauty of their tune and their near to the source verse, then, he declared his translation method regarding them, such as:

Abdul-Rahman Al-Jammi, the Persian poet (c 793 A. H.), had wrote this line:

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 03 2025
Journal Name
Circular Economy And Sustainability
Green Supplier Selection in the Iraqi Food Industry: Criteria Analysis and Barriers to Implementation
...Show More Authors

This study explores the barriers to adopting green environmental criteria in Supplier Selection (SS) within the Iraqi food industry. It aims to enhance the understanding of sustainable supply chain management in developing nations, with a particular focus on the Iraqi context. A case study approach was utilized to identify eleven key green environmental criteria and 54 sub-criteria, alongside seven major barriers to their adoption. The Best–Worst Method (BWM) was employed to rank the criteria, and Fuzzy Stepwise Weight Assessment Ratio Analysis (SWARA) was used to prioritize the barriers. The analysis revealed that Environmental Management Systems are the most critical criterion for SS. On the other hand, legislation and policies emerged

... Show More
View Publication
Crossref
Publication Date
Wed Sep 23 2020
Journal Name
Artificial Intelligence Research
Hybrid approaches to feature subset selection for data classification in high-dimensional feature space
...Show More Authors

This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Telkomnika
Proposed different relay selection schemes for improving the performance of cooperative wireless networks
...Show More Authors

Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 27 2018
Journal Name
Arab Science Heritage Journal
جهود علماء مملكة غرناطة الاندلسية في الشعر التعليمي
...Show More Authors

  نالت الحياة الادبية في مملكة غرناطة الاندلسية حظاً كبيراً 

View Publication Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Arab Science Heritage Journal
أنسنة الشباب والشيب في الشعر العربي قبل الإسلام
...Show More Authors

The humanize appeared in Arabic poetry before Islam and it was not limited with on sensations but it even included the morals

View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The extent of the contribution of the determinants of organizational support in the enhancement of the mental status of banking services - A study of the views of a sample of employees in a number of banks in the city of Dohuk
...Show More Authors

     The objective of this study is to determine the extent to which the determinants of organizational support contributed to enhancing the mental status of banking services in a number of banks in Dohuk governorate in order to diagnose the correlation between the perceived organizational support and the mental status of services. Availability in the environment of banks and to enhance the mental position from the point of view of customers as the main hypotheses focused on the nature of the relationship between the dimensions of research among them has been tested these hypotheses using statistical and descriptive methods have been The study concluded that the contribution of organizational support, which is

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Automatic Block Selection for Synthesizing Texture Images using Genetic Algorithms
...Show More Authors

Texture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.

View Publication Preview PDF
Crossref