Preferred Language
Articles
/
jcolang-243
Animal-Based Metaphors as Being a Lingua-Cultural Way in the Field of Football Club Titles: Зооморфная метафора как лингвокультурологический способ в области прозвищ футбольных клубов
...Show More Authors

 

       Metaphor is a linguistic phenomenon related to people's cultures. It is an integral part of cultural heritage. This paper tackles the use of animal-based metaphors in the field of football club titles so as to draw comparisons between those in Russian with their counterparts in Arabic. Names of animals are used to refer to some clubs and teams, where these names or titles reflect animal features such as strength, preying on victims; or animal figures are employed in the club symbols, or due to the similarity of the club shirt to the animal outer shapes in colours. For instance, "an-Nawaris", which means gulls in English, is used to refer to az-Zawraa club due to the identity in colours of both the outer colours of the birds and the club shirt, and to the way players celebrate their scoring goals. "Suqoor" also, which means hawks in English, refers to the Air Force club; it agrees with the symbol of club, since a hawk is sharp-sighted and is able prey on victims instantly. As for "thiaabul-sahree", which means in English desert wolves, is related to ar-Ramadi Club, and symbolizes the players to having the ability to prey on the other teams at home-playground, and to over well-established teams. As for "Usoodul-hAasimah", which means lions of the capital-city, it is associated with Baghdad Club. The team thereof has the characteristics of lions in respect to strength and bravery, along with well-done goal defense. Titles employing animal names are often used in Arab, African and European Countries, as well as in the media. They add to the beauty and understanding of the texts.

Аннотация

     Метафора является одним из важнейших языковых феноменов, тесно связанных с культурой народов и ставших неотъемлемой частью наследия цивилизации. Данная статья посвящена употреблению Зооморфных метафор в системе прозвищ футбольных клубов, их употребление в  обеих языках и сравнение этих прозвищ между русским и арабским языками. Сборные и футбольные команды называются в честь определенных животных, символизирующих силу, хищность или символизируют герб клуба и сходство цвета формы команды с внешностью животного, например, Чайки – это прозвище принадлежит к футбольному клубу «Аль-Завраа». Это название взялось в совпадении цвета игровой футболки команды и полёт этих птиц похож на празднование футболистов этого клуба после забитого гола. Соколы – это прозвище футбольного клуба «Аль-Куа Аль- Джавия», принадлежащий к военно-воздушной авиации. Название означает острое зрение сокола и быстро нападает на животных. Волки пустыни – Это прозвище футбольного клуба «эр-Рамади». Это название символизирует о том, что футболисты этого клуба хищные и они играют дома сильно и выиграют всех футбольных клубов также ведущих Ирака. Львы столицы – это прозвище принадлежит к футбольному клубу «Багдад ». Это команда носит название столицы Ирака – Багдад. Команда имеет характера льва и отличается это команда силой и храбрости и крепкой защитой.

Зооморфные прозвища используются больше всего в арабских странах, и в Африке и в Европе и как метафора в СМИ. Зооморфные прозвища украсят речь и тексты и сделают образ более понятным.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
International Journal Of Computer Techniques
Multifractal-Based Features for Medical Images Classification
...Show More Authors

This paper presents a method to classify colored textural images of skin tissues. Since medical images havehighly heterogeneity, the development of reliable skin-cancer detection process is difficult, and a mono fractaldimension is not sufficient to classify images of this nature. A multifractal-based feature vectors are suggested hereas an alternative and more effective tool. At the same time multiple color channels are used to get more descriptivefeatures.Two multifractal based set of features are suggested here. The first set measures the local roughness property, whilethe second set measure the local contrast property.A combination of all the extracted features from the three colormodels gives a highest classification accuracy with 99.4

... Show More
Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Genetic--Based Face Retrieval Using Statistical Features
...Show More Authors

Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sun Feb 22 2026
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF