Preferred Language
Articles
/
jcolang-292
Difficulties of Rendering Both “Imra’a” امرأة and “Zawj” زوج in the Glorious Qur’an into English
...Show More Authors

Women are considered important characters and subjects of discussion in the Glorious  Qur’an. Some are portrayed in a positive light while others are condemned . Most women in the Glorious Qur’an are represented as either the mothers or wives of certain leaders and prophets. But the lexical items “Imra’a” امراة and “zawj” زوج occur in the Glorious Qur’an with different meanings depending on the context where they occur.

     Translation of the Glorious Qur'an has always been a problematic and difficult issue. Since the Glorious Qur'an is regarded as miraculous and inimitable (i'jaz al-Qur'an), Muslims argue that the Qur'anic text should not be separated from its true form to another different form keeping the Arabic text along . The present paper is concerned with difficulties of translating both “Imra’a” امراة and “zawj” زوج in the Glorius Qur’an into English .In Arabic a word may have a range of meanings depending  on the context, i.e. polysemous. There are various words in the Glorious Qur’an that are considered polysemous .Among these words are both “Imra’a” امراة and “zawj” زوج . Thus, the translator will encounter obvious difficulty when he/she tries to convey the intended meaning of such polysemous words because he/she will be confused by the various meanings and senses of these words.. Four translations have been adopted concerning the terms “Imra’a” امراة and “zawj” زوج , namely those by Pickthall, Yusuf Ali, Mohsin Khan and Arberry.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Academic Medicine
Academic medicine and science diplomacy: medical education in Iraq
...Show More Authors

Physicians are infrequently selected to serve in the yearlong role of Jefferson Science Fellow (JSF) as senior science advisor for the US Department of State or the United States Agency for International Development. The authors discuss the role of a JSF in promoting “science diplomacy” from the perspective of one alumnus, who sites examples of ongoing, long-term collaborative projects including one focusing on medical education reform in Iraq that would not have been possible without the JSF program. More than 3 decades of political and social unrest, terrorism, the internal displacement of millions of Iraqi citizens, the arrival of Syrian refugees, international sanctions, and the effect of fluctuating oil prices that fund education i

... Show More
Scopus (2)
Scopus
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Pyogenic Discitis in Female after Delivery and Pelvic Surgery
...Show More Authors

Background: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Tue Feb 11 2025
Journal Name
Journal Of Ecohumanism
Climate Changes and Societal Stability in Iraq: Proposed Measures
...Show More Authors

Iraq is considered one of the countries most susceptible to the negative impacts of climate change. According to international reports, it is classified as among the top five most affected by climate change in the world, leading to economic resource shortages and an increase in water scarcity, which exposes societal stability in Iraq to a threat.  This may result in social disintegration and civil conflicts, so climate changes are considered one of the most dangerous crises affecting societal stability in Iraq during this stage.  In this context, the research attempts to trace the causes of climate change and their effects on societal stability in Iraq and suggest some necessary measures to confront them in the future.  The resea

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Pilot Based Channel Estimation and Synchronization in OFDM System
...Show More Authors

Channel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (65)
Crossref (59)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Scripta Medica
Correlation between psoriasis severity and dyslipidaemia in Iraqi patients
...Show More Authors

Background/Aim: Psoriasis is a persistent systemic disorder characterised by chronic inflammation and linked to multiple comorbidities, including arthritis, cardiometabolic disorders, obesity and hyperlipidaemia. Objective of this study was to identify the relationship of abnormal lipid profiles and psoriasis, as well as to pinpoint factors that correlate with disease severity. Methods: A cross-sectional study was carried out at the dermatology clinic over 6 months from the 1 August 2024 to the 1 February 2025. Patients aged 15 years and above with a diagnosis of psoriasis were enrolled. For each patient two sets of data were collected, demographical characteristics (age, sex, disease duration and the body mass index (BMI)) and the

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 04 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Enamel defect of primary and permanent teeth in relation to nutrients daily intake among Down's syndrome children in comparison to normal children
...Show More Authors

Background: Any child with Down's syndrome does not develop in the same manner as normal child. Therefore, the child should not be viewed as being like everyone else. Developmental enamel defects in primary teeth have been found at least twice as frequently in disabled children as in control children. Down's syndrome consumed protein more than the recommended daily allowance compared to other disabled groups. Therefore, the aim of this study was to investigate developmental defects of enamel and their relations to nutrient intake among Down's syndrome children in comparison to normal children. Materials and Methods: A sample consisted of fifty institutionalized Down's syndrome children (study group) and 50 normal children (control group)

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 31 2016
Journal Name
International Journal Of Advanced Research
SINGLE NUCLEOTIDE POLYMORPHISMS (SNPS) IN EXON 3 AND 7 OF ESTROGEN RECEPTOR BETA (ESR2) GENE IN WOMEN WITH BREAST CANCER FROM IRAQ.
...Show More Authors

This study was aimed to determine the mutations and single nucleotide polymorphisms (SNPs) in exon 3 and 7 of estrogen receptor beta (ESR2) gene in women with breast cancer from Iraq. Different samples (blood, fresh tissue with blood from same patient, and formalin fixed paraffin embedded, FFPE) were collected from women with breast cancer. Molecular analysis exon 3 and 7 in ESR2 has been studied by using PCR. It was found exon 3 and 7 in ESR2 were revealed as a single band with size 151 and 157 bp, respectively. There was no SNP in exon 3 has been identified. While three novel polymorphisms (ACT, AGG and GCA) were detected in exon 7, the type of those polymorphisms deletion for ACT and AGG while substitution polymorphism for GCA. From this

... Show More
View Publication
Crossref