Preferred Language
Articles
/
jcolang-292
Difficulties of Rendering Both “Imra’a” امرأة and “Zawj” زوج in the Glorious Qur’an into English
...Show More Authors

Women are considered important characters and subjects of discussion in the Glorious  Qur’an. Some are portrayed in a positive light while others are condemned . Most women in the Glorious Qur’an are represented as either the mothers or wives of certain leaders and prophets. But the lexical items “Imra’a” امراة and “zawj” زوج occur in the Glorious Qur’an with different meanings depending on the context where they occur.

     Translation of the Glorious Qur'an has always been a problematic and difficult issue. Since the Glorious Qur'an is regarded as miraculous and inimitable (i'jaz al-Qur'an), Muslims argue that the Qur'anic text should not be separated from its true form to another different form keeping the Arabic text along . The present paper is concerned with difficulties of translating both “Imra’a” امراة and “zawj” زوج in the Glorius Qur’an into English .In Arabic a word may have a range of meanings depending  on the context, i.e. polysemous. There are various words in the Glorious Qur’an that are considered polysemous .Among these words are both “Imra’a” امراة and “zawj” زوج . Thus, the translator will encounter obvious difficulty when he/she tries to convey the intended meaning of such polysemous words because he/she will be confused by the various meanings and senses of these words.. Four translations have been adopted concerning the terms “Imra’a” امراة and “zawj” زوج , namely those by Pickthall, Yusuf Ali, Mohsin Khan and Arberry.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 08 2015
Journal Name
Journal Of The Faculty Of Medicine
Sciatic nerve injection injury in children: Management and outcome
...Show More Authors

W Tarik A, AW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 2

View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Academic Medicine
Academic medicine and science diplomacy: medical education in Iraq
...Show More Authors

Physicians are infrequently selected to serve in the yearlong role of Jefferson Science Fellow (JSF) as senior science advisor for the US Department of State or the United States Agency for International Development. The authors discuss the role of a JSF in promoting “science diplomacy” from the perspective of one alumnus, who sites examples of ongoing, long-term collaborative projects including one focusing on medical education reform in Iraq that would not have been possible without the JSF program. More than 3 decades of political and social unrest, terrorism, the internal displacement of millions of Iraqi citizens, the arrival of Syrian refugees, international sanctions, and the effect of fluctuating oil prices that fund education i

... Show More
Scopus (2)
Scopus
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Pyogenic Discitis in Female after Delivery and Pelvic Surgery
...Show More Authors

Background: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Pilot Based Channel Estimation and Synchronization in OFDM System
...Show More Authors

Channel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Sep 01 2008
Journal Name
Journal Of Engineering
GEOTEXTILE AND GEOMEMBRANE USAGE IN AN IRAQI SANDY GEOENVIRONMENT
...Show More Authors

The work in this research presents an experimental and a theoretical study to obtain the effect of using a low permeability geosynthetic material on the longitudinal and lateral coefficients of dispersion. This would have its effect on the contaminants migration through an isotropic, homogenous and saturated soil. The first stage of this research involves the study of the geosynthetic material and in calculating the longitudinal and lateral coefficients of dispersion for an Iraqi sandy soil by using an experimental set-up to simulate the processes. To investigate the effect of using a geosynethtic material on the dispersion coefficients, the test was conducted for each velocity that was used in the experimental work and as follows:  with

... Show More
Publication Date
Wed Jan 01 2025
Journal Name
Scripta Medica
Correlation between psoriasis severity and dyslipidaemia in Iraqi patients
...Show More Authors

Background/Aim: Psoriasis is a persistent systemic disorder characterised by chronic inflammation and linked to multiple comorbidities, including arthritis, cardiometabolic disorders, obesity and hyperlipidaemia. Objective of this study was to identify the relationship of abnormal lipid profiles and psoriasis, as well as to pinpoint factors that correlate with disease severity. Methods: A cross-sectional study was carried out at the dermatology clinic over 6 months from the 1 August 2024 to the 1 February 2025. Patients aged 15 years and above with a diagnosis of psoriasis were enrolled. For each patient two sets of data were collected, demographical characteristics (age, sex, disease duration and the body mass index (BMI)) and the

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Responsible accounting and its role in achieving competitive advantage
...Show More Authors

One of the management accounting tools is responsible accounting. In this system, the organisation is divided into responsibility centres that help to connect an individual performance responsible to perform through a combined system of reports according to the implementation of the mechanism of exception tools which gives assistance in planning. The exploitation of the organisation's available resources is achieved through the application of responsible accounting. Also, the best exploitation will lead to the provision of low-cost products through the disposal of all types of waste or loss during the cost centres. By providing products at a lower cost and satisfying the wishes of the needs of customers, the result reflects the competitive

... Show More
Scopus
Publication Date
Tue Apr 22 2025
Journal Name
Passer Journal Of Basic And Applied Sciences
Searching Elastic and Inelastic Coulomb Transitions in Chromium-54
...Show More Authors

View Publication
Scopus Crossref