Preferred Language
Articles
/
jcolang-631
The Problem of Translating Antonyms in The Holy Qur’an into German’’, in an analytical manner: Das Übersetzungsproblem der Antonyme im Heiligen Koran ins Deutsche Analytische Studie
...Show More Authors

The present study is entitled “Problems of Translating Holy Qur’an Antonyms into German: An Analytical Study”. It discusses some of the problems of translating Holy Qur’an verses that contain words so opposite in meaning to another word. The main concern of the study stresses some of the errors in translating the oppositeness of certain words of Holy Qur’an from Arabic into other languages like German, a problem that can be traced back to the fact that such words may have two opposites in meaning, one is considered and the other is completely neglected.

      The errors in translating al Qur’an Antonyms can be summarized for several reasons: literal translation, ignorance of the different views of both the linguists and AlQur’an interpreters in conveying the meanings of the opposites, generalizing and specification of the opposites in meaning, interpreting one main meaning of the opposites and ignoring the other one, the absence of the word in the target language that closely indicates the meaning in the source language, depending entirely on the most correct opinion of the meaning, ignorance of an extra meaning other than the opposites, depending on the personal interpretation and mistranslating certain opposites either intentionally or unintentionally.

Vorwort

Die vorliegende Forschungsarbeit handelt das Übersetzungsproblem von Antonymen in den Heiligen Koran- Versen ins Deutsche auf beschreibende und analytische Weise ab. Dieses Thema ist großer von Bedeutung besonders für die nicht-arabische Muslime, d.h., die deutschstämmige Muslime, die die arabische Sprache nicht sprechen kann. Der Grund für diese Studie ist das Auftreten einiger Fehler beim Übersetzen von Gegensätzen im Koran ins Deutsche und  veranschaulicht sie auch in vereinfachter Form die Gründe dieser Fehler bei der Übersetzung von diesen Gegensätzen. Der Grund für diese Fehler im Übersetzungsprozess ist die Existenz von Wörtern, die zwei gegensätzlichen Bedeutungen in den einigen Koran- Versen, sozusagen (die Antonyme) enthalten, d.h., ein Gegenwort, das zu einem anderen Wort eine gegensätzliche Bedeutung hat, oder aus dem  Semantikaspekt ist es ( das Antonym) ein Wort, dessen Bedeutung das genaue Gegenteil zu der eines anderen Wortes ausdrückt.

Die Forschungsfrage liegt darin, dass mehrere Fehler beim Übersetzen der Antonyme im Heiligen Koran gemacht werden. Die Ursachen dieser Übersetzungsfehler können wir ja auf die Wörter, die zwei gegensätzlichen Bedeutungen enthalten, zurückführen, deshalb hatten die Übersetzungen oftmals vor, eine von den beiden Bedeutungen zu nehmen und die andere zu ignorieren. Wir können überhaupt einige dieser Probleme aufzählen, in die die Übersetzer des Heiligen Korans beim Übersetzen dieser Antonyme geraten sind. Sie sind zum Beispiel: die wörtliche Übersetzung; die Übersetzer der Koransbedeutungen haben keine  gute bzw. ausreichende Kenntnis über die  Meinungen von Linguisten hinsichtlich der Bedeutung dieses Wortes; die Differenzen der Linguisten und Koran-Interpreten über die Bedeutungen des Korans; Verallgemeinerung der semantischen Bedeutung der Ausdrücke; das Fehlen eines Wortes in der Zielsprache deutet auf die gleiche Bedeutung in der Ausgangssprache hin; die persönliche Meinung des Übersetzers und die Antonyme können absichtlich oder versehentlich nicht übersetzt werden. Alle diese Dinge waren insgesamt die Hauptursache für die Fehler beim Übersetzen der Kontrastausdrücke in den heiligen Koran Versen.                                                                                 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 03 2022
Journal Name
Teikyo Medical Journal
Tooth agenesis and palatal dimensions associated with craniofacial deformity- Cone Beam Computed Tomography based study
...Show More Authors

Cleft / palate is one of the common congenital deformities in craniofacial region, associated with different types of dental anomalies like (Tooth agenesis, impaction, and supernumerary teeth) with marked changes in palatal dimensions. This study aimed to determine the prevalence of teeth agenesis and dental anomalies in cleft lip/palate patients using CBCT, and to compare the palatal dimension of cleft group with control subjects. Twenty-eight cleft cases collected during the period from 2015 to 2022, CBCT images evaluated, the study sample classified into two groups (14 bilateral and 14 unilateral cleft lip/palate) and the non-cleft control group (14 CBCT images). The presence of dental anomalies was assessed in relation to clef

... Show More
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
F-Compact operator on probabilistic Hilbert space
...Show More Authors

This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Some Results on Reduced Rings
...Show More Authors

The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Strengthening and Closing Cracks for Existing Reinforced Concrete Girders Using Externally Post-Tensioned Tendons
...Show More Authors

This research is devoted to study the strengthening technique for the existing reinforced concrete beams using external post-tensioning. An analytical methodology is proposed to predict the value of the effective prestress force for the external tendons required to close cracks in existing beams. The external prestressing force required to close cracks in existing members is only a part from the total strengthening force.
A computer program created by Oukaili (1997) and developed by Alhawwassi (2008) to evaluate curvature and deflection for reinforced concrete beams or internally prestressed concrete beams is modified to evaluate the deflection and the stress of the external tendons for the externally strengthened beams using Matlab

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 17 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Dynamic Channel Assignment Using Neural Networks
...Show More Authors

This paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.

View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
S-Coprime Submodules
...Show More Authors

  In this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.

View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modules with Chain Conditions on S-Closed Submodules
...Show More Authors

  Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called  s- closed submodule denoted by  D ≤sc W, if D has   no  proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In  this  paper,  we study  modules which satisfies  the ascending chain  conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref