Preferred Language
Articles
/
jcolang-635
The Kurdish experiment in the process of translation (1898-1991): ئةزمووني كوردي لة ثرؤسةي وةرطيَرِاندا (189 – 1991
...Show More Authors

Translation as a human endeavor has occupied the attention of nations since it bridges the gab between cultures and helps in bringing out national integration. The translation of Kurdish literature started with personal efforts in which newspapers and magazines had played a vital role in supporting translation and paved the way for promoting the publication of Kurdish products.

      The bulk of the materials translated from Arabic exceeds that translated from other languages owing to the influence of religious and authoritarian factors.

The survey of the Kurdish journals was limited to the period 1898-1991 since it marked a radical and historic change represented by the birth of Kurdish journalism which helped promote the translation process.

      The aim of this paper is to evaluate the Kurdish experiment in the translation process during the period from 1898-1991 . The paper is based on referred sources and the researcher's personal experience in Kurdish journalism…

      The types of translation have been under the focus of attention by a number of researchers stating that Kurdish readers cannot limit their culture to the Kurdish one but can be enriched by other cultures. Most of studies and research have been published in the Arabic language – a case which entails exerting a lot of efforts to translate them into the Kurdish language. However there are a number of obstacles posed by Kurdish translation including some words and terms,the nature of the Kurdish language and the influence of neighboring countries in addition to one's being non- knowledgeable about the mother tongue. Hence to be a competent translator , one should meet some key requirements that enable him/her to maintain fidelity in translation .

ثوختةي ئةنجامي تويَذينةوةكة

  • وةرطيَرِان بابةتيَكي طرنطي ئةدةبياتي طةلانةو، وةك هةولَ و تةقةلَلايةكي مرؤظايةتي بووةتة جيَي بايةخي نةتةوةكان كة ثرد ئاسا ثةنايان بؤ بردووة بؤ ئاشنا بوون بة كولتووري يةكدي .
  • وةرطيَرِان لة ئةدةبياتي كورديدا بة طشتي لة سنووري هةولَي تاكة كةسيدا بووة و رِؤذنامة و طؤظارةكانيش رِؤلَي باشيان هةبووة بؤ زةمينة خؤش كردن بؤ ثيَشكةوتني وةرطيَرِان لة زماني كورديدا ، ضونكة زمان زانةكان بابةتةكانيان تياياندا بلاَوكردؤتةوة ، كة بة زؤريش لة زماني عةرةبييةوة وةريان طيَرِاوة ئةويش لةبةر هؤكاري ئايني و دةسةلاَت .
  • مةوداي تويَذينةوةكةش (1898-1991) كة لة هةردوو سالَةكةدا هةلَكشان و داكشانيَكي رِوون هةية لةسةر ئاستي رِؤشنبيَري كوردي ، كة وةرطيَرِان بةشيَكي طرنطيَتي ، ضونكة لة سالَي يةكةمدا بة لة دايكبووني رؤذنامةنووسيي كوردي وةرضةرخانيَكي طةورة لةسةر ئاستي رؤشنبيري و خةباتي كوردايةتي دروست دةبيَ و لة سالَي دووةميشدا نةتةوةي كورد نةفةسي ئازادي هةلَدة كيَشيَ كة كارتيَكةريي راستة و خؤي هةبوو لةسةر طشت بوارةكاني ذياني كوردةواري .

ئامانجي تويَذينةوةكةش هةلَسةنطاندني ئةزمووني ثرؤسةي وةرطيَرِاني كورديية لةو زةمةنةدا .

  • تويَذينةوةكة لة كؤمةلَيَك سةرضاوةي رِةسةن سوودمةندة لةطةلَ ئةزمووني كةسيي تويَذةر .
  • ثؤليَن كردني جؤرةكاني وةرطيَرِان و كةلَةكةبووني شارةزايي بة دريَذاي ميَذوو كة شارستانيَتي ليَكةوتؤتةوة ، بوونةتة جيَي بايةخ و دووثات كردنةوةي ئةو رِاستييةي كةدةبيَ طةلان كةلتووري خؤيان لة ضوارضيَوةي زماني دايكدا حةشارنةدةن و هةولَي دةولَةمةندكردني بدةن .
  • ضرِكردنةوةي هةولَةكان بؤ وةرطيَرِاني ئةو تويَذينةوانةي بة زماني عةرةبي لةسةر هونةري وةرطيَرِان نووسراون كة لة وانة زياترن بة زماني كوردي نووسراون بكريَن بة كوردي .
  • دةستنيشان كردني طرفتة زمانةوانييةكان كةوا لة رِيَطاي كاري وةرطيَرِاندادةبنة كؤسث و لةم بوارانةدا بةرجةستة دةبن : فيَرنةبوون بة زماني دايك و وشةوزاراوة ، تايبةتمةندي سينتاكس ، سروشتي زمان ، كارتيَكةريي زماني طةلاني دراوسيَ

 

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
The Iraqi Journal For Information And Documentation Studies
Improving students' cognitive abilities using modern technologies: an experimental study
...Show More Authors

The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 08 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Some Results on Pure Submodules Relative to Submodule
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On e-Small Submodules
...Show More Authors

Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.

View Publication Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method
...Show More Authors

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 08 2022
Journal Name
Mathematical Statistician And Engineering Applications
δ-Semi Normal and δ-Semi Compact Spaces
...Show More Authors

In this paper by using δ-semi.open sets we introduced the concept of weakly δ-semi.normal and δ-semi.normal spaces . Many properties and results were investigated and studied. Also we present the notion of δ- semi.compact spaces and we were able to compare with it δ-semi.regular spaces

View Publication Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (3)
Crossref