Preferred Language
Articles
/
jcolang-635
The Kurdish experiment in the process of translation (1898-1991): ئةزمووني كوردي لة ثرؤسةي وةرطيَرِاندا (189 – 1991
...Show More Authors

Translation as a human endeavor has occupied the attention of nations since it bridges the gab between cultures and helps in bringing out national integration. The translation of Kurdish literature started with personal efforts in which newspapers and magazines had played a vital role in supporting translation and paved the way for promoting the publication of Kurdish products.

      The bulk of the materials translated from Arabic exceeds that translated from other languages owing to the influence of religious and authoritarian factors.

The survey of the Kurdish journals was limited to the period 1898-1991 since it marked a radical and historic change represented by the birth of Kurdish journalism which helped promote the translation process.

      The aim of this paper is to evaluate the Kurdish experiment in the translation process during the period from 1898-1991 . The paper is based on referred sources and the researcher's personal experience in Kurdish journalism…

      The types of translation have been under the focus of attention by a number of researchers stating that Kurdish readers cannot limit their culture to the Kurdish one but can be enriched by other cultures. Most of studies and research have been published in the Arabic language – a case which entails exerting a lot of efforts to translate them into the Kurdish language. However there are a number of obstacles posed by Kurdish translation including some words and terms,the nature of the Kurdish language and the influence of neighboring countries in addition to one's being non- knowledgeable about the mother tongue. Hence to be a competent translator , one should meet some key requirements that enable him/her to maintain fidelity in translation .

ثوختةي ئةنجامي تويَذينةوةكة

  • وةرطيَرِان بابةتيَكي طرنطي ئةدةبياتي طةلانةو، وةك هةولَ و تةقةلَلايةكي مرؤظايةتي بووةتة جيَي بايةخي نةتةوةكان كة ثرد ئاسا ثةنايان بؤ بردووة بؤ ئاشنا بوون بة كولتووري يةكدي .
  • وةرطيَرِان لة ئةدةبياتي كورديدا بة طشتي لة سنووري هةولَي تاكة كةسيدا بووة و رِؤذنامة و طؤظارةكانيش رِؤلَي باشيان هةبووة بؤ زةمينة خؤش كردن بؤ ثيَشكةوتني وةرطيَرِان لة زماني كورديدا ، ضونكة زمان زانةكان بابةتةكانيان تياياندا بلاَوكردؤتةوة ، كة بة زؤريش لة زماني عةرةبييةوة وةريان طيَرِاوة ئةويش لةبةر هؤكاري ئايني و دةسةلاَت .
  • مةوداي تويَذينةوةكةش (1898-1991) كة لة هةردوو سالَةكةدا هةلَكشان و داكشانيَكي رِوون هةية لةسةر ئاستي رِؤشنبيَري كوردي ، كة وةرطيَرِان بةشيَكي طرنطيَتي ، ضونكة لة سالَي يةكةمدا بة لة دايكبووني رؤذنامةنووسيي كوردي وةرضةرخانيَكي طةورة لةسةر ئاستي رؤشنبيري و خةباتي كوردايةتي دروست دةبيَ و لة سالَي دووةميشدا نةتةوةي كورد نةفةسي ئازادي هةلَدة كيَشيَ كة كارتيَكةريي راستة و خؤي هةبوو لةسةر طشت بوارةكاني ذياني كوردةواري .

ئامانجي تويَذينةوةكةش هةلَسةنطاندني ئةزمووني ثرؤسةي وةرطيَرِاني كورديية لةو زةمةنةدا .

  • تويَذينةوةكة لة كؤمةلَيَك سةرضاوةي رِةسةن سوودمةندة لةطةلَ ئةزمووني كةسيي تويَذةر .
  • ثؤليَن كردني جؤرةكاني وةرطيَرِان و كةلَةكةبووني شارةزايي بة دريَذاي ميَذوو كة شارستانيَتي ليَكةوتؤتةوة ، بوونةتة جيَي بايةخ و دووثات كردنةوةي ئةو رِاستييةي كةدةبيَ طةلان كةلتووري خؤيان لة ضوارضيَوةي زماني دايكدا حةشارنةدةن و هةولَي دةولَةمةندكردني بدةن .
  • ضرِكردنةوةي هةولَةكان بؤ وةرطيَرِاني ئةو تويَذينةوانةي بة زماني عةرةبي لةسةر هونةري وةرطيَرِان نووسراون كة لة وانة زياترن بة زماني كوردي نووسراون بكريَن بة كوردي .
  • دةستنيشان كردني طرفتة زمانةوانييةكان كةوا لة رِيَطاي كاري وةرطيَرِاندادةبنة كؤسث و لةم بوارانةدا بةرجةستة دةبن : فيَرنةبوون بة زماني دايك و وشةوزاراوة ، تايبةتمةندي سينتاكس ، سروشتي زمان ، كارتيَكةريي زماني طةلاني دراوسيَ

 

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 16 2022
Journal Name
Journal Of Economics And Administrative Sciences
Solving Resource Allocation Model by Using Dynamic Optimization Technique for Al-Raji Group Companies for Soft Drinks and Juices
...Show More Authors

In this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 08 2022
Journal Name
Mathematical Statistician And Engineering Applications
δ-Semi Normal and δ-Semi Compact Spaces
...Show More Authors

In this paper by using δ-semi.open sets we introduced the concept of weakly δ-semi.normal and δ-semi.normal spaces . Many properties and results were investigated and studied. Also we present the notion of δ- semi.compact spaces and we were able to compare with it δ-semi.regular spaces

View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Understanding Inclusion (National and International Perspective)
...Show More Authors

Abstract

There have been a number of positive developments in inclusive education in many different countries, recognizing that all students, including those with disabilities, have a right to education. Around the world, educators, professionals, and parents are concerned about including children with disabilities in mainstream schools along with their peers. As a result of this trend, a number of factors are contributing, including the increasing importance of education in achieving social justice for pupils with special education needs; the right of individuals with disabilities to attend mainstream schools together with their typically developing peers; the benefit of equal opportunities for everyone in achie

... Show More
View Publication Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 29 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Viable Strategies to Increase Clinical Trial Patient Diversity
...Show More Authors

In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref