Preferred Language
Articles
/
jcolang-635
The Kurdish experiment in the process of translation (1898-1991): ئةزمووني كوردي لة ثرؤسةي وةرطيَرِاندا (189 – 1991
...Show More Authors

Translation as a human endeavor has occupied the attention of nations since it bridges the gab between cultures and helps in bringing out national integration. The translation of Kurdish literature started with personal efforts in which newspapers and magazines had played a vital role in supporting translation and paved the way for promoting the publication of Kurdish products.

      The bulk of the materials translated from Arabic exceeds that translated from other languages owing to the influence of religious and authoritarian factors.

The survey of the Kurdish journals was limited to the period 1898-1991 since it marked a radical and historic change represented by the birth of Kurdish journalism which helped promote the translation process.

      The aim of this paper is to evaluate the Kurdish experiment in the translation process during the period from 1898-1991 . The paper is based on referred sources and the researcher's personal experience in Kurdish journalism…

      The types of translation have been under the focus of attention by a number of researchers stating that Kurdish readers cannot limit their culture to the Kurdish one but can be enriched by other cultures. Most of studies and research have been published in the Arabic language – a case which entails exerting a lot of efforts to translate them into the Kurdish language. However there are a number of obstacles posed by Kurdish translation including some words and terms,the nature of the Kurdish language and the influence of neighboring countries in addition to one's being non- knowledgeable about the mother tongue. Hence to be a competent translator , one should meet some key requirements that enable him/her to maintain fidelity in translation .

ثوختةي ئةنجامي تويَذينةوةكة

  • وةرطيَرِان بابةتيَكي طرنطي ئةدةبياتي طةلانةو، وةك هةولَ و تةقةلَلايةكي مرؤظايةتي بووةتة جيَي بايةخي نةتةوةكان كة ثرد ئاسا ثةنايان بؤ بردووة بؤ ئاشنا بوون بة كولتووري يةكدي .
  • وةرطيَرِان لة ئةدةبياتي كورديدا بة طشتي لة سنووري هةولَي تاكة كةسيدا بووة و رِؤذنامة و طؤظارةكانيش رِؤلَي باشيان هةبووة بؤ زةمينة خؤش كردن بؤ ثيَشكةوتني وةرطيَرِان لة زماني كورديدا ، ضونكة زمان زانةكان بابةتةكانيان تياياندا بلاَوكردؤتةوة ، كة بة زؤريش لة زماني عةرةبييةوة وةريان طيَرِاوة ئةويش لةبةر هؤكاري ئايني و دةسةلاَت .
  • مةوداي تويَذينةوةكةش (1898-1991) كة لة هةردوو سالَةكةدا هةلَكشان و داكشانيَكي رِوون هةية لةسةر ئاستي رِؤشنبيَري كوردي ، كة وةرطيَرِان بةشيَكي طرنطيَتي ، ضونكة لة سالَي يةكةمدا بة لة دايكبووني رؤذنامةنووسيي كوردي وةرضةرخانيَكي طةورة لةسةر ئاستي رؤشنبيري و خةباتي كوردايةتي دروست دةبيَ و لة سالَي دووةميشدا نةتةوةي كورد نةفةسي ئازادي هةلَدة كيَشيَ كة كارتيَكةريي راستة و خؤي هةبوو لةسةر طشت بوارةكاني ذياني كوردةواري .

ئامانجي تويَذينةوةكةش هةلَسةنطاندني ئةزمووني ثرؤسةي وةرطيَرِاني كورديية لةو زةمةنةدا .

  • تويَذينةوةكة لة كؤمةلَيَك سةرضاوةي رِةسةن سوودمةندة لةطةلَ ئةزمووني كةسيي تويَذةر .
  • ثؤليَن كردني جؤرةكاني وةرطيَرِان و كةلَةكةبووني شارةزايي بة دريَذاي ميَذوو كة شارستانيَتي ليَكةوتؤتةوة ، بوونةتة جيَي بايةخ و دووثات كردنةوةي ئةو رِاستييةي كةدةبيَ طةلان كةلتووري خؤيان لة ضوارضيَوةي زماني دايكدا حةشارنةدةن و هةولَي دةولَةمةندكردني بدةن .
  • ضرِكردنةوةي هةولَةكان بؤ وةرطيَرِاني ئةو تويَذينةوانةي بة زماني عةرةبي لةسةر هونةري وةرطيَرِان نووسراون كة لة وانة زياترن بة زماني كوردي نووسراون بكريَن بة كوردي .
  • دةستنيشان كردني طرفتة زمانةوانييةكان كةوا لة رِيَطاي كاري وةرطيَرِاندادةبنة كؤسث و لةم بوارانةدا بةرجةستة دةبن : فيَرنةبوون بة زماني دايك و وشةوزاراوة ، تايبةتمةندي سينتاكس ، سروشتي زمان ، كارتيَكةريي زماني طةلاني دراوسيَ

 

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Thu Sep 08 2022
Journal Name
Mathematical Statistician And Engineering Applications
δ-Semi Normal and δ-Semi Compact Spaces
...Show More Authors

In this paper by using δ-semi.open sets we introduced the concept of weakly δ-semi.normal and δ-semi.normal spaces . Many properties and results were investigated and studied. Also we present the notion of δ- semi.compact spaces and we were able to compare with it δ-semi.regular spaces

View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On e-Small Submodules
...Show More Authors

Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.

View Publication Preview PDF
Publication Date
Tue Feb 16 2016
Journal Name
The Iraqi Journal Of Agricultural Sciences
MEASURING VIBRATION AT TRACTOR PLATFORM , STEERING WHEEL AND SEAT EFFECTIVE AMPLITUDE TRANSMISSIBILITY FACTOR DURING OPERATION TILLAGE
...Show More Authors

Field experiment conducted to measure vibrations on three axes longitudinal X, lateral Y and vertical Z on steering wheel, platform tractor and vertical vibration in seat tractor and seat effective amplitude transmissibility (SEAT) factor during operation tillage in silt clay loam soil with depth 18 cm in Baghdad. Split – split plot design under randomized complete block design with three replications least significant design 5 % used. Three factor were used in this experiment included two types of plows included chisel and disc plows which represented main plot, three tires inflation pressure was second factor included 1.1 ,1.8 and 2.7 bar, and three forward speeds of the tillage was third factor included 2.35 , 4.25 and 6.50 km/hr. Resu

... Show More
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Understanding Inclusion (National and International Perspective)
...Show More Authors

Abstract

There have been a number of positive developments in inclusive education in many different countries, recognizing that all students, including those with disabilities, have a right to education. Around the world, educators, professionals, and parents are concerned about including children with disabilities in mainstream schools along with their peers. As a result of this trend, a number of factors are contributing, including the increasing importance of education in achieving social justice for pupils with special education needs; the right of individuals with disabilities to attend mainstream schools together with their typically developing peers; the benefit of equal opportunities for everyone in achie

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Fast Text Analysis Using Symbol Enumeration and Hashing Methodology
...Show More Authors

This paper is focusing on reducing the time for text processing operations by taking the advantage of enumerating each string using the multi hashing methodology. Text analysis is an important subject for any system that deals with strings (sequences of characters from an alphabet) and text processing (e.g., word-processor, text editor and other text manipulation systems). Many problems have been arisen when dealing with string operations which consist of an unfixed number of characters (e.g., the execution time); this due to the overhead embedded-operations (like, symbols matching and conversion operations). The execution time largely depends on the string characteristics; especially its length (i.e., the number of characters consisting

... Show More
View Publication Preview PDF