Preferred Language
Articles
/
jcolang-696
Translation Techniques In Reproducing The Semantics Of Russian Political Terms: Переводческие Приемы В Воспроизведении Семантики Русскоязычных Политических Терминов
...Show More Authors

 Political terminology differs from any other type of terminology not only in the presence of political terminology, but also in content, structure, functions and the recipient who perceives it. Taking this into account, it is inappropriate to consider the semantic difficulties of translating Russian-language political terms solely at the semantic level. In our opinion, it is inextricably linked with the lexical, syntactic and grammatical levels. If we combine all 4 levels, then the following translation techniques can be distinguished: lexical borrowing (transcription / transliteration, tracing); modulation; generalization / concretization; omission / addition; descriptive translation; conversion [Komissarov 2013]. One of the most common methods to replenish the lexical composition of the language is foreign language borrowing. The process of borrowing foreign words into any recipient language is due to a complex of lingual and extra-lingual factors, the level of speech development and its structure, the completeness of the vocabulary in the recipient language [Srebryanskaya, 2020].

Аннотация

Политическая терминология отличается от любого другого вида терминологии не только наличием политических терминосистем, но и содержанием, структурой, функциями и реципиентом, который ее воспринимает. Учитывая это, нецелесообразно рассматривать семантические трудности перевода русскоязычных политических терминов исключительно на семантическом уровне. По нашему мнению, он неразрывно связан с лексическим, синтаксическим и грамматическим уровнями. Если объединить все 4 уровня, то можно выделить следующие переводческие приемы: лексическое заимствование (транскрипция / транслитерация, калькирование);модуляция;  генерализация / конкретизация; опущение / добавление;  описательный перевод;  конверсия [Комиссаров 2013]. Одним из самых распространенных способов пополнения лексического состава языка является иноязычные заимствование. Процесс заимствования иностранных слов в любой язык-реципиент обусловлен сложным комплексом лингвальных и экстралингвальных факторов, уровнем развития речи и ее структурой, полнотой словарного запаса в языке-реципиенте [Сребрянская, 2020].

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an autonomous Mobile Robot using Swarm Based Optimization Techniques
...Show More Authors

This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Tue May 30 2023
Journal Name
Dirasat: Human And Social Sciences
The Family of Minister Al-Sayyid Al-Ajall: A Study of Its Political, Administrative, and Urban Role (7th-8th Century AH / 13th-14th AD)
...Show More Authors

Objectives: The study aimed to clarify the role of Al-Sayyid Al-Ajall and his family in the service of the Mongol Empire. They worked to develop its administrative and military institutions, benefiting from their extensive experience in administration, politics, economics, and urban affairs. Due to their capabilities, they received the patronage of Genghis Khan and subsequent generations, earning the confidence of the ruling Mongol authority. As a result, they were granted significant powers within the state.       Methods: The study relied on the analytical method to analyze historical texts, compare them with others, and discuss them accurately. Results: The study yielded several results, including the minister's keen interes

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 02 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Marginal leakage of amalgam and modern composite materials related to restorative techniques in class II cavity (Comparative study)
...Show More Authors

Background: Restoration of the gingival margin of Class II cavities with composite resin continues to be problematic, especially where no enamel exists for bonding to the gingival margin. The aim of study is to evaluate the marginal leakage at enamel and cementum margin of class II MOD cavities using amalgam restoration and modern composite restorations Filtek™ P90, Filtek™ Z250 XT (Nano Hybrid Universal Restorative) and SDR bulk fill with different restoratives techniques. Materials and method: Eighty sound maxillary first premolar teeth were collected and divided into two main groups, enamel group and cementum group (40 teeth) for each group. The enamel group was prepared with standardized Class II MOD cavity with gingival margin (1 m

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Petroleum And Coal
Analyzing of Production Data Using Combination of empirical Methods and Advanced Analytical Techniques
...Show More Authors

Scopus (1)
Scopus
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Latin American Journal Of Solids And Structures
Peak Ground Acceleration Models Predictions Utilizing Two Metaheuristic Optimization Techniques
...Show More Authors

Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Mixed Linearity Improvement Techniques for Ultra-wideband Low Noise Amplifier
...Show More Authors

<span>We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NF<sub>min.</sub>) of 3.6dB, input and output insertion losses (S<sub>11</sub> and S<sub>22</sub>)  below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 13 2025
Journal Name
Academia Open
Deep Learning and Fusion Techniques for High-Precision Image Matting:
...Show More Authors

General Background: Deep image matting is a fundamental task in computer vision, enabling precise foreground extraction from complex backgrounds, with applications in augmented reality, computer graphics, and video processing. Specific Background: Despite advancements in deep learning-based methods, preserving fine details such as hair and transparency remains a challenge. Knowledge Gap: Existing approaches struggle with accuracy and efficiency, necessitating novel techniques to enhance matting precision. Aims: This study integrates deep learning with fusion techniques to improve alpha matte estimation, proposing a lightweight U-Net model incorporating color-space fusion and preprocessing. Results: Experiments using the AdobeComposition-1k

... Show More
View Publication Preview PDF