Preferred Language
Articles
/
jcolang-710
Semantic relations in text and translation: Die semantischen Relationen im Text und Übersetzung
...Show More Authors

       Based on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation.  Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.

        It is known that language learners face multiple difficulties in writing and creating an integrated, coherent and intelligible text, and the reason for this is their lack of knowledge of semantic relations.

Deutsch

In dieser Forschungsarbeit gehen die folgenden theoretischen Ausführungen im Zusammenhang mit bestimmten didaktischen Bemerkungen, die im Laufe des Lehrprozesses aufgetreten sind, der Frage der semantischen Relationen in Satzperspektiven nach. Berücksichtigt wurde dabei überdies das Lehrprogramm in der irakischen Germanistikabteilung. Daher besteht das Hauptpostulat dieser wissenschaftlichen Abhandlung in dem Versuch, dieses sprachliche Phänomen im Übersetzen und dessen vielseitige Varianten darzulegen sowie dessen Anwendbarkeit in den Verhandlungen, im praktischen Leben und im Umgang mit den ausländischen Firmen etc. zu klären.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Unipolarity and Its Influences in American Foreign Policy and the Future International Relations: Unipolarity and Its Influences in American Foreign Policy and the Future International Relations
...Show More Authors

Abstract
The concept of unipolar has allowed the united states of America to
control the rest of the internations community units through the rxclusively of
control in international affairs without enabling other countries who have the
ability to compete with it to appear this comes as a result of it's position to all
kinds of powers like military, economic and technical powers that enable it to
continue dominating other countries, this superior control enabled it to be the
(hyper power) on the international political scene so that it allowed it to
exercise and implement the policy of domination against all this appeared
after its empire superiority became clear, in a unique way that have never
been known in

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
Affecting factors in Yemeni - Russian Relations after 2011
...Show More Authors

Thethesis of theresearch is to deal with relations between Russia and Yemen after 2011.That relationwas significant in different fields, historic, economic, strategic and cultural ones. There are mutual interestsbetweenRussia and Yemen, especially with the economic development and growth in Russia as an important partner to Yemen.Their has to an a great deal of progress in different types of relations, where as they were only partner in military relations. The studywasclassifiedintoto three sections: the first section dealt with strategic importance of Yemen to Russia. And second section dealt withthe military factor between Russia and Yemen. While the third section dealt with the economic factor between Russia and Yemen. In addi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Sep 17 2025
Journal Name
Journal Of The Iraqi University
Ottoman-Japanese Relations (1876-1924)
...Show More Authors

The research discusses the relations between Turkey and Japan, which began between the Ottoman Empire and the Meiji Empire in Japan since the arrival of Sultan Abdul Hamid II to power in 1976 and his interest in Japan as the first Asian country to achieve modernization. Both faced one problem during the late nineteenth century, which is the ambitions of Tsarist Russia and the suffering of the parties suffered unequal treaties. Relations between them have begun to develop slowly and gradually, especially after Japan received a large Ottoman delegation on board the Ertugrul frigate in 1890, through the First World War and the Treaty of Sevres, the arrival of Mustafa Kemal Ataturk to power and the establishment of the modern Republic of Turkey

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Turkish relations – Israel (1990-1998)
...Show More Authors

The Turkish relations - Israel took its course clearly about the nature and the fact that
these relationships, and their causes and motives of its establishment, its objectives and the
dimensions of the various political, security, military and economic. Orbiter and the relations
of the Turkish-Israeli It is inclusive of all the reasons for the establishment of relations, they
include the interpretation of an interest in international relations, which is why the
establishment of relations between the two countries and on the concept of interdependence
where that both Turkey and Israel depends on the other in several aspects of the most
important military, security, economic, and to understand Turkey's new identity, m

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Balance and unbalance in alliance relations The Saudi Arabia and United State Relation as model: The Balance and unbalance in alliance relations The Saudi Arabia and United State Relation as model
...Show More Authors

Abstract:
Saudi Arabia and United States long relation could present an important
subject to understand alliance kind in international relations types. We trying
in this study to diagnose and analyze the Saudi Arabia and United States
model to find balance and unbalance statues and its influence on the
directions of Saudi Arabia foreign policy positions.
We divided the study in two parts, each part have many sections. The
first part deal with the historian emergence of Saudi Arabia state and its
development in three stages including its foreign relations with regions and
international powers. While the second part was dedicated in analyzing and
understanding the mechanism and active facts that drawing the Sa

... Show More
View Publication Preview PDF