Preferred Language
Articles
/
jcolang-710
Semantic relations in text and translation: Die semantischen Relationen im Text und Übersetzung
...Show More Authors

       Based on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation.  Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.

        It is known that language learners face multiple difficulties in writing and creating an integrated, coherent and intelligible text, and the reason for this is their lack of knowledge of semantic relations.

Deutsch

In dieser Forschungsarbeit gehen die folgenden theoretischen Ausführungen im Zusammenhang mit bestimmten didaktischen Bemerkungen, die im Laufe des Lehrprozesses aufgetreten sind, der Frage der semantischen Relationen in Satzperspektiven nach. Berücksichtigt wurde dabei überdies das Lehrprogramm in der irakischen Germanistikabteilung. Daher besteht das Hauptpostulat dieser wissenschaftlichen Abhandlung in dem Versuch, dieses sprachliche Phänomen im Übersetzen und dessen vielseitige Varianten darzulegen sowie dessen Anwendbarkeit in den Verhandlungen, im praktischen Leben und im Umgang mit den ausländischen Firmen etc. zu klären.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Danials model in concepts Acquisition of Education Principles on Studets at college of Education .
...Show More Authors

The research aims at identifyiny the effect of (Danials Model) in concepts Acquisition of Education Principles on Students at college at Education The total unmber of Students , is (65) male and female Students distributed in two groups . The First group is the experiemental group which is taught the (Danials Model) and is (34) Students . The second groupe is the control group which is taught the traditional method of teaching and it is (31) Students . The researcher has matcheol between the two groupe by the following variables : the age , (in monthes) their intelligence their parents a cademic leve of education . The research has constructed a test of (20) items of multiple choice test . The reliability of The test has been cal

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 12 2025
Journal Name
Al–bahith Al–a'alami
THE CONSTRUCTION OF NEWS TICKERS IN THE ARABIC CHANNELS: ) Al Arabiya TV - study of the case - 2007(
...Show More Authors

While providing important news information, News tickers ( also called sliders or crawlers ) have become one of the methods used daily by satellite channels, because it’s almost a continuous news coverage and as it seems, it has become today an addition to the news world. Hence, satellite channels need to look for a mechanism to build news tickers in order to develop them even though they are still today not recognisable and in need of being classified in a radio or television art, and that is not easy. This research sheds light on the construction of the slider of a news satellite channel, which is important according to our modest convictions, as it can be the beginning of a long scientific research in a new field of study. The probl

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Modeling of violence in a speech creativity photogrammetry Iraqi contemporary: أريج سعد عدنان الهنداوي
...Show More Authors

The latest events in Iraq and notably the fall of Mosul in the summer of 2014 have marked a turning point in The modern history of Iraq. Violent terrorist groups have overrun a vast area comprising of many towns in mid and northern Iraq causing many casualties and mass migration. Despite Iraq’s long history of pain and suffering the events of the second half of the year 2014 have been the most violent ever witnessed. From this point of view the researcher has tried to identify specifically in this time and place the effect these events have had on the Iraqi artist and to understand how the Iraqi artists depicted this violence in their works of art. The research comprises four parts; the first looked at the language used and the and pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 31 2017
Journal Name
Journal Of Engineering
The Role of Patnership Approuch in Facilitating Housing in Iraq
...Show More Authors

  

View Publication Preview PDF
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Measurement of some Biochemical Values in Hemodialysis Patients in Baghdad
...Show More Authors

One hundred of dialysis patients' mean age ( 51.18±8.28) years and one hundred healthy control group , where carried out  from different hospitals of Baghdad city , during the period between November /2012 until March/2013. Blood samples were collected before dialyzing for estimation   the concentration of urea, creatinine, uric acid, random blood sugar , calcium and cholesterol by enzymatic method detected spectrophotometerically.

The  aim of this  study is   to determine concentration of urea, creatinine, uric acid, RBS , calcium and cholesterol in hemodialysis patients in Baghdad . The results showed that there were  highly significant increases (P<0.01) in the mean of creatinine ,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Knowledge Management in Saudi Universities Applied study in Shaqra University
...Show More Authors

  This research aims  to know the reality of  implementation of  Knowledge Management in Saudi Universities Applied  in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.

The study investigated the university staff  in Shaqra, Thadig, and Huraymila branches,  using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.

The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 27 2023
Journal Name
Online Journal Of Animal And Feed Research
Phylogenetic identification of Anaplasma phagocytophilum in horses in Baghdad, Iraq
...Show More Authors

This study aimed to detect Anaplasma phagocytophilum in horses through hematological and molecular tests. The 16S rRNA gene of the Anaplasma phagocytophilum parasite was amplified by polymerase chain reaction (PCR), then sequenced, and subjected to phylogenetic analysis to explore "Equine Granulocytic Anaplasmosis" (EGA) infection in three important gathering race horses areas in Baghdad governorate, Iraq. Blood samples were obtained from 160 horses of varying ages, three breeds, and both sexes, between January and December 2021. Prevalence and risk variables for anaplasmosis were analyzed using statistical odds ratio and chi-square tests. Results demonstrated that clinical anaplasmosis symptoms comprised jaundice, wei

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Microbial Contamination of Eye Drops in out Patient in Iraq
...Show More Authors

Acontaminated ophthalmic solutions represent a potential cause of avoidable ocular infection. This study aimed to determine the magnitude and pattern of microbial contamination of eye drops in out patient at the department of ophthalmology, at Baghdad national hospital, Iraq. Fifty four vials from the out patient clinic were obtained for microbial examination after an average use of 2 weeks. The dropper tip and the residual eye drop were examined for contamination. The specimens were cultured, the number of colonies counted, the organisms identified. Eight (15%)  out of 54 analyzed vials were contaminated , most bacteria identi

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Spe Kingdom Of Saudi Arabia Annual Technical Symposium And Exhibition
Optimization of Infill Drilling in Whicher Range Field in Australia
...Show More Authors
Abstract<p>Now that most of the conventional reservoirs are being depleted at a rapid pace, the focus is on unconventional reservoirs like tight gas reservoirs. Due to the heterogeneous nature and low permeability of unconventional reservoirs, they require a huge number of wells to hit all the isolated hydrocarbon zones. Infill drilling is one of the most common and effective methods of increasing the recovery, by reducing the well spacing and increasing the sweep efficiency. However, the problem with drilling such a large number of wells is the determination of the optimum location for each well that ensures minimum interference between wells, and accelerates the recovery from the field. Detail</p> ... Show More
View Publication
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref