Preferred Language
Articles
/
jcolang-753
Evaluation of proverb translation in Nahj al-Balagheh based on the theory of Peter Newmark (Dashti, Shahidi and Foladvand): ارزیابی ترجمه ضرب‌المثل‌ در نهج البلاغه بر اساس نظریه پیتر نیومارک. مطالعۀ موردی: (دشتی، شهیدی و فولادوند)
...Show More Authors

In addition to being a religious book with high human and moral themes, Nahj al-Balagha is considered a mirror of Arab culture and a literary masterpiece at the height of eloquence and eloquence, and because proverbs in the form of short, concrete and understandable phrases for everyone, experiences, thoughts and convey ideas, Imam Ali (AS) used it to facilitate the understanding of various political, social and moral concepts. In this article, we intend to criticize the way Dashti, Shahidi and Foladvand translated it by using Newmark's model due to the importance and cultural reflections of proverbs in understanding the cultural atmosphere governing Nahj al-Balagheh. In his evaluation model, Newmark divides cultural categories into five categories. While focusing on the fourth category, i.e. concepts, the current research has investigated the way of translating proverbs and comparing it with the methods provided by Newmark for the translation of cultural elements.

چکیده

نهج‌البلاغه علاوه بر اینکه کتابی دینی با مضامین والای انسانی و اخلاقی است، آیینه فرهنگ عرب و شاهکاری ادبی در اوج فصاحت و بلاغت به شمار می‌رود و از آن روی که ضرب‌المثل‌ها در قالب عبارتی کوتاه، ملموس و قابل فهم برای همگان، تجربیات، افکار و اندیشه‌ها را انتقال می‌دهند، امام علی (ع) از آن برای تسهیل درک مفاهیم مختلف سیاسی، اجتماعی و اخلاقی بهره بُرده است. در این نوشتار ما برآنیم تا به دلیل اهمیت و بازتاب‌های فرهنگی بسزای ضرب‌المثل‌ها در فهم هر چه بهتر فضای فرهنگی حاکم بر نهج البلاغه، نحوه ترجمه آن توسط دشتی، شهیدی و فولادوند را با بکارگیری الگوی نیومارک به بوته نقد بنشانیم. نیومارک در الگوی ارزیابی خود، مقولات فرهنگی را به پنج دسته‌بندی می‌کند. پژوهش کنونی ضمن تمرکز بر دسته چهارم یعنی مفاهیم به بررسی نحوه ترجمه ضرب‌المثل و تطبیق آن با روش‌های ارائه شده توسط نیومارک برای ترجمه عناصر فرهنگی پرداخته است.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Corporate Governance And Organizational Behavior Review
Impact of the electronic internal auditing based on IT governance to reduce auditing risk
...Show More Authors

This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D

... Show More
View Publication
Scopus (42)
Crossref (23)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Mystic love poems in the poetry of Atika Al-Khazraji
...Show More Authors

We deal with this essay about religious mystic poetry of Atika Al-
Khazraji. We think she imitates Rabia Al-Adawiyya. We do not deny that our
poetess lived in a conservative society although she lives in reality a liberal
life, so she tries to satisfy her society. In fact these mystic poems are pure
love. Poems in men.
This double standard behavior is quite clear in women’s poems in the
Arab world of this era.

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Assessment of water quality in the shatt Al-Hillah river
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Jan 30 2026
Journal Name
Al–bahith Al–a'alami
Preferences of the Iraqi Public towards Arab News Channels Programs and Materials (Al Jazeera, Al Arabiya, Al Ekhbariya Satellite Channels: a field Study)
...Show More Authors

Broadcasting across satellites has become an important media phenomenon and largely available for watchers. As the receiver can see the events at the very moment and at any spot in the world. This study aims to discover the degree of the extent of exposure of Iraqi people to the news broadcasting satellites in Arabic language, (Al Jazeera, Al Arabiya, Al Ekhbariya Satellite Channels) as one of the media that serves the public; and to discover the range of these Satellite Channels in covering the local Iraqi situation in different sides and aspects; and to know the significance of the Iraqi people in watching those news programmers; and state the motives behind the Iraqi public's dependence on these channels.

The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref