Preferred Language
Articles
/
jcolang-753
Evaluation of proverb translation in Nahj al-Balagheh based on the theory of Peter Newmark (Dashti, Shahidi and Foladvand): ارزیابی ترجمه ضرب‌المثل‌ در نهج البلاغه بر اساس نظریه پیتر نیومارک. مطالعۀ موردی: (دشتی، شهیدی و فولادوند)
...Show More Authors

In addition to being a religious book with high human and moral themes, Nahj al-Balagha is considered a mirror of Arab culture and a literary masterpiece at the height of eloquence and eloquence, and because proverbs in the form of short, concrete and understandable phrases for everyone, experiences, thoughts and convey ideas, Imam Ali (AS) used it to facilitate the understanding of various political, social and moral concepts. In this article, we intend to criticize the way Dashti, Shahidi and Foladvand translated it by using Newmark's model due to the importance and cultural reflections of proverbs in understanding the cultural atmosphere governing Nahj al-Balagheh. In his evaluation model, Newmark divides cultural categories into five categories. While focusing on the fourth category, i.e. concepts, the current research has investigated the way of translating proverbs and comparing it with the methods provided by Newmark for the translation of cultural elements.

چکیده

نهج‌البلاغه علاوه بر اینکه کتابی دینی با مضامین والای انسانی و اخلاقی است، آیینه فرهنگ عرب و شاهکاری ادبی در اوج فصاحت و بلاغت به شمار می‌رود و از آن روی که ضرب‌المثل‌ها در قالب عبارتی کوتاه، ملموس و قابل فهم برای همگان، تجربیات، افکار و اندیشه‌ها را انتقال می‌دهند، امام علی (ع) از آن برای تسهیل درک مفاهیم مختلف سیاسی، اجتماعی و اخلاقی بهره بُرده است. در این نوشتار ما برآنیم تا به دلیل اهمیت و بازتاب‌های فرهنگی بسزای ضرب‌المثل‌ها در فهم هر چه بهتر فضای فرهنگی حاکم بر نهج البلاغه، نحوه ترجمه آن توسط دشتی، شهیدی و فولادوند را با بکارگیری الگوی نیومارک به بوته نقد بنشانیم. نیومارک در الگوی ارزیابی خود، مقولات فرهنگی را به پنج دسته‌بندی می‌کند. پژوهش کنونی ضمن تمرکز بر دسته چهارم یعنی مفاهیم به بررسی نحوه ترجمه ضرب‌المثل و تطبیق آن با روش‌های ارائه شده توسط نیومارک برای ترجمه عناصر فرهنگی پرداخته است.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Arpn Journal Of Engineering And Applied Sciences
PSEUDO RANDOM NUMBER GENERATOR BASED ON NEURO-FUZZY MODELS
...Show More Authors

Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce

... Show More
View Publication
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus (1)
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Recent Trends In Engineering & Research
Password Authentication Based On Modify Bidirectional Associative Memory (MBAM)
...Show More Authors

Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.

Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
An Evaluation of the Activity of Prepared Zinc Nanoparticles with Extracted Alfalfa Plant in the Treatment of Heavy Metals
...Show More Authors

The alfalfa plant, after harvesting, was washed, dried, and grinded to get fine powder used in water treatment. We used the alfalfa plant with ethanol to make the alcoholic extract characterized by using (GC-Mass, FTIR, and UV) spectroscopy to determine active compounds. Alcoholic extract was used to prepare zinc nanoparticles. We characterized Zinc nanoparticles using (FTIR, UV, SEM, EDX Zeta potential, XRD, AFM). Zinc nanoparticle with Alfalfa extract and alfalfa powder were used in the treatment of water polluted with inorganic elements such as Cr, Mn, Fe, Cu, Cd, Ag by (Batch processing). The batch process with using alfalfa powder gets treated with Pb (51.45%), which is the highest percentage of treatment. Mn (13.18%), which is the

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Clinical and biochemical evaluation of facial acanthosis nigricans
...Show More Authors

KE Sharquie, AA Noaimi, HG Mahmood, SM Al-Ogaily, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 6

View Publication
Publication Date
Sat Apr 20 2019
Journal Name
Drug Invention Today
Preparation and evaluation of lornoxicam film-forming gel
...Show More Authors

Scopus (7)
Scopus
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
The mother of the believers, the mother of Salamah and her narrators of jurisprudence In attaining the goal of the rulings evidence Ibn Hajar al-Asqalani (d. 852 AH)      (prayer book)
...Show More Authors

The Muslim woman actively participated in narrating, preserving, controlling and maintaining the hadith, along with her brother, the man who later became an inexhaustible representative of the effort to preserve, control, and narrate the Sunnah. Undoubtedly, the mothers of the believers, may God be pleased with them, had a great advantage in communicating Islam and spreading the Sunnah of the Prophet Especially among women, all of them heard from him, may God’s prayers and peace be upon him, and lived with him in the details of his life on the disparity between them in memorizing and narrating and publishing them. It narrated (378) recently, and it is considered the second narrator after the mother of the believers Aisha, may God be pl

... Show More
View Publication Preview PDF