Preferred Language
Articles
/
jih-470
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Proposal of Using Principle of Maximizing Entropy of Generalized Gamma Distribution to Estimate the Survival probabilities of the Population in Iraq
...Show More Authors

In this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Cen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 21 2019
Journal Name
Journal Of The College Of Education For Women
Translation of Polysemous Words in Harry Potter
...Show More Authors

The paper pays attention to the polysemous words Harry Potter (HP). In this story, the present study exams some picking polysemic words to the extent that the translators of HP prevail to render the proposed significance as per the setting of the first content. Obviously, the picking translators in this examination were not mindful of the wonder of polysemy in the HP. They embrace a strict interpretation methodology to pass on the greater part of the polysemic sense. The method of data collection is divided into two stages. Firstly, determining the situational context of the fantasy and identifying the polysemic sense to clearly make all the contextual meanings of the source text. Secondly, reviewing the selected translation to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 08 2024
Journal Name
Babylon: Abjad Publising House
“Translation is the Art of Negotiating with Words”, in Hassad aS-Sineen(Harvest of Years): Essays in Teaching Translation
...Show More Authors

Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Research In Applied Linguistics
Flouting of Cooperative Principle in Jane Austen's Pride and Prejudice
...Show More Authors

DBN Rashid, Astra Salvensis, 2018 - Cited by 1

View Publication
Publication Date
Thu Oct 18 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
Breaching the Cooperative Principle Theory in English and Russian One Act Plays
...Show More Authors

PDBNRSIA Asst, International Journal of Research in Social Sciences and Humanities, 2018

View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Strategies of Understanding Written Texts in EFL Classrooms
...Show More Authors

Reading strategies are of interest for what they reveal about the ways readers manage their interaction with written texts and how these strategies are related to text understanding, acquisition ,storage ,and retrieval of information .In EFL comprehension lessons, the students try to work out interpretations of the meaning related to the written word through the usage of different comprehension strategies. Yet, there are moments where the participants in the classroom fail to reach a successful understanding of the passage read despite the guidance of the teacher. The present research aims at investigating and identifying moments of comprehension failure and reasons behind them .It also aims at specifying the different strategies used in

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
مجلة الاداب
Unpublished Economic Texts From the old Babylonian period
...Show More Authors

The cuneiform texts considered one of the most important resources which play an important role , wich help us to know how was the economic , politic and religious conditions , and everything related of the history of Mesopotamia , which contain many of information that enrich our knowldgement about Mesopotamia civilization , since using writing as away to documentation the science and human knowldgement . In this research we studied four cuneiform texts, which confiscated and keeped in the Iraq museum , all of these are economic texts , the content of three of them are loans, are take the numbers (IM.206972- IM.163718-IM.163808-), the fourth text is the text of income which take the number (IM.163182). therefore , We will talk about what l

... Show More
Publication Date
Sun Dec 30 2018
Journal Name
دراسات في التاريخ والاثار
unpublished cuneiform texts from the Iraqi Museum (confiscation)
...Show More Authors

The research included studying a group of eight cuneiform texts dating back to the Old Babylonian era, specifically to the reign of King Larsa Rim-Sin, which were identified through studying the historical versions of these texts. These texts are confiscated, i.e. texts of unknown location, because they did not come through excavations, but rather came to the Iraqi Museum either by people who obtained them through digging, or stolen and smuggled texts that are retrieved by the General Authority for Antiquities; as is the case with our texts that were found smuggled to Jordan and were retrieved by the General Authority for Antiquities.

Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
Criterion of Scientific Translation: Criterios de la traducción
...Show More Authors

This research focuses on shedding light on the most important criteria by which the translator can achieve total success with regard to the translation of scientific texts whose written language in Spanish is greatly influenced by expressions and words adopted from the English language and other world languages, in addition to exposing the most outstanding difficulties that translators face when translating from Spanish to Arabic, giving the most appropriate solutions in this regard.

Resumen

El presente trabajo de investigación se centra en echar luz sobre los criterios más importantes por los cuales el traductor puede conseguir el total éxito en la traducción de los textos científicos cuyo lenguaje

... Show More
View Publication Preview PDF
Crossref