An advertisement is a form of communication intended to promote the sale of a product or service, influence public opinion, gain political support, or to elicit some other response. It consists of various type, including style, target audience, geographic scope, medium, or purpose. An advertisement should catch a person's attention and quickly create a memorable impression. The main aim of the present paper is to investigate the phonological problems of translating English international TV advertisements into Arabic. It deals with the most common and popular TV advertisements. The importance of such advertisements lies not in its information content rather than in the achievement of the desired impact on the receivers. When translating such ads, certain linguistic elements (especially the phonological aspects like rhyme, rhythm, alliteration, etc.) are necessary to duplicate the impact an ad has on the domestic market in the foreign exchange. To conclude, translating international TV advertisements is a challenge since they cannot be translated 100% successfully without a loss in meaning or form. Since both English and Arabic belong to different language systems, it is difficult to maintain both form and sense which should have priority as it provides the message of the source language (SL) text and the translator should attempt to render form (particularly such sound devices as rhyme, rhythm, alliteration) as far as possible and be faithful to the SL message.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThe present paper focuses on the nature of the different interactions between cometary nucleus and tail with solar wind. The dynamics of the comet will impose many features that provide unique behavior of the comet when entering the solar system. These features are reviewed in this paper and few investigations are made. The calculations made in this work represent the analysis and interpretation of the different features of the comet, such as perihelion and eccentricity dependence on the gas production rate, and the dependence of the latter on the composition of the comet nucleus. The dependences of the heliocentric, bow shock, contact surface, and stand-off distances with gas production rate for many types of comets that cover linear and n
... Show MoreIn this paper, various aspects of smart grids are described. These aspects include the components of smart grids, the detailed functions of the smart energy meters within the smart grids and their effects on increasing the awareness, the advantages and disadvantages of smart grids, and the requirements of utilizing smart grids. To put some light on the difference between smart grids and traditional utility grids, some aspects of the traditional utility grids are covered in this paper as well.
This study aims to reach the right of governorates that are not organized in a region to impose local legislation, including tax legislation, and the extent of the constitutionality of this legislation and its consistency with constitutional texts and legal rules. The imposition of local taxes finds its constitutional and legal basis in the Iraqi constitution for the year 2005 and the law of governorates not organized in a region.The imposition of local taxes corresponds to the principle of tax legality, which is reflected in the necessity of issuing tax laws from a competent authority, whether this authority is federal, regional or local. Rather, it is sufficient that it be competent
Transport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
This study presents a comprehensive list of the freshwater and marine bivalves distributed in Iraq. A total of 51 species were recorded, and distributed as: 14 freshwater species, and 37 marine species, these species belonging to 25 families, all available remarks on the distribution, taxonomy, and nomenclature of these species were given. This study included the recently collected specimens along with those previously studied and recorded in Iraq.
I attended some amides non grassy substitutes such as acrylic compounds Amaid Electron Amaid and Alsinamamaid interaction unsaturated acids such as acrylic acid or Ketronk ????????? with primary amines Malkhtlfah of acrylic monomers Alamayd