Abstract The study aimed at reviewing translation theories proposed to address problems in translation studies. To the end, translation theories and their applications were reviewed in different studies with a focus on issues such as critical discourse analysis, cultural specific items and collocation translation.
Arab translators have always paid great attention to the translation of the Persian literary genres, in particular, contemporary Iranian novels. They have always translated for the most prominent Iranian novelists such as Jalal Al Ahmad, Sadiq Hidayat, Mahmoud Dowlatabadi, Bozorg Alavi, Ismail Fasih, Houshang Golshiri, Gholam-Hossein Saedi, Simin Daneshvar, Sadiq Chubak, Samad Behrangi and others that have succeeded in perfectly picturing the Iranian society.
Within the perspectives of Arab translators and by using the descriptive - analytical approach, the present study provides an analytical study of the translation into Arabic some of the modern Persian novels. Moreove
... Show MoreAbstract
Shorten the research problem that there is no system or model to evaluate the financial performance of the departments of municipalities where it is not possible for a person or institution both to know or to know their success in terms of the financial work of failure and where it is now than those without assessing the financial performed, authorized to be and necessities FATF is the financial performance assessment, which is the work unfinished aspects without Hence the work came in this study to study and diagnose and analyze financial data in a sample of municipal departments in order to develop a model to assess the financ
Maintaining the quality of apricot fruits during storage is not an easy task due to the changes in their physical and chemical properties, so it is necessary to use less expensive, easy to apply, environmentally friendly, and safer preservatives to maintain the nutritional value of apricot. The damage to some fruits during storage can be a source of infection, which leads to the damage of healthy fruits more quickly, which requires building an intelligent model to detect damaged fruits. The aim of the research is to study the effect of immersing apricots in lemon juice once and sugar-water solution again on the quality properties of apricots, including sweetness, color, hardness, and water content. On the other hand, the YOLOv7 algorithm wa
... Show MoreBackground: Oral pyogenic granuloma (PG) is a clinicopathological entity that could develop due to the reaction to a variety of stimuli, such as low-grade local irritation, traumatic damage, and hormonal stimulation. There are two histopathological types of pyogenic granuloma; lobular type -capillary hemangioma (LCH) and non-lobular type; with PG,LCH has highly vascular, diffuse capillary growth while non- lobular variant mimicking granulation tissue with heavily inflammated stroma. The study aims were to review the clinical and histopathological spectrum of an oral pyogenic granuloma from different intraoral sites in order to avoid diagnostic pitfalls associated with similar morphological lesions and to determine
... Show MoreThe importance of the study stems from the fact that Iraq’s economy is facing a housing crisis, especially in the Iraqi capital, Baghdad, great demographic pressure due to pronounced population growth over the past two decades. The Central Bank of Iraq undertakes several initiatives represented in granting real estate loans, mainly through the Real Estate Bank at very low interest, and in the last two years, the interest has become zero. The purpose of the study is to analyze the fiscal implications of the Iraqi central bank’s real estate initiatives, as well as its real impact on the spatial dimension of the Iraqi governorates through new housing in those governorates. Using data mainly from the Central Bank of Iraq’s bulleti
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show More