Abstract. In this scientific work, we investigate the problem of the practical necessity of achieving the adequacy of translation activities with active translation from Russian into Arabic in various fields of translation. Based on the material of the latest suffix vocabulary, a serious attempt is made to clarify and specify the rules for the development of translator's intuition when translating from Russian into Arabic and vice versa. Based on the material collected by the latest suffix vocabulary, we try to make an attempt to reveal the role of suffix word creation in highlighting the general rules for achieving translation equivalence. The paper examines the process of creating words in multi-family languages, the difference between the suffix of the Russian language in terms of the way words are formed and the concept from what is available in the Arabic language. The ability of each of these two languages to inflectional dissection of words is analyzed very deeply, as a result of which the adequacy of translation is realized .
A simple chemistry method approach was used to synthesise new ligand derivate from L-ascorbic acid and its complexes. All of them were water-soluble and are used quite extensively in the medical and pharmaceutical fields. This study synthesised the new ligand derivative from L-ascorbic acid-base using the following steps: A 5,6-O-isopropylidene-L-ascorbic acid was prepared by reacting dry acetone with L-ascorbic acid followed by reacting it with trichloroacetic acid to yield [chloro(carboxylic)methylidene]-5,6-O-isopropylidene-L-ascorbic acid in the second stage. In the third stage, the derivative was reacted with (methyl(6-methyl-2-pyridylmethyl)amine to create a new ligand (ONMILA). This novel ligand was identified using a number
... Show MoreAbstract
The study aimed to identify the expansion in granting credit to Iraqi banking institutions and its impact on the financial position of Iraqi banks in terms of revenues, profits, expenses and property rights in banks, as the expansion in granting bank credit will correspond to an increase or decrease in some items of the balance sheet and the financial position of banks, so the problem of the current study It will be determined through whether the expansion of granting bank credit will affect the financial position of Iraqi banks or not by studying the selected research community of the 10 Iraqi banks listed in the Iraq Stock Exchange, The research sample included the u
... Show MoreThe research study and analysis of the integration of marketing communications and their impact on the marketing performance of a number of telecom companies, as included in the research problem to know the role of marketing communications community in achieving sales and market share, profitability and customer satisfaction. The importance of research begins to be the right choice for the elements of marketing communications, lead to savings in time, effort and money and create a more idea about the effectiveness of the application of the concept of integration. The research to determine the role of marketing communications in promoting the integration of the marketing performance of companies in the field of sales and marke
... Show MoreThis day, we see the Significant role that social media platforms play, it plays a vital role in shaping the Social, political, and economic awareness of individuals. The Iraqi Society, which is experiencing rapid cultural and social transformations, is considered a fertile ground for social media and its influences, whether negative or positive. Research and studies indicate that the negative use of social media will lead to weaking of the sense of belonging and citizenship among members of Iraqi society. This, in turn, threatens moral and educational values, increases feelings of family estrangement, and leads to social isolation. On the contrary, if social is used correctly, it can significantly contribute to enhancing educational values
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis work, in fact, is an English language teaching study (henceforth, ELT) which may provide the inspiration for much –needed research on issues such as testing students' level of achievement in articulatory phonetics at the university level. It attempts to answer two questions: 1)What is college students' level of achievement in articulatory phonetics? 2- Are there any statistical significant differences in the achievement of college students in articulatory phonetics between the production and recognition testing techniques? This research falls into three sections: Section one indicates the problem, the aims, the hypotheses, the procedures, the limits and the value of the study. Section two provides a general overview of the articul
... Show MorePurpose: To validate a UV-visible spectrophotometric technique for evaluating niclosamide (NIC) concentration in different media across various values of pH. Methods: NIC was investigated using a UV-visible spectrophotometer in acidic buffer solution (ABS) of pH 1.2, deionized water (DW), and phosphate buffer solution (PBS), pH 7.4. The characterization of NIC was done with differential scanning calorimeter (DSC), powder X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The UV analysis was validated for accuracy, precision, linearity, and robustness. Results: The DSC spectra showed a single endothermic peak at 228.43 °C (corresponding to the melting point of NIC), while XRD and FTIR analysis confirmed the identit
... Show More