The present study examines the main points of differences in the subject of greetings between the English language and the Arabic language. From the review of the related literature on greetings in both languages, it is found that Arabic greeting formulas are more elaborate than the English greetings, because of the differences in the social customs and the Arabic traditions and the Arabic culture. It is also found that Arabic greetings carry a religious meaning basing on the Islamic principle of “the same or more so”, which might lead to untranslatable loopholes when rendered in English.
Translation is a vital process that needs much more understanding and mutual background knowledge on the part of ESL or EFL learners in terms of grammar , meaning and context of both the SL and TL . Thus , the main aim of the current research paper is to identify and figure out the techniques used by ESL or EFL learners when translating English barnyard verbs into Arabic . The main problem of this study is attributed to the fact that ESL or EFL learners may not be able to identify and understand the connotative meaning of barnyard verbs since these verbs are onomatopoeic (i.e,) a word that phonetically imitates, or suggests the source of sound that it describes. Therefore they may be unable to translate these verbs appropriately and accura
... Show MoreThe current study is concerned with investigating the difficulties that Iraqi EFL learners of English may face when translating English collective nouns. Such collective nouns as committee, government, , jury , Parliament , etc. are considered singular when the concept of the unity as a group is emphasized , but when the concept of the individuals or numbers is emphasized they are treated as plural. A sample of twenty undergraduate students have been selected randomly to translate certain English collective nouns in some selected political texts in order to find out the difficulties they might face in rendering them into Arabic. It is hypothesized that most of the testees have used the singular form rather than the plural ignoring the
... Show MoreEnglish teachers in Iraq and other countries around the world up to this time use traditional methods to help students memorize new vocabularies. The sense of words or structure is not to be given in either the native tongue or the target language by definition, but is induced by the way the form is used in the situation. Situational Language Teaching (SLT) has recently become the needed method for improving speaking skills. It indicates the application of learning the language in actual and social exchange expressions so as to let learners do as required in classroom and non-classroom circumstances. This pilot study seeks to answer the following questions: Can SLT improve English speaking skills of target learners? How SLT contribute to th
... Show MoreFallacies are incorrect reasoning that make an argument seem less logically credible and easier to be identified as unsound. They are widespread; individuals commit them while engaging in various activities, including at work, at home, while creating advertisements, and in the media. This study aims to investigate the rhetorical strategies accompanied with producing the fallacious arguments selected from the American Film “12 Angry Men (1957)”. The study adopts Damer’s (2009) model for the identification of fallacy. As for rhetorical analysis, the study adopts Aristotle’s triangle of rhetoric and McGuigan’s (2007) taxonomy of rhetorical devices. The results uncover that the most violated criteria are relevance, acceptabili
... Show MoreIn this paper, the complexes of Shiff base of Methyl -6-[2-(diphenylmethylene)amino)-2-(4-hydroxyphenyl)acetamido]-2,2-dimethyl-5-oxo-1-thia-4-azabicyclo[3.2.0]heptane-3-carboxylate (L) with Cobalt(II), Nickel(II), Cupper(II) and Zinc(II) have been prepared. The compounds have been characterized by different means such as FT-IR, UV-Vis, magnetic moment, elemental microanalyses (C.H.N), atomic absorption, and molar conductance. It is obvious when looking at the spectral study that the overall complexes obtained as monomeric structure as well as the metals center moieties are two-coordinated with octahedral geometry excepting Co complexes that existed as a tetrahedral geometry. Hyper Chem-8.0.7
... Show MoreThe aim of the research is to identify the cognitive method (rigidity flexibility) of third-stage students in the collage of Physical Education and Sports Sciences at The University of Baghdad, as well as to recognize the impact of using the McCarthy model in learning some of skills in gymnastics, as well as to identify the best groups in learning skills, the experimental curriculum was used to design equal groups with pre test and post test and the research community was identified by third-stage students in academic year (2020-2021), the subject was randomly selected two divisions after which the measure of cognitive method was distributed to the sample, so the subject (32) students were distributed in four groups, and which the pre te
... Show MoreThe Sound of the letter (ق) in the Contemporary Arabic Dialects
The aim of this message to monitor this phenomenon throught the Quran , which is the constitution of the Islamic nation and Hariatha as well as to express kasalah integrity , justice honesty , patience , abd pacr .
We feel this vocabulary to hight athical values advocated by the Quran and the need to build commitment to the orthodox society free of corruption that leads ta a disorder of the human society .
The outcome of the study the researcher found that faith to a number of results was most notably the advent of righteusness in the Holy Quran meaning of comprehensive RPR spacious field and breadth Maadenh .
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More