Preferred Language
Articles
/
jcolang-696
Translation Techniques In Reproducing The Semantics Of Russian Political Terms: Переводческие Приемы В Воспроизведении Семантики Русскоязычных Политических Терминов
...Show More Authors

 Political terminology differs from any other type of terminology not only in the presence of political terminology, but also in content, structure, functions and the recipient who perceives it. Taking this into account, it is inappropriate to consider the semantic difficulties of translating Russian-language political terms solely at the semantic level. In our opinion, it is inextricably linked with the lexical, syntactic and grammatical levels. If we combine all 4 levels, then the following translation techniques can be distinguished: lexical borrowing (transcription / transliteration, tracing); modulation; generalization / concretization; omission / addition; descriptive translation; conversion [Komissarov 2013]. One of the most common methods to replenish the lexical composition of the language is foreign language borrowing. The process of borrowing foreign words into any recipient language is due to a complex of lingual and extra-lingual factors, the level of speech development and its structure, the completeness of the vocabulary in the recipient language [Srebryanskaya, 2020].

Аннотация

Политическая терминология отличается от любого другого вида терминологии не только наличием политических терминосистем, но и содержанием, структурой, функциями и реципиентом, который ее воспринимает. Учитывая это, нецелесообразно рассматривать семантические трудности перевода русскоязычных политических терминов исключительно на семантическом уровне. По нашему мнению, он неразрывно связан с лексическим, синтаксическим и грамматическим уровнями. Если объединить все 4 уровня, то можно выделить следующие переводческие приемы: лексическое заимствование (транскрипция / транслитерация, калькирование);модуляция;  генерализация / конкретизация; опущение / добавление;  описательный перевод;  конверсия [Комиссаров 2013]. Одним из самых распространенных способов пополнения лексического состава языка является иноязычные заимствование. Процесс заимствования иностранных слов в любой язык-реципиент обусловлен сложным комплексом лингвальных и экстралингвальных факторов, уровнем развития речи и ее структурой, полнотой словарного запаса в языке-реципиенте [Сребрянская, 2020].

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 17 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Marginal leakage of amalgam and modern composite materials related to restorative techniques in class II cavity (Comparative study)
...Show More Authors

Background: Restoration of the gingival margin of Class II cavities with composite resin continues to be problematic, especially where no enamel exists for bonding to the gingival margin. The aim of study is to evaluate the marginal leakage at enamel and cementum margin of class II MOD cavities using amalgam restoration and modern composite restorations Filtek™ P90, Filtek™ Z250 XT (Nano Hybrid Universal Restorative) and SDR bulk fill with different restoratives techniques. Materials and method: Eighty sound maxillary first premolar teeth were collected and divided into two main groups, enamel group and cementum group (40 teeth) for each group. The enamel group was prepared with standardized Class II MOD cavity with gingival margin (1 m

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Petroleum And Coal
Analyzing of Production Data Using Combination of empirical Methods and Advanced Analytical Techniques
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Aug 01 2018
Mixed Linearity Improvement Techniques for Ultra-wideband Low Noise Amplifier
...Show More Authors

<span>We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NF<sub>min.</sub>) of 3.6dB, input and output insertion losses (S<sub>11</sub> and S<sub>22</sub>)  below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Wireless Indoor Localization Systems and Techniques: Survey and Comparative Study
...Show More Authors

<p>The popularity, great influence and huge importance made wireless indoor localization has a unique touch, as well its wide successful on positioning and tracking systems for both human and assists also contributing to take the lead from outdoor systems in the scope of the recent research works. In this work, we will attempt to provide a survey of the existing indoor positioning solutions and attempt to classify different its techniques and systems. Five typical location predication approaches (triangulation, fingerprinting, proximity, vision analysis and trilateration) are considered here in order to analysis and provide the reader a review of the recent advances in wireless indoor localization techniques and systems to hav

... Show More
View Publication
Scopus (49)
Crossref (37)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Latin American Journal Of Solids And Structures
Peak Ground Acceleration Models Predictions Utilizing Two Metaheuristic Optimization Techniques
...Show More Authors

View Publication
Crossref (18)
Crossref
Publication Date
Thu Mar 13 2025
Journal Name
Academia Open
Deep Learning and Fusion Techniques for High-Precision Image Matting:
...Show More Authors

General Background: Deep image matting is a fundamental task in computer vision, enabling precise foreground extraction from complex backgrounds, with applications in augmented reality, computer graphics, and video processing. Specific Background: Despite advancements in deep learning-based methods, preserving fine details such as hair and transparency remains a challenge. Knowledge Gap: Existing approaches struggle with accuracy and efficiency, necessitating novel techniques to enhance matting precision. Aims: This study integrates deep learning with fusion techniques to improve alpha matte estimation, proposing a lightweight U-Net model incorporating color-space fusion and preprocessing. Results: Experiments using the AdobeComposition-1k

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
A review on hybrid methods using playfair and RSA techniques
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Using Artificial Intelligence and Metaverse Techniques to Reduce Earning Management
...Show More Authors

This study aims to demonstrate the role of artificial intelligence and metaverse techniques, mainly logistical Regression, in reducing earnings management in Iraqi private banks. Synthetic intelligence approaches have shown the capability to detect irregularities in financial statements and mitigate the practice of earnings management. In contrast, many privately owned banks in Iraq historically relied on manual processes involving pen and paper for recording and posting financial information in their accounting records. However, the banking sector in Iraq has undergone technological advancements, leading to the Automation of most banking operations. Conventional audit techniques have become outdated due to factors such as the accuracy of d

... Show More
View Publication
Scopus (1)
Crossref (8)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref