Preferred Language
Articles
/
jcolang-710
Semantic relations in text and translation: Die semantischen Relationen im Text und Übersetzung
...Show More Authors

       Based on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation.  Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.

        It is known that language learners face multiple difficulties in writing and creating an integrated, coherent and intelligible text, and the reason for this is their lack of knowledge of semantic relations.

Deutsch

In dieser Forschungsarbeit gehen die folgenden theoretischen Ausführungen im Zusammenhang mit bestimmten didaktischen Bemerkungen, die im Laufe des Lehrprozesses aufgetreten sind, der Frage der semantischen Relationen in Satzperspektiven nach. Berücksichtigt wurde dabei überdies das Lehrprogramm in der irakischen Germanistikabteilung. Daher besteht das Hauptpostulat dieser wissenschaftlichen Abhandlung in dem Versuch, dieses sprachliche Phänomen im Übersetzen und dessen vielseitige Varianten darzulegen sowie dessen Anwendbarkeit in den Verhandlungen, im praktischen Leben und im Umgang mit den ausländischen Firmen etc. zu klären.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 30 2002
Journal Name
رسالة ماجستير
THE JAPANESE – CHINESE RELATIONS Study of the Real and Future of the Japanese - Chinese Relations since 1949 - 2001
...Show More Authors

With the twenty - First century, It becomes clear to us that for 110 years the Japanese - Chinese relations have been witnessing big radical events and developments. ( we take the year of 1949 as the starting date for this relations). In order to prove hypothesis the study divided in to four chapters. - The first chapter deals with explaining the factors of the subject of the Japanese - Chinese relations which described as Indirect threat and aggressive relations from Japan to China after the Second World War by Japanese entering in the American world strategy, in order to destroy the communist china's system which decleard in 1949, because the united states understood that the new system in Beijing could threat American's Interest

... Show More
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Unipolarity and Its Influences in American Foreign Policy and the Future International Relations: Unipolarity and Its Influences in American Foreign Policy and the Future International Relations
...Show More Authors

Abstract
The concept of unipolar has allowed the united states of America to
control the rest of the internations community units through the rxclusively of
control in international affairs without enabling other countries who have the
ability to compete with it to appear this comes as a result of it's position to all
kinds of powers like military, economic and technical powers that enable it to
continue dominating other countries, this superior control enabled it to be the
(hyper power) on the international political scene so that it allowed it to
exercise and implement the policy of domination against all this appeared
after its empire superiority became clear, in a unique way that have never
been known in

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Contemporary experimental currents and its impact on the structure of the contemporary Iraqi theatrical text "The epic theater as a model": هيثم حمزة سلمان الحمداني
...Show More Authors

  In this research study, I tried to trace the epic effect to learn how it was understood and how it was used. Following the descriptive and analytical approach in the research, the first chapter dealt with a presentation of the methodological framework of the problem, the goal, the limits of the research, the importance and the need for it and the definition of terms, as well as the theoretical framework which consisted of two topics, including the impact of the epic theater on the world theater and the second the effect of the epic theater on the Arab theater, This came by tracing the epic impact on the world stage of the Greeks, the Middle Ages, the Renaissance, and the Arab theater of the twentieth century.
As for the second

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Semantic Relation among the Expressions Of the Phonetic in the Holy Qura: The Semantic Relation among the Expressions Of the Phonetic in the Holy Qura
...Show More Authors

Abstract
The phonetic replacement is the process of putting a sound or a linguistic
syllable instead of another in one word that results in changing its meaning . It is one
way of vocabulary varionsness and discrimination because replacement among the
sounds of one expression and changing its image lead to change its meaning , and
accordingly , each replaced sound has its own linguistic value that distinguishes it . In
other words , the phonetic replacement is based on system of phonemic change
which is a general phenomenon in all languages . The linguistic system doesn’t stand
straight for word unless it is based on different standards that work on variousness ,
assortment and relating the phonetic change wi

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 10 2026
Journal Name
Journal Of The Iraqi University
Ottoman-Japanese Relations (1876-1924)
...Show More Authors

The research discusses the relations between Turkey and Japan, which began between the Ottoman Empire and the Meiji Empire in Japan since the arrival of Sultan Abdul Hamid II to power in 1976 and his interest in Japan as the first Asian country to achieve modernization. Both faced one problem during the late nineteenth century, which is the ambitions of Tsarist Russia and the suffering of the parties suffered unequal treaties. Relations between them have begun to develop slowly and gradually, especially after Japan received a large Ottoman delegation on board the Ertugrul frigate in 1890, through the First World War and the Treaty of Sevres, the arrival of Mustafa Kemal Ataturk to power and the establishment of the modern Republic of Turkey

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Turkish relations – Israel (1990-1998)
...Show More Authors

The Turkish relations - Israel took its course clearly about the nature and the fact that
these relationships, and their causes and motives of its establishment, its objectives and the
dimensions of the various political, security, military and economic. Orbiter and the relations
of the Turkish-Israeli It is inclusive of all the reasons for the establishment of relations, they
include the interpretation of an interest in international relations, which is why the
establishment of relations between the two countries and on the concept of interdependence
where that both Turkey and Israel depends on the other in several aspects of the most
important military, security, economic, and to understand Turkey's new identity, m

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref