Preferred Language
Articles
/
phcPIpMBVTCNdQwClcb2
Investigating Socio-pragmatic Failure in Cross-cultural Translation: A Theoretical Perspective
...Show More Authors

Pragmatics of translation is mainly concerned with how social contexts have their own influence on both the source text (ST) initiator's linguistic choices and the translator's interpretation of the meanings intended in the target text (TT). In translation, socio-pragmatic failure(SPF), as part of cross-cultural failure, generally refers to a translator's misuse or misunderstanding of the social conditions placed on language in use. In addition, this paper aims to illustrate the importance of SPF in cross-cultural translation via identifying that such kind of failure most likely leads to cross-cultural communication breakdown. Besides, this paper attempts to answer the question of whether translators from English into Arabic or vice versa have recognized the ST intentionality and rendered it in the TT or no. Furthermore, the examples examined in this paper were selected from many published works and these examples include, among others, Qur'anic and Biblical translations, extracts from literature and newspaper headlines. The said examples are analyzed according to the functional pragmatic approach to translation where the norms of both the ST and the TT are bilaterally considered. Moreover, this paper contributes to the literature on translation by highlighting that SPF, as one of the major issues in cross-cultural translation, has not been given due attention in the studies on translation from Arabic into English or vice versa. Finally, this paper concludes that when translators have adequate linguistic competence, communicative competence and cultural knowledge, SPF can be overcome and socio-pragmatic success is possible.

View Publication
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Spectrophotometrically Analysis of PMMA as a low – Doses Dosimeter
...Show More Authors

Polymethylmethacrylate film (PMMA) of thickness 75 μm was evaluated Spectrophotometrically for using it as a low-doses gamma radiation dosimeter. The doses were examined in the range 0.1 mrad-10 krad. Within an absorption band of 200-400 nm, the irradiated films showed an increase in the absorption intensity with increasing the absorbed doses. Calibration curves for the changes in the absorption differences were obtained at 218, 301, and 343 nm. At 218 nm the response for the absorbed doses is a linear in the range 10 mrad- 10 krad. Hence it is recommended to be adopted as an environmental low doses dosimeter

View Publication Preview PDF
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
Motives of Voluntary Work Among A Sample Of Volunteers
...Show More Authors

    This study aims to focus on the Motives behind volunteer work among a sample of volunteers working in civil society organizations and check if there are statistical differences with those variables according to (gender, age,  job, period of volunteer work, and residence. The sample consists of (220 )volunteers,(189) male and(31) female from southern, northern and central governorate .The Volunteer Functions Inventory(VFI)(Clary & et al,1989)was applied, It consisting of(30) items with six fields( Values, Understanding, Social motives, Career, Protective, Enhancement).

The results show that the most common and important motivations are (Values, Understanding, and social motivations), there are differenc

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 21 2023
Journal Name
Mathematical Modelling Of Engineering Problems
Enhancing Spatial Accuracy of OpenStreetMap Data: A Geometric Approach
...Show More Authors

OpenStreetMap (OSM), recognised for its current and readily accessible spatial database, frequently serves regions lacking precise data at the necessary granularity. Global collaboration among OSM contributors presents challenges to data quality and uniformity, exacerbated by the sheer volume of input and indistinct data annotation protocols. This study presents a methodological improvement in the spatial accuracy of OSM datasets centred over Baghdad, Iraq, utilising data derived from OSM services and satellite imagery. An analytical focus was placed on two geometric correction methods: a two-dimensional polynomial affine transformation and a two-dimensional polynomial conformal transformation. The former involves twelve coefficients for ad

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Podophyllin (10%) Ointment: A New Therapeutic Modality for Psoriasis
...Show More Authors

KE Sharquie, AA Noaimi, WK Al-Janabi, Journal of Cosmetics, Dermatological Sciences and Applications, 2013

View Publication
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
A Heuristic Approach to the Consecutive Ones Submatrix Problem
...Show More Authors

Given a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Sep 15 2017
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Graph-Based Text Representation: A Survey of Current Approaches
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Fri Apr 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
GRAPH OF EQUIVALENCE CLASSES OF A COMMUTATIVE IS-ALGEBRA
...Show More Authors