The Opportunities and the Limitations of Using the Independent Post-Editor Technology in Translation Education
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 3
Abstract
A new mechanical function known as post-editing, which helps to correct the imperfections of raw machine translation output, is introduced in the translation market. While this function is commonly used as an integral part of the machine translation, it can also be used for correcting non-translated texts on its own. The main purpose of this study is to find an answer to the question of which contributions could be made to the competences of translation students by using independent post-editors during academic translation education. A model course application and survey are conducted with the participation of students from translation studies departments. The interrater reliability is used in this study. In accordance with the results, it is found that most of the students have not known the usage of the independent post-editors during the translation process. The research provides new insights into the contributions of post-editor technology to the translation education. The findings of the research also reflect the contributions of post-editor technology to the translation quality in terms of the speed-time management, the accuracy of punctuations, abbreviations, and grammar rules. It is also determined that the post-editors contribute to the competencies of the translation students. As a result, it is suggested that the post-editors may be used as an educational material in translation education. Indeed, the results require other studies about the usage of post-editors as educational materials.
Authors and Affiliations
Burcu TÜRKMEN, Muhammed Zahit CAN
Android Platform Malware Analysis
Mobile devices have evolved from simple devices, which are used for a phone call and SMS messages to smartphone devices that can run third party applications. Nowadays, malicious software, which is also known as malware,...
Fuzzy Delphi Method for Evaluating HyTEE Model (Hybrid Software Change Management Tool with Test Effort Estimation)
When changes are made to a software system during development and maintenance, they need to be tested again i.e. regression test to ensure that changes behave as intended and have not impacted the software quality. This...
A Multi-Level Process Mining Framework for Correlating and Clustering of Biomedical Activities using Event Logs
Cost, time and resources are major factors affecting the quality of hospitals business processes. Bio-medical processes are twisted, unstructured and based on time series making it difficult to do proper process modeling...
A novel approach for pre-processing of face detection system based on HSV color space and IWPT
Face detection system is challenging area of research in the field of security surveillance. Preprocessing of facial image data is very important part of face detection system. Now days various method of facial image dat...
An Analysis of Security Challenges in Cloud Computing
Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-you-go services to users. Cloud has boomed high in business...