The present paper addresses one of the most challenging topics in translation; namely legal translation in the framework of two different approaches; the classical (formal) and the more recent (functional). The latter approach is the outcome of the process of simplifying legal language known technically as Plain Language Movement. The advent of this movement dates back to the 1950s, in response to the widely-held complain about the awkwardness of the legal register. Within this framework, the salient features of legal language, at the various linguistic and textual levels, underwent reconsideration in favor of more publicly digested expressions. The paper then subjects two translations of a lease contract to analysis in the light of the formal/functional dichotomy. These two texts are taken from textbooks widely accredited to train students legal translation at the Iraqi universities. The analysis revealed that the translators did not adhere to one specific approach; rather they moved smoothly from one approach to another. This is a promising change in attitude towards the rather flexible approach, and departing from the rather static one. The paper finally suggests some guidelines for investing this new tendency in training translators who have been complaining about the rigorous nature of legal translation.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreOrthodontic wires facilitate the required dental adjustments in the context of orthodontic therapy. The archwire has played a crucial role in orthodontic treatment, and the increasing emphasis on aesthetic preferences from patients, as well as the development of composite and ceramic brackets, have prompted investigations into aesthetic archwires that complement these brackets. Orthodontic wires are produced using a diverse range of materials. The utilisation of all available wire types can improve patient comfort, decrease chairside time, and shorten the overall duration of treatment. The individual clinician must possess comprehensive knowledge and comprehension of the various requirements and alternatives throughout the therapeut
... Show MoreSystemic lupus erythematosus (SLE) is an autoimmune disease with polymorphic expression. B cells have an essential contribution in immune system activation via the production of different cytokines and functioning as potent antigen-presenting cells. Therefore, a drug that particularly targets B cells may represent an ideal therapeutic approach for SLE. Rituximab (RTX), an anti-CD20 monoclonal antibody causing transient B-cell depletion, has been used to manage SLE. This study aims to assess Rituximab effects on lupus nephritis (LN) patients when added to conventional immunosuppressants. Twenty four patients, 15-32 years old, with class III/IV/V LN were involved in this study. All were on steroids before lupus nephritis occurrence. They were
... Show MoreA bolted–welded hybrid demountable shear connector for use in deconstructable steel–concrete composite buildings and bridges was proposed. The hybrid connector consisted of a partially threaded stud, which was welded on the flange of a steel section, and a machined steel tube with compatible geometry, which was bolted on the stud. Four standard pushout tests according to Eurocode 4 were carried out to assess the shear performance of the hybrid connector. The experimental results show that the initial stiffness, shear resistance, and slip capacity of the proposed connector were higher than those of traditional welded studs. The hybrid connector was a ductile connector, according to Eurocode 4, with slip capacity higher than 6 mm. A nonli
... Show MoreThe significant addition of immersive technologies, Virtual Reality (VR), Augmented Reality(AR) and Mixed Reality(MR) are transforming the domain of design education. Still, finding an equilibrium between these new tools alongside with traditional methods of teaching is a menace which educational institutes needs to solve. This paper proposes a structure that would help the ease with which to include immersive technologies within design education, keeping in mind the solid points of more conventional pedagogical methods. Based on a survey of interior design programs, this research highlights the potential for VR, AR and MR in student engagement, creativity skills and professional practices. The results suggest that adoption of an im
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MorePreserving the Past and Building the Future: A Sustainable Urban Plan for Mosul, Iraq