The present paper addresses one of the most challenging topics in translation; namely legal translation in the framework of two different approaches; the classical (formal) and the more recent (functional). The latter approach is the outcome of the process of simplifying legal language known technically as Plain Language Movement. The advent of this movement dates back to the 1950s, in response to the widely-held complain about the awkwardness of the legal register. Within this framework, the salient features of legal language, at the various linguistic and textual levels, underwent reconsideration in favor of more publicly digested expressions. The paper then subjects two translations of a lease contract to analysis in the light of the formal/functional dichotomy. These two texts are taken from textbooks widely accredited to train students legal translation at the Iraqi universities. The analysis revealed that the translators did not adhere to one specific approach; rather they moved smoothly from one approach to another. This is a promising change in attitude towards the rather flexible approach, and departing from the rather static one. The paper finally suggests some guidelines for investing this new tendency in training translators who have been complaining about the rigorous nature of legal translation.
This research deals with shedding light on the issue of the poor understanding of students of Islamic sciences colleges for the subject of modern sciences; their causes and treatment, and it started with an introduction and an introductory research; The general weakness of the level of students of colleges of Islamic sciences in this article, and I detailed these reasons that relate to: the curriculum, the teaching staff, and students, and then concluded it with proposals and recommendations that would address this weakness.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreSkin drug administration is the method used to provide drugs for local or systemic therapy, which is recognized for clinical usage. It is the third-largest method of medication delivery, after only intravenous administration and oral administration. Using a transdermal delivery method makes the administration easy, and blood concentration and adverse effects can be reduced. A microneedle is a micron-sized needle with a short height of no more than 500 micrometers and a width of no more than 50 micrometers. The needle comes into contact with the epidermal layer of the skin before it gets to the dermal layer, where there is no discomfort. Several materials, such as metals, inorganic, and polymer materials, are used to create microneed
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreThis paper tries to understand the poetic reference in the images of woman, she-camel, horse and their manifestations in Tarafah-ibnulAbd's poetry. There has got my attention the fact that these three images have their own distinct taste which is characterised by a clear rhythm, let alone the lively nature that is filled with liveliness and activity to be in harmony with the poet's youth. For these three images represented the best manifestations of his psychological and artistic poetics. The paper adopts an artistic analysis to arrive at the psychological aspects of these experiences-the woman, the she-camel, and the horse- and to understand the functions of their images and symbolic reference.