The present paper addresses one of the most challenging topics in translation; namely legal translation in the framework of two different approaches; the classical (formal) and the more recent (functional). The latter approach is the outcome of the process of simplifying legal language known technically as Plain Language Movement. The advent of this movement dates back to the 1950s, in response to the widely-held complain about the awkwardness of the legal register. Within this framework, the salient features of legal language, at the various linguistic and textual levels, underwent reconsideration in favor of more publicly digested expressions. The paper then subjects two translations of a lease contract to analysis in the light of the formal/functional dichotomy. These two texts are taken from textbooks widely accredited to train students legal translation at the Iraqi universities. The analysis revealed that the translators did not adhere to one specific approach; rather they moved smoothly from one approach to another. This is a promising change in attitude towards the rather flexible approach, and departing from the rather static one. The paper finally suggests some guidelines for investing this new tendency in training translators who have been complaining about the rigorous nature of legal translation.
In this paper, the dynamical behavior of a three-dimensional fractional-order prey-predator model is investigated with Holling type III functional response and constant rate harvesting. It is assumed that the middle predator species consumes only the prey species, and the top predator species consumes only the middle predator species. We also prove the boundedness, the non-negativity, the uniqueness, and the existence of the solutions of the proposed model. Then, all possible equilibria are determined, and the dynamical behaviors of the proposed model around the equilibrium points are investigated. Finally, numerical simulations results are presented to confirm the theoretical results and to give a better understanding of the dynami
... Show MoreIn this paper, the general framework for calculating the stability of equilibria, Hopf bifurcation of a delayed prey-predator system with an SI type of disease in the prey population, is investigated. The impact of the incubation period delay on disease transmission utilizing a nonlinear incidence rate was taken into account. For the purpose of explaining the predation process, a modified Holling type II functional response was used. First, the existence, uniform boundedness, and positivity of the solutions of the considered model system, along with the behavior of equilibria and the existence of Hopf bifurcation, are studied. The critical values of the delay parameter for which stability switches and the nature of the Hopf bifurcat
... Show More
ABSTRACT
A field experiment was carried out in the fields of the college of agricultural engineering sciences, university of Baghdad during the fall season of 2021, in order to find out which of the cultivated genotypes of maize are efficient under nitrogen fertilization. The experiment was applied according to a RCBD (split plot design with three replications). The genotypes of experiment (Baghdad, 5018 and Sarah) and supplying three levels of nitrogen fertilizer, which are N1 (100 kg/ha), N2 (200 kg/ha) and N3 (300 kg/ha), the results of the statistical analysis are showed the superiority of the cultivar Sarah in the trait of number of days until 50% silking, chlorophyll
... Show MoreThe present paper aims at investigating the linguistic image portrayed by UNICEF reports on the Iraqi child from a critical discourse analysis perspective during Covid19 pandemic (2020). The paper attempts to fill a gap in research literature concerning the linguistic construction of the Iraqi child by the UNICEF reports during the critical health crisis of Covid19. Van Leeuwen’s (2008) approach of social actor representation has been adopted for this purpose. From Van Leeuwen’s approach, the category of determination (single determination and overdetermination) has been selected to be the main analytical tool for its high compatibility with the set of objectives put forward to figure out how such a globally effective and
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreAn efficient modification and a novel technique combining the homotopy concept with Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced in this paper . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More