This paper examines some syntactic features of English legal texts, and the changes that may be reflected on these features when they are translated into Arabic. For example, passivization, nominalization, complex sentences and modality. The researcher tries to demonstrate why it is difficult to suggest a specific translation of each syntactic feature, especially the modal verbs. The researcher also attempts to provide translations for some legal sentences written in some charters and international organizations. The descriptive methodology is used to identify the characteristics of these syntactic features in order to provide a proper translation of each legal sentence. It has been concluded that the translator has to be aware of the precise meaning of the legislator before deciding the translation, and that the meaning of any specific modal verb is translated differently from English into Arabic according to the linguistic system and organizations in which it is used.
A real method of predication brake pad wear ,could lead to substantiol economies of time and money. This paper describes how such a procedure has been used and gives the results to establish is reliability by comparing the predicted wear with that which actually occurs in an existing service. The experimental work was carried out on three different commercial samples ,tested under different operation conditions (speed,load,time...etc)using a test ring especially modified for this purpose. Abrasive wear is mainly studied , since it is the type of wear that takes place in such arrangements. Samples wear tested in presences of sand or mud between the mating surfaces under different operational conditions of speed, load and braking time .Mec
... Show MoreReading strategies are of interest for what they reveal about the ways readers manage their interaction with written texts and how these strategies are related to text understanding, acquisition ,storage ,and retrieval of information .In EFL comprehension lessons, the students try to work out interpretations of the meaning related to the written word through the usage of different comprehension strategies. Yet, there are moments where the participants in the classroom fail to reach a successful understanding of the passage read despite the guidance of the teacher. The present research aims at investigating and identifying moments of comprehension failure and reasons behind them .It also aims at specifying the different strategies used in
... Show MoreThe significance of the research lies in the fact that electronic technologies represent an important step in evaluating legal situations, and the research problem centered on the lack of attention to visual requirements and the absence of a clear image of legal situations that may be difficult for the referee to apply correctly in addition to the lack of focus on visual requirements and the unclear depiction of some legal cases which make it difficult for the referee to interpret them correctly This is because the referee's main tool is visual perception, which interprets live situations such as violations, fouls, and other cases that arise during a game Moreover, there are numerous responses and challenges in evaluating legal situ
... Show MoreThis study aims to discuss how English Language Textbook (ELT), used in Iraqi schools, can be developed. All Iraqi teachers in Iraq spend much time using ELT textbooks in classrooms, and most of the Iraqi students depend on these textbooks to learn and improve the English language, so choosing an appropriate ELT textbook is so essential. A suitable book must include critical components that fit teachers' and students' needs. The quality of ELT textbooks has been improved dramatically in recent years, even though these textbooks still do not meet students' needs, especially in language communication skills. This study seeks to investigate the most critical components that may make the ELT textbooks are more influential and interactive for Ir
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreDBN Rashid, International Journal of Development in Social Sciences and Humanities, 2020
The federal state is usually based on a number of regions because it is based on the multiplicity of political entities. The federal experiments were based on the existence of two or more regions and each federal system has its own peculiarities. Administrative authority between the federal government and local elected bodies of local people of absolute relative independence does not threaten the entity of the state according to the Constitution and the law and on a regional or reformer basis and exercise its powers within the legal scope prescribed The relationship between the federal authority and the Kurdistan region is the first level of the relationship on the real level, especially since no other region in Iraq has been formed exce
... Show MorePiracy on phonograms is now, rightly, the crime of the electronic age. Despite the protection sought by States to provide for such registrations, whether at the level of national legislation or international agreements and conventions, but piracy has been and continues to pose a significant threat to the rights of the producers of those recordings, especially as it is a profitable way for hackers to get a lot of money in a way Illegal, which is contrary to the rules of legitimate competition. Hence, this research highlights the legal protection of producers of phonograms in light of the Iraqi Copyright Protection Act No. (3) of 1971, as amended.