The article is devoted to the Russian-Arabic translation, a particular theory of which has not been developed in domestic translation studies to the extent that the mechanisms of translation from and into European languages are described. In this regard, as well as with the growing volumes of Russian-Arabic translation, the issues of this private theory of translation require significant additions and new approaches. The authors set the task of determining the means of translation (cognitive and mental operations and language transformations) that contribute to the achievement of the most equivalent correspondences of such typologically different languages as Russian and Arabic. The work summarizes and analyzes the accumulated exper
... Show MoreCommunities seek to achieve the economic growth through the optimal use of resources. The human resource is considered the most important of those resources where the insurance institutions take the larger role in the protection of this resource and reducing the impact caused by dangers realization that endures. The general Iraqi insurance company is considered the leading in the field of life insurance since it was founded, and until now.
This research is based on an analyzing the relation between premiums and compensations of life insurance, for individual and the group insurance, and a reality of the
... Show MoreAbstract:
The tax is one of the elements of the general revenues of the state and contributes to covering its expenses. Taxes are imposed in most countries of the world. The tax proceeds depend on a set of factors that contribute either positively or negatively to the tax share by increasing or decreasing it. Therefore, the research aims to demonstrate the role of the tax examiner's procedures in achieving the validity of the taxable base and its reflection on the tax proceeds, as well as reviewing the tax examiner's procedures related to the tax return process. Examination and tax audit of the financial statements, as well as presenting the financial statements to an independent and i
... Show MoreIs hardly day expire without hearing the news either Abuse Managementthe accounting standards or the existence of serious misstatements by someauditors.Which caused the demanding of many companies in the recent republication of the financial statements and the re-announcement of its financialresults. Such acts raise questioning about the role that should be played by theauditors, prompting agencies responsible for setting auditing standards to takeTo throw increasingly responsibility on the auditors in order to interest risksfraud The Risks of Fraud in their review of the financial statements.also The Public Company Accounting Oversight Board in the U.S.called about the need of owning the Certified Public Accountants those whoaudits for
... Show MoreThe study aims at knowing the actual uses of instructional technology in teaching history subject in the colleges of education for humanities from the college staff members' perspectives and their attitudes towards it. The sample of the study consisted of (24) instructors from the Colleges of Education for the Humanities, the College of Basic Education- Haditha and the College of Education for Women, the study used the descriptive method, and the questionnaire was consisted of (50) items, and the psychometric properties of the instrument of the study were extracted. The researchers used the appropriate statistical means to analyze the data, and the results of the study showed the following: the teaching staff attitudes towards the use of
... Show MorePositron annihilation lifetime has been utilized for the first time to investigate the free - volume hole properties in thermolumenscent dosimeter ( TLD ) as a function of gamma-dosc . The hole volume, free volume fraction determined form orthopsitronium lifetime are found to be ?lamatically increase to large values , and then to minimum values as a function ofgamma-dose . The free - volume holes size is found to be 0.163nm’ and to have maximum of 0.166nm^ at the gamma-dose of 0.1 and 0.8 Gy, respectively-
Multilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been
... Show MoreThe present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.
The present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More