special part
Recently Published Documents


TOTAL DOCUMENTS

339
(FIVE YEARS 189)

H-INDEX

5
(FIVE YEARS 2)

2022 ◽  
Vol 8 (1) ◽  
pp. 338-344
Author(s):  
D. Akmatova

The history of the origin of imitative has ancient roots. People have been interested in imitations since ancient times. Not only linguists, but also even philosophers, psychologists, to one degree or another at different times, have addressed the problem of sound visualization. Imitative vocabulary helps to increase the imagery and emotional expressiveness of the word. However, due to its complex nature, for some time, linguists of various languages did not conduct serious research on the linguistic functions of imitative words. However, they are often found in oral folk art and fiction, giving these texts artistic and poetic meaning, expressiveness, imagery, artistic power and accessibility, liveliness and dynamism, all this has led, now, to the fact that linguists began to pay close attention the study of this unusual group of words. Тhey are divided into types, separated into a special part of speech, they are used in the formation of new words, they act as members of a sentence.


2022 ◽  
Vol 5 (4) ◽  
pp. 109-119
Author(s):  
M. Karfíkova ◽  
E. V. Chernikova

The methodology. Comparative legal, historical and analytical scientific methods were used. The main results, scope of application. Formation of financial-legal theory in both countries took place under the circumstances of political changes. In relation to the Czechoslovak Republic, the attention is focused on the period from the formation of the Czechoslovak Republic in 1918 to the formation of the Czech Republic in 1993, and the main emphasis is made on the period of the 21st century. Periodization of financial law and financial science, and also the system of financial law considers the teaching of financial law and financial science at the Faculty of Law, Charles University. The study also characterizes the process of development of financial law and financial science in pre-revolutionary Russia, highlights the Soviet period of development of financial law, focuses on the problems of development of modern financial law. Periodization of financial law, as well as the system of financial law, are presented from the perspective of teaching of the subject of financial law at the faculties of law. The authors suppose that the modern system of financial law and financial science has retained the original division into two parts, general and specific. All sub-branches of the special part of financial law may be divided into three main blocks: (1) sub-branches of the fiscal part of financial law; (2) sub-branches of the non-fiscal part of financial law; common sub-branches of the non-fiscal part of financial law.Conclusions. The hypothesis about the unity of the principles of financial law and financial science, and public finance as the main category, as well as about the independence of this branch of public law was confirmed during the study. Due to the growing volume of legal regulation in both countries, the historical division of the financial law system is not enough, there is an extensive fragmentation of division in the financial law system. We are observing the emergence of new sub-branches, which are likely to tend to the formation of new branches.


2021 ◽  
pp. 39-42
Author(s):  
A.Yu. Safronov

The article provides an analysis of the sources of obtaining evidentiary and other information necessaryfor the investigation body, the prosecutor (state prosecutor) and the court to implement the provisions on theconfiscation of property under Art. 104.1 of the Criminal Code of the Russian Federation. With examples fromthe judicial practice of the federal court and the positions of the Supreme Court of the Russian Federation,set out in the Resolution of the Plenum, the issue of obtaining information from electronic databases aboutthe property status of a participant in criminal proceedings is considered. The possibilities of GAS “Justice” ofPI “Judicial record-keeping” on the issues under consideration are revealed. The conclusion is substantiatedthat the conclusion that electronic databases can and should be used as a source of obtaining data for thecircumstances to be proved in a criminal case. Taking into account the provisions of Articles 73 and 74 of theCriminal Procedure Code of the Russian Federation, the place and type of information received, using theseelectronic databases, in the evidence system in a criminal case, is determined. The conclusion is substantiatedthat the list of compositions (articles) of the Criminal Code of the Russian Federation, according to which itis possible to apply confiscation by a conviction of a court, is practically unlimited, and, to be more precise,is limited only to the list of articles of the Special Part of the said code.


Author(s):  
I. Mytrofanov

The article considers the rule of law, the rule of criminal law. When studying the norm of criminal law, I rely on the fact that it is a mandatory rule of conduct for failure to commit a criminal offense under the criminal law of the Special Part of the Criminal Code of Ukraine, organically related orders, compliance with which is ensured by coercive potential criminal law influence. The norm of criminal law consists of: 1) conditions for the implementation of criminal law (hypothesis); 2) criminal law normative – obligatory legal requirement for non-commission of an act provided by the instruction of the Special Part of the Criminal Code (disposition); 3) sanction for non-compliance with these legal requirements. Mandatory requirements (rules) contained in the articles of the General and Special Parts of the Criminal Code and organically supplement (clarify) the content of the relevant structural part of the criminal law or contain procedural issues for its application and implementation. The article analyzes the hypothetical, dispositional and sanctioning dictates of the draft Criminal Code of Ukraine. It is concluded that the draft Criminal Code of Ukraine does not significantly change the approaches to understanding the rules of criminal law as a system of established (sanctioned) by the Verkhovna Rada of Ukraine and legally secured universally binding criminal law norms and organically related commands. project composition, their rights and responsibilities, tasks of the Criminal Code, legal facts, etc.), compliance with which is ensured by the coercive potential of the means of criminal law influence. The considered norm in a broad sense provides for a three-tier structure and is fixed in the criminal law. At the same time, the structural elements of the norm of criminal law in the «broad» sense are placed in the articles of both the General and Special parts of the draft Criminal Code of Ukraine. Further research should focus on understanding the concept and structure of criminal law, as it will help both the legislator and the court. Proper interpretation of the concept and structure of criminal law encourages parliamentarians to more fully and accurately reproduce in the text of the Criminal Code of Ukraine all the necessary elements of criminal law in view of the purpose of its development and adoption, and the judge, investigating judge (court) – to find, compare and understand these elements, to establish their interrelations and the legal will of the legislator fixed in this norm, and also to provide its reliable realization according to a letter of the law. This knowledge allows members of society to navigate the system of criminal law obligations for their implementation.


2021 ◽  
pp. 218-225
Author(s):  
V. O. V. O.

The article discusses the problematic issues of the historical preconditions for the formation of the system of criminalistics knowledge. Analyzed the scientific works of scientists and practitioners of law enforcement agencies regarding the system of criminalistics knowledge and criminalistics science. The importance of taking into account the historical period regarding the formation of the structure and system of criminalistics knowledge is emphasized. Systematization of criminalistics knowledge took place in several stages. Thus, one of the first to summarize and classify criminalistics knowledge was Hans Gross. Similarly, SM Tregubov and RA Reiss attempted to form a system of criminalistics knowledge in their scientific works. A. I. Vinberg and B. M. Shaver in their work argued for the need to distinguish in criminalistics science of the general and special part. In certain historical periods, different views were proposed on the formation of a system of criminalistics knowledge, which is associated with the historical development of society at that time, the state of scientific research on the detection, detection and investigation of criminal offenses. Depending on the historical stages, practitioners and scientists offered their own system of criminalistics knowledge and criminalistic science.


2021 ◽  
Vol 25 (2) ◽  
pp. 663-684
Author(s):  
Olga A. Kuznetsova

One of the most serious problems in the field of combating crime is the fight against transnational corruption crime. This type of crime already (de facto and de jure) exists as international crime and has a specific subject composition, geography of commission and complex objective reasons. The core of transnational corruption crime is bribery widely used by transnational corporations for achieving their corporate purposes. Combatting such crimes by means of criminal law is carried out at various levels: international, interregional, regional, subregional, bilateral, and domestic. The purpose of this article is to characterize transnational corruption, which is one of the forms of self-determination of crime. The article provides a comprehensive classification of corruption crimes based on various criminal law and criminological criteria. The author pays special attention to the fact that all transnational corruption crimes can be divided into main and auxiliary. At the same time, these two types of offences are often inseparable. The author proposes the main directions of criminal law impact on transnational corruption crime, which could be used in both the General part and Special part of criminal law. The methodology of the article is based on the laws of materialist dialectics. The article rests on a wide range of Russian and foreign sources of scientific, legal, statistical, sociological, and other nature. The author applied the following research methods: analysis, synthesis, deduction, induction, systemic-structural method, logicallegal, and comparativelegal.


2021 ◽  
Vol 5 (2) ◽  
pp. 82
Author(s):  
Zhou Boya ◽  
Wang Zifei

Finance is vital to a country, and Hong Kong, as a special part of the large economy of China, has unique advantages and development history. And Hong Kong’s growth from a small fishing village to a financial centre has its inevitable factors: historical, geographical and policy advantages. After nearly a century of rapid development, Hong Kong has achieved many proud accomplishments in the following fields: economy, medicine, education, etc. In the process, the cooperation between Hong Kong and the mainland has become increasingly close, and the two sides of the Strait have become excellent “partners”. In recent years, due to the COVID-19 epidemic and the rise of China as a big economy, Hong Kong is facing an unavoidable dilemma. In view of this, the authors suggest that Hong Kong can develop financial technology, enhance financial security,  implement green finance, and promote corporate innovation. At the same time, Hong Kong should also strengthen the relationship with the mainland. Generally speaking, under the current circumstances, Hong Kong will continue to exist as an important financial center of China, but Hong Kong should also actively face the challenges of the times and explore new developments directions in the future.


2021 ◽  
Vol 15 ◽  
pp. 103-110
Author(s):  
Mohamadreza Mohamadzadeh

To migrate to cloud computing or other new generation of computational and communicational network we should making some laws about limitations on such networks. We should clarify clearly the level of accessions to resources and/or the ability to sending or receiving files through such network. We can avoid unpredicted and undesired works by using of law makings. Furthermore, besides of law making we can use evolutionary and/or intelligence techniques for estimation and prediction about parameters that deal with controlling of our network – for example in this paper we introduce one type of such intelligence algorithms which named as unscented Kalman filter. By giving some raw inputs about treatments and resources of such networks we’re able to estimate and predict about lots of different conditions of these networks. For example, we should have an estimation and prediction algorithm to be able to track and trace the hackers or crackers, if they’re permeating to our network. Or we should estimate the amount of users that will use particular software or application on a specific hour through such network. Also, if we study users treatment on a specific network, like cloud computing, we’re able to estimate and predict their keen and eagerness about new released software or application; because if we know how people treat and face and react with new emerging software we’re able to construct and program our applications more precisely. In this paper, at first we tell about cloud computing – we define it completely and discuss about all aspects of this new generation of internet – also in the first section we discuss about efficiency of cloud computing in saving of energy and tell differences between the amount of energy that cloud resources use and the amount of energy that other computerized frames were use. We proof our suggestions and ideas by the means of analytical and mathematical analysis; after that when we understand about all of its concepts, a brief review about Microsoft decisions on cloud computing were present, we review new systems and software’s of Microsoft that equipped with cloud computing and study the advantages and disadvantages of these new services which are equipped with cloud computing. In the next section by the knowing of whole concepts and key features of this network and also by knowing the critical uses of this network on different industries we introduce fixedinterval smoothers; which can be used for estimation and prediction of different parameters in such network. For example, we can use this for estimation and prediction about permeating of hackers or for predicting the amount of users that will use special part of our network in a particular period of time or by tracking and tracing the packets or even users. By performing such activities we’re able to eliminate malicious and spyware treatments from the beginning points of our network. Also by the means of mathematical analysis in this paper, we demonstrate all of our suggestions and according to these proofs we conclude about workability and liability of such network.


Sign in / Sign up

Export Citation Format

Share Document