Examples of using Methods used in English and their translations into Arabic
{-}
-
Colloquial
-
Political
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Methods used to identify areas containing anti-personnel mines and reasons for suspecting the presence of anti-personnel mines in other areas.
The methods used by the authors, however, are traditional, and for that the old forests in the area designated by the communication are essential.
(h) Methods used in combating transnational organized crime committed through the use of computers, telecommunications networks
The Maternal Mortality Peer Review Group reviews methods used for generating internationally comparable estimates of maternal mortality.
The Government of Israel should review methods used by IDF to enforce access restrictions on land
The Landau Commission's directives continued to remain secret, even if much was known about the methods used by GSS.
This section should include an indication of the types of institutions informed and the methods used.
(b) Building up of national collective memories of disasters, their effects, methods used to combat them and means to reduce their impacts;
Some methods and equipment were similar to methods used today, such as wooden pipes used in the victims nostrils to blow air into the lungs.
This section should include an indication of the types of institutions informed and the methods used.
Supporting documents with detailed data on activity statistics, emission factors and methods used could potentially lead to more consistent and transparent inventories.
If the methods used to estimate the level of uncertainty depart from the IPCC good practice guidance, these methods should be described.
The methods used need to be clearly stated, and future studies should ensure that common standards are applied;
It also covered methods used to obtain data, including the World Health Survey.
The methods used are validated by committees of international experts, described in detail
The methods used are presented briefly, the results of the evaluation follow, and conclusions are presented.
(c) The methods used by groups for transporting victims of such trafficking under false identities, or with altered or falsified documentation, and the measures for detecting them; and.
It embraces all methods used to distribute power and manage public resources, and the organizations that shape government and the execution of policy.
(c) The methods used by organized groups for transporting victims of such trafficking under false identities, or with altered or falsified documentation, and the measures for detecting them; and.
III.- Neutralize their personality or diminish their physical or mental capacity, even if the methods used do not cause physical pain or mental suffering;