A note on two unpublished Coptic textiles from Belgrade

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A note on the security of two improved RFID protocols

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

متن کامل

Anthracosis in a Coptic mummy.

The laboratory results from the mummy of a 25–35-year-old adult male (“Moses”/Q.445-2012) dating from the Middle Coptic period (AD 4th to 8th century) are reported. This individual was recovered from the Coptic necropolis of Qarara in Middle Egypt during the joint excavation performed by the Eberhard Karls Universität, Tübingen (Germany) and the Egyptian Museum of Barcelona in March 2012. Speci...

متن کامل

Pulmonary mummification in a Coptic mummy from ancient Egypt.

Mummification of lung tissue is not unusual due to 2 factors: it contains few of the epithelial cells with large concentrations of hydrolase-rich liposomes that are associated with the putrefaction process, and the area of desiccation is very large, due to the large volume of aerated regions.1 However, it is rare to find examples with intact structures. In this paper, we present a mummified ind...

متن کامل

Computational Methods for Coptic

This paper motivates and details the first implementation of a freely available part of speech tag set and tagger for Coptic. Coptic is the last phase of the Egyptian language family and a descendant of the hieroglyphs of ancient Egypt. Unlike classical Greek and Latin, few resources for digital and computational work have existed for ancient Egyptian language and literature until now. We evalu...

متن کامل

a note on the security of two improved rfid protocols

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Zograf

سال: 2017

ISSN: 0350-1361,2406-0755

DOI: 10.2298/zog1741019e