Poet of eternity – Nasimi

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Strong Eternity Service

Strong Eternity Service is a safe and very reliable storage for data of high importance. We show how to establish persistent pseudonyms in a totally anonymous environment and how to create a unique fully distributed name-space allowing both computer-efficient and humanacceptable access. We also present a way how to retrieve information from such data storage. We adapt the notion of the mix-netw...

متن کامل

The Eternity Service

The Internet was designed to provide a communications channel that is as resistant to denial of service attacks as human ingenuity can make it. In this note, we propose the construction of a storage medium with similar properties. The basic idea is to use redundancy and scattering techniques to replicate data across a large set of machines (such as the Internet), and add anonymity mechanisms to...

متن کامل

The Pathologist as Poet

The role of the humanities (eg, philosophy, bioethics, literature, music, theater, religion, anthropology) in medical education has been argued long and hard for decades. It is argued that the study of subjects included in the humanities can enhance critical thinking skills, foster a deeper level of learning and understanding, and help to enhance one's level of compassion, empathy, and moral/et...

متن کامل

De Sitter Space and Eternity

This paper explores infrared quantum effects in the de Sitter space. The notion of ”eternal manifolds” is introduced and it is shown that in most cases the de Sitter space doesn’t belong to this class. It is unstable under small perturbations which may cause a breakdown of the de Sitter symmetry. The de Sitter string sigma model is discussed. It is argued that the gauge theory at the complex co...

متن کامل

Weak-Key Analysis of POET

We evaluate the security of the recently proposed authenticated encryption scheme POET with regard to weak keys when its universal hash functions are instantiated with finite field multiplications. We give explicit constructions for weak key classes not covered by POET’s weak key testing strategy, and demonstrate how to leverage them to obtain universal forgeries.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Azerbaijan Journal of Educational Studies

سال: 2019

ISSN: 0134-3289

DOI: 10.29228/edu.55