Rules in Shin Buddhism

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Buddhism Architecture in Northwestern Iran

Architecture is not only a complex including materials and methods to provide a shelter for human beings, but also it is an expression of the society, which created that. Its form will be the reflection of values and religious orientation besides social maturity of the related society and its structure will narrate the nature, power and different dimensions of mythical and psychological aspects...

متن کامل

Toward a Pro-Active Engaged Shin Buddhism: A Reconsideration of the Teaching of the Two Truths (shinzoku-nitai)

IN THIS ESSAY WE will focus on the well-known teaching of the “two truths” (Jpn. shinzoku nitai). This theory has been notably prominent in the history of modern Shin Buddhism and indicates the continuing concern for the relation between Shin teaching and the institutions to society. The theory is one of the most problematic concepts in Shin Buddhism today, encountering sharp criticism from man...

متن کامل

Idealism in Yogācāra Buddhism

In the last fifty years or so, since Yogācāra texts have been available to western academics, there has been a debate as to how Yogācāra Buddhism should be interpreted. This article seeks to establish that Yogācāra Buddhism is most properly interpreted as an idealist school of Buddhist thought. Specifically, it challenges the arguments that have been put forth in recent years that suggest a phe...

متن کامل

Breaking the Shin-Shin-Rhee remotely keyed encryption schemes

Remotely keyed encryption (RKE) schemes provide fast symmetric encryption and decryption using a small-bandwidth security module and a powerful host. Such schemes keep the key inside the security module to prevent key compromise. Shin, Shin, and Rhee proposed a length-preserving as well as a length-increasing RKE scheme that both use only a single round of interaction between host and security ...

متن کامل

SHIN ABox Reduction

We propose a technique to make consistency detection scalable for large Aboxes in secondary storage. We use static analysis of knowledge representation with summarization techniques to produce a dramatically reduced proxy Abox. We show that the proxy Abox is consistent only if the original Abox is also consistent. We also show that, in practice, our techniques dramatically reduce the time and s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JOURNAL OF INDIAN AND BUDDHIST STUDIES (INDOGAKU BUKKYOGAKU KENKYU)

سال: 1994

ISSN: 1884-0051,0019-4344

DOI: 10.4259/ibk.42.734