a reflection on punishment for issuing unpaid cheques in issuing cheques amended act (1382/6/2)
نویسندگان
چکیده
0
منابع مشابه
Background Bank Cheques Elimination:
The segmentation of bank cheque images is a fundamental phase of its automatic processing. In the segmentation phase, one of the most important steps is the background elimination, that has to respect the physical integrity of the rest of the cheque image information. This paper describes a simple and robust solution for the background elimination problem, using a process that involves two stag...
متن کاملDatabases for recognition of handwritten Arabic cheques
This paper describes an effort toward building Arabic cheque databases for research in recognition of handwritten Arabic cheques. Databases of Arabic legal amounts, Arabic subwords, courtesy amounts, Indian digits, and Arabic cheques are provided. This paper highlights the characteristics of the Arabic language and presents the various steps that have been completed to achieve this goal includi...
متن کاملCheques and the Payments System
Cash and cheques were virtually the only means of payment available to most Australians until Bankcard credit cards were introduced a little over 20 years ago. Only in the past decade or so has there been a credible and concerted challenge to the dominant role of cheques for non-cash payments. Today we are seeing the emergence of many alternative payment arrangements; at the same time, banks an...
متن کاملCounter Based Superscalar Instruction Issuing
New techniques for superscalar instruction issuing are presented. It is shown that the data dependency check for both in-order and out-of-order issuing can be performed in O(logw) gate delay using O(w2) primitive gates, where w is the size of the instruction buffer. Furthermore, we present a new counting based technique for assigning instructions to resources. It requires a delay of O(logw+logm...
متن کاملTransfering Quantum E-cheques in Nonsecured Channels
The problem of transfering e-cheques in absolutely secured channels was constructed in the first part. The construction guarantees that the participants could open the secret only if they cooperated toghether and the dishonest participants could not change the received informations. In practice the absolutely secured channels do not exist. In this second paper we produce quantum e-cheques, base...
متن کاملProtection Profiles for Certificate Issuing & Management Systems
At the heart of many recent efforts to improve Internet security are a group of security protocols such as S/MIME, TLS, and IPSec. All of these protocols rely on public-key cryptography to help provide services such as confidentiality, data integrity, data origin authentication, and non-repudiation. Support for this public-key cryptography is provided by a Public Key Infrastructure, or PKI. The...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
حقوق اسلامیجلد ۱، شماره ۴، صفحات ۱۳۳-۱۴۶
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023