نتایج جستجو برای: is lawful

تعداد نتایج: 7237677  

Journal: :علوم قرآن و حدیث 0
فاطمه موسوی محمد جواد نجفی

the present article aims at drawing inferences from the holy verses of the qur’ān that are useful in cognitive treatment of depression disorder. the lawful inference of these doctrines takes place on the basis of verbal contexts of speech such as emphatic words and conventional meaning of the words as well as allegorical interpretation (ta’wīl) of speech on the basis of the rule for the biparti...

ژورنال: Anatomical Sciences Journal 2010
Namazifar, Hossein, Ghorbani , Fathollah,

Following the development of medical science new problems have emerged in this discipline that such as miscarriage, change of sexuality, dissection, artificial insemination, and selling blood. Muslim physicians are interested to know the religious decrees of these issues. This paper is an attempt to study the issue of dissection. According to Shiah jurisprudents, dissection was illegal in its e...

2003
Shahnaz Kouhbor Philip Branch

Communications Interception is an essential part of law enforcement used by authorised government agencies to investigate criminal activities. With the growth of IP based applications and new IP technologies such as mobile IP, Internet Service Providers (ISPs) will find themselves increasingly obliged to provide interception capabilities. IP interception is usually done with expensive hardware ...

Journal: :Annals of health law 2004
Ubaldus de Vries

Dutch author Ubaldus de Vries reviews the current state of the euthanasia law in the Netherlands. The legislation, enacted in 2001, creates a medical exception that allows for euthanasia in cases where patients experience "hopeless and unbearable suffering." A brief history of the Dutch approach to euthanasia is set forth, case law is reviewed, and the unique role of the doctor is examined in s...

Journal: :JTHTL 2010
Cindy Cohn

In the four years since it was first revealed, the United States National Security Agency’s warrantless domestic surveillance programs have been the subject of front page news stories,1 multiple books,2 dramatic hospital room confrontations,3 and a heated Congressional battle culminating in an unprecedented law allowing the Attorney General to grant legal immunity to telecommunications companie...

Journal: :IACR Cryptology ePrint Archive 2014
Markulf Kohlweiss Ian Miers

Demands for lawful access to encrypted data are a long standing obstacle to integrating cryptographic protections into communication systems. A common approach is to allow a trusted third party (TTP) to gain access to private data. However, there is no way to verify that this trust is well place as the TTP may open all messages indiscriminately. Moreover, existing approaches do not scale well w...

2013
Víctor Rodríguez-Doncel Asunción Gómez-Pérez Nandana Mihindukulasooriya

Linked Data is not always published with a license. Sometimes a wrong license type is used, like a license for software, or it is not expressed in a standard, machine readable manner. Yet, Linked Data resources may be subject to intellectual property and database laws, may contain personal data subject to privacy restrictions or may even contain important trade secrets. The proper declaration o...

Journal: :JDFSL 2014
Petr Matousek Ondrej Rysavý Martin Kmet

This paper presents a fast multi-stage method for on-line detection of RTP streams and codec identification of transmitted voice or video traffic. The method includes an RTP detector that filters packets based on specific values from UDP and RTP headers. When an RTP stream is successfully detected, codec identification is applied using codec feature sets. The paper shows advantages and limitati...

1993
Ed Voermans Jaap van der Woude

With relational transformational programming in mind, an extension of a \law-less" relational theory of datatypes is proposed in order to study and manipulate quotient types within a Tarski-like calculus of relations. The extended notion of type, pertype (from partial equivalence relation), is shown to admit a complete lattice structure by constructing the order via a Galois connection. A perty...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید