نتایج جستجو برای: is lawful
تعداد نتایج: 7237677 فیلتر نتایج به سال:
the present article aims at drawing inferences from the holy verses of the qur’ān that are useful in cognitive treatment of depression disorder. the lawful inference of these doctrines takes place on the basis of verbal contexts of speech such as emphatic words and conventional meaning of the words as well as allegorical interpretation (ta’wīl) of speech on the basis of the rule for the biparti...
Following the development of medical science new problems have emerged in this discipline that such as miscarriage, change of sexuality, dissection, artificial insemination, and selling blood. Muslim physicians are interested to know the religious decrees of these issues. This paper is an attempt to study the issue of dissection. According to Shiah jurisprudents, dissection was illegal in its e...
Communications Interception is an essential part of law enforcement used by authorised government agencies to investigate criminal activities. With the growth of IP based applications and new IP technologies such as mobile IP, Internet Service Providers (ISPs) will find themselves increasingly obliged to provide interception capabilities. IP interception is usually done with expensive hardware ...
Dutch author Ubaldus de Vries reviews the current state of the euthanasia law in the Netherlands. The legislation, enacted in 2001, creates a medical exception that allows for euthanasia in cases where patients experience "hopeless and unbearable suffering." A brief history of the Dutch approach to euthanasia is set forth, case law is reviewed, and the unique role of the doctor is examined in s...
In the four years since it was first revealed, the United States National Security Agency’s warrantless domestic surveillance programs have been the subject of front page news stories,1 multiple books,2 dramatic hospital room confrontations,3 and a heated Congressional battle culminating in an unprecedented law allowing the Attorney General to grant legal immunity to telecommunications companie...
Demands for lawful access to encrypted data are a long standing obstacle to integrating cryptographic protections into communication systems. A common approach is to allow a trusted third party (TTP) to gain access to private data. However, there is no way to verify that this trust is well place as the TTP may open all messages indiscriminately. Moreover, existing approaches do not scale well w...
Linked Data is not always published with a license. Sometimes a wrong license type is used, like a license for software, or it is not expressed in a standard, machine readable manner. Yet, Linked Data resources may be subject to intellectual property and database laws, may contain personal data subject to privacy restrictions or may even contain important trade secrets. The proper declaration o...
This paper presents a fast multi-stage method for on-line detection of RTP streams and codec identification of transmitted voice or video traffic. The method includes an RTP detector that filters packets based on specific values from UDP and RTP headers. When an RTP stream is successfully detected, codec identification is applied using codec feature sets. The paper shows advantages and limitati...
With relational transformational programming in mind, an extension of a \law-less" relational theory of datatypes is proposed in order to study and manipulate quotient types within a Tarski-like calculus of relations. The extended notion of type, pertype (from partial equivalence relation), is shown to admit a complete lattice structure by constructing the order via a Galois connection. A perty...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید