نتایج جستجو برای: debit transaction

تعداد نتایج: 26193  

Journal: :SSRN Electronic Journal 2012

Journal: :Expert: Jurnal Sistem Informasi 2023

The development of the era towards society 5.0, allows every human being in his life to using modern technology such as AI and robots meet needs make easier. With technology, it will be easier, because all humans are aware that getting work done quickly easily better. Technological has advantages disadvantages, but weakness is a concern for Society machines replace tasks which can improve quali...

Journal: :فقه و اصول 0

if the agent, who has the right to appoint a proxy, exercises his right and appoints another person for pursuing the subject of agency, the appointed person is not the agent of the appointer; rather, he is regarded as the indirect agent of the client. therefore, if the object of agency is conclusion of a transaction contract and the indirect proxy concludes it, that [contract] belongs to the cl...

Journal: :SSRN Electronic Journal 2008

Journal: :SSRN Electronic Journal 2009

ژورنال: پژوهشنامه مالیات 2020
, ,

Taxation issues are among the factors which balance between private rights and public interests. But the legal system of contracts also works for the welfare of the people and society. The general rules of contracts and the principles of private law have found their essential functions during the years.  Applying the above rules aimed at preserving public order along with the private rights of ...

Journal: :CoRR 2012
Krishnendu Chatterjee Vinayak S. Prabhu

We introduce quantatitive timed refinement and timed simulation (directed) metrics, incorporating zenoness check s, for timed systems. These metrics assign positive real numbers between zero and infinity which quantify the timing mismatches between two timed systems, amongst non-zeno runs. We quantify timing mismatches in three ways: (1) the maximal timing mismatch that can arise, (2) the “stea...

2003
Vorapranee Khu-smith Chris J. Mitchell

Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that information is stored in clear at the end point of the communication link and the lack of user authentication. Although SSL/TLS does offer the latter, it is optional and usually omitted since users typically do not have the necessary a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید