نتایج جستجو برای: known opinion of jurisprudents

تعداد نتایج: 21172102  

Journal: :فقه و مبانی حقوق اسلامی 0
سید محمد موسی مطلبی استادیار پژوهشگاه علوم انسانی و مطالعات اجتماعی جهاد دانشگاهی حسن جمشیدی پژوهشگر جهاد دانشگاهی مشهد

the main purpose of this survey is to study the use of‘dalil aqhl’ in jurisprudential ideas of shekh ansari as oneof the greatest ‘shia’ jurisprudents. the method is basedon analyzing of jurisprudential content and has donethrough studying his relevant book. the result shows thathe blive that wisdom is an inward messenger so heaccepted it as a reason, the indipendent wisdom warrant isacceptable...

Journal: :فلسفه و کلام اسلامی 0
مهدی عظیمی استادیار دانشگاه تهران (دانشکدۀ الهیات، گروه فلسفه و کلام اسلامی)؛

according to mulla sadra in his famous work, al-asfar , god’s pre-knowledge is a set of epistemic forms which are (1) inseparable from his essence, (2) uncreated, (3) beyond the universe, (4) devoid of real possibility, (5) eternal per se, and (6) extant by his extance. tabatabayi in nihayat al-hilmah believes that the term, “inseparable”, in (1) does not mean “out of essence”; otherwise, (1) w...

Journal: :IACR Cryptology ePrint Archive 2013
Jérémy Jean Ivica Nikolic Thomas Peyrin Lei Wang Shuang Wu

In this article, we provide the first third-party security analysis of the PRINCE lightweight block cipher, and the underlying PRINCEcore. First, while no claim was made by the authors regarding related-key attacks, we show that one can attack the full cipher with only a single pair of related keys, and then reuse the same idea to derive an attack in the single-key model for the full PRINCEcore...

Journal: :IEEE Computer 2014
David Alan Grier

I lied to the future last night. I told it that soon it would be big and strong and profitable. I then tucked it into its crib, turned off the lights, and hoped the day would never come when the future would curse this lie. I not only assured the future it would someday be strong and profitable, I also told it how it would strong and profitable. My lie was a little more prosaic than my words su...

Journal: :Computers & Electrical Engineering 2012
Lili Liu Qiang Zhang Xiaopeng Wei

Recently, a RGB image encryption algorithm based on DNA encoding and chaos map has been proposed. It was reported that the encryption algorithm can be broken with four pairs of chosen plain-images and the corresponding cipher-images. This paper re-evaluates the security of the encryption algorithm, and finds that the encryption algorithm can be broken efficiently with only one known plain-image...

Abdollah Bazargany, Alireza Nikseresht, Leila Bazrafkan,

Introduction. The assessment of learning needs is one of the basic stages in education which leads to a change in medical education curriculum. Such assessment can be conducted based on different reasons. Therefore it should be defined, and the methods of application of the findings must be analyzed. One of the known methods of need assessment is the analysis of the differences between the p...

2015
FARRAH MADANAY

Politics get personal Two students question whether a politician's personal life should be a deciding factor when electing the next president FEATURES *>12 ; SPOBTS | Check out this crib Game-set-match! In honor of Martel's "Greek Week," Alex Bisberg drops by a The women's tennis team dominated this weekend with 7-0 Martel suite nicknamed Mount Olympus. wins over Lamar and the University of Lou...

1998
Colin Boyd Anish Mathuria

We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases reenements are suggested, either to improve the eeciency or to allow simpliied security analysis.

Journal: :IACR Cryptology ePrint Archive 2004
Adam J. Slagell

One of the approaches to deliver real-time video encryption is to apply permutations to the bytes within a frame of a fully encoded MPEG stream as presented in [2]. We demonstrate that this particular algorithm is vulnerable to a known-plaintext attack, and hence its use should be carefully considered. We also discuss modifications that can make the algorithm resistant to our attack.

Journal: :African health sciences 2013
M ur Rahman S Abuhasna F M Abu-Zidan

BACKGROUND Modern medicine has allowed physicians to support the dying terminally-ill patient with artificial means. However, a common dilemma faced by physicians in general, and intensivist in particular is when to limit or withdraw aggressive intervention. OBJECTIVE To study the effect of training background and seniority on Do-not to resuscitate (DNR) decisions in the Middle East. METHOD...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید