Results 21 to 30 of about 3,158,126 (357)
The Legal Forensic Model in Determining the Genuineness of Islamic Banking Documents and Their Application in Shariah Courts [PDF]
Falsification of documents does not only happen in civil courts. Shariah courts also face the same problems despite being ‘religiously’-oriented courts.
Wan Abdul Fattah Wan Ismail +1 more
doaj +1 more source
With the popularity of metaverse, the number of questions about the legal framework of utility tokens has also grown. In this area, the application of blockchain allows us to generalize the experience of tokenization of services.
Yuliya Kharitonova
doaj +1 more source
Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) is an advanced technology that can provide various services including autonomous driving, real-time creation of high-definition maps, and car sharing.
Seunghwan Son +5 more
semanticscholar +1 more source
Electronic encumbrance Right is one of the breakthroughs made by the Minister of Agrarian Affairs to improve services in the land sector and support the Government in realizing a digital bureaucracy in Indonesia.
Dhaniswara K Harjono
doaj +1 more source
AUTENTIKASI PERJANJIAN PENGIKATAN JUAL BELI TANAH YANG ANTIDATIR
This research aims to analyze the problem of the authentication of the antidatir sale and purchase land binding agreement where the deed is in violation of Law on the Notary Position.
Riky Rustam
doaj +1 more source
Customary law and regulation: Authenticity and influence
In its origins, customary law is a product of tribal order, which lacked a genuine state organization and institutions to create and enforce the law (Pëllumbi, 2006). Albanian customary law (ACL) is one of the oldest and most exceptional bodies of European customary law. It is exceptional that it does not come from a legislator or state parliament, but
Islam Qerimi, Ahmet Maloku, Elda Maloku
openaire +1 more source
Summary: In 2013, the Drug Supply Chain Security Act (DSCSA) was signed into law to address the growing threat of counterfeit drugs and to ensure prescription drugs remain safe and effective for patients.
Ghada L. Ashkar +7 more
doaj +1 more source
SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems
Instant-messaging (IM) and voice over IP (VoIP) applications like WhatsApp, Zoom, and Skype have made people extremely reliant on online communications for their audio, video, and text conversations. Since more people are using these platforms to talk to
Mashari Alatawi, Nitesh Saxena
semanticscholar +1 more source
Quality and quantity of DNA extracted from wood is important for molecular identification of wood species, which can serve for conservation of wood species and law enforcement to combat illegal wood trading.
Grace Wing-Chiu But +6 more
semanticscholar +1 more source
The government in carrying out its function as a public administration servant is regulated in law of the Republic of Indonesia number 25/2009 on public services.
W. Hermawan
semanticscholar +1 more source

