Results 31 to 40 of about 3,059,535 (353)

Verivication of Considered Cause (Ta'lil al-Ahkam) in Worships from I'lam al-Muwaqi'in | تعليل الأحكام في العبادات من إعلام الموقعين

open access: yesAl-Zahra: Journal for Islamic and Arabic Studies, 2018
Verification of considered cause (ta’līl al-ahkām) together with the objectives of Shariah (maqāsid al-Sharī’ah) is among the most important issues discussed by the experts of Jurisprudence. This article analyses the procedures of establishing causes for
Zuhrotul Aini Mansur
doaj   +1 more source

Authentication of Video Evidence for Forensic Investigation: A Case of Nigeria

open access: yesJournal of Information Security, 2021
Video shreds of evidence are usually admissible in the court of law all over the world. However, individuals manipulate these videos to either defame or incriminate innocent people.
B. O. Akumba   +4 more
semanticscholar   +1 more source

Ibnu Qayyim Al-Jauziyyah's Ways to Verification of Considered Cause | طرق تعليل الأحكام عند الإمام ابن قيم الجوزية

open access: yesAl-Zahra: Journal for Islamic and Arabic Studies, 2009
Verification of considered cause ( ta'lil al-ahkiim) together with the objectives of Shariah (maqiisid al-Shari'ah) is among the most important issues discussed by the experts of Jurisprudence.
Zuhrotul Ain Mansur
doaj   +1 more source

Biometric Identification by Fingerprint Image Based Minutiae Detection [PDF]

open access: yesمجلة التربية والعلم, 2009
In an increasingly digital world, reliable personal authentication has become an important human computer interface application, some examples where establishing a person’s identity.
Israa Mohamed Khidher
doaj   +1 more source

The Concept of Rights: Views of Bentham and Khoei [PDF]

open access: yesFaṣlnāmah-i Pizhūhish-i Huqūq-i ̒Umūmī, 2020
The main focus of this research is on the nature and origin of rights. Jeremy Bentham totally rejects the notion of extra-legal rights. For him, it is only legal rights that are valid and imply a benefit for its holders.
Mohammad Rasekh, Mohsen Ghasemi
doaj   +1 more source

The Application of Molecular Spectroscopy in Combination with Chemometrics for Halal Authentication Analysis: A Review

open access: yesInternational Journal of Molecular Sciences, 2020
Halal is an Arabic term used to describe any components allowed to be used in any products by Muslim communities. Halal food and halal pharmaceuticals are any food and pharmaceuticals which are safe and allowed to be consumed according to Islamic law ...
A. Rohman, A. Windarsih
semanticscholar   +1 more source

Secure Physical Layer Transmission and Authentication Mechanism Based on Compressed Sensing of Multiple Antenna Arrays

open access: yesJ. Sensors, 2021
Large-scale antenna technology has become one of the most promising technologies in 5G because of its ability to effectively improve the spectral efficiency and energy efficiency of the system, as well as its better robustness.
Xiaolong Zhang, Wei Wu, Bin Zhou
semanticscholar   +1 more source

PEMBUKTIAN DALAM PERKARA PERCERAIAN DENGAN ALASAN PERSELISIHAN

open access: yesJurnal Cakrawala Hukum, 2013
Civil Law was public law which was imperative so it tied everyone, especially in investigating witness incourt. It was determined that judge forbade to get witness from blood relative as the base to take decision.However it was not an absolute regulation.
I Gusti Ngurah Adnyana
doaj   +1 more source

Legal Basis of Biometric Methods of Identity Authentication

open access: yesEconomics. Law. Innovaion, 2021
The paper substantiates the need to form the legal foundations of biometric authentication methods. The development of modern society is connected with the protection of information and information security.
A. Kuznetsov
semanticscholar   +1 more source

Responsibility and non-repudiation in resource-constrained Internet of Things scenarios [PDF]

open access: yes, 2016
The proliferation and popularity of smart autonomous systems necessitates the development of methods and models for ensuring the effective identification of their owners and controllers.
al-Khateeb, Haider   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy