Results 61 to 70 of about 119,685 (321)
Legal Concept and Nature of Sadaqah [PDF]
the sources of Islamic jurisprudence, Sadaqah has been considered both as acts of worship and a kind of dealing, and it enjoys in both fields, some applicabilities and has, therefore, particular regulations.
M. Abouata, M. farzad
doaj +1 more source
Immigration: Visa Security Policies [PDF]
[Excerpt] The report opens with an overview of visa issuance policy. It then explains the key provisions that guide the documentary requirements and approval/disapproval process. The section on consular screening procedures includes an analysis of trends
Wasem, Ruth Ellen
core +2 more sources
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley +1 more source
Analysis of Basis and Legal Nature of Arsh [PDF]
The obligation of seller to pay arsh in case the object of sale is defective ,has contractual basis and in cases, it is impossible to revocate the contract due to the impossibility of restitution of object or itâs restitution in the same condition as ...
M. Abouata, M. Abouata, A. Shamsollahi
doaj +1 more source
Abstract Education policy changes are believed to influence teachers' continuing professional learning (CPL) needs, but there is limited empirical evidence to support these claims. This lack of deep understanding has significant practical implications. This study used a new circular conceptual framework to analyse teachers' CPL needs. Leveraging public
Rikkert M. van der Lans +6 more
wiley +1 more source
A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model
Secret handshake schemes have been proposed to achieve private mutual authentications, which allow the members of a certain organization to anonymously authenticate each other without exposing their affiliations.
Yamin Wen, Zheng Gong, Lingling Xu
doaj +1 more source
Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters [PDF]
In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an ...
Chen, Jie +4 more
core
Abstract Drawing upon interview research across two academic departments as part of the early stages of a ‘decolonise the curriculum’ initiative at a Southern UK university, this study highlights a growing gulf between policy and practice in efforts to address systemic racial inequalities in UK universities. A reliance upon precarious labour, a culture
Triona Fitton +4 more
wiley +1 more source
This review summarizes microwave‐assisted transition‐metal catalysis for constructing N‐ and O‐heterocycles, highlighting rapid C–H and pre‐activated C–X activation, improved selectivity, and green synthetic efficiency. Abstract Microwave‐assisted organic synthesis provides a rapid and sustainable platform for synthesizing various heterocycles ...
Woo‐Jin Park, Ye Ri Han, Hyejeong Lee
wiley +1 more source
With the advent of cloud computing, outsourced computing has emerged as an increasingly popular strategy to reduce the burden of local computation. Optimal location query (OLQ) is a computationally intensive task in the domain of big data outsourcing ...
Bao Li +5 more
doaj +1 more source

