Movatterモバイル変換


[0]ホーム

URL:


PhilPapersPhilPeoplePhilArchivePhilEventsPhilJobs

Results for 'Ahmad M. Ali'

974 found
Order:

1 filter applied
  1.  85
    An ounce of prevention or a pound of cure? Multi-level modelling on the antecedents of mobile-wallet adoption and the moderating role of e-WoM during COVID-19.Ahmad M. A. Zamil,Saqib Ali,Petra Poulova &Minhas Akbar -2022 -Frontiers in Psychology 13.
    During the COVID-19 epidemic, personal safety has received increasing attention, leading to behavioral changes. Mobile-wallet makes it easier for people to keep social distance, which helps stop the spread of the COVID-19 virus. Evolving Internet technology has brought about changes in consumer lifestyle. The current situation of COVID-19 has created a business environment to shift from traditional ways and adopt e-commerce solutions worldwide. Grounded in technology acceptance model theory, this study’s objective is two-fold: First, this study intends to examine perceived (...) susceptibility to COVID-19, perceived severity of COVID-19, insecurity and discomfort as the predictors of perceived usefulness and perceived ease of use. Second, the current research intends to test the moderating effect of electronic words-of-mouth on the relationship between attitude and usage intention. Using survey methods, 226 usable responses were collected through a mall intercept survey in Pakistan. Data were analyzed using partial least square. The results revealed that PEOU and PU positively influence attitude toward M-wallet. This study has found that attitude positively influences the usage intention in adopting M-wallet. The results also support the moderating role of eWOM. These findings contribute to the marketing literature in several ways, particularly in Pakistan. This is the first study to use eWOM as a moderating variable in the TAM theory. In addition, this study adds to the current body of knowledge by considering eWOM as a multi-dimensional construct novel in m-wallet literature. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  2.  32
    Assessing the subtitling of emotive reactions: a social semiotic approach.Muhammad A. A. Taghian &Ahmad M. Ali -2023 -Semiotica 2023 (252):51-96.
    This article attempts to evaluate emotive meanings across languages and cultures expressed and elicited semiotically from viewers. It investigates the challenges of subtitling emotive feelings in the American filmHomeless to Harvard(2003) into Arabic. It adopts Paul Thibault’s (2000. The multimodal transcription of a television advertisement: Theory and practice. In Anthony Baldry (ed.),Multimodality and multimediality in the distance learning age, 311–385. Campobasso: Palladino Editore) method of multimodal transcription and Feng and O’Halloran’s (2013. The multimodal representation of emotion in film: Integrating cognitive (...) and semiotic approaches.Semiotica197(1/4). 79–100) framework of the multimodal representation of emotion to formulate strategies for subtitling emotion from English into Arabic. Additionally, Feng and O’Halloran’s (2013) framework is adapted to show how stylistic choices (e.g., cinematography, music, soundtracks, etc.) and semiotic expressions can elicit emotion from viewers. The social semiotic model is employed to investigate how emotive representation is realized through verbal and non-verbal items. The findings showed that the filmmakers had properly used stylistic choices and various semiotic techniques to elicit emotion from the viewer derived from the emotion of the film’s heroine. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  45
    Catalogue of the Arabic Manuscripts in Raza Library, RampurA Descriptive Catalogue of the Fyzee Collection of Ismaili ManuscriptsDescriptive Catalogue of Arabic Manuscripts in Nigeria.D. H. Partington,Imtiyāż 'Alī 'Arshī,Mu'izz Goriawala,Aida S. Arif,Ahmad M. Abu Hakima &Imtiyaz 'Ali 'Arshi -1968 -Journal of the American Oriental Society 88 (3):589.
    No categories
    Direct download(3 more)  
     
    Export citation  
     
    Bookmark  
  4.  5
    Nilai-nilai kebajikan dalam jamaah LDII dari amal saleh hingga kemandirian: menggali dan mengkreasikan hikmah dalam kehidupan.M. D.Ahmad Ali -2023 - Ngaglik, Sleman, Yogyakarta: Deepublish.
    Teachings of Lembaga Dakwah Islam Indonesia, an Islamic organization regarding conduct of life in Indonesia.
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  45
    Correction: Religious and Cultural Expressions in Legal Discourse: Evidence from Interpreting Canadian Courts Hearings from Arabic into English.Eman W. Weld-Ali,Mohammed M. Obeidat &Ahmad S. Haider -2023 -International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 36 (6):2303-2303.
  6.  24
    Religious and Cultural Expressions in Legal Discourse: Evidence from Interpreting Canadian Courts Hearings from Arabic into English.Mohammed M. Obeidat,Ahmad S. Haider &Eman W. Weld-Ali -2023 -International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 36 (6):2283-2301.
    Arab and English cultures are incongruent, where the former is greatly influenced by religion when compared to the latter. This study focuses on court interpreting from Arabic into English and questions the interpreters’ objectivity when rendering religious and cultural expressions, bearing in mind that certain cultures, like the Arab and Muslim ones, have significant religious ties. To this end, fifteen transcripts were randomly collected from Canadian court hearings. The analysis showed that interpreting religious and cultural expressions can be complex, especially (...) when the original speaker attempts to transmit a notion that may have negative implications in the target language. The results also showed that court interpreters either added explanations to religious and cultural expressions or omitted them. Such additions and omissions may be used to avoid negative stereotypes other cultures have about Muslims and Arabs. The study recommends that future researchers interested in legal interpreting consider the non-verbal factors that can be observed during court hearings. The study suggests allocating extensive training sessions to interpreters on how to impartially render culture-bound expressions, mainly in the legal context. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  7. Los Carácteres y la Conducta, Tr. Española Por M. Asín.Ab U. Muhammad Alî B.Ahmad Ibn Hazm &Miguel Asín Palacios -1916
    No categories
     
    Export citation  
     
    Bookmark  
  8.  49
    Risālah fī Māhiyat al-'AdlRisalah fi Mahiyat al-'Adl.George N. Atiyeh,Abū 'Alī Aḥmad Ibn Muḥammad Miskawaih,M. S. Khan &Abu 'AliAhmad Ibn Muhammad Miskawaih -1965 -Journal of the American Oriental Society 85 (3):420.
    No categories
    Direct download(3 more)  
     
    Export citation  
     
    Bookmark  
  9.  108
    What information and the extent of information research participants need in informed consent forms: a multi-country survey.Juntra Karbwang,Nut Koonrungsesomboon,Cristina E. Torres,Edlyn B. Jimenez,Gurpreet Kaur,Roli Mathur,Eti N. Sholikhah,Chandanie Wanigatunge,Chih-Shung Wong,Kwanchanok Yimtae,Murnilina Abdul Malek,Liyana Ahamad Fouzi,Aisyah Ali,Beng Z. Chan,Madawa Chandratilake,Shoen C. Chiew,Melvyn Y. C. Chin,Manori Gamage,Irene Gitek,Mohammad Hakimi,Narwani Hussin,Mohd F. A. Jamil,Pavithra Janarsan,Madarina Julia,Suman Kanungo,Panduka Karunanayake,Sattian Kollanthavelu,Kian K. Kong,Bing-Ling Kueh,Ragini Kulkarni,Paul P. Kumaran,Ranjith Kumarasiri,Wei H. Lim,Xin J. Lim,Fatihah Mahmud,Jacinto B. V. Mantaring,Siti M. Md Ali,Nurain Mohd Noor,Kopalasuntharam Muhunthan,Elanngovan Nagandran,Maisarah Noor,Kim H. Ooi,Jebananthy A. Pradeepan,Ahmad H. Sadewa,Nilakshi Samaranayake,Shalini Sri Ranganathan,Wasanthi Subasingha,Sivasangari Subramaniam,Nadirah Sulaiman,Ju F. Tay,Leh H. Teng,Mei M. Tew,Thipaporn Tharavanij,Peter S. K. Tok,Jayanie Weeratna &T. Wibawa -2018 -BMC Medical Ethics 19 (1):1-11.
    Background The use of lengthy, detailed, and complex informed consent forms is of paramount concern in biomedical research as it may not truly promote the rights and interests of research participants. The extent of information in ICFs has been the subject of debates for decades; however, no clear guidance is given. Thus, the objective of this study was to determine the perspectives of research participants about the type and extent of information they need when they are invited to participate in (...) biomedical research. Methods This multi-center, cross-sectional, descriptive survey was conducted at 54 study sites in seven Asia-Pacific countries. A modified Likert-scale questionnaire was used to determine the importance of each element in the ICF among research participants of a biomedical study, with an anchored rating scale from 1 to 5. Results Of the 2484 questionnaires distributed, 2113 were returned. The majority of respondents considered most elements required in the ICF to be ‘moderately important’ to ‘very important’ for their decision making. Major foreseeable risk, direct benefit, and common adverse effects of the intervention were considered to be of most concerned elements in the ICF. Conclusions Research participants would like to be informed of the ICF elements required by ethical guidelines and regulations; however, the importance of each element varied, e.g., risk and benefit associated with research participants were considered to be more important than the general nature or technical details of research. Using a participant-oriented approach by providing more details of the participant-interested elements while avoiding unnecessarily lengthy details of other less important elements would enhance the quality of the ICF. (shrink)
    Direct download(4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  10.  30
    Channel Contention-Based Routing Protocol for Wireless Ad Hoc Networks.Noor Mast,Muhammad Altaf Khan,M. Irfan Uddin,Syed Atif Ali Shah,Atif Khan,MahmoudAhmad Al-Khasawneh &Marwan Mahmoud -2021 -Complexity 2021:1-10.
    With the development of wireless technology, two basic wireless network models that are commonly used, known as infrastructure and wireless ad hoc networks, have been developed. In the literature, it has been observed that channel contention is one of the main reasons for packet drop in WANETs. To handle this problem, this paper presents a routing protocol named CCBR. CCBR tries to determine a least contended path between the endpoints to increase packet delivery ratio and to reduce packet delay and (...) normalized routing overhead. Moreover, throughout the active data section, each intermediate node computes its channel contention value. If an intermediate node detects an increase in channel contention, it notifies the source node. Then the source node determines another least contended route for transmission. The advantages of CCBR are verified in our NS2-based performance study, and the results show that CCBR outperforms ad hoc on-demand distance vector in terms of packet delivery ratio, end-to-end delay, and routing overhead by 4% to 9%. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  11.  63
    On Intrinsic Information Content of the Physical Mind in Quantized Space: Against Externalism.R. R. Poznanski,L. A. Cacha,M. A. Tengku,A. L.Ahmad Zubaidi,S. Hussain,J. Ali &J. A. Tuszynski -2019 -Axiomathes 29 (2):127-137.
    If the physical mind is located in quantized space of the brain then how does the physical mind become the self? This remains an unresolved problem. It can be restated as how mental representations or mental states get their informational contents, and of doing so in terms of the natural functions brain states have? We call these natural brain functions not teleosemantic functions, but rather teleological functions. This is because teleosemantics portrays mental representations which must have informational contents that track (...) “operational explanations of cognitive capacities” while teleological functions do not as they are hidden in quantized space, suggesting that mind is physical. Specifically teleonomic capacities have been built into us by natural selection, which naturally leads to a teleogical notion of function. Our claim is that teleofunctionality as unification of mental states has natural functions that carry intrinsic dispositions that may be broadly defined as ‘subjectivity’ or intrinsic information content of mental states. Mental states have intrinsic dispositions to change their functions, producing correspondences to the world that includes further layers of subtlety hidden in quantized space. How does intrinsic information self-replicate content in cases of mental misrepresentation? The putative special virtue of teleosemantics and its ability to give a theory of error through ‘uncertainty’ is discussed based on a teleological functionalist epistemology. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  12.  42
    Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding.Tanzila Saba,Mohammed Hazim Alkawaz,Amjad Rehman,Ghazali Sulong &Ali M.Ahmad -2014 -Journal of Intelligent Systems 23 (4):451-459.
    The rapid growth of covert activities via communications network brought about an increasing need to provide an efficient method for data hiding to protect secret information from malicious attacks. One of the options is to combine two approaches, namely steganography and compression. However, its performance heavily relies on three major factors, payload, imperceptibility, and robustness, which are always in trade-offs. Thus, this study aims to hide a large amount of secret message inside a grayscale host image without sacrificing its quality (...) and robustness. To realize the goal, a new two-tier data hiding technique is proposed that integrates an improved exploiting modification direction method and Huffman coding. First, a secret message of an arbitrary plain text of characters is compressed and transformed into streams of bits; each character is compressed into a maximum of 5 bits per stream. The stream is then divided into two parts of different sizes of 3 and 2 bits. Subsequently, each part is transformed into its decimal value, which serves as a secret code. Second, a cover image is partitioned into groups of 5 pixels based on the original EMD method. Then, an enhancement is introduced by dividing the group into two parts, namely k1 and k2, which consist of 3 and 2 pixels, respectively. Furthermore, several groups are randomly selected for embedding purposes to increase the security. Then, for each selected group, each part is embedded with its corresponding secret code by modifying one grayscale value at most to hide the code in a -ary notational system. The process is repeated until a stego-image is eventually produced. Finally, the χ2 test, which is considered one of the most severe attacks, is applied against the stego-image to evaluate the performance of the proposed method in terms of its robustness. The test revealed that the proposed method is more robust than both least significant bit embedding and the original EMD. Additionally, in terms of imperceptibility and capacity, the experimental results have also shown that the proposed method outperformed both the well-known methods, namely original EMD and optimized EMD, with a peak signal-to-noise ratio of 55.92 dB and payload of 52,428 bytes. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  23
    Rhetorical Fabric of the Traditional Arabic Qaṣīda in Its Formative Stages: A Comparative Study of the Rhetoric in Two Traditional Poems by ʿAlqama l-Faḥl and Bashshār b. Burd. By AliAhmad Hussein.Alexander M. Key -2021 -Journal of the American Oriental Society 139 (2).
    The Rhetorical Fabric of the Traditional Arabic Qaṣīda in Its Formative Stages: A Comparative Study of the Rhetoric in Two Traditional Poems by ʿAlqama l-Faḥl and Bashshār b. Burd. By AliAhmad Hussein. Abhandlungen für die Kunde des Morgenlandes, vol. 98. Wiesbaden: Harraaaowitz, 2015. Pp. xv + 292. €78.
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  14.  15
    Faith and ethics: the vision of the Ismaili Imamat.M. Ali Lakhani -2018 - New York: I.B. Tauris in association with the Institute of Ismaili Studies, London.
    The Ismaili Imam and Imamat -- Ethical foundations -- Tradition and modernity -- The ethos of modernism -- Pluralism and cosmopolitan ethics -- Cohesion within the Umma -- Islam and the West -- Cultivating and enabling environment -- Living the ethics of Islam -- Global convergence.
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  9
    Shīvahʹhā-yi naẓāratī-i amr bih maʻrūf va nahy az munkar dar guftār va sīrah-i Payāmbar-i Aʻẓam.Aḥmad Ghulām ʻAlī -2009 - Qum: Kitāb-i Ṭāhā.
    Religious life in Islam in the light of sayings and life of Prophet Muhammad, -632.
    Direct download  
     
    Export citation  
     
    Bookmark  
  16. Reason and Faith.M. KazimuddinAhmad -1958 -Pakistan Philosophical Journal 1 (3):77.
     
    Export citation  
     
    Bookmark  
  17. al-Falsafah wa-al-sulṭah, wa-maqālāt ukhrá.ʻAlī Fahmī Khashīm -1999 - Miṣrātah: al-Dār al-Jamāhīrīyah lil-Nashr wa-al-Tawzīʻ wa-al-Iʻlān.
     
    Export citation  
     
    Bookmark  
  18.  2
    A peep into the spiritual unconscious (a philosophical attempt to explain the phenomenon of dreams).M. M. Zuhurud'dinAhmad -1936 - [Bombay,: India printing works.
  19. Study of Perceptual Thresholds.M. U.Ahmad -1960 -Pakistan Philosophical Journal 3 (4):22.
     
    Export citation  
     
    Bookmark  
  20.  73
    Book Review:Ethical Knowledge. Joel J. Kupperman. [REVIEW]M. MobinAhmad -1973 -Ethics 83 (4):346-.
  21. Ikhvān al-Ṣafā.Maulavi Ikrām ʻAlī &Aḥrāz Naqvī (eds.) -1966
  22.  21
    Christian Feminist Theology in Pakistan.Ambreen Salahuddin,HumairaAhmad &Farman Ali -2022 -Feminist Theology 31 (1):9-19.
    This study is an effort to determine the status of Christian feminist theology in Pakistan and discusses the issues and challenges of patriarchal control of Church and religious, political, social, and minority issues faced by Christian women in Pakistan. It traces the history of Christian feminist theology in Pakistan as well. This qualitative study looks at important texts written on Christian theology, Christian feminism, and history of Church in Pakistan and also presents findings of in-depth interviews with women associated with (...) Church in Pakistan. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  6
    ʻAql: payāmbar-i rāstīn = Reason: the true prophet.Ghulām ʻAlī Malūl -2018 - Landan: Nashr-i Mihrī.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  33
    Egypt: Revolution 2011/2025. Dystopia, Utopia, and Political Fiction in Mustafa Al- Husayni’s Novel 2025 An-Nida Al-Akhir. [REVIEW]Marek M. Dziekan -2018 -International Studies. Interdisciplinary Political and Cultural Journal 21 (1):99-111.
    The article discusses the novel 2025. An-Nida al-Akhir [2025. The Last Call] written by a young Egyptian journalist and writer born in 1982 - Mustafa al-Husayni. The novel was published in early 2011, between the fall of Zayn al-Abidin Ibn Ali in Tunisia and of Husni Mubarak in Egypt. It describes a revolution against the regime of Jamal al-Mubarak, son of Husni, spurred by a group of young Egyptians. The story takes place in 2025 and anticipates the development of the (...) political situation in Egypt and the Middle East between 2011 and 2025 in a utopian/dystopian manner. Alongside Utopia byAhmad Khalid Tawfik and the poetry of Usama al-Abnubi and Abd ar-Rahman al-Abnudi, al-Husayni’s book is considered to be a forecast of the Arab Spring in Egypt. (shrink)
    No categories
    Direct download(3 more)  
     
    Export citation  
     
    Bookmark  
  25.  11
    Adjustable autonomy: A systematic literature review.S. A. Mostafa,M. S.Ahmad &A. Mustapha -2019 -Artificial Intelligence Review 51.
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  26.  75
    Self-interest, self-deception and the ethics of commerce.M. Ali Khan -2004 -Journal of Business Ethics 52 (2):189-206.
    On taking the common distinction between the legal and the ethical as a point of departure, and in an effort to understand Marshall's approach to self-interest, and thereby to his conception of an ethics of commerce, I read three of his essays in the light of some non-technical writings of Frank Hahn and three other Cambridge intellectuals. My larger project connects self-interest and self-deception to a possible ethics of theorizing in economics, and thereby to the ethics of the relationship between (...) the theorist and the theorized, the analyst and the analyzed. (shrink)
    Direct download(5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  201
    COVID-19, artificial intelligence, ethical challenges and policy implications.Muhammad Anshari,Mahani Hamdan,NorainieAhmad,Emil Ali &Hamizah Haidi -2023 -AI and Society 38 (2):707-720.
    As the COVID-19 outbreak remains an ongoing issue, there are concerns about its disruption, the level of its disruption, how long this pandemic is going to last, and how innovative technological solutions like Artificial Intelligence (AI) and expert systems can assist to deal with this pandemic. AI has the potential to provide extremely accurate insights for an organization to make better decisions based on collected data. Despite the numerous advantages that may be achieved by AI, the use of AI can (...) be perceived differently by society, where moral and ethical issues may be raised, especially in regards to accessing and exploiting public data gathered from social media platforms. To better comprehend the concerns and ethical challenges, utilitarianism and deontology were used as business ethics frameworks to explore the aforementioned challenges of AI in society. The framework assists in determining whether the AI’s deployment is ethically acceptable or not. The paper lays forth policy recommendations for public and private organizations to embrace AI-based decision-making processes to avoid data privacy violations and maintain public trust. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  33
    Konsep pendidikan Islam dalam perspektif abuddin nata.M. Ali Hamdan Mabrur -2014 -Epistemé: Jurnal Pengembangan Ilmu Keislaman 8 (2).
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  29.  46
    A hybrid particle swarm optimization and bacterial foraging for power system stability enhancement.S. M. Abd-Elazim &E. S. Ali -2016 -Complexity 21 (2):245-255.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  30. Kitāb Ithbāt al-ʻilal.Ḥakīm al-Tirmidhī &Muḥammad ibn ʻAlī -1998 - [al-Rabāṭ]: al-Mamlakah al-Maghribīyah, Jāmiʻat Muḥammad al-Khāmis, Kullīyat al-Ādāb wa-al-ʻUlūm al-Insānīyah bi-al-Rabāṭ. Edited by Khālid Zahrī.
     
    Export citation  
     
    Bookmark  
  31.  337
    Single Valued Neutrosophic HyperSoft Set based on VIKOR Method for 5G Architecture Selection.Florentin Smarandache,M. Ali Ahmed &Ahmed Abdelhafeez -2024 -International Journal of Neutrosophic Science 23 (2):42-52.
    This work introduces the framework for selecting architecture in 5G networks, considering various technological, performance, economic, and operational factors. With the emergence of 5G technology, the architecture selection process has become pivotal in meeting diverse requirements for ultra-high-speed connectivity, low latency, scalability, and diverse service demands. The evaluation comprehensively analyses different architecture options, including centralized, distributed, cloud-based, and virtualized architectures. Factors such as network performance, scalability, cost-effectiveness, security, and compatibility are considered within a multi-criteria decision-making framework. Findings reveal each architecture (...) option's diverse strengths and limitations, emphasizing the importance of aligning architectural choices with specific use cases, deployment scenarios, and business objectives. We used the concept of multi-criteria decision-making (MCDM) methodology to control the various criteria. We used the single-valued neutrosophic set (SVNS) to deal with vague and inconsistent data. The SVNS is integrated with the hyperSoft set. The proposed methodology uses a single-valued neutrosophic hyperSoft set (SVNHSS) to select the best 5G architecture. We used the VIKOR method as an MCDM method to rank the alternatives. The proposed framework provides stakeholders with a structured methodology to evaluate and prioritize architecture options, facilitating informed decision-making in the complex landscape of 5G network deployments. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  92
    Adaptive Event-Triggered Control for Complex Dynamical Network with Random Coupling Delay under Stochastic Deception Attacks.M. Mubeen Tajudeen,M. Syed Ali,Syeda Asma Kauser,Khanyaluck Subkrajang,Anuwat Jirawattanapanit &Grienggrai Rajchakit -2022 -Complexity 2022:1-12.
    This study concentrates on adaptive event-triggered control of complex dynamical networks with unpredictable coupling delays and stochastic deception attacks. The adaptive event-triggered mechanism is used to avoid the wasting of limited bandwidth. The probability of data communicated by the network is established by statistical properties and Bernoulli stochastic variables with an uncertain occurrence probability. Stability analysis based on Lyapunov–Krasovskii functional and the stability of the closed-loop system is guaranteed. Using the LMI technique, we obtain triggered parameters. To demonstrate the feasibility (...) and usefulness of the suggested methodology, two examples are shown. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  33.  4
    Mabānī-i akhlāq dar ʻirfān-i Ibn ʻArabī =.ʻAlī Riz̤ā Ārām -2021 - Qum: Pizhūhishgāh-i ʻUlūm va Farhang-i Islāmī, vābastah bih Daftar-i Tablīghāt-i Islāmī-i Ḥawzah-i ʻIlmīyah-i Qum. Edited by Muḥammad Bāqir Anṣārī & Muḥammad Ismāʻīl Anṣārī.
  34.  33
    Continuity postulates and solvability axioms in economic theory and in mathematical psychology: a consolidation of the theory of individual choice.Aniruddha Ghosh,M. Ali Khan &Metin Uyanık -2022 -Theory and Decision 94 (2):189-210.
    This paper presents four theorems that connect continuity postulates in mathematical economics to solvability axioms in mathematical psychology, and ranks them under alternative supplementary assumptions. Theorem 1 connects notions of continuity (full, separate, Wold, weak Wold, Archimedean, mixture) with those of solvability (restricted, unrestricted) under the completeness and transitivity of a binary relation. Theorem 2 uses the primitive notion of a separately continuous function to answer the question when an analogous property on a relation is fully continuous. Theorem 3 provides (...) a portmanteau theorem on the equivalence between restricted solvability and various notions of continuity under weak monotonicity. Finally, Theorem 4 presents a variant of Theorem 3 that follows Theorem 1 in dispensing with the dimensionality requirement and in providing partial equivalences between solvability and continuity notions. These theorems are motivated for their potential use in representation theorems. (shrink)
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  35.  29
    Some Aspects of the Solid State Nuclear Track Detectors.Jalal H. Baker,M. AyazAhmad,Syed Khalid Mustafa,Nursabah Sarikavakli,C. Victoria Anghel Drugarin &Josephine Muncho -2019 -Dialogo 6 (1):237-245.
    An attempt has been made to find some valuable information for particle detection with the help of Solid State Nuclear Track Detectors. The detector is characterized by a critical value of the energy-loss rate by the charged particle. Only those charged particles which give up energy exceeding the critical value alone can produce teachable tracks. The detection thresholds of nuclear track detectors can be specified in terms of their energy loss rates. The findings have been found within a good agreement (...) with the other works. (shrink)
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  36.  252
    The Associations of Dyadic Coping and Relationship Satisfaction Vary between and within Nations: A 35-Nation Study.Peter Hilpert,Ashley K. Randall,Piotr Sorokowski,David C. Atkins,Agnieszka Sorokowska,Khodabakhsh Ahmadi,Ahmad M. Aghraibeh,Richmond Aryeetey,Anna Bertoni,Karim Bettache,Marta Błażejewska,Guy Bodenmann,Jessica Borders,Tiago S. Bortolini,Marina Butovskaya,Felipe N. Castro,Hakan Cetinkaya,Diana Cunha,Oana A. David,Anita DeLongis,Fahd A. Dileym,Alejandra D. C. Domínguez Espinosa,Silvia Donato,Daria Dronova,Seda Dural,Maryanne Fisher,Tomasz Frackowiak,Evrim Gulbetekin,Aslıhan Hamamcıoğlu Akkaya,Karolina Hansen,Wallisen T. Hattori,Ivana Hromatko,Raffaella Iafrate,Bawo O. James,Feng Jiang,Charles O. Kimamo,David B. King,Fırat Koç,Amos Laar,Fívia De Araújo Lopes,Rocio Martinez,Norbert Mesko,Natalya Molodovskaya,Khadijeh Moradi,Zahrasadat Motahari,Jean C. Natividade,Joseph Ntayi,Oluyinka Ojedokun,Mohd S. B. Omar-Fauzee,Ike E. Onyishi,Barış Özener,Anna Paluszak,Alda Portugal,Ana P. Relvas,Muhammad Rizwan,Svjetlana Salkičević & Sarmány-Schul -2016 -Frontiers in Psychology 7.
  37.  47
    Does experience matter? Implications for community consultation for research in emergency settings.Victoria M. Scicluna,Mohammed K. Ali,Rebecca D. Pentz,David W. Wright &Neal W. Dickert -2017 -AJOB Empirical Bioethics 8 (2):75-81.
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  38.  28
    Meta-Characteristics of Islamic Ethics and Moral Consistency in Islamic Banking.Jawad Syed &M. GhufranAhmad -2021 -Business and Society 60 (8):2026-2059.
    This article presents a theory of how the consumption of Islamic products may promote morally consistent behavior over time. We identify and examine three unique meta-characteristics (MCs) of Islamic ethics: ubudiyah (subservience to God), akhirah (focus on the hereafter or the long-term), and tawado (being modest while doing an ethical act). In four experiments, we show that after consumption of an Islamic banking product, MCs produce moral consistency or repeat ethical behavior, which is one major objective of an ethical system. (...) We also show that the absence of MCs results in moral inconsistency, that is, unethical behavior follows earlier consumption of an Islamic banking product due to the mediating psychological mechanism of moral licensing. Hence, it is not only the enactment of general ethical practices, rather the enactment of ethical practices in the specific context set by the MCs through which Islamic ethical system promotes ethical conduct and prevents unethical conduct. The findings have implications for Islamic ethical system and Islamic banking. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  39. Dr.Ahmad Aliakbar Mesgari.Ahmad Ali Akbar Mesgari &Hamid Gaesmi -2011 -Journal of Philosophical Investigations at University of Tabriz 5 (8):191-235.
    The aim of present paper is to introduce the concept of ‘expressive perception’ in Ernst Cassirer’s philosophical mythology. Having Cited Dorothy Emmet’s methodological objection, the author, by recalling Kantian aspect of Cassirer’s thought and referring to the concept of ‘expressive perception’, would make an attempt to reply on his part: according to Cassirer, this level of perceptive experience is the origin of the mythical form of thinking as a whole and, at the same time, is the original and irreducible altogether. (...) Thus, taking ‘mythical thought’ as an independent form of thinking, beside the ‘critical-empirical’ form of thinking, is, for one thing, completely cogent; for another, due to its dependency upon expressive form of perception, mythical thought would never be quite omitted, rather, keep living latently beneath the skin of mental life. In addition, author explains how much Cassirer owes, regarding to the concept of ‘expressive form of perception’, to Max Scheler. Avoiding to elaborate on Scheler’s detailed argument, Cassirer relies strongly on the consequences Scheler draws from his considerations in his work ‘Wesen und Formen der Sympathie’. Restating Scheler’s argument briefly should help in understanding Cassirer’s idea. (shrink)
    No categories
     
    Export citation  
     
    Bookmark  
  40.  19
    Galen: Über die Anatomie der Nerven.Ahmad M. Al-Dubayan -2000 - De Gruyter.
    Die Reihe Islamkundliche Untersuchungen wurde 1969 im Klaus Schwarz Verlag begründet und hat sich zu einem der wichtigsten Publikationsorgane der Islamwissenschaft in Deutschland entwickelt. Die über 330 Bände widmen sich der Geschichte, Kultur und den Gesellschaften Nordafrikas, des Nahen und Mittleren Ostens sowie Zentral-, Süd- und Südost-Asiens.
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  41.  24
    A Relevance–Theoretical Account of Three Arabic Pragmatic Operators of Concession in a Political Discourse.Marwan Jarrah,Ahmad M. Abu Dalu &Rasheed S. Al-Jarrah -2015 -Lodz Papers in Pragmatics 11 (1):51-76.
    The present study aims at explaining how the Relevance Theory could be a viable approach to weigh up the main functions of some concessive Pragmatic Operators in Jordanian Arabic at the production and interpretation levels. A sample of twenty-two speeches delivered by members of the Jordanian Parliament the 16th was randomly selected for scrutiny. Three POs detected in their speeches were analyzed at the token level in light of three elementary RT assumptions about discourse connectives in general, namely connectivity, the (...) conceptual-procedural distinction, and monosemy. The major finding of this study was that concessive POs, as a subset of contrastives, are used to optimize relevance: highlight certain dimensions and/or suppress others of the scenario to the background. However, the point of departure from possibly all previous treatments is that the speakers, as politicians, still used them more strategically because total ambiguity resolution should not be a viable alternative in social settings laden with politics. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  31
    Islamic Perspectives on Polygenic Testing and Selection of IVF Embryos (PGT-P) for Optimal Intelligence and Other Non–Disease-Related Socially Desirable Traits.A. H. B. Chin,Q. Al-Balas,M. F.Ahmad,N. Alsomali &M. Ghaly -2024 -Journal of Bioethical Inquiry 21 (3):441-448.
    In recent years, the genetic testing and selection of IVF embryos, known as preimplantation genetic testing (PGT), has gained much traction in clinical assisted reproduction for preventing transmission of genetic defects. However, a more recent ethically and morally controversial development in PGT is its possible use in selecting IVF embryos for optimal intelligence quotient (IQ) and other non–disease-related socially desirable traits, such as tallness, fair complexion, athletic ability, and eye and hair colour, based on polygenic risk scores (PRS), in what (...) is referred to as PGT-P. Artificial intelligence (AI) and machine learning–based analysis of big data sets collated from genome sequencing of specific human ethnic populations can be used to estimate an individual embryo’s likelihood of developing such multifactorial traits by analysing the combination of specific genetic variants within its genome. Superficially, this technique appears compliant with Islamic principles and ethics. Because there is no modification of the human genome, there is no tampering with Allah’s creation (taghyīr khalq Allah). Nevertheless, a more critical analysis based on the five maxims of Islamic jurisprudence (qawa'id fiqhiyyah) that are often utilized in discourses on Islamic bioethics, namely qaṣd (intention), yaqın̄ (certainty), ḍarar (injury), ḍarūra (necessity), and `urf (custom), would instead reveal some major ethical and moral flaws of this new medical technology in the selection of non–disease-related socially desirable traits, and its non-compliance with the spirit and essence of Islamic law (shariah). Muslim scholars, jurists, doctors, and biomedical scientists should debate this further and issue a fatwa on this new medical technology platform. (shrink)
    Direct download(3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  43.  30
    Maulana Ashraf Ali Thanvi: his views on religious and moral philosophy, and tasawwuf.Ahmad Ali Khawaja -1989 - Islamabad, Pakistan: Pakistan Hijra Council.
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. Relationship between STS approach, scientific literacy, and achievement in biology.N. M. Mbajiorgu &A. Ali -2003 -Science Education 87 (1):31-39.
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  45.  48
    (2 other versions)Ethical challenges in research on post-abortion care with adolescents: experiences of researchers in Zambia.Joseph M. Zulu,Joseph Ali,Kristina Hallez,Nancy E. Kass,Charles Michelo &Adnan A. Hyder -2018 -Tandf: Global Bioethics:1-16.
    No categories
    Direct download(8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  21
    Advice for Callow Jurists and Gullible Mendicants on Befriending Emirs.'Abd Al-Wahhab IbnAhmad Ibn 'Ali Al-Sha'rani -2017 - Yale University Press.
    _This mirror for princes sheds light on the relationship between spiritual and political authority in early modern Egypt_ This guide to political behavior and expediency offers advice to Sufi shaykhs, or spiritual guides, on how to interact and negotiate with powerful secular officials, judges, and treasurers, or emirs. Translated into English for the first time, it is a unique account of the relationship between spiritual and political authority in late medieval / early modern Islamic society.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  24
    Designing of a Simulation Tool for the Performance Analysis of Hybrid Data Center Networks.MuhibAhmad,Farrukh Zeeshan Khan,Zeshan Iqbal,MuneerAhmad,Ihsan Ali,Sultan S. Alshamrani,Muhammad Talha &Muhammad Ahsan Raza -2021 -Complexity 2021:1-13.
    Data center technology changes the mode of computing. Traditional DCs consist of a single layer and only have Ethernet connections among switches. Those old-fashioned DCs cannot fulfill the high resource demand compared with today’s DCs. The architectural design of the DCs is getting substantial importance and acting as the backbone of the network because of its essential feature of supporting and maintaining the rapidly increasing Internet-based applications which include search engines and social networking applications. Every application has its parameters, like (...) latency and blocking in the DC network. Every data center network has its specialized architecture. It has a specific arrangement of layers and switches, which increase or decrease the DC network’s efficiency. We develop a simulation tool that comprises two different DC architectures: basic tree architecture and c-Through architecture. Using this simulation, we analyze the traffic behavior and the performance of the simulated DCN. Our main purpose is to focus on mean waiting time, load, and blocking with respect to the traffic within the DCN. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  48.  25
    Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q -Rung Orthopair Fuzzy COPRAS Method.Sumera Naz,Muhammad Akram,Mohammed M. Ali Al-Shamiri &Muhammad Ramzan Saeed -2022 -Complexity 2022:1-27.
    In recent years, network security has become a major concern. Using the Internet to store and analyze data has become an integral aspect of the production and operation of many new and traditional enterprises. However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. This research introduces a novel decision-making method utilizing the 2-tuple linguistic complex q-rung orthopair fuzzy numbers to tackle this issue. (...) We propose the 2TLCq-ROF concept by combining the complex q-rung orthopair fuzzy set with 2-tuple linguistic terms, including the fundamental definition, operational rules, scoring, and accuracy functions. Aggregation operators are the fundamental mathematical approach used to combine various inputs into a single output. Taking into account the interaction between the attributes, we develop the 2TLCq-ROF Hamacher operators by using the innovative operational rules. These operators include the 2TLCq-ROFH weighted average, 2TLCq-ROFH ordered weighted average, 2TLCq-ROFH hybrid average, 2TLCq-ROFH weighted geometric, 2TLCq-ROFH ordered weighted geometric, and 2TLCq-ROFH hybrid geometric operators. In addition, we talk about the properties of 2TLCq-ROFH operators such as idempotency, commutativity, monotonicity, and boundedness and also examine their spatial cases. To tackle the problems of the 2TLCq-ROF multiattribute group decision-making environment, we develop a novel approach according to the COPRAS model. Finally, to validate the feasibility of the given strategy, we employ a quantitative example related to select the best network security service provider. In comparison with existing approaches, the developed decision-making algorithm is most extensively used and reduces the loss of information. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  49.  60
    Entanglement of a Single Spin-1 Object: An Example of Ubiquitous Entanglement. [REVIEW]Sinem Binicioǧlu,M. Ali Can,Alexander A. Klyachko &Alexander S. Shumovsky -2007 -Foundations of Physics 37 (8):1253-1277.
    Using a single spin-1 object as an example, we discuss a recent approach to quantum entanglement. [A.A. Klyachko and A.S. Shumovsky, J. Phys: Conf. Series 36, 87 (2006), E-print quant-ph/0512213]. The key idea of the approach consists in presetting of basic observables in the very definition of quantum system. Specification of basic observables defines the dynamic symmetry of the system. Entangled states of the system are then interpreted as states with maximal amount of uncertainty of all basic observables. The approach (...) gives purely physical picture of entanglement. In particular, it separates principle physical properties of entanglement from inessential. Within the model example under consideration, we show relativity of entanglement with respect to dynamic symmetry and argue existence of single-particle entanglement. A number of physical examples are considered. (shrink)
    Direct download(7 more)  
     
    Export citation  
     
    Bookmark  
  50.  226
    Marital Satisfaction, Sex, Age, Marriage Duration, Religion, Number of Children, Economic Status, Education, and Collectivistic Values: Data from 33 Countries.Piotr Sorokowski,Ashley K. Randall,Agata Groyecka,Tomasz Frackowiak,Katarzyna Cantarero,Peter Hilpert,Khodabakhsh Ahmadi,Ahmad M. Alghraibeh,Richmond Aryeetey,Anna Bertoni,Karim Bettache,Marta Błażejewska,Guy Bodenmann,Tiago S. Bortolini,Carla Bosc,Marina Butovskaya,Felipe N. Castro,Hakan Cetinkaya,Diana Cunha,Daniel David,Oana A. David,Alejandra C. Domínguez Espinosa,Silvia Donato,Daria Dronova,Seda Dural,Maryanne Fisher,Aslıhan Hamamcıoğlu Akkaya,Takeshi Hamamura,Karolina Hansen,Wallisen T. Hattori,Ivana Hromatko,Evrim Gulbetekin,Raffaella Iafrate,Bawo James,Feng Jiang,Charles O. Kimamo,Fırat Koç,Anna Krasnodębska,Amos Laar,Fívia A. Lopes,Rocio Martinez,Norbert Mesko,Natalya Molodovskaya,Khadijeh Moradi Qezeli,Zahrasadat Motahari,Jean C. Natividade,Joseph Ntayi,Oluyinka Ojedokun,Mohd S. B. Omar-Fauzee,Ike E. Onyishi,Barış Özener,Anna Paluszak,Alda Portugal,Anu Realo,Ana P. Relvas,Muhammad Rizwan,Agnieszka L. Sabiniewicz & Salkič -2017 -Frontiers in Psychology 8.
1 — 50 / 974
Export
Limit to items.
Filters





Configure languageshere.Sign in to use this feature.

Viewing options


Open Category Editor
Off-campus access
Using PhilPapers from home?

Create an account to enable off-campus access through your institution's proxy server or OpenAthens.


[8]ページ先頭

©2009-2025 Movatter.jp