نتایج جستجو برای: rahim khan
تعداد نتایج: 4737 فیلتر نتایج به سال:
having a look at the history of iran, one can realize that, the foundation of governorship in this country was based on two factors, religious belief and tradition, as the safavids came to power according to the former category and ruled for more than two centuries. the fall of the safavid dynasty not only ended their ruling, but decreased their holiness drastically. therefore, from then on the...
© 2017 AESS Publications. All Rights Reserved. Note: The editorial team of AJEM has Retracted the article on the request of corresponding author: Mr. Zeeshan Khan, Pakistan Institute of Development Economics (PIDE), Islamabad, Pakistan. Mr. Zeeshan Khan has requested to retract the article from the website due to his dishonesty. The editorial team has retracted the article as found unethical re...
Mohammad Hasan Khan ruled over Shaki at the same time as the rivalry between the Ottoman and Russian governments in the Caucasus region. In those days, the Ottomans established political relationships with local heads such as the ruler of Shaki with the aim of countering the influence and domination of the Russians in the Caucasus. Mohammad Hasan Khan had been also inclined to the Ottomans due ...
Employing recent results of M. Ali Khan we provide an infinitedimensional version of the Fatou Lemma, which includes as a special case the result of Khan and Majumdar [15].
Liaqat Ali 1,2, Saeed Islam 1, Taza Gul 1, Ilyas Khan 3, L. C. C. Dennis 4,∗ , Waris Khan5 and Aurangzeb Khan 6 1 Department of Mathematics, Abdul Wali Khan University, Mardan 23200, KPK, Pakistan; [email protected] (L.A.); [email protected] (S.I.); [email protected] (T.G.) 2 Department of Electrical Engineering, CECOS University, Peshawer 25000, KPK, Pakistan 3 Department of Mathem...
Biometric-based authentication systems are widely deployed for person identification. Recently, an improved scheme for flexible biometrics remote user authentication was proposed by Khan and Zhang. In this paper, we demonstrate that Khan-Zhang’s scheme is still vulnerable to the following two attacks: (1) It is insecure to parallel session attack in which an adversary without knowing a legal us...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید