نتایج جستجو برای: ghayyem custodian

تعداد نتایج: 236  

Journal: :پژوهش های فقهی 0
سیدجواد موسوی زاده عضو هیأت علمی دانشگاه پیام نور قم مهدی ساجدی دانشجوی کارشناسی ارشد فقه و مبانی حقوق اسلامی، دانشگاه پیام نور قم

this research considers the subject of supervision and protection of family and expresses the islamic jurisprudence point of view in this regard. the followings are inferred from the jurisprudential reasons: a. terms such as ghavvam, ghayyem (custodian), raei (protector) that are used in reasons, express that in islamic point of view, superiority and protection of family mean to protect one’s w...

2007
James K Batcheller Femke Reitsma Bruce M Gittings

The role metadata have played in the management of geospatial datasets has been widely documented (Göbel and Lutze, 1998; Kim, 1999; Tsou, 2002; Limbach et al., 2004). Often employed by institutions to organise, maintain and document their geographic resources internally, metadata can also provide a vehicle for exposing marketable data assets externally when contributed to geospatial exchange i...

2009
Chiu Chuang

The National Survey of Families and Households (NSFH) is a prominent longitudinal study on family life in the United States. NSFH has been funded by the National Institute of Child Health and Human Development (NICHD) and National Institute on Aging (NIA). The total amount of federal grant money for NSFH is 14.5 million dollars. Three waves of surveys were conducted in 1987-1988, 19921994 and 2...

Journal: :Benefits quarterly 2012
Whitney R Johnson

Employers implementing a health savings account (HSA) program face a shared compliance burden with their employees. The law dictates that all HSAs are individual accounts that must be opened by an Internal Revenue Service (IRS)-approved custodian or trustee. The individual account features combined with a required third-party custodian place much of the compliance burden for HSAs on the employe...

2005
Joseph K. Liu Patrick P. Tsang Duncan S. Wong Robert W. Zhu

We introduce the notion of Universal Custodian-Hiding Verifiable Encryption (UCH-VE) and propose a scheme of this type for discrete logarithms. A UCH-VE scheme allows an encryptor to designate t out of a group of n users and prepare a publicly verifiable ciphertext in such a way that any k of these t designated users can recover the message. The values of k and t are set arbitrarily by the encr...

Journal: :The sociological review 2021

Journal: :Pediatrics 2000
S L Bahna

Opinions expressed in commentaries are those of the authors and not necessarily those of the American Academy of Pediatrics or its Committees. Commentaries are not peer-reviewed. Pediatrics 2000;105(5). URL: http://www.pediatrics.org/cgi/content/full/105/5/ e71; hypersensitivity pneumonitis. ABBREVIATIONS. HP, hypersensitivity pneumonitis; IgG, immunoglobulin G. In this month’s Pediatrics elect...

2006
Scott Buffett T. A. Kosa

Health information custodians and network providers within the circle of care for a patient must meet certain legal obligations regarding the collection, access and disclosure of personal health information. We present a framework for consent and risk management that can be used to help manage a patient’s consent for releasing personal health information, and analyze the risk involved in handli...

Journal: :JNCI: Journal of the National Cancer Institute 2006

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید