1,355 research outputs found

    University of Malaya Research Bulletin, Volume 18, Number 2, 2017

    Get PDF
    Previously known as IPPP UM Research Bulleti

    Trajectories in the Development of Islamic Theological Thought: the Synthesis of Kalam

    Get PDF
    The field of Islamic theology (kalam) is not merely a receptacle for the presentation of the creedal statements and doctrinal catechisms of Islam; it derives its raison d’être not only from the articulation and elucidation of the doctrines of faith, but also by means of its rational and painstaking explication of dogma. While many of the dogmatic statements expressed in Islamic theology naturally emanate from a traditional substratum, countless more are the result of dialectical discussions as theologians expounded upon abstract constructs of religious dogma. Recent academic research is exploring the history, trends, and conceptual achievements behind the Islamic experiment with theology, providing insights into the tradition’s ability to integrate, refine, and expand theological constructs. Scholars are also concerned with issues such as origins, authenticity, and ascription, although such matters are not deflecting attention from the rich stock of resources and materials kalam has to offer

    MAPPING HALAL COSMETICS RESEARCH: A BIBLIOMETRIC ANALYSIS

    Get PDF
    This study conducted a bibliometric analysis of research related to halal cosmetics. Data from 2006 to 2020 related to halal cosmetics were extracted from the Scopus database, providing a sample of 104 documents. The documents were then examined using the bibliographic network visualization instrument VOS viewer and R for text mining and the findings were presented in the form of a conceptual structure map and word clouds. We identified the most productive authors, journals, institutions, and countries. The results showed that Malaysia and Indonesia are the overall leaders in publications. The Journal of Islamic Marketing and International Journal of Supply Chain are the most influential journals in the field. These findings will provide scholars a comprehension of the halal cosmetics field and act as a guide for future research

    A review and open issues of diverse text watermarking techniques in spatial domain

    Get PDF
    Nowadays, information hiding is becoming a helpful technique and fetches more attention due to the fast growth of using the internet; it is applied for sending secret information by using different techniques. Watermarking is one of major important technique in information hiding. Watermarking is of hiding secret data into a carrier media to provide the privacy and integrity of information so that no one can recognize and detect it's accepted the sender and receiver. In watermarking, many various carrier formats can be used such as an image, video, audio, and text. The text is most popular used as a carrier files due to its frequency on the internet. There are many techniques variables for the text watermarking; each one has its own robust and susceptible points. In this study, we conducted a review of text watermarking in the spatial domain to explore the term text watermarking by reviewing, collecting, synthesizing and analyze the challenges of different studies which related to this area published from 2013 to 2018. The aims of this paper are to provide an overview of text watermarking and comparison between approved studies as discussed according to the Arabic text characters, payload capacity, Imperceptibility, authentication, and embedding technique to open important research issues in the future work to obtain a robust method

    Signature Identification in the Light of Science and Experience

    Get PDF
    The Daubert case encourages judges to ask whether forensic identification expertise is valid, not merely whether it is accepted among practitioners. The example of DNA has shown what real science can do, and has highlighted the shortcomings of other forms of forensic science. The combined effect of Daubert and DNA has contributed to skepticism about forensic identification techniques. This skepticism may lead to exclusion of evidence or to procedural limits aimed at making the expertise more trustworthy or preventing it from having undue weight. I will discuss these two alternatives in the context of the specific forensic problem of signature authentication expertise of forensic document examiners (FDEs), after first considering general principles applicable to experience-based expertise
    corecore