Results for 'Ali Fath Taheri'

351 found
Order:
  1. The critique of religion as political critique: Mīrzā Fatḥ ʿAlī Ākhūndzāda's pre-Islamic xenology.Rebecca Gould - 2016 - Intellectual History Review 26 (2):171-184.
    (Awarded the International Society for Intellectual History’s Charles Schmitt Prize) Mīrzā Fatḥ 'Alī Ākhūndzāda’s Letters from Prince Kamāl al-Dawla to the Prince Jalāl al-Dawla (1865) is often read as a Persian attempt to introduce European Enlightenment political thought to modern Iranian society. This essay frames Ākhūndzāda’s text within a broader intellectual tradition. I read Ākhūndzāda as a radical reformer whose intellectual ambition were shaped by prior Persian and Arabic endeavors to map the diversity of religious belief and to critically assess (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Manhaj Al-Hafiz Ibn Hajar Al- Asqalani Fi Al- Aqidah Min Khilala Kitabihi "Fath Al-Bari" Risalah Ilmiyah.Muhammad Ishaq Kandu - 1998 - Maktabat Al-Rushd.
    Download  
     
    Export citation  
     
    Bookmark  
  3.  99
    The Universal Element of the Evolutionary and Technological Mind and the Return of its Enigmatic Aspects.OmidReza Taheri - manuscript
    The scientific understanding of the mind and consciousness is limited by the lack of knowledge on the missing pieces of this complex puzzle. However, the philosophy and the current physical and material sciences have made great strides in understanding the evolutionary processes of the mind, from the metaphysical and Meta universal layers to the physical, chemical, biological, psychological, and social layers. The complexity of the human mind and the subjective nature of consciousness make it difficult to define and study empirically. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. To Code or Not to Code: When and How to Use Network Coding in Energy Harvesting Wireless Multi-Hop Networks.Taheri Javan Nastooh - 2024 - IEEE Access 12:22608-22623.
    The broadcast nature of communication in transmission media has driven the rise of network coding’s popularity in wireless networks. Numerous benefits arise from employing network coding in multi-hop wireless networks, including enhanced throughput, reduced energy consumption, and decreased end-to-end delay. These advantages are a direct outcome of the minimized transmission count. This paper introduces a comprehensive framework to employ network coding in these networks. It refines decision-making at coding and decoding nodes simultaneously. The coding-nodes employ optimal stopping theory to find (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. IZM-DSR: A New Zone-Disjoint Multi-path Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Third Uksim European Symposium on Computer Modeling and Simulation 1 (1):511-516.
    Some of multi-path routing algorithms in MANETs use multiple paths simultaneously. These algorithms can attempt to find node-disjoint to achieve higher fault tolerance. By using node-disjoint paths, it is expected that the end-to-end delay in each case should be independent of each other. However, because of natural properties and medium access mechanisms in ad hoc networks, such as CSMA/CA, the endto-end delay between any source and destination depends on the pattern of communication in the neighborhood region. In this case some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  17
    LBAODV: a new load balancing multipath routing algorithm for mobile ad hoc networks.Nastooh Taheri Javan - 2008 - 2008 6Th National Conference on Telecommunication Technologies 1 (1):344-349.
    An ad hoc network is comprised of mobile hosts without any wired infrastructure support. Multipath routing allows the establishment of multiple paths between a source and a destination. It distributes traffic among multiple paths instead of routing all the traffics along a single path. In this paper, we propose a new multipath routing protocol that uses all discovered paths simultaneously for transmitting data, by using this approach data packets are balanced over discovered paths and energy consumption is distributed across many (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  20
    Energy & throughput tradeoff in WSN with network coding.Nastooh Taheri Javan - 2013 - 2013 International Conference on Ict Convergence (Ictc) 1 (1):304-309.
    Recently, network coding emerged as a promising technology that can provide significant improvements in throughput and energy efficiency of wireless networks. Many implementations of network coding in wireless networks, such as COPE, encourage nodes to overhear to improve the coding opportunities so that they can create better opportunities for coding at the transmitter node through overhearing more packages. In this paper, we have shown that all overheard packets are not necessarily useful for coding; thus, a node can go to sleep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. To overhear or not to overhear: a dilemma between network coding gain and energy consumption in multi-hop wireless networks.Nastooh Taheri Javan - 2019 - Wireless Networks 25 (7):4097-4113.
    Any properly designed network coding technique can result in increased throughput and reliability of multi-hop wireless networks by taking advantage of the broadcast nature of wireless medium. In many inter-flow network coding schemes nodes are encouraged to overhear neighbour’s traffic in order to improve coding opportunities at the transmitter nodes. A study of these schemes reveal that some of the overheard packets are not useful for coding operation and thus this forced overhearing increases energy consumption dramatically. In this paper, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Eigth Ieee/Acis International Conference on Computer and Information Science 1 (1):852-857.
    A common characteristic of all popular multi-path routing algorithms in Mobile Ad-hoc networks, such as AOMDV, is that the end to end delay is reduced by utilization of parallel paths. The competition between the neighboring nodes for obtaining a common channel in those parallel paths is the reason for end to end delay increment. In fact, due to medium access mechanism in wireless networks, such as CSMA/CA, data transmissions even through two Node Disjoint paths are not completely independent and each (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Mobility Enhancement of Patients Body Monitoring based on WBAN with Multipath Routing.Nastooh Taheri Javan - 2014 - 2Nd International Conference on Information and Communication Technology 1 (1):127-132.
    —One of the promising applications of wireless sensor networks (WSNs) is monitoring of the human body for health concerns. For this purpose, a large number of small sensors are implanted in the human body. These sensors altogether provide a network of wireless sensors (WBANs) and monitor the vital signs and signals of the human body; these sensors will then send this information to the doctor. The most important application of the WBAN is the implementation of the monitoring network for patient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  23
    Enhancing Malicious Code Detection With Boosted N-Gram Analysis and Efficient Feature Selection.Nastooh Taheri Javan - 2024 - IEEE Access 12:147400-147421.
    A fundamental challenge in virology research lies in effectively detecting malicious code. N-gram analysis has become a cornerstone technique, but selecting the most informative features, especially for longer n-grams, remains crucial for efficient detection. This paper addresses this challenge by introducing a novel feature extraction method that leverages both adjacent and non-adjacent bi-grams, providing a richer set of information for malicious code identification. Additionally, we propose a computationally efficient feature selection approach that utilizes a genetic algorithm combined with Boosting principles. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  90
    Using Zone-Disjoint Multi-Path Routing Algorithm for Video Transmission over Ah-Hoc Networks.Nastooh Taheri Javan - 2009 - 4Th International Conference on Computer Sciences and Convergence Information Technology 1 (1):877-882.
    Finding multi-path routes in ad hoc networks due to their grid topology seems to be a trivial task, but because of CSMA/CA effects in these networks found paths are not completely disjoint unless an appropriate algorithm have taken into account. If such an algorithm provided and designed carefully it could improve multi-path video transmission over these kinds of networks. By using node-disjoint paths, it is expected that the end-to-end delay and BER in each case should be independent of each other. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of the intelligent tutoring systems (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  14. The Experience of Beauty or Love as a Religious Experience in Plato.Mohammadreza Bayat & Alireza Taheri - 2018 - Religions and Mysticism 51 (2):182-202.
    The issue of the article is whether the experience of Beauty or love in Plato can be considered as some kind of religious experience. First, the article describes different views on the religious experience. Then it deals with Plato's view on beauty and love and their relationship. finally, demonstrating the divinity of Beauty in Plato, the article shows that if religious experience is an encounter of the experiencer with the divine being, or in religious term God, that manifests itself in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  19
    To‐send‐or‐not‐to‐send: An optimal stopping approach to network coding in multi‐hop wireless networks.Nastooh Taheri Javan - 2018 - International Journal of Communication Systems 31 (2):e3438.
    Network coding is all about combining a variety of packets and forwarding as much packets as possible in each transmission operation. The network coding technique improves the throughput efficiency of multi‐hop wireless networks by taking advantage of the broadcast nature of wireless channels. However, there are some scenarios where the coding cannot be exploited due to the stochastic nature of the packet arrival process in the network. In these cases, the coding node faces 2 critical choices: forwarding the packet towards (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  14
    Reducing End-to-End Delay in Multi-path Routing Algorithms for Mobile Ad Hoc Networks.Nastooh Taheri Javan - 2007 - Mobile Ad-Hoc and Sensor Networks 1 (1):715–724.
    Some of the routing algorithms in mobile ad hoc networks use multiple paths simultaneously. These algorithms can attempt to find node-disjoint paths to achieve higher fault tolerance capability. By using node-disjoint paths, it is expected that the end-to-end delay in each path should be independent of each other. However, because of natural properties of wireless media and medium access mechanisms in ad hoc networks, the end-to-end delay between any source and destination depends on the pattern of communication in the neighborhood (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  13
    IEEE 802.15.4.e TSCH-Based Scheduling for Throughput Optimization: A Combinatorial Multi-Armed Bandit Approach.Nastooh Taheri Javan - 2019 - IEEE Sensors Journal 20 (1):525-537.
    In TSCH, which is a MAC mechanism set of the IEEE 802.15.4e amendment, calculation, construction, and maintenance of the packet transmission schedules are not defined. Moreover, to ensure optimal throughput, most of the existing scheduling methods are based on the assumption that instantaneous and accurate Channel State Information (CSI) is available. However, due to the inevitable errors in the channel estimation process, this assumption cannot be materialized in many practical scenarios. In this paper, we propose two alternative and realistic approaches. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  12
    Increasing coding opportunities using maximum-weight clique.Nastooh Taheri Javan - 2013 - 2013 5Th Computer Science and Electronic Engineering Conference (Ceec) 1 (1):168-173.
    Network coding is used to improve the throughput of communication networks. In this technique, the intermediate nodes mix packets to increase the information content of each transmission. For each flow, a coding pattern is defined as a set of flows that can be coded together. Finding a suitable coding pattern is a challenge due to much complexity. In this paper, we propose an algorithm to find a suitable coding pattern in intermediate nodes by mapping this problem onto maximum-weight clique. Also, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Algorithmic Bias and Risk Assessments: Lessons from Practice.Ali Hasan, Shea Brown, Jovana Davidovic, Benjamin Lange & Mitt Regan - 2022 - Digital Society 1 (1):1-15.
    In this paper, we distinguish between different sorts of assessments of algorithmic systems, describe our process of assessing such systems for ethical risk, and share some key challenges and lessons for future algorithm assessments and audits. Given the distinctive nature and function of a third-party audit, and the uncertain and shifting regulatory landscape, we suggest that second-party assessments are currently the primary mechanisms for analyzing the social impacts of systems that incorporate artificial intelligence. We then discuss two kinds of as-sessments: (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. The Reliability of Memory: An Argument from the Armchair.Ali Hasan - 2021 - Episteme 18 (2):142-159.
    The “problem of memory” in epistemology is concerned with whether and how we could have knowledge, or at least justification, for trusting our apparent memories. I defend an inductive solution—more precisely, an abductive solution—to the problem. A natural worry is that any such solution would be circular, for it would have to depend on memory. I argue that belief in the reliability of memory can be justified from the armchair, without relying on memory. The justification is, roughly, that my having (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Davidson on Self‐Knowledge: A Transcendental Explanation.Ali Hossein Khani - 2021 - Southern Journal of Philosophy 59 (2):153-184.
    Davidson has attempted to offer his own solution to the problem of self-knowledge, but there has been no consensus between his commentators on what this solution is. Many have claimed that Davidson’s account stems from his remarks on disquotational specifications of self-ascriptions of meaning and mental content, the account which I will call the “Disquotational Explanation”. It has also been claimed that Davidson’s account rather rests on his version of content externalism, which I will call the “Externalist Explanation”. I will (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  22. Adaptive Channel Hopping for IEEE 802.15. 4 TSCH-Based Networks: A Dynamic Bernoulli Bandit Approach.Taheri Javan Nastooh - 2021 - IEEE Sensors Journal 21 (20):23667-23681.
    In IEEE 802.15.4 standard for low-power low-range wireless communications, only one channel is employed for transmission which can result in increased energy consumption, high network delay and poor packet delivery ratio (PDR). In the subsequent IEEE 802.15.4-2015 standard, a Time-slotted Channel Hopping (TSCH) mechanism has been developed which allows for a periodic yet fixed frequency hopping pattern over 16 different channels. Unfortunately, however, most of these channels are susceptible to high-power coexisting Wi-Fi signal interference and to possibly some other ISM-band (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Classical Foundationalism and Bergmann’s Dilemma for Internalism.Ali Hasan - 2011 - Journal of Philosophical Research 36:391-410.
    In Justification without Awareness (2006), Michael Bergmann presents a dilemma for internalism from which he claims there is “no escape”: The awareness allegedly required for justification is either strong awareness, which involves conceiving of some justification-contributor as relevant to the truth of a belief, or weak awareness, which does not. Bergmann argues that the former leads to an infinite regress of justifiers, while the latter conflicts with the “clearest and most compelling” motivation for endorsing internalism, namely, that for a belief (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  24. EDAP: An Efficient Data-Gathering Protocol for Wireless Sensor Networks.Nastooh Taheri Javan - 2011 - International Journal of Ad Hoc and Ubiquitous Computing 7 (1):12-24.
    Directed Diffusion (DD) uses data aggregation to suppress data overhead however there is no guarantee that paths from nearby sources join after a few hops. In this paper, an efficient data-gathering protocol (EDAP) is proposed to address this problem by using a Virtual Sink (VS) node nearby the sources, which plays the role of sink node and broadcasts local interest messages and routes gathered data toward destination. Also, multiple paths are constructed between VS and the sink node, which leads to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Skepticism and Spatial Objects.Ali Hasan - 2018 - International Journal for the Study of Skepticism 8 (2):73-95.
    I defend external world realism. I assume that the principle of inference to the best explanation is justified: roughly, a hypothesis that provides a better explanation of the total evidence is more probable than one that does not. I argue that the existence of a world of spatial objects provides a systematic explanation of the spatial contents of visual experience, and that it provides a better explanation than traditional skeptical hypotheses. This paper thus pursues the explanationist strategy of Laurence BonJour (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  26. Internalist Foundationalism and the Sellarsian Dilemma.Ali Hasan - 2013 - Res Philosophica 90 (2):171-184.
    According to foundationalism, some beliefs are justified but do not depend for their justification on any other beliefs. According to access internalism, a subject is justified in believing some proposition only if that subject is aware of or has access to some reason to think that the proposition is true or probable. In this paper I discusses a fundamental challenge to internalist foundationalism often referred to as the Sellarsian dilemma. I consider three attempts to respond to the dilemma – phenomenal (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  27.  85
    IMPROVING ENERGY EFFICIENCY IN MANETS BY MULTI-PATH ROUTING.Nastooh Taheri Javan - 2013 - International Journal of Wireless and Mobile Networks 5 (1):163-176.
    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions among neighboring nodes, in order to obtain the joint channel in adjacent paths. The represented algorithm in this study tries to discover the distinct paths between source and destination nodes with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. In Defense of Rationalism about Abductive Inference.Ali Hasan - 2017 - In Kevin McCain & Ted Poston (eds.), Best Explanations: New Essays on Inference to the Best Explanation. New York, NY: Oxford University Press.
    Laurence BonJour and more recently James Beebe have argued that the best way to defend the claim that abduction or inference to the best explanation is epistemically justified is the rationalist view that it is justified a priori. However, rationalism about abduction faces a number of challenges. This chapter focuses on one particular, highly influential objection, that there is no interpretation of probability available which is compatible with rationalism about abduction. The rationalist who wants to maintain a strong connection between (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  29. The Structure of Justification.Ali Hasan - forthcoming - In Mathias Steup (ed.), Blackwell Companion to Epistemology. Blackwell.
    In this chapter, we examine different views of the structure of justification, including foundationalism, infinitism, and coherentism. We investigate how well or poorly they seem to do in responding to the regress problem, accommodating a robust connection between justification and truth, and getting the contours of justification right—i.e., making justification neither too easy nor too hard to get. We end by briefly discussing some challenges to finding a single sense of “foundational belief” defining the debate.
    Download  
     
    Export citation  
     
    Bookmark  
  30. Relative blindsight arises from a criterion confound in metacontrast masking: Implications for theories of consciousness.Ali Jannati & Vincent Di Lollo - 2012 - Consciousness and Cognition 21 (1):307-314.
    Relative blindsight is said to occur when different levels of subjective awareness are obtained at equality of objective performance. Using metacontrast masking, Lau and Passingham reported relative blindsight in normal observers at the shorter of two stimulus-onset asynchronies between target and mask. Experiment 1 replicated the critical asymmetry in subjective awareness at equality of objective performance. We argue that this asymmetry cannot be regarded as evidence for relative blindsight because the observers’ responses were based on different attributes of the stimuli (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  31. Biopower, governmentality, and capitalism through the lenses of freedom: A conceptual enquiry.Ali M. Rizvi - 2012 - Pakistan Business Review 14 (3):490-517.
    In this paper I propose a framework to understand the transition in Foucault’s work from the disciplinary model to the governmentality model. Foucault’s work on power emerges within the general context of an expression of capitalist rationality and the nature of freedom and power within it. I argue that, thus understood, Foucault’s transition to the governmentality model can be seen simultaneously as a deepening recognition of what capitalism is and how it works, but also as a recognition of the changing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. FOUCAULT AND CAPITALIST RATIONALITY: A RECONSTRUCTION.Ali Rizvi - 2006 - Market Forces 1 (4):23-33.
    The relation between the regimes of the accumulation of men and the accumulation of capital is problematised in the works of Michel Foucault. The paper challenges the prevailing wisdom that the relation between these regimes is contingent. The fundamental question of the conditions of the possibility of relation between the two regimes is raised. It is argued that both regimes are primordially related. Focusing on the Foucauldian analysis of the regime of the accumulation of men and its constituent elements an (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Illusionism: Making the Problem of Hallucinations Disappear.Rami El Ali - 2014 - Dissertation, University of Miami
    My dissertation contributes to a central and ongoing debate in the philosophy of perception about the fundamental nature of perceptual states. Such states include cases like seeing, hearing, or tasting as well as cases of merely seeming to see, hear, or taste. A central question about perceptual states arises in light of misperceptual phenomena. A commonsensical view of perceptual states construes them as simply relating us to the external and mind independent objects. But some misperceptual cases suggest that these states (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Islamic Environmental Ethics and the Challenge of Anthropocentrism.Ali Rizvi - 2010 - American Journal of Islamic Social Sciences 27 (3):53-78.
    Lynn White’s seminal article on the historical roots of the ecological crisis, which inspired radical environmentalism, has cast suspicion upon religion as the source of modern anthropocentrism. To pave the way for a viable Islamic environmental ethics, charges of anthropocentrism need to be faced and rebutted. Therefore, the bulk of this paper will seek to establish the non- anthropocentric credentials of Islamic thought. Islam rejects all forms of anthropocentrism by insisting upon a transcendent God who is utterly unlike His creation. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. A new solution to the gamer’s dilemma.Rami Ali - 2015 - Ethics and Information Technology 17 (4):267-274.
    Luck (2009) argues that gamers face a dilemma when it comes to performing certain virtual acts. Most gamers regularly commit acts of virtual murder, and take these acts to be morally permissible. They are permissible because unlike real murder, no one is harmed in performing them; their only victims are computer-controlled characters, and such characters are not moral patients. What Luck points out is that this justification equally applies to virtual pedophelia, but gamers intuitively think that such acts are not (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  36. Testing the limits of liberalism: A reverse conjecture.Ali M. Rizvi - 2012 - Heythrop Journal 53 (3):382-404.
    In this paper, I propose to look closely at certain crucial aspects of the logic of Rawls' argument in Political Liberalism and related subsequent writings. Rawls' argument builds on the notion of comprehensiveness, whereby a doctrine encompasses the full spectrum of the life of its adherents. In order to show the mutual conflict and irreconcilability of comprehensive doctrines, Rawls needs to emphasise the comprehensiveness of doctrines, as their irreconcilability to a large extent emanates from that comprehensiveness. On the other hand, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Independence/Dependence Paradox within John Rawls’s Political Liberalism.Ali Rizvi - manuscript
    Rawls in his later philosophy claims that it is sufficient to accept political conception as true or right, depending on what one's worldview allows, on the basis of whatever reasons one can muster, given one's worldview (doctrine). What political liberalism is interested in is a practical agreement on the political conception and not in our reasons for accepting it. There are deep issues (regarding deep values, purpose of life, metaphysics etc.) which cannot be resolved through invoking common reasons (this is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. The evidence in perception.Ali Hasan - 2024 - In Maria Lasonen-Aarnio & Clayton Littlejohn (eds.), The Routledge Handbook of the Philosophy of Evidence. New York, NY: Routledge.
    It is commonly thought that we depend fundamentally on the “evidence of the senses” for our empicial beliefs, including and most directly, our beliefs about our local environment, the spatial world around us. The ultimate evidence we have for our perceptual beliefs is provided in some way by perception or perceptual experience. But what is this evidence? There seem to be three main options: external factualism allows that the evidence include facts about the external world; internal factualism takes facts that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. On the transmission of Greek philosophy to medieval Muslim philosophers.Ishraq Ali - 00/2022 - HTS Theological Studies 78 (4):8.
    There are two dominant approaches towards understanding medieval Muslim philosophy: Greek ancestry approach and religiopolitical context approach. In the Greek ancestry approach, medieval Muslim philosophy is interpreted in terms of its relation to classical Greek philosophy, particularly to the philosophy of Plato and Aristotle. The religiopolitical context approach, however, views a thorough understanding of the religious and political situation of that time as the key to the proper understanding of medieval Muslim philosophy. Notwithstanding the immense significance of the two approaches (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  40. Does Hallucinating involve Perceiving?Rami Ali - 2018 - Philosophical Studies 175 (3):601-627.
    A natural starting point for theories of perceptual states is ordinary perception, in which a subject is successfully related to her mind-independent surroundings. Correspondingly, the simplest theory of perceptual states models all such states on perception. Typically, this simple, common-factor relational view of perceptual states has received a perfunctory dismissal on the grounds that hallucinations are nonperceptual. But I argue that the nonperceptual view of hallucinations has been accepted too quickly. I consider three observations thought to support the view, and (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  41. The Aesthetic Response: The Reader in Macbeth.Ali Salami - 2012 - Folia Linguistica Et Litteraria 12.
    This article seeks to explore the different strategies the Bard uses in order to evoke sympathy in the reader for Macbeth who is so persistent in the path of evil. What strategy does Shakespeare use in order to provoke such a deep emotional response from his readers? By using paradoxes in the play, the Bard creates a world of illusion, fear and wild imagination. The paradoxical world in Macbeth startles us into marvel and fear, challenges our commonly held opinions, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. What in the world are hallucinations?Rami Ali - forthcoming - In Ori Beck & Farid Masrour (eds.), The Relational View of Perception: New Essays. Routledge.
    A widely held assumption is that hallucinations are not a type of perception. Coupled with the idea that hallucinations possess phenomenal character, this assumption raises a problem for naive realism, which maintains that phenomenal character is at least partly constituted by perceived worldly objects. Naive realists have typically responded by adopting a disjunctive view of phenomenal character. But in what follows, I argue that to resolve the conflict we should instead reject the idea that hallucinations are not a type of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Culture and Gender Representation in Iranian School Textbooks.Ali Salami & Amir Ghajarieh - 2016 - Sexuality and Culture 20 (1):69-84.
    This study examines the representations of male and female social actors in selected Iranian EFL (English as a Foreign Language) textbooks. It is grounded in Critical Discourse Analysis and uses van Leeuwen’s Social Actor Network Model to analyze social actor representations in the gendered discourses of compulsory heterosexuality. Findings from the analysis show that the representations endorse the discourse of compulsory heterosexuality which is an institutionalized form of social practice in Iran. Three male and three female students were interviewed to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Al-Ghazali and Ibn Rush (Averroes) on Creation and the Divine Attributes.Ali Hasan - 2013 - In Jeanine Diller & Asa Kasher (eds.), Models of God and Alternative Ultimate Realities. Springer. pp. 141-156.
    Al-Ghazali (1058-1111) was concerned that early Islamic philosophers were leaning too heavily and uncritically on Aristotelian and Neoplatonic ideas in developing their models of God and His relation to the world. He argued that their views were not only irreligious, but philosophically problematic, and he defended an alternative view aimed at staying closer to the Qur’an and the beliefs of the ordinary Muslim. Ibn Rushd (1126-1198) responded to al-Ghazali’s critique and developed a sophisticated Aristotelian view. The present chapter explores their (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Philosophical Foundations Of Habermas’ Critique Of Particularistic Liberalism.Ali Rizvi - 2010 - Minerva - An Internet Journal of Philosophy 14:12-35.
    Jürgen Habermas has emerged as a sharp, and occasionally harsh, critic of the Bush administration’s policies since the Iraq war. Habermas has developed this critique in several of his short pieces and interviews, some of which are available in fine collections in both English and other languages. However, the occasional and journalistic character of Habermas’ political interventions often hide the theoretical basis of his critique. In this paper, I argue that Habermas’ critique of the Bush administration’s foreign policy emanates from, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. THE CONTRADICTORY NATURE OF THE GHOST IN HAMLET.Ali Salami - 2011 - Sarjana 26 (1).
    This article explores the contradictory nature of the ghost in Hamlet and shows how Shakespeare seeks to manipulate the reader’s response in Hamlet by using contradictions and ambiguities. The article also explores the ways in which the reader responds to these contradictions and reconstructs a palpable world in the impalpable world of the text. These contradictions compel the reader to participate in the composition of the text and make him keep changing his own approach to the work with the result (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Things Fall Apart and Chinua Achebe’s Postcolonial Discourse.Ali Salami & Bamshad Hekmat Shoar - 2018 - International Journal on Studies in English Language and Literature 6:19-28.
    Chinua Achebe, the contemporary Nigerian novelist, is considered as one of the prominent figures in African anti-colonial literature. What makes his works specific is the way he approaches the issues of colonization of Africa in an objective manner and through an innovative language which aims at providing a pathology; a pathological reading meant to draw on the pre-colonial and colonial history without any presumptions so as to present the readers with possible alternative African discourses in future. His first novel Things (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. THE INFLUENCE OF HAFIZ ON WESTERN POETRY.Ali Salami - 2008 - Sarjana 24 (2).
    This article examines the influence of the Persian mystic poet Hafi z on western poets. Interest in Hafiz started in England in the eighteenth century with the translations of Sir William Jones. In the nineteenth century, the German translation of Baron von HammerPurgstall inspired Goethe to create his masterpiece Westöstliche Divan (West-Eastern Divan). The poetry of Hafiz evoked such passion in Goethe that he referred to him as ‘Saint Hafiz’ and ‘Celestial Friend’. Inspired by Westöstliche Divan, a number of German (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Gendered Representations of Male and Female Social Actors in Iranian Educational Materials.Ali Salami & Amir Ghajarieh - 2016 - Gender Issues 33 (3):258-270.
    This research investigates the representations of gendered social actors within the subversionary discourse of equal educational opportunities for males and females in Iranian English as a Foreign Language (EFL) books. Using critical discourse analysis (CDA) as the theoretical framework, the authors blend van Leeuwen’s (Texts and practices: Readings in critical discourse analysis, Routledge, London, 2003) ‘Social Actor Network Model’ and Sunderland’s (Gendered discourses, Palgrave Macmillan, Hampshire, 2004) ‘Gendered Discourses Model’ in order to examine the depictions of male and female social (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. A critique of modern philosophy and plea for philosophy in Islamic Culture.Ali Rizvi - manuscript
    In this paper I make a case for a genuine and legitimate role for philosophy in modern Islamic culture. However, I argue that in order to make any progress towards reinstating such philosophical activity, we need to look deep into the nature and essence of modern philosophy. In this paper I aim to do this precisely by challenging modern philosophy’s self conception as an absolute critique (i.e. a critique of everything/anything). I argue that such a conception is not only misconceived, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 351