Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

یہ عشق میں نہ سوچ تو کہ کیا نہیں ملا

یہ عشق میں نہ سوچ، تُجھے کیا نہیں ملا
ہے کر لیا، تو خاک میں اپنی جبیں ملا

ہم راہ دیکھتے ہی رہے جس کی عمر بھر
آیا وہ شہر میں بھی تو ہم سے نہیں ملا

بچپن میں دل کی بستی میں رہتے تھے کتنے لوگ
دیکھا شباب میں تو فقط اک مکیں ملا

اگلے جہاں کے عہد پہ ہم کو دیا ہے ٹال
کم بخت ہم کو وہ تو بلا کا ذہیں ملا

کہتے رہے تھے یار جسے ہم تمام عمر
اک دن عدو کی بزم میں وہ نازنیں ملا

گر یاں دیا نہ تُو نے تو نہ لوں گا حشر میں
یارب اسے اگر ہے ملانا، یہیں ملا

السلام فی القرآن الكريم

It goes without saying that peace has been a hot issue in the past; it is, still, a vital topic of discussion today, and it seems to continue to draw the attention of people in the future. We witness wars and destructions in several parts of the world. This has led to killings of millions of people, left innumerable number of families broken and displaced millions of people. We need to address it earnestly. The author of this dissertation has specified this topic with reference to the Holy Qur’ān, because being the book of Allāh Almighty, it means to us as the final constitution, the ultimate torchlight for our guidance, and a great blessing to the whole world. Peace means to be free from the calamities in this world and in the hereafter. Usually, peace is used to imply an opposition to war and violence between the nations. Peace is a virtue and it means absence of evil, and, therefore, it is always praiseworthy. The author of this paper deals with this topic by dividing it into six sections. These are, ‘The Peace’ as one of the divine names of Allāh Almighty; Peace equals good; Peace is praiseworthy; Peace in the sense of conciliation and security; Peace in the sense of customary Islamic salutation; and Refutation of the objection that Islām was spread by sword.

Cope With a Malicious Host in Mobile Adhoc Networks Manet

From a security perspective, a jamming attack is easy to launch and relatively hard to detect. Jamming attacks are generally directed towards seizing the medium completely by transmitting fake packets violating the medium access protocol, either constantly or periodically. This work analyzes the effects of different types of jammers using Conservation of Flow (CoF), which has been useful for detecting other attacks in wired networks. Additionally, simulation results are presented in justification of proposed methodology. With the miniaturization of wireless devices, the popularity and usage has increased in recent past, especially due to portability. Since the design of such devices does not primarily emphasize heavy computation and secure communication, these are treated as add-ons. In setting up an ad hoc network rather than choosing all or more than the channels offered by 802.11 standard, only a single channel is generally utilized to minimize delay and synchronization issues. However, by using additional available multiple channels, significant gain in terms of overall system performance can be achieved. This, and other limitations like a shared medium which is open to all, attracts intruders in wireless networks. Mainly, the use of a lone channel can become single point of failure in case of an attack, especially a jamming attack. In contrast to other security attacks, no special hardware and computation is required in launching jamming attacks. Additionally, even if the attacker does not get hold of the communication, he can emit radio signals periodically to jam legitimate conversation. Thus, legitimate nodes escape physically or logically to avoid a jammer at the cost of additional overhead involving coordination amongst nodes to resume communication. The overhead involved in either of the methods is considered worthy in terms of regaining the performance of the network. In this thesis, a couple of MAC layer-based algorithms are proposed to mitigate the effects of jamming attacks efficiently; the first is a reactive mechanism and the second is a proactive proposal. The work starts with an investigation of different jamming types and their effects on wireless communication. For this purpose, a simulation model was developed and the resulting data set was verified using AI algorithms, which predicted 98% accuracy. Next, a reactive technique namely packet-feed is proposed to keep the jammer busy on the jammed channel. Once the nodes detect the existence of the jammer and hop to another channel, they alternatively visit the earlier channel to feed the jammer with valid packets. This way, the nodes pretend to the jammer that the earlier channel is still in use. Finally, a proactive channel hopping protocol is proposed where each node has a separate and dynamically selected control channel. Additionally, rather than each of them feeding the other its channel hopping sequence, both parties coordinate to come up with a new channel where data transfer can take place. Thus, provision of redundant channels is provided to each node. Following on from this, the proposed idea is analyzed with the existence of a jammer.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.