Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

خیر النساء حضرت فاطمۃ الزھراؓ

خیرالنساء فاطمۃ الزھراؓ کے حضور!

شرم و حیا کا اوج ہیں ، پیکر رضا کی ہیں
زوجہ علی کی، بیٹی رسولِ خدا کی ہیں
معیار بے نظیر ہے اُن کے حجاب کا
عورت کا ہیں وقار تو زینت حیا کی ہیں

تبرکات نبوی ﷺکے انہدام سے متعلق حضرت عمر فاروق کی طرف منسوب روایت کا تحقیقی جائزہ

Almighty Allah has stated the nature of man that everything He loves towards the one He loves is dear to Him. For this reason, in every age human being has been attached to the remains of his beloved thing. The stories of the former Ummah are contained in the holy Qura᾽n, in which their remnants are proven to be safe after they passed away. This last Ummah also appears to meet these natural requirements. Therefore, just as this Ummah loves his Prophet (peace be upon him). Therefore the sacred Islamic ancient relics have extraordinary significance, which are attributed to the holy Prophet. Muslims get peace by them and kept protecting and persevering such relics during every period. The companions of the Prophet (PBUP) have kept them safe too and they organized particular arrangements for preserving them. But there is also a theory which those who believe these are considered as a prohibition of Islamic Sharia, and they present their arguments on the basis of a “Hadith” attributed to Ḥaḍrat ʻUmar Fārūq (R.A). It is narrated from Ḥaḍrat ʻUmar Fārūq, that the he used to give an importance to the memorandum of Muhammad (PBUH). In the light of such “Riwāyās”, the mentioned “Hadith” would be suspicious. It is essential that he research of this “Hadith” should be reviewed, how its status is? In this article, research has been studied by this “Hadith” that it is clear that this “Hadith” could not be narrated by Ḥaḍrat ʻUmar Fārūq (R.A). Therefore, the concept of demolition of such scared ancient relics could not be supported by the above mentioned “Hadith”.

Power Centric Nodes in Clustered Knowledge Networks Ensuring Optimal Security

Knowledge Networks are gaining momentum within cyber world. Knowledge leads to innovation and for this reason organizations focus on research and information gathering in order to gain and improve existing knowledge. In this age of information, which is primarily based on internet and world wide web technologies, enable significantly expanded networks of people to communicate and collaborate „virtually‟ across teams of the entire organization, across organizations and the world, anytime and anyplace. Therefore, wonderful innovations in computing and telecommunications have transformed the corporations from structured and manageable type to interwoven network of blurred boundaries such as; ad hoc networks and mobile wireless networks, semantic web technology etc. This study explores the means of knowledge networks in Information Technology and security leaks that are found and measures that are taken to counter this menace are coming up with optimal Secure Clustered Power Centric node network. The study estimates these measures, evaluating and integrating them to come up with a secured network design. This study seeks to establish these threats and attacks and counter security measures in Wireless Sensor Networks, Mobile Ad-hoc Networks and Semantic Web technology and propose architecture for the purpose of establishing secure routing in knowledge networks called Optimized Network Security Solution for Knowledge Networks – ONSS-KN. Design and development of power-aware, scalable and performance efficient routing protocols for Knowledge Networks (KNs) is an active area of research. In this dissertation, we show that insect colonies based intelligence – commonly referred to as Swarm Intelligence (SI) – provides an ideal metaphor for developing routing protocols for KNs because they consist of minimalists, autonomous individuals that through local interactions self-organize to produce system-level behaviors that show lifelong adaptability to changes and perturbations in an external environment. In this context, we propose a clustering and secure data routing protocol for KNs (iRoutCluster) – inspired by the foraging principles of honey bees. Qaisar Javaid (1094-212001) Page vi To conclude this study, we perform simulation studies to analyze and compare the performance of the final iRoutCluster design with existing protocols. The simulation results demonstrate that iRoutCluster outperforms its competitors in all assumed scenarios and metrics. We then implement the iRoutCluster protocol in MATLAB® simulator to further investigate its performance in mobile networks and large-scale static sensor networks. The results clearly show that iRoutCluster not only performs well in large-scale networks, but is equally good in MANETs as well. Therefore, iRoutCluster is a viable protocol for hybrid ad hoc networks.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.