Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

مولانا خلیل الرحمن

مولانا خلیل الرحمن
افسوس کہ مولانا خلیل الرحمن صاحب سابق ناظم ندوۃ العلماء نے ۴؍ فروری ۱۹۳۶؁ء کی شب کو اپنے وطن سہارنپور میں اس دار فانی کو الوداع کہا، مولانائے مرحوم مولانا احمد علی صاحب محدث سہارنپوری (محشی بخاری و تلمیذ مولانا شاہ محمد اسحق دہلوی) کے چشم و چراغ تھے، مولانا احمد علی مرحوم پچھلی صدی کے آخری دور میں ہندوستان کے ان باکمالوں میں تھے جن کی مسندِ درس سے علم دین کی شمع روشن تھی اور تشنگانِ علم اس سرچشمہ سے سیراب ہونے کے لئے سینکڑوں میل کی منزلیں پاپیادہ طے کرکے وہاں تک پہنچتے تھے، مولانا خلیل الرحمن نے علم کے اسی گہوارہ میں آنکھ کھولی اور اپنے والد ماجد کے دامنِ فیض میں تعلیم و تربیت پاکر فارغ التحصیل ہوئے۔
مرحوم ندوۃ العلماء کے دور اول کے محسنین میں سے تھے، مولانا محمد علی مونگیریؒ ناظم ندوۃ العلماء کی معیت میں اس ملی و علمی خدمت میں شریک ہوئے اور آخر تک رہے، مرحوم خوش خلق، متواضع، رحمدل، اور عزیزوں سے دلی محبت فرمانے والے تھے، اتفاق وقت کہ دارالعلوم ندوۃ العلماء کی ہنگامہ خیز اسٹرائک کا واقعہ انہی کے دور نظامت میں پیش آیا تھا، اس نازک وقت اور ناسازگار حالات میں بھی مولانائے مرحوم دارالعلوم کے طلبہ کے ساتھ جس عدیم المثال شفقت و محبت سے پیش آئے، اسکی یاد اس عہد کے فارغ التحصیل علمائے ندوہ کے دلوں میں ہمیشہ کے لئے باقی رہ گئی، اور مدت گزرنے کے بعد انہیں جب کبھی مرحوم سے شرف ملاقات کا موقع حاصل ہوا انھوں نے ان کے دل کو شفقت و محبت سے لبریز پایا ندوۃ العلماء کی خدمات انجام دینے کے علاوہ مرحوم کی زندگی کا ایک اہم کارنامہ صحیح بخاری کے اس نادر نسخہ کی اشاعت ہے، جس پر ان کے والد ماجد کے حواشی ثبت ہیں، یہ...

A Phenomenological Study of the Lived Experiences of Tagumpay National High School Teachers Involved in Online Learning Action Cell Session

A qualitative phenomenological approach was used in this study to describe the lived experiences of Tagumpay National High School (TNHS) teachers on Online Learning Action Cell (LAC) session. LAC is a school-based professional development for teachers implemented by the Philippine Department of Education (DepEd). Due to teacher’s lack of participation on classroom LAC, a fully-online mode option is explored by offering TNHS teachers Online LAC session using Facebook as a Learning Management System (LMS). To capture the lived experience of teachers, an in-depth interview with a purposive sample of one TNHS teacher is done in the process. The data gathered went through “Hycner’s Explicitation Process” (1999, in Groenewald, 2004) which includes bracketing, delineating, clustering, summarizing and extracting unique themes. Validity and Credibility were accomplished through an intercoder agreement between researchers, Facebook chat records, bracketing, and member checking. Results identified three themes in relation to teacher’s experience of Online LAC session including usefulness, barriers, and preference. Findings revealed the major role of TNHS teacher’s context on how Online LAC is utilized. Recommendations include administrator and expert teacher working with classroom teachers and the inclusion of teachers’ voices as input in the program design, implementation and evaluation stages of Online LAC to better address curriculum needs and facilitate the delivery of high-quality professional development for teachers’ professional growth.

Modelling Interaction Using Trust and Recommendations in Pervasive Computing Environment

Pervasive computing is characterized by large numbers of roaming entities and the absence of a globally available fixed infrastructure. In such an environment entities need to collaborate with little known or even unknown entities. In traditional environments with clearly defined administrative boundaries security decisions are usually delegated to a centralized administrative authority. In the pervasive computing environment no single entity can play this role, entities are required to make their own security decisions and as a result traditional techniques are not an option. Human notion of trust enables human societies to collaborate and interact based on personal and shared experiences. Thus a security model based on the real world characteristics of trust can provide the internal security for autonomous computing devices embedded in pervasive environment before taking action, despite uncertainty and inadequate information. The work presents an adaptive trust and recommendation based access control model based on human notion of trust. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any past interaction with the service. A mathematical formula together with adaptable security policies is introduced to handle malicious strategic attack in direct trust computation. The model encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. The performance of indirect trust computation models (based on recommendations) can be easily compromised due to the subjective and social-based prejudice of the provided recommendations. Eradicating the influence of such recommendation remains an important and challenging issue in indirect trust computation models. An effective model for indirect trust computation is also proposed which is capable of identifying dishonest recommendations. Dishonest recommendations are identified by using deviation based detecting technique. The concept of measuring the credibility of recommeni dation (rather than credibility of recommender) using fuzzy inference engine is also proposed to determine the influence of each honest recommendation. The proposed model has been compared with other existing evolutionary recommendation models in this field, and it is shown that the model is more accurate in measuring the trustworthiness of unknown entity. An XML-over-UDP based recommendation exchange protocol to share recommendation information between smart devices, is also outlined to complement the model. Implementation of the proposed model on android smart phone using OSGi is presented to demonstrate the effectiveness of the protocol in pervasive computing environment. Experimental results demonstrate that using HTTP or TCP for recommendation exchange between smart devices in wireless environment lead to significantly higher overhead as compared to XML-over-UDP. In general, our research work presents a comprehensive framework for secure trust based access control that will augment future research towards real world implementation of pervasive computing environment.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.