Search or add a thesis

Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

فضولِ خرچی ایک برائی

فضول خرچی ایک برائیفضول خرچی ایک برائی
نحمدہ ونصلی علی رسولہ الکریم امّا بعد فاعوذ بااللہ من الشیطن الرجیم
بسم اللہ الرحمن الرحیم
معزز سامعین اور میرے ہم مکتب ساتھیو!
آج مجھے جس موضوع پر اظہار خیال کرنا ہے وہ ہے:’’فضول خرچی ایک برائی ‘‘
صدرِذی وقار!
دولت اگر حلال ذرائع سے میسر آجائے تو وہ ایک نعمت غیر مترقبہ سے کم نہیں ہے، دولت کے حصول کی خاطر انسان شب وروز ایک کر دیتا ہے، دن رات محنت کرتا ہے، انتھک جدوجہد کرتا ہے، غیر معمولی مساعی کرتا ہے، اس کی جملہ توانائیاں صرف اور صرف اس مقصد کی خاطر صرف ہوجاتی ہیں اور پھر ایک وقت ایسا آتا ہے کہ وہ شہر خاموشاں کا رخ کر لیتا ہے۔
محترم صدر!
مال و دولت کمانے کے لیے خون پسینہ ایک کرنا پڑتا ہے اور خواہ کتنا خرماں نصیب ہے وہ شخص جو اللہ تعالیٰ کے اس انعام کو بے دریغ خرچ کرتا ہے۔ لہو و لعب میں اپنی کمائی ضائع کر دیتا ہے۔ عیش وعشرت میں زندگی گزارتا ہے اور اس طرح اس کے لمحات حیات گزرتے رہتے ہیں۔ فضول خرچ انسان نہ صرف اپنا نقصان کرتا ہے بلکہ اپنے خویش و اقارب کے لیے سم قاتل ثابت ہوتا ہے۔
صدرِذی وقار!
ارشادِ باری تعالیٰ ہے کہ بے شک فضول خرچ شیطان کے بھائی ہوتے ہیں اسی طرح دیگر مقام پر آیا ہے کہ شیطان انسان کا کھلا دشمن ہے اور دشمن کا بھائی بھی دوست نہیںہوسکتا اس سے بھلائی کی توقع نہیں کی جاسکتی اور پھر مسلمان ہونے کے ناتے فضول خرچی نہ صرف عیب ہے بلکہ گناہ بھی ہے اور مسلمان کبھی گناہ کو پسند نہیں کرتا۔ ہمیشہ ایسے ذرائع استعمال کرتا ہے کہ جس سے اس کو سکون میسر آئے اور روحانی تازگی نصیب ہو، فضول خرچ بھی طمانیت...

بریل لینگویج میں قرآن کریم لکھنے کا تحقیقی جائزہ

The Holy Qur’ān is the last scripture revealed by Allah. It was revealed for the guidance of mankind and every person has the right to read it whether they are healthy or has any physical disability. Visually impaired people hold a special place in this society and Braille is a writing method used by these people. Qur’ān has a special and specific style of writing which is called Rasmi Uthmani. It is an authentic style of writing used for the Holy Qur’ān. This article will discuss whether we can write Qur’ān in Braille or not; as it is one of the debatable issues among the religious scholars. Opinion of different religious scholars will be discussed in this paper.

Extending the Authentication Mechanism in Ip Multimedia Subsystems for Universal Mobile Telecommunication System

IP multimedia subsystem (IMS) is an emerging platform for provisioning multimedia services (e.g., data, voice, and video) in 4G/5G networks. IMS authentication is an important procedure which grants legitimate users to access multimedia services. However, periodic re-authentication of mobile users results in significant signaling traffic overhead due to complete execution of hectic procedure. Moreover, signaling protocol such as SIP overlooks user’s confidentiality by leaving unprotected public and private identities. In IMS each user entering from another network like UMTS or VOLTE has to authenticate itself. However, it already passed through the same authentication process in its own network. Therefore, IMS core entities are affected by high signaling that could be a source of congestion. . The Session Initiation Protocol (SIP) is used in IMS to establish and manage sessions. It is easy for a hacker to attack IMS with flooding SIP messages. However, IMS does not provide any functions to prevent such kind of attacks. This research presents a secure aauthentication protocol (SAP) which creates a secure channel through the deployment of KMC (Key Management Center) for transmitting user identities; ECC (Elliptic curve cryptography) is used for key generation that provides reduced encryption and decryption time than existing schemes for IMS. FAP strives to minimize signaling overhead of periodic re-authentications. Once a user completes authentication, FAP grants a valid ticket for a particular time which can be used for subsequent re-authentications until it expires. This research introduce a header in SIP to hold the ticket. This research employ protocol composition logic for formal modeling and verification of SAP. The performance of SAP, FAP is validated through FOKUS IMS test bed. The results demonstrate the performance appraisal of FAP compared to other contemporary schemes in terms of signaling overhead, bandwidth consumption and response time. This research presents a Low congestion and Certificate based One-pass Authentication Protocol (COAP) that avoids duplication of authentication steps and makes its authentication efficient through the use of digital certificates. An authenticated user is allotted a certificate to restrict the repetition of complete authentication procedure until the certificate expires. COAP results in reduction of signaling traffic, which eliminates v the congestion problem, it also reduces bandwidth and delivery cost which make this scheme more efficient in terms of bandwidth consumption. An intrusion detection system is designed where a pair of subsystems is working, one is spoofing detection and prevention subsystem and other is flooding detection and prevention subsystem. A zero-watermarking scheme detects the spoofing attack.Watermark embedding is done by the original author and extraction done later by KMC to prove ownership. The flooding detection system is working on misuse rules and anomaly detection algorithms which provide successful detection and prevention for IMS and VOLTE environment. The results has shown that better than other schemes it is compared to i.e. when the no of requests are 30 the detection rate is 90.19 however, when no of request are 40 the accuracy rate of the proposed scheme is 100 percent.
Institute