Search or add a thesis

Advanced Search (Beta)
Home > اسلام اورشرائع سابقہ میں وحدت کاتصور

اسلام اورشرائع سابقہ میں وحدت کاتصور

Thesis Info

Author

سلیم نواز

Supervisor

سید ازکیاء ہاشمی

Department

Department of Islamic and Religious Studies

Program

PhD

Institute

Hazara University

Institute Type

Public

City

Mansehra

Province

KPK

Country

Pakistan

Subject

Comparative Religion

Language

Urdu

Keywords

ادیانِ ثلاثہ،ادیانِ ثلاثہ اسلام ، عیسائیت اور یہودیت
The Three Religions (Islam, Christianity and Judaism)

Added

2021-02-17 19:49:13

Modified

2023-02-17 20:17:31

ARI ID

1676709075213

Similar


Loading...

Similar Thesis

Showing 1 to 20 of 100 entries
TitleAuthorSupervisorDegreeInstitute
PhD
Hazara University, Mansehra, Pakistan
PhD
Hazara University Mansehra, مانسہرہ
MA
University of Balochistan, کوئٹہ
MA
University of Balochistan, کوئٹہ
Mphil
University of the Punjab, Lahore, Pakistan
Mphil
Federal Urdu University of Arts, Science and Technology, Islamabad, Pakistan
PhD
Federal Urdu University of Arts, Science and Technology, Karachi, Pakistan
MA
University of Balochistan, کوئٹہ
PhD
The Islamia University of Bahawalpur, بہاولپور
MA
University of the Punjab, Lahore, Pakistan
MA
Minhaj University Lahore, لاہور
Mphil
University of Balochistan, کوئٹہ
Mphil
University of Balochistan, کوئٹہ
PhD
University of Engineering and Technology, Lahore, Pakistan
MA
University of the Punjab, لاہور
PhD
University of Engineering and Technology, لاہور
MA
University of Balochistan, کوئٹہ
-
University of Management & Technology, لاہور
MA
Gomal University, ڈیرہ اسماعیل خان
Mphil
Institute of Southern Punjab, ملتان
TitleAuthorSupervisorDegreeInstitute
Showing 1 to 20 of 100 entries

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

نکل کر خانقاہوں سے ادا کر رسمِ شبیری

نکل کر خانقاہوں سے ادا کر رسم شبیری
رشی کے فاقوں سے ٹوٹا نہ برہمن کا طِلسم
عصا نہ ہو تو کلیمی ہے کارِ بے بنیاد
معاشرہ وہی مستحسن قرار دیا جاسکتا ہے جس میں عدل و انصاف ، مساوات، اخوت و ہمدردی ، مرّوت، بھائی چار ہ جیسی اخلاقی صفات عروج پر ہوں اور بے راہ روی ، اقرباء پروری ، رشوت ستانی ، انارکی جیسی غیر اخلاقی اور خصائل قبیحہ کا قلع قمع ہو چکا ہو ایسے معاشرے کا وجود پوری انسانیت کے لیے نعمت غیر مترقبہ سے کم نہیں ہوتا۔ اور ایسے معاشرے کے وجود کے استحکام کے لیے آسمانی مخلوق کارہائے نمایاں سرانجام نہیں دیتی بلکہ اس خطہ سے تعلق رکھنے والے لوگ ہی آگے بڑھتے ہیں اور حسنِ معاشرہ میں مشاطگی کرتے ہوئے عظیم سے عظیم تر اقوام کی تخلیق کا سبب بنتے ہیں۔ خدا داد صلاحیت کے حامل لوگ اللہ اور اس کے رسول صلی اللہ علیہ و آلہٖ وسلم کی رضا کی خاطر یہ فریضہ سرانجام دیتے ہیں۔
مُصَلَّا بیچ کر خنجر خرید اے زاہدؔ ناداں
فقیری سے تری ٹکرانے کو یہ بادشاہی ہے
حدیث رسول مقبول صلی اللہ علیہ و آلہٖ وسلم ہے کہ اگر تم میں سے کوئی برائی دیکھے تو اس پر لازم ہے کہ وہ اس کو اپنے ہاتھ سے منع کرے، اگر وہ اپنے آپ کو اس اہل نہیں سمجھتا تو پھر اپنی زبان سے منکرات کی مخالفت کرے اور پھر اگر وہ ایسا کرنے سے بھی اپنے آپ کو قاصر تصور کرتا ہے تو پھر اپنے دل سے ہی اس کو برا جانے اور یہ اس کے کمزور ایمان کی علامت ہے۔
برائی سے مراد صرف یہ نہیں ہے کہ شراب خانہ پر نظر پڑے تو برائی ہے، چور کو چوری کرتے دیکھو تو یہ برائی ہے، ڈاکو کو ڈاکہ زنی میں...

China-Pakistan Economic Corridor: A Case Study Of Internal Security Challenge Faced by Pakistan

The strongest and most crucial strategic and economic links in the south Asian region are the friendships between Pakistan and China. China and Pakistan assert that the people who live on either side of the Himalayas have interacted with one another in a trustworthy and sincere manner from ancient times. Chinese investment in the CPEC represents the greatest sum (62 billion dollars) ever between two friendly nations. China and Pakistan are dealing with numerous internal and external security challenges as a result of their strong friendship and significant investment in this project. Both nations, such as India and Afghanistan, are posing security problems to Pakistan, which has several security issues. The USA, India, the UK, and Israel are also causing strife and tension in Pakistan. These nations are also causing internal problems by sponsoring terrorist organizations like the Taliban and ISIS as well as nationalist organizations like the Baloch, the Lashkar-e-Jhangvi, and Sipah Muhammad. The challenges to Pakistan's internal security are discussed in this study.

Development and Performance Analysis Fo Key Agreement Schemes in Wireless Body Area Networks Wbans

A Wireless Body Area Network (WBAN) is formed by implanting tiny sensors on the human body in order to collect and communicate the human personal data. WBANs play an important role in mobile health monitoring such as monitoring the health of patients remotely. In order to take full advantage of WBANs in application scenarios such as healthcare, security and privacy must be ensured for inter-sensor communication in WBANs. The inter-sensor communication in WBAN is exposed to a variety of attacks, which pose major threats to its security. These threats can be overcome by using cryptographic techniques. Cryptographic schemes itself rely on good key agreement schemes. In WBANs, keys can be generated from biometrics i.e., Electrocardiogram (EKG), Electroencephalography (EEG), or finger prints. The advantage of using time variant biometrics i.e., EKG as a biometric for key agreement is that it possesses the properties of randomness and time variance. The keys produced from these biometric values also possess the same properties, and make it harder for an attacker to guess or regenerate the keys. The existing key agreement schemes are either computationally expensive or involve too much information exchange in order to complete the key agreement process. The increase in information exchange increases the communication complexity as well as the energy consumption. Similarly, some of the key agreement schemes are pre-loading based i.e., the keys are loaded into the memory of sensor nodes before deployment. Such schemes increase human involvement and also consume more memory and resources, which reduces the usability of the WBAN. This thesis aims to provide security and privacy solutions to WBANs, while keeping in mind the memory, energy, and processing constraints. The first contribution of this work is an electrocardiogram (EKG) based key agreement scheme using discrete wavelet transform (DWT) for the sake of generating common key in a WBAN. The scheme uses Keyed-Hashing Message Authentication Code (HMAC-MD5) to protect the personal information exchange process in a WBAN. A heterogeneous Wireless Sensor Network (WSN) is considered, which consists of a powerful High-end sensor (H-sensor) and several Low-end sensors (L-sensors) in order to form a cluster. The proposed scheme is evaluated in terms of entropy, randomness of keys, and key repetition. The scheme shows better entropy, and generates highly random keys with no repetitions. The second contribution of this work is an energy-efficient key agreement scheme for WBANs, which takes into account available resources of a node during the whole life cycle of key management. The proposed scheme is a cluster-based hybrid security framework that supports both intra-WBAN and inter-WBAN communications. The cluster formation process itself is secured by using Electrocardiogram (EKG) based key agreement scheme. The performance comparison of Low Energy Adaptive Clustering Hierarchy (LEACH) based key agreement scheme and the proposed key agreement scheme shows that the proposed scheme is more energy-efficient and provides better network lifetime. The third contribution of this work is a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from feature set of the EKG signal of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Due to lesser information exchange, if an attacker by any chance gets the information, will not be able to reproduce the key. The proposed scheme is evaluated in terms of security, energy consumption, communication overhead, and memory overhead. It is worth mentioning that the proposed scheme increases the lifetime of the network and decreases the energy consumption as well as the memory and communication overheads. The proposed set reconciliation based key agreement scheme mitigates the replay, selective forwarding, and denial of service attacks by a challenge response authentication mechanism.