Search or add a thesis

Advanced Search (Beta)
Home > اسلامی ریاست میں غیر مسلموں کا حق تبلیغ

اسلامی ریاست میں غیر مسلموں کا حق تبلیغ

Thesis Info

Author

نازیہ ستار

Supervisor

طاہرہ بشارت

Department

ادارہ علوم اسلامیہ

Program

MA

Institute

University of the Punjab

Institute Type

Public

City

Lahore

Province

Punjab

Country

Pakistan

Degree End Year

1999

Language

Urdu

Keywords

بین المذاہب ہم آہنگی، مذہبی رواداری، تکثیریت ، بقائے باہمی
Interfaith harmony, religious tolerance, pluralism, coexistence

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676709238906

Similar


Loading...

Similar Thesis

Showing 1 to 20 of 100 entries
TitleAuthorSupervisorDegreeInstitute
MA
University of the Punjab, Lahore, Pakistan
MA
University of the Punjab, لاہور
Mphil
Minhaj University Lahore, Lahore, Pakistan
MA
Government College University Faisalabad, Faisalabad, Pakistan
MA
University of the Punjab, Lahore, Pakistan
Mphil
The Islamia University of Bahawalpur, Bahawalpur, Pakistan
MA
Government College University Faisalabad, Faisalabad, Pakistan
MA
University of the Punjab, Lahore, Pakistan
MA
University of the Punjab, Lahore, Pakistan
MA
Minhaj University Lahore, Lahore, Pakistan
MA
University of the Punjab, Lahore, Pakistan
Allama Iqbal Open University, Islamabad, Pakistan
MA
Bahauddin Zakariya University, Multan, Pakistan
-
University of Management & Technology, لاہور
PhD
University of the Punjab, Lahore, Pakistan
PhD
University of the Punjab, Lahore, Pakistan
MA
Bahauddin Zakariya University, ملتان
Mphil
Riphah International University, Faisalabad, Pakistan
MA
Minhaj University Lahore, Lahore, Pakistan
MA
Minhaj University Lahore, Lahore, Pakistan
TitleAuthorSupervisorDegreeInstitute
Showing 1 to 20 of 100 entries

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

9 نویں ۰قمیص

نویں   ۰قمیص

                اج اوہدی بھین دیاں نگاہواں اوہدے ٹانکے لگے کپڑاں تے اٹک کے رہ گیاں اوہ روز ایہناں کپڑاں نوں ویکھدی سی۔ خاکی رنگ دی پتلون جیہدے تے جگہ جگہ خاکی یا اوہدے نال ملدے جلدے ٹانکے لگے ہوئے سن۔ سفید رنگ دی قمیض جہیڑی کسے زمانے وچ سفید رہی ہوئے گی پر ہن حالات دی گردش نے اوہدے تے زردی بکھیر دتی سی۔ ایس قمیض دے پھٹے ہوئے کالر حمیدہ روز دیکھدی سی پر اج اوہنوں ایویں لگ رہیا سی جویں اکرم دیا نگاہواں چیک چیک کے اوہدے نال سوال کررہیاں ہون پئی۔ ’’باجی! اسیں غریب کیوں آں؟‘‘ ’’باجی! ساڈے ماں پیو مرگئے؟‘‘ ’’خدا دا ناں کہیں رحیم رکھ دتا‘‘

                فیر حمیدہ سوچن لگ پئی اکرم نے سکول دا زمانہ تے ایہناں ای کپڑاں وچ گزار دتا پرہن تے اوہدا دسویں دا نتیجہ وی نکلن والا سی فیر اوہ کالج وچ داخلہ لوے گا تے اودوں اوہدے کول نویں کپڑے ہونے چاہیدے نیں تے۔۔۔ فیر۔۔۔

                رشیدہ دے چاچے دی شادی وی آرہی اے اوہدے تے وی نویں کپڑے ہونے چاہیدے نیں۔

                اوہ اکرم دے پھٹے ہوئے ہوئے کالر وہندی جارہی سی تے اوہنوں اپنیاں تے اکرم نوں پیش آون والیاں مصیبتاں یاد آرہیاں سن۔ کس مصیبت نال اوہناں گزارہ کیتا۔ تے اکرم نے کس مصیبت نال اپنی پڑھائی جاری رکھی۔ بھکے رہے پر کسے دے اگے ہتھ نہ پھیلائے۔

                حمیدہ دا دکھی ذہن ماضی وچ گواچ گیا۔۔۔ اوہنوں اپنے ماں پیو شدت نال یاد آون لگ پئے۔ ’’جے اوہ ہندے تے اکرم دی ایہہ حالت ہونی سی؟‘‘ ’’نئیں کدی وی نئیں‘‘

                ماں تے پہلے ای مرگئی سی تے جدوں اک مہینہ پچھوں پیو...

تشبہ کی حقیقت، اقسام اور احکام کا فقہاء کی آراء کی روشنی میں تحلیلی مطالعہ

Today, majority of the Muslims' lives have turned out to be colored with a similar shade of the western civilization in every sphere of life. We watch that the matter of imitation achieved its most exceedingly awful pinnacle. In this era of ecstasy, the imitation of infidels and penitence of the Sunnah is growing rapidly due to the fact that Muslims have made it their habit. A particular group considers it enlightenment and ideological freedom and feels ashamed to follow Islam and Sunnah. The main reason for this attitude is that Muslims are unaware of the disadvantages of the imitation of infidels. In this article, the nuisances and flaws of imitation have been discussed, so that the Muslims could know about its imperfections and follow the Qur’ān and Sunnah.

Reversible Watermarking and its Applications

In the last decade, watermarking applications have increased considerably. The main reason is that watermarking has emerged as a prospective technique, which can provide copyright protection and authentication of digital content. However, the disadvantage of watermarking is that it introduces small modifications in the original work and thus causes slight degradation. These modifications may be undesirable in some sensitive applications, like medical imagery, 3D reconstruction, and military applications. As a remedy to this problem, researchers have introduced the concept of reversible watermarking. The main objective of reversible watermarking scheme is to restore the watermarked image to its original state after watermark extraction. In this thesis, new reversible watermarking techniques as well as their novel applications are presented. In some of these techniques, computational intelligence (CI) approaches have been employed to improve the watermark capacity versus imperceptibility tradeoff. The research work is carried out in four phases. In the first phase, reversible watermarking is employed on medical imagery, which comprises regions of sensitive information. Slight modification in these regions affects the diagnostic analysis and thus can lead to wrong decisions. For this purpose, a novel reversible watermarking technique has been developed that utilizes genetic algorithm (GA) to improve capacity versus imperceptibility tradeoff. The algorithm makes use of block based companding technique, which helps in increasing the watermark capacity. Experimental analysis depicts that the developed watermarking technique provides good performance compared to the existing approaches. As the technique is reversible, therefore, it is even capable of embedding in the sensitive regions of the image. Reversible watermarking of images with depth information is discussed in the second phase of this work. 3D imaging is widely used in 3D gaming, robotics, controlling and routing devices etc. Different techniques and algorithms are reported to compute the depth information of an object. In this phase, depth information is computed through shape from focus algorithm. The depth information is reversibly embedded in its corresponding 2D image. This technique also utilizes GA to compute near-optimal threshold matrix for performance improvement in terms of capacity versus imperceptibility tradeoff. An additional attribute is achieved by using the threshold matrix for authentication purpose. The third phase focuses on reversible watermarking of 3D camera images. 3D cameras work on different principles for depth map computation. Cameras working on time of flight principle for depth Reversible Watermarking and Its Applications Page xviii map calculation are used in the experimental analysis of the proposed technique. The developed technique utilizes 3D information to embed as a watermark. In this way, protection and secure transmission of an image along with its corresponding depth map is provided. Two CI approaches, namely, differential evolution and a hybrid approach (comprising particle swarm optimization and differential evolution) are utilized to optimize the capacity and imperceptibility tradeoff. This technique is also able to provide authentication capability against manipulation and collage attacks. In the first three phases, CI is exploited to improve the performance of the proposed reversible watermarking techniques. However, CI approaches are more time and resource consuming. Therefore, in fourth phase, a novel and fast reversible watermarking technique is proposed based on histogram processing and down sampling. Histogram based reversible watermarking techniques are easy to implement and are computationally less expensive. A concept of down sampling is employed to generate a reference image and thus create more space for hiding bits. Block selection is used to generate a location map. However, the location map is required at the receiving side to perform extraction and recovery processes. An additional use of location map is devised, which makes the technique capable of authenticating digital images.