سلطان کھاروی تے اصناف سخن
پنجابی کوتا دے بھرے بھنڈارا تے جھا ت پائیے تاں ایہہ گل نترکے سامنے آندی ہے کہ ایس بھاگاں والی بولی دا پلا بہت ساریاں اصناف سخن نال بھرپور ہے۔ حیاتی دے ہرپکھ نوں وکھو وکھ اصناف سخن بیان کردیاں نیں۔ اک ہور اچرج گل ایہہ وے کہ ایس بولی دا ہر کوی اک توں ودھ اصناف سخن وچ بیان کرن دی صلاحیت رکھدا ہے۔ جس توں ایہناں کو یاں دی ذہانت دا گویڑ لایا جا سکدا اے۔ ایس بولی دے ہر کوی نے اپنے انمول وچاراں نوں وکھو وکھ اصناف سخن وچ بیان کرکے کیول ایس دے ساہت دی امیری وچ حصہ ای نہیں پایا سگوں اپنے آپ نوں مہان کوی وی ثابت کیتا اے۔ ایہناں کو یاں و چوںاک پرسدھ ناں سلطان کھاروی ہور اں دا وی اے۔ جہناں اپنے وکھو وکھ کو تاپراگیاں وچ کئی اصناف سخن وچ کوتا لکھی اے۔ جس دا مختصرویرورانج اے۔
سلطان کھاروی دی حمد نگاری
’’ حمد ‘‘ عربی زبان دا شبد ہے جس دے ارتھ تعریف کرنا یاں شکر کرنا دے نیں ‘‘(۱)
’’حمد دا مطلب اے الحمد اللہ کہنا حمد( ع۔امث) خدا کی تعریف افعال ۔ کرنا ۔ ہونا‘‘(۲)
’’قرآن پاک وچ ’’ الحمد ‘‘ دا شبد چوی وار آیا اے۔‘‘(۳)
ایس لئی مسلمان ایہہ شبد اپنی عام گل کتھ وچ کثرت نال ورت دے نیں ۔ جس توں مراد ر ب دی تعریف تے شکر لیندے نیں۔ کیوں جے اوہناں دا یقین اے کہ خوشی تے غم ، دکھ تے مصیبت آرام تے سکون، خوشحالی تے تنگی ، حیاتی تے موت سبھے کجھ رب ولوں آئوندا اے۔ ایس لئی اوہو ذات ، حمد ،...
Almighty Allah has stated the nature of man that everything He loves towards the one He loves is dear to Him. For this reason, in every age human being has been attached to the remains of his beloved thing. The stories of the former Ummah are contained in the holy Qura᾽n, in which their remnants are proven to be safe after they passed away. This last Ummah also appears to meet these natural requirements. Therefore, just as this Ummah loves his Prophet (peace be upon him). Therefore the sacred Islamic ancient relics have extraordinary significance, which are attributed to the holy Prophet. Muslims get peace by them and kept protecting and persevering such relics during every period. The companions of the Prophet (PBUP) have kept them safe too and they organized particular arrangements for preserving them. But there is also a theory which those who believe these are considered as a prohibition of Islamic Sharia, and they present their arguments on the basis of a “Hadith” attributed to Ḥaḍrat ʻUmar Fārūq (R.A). It is narrated from Ḥaḍrat ʻUmar Fārūq, that the he used to give an importance to the memorandum of Muhammad (PBUH). In the light of such “Riwāyās”, the mentioned “Hadith” would be suspicious. It is essential that he research of this “Hadith” should be reviewed, how its status is? In this article, research has been studied by this “Hadith” that it is clear that this “Hadith” could not be narrated by Ḥaḍrat ʻUmar Fārūq (R.A). Therefore, the concept of demolition of such scared ancient relics could not be supported by the above mentioned “Hadith”.
Data provenance has an essential role in establishing the trustworthiness of data in many applications, where critical decisions have to be made based on the data collected from diverse sources. Therefore, it is indispensable to use authentic and accurate data for such mission-critical applications. In order to fully trust the data provenance itself, it is extremely important to secure the data provenance from forgeries and misuse. Provenance generation, management, and dissemination have received substantial attention from the research community. However, provenance security in a collaborative distributed network has earned less heed from the research community. The traditional time-honoured security solutions cannot be directly applied because of the chained or directed acyclic graph structure of the provenance. For a collaborative distributed network, in the literature, some security solutions have been proposed to secure the provenance information. However,these schemes are not without their limitations. The existing schemes assume transitive trust among participating users, thus attacks initiated by multiple consecutive colluding users on a provenance chain cannot be detected. Such an assumption is beyond the reality, especially working in a file sharing environment or distributed network. Moreover, the existing schemes introduce an additional element to chain the provenance records which results an extra storage overhead. To overcome the aforementioned loopholes, we have proposed secure provenance schemes for a document/file sharing n etwork. The proposed schemes can detect the attacks launched by either consecutive or non-consecutive adversaries. For the provenance records chaining, these schemes aggregate the signatures of the participating users. Experimental results show that the proposed schemes outperform as compared to existing schemes in terms of computation and storage cost. Provenance size is a major hindrance to the adoption of provenance in a resourceconstrained network. The provenance size increases drastically when the number of nodes in the network grow. The growing provenance size becomes the per formance bottleneck especially in Wireless Sensor Networks (WSNs). Different solutions have been proposed in the literature to compress the provenance in formation along with its security. However, in existing provenance compression schemes, the provenance’s size grows linearly with the number of nodes in a WSN. Furthermore, the existing provenance compression schemes are designed for static nodes only and do not account for the mobility factor. Moreover, some secure provenance compression schemes use overlapped arithmetic coding to compress the provenance information. However, there is no criterion to find the overlapping ratio. To overcome the above-mentioned issues, we have proposed a secure provenance compression scheme for mobile nodes of a WSN. Moreover, a novel mechanism has been devised to calculate the overlapping ratio for overlapped arithmetic coding. Furthermore, the proposed scheme assures the confidentiality, integrity, and fresh ness of the provenance information. It is evident from the simulation results that the proposed scheme has higher compression and lower false positive rate.