مولانا محمد شمیم کیرانوی
افسوس ہے کہ شعبان المعظم کے آخری ہفتہ میں مدرسہ صولتیہ مکہ معظمہ کے ناظم مولانا محمد شمیم کیرانوی وفات پاگئے۔ اس مدرسہ کی داغ بیل ترکوں کے دور میں اس وقت پڑی تھی، جب حجاز میں مدرسوں کی تعداد بہت کم تھی، پہلے اس کی زمام کار مولانا رحمت اﷲ کیرانوی نے سنبھالی جن کا خاص مشن ردمسیحیت تھا۔ اظہارالحق کی تصنیف اور مشہور پادری فنڈر کو عبرتناک شکست دینا ان کا بڑا کارنامہ تھا۔
مولانا محمد شمیم کے والد بزرگوار مولانا محمد سلیم کیرانوی کی نظامت کے زمانہ میں مدرسہ صولتیہ نے بڑی ترقی کی۔ ان کی وفات کے بعد مولانا محمد شمیم صاحب نے مدرسہ کے لیے اپنی خدمات وقف کردی تھیں، انھوں نے اپنے والد ماجد کی روایات کو باقی رکھا۔ ہندوستان سے حج و زیارت کے لیے تشریف لے جانے والے علماء مشائخ کے آرام و آسائش کا وہ بڑا خیال رکھتے اور ان کو ہر قسم کی مدد اور سہولت بہم پہنچاتے۔ معارف اور دارالمصنفین کے بھی قدردان تھے اور کبھی کبھی خطوط لکھ کر ان سے اپنے تعلق کا ثبوت دیتے۔ مولانا کی عمر ابھی کچھ زیادہ نہیں تھی لیکن ان کی حیات مستعار کے دن پورے ہوچکے تھے۔ اﷲ تعالیٰ ان کو اپنے جوار رحمت میں جگہ دے اور مدرسہ کو ان کا نعم البدل عطا فرمائے، آمین۔
(ضیاء الدین اصلاحی، اپریل ۱۹۹۲ء)
Dr. Shari'ati is a revolutionary intellectual personality of this century. He regarded Islamic values as the guarantee of salvation and success for humanity. He sought to mobilize and revive frozen Islamic ideas. That is, tried to bring the Islamic concept out of the boundaries of formal and congested boundaries into common and general thoughts. Dr. Shari'ati also presented a unique view that divine Imam transcends than worldly governments and this divine leadership cannot be determined by (Shuraiet). Rather, it can be diagnosed by an obvious reason (Nass). This doctrine of Dr. Shari'ati is contrary to the ideology of the Sunni and the Shi'ite’s concept of Imamat and Khilafat because the Sunni sect believes that Khilafat Or Imamt should be determine by the Shurait (Council) and Shiites by the will(Nass). According to Dr. Shairathi, Imamat cannot be determining through Shourait or Nass but it can be identified by the superior attributes of the Imam. He believes that Imamat is not an external factor which can gain by attainment or by choice; rather, it is an Inherit object. In accepting this doctrine of Dr. Shari'ati, than the Imamat becomes a part of the system of naturalism (Takveeni). That makes the Imamat not a model process for humanity. So it would be a complicated issue to discuss and discover either the theory of Dr. Shari'ati is a applicable idea of Imamat or it is a just onlyu idialogy which cannot be practiced. The dissertation has been written to examine the reality of these two cases either Imamat is inherit case or it can be attainment case through Shouriat or Nass.
This work is mainly based on quantum game-theoretic techniques and their applica- tion to quantum information theory. Quantum game theory is an important development in quantum computation and may have implications for quantum information and quan- tum communication. The e ect of quantum memory on quantum games have been stud- ied. Three di erent games such as, Prisoner’s Dilemma, Battle of the Sexes and Chicken have been analyzed in the quantum domain. By considering the restricted game situa- tion, it is shown that the e ects of quantum memory and decoherence become e ective in a maximally entangled case. For which the quantum player can out perform the classical player in all the three games. It is also shown that the quantum player enjoys an advan- tage over the classical player in Battle of the Sexes game for the amplitude-damping and the depolarizing channels. The quantum memory compensates the reduction in player’s payo s due to decoherence. It has no e ect on the Nash equilibria of the three games. A generalization of two-player quantization scheme to a three-player Prisoner’s Dilemma game under the e ect of correlated noise is also presented. In a restricted game scenario, it is shown the quantum player is always better ofor all values of the decoherence para- meter s for the entire range of memory parameter. It is seen that for maximum degree of correlation, the game does not become noiseless and quantum player can still outscore the classical players for the entire range of the decoherence parameter s> producing an interesting result in comparison with a two-player quantum game. It is also shown that correlated noise has no e ect on the Nash equilibrium of the game. By exploiting the three-player quantization scheme, we have studied the communi- cation aspects of a three-player Prisoner’s Dilemma quantum game. It is shown that entanglement plays a dominant role in a three-player quantum game. On the basis of initial state and the measurement basis entanglement parameters, a relation among dif- ferent payo s is established. It is investigated that the strategies of the players act as information carriers in quantum games. A relationship for the information shared among the parties is also established.A scheme for quantum key distribution is proposed in which a secret key can be generated from the data coming through a partially entanglement breaking channel. This scheme is rather deterministic and e!cient in the sense that two classical bits can be transferred per entangled pair of qubits. Furthermore, it is important to point out that, in this scheme, same symbol can be used for Eve’s detection and key generation. It is also worth noting that the eavesdropper, Eve, can be detected very easily from the disturbance of the elements of the decoding bimatrix. We have checked for the security of the scheme and found it secure against individual attacks. It is further investigated that quantum games are useful in developing quantum cryp- tographic protocols. A multiparty quantum cryptographic protocol using tripartite en- tangled GHZ states is devised using game-theoretic techniques. In this protocol, two classical bits can be transferred per entangled pair of qubits to the communicating par- ties. Unitary operators applied by the sender on a tripartite entangled state encodes a classical symbol that can be decoded at receiver’s end with the help of a decoding matrix. In this protocol, if Eve interferes during the transmission, she can be detected by the disturbance of the decoding matrix. Our security analysis shows that this protocol is also secure against intercept/re-send attacks.