Search or add a thesis

Advanced Search (Beta)
Home > Messages of Holy Quran: Tafsir of Para 9; 2Nd Half

Messages of Holy Quran: Tafsir of Para 9; 2Nd Half

Thesis Info

Author

Aamir Shehzad

Department

University of Management and Technology

Institute

University of Management and Technology

Institute Type

Private

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2009

Thesis Completion Status

Completed

Page

84 .

Subject

Islam

Language

English

Other

Class assignment; EN; Call No: TP 297.122721 AAM-M

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676712902958

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

ماں دی ممتا

ماں دی ممتا

پرانے زمانے دی گل اے کہ اک پنڈ دے لوک بہت ای ظالم سن۔ خاص طور تے اوہ پرندیاں دا شکار کردے۔ درختاں اتے چڑھ کے اوہناں دے آہلنیاںوچوں انڈے یاں بچے کڈھ لیندے سن۔ ایس پنڈ دے باہر اک بہت وڈا بوڑھ دا درخت سی۔ اوتھے اک طوطے نے آہلنا پایا۔ اک طوطا تے طوطی گلاں کردے نیں طوطا طوطی نوں آکھدا اے:

طوطیے من موتیے ایس نگری نہ جا

ایس نگری دے جٹ برے نیں پھائیاں لیندے پاء

اگوں طوطی جواب دیندی اے:

طوطیا من موتیا ٹاہلی میرے بچڑے لک ٹنوں ٹنوں

اوہناں دے دو چھوٹے بچے وی ہوندے نیں۔ طوطا آکھدا اے کہ میں پنڈ جاندا ہاں تاں جے بچیاں لئی کجھ کھاون لئی لے آواں۔ طوطی آکھدی اے۔

طوطیا من موتیا ٹاہلی میرے بچڑے لک ٹنوں ٹنوں

میں اپنے بچیاں نوں چھڈ کے نئیں جا سکدی جے میرے بچیاں نوں کجھ ہو گیا تاں میرا لک ٹٹ جاوے گا۔ میں مر جاواں گی۔ طوطا جان لگدا اے تے طوطی آکھدی اے۔ کہ توں ایس نگری نہ جا۔ ایس نگری دے لوک بہت برے نیں۔ اوہ تینوں قید کر لین گے تے جے تینوں کجھ ہو گیا تاں ساڈا کیہ بنے گا۔ طوطا ایہہ گل سن کے چپ کر کے بہہ جاندا اے۔ اوہ ٹاہلی تے بیٹھے ہوندے نیں تے جیہڑا وی مسافر ٹاہلی دے کولوں لنگھ دا اے۔ اوہ ایہو آکھدی اے۔

ٹاہلی میرے بچڑے لک ٹنوں ٹنوں

اک دن اک راہ گیر دھپ توں بچن لئی ٹاہلی تھلے بہہ جاندا اے۔ اوہدے کول روں ہوندا اے۔ طوطی روں ویکھ کے اوس نوں آکھدی اے۔

ام المؤمنین حضرت ام حبیبہ رضی اللہ تعالی عنہا: احوال و خدمات کا تحقیقی مطالعہ

Man is noblest creation in the universe. Prophets are the most honorable men among of all the human being. Hazrat Muhammad (S.A.W) is most exalted in all prophets. Those who saw the countenance in belief get the blessing from the highest status. There are eleven virtuous wives of the Prophet (S.A.W) to be the mother of whole Umma e Muslim. One of them is Hazrat Ramla (R.A), daughter of Hazrat Abu Sufyan (R.A). She is known as Umme Habiba. As a Makah’s Chief daughter she enjoys every facility. After embracing Islam she showed stead fastness and consistency in Islam. Because her first husband was Christian but she protects her faith, notions and honor. The Holy Prophet (S.A.W) give her honor for sending marriage proposal. The Negus recited the word of nikah of all the virtuous and chaste wives of the Holy Prophet (S.A.W). Hazrat Umm e Habeeba (R.A) was the greatest preacher and supporter of Islam. She was always ready and assiduous to follow the teachings of Islam; and she understand it her obligation to follow the tradition of Hadith. There are sixty five traditions attributed to her in the primary sources of Hadith, which have fundamental status on different topics. In the mentioned article, the investigatory and factual study of her conditions and services has been offered and displayed

Formal Semantic Model for Web Applications Security- an Intelligent Approach for Detecting and Classifying Cyber Attacks

Cyber Civilization has become an important source of information sharing and professional activities. It is a rapid and concert source for boosting the economy of the world. The exponential increase in cyber threats with the expansion of web applications has become the biggest security concern to e-business, medical data, personal privacy and defense systems. Presently the social networks, Internet connected mobile devices, individual privacy, and the online connectivity of entities such as e-shopping, e-banking or e- commerce are the most enticing targets for cyber criminals. Sophisticated approaches are used to launch polymorphic attacks to exploit the vulnerabil- ities of web applications. Recent surveys show that more than 80% attacks targeting the application layer, 90% applications are vulnerable to attacks and on the average 15 new vulnerabilities are released per day. These facts seem justified to prove that current state of the art security solutions are ineffective to provide sufficient security solution. These solutions inherently have static nature in attack detection, lack of expressiveness in attack detec- tion rules, and absence of reasoning capability that are required for detecting unanticipated ways to launch an attack. In this dissertation, a new methodology has been adopted that has for- mal grounding and mitigated the problems in the domain of web application security. The proposed methodology is an ontology based technique that is used for detecting and classifying web application attacks. It specifies web application attacks by using semantic rules, the context of consequence and the specifications of application protocols. The approach is capable of detect- ing sophisticated attacks effectively and efficiently by analyzing the specified portion of a user request where attacks are possible. Semantic rules / signa- tures help to capture the context of the application, possible attacks and the protocol used. These rules also allow inference to run over the ontological models in order to detect, the often complex polymorphic variations of web application attacks. The proposed approach is used for model specification, logic inference and attack vector analysis techniques utilized to generalization of attack rules. The ontological models are developed in Protege framework by using De- scription Logic that is based on the Web Ontology Language (OWL). The inference rules are Horn Logic statements and are implemented by using the Apache JENA framework. The approach is therefore platform and technol- ogy independent. Prior to the evaluation of the approach the knowledge models are validated by using OntoClean to remove inconsistency, incom- pleteness and redundancy in the specification of ontological concepts. The experimental results show that the detection capability and performance of our approach is significantly better than current state of the art solutions. The approach successfully detects web application attacks whilst generat- ing few false positives. The examples that are presented demonstrate that a semantic approach can be used to effectively detect zero day and more sophisticated attacks in a real-world environment. For clarity and validity of models, some useful functionalities and specifications of semantic rules, protocol, and attack ontology are formally modeled by using Z notation.