مولانا فضل الحسن حسرتؔ موہانی
شاید جہاں سے حسرتِ دیوانہ چل بسا
ہاں ہاں جب بھی تو چشمِ جنون اشکبار ہے
بالآخر کئی مہینہ کی موت و حیات کی کشمکش کے بعد ہمارے قافلہ آزادی کا پہلا حدی خوان اور میرکاروان بھی کوچ کرگیا اور گلستانِ تغزل کا بلبلِ نغمہ سنج ہمیشہ کے لیے خاموش ہوگیا، یعنی گذشتہ ۱۳؍ مئی کو سیدالاحرار مولانا فضل الحسن حسرت موہانی نے اس دارِ فانی کو الوداع کہا کلُّ مَنْ عَلَیھْاَ فَانٍ ویبقی وجہ رَبِّکَ ذوالجلال وَالاکرام۔[الرحمن:۲۶۔۲۷]
مولانا حسرت کی ذات ستودہ صفات مجموعہ اضداد و کمالات تھی، وہ ملک و وطن کے جانباز مجاہد اور شاعرِ رنگین نوا بھی، انقلابی سوشلسٹ بھی تھے اور صاحبِ و جدوحال صوفی بھی، بوریہ نشینِ فقرومسکنت بھی اور مسندنشینِ غروتمکنت بھی انہوں نے اس زمانہ میں انگریزوں کی مخالفت کی صدا بلند کی ، جب اسکی پاداش دارورسن تھی، اس زمانہ میں آزادی کا صور پھونکا جب کانگریس بھی اس نام سے گھبراتی تھی اور بڑے بڑے محبِ وطن آزادی کے کھلونوں میں الجھے ہوئے تھے، اور اس زمانہ میں قوم و ملک کے لیے قید و بند کی مصیبتیں جھیلیں جب جیل سیاسی تفریح گاہ نہیں بلکہ حقیقۃً قید محن تھے، انہوں نے اس راہ میں جو قربانیاں کیں اور جتنے مصائب اٹھائے اسکی مثال اس زمانہ کے کسی لیڈر کی زندگی میں مشکل ہی سے مل سکتی ہے اور موجودہ مدعیانِ آزادی کو توآزادی کا شعور و احساس بھی نہیں تھا، بلکہ حق یہ ہے کہ گاندھی جی بھی ایک عرصے تک اس راہ میں ان سے بہت پیچھے رہے، حسرت کایہ دعوی اولیت بالکل صحیح ہے۔
تو نے کی حسرت عیاں تہذیبِ رسمِ عاشقی
اس سے پہلے اعتبارِ شانِ رسوائی نہ تھا
وہ اخلاص و صداقت حق گوئی و حق پرستی اور جرات و بے باکی کے جس درجہ پر تھے،...
Whenever we chronically morph into the history of the American intervention in Afghanistan it adheres to the fact that the war on terror was a rigid response of US aggression towards their failure in resisting the 9/11 attack of 2001 or for the sack of utter humanity or humanitarian rights. But on the contrary, many analysts and scholars on realistic ground justify the notion of war on terror as a strategic war which none the less determined the most figure of sustenance of US- hegemony in South Asia along with enormous illustrations of uncountable violation of human rights or the right of liberty the US administration, under the prism of liberalism. And now when the NATO alliance has existed from Afghanistan after a long constitutive war of 20 years without a remediate response, it enacts a dispersed or iconic philosophical thought that was the war on terror was a success or utter failure? The article will foretell the events that led to the war on terror from USA perspectives and policies its decisive defeat along with the rising of Taliban government with future threat and ties of it among state, under the prism of realism or the realist school of thought.
Data provenance has an essential role in establishing the trustworthiness of data in many applications, where critical decisions have to be made based on the data collected from diverse sources. Therefore, it is indispensable to use authentic and accurate data for such mission-critical applications. In order to fully trust the data provenance itself, it is extremely important to secure the data provenance from forgeries and misuse. Provenance generation, management, and dissemination have received substantial attention from the research community. However, provenance security in a collaborative distributed network has earned less heed from the research community. The traditional time-honoured security solutions cannot be directly applied because of the chained or directed acyclic graph structure of the provenance. For a collaborative distributed network, in the literature, some security solutions have been proposed to secure the provenance information. However,these schemes are not without their limitations. The existing schemes assume transitive trust among participating users, thus attacks initiated by multiple consecutive colluding users on a provenance chain cannot be detected. Such an assumption is beyond the reality, especially working in a file sharing environment or distributed network. Moreover, the existing schemes introduce an additional element to chain the provenance records which results an extra storage overhead. To overcome the aforementioned loopholes, we have proposed secure provenance schemes for a document/file sharing n etwork. The proposed schemes can detect the attacks launched by either consecutive or non-consecutive adversaries. For the provenance records chaining, these schemes aggregate the signatures of the participating users. Experimental results show that the proposed schemes outperform as compared to existing schemes in terms of computation and storage cost. Provenance size is a major hindrance to the adoption of provenance in a resourceconstrained network. The provenance size increases drastically when the number of nodes in the network grow. The growing provenance size becomes the per formance bottleneck especially in Wireless Sensor Networks (WSNs). Different solutions have been proposed in the literature to compress the provenance in formation along with its security. However, in existing provenance compression schemes, the provenance’s size grows linearly with the number of nodes in a WSN. Furthermore, the existing provenance compression schemes are designed for static nodes only and do not account for the mobility factor. Moreover, some secure provenance compression schemes use overlapped arithmetic coding to compress the provenance information. However, there is no criterion to find the overlapping ratio. To overcome the above-mentioned issues, we have proposed a secure provenance compression scheme for mobile nodes of a WSN. Moreover, a novel mechanism has been devised to calculate the overlapping ratio for overlapped arithmetic coding. Furthermore, the proposed scheme assures the confidentiality, integrity, and fresh ness of the provenance information. It is evident from the simulation results that the proposed scheme has higher compression and lower false positive rate.