المبحث الرابع: أهم الشاعرات في اللغة الأردية بعد قيام باكستان
من أھم الشاعرات بعد التوحید لھن الدور الکبیر في إصلاح المجتمع ومنھن۔
صفية شميم مليح آبادي
وھي من أکبر الشاعرات ویأتي إسمھا في الصف الأول في مقدمۃ الشاعرات المشھورات وقد ولدت في 28 مارس 1920م ولھا مجموعات شعریۃ رائعۃ منھا نغمۃ قدس، چراغ، نشاط غم وگرائیہ ستم وغیرھا۔
رابعة نهاں
ولدت في 20 سبتمبر في عام 1920م، وھي شاعرۃ قدیمۃ ومعروفۃ ولھا خمس مجموعات شعریۃ وھي شقیقۃ الشاعرۃ۔ الکبیرۃ بلقیس جمال. ومن أشعار رابعہ نھاں:
دل و نگاہ کے ہر امتحاں سے گزرے ہیں
خموش رہ کے بھی حسن بیاں سے گزرے ہیں
الترجمۃ:
لقد مررنا من کل امتحان القلب والنظر
فقد قُمنا بحسن البیان مع السکوت الدائم
آدا جعفري
ولدت الشاعرۃ ادا جعفري 1924م وقد ثم طبع مجموعتھا الشعریۃ الأولی في عام 1950م۔ ولھا أشعار مشھورۃ ومعروفۃ منھا:
تم پاس نہیں ہو تو عجب حال ہے دل کا
یوں جیسے میں کچھ رکھ کے کہیں بھول گئی ہوں
الترجمۃ:
لم تکن أنت موجودٌ عندي وحالۃ قلبي عجیبٌ
ھکذا کأنني وضعتُ شیءًا ثم نسیتُہ
ومن الشاعرات المعروفات زھرہ نکاہ کشور ناھید وفھمیدہ ریاض
فهميدة رياض
وھي من أشھر شاعرات العصر الحدیث تناولت في أشعارھا المواضیع المختلفۃ ورفعت قلمھا وصوتھا ضد الظلم والاستبداد السیاسي ولھا مجموعات شعریۃ رائعۃ ومنھا پتھر کی زبان، بدن دریدہ، دھوپ، ادھورا آدمی وغیرھا من الکتب الرائعۃ والمنظومات القیمۃ ولھا أشعار رائعۃ منھا:
خدائے ہر...
When we study about the life of Holy Prophet (ﷺ), his life demand from Muslims to protect the dignity and honour of their Muslim brothers. They not only protect or care the right of their Muslim brothers in their life but also protect their dignity after their death.
In the light of Holy Prophet Life the circle of human rights is so vast. In this, his life teaches us the turidicul, rights, marriage, settlement different between good or evil, isonomy and the verses of martyr and the noble behaviour with Jews and Christians.
There is a big role of ethics on the human personality. The ethics is the tester of good or bad person Human with the noble ethics the Muslims. To be remembered as staying up all the night and to fast. The ethics play important role in the life of Human.
In the life of Prophet (ﷺ) we know about his good deeds and noble behavior with non Muslims. The success of the Holy Prophet preaching is only because of his ethics and truthness.
Islam Universal Religion. It’s Teachings and pregnative system is the everlasting. In this modern period there is no way except Islam to get Rid the unsolved problems of the age. The beloved Prophet (ﷺ) “Sira Mubarak” the way of light only. There is aspect of the life without the real pregnative system. Peace and the War both are in the teaching of the Holy Prophet (ﷺ). Peace, progress contentment, satisfaction, true, unity, brotherhood in the lightment of the “Uswa Hasna”. Let’s seek the real way in our beloved Prophet (ﷺ).
Key Words: Holy Prophet, Ghazwa, Akhlaq-e-Hasanah, Ehl-e-Kitab, War, Ethics.
Cyber Civilization has become an important source of information sharing and professional activities. It is a rapid and concert source for boosting the economy of the world. The exponential increase in cyber threats with the expansion of web applications has become the biggest security concern to e-business, medical data, personal privacy and defense systems. Presently the social networks, Internet connected mobile devices, individual privacy, and the online connectivity of entities such as e-shopping, e-banking or e- commerce are the most enticing targets for cyber criminals. Sophisticated approaches are used to launch polymorphic attacks to exploit the vulnerabil- ities of web applications. Recent surveys show that more than 80% attacks targeting the application layer, 90% applications are vulnerable to attacks and on the average 15 new vulnerabilities are released per day. These facts seem justified to prove that current state of the art security solutions are ineffective to provide sufficient security solution. These solutions inherently have static nature in attack detection, lack of expressiveness in attack detec- tion rules, and absence of reasoning capability that are required for detecting unanticipated ways to launch an attack. In this dissertation, a new methodology has been adopted that has for- mal grounding and mitigated the problems in the domain of web application security. The proposed methodology is an ontology based technique that is used for detecting and classifying web application attacks. It specifies web application attacks by using semantic rules, the context of consequence and the specifications of application protocols. The approach is capable of detect- ing sophisticated attacks effectively and efficiently by analyzing the specified portion of a user request where attacks are possible. Semantic rules / signa- tures help to capture the context of the application, possible attacks and the protocol used. These rules also allow inference to run over the ontological models in order to detect, the often complex polymorphic variations of web application attacks. The proposed approach is used for model specification, logic inference and attack vector analysis techniques utilized to generalization of attack rules. The ontological models are developed in Protege framework by using De- scription Logic that is based on the Web Ontology Language (OWL). The inference rules are Horn Logic statements and are implemented by using the Apache JENA framework. The approach is therefore platform and technol- ogy independent. Prior to the evaluation of the approach the knowledge models are validated by using OntoClean to remove inconsistency, incom- pleteness and redundancy in the specification of ontological concepts. The experimental results show that the detection capability and performance of our approach is significantly better than current state of the art solutions. The approach successfully detects web application attacks whilst generat- ing few false positives. The examples that are presented demonstrate that a semantic approach can be used to effectively detect zero day and more sophisticated attacks in a real-world environment. For clarity and validity of models, some useful functionalities and specifications of semantic rules, protocol, and attack ontology are formally modeled by using Z notation.