Search or add a thesis

Advanced Search (Beta)
Home > حضرت معاویہ بن ابی سفیان کے احوال و آثار اور فضائل و مناقب کا تحقیقی مطالعہ، احادیث و آثارکی روشنی میں

حضرت معاویہ بن ابی سفیان کے احوال و آثار اور فضائل و مناقب کا تحقیقی مطالعہ، احادیث و آثارکی روشنی میں

Thesis Info

Author

حافظ افتخار احمد

Supervisor

محی الدین ہاشمی

Institute

Allama Iqbal Open University

Institute Type

Public

City

Islamabad

Country

Pakistan

Thesis Completing Year

2017۔

Thesis Completion Status

Completed

Page

237ص۔ CD

Subject

Islam

Language

Urdu

Other

Call No: 297.65 ا ف ح; Publisher: علامہ اقبال اوپن یونیورسٹی،

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676714492349

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

آفت

(Seneca) نے بڑے خوبصورت انداز میں کہا تھا کہ اچھی چیزوں کی خواہش کی جاتی ہے جو خوشحالی سے تعلق رکھتی ہیں لیکن اچھی چیزیں جو نحوست سے تعلق رکھتی ہیں ان کی تعریف بھی کرنی چاہیے۔ یقینا اگر فطرت پر دسترس ہو جائے تو معجزات ہو سکتے ہیں۔ اور یہ زیادہ آفت میں ہی ظاہر ہوتے ہیں ایسی بات کوئی کافر نہیں کر سکتا۔ یہ ایک سچی عظمت ہے کہ آدمی اقرار کر لے کہ وہ کمزور پیدا کیا گیا ہے۔ تاہم وہ اللہ کی اس سلطنت میں فکروں اور پریشانیوں سے آزاد رہے۔ یہ شاعری میں ہی بہتر طور پر ہو سکتا ہے کیونکہ وہاں قوت تخیل کو بہت زیادہ آزادی ہے ۔ اور بلاشبہ شاعر حضرات اس میں مصروف ہوتے ہیں ۔ اس چیز کے اثرات جو کہ قدیم شاعروں نے عجیب و غریب بناوٹی کہانیوں میں پیش کئے ہیں جو کہ راز معلوم ہوتے ہیں نہیں بلکہ حقیقت میں اس مسیحی کی حالت تک کچھ رسائی ہونی چاہیے ۔ Hercules جب Prometheusکو چھوڑانے جاتا ہے جو کہ انسانی فطرت کو ظاہر کرتا ہے۔ وہ ایک عظیم سمندر کو مٹی کے گھڑے کےذریعے پار کرتا ہے۔
مسیحی کا مصمم ارادہ بڑی خوبصورتی سے بیان ہوتا ہے کہ وہ اپنے کمزور جسم کے ساتھ اس دنیا کی بڑی بڑی موجوں میں اپنا بحری سفر کرتا ہے۔ لیکن یہ کسی قیاس آرائی کے بغیر ہے ۔ خوشحالی کی خیر ضبط نفس ہے جبکہ آفت کی خیر صبر و استقلال ہے۔ اخلاقیات کے اصولوں کے مطابق صبر و استقلال ، ضبط نفس سے زیادہ بڑی خیر ہے۔ خوشحالی تو رات مقدس کی ایک نعمت ہے جبکہ نحوست یا آفت انجیل مقدس کی نعمت ہے۔ جس میں بہت زیادہ نعمتیں ہیں اور یہ خدا کی واضح ہمدردیوں کا اظہار ہے۔ تاہم تو رات مقدس میں اگر آپ...

Application of Diabetes Self Management Education (DSME) in Patients with Type 2 Diabetes Mellitus based on Blood Glucose Levels

Diabetes Self Management Education (DSME) uses guidelines, counseling, and behavioral intervention methods to increase knowledge about diabetes and improve individual and family skills in managing diabetes mellitus (DM). This research is a quantitative study using a pre-experimental design that provides treatment or intervention to the research subjects then the effect of the treatment is measured and analyzed. This design is used to compare the results of the intervention of the application of Diabetes Self Management Education (DSME) on controlling blood glucose levels in patients with type 2 diabetes mellitus. The analysis used the dependent t-test / paired t-test. The results showed that there were significant differences in blood glucose levels in the measurement after giving DSME to the respondents, indicating that the measurement of blood glucose levels after treatment was smaller than the measurement before treatment. It is necessary to develop a program to increase the competence of nurses in nursing care for diabetic clients and education related to diabetic self-care to increase the knowledge and skills of nurses in managing diabetes.

Secure Communication Using Steganography in Image Processing

Research in information security and secrecy is becoming more and more important, as well as, demanding as the information is exponentially exploding. There has been a good bit of focus on cryptography, but with cryptanalysis and crypto attacks, researches have looked into the alternative means, like steganography. Steganography conceals the message into the cover file. In this dissertation we have focused on image steganography and we have tried to improve the key parameters of the system which are capacity, imperceptibility and robustness. In the first part of the thesis the presented work comprises of two contributions. In the first contribution the secret information is preprocessed by using latest devised right translated gray substitution box and BCH error correction codes. This process enhances the security of the information as data retrieval is impossible without the information of mapping rule applied and secret key. Differential embedding to the LSBs of optimized chaotically selected pixels through GA is another step to make detection difficult and avoid error to propagate. In second contribution we introduce an advance technique for embedding based on representing cover image pixels using a new 13-bit prime series representation resulting into 3-times increase in capacity. The payload has been reduced by applying 2D DCT to secret image and thresholding of the coefficients ensuring high imperceptibility. An innovative algorithm has also been proposed to ensure the uniform spread of message into the cover image by adjusting average separation between the chaotically selected pixels of cover image for embedding based on size of secret information and cover image In the second part of the thesis the presented work is an application of compressed sensing. The main advantage we have gained is the huge increase in security of the information along with the payload reduction. Utilizing compressed sensing made the system more secure as reconstruction of the data is impossible without knowing the measurement basis, as the generation process of measurement basis is random and requires huge computations to predict them. We have presented two problems. The first contribution focuses on combining compressive sensing and steganography to enhance security of image steganography. The secret image is encrypted and compressed using compressive sensing. The encrypted data is then embedded to randomly selected pixels of cover image using a secret chaotic key. Simulation results presented show the efficient recovery and reconstruction of secret image using reduced payload. In the second contribution we have focused on security and payload capacity enhancement of an image steganography system for an audio message by using compressed sensing theory. However, in order to utilize compressed sensing, the audio message is first converted to an equivalent grayscale image which is sparsified using 2D-DCT and thresholding. The sparsified image is further compressed using the proposed compressed sensing algorithm which enhances the security to a high level and also payload capacity improves significantly, without losing imperceptibility of the system. The compressed image is embedded in chaotically chosen pixels of the cover image. At receiver the compressed sensing reconstruction algorithm is used to reconstruct the grayscale image which is then converted back to the audio message. Presented results indicate that the proposed system is highly imperceptible, secure and robust against various image processing attacks. It is able to reconstruct secret audio message with high PSNR value.