Search or add a thesis

Advanced Search (Beta)
Home > قرآن وسنت کا باہمی تعلق اور مولانا حمیدالدین فراہی

قرآن وسنت کا باہمی تعلق اور مولانا حمیدالدین فراہی

Thesis Info

Author

منزہ مصدق، مسز

Supervisor

جمیلہ شوکت

Institute

Allama Iqbal Open University

Institute Type

Public

City

Islamabad

Country

Pakistan

Thesis Completing Year

2002

Thesis Completion Status

Completed

Page

305 ص

Subject

Islam

Language

Urdu

Other

Call No: 297.112 م ن ق; Publisher: علامہ اقبال اوپن یونیورسٹی

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676714583641

Similar


Loading...

Similar Thesis

Showing 1 to 20 of 100 entries
TitleAuthorSupervisorDegreeInstitute
Allama Iqbal Open University, Islamabad, Pakistan
Mphil
Allama Iqbal Open University, Islamabad, Pakistan
Mphil
Allama Iqbal Open University, اسلام آباد
Mphil
Allama Iqbal Open University, اسلام آباد
MA
Minhaj University Lahore, لاہور
Mphil
HITEC University Taxila Cantt, ٹیکسلا
MA
University of Karachi, Karachi, Pakistan
Mphil
Allama Iqbal Open University, اسلام آباد
Mphil
University of the Punjab, لاہور
Mphil
University of the Punjab, لاہور
Mphil
The Islamia University of Bahawalpur, Bahawalpur, Pakistan
Mphil
Bahauddin Zakariya University, ملتان
Mphil
Bahauddin Zakariya University, ملتان
MS
Lahore College for Women University, لاہور
Allama Iqbal Open University, Islamabad, Pakistan
MA
University of Karachi, Karachi, Pakistan
PhD
University of Sargodha, سرگودھا
PhD
University of Karachi, Karachi, Pakistan
PhD
University of Karachi, کراچی
Mphil
GIFT University, گوجرانوالہ
TitleAuthorSupervisorDegreeInstitute
Showing 1 to 20 of 100 entries

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

ناموسِ گدائی نہ گنوا اور بھی کچھ مانگ


ناموسِ گدائی نہ گنوا ، اور بھی کچھ مانگ
’’اب تنگیِ داماں پہ نہ جا اور بھی کچھ مانگ‘‘

بے پایاں ہے اُس در کی عطائوں کا تسلسل
بے مثل ہے اُس در کی سخا ، اور بھی کچھ مانگ

دریائے سخاوت ہے رواں روزِ ازل سے
رکتی ہی نہیں موجِ عطا ؛ اور بھی کچھ مانگ

خود دستِ عطا بڑھتا ہے محتاج کی جانب
اس شان کا آقاؐ ہے ترا اور بھی کچھ مانگ

اسباب کی دنیا کو کیا ایسا مسخّر
صحراؤں نے قلزم سے کہا ’’اور بھی کچھ مانگ‘‘

محدود ہے صحراؤں کی وسعت؛ نہیں محدود
اُس رحمت عالمؐ کی گھٹا ؛ اور بھی کچھ مانگ

جس شمعِ حرمؐ نے کیا دنیا میں اُجالا
دل کے لئے لے اُس سے ضیا اور بھی کچھ مانگ

خالق کی عطاؤں سے عطاؤں کے وہ قاسمؐ
خالق کی عطا ؛ اُنؐ کی عطا ؛ اور بھی کچھ مانگ

ہر بار صدا آتی ہے دربارِ سخا سے
عرفانؔ! لگا اور صدا ، اور بھی کچھ مانگ!

متقدمین و متاخرین فقہا کی آراء کی روشنی میں مال حرام کا منافع

Islam teaches its follower purification in every walk of life, be itassociated with creed, character, worship or economic activities; it is advised that they should avoid contaminated substance. Unlawful income (Maal-eHaram) is also prohibited by sharia to be earned or kept in custody; . However types of unlawful income are more than few, for instance riba, robbery, bribery etc and Sharia scholars have different views about each one of them, similarly opinions of sharia scholars are also different on profit earned on the lawful investment of unlawful income. In this paper, sharia guidelines regarding lawful and unlawful income is presented, different types of unlawful income and views of sharia scholars regarding the income and profit earnedfrom the investment of the same are mentioned with arguments, in the end suggestions are given in light of present era regarding each type of unlawful income.

Secure Provenance for Distributed Environment

Data provenance has an essential role in establishing the trustworthiness of data in many applications, where critical decisions have to be made based on the data collected from diverse sources. Therefore, it is indispensable to use authentic and accurate data for such mission-critical applications. In order to fully trust the data provenance itself, it is extremely important to secure the data provenance from forgeries and misuse. Provenance generation, management, and dissemination have received substantial attention from the research community. However, provenance security in a collaborative distributed network has earned less heed from the research community. The traditional time-honoured security solutions cannot be directly applied because of the chained or directed acyclic graph structure of the provenance. For a collaborative distributed network, in the literature, some security solutions have been proposed to secure the provenance information. However,these schemes are not without their limitations. The existing schemes assume transitive trust among participating users, thus attacks initiated by multiple consecutive colluding users on a provenance chain cannot be detected. Such an assumption is beyond the reality, especially working in a file sharing environment or distributed network. Moreover, the existing schemes introduce an additional element to chain the provenance records which results an extra storage overhead. To overcome the aforementioned loopholes, we have proposed secure provenance schemes for a document/file sharing n etwork. The proposed schemes can detect the attacks launched by either consecutive or non-consecutive adversaries. For the provenance records chaining, these schemes aggregate the signatures of the participating users. Experimental results show that the proposed schemes outperform as compared to existing schemes in terms of computation and storage cost. Provenance size is a major hindrance to the adoption of provenance in a resourceconstrained network. The provenance size increases drastically when the number of nodes in the network grow. The growing provenance size becomes the per formance bottleneck especially in Wireless Sensor Networks (WSNs). Different solutions have been proposed in the literature to compress the provenance in formation along with its security. However, in existing provenance compression schemes, the provenance’s size grows linearly with the number of nodes in a WSN. Furthermore, the existing provenance compression schemes are designed for static nodes only and do not account for the mobility factor. Moreover, some secure provenance compression schemes use overlapped arithmetic coding to compress the provenance information. However, there is no criterion to find the overlapping ratio. To overcome the above-mentioned issues, we have proposed a secure provenance compression scheme for mobile nodes of a WSN. Moreover, a novel mechanism has been devised to calculate the overlapping ratio for overlapped arithmetic coding. Furthermore, the proposed scheme assures the confidentiality, integrity, and fresh ness of the provenance information. It is evident from the simulation results that the proposed scheme has higher compression and lower false positive rate.