Search or add a thesis

Advanced Search (Beta)
Home > احکام النساء سورۃ النساء کی روشنی میں

احکام النساء سورۃ النساء کی روشنی میں

Thesis Info

Author

بشری اشرف عباسی

Supervisor

عبد الحمید خان عباسی

Institute

Allama Iqbal Open University

Institute Type

Public

City

Islamabad

Country

Pakistan

Thesis Completing Year

2007

Thesis Completion Status

Completed

Page

115 ص

Subject

Islam

Language

Urdu

Other

Call No: 297.1227 ب ش ا; Publisher: کلیہ عربی و علوم اسلامیہ علامہ اقبال اوپن یونیورسٹی،

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676714638135

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

عشق دا روگ

عشق دا روگ
عشق نے دل وچ پایا زور
اودوں جگ وچ مچ گیا شور
لوکی مینوں پاگل کہندے
مینوں ویکھ کے ہسدے رہندے
اسیں تے طعنے مہنے سہندے
کسے نال نہ پایا کھور
وکھری دنیا مل گئی مینوں
حسد کریں کیہہ ملدا تینوں
دل دی آکھ سناواں کیہنوں
سب دسدے نے ہور دے ہور
یار پنل جد دل نوں بھایا
سسی رو رو حال ونجایا
اوہ ستی تے یار گنوایا
ملیا کیچ تے نہ بھنبھور
قادریؔ سائیں سمجھ نہ آئی
جس گھر عشق نے جھاتی پائی
جلی کلی پھوک جلائی
دُکھاں وچ نہ ہووے بور

Examining the Issue of Identity in Ayisha Malik’s Novel “Sofia Khan is Not Obliged” Through Homi K. Bhabha’s Concepts of ‘Hybridity, Ambivalence and Mimicry’

This paper studies Ayisha Malik’s Sofia Khan is not obliged from postcolonial perspective. The paper studies the novel from the view of the discourse presented by Homi K. Bhabha. The novel was published in 2015. The story revolves around a girl of Muslim ethnicity from Pakistan named Sofia Khan. She is living in London and is working there in a publishing company. The story is about the adventures of protagonist; her experiences and views the London from her perspective. The paper analyzes the characters and the main events from the research method of textual analysis. The study finds that the concept proposed by Bhabha, very much plays an operative role (viable role) on the British-Muslim- characters in their attempt to assimilate into their Host/Home country. It concludes that how these Muslim characters locate agency in the “in between space” within the process of mimicry and negotiate their identity in their effort to assimilate in colonizer’s space.

Securing Routing in Mobile Adhoc Networks Manets Form Insider Attackers Through Trust Management

Routing, having focal responsibility in MANET’s successful operation, are based on the assumption of nodes’ cooperation. However, this assumption exposes routing to various insider attackers. These attackers are the legal participants having privileged access to network when inducing attacks on routing. Furthermore, these insider attackers are either in the form of selfish nodes or malicious nodes. The motive of selfish node is saving its resources by not cooperating in routing activities whereas the purpose of malcious node is to attack the network. Therefore, providing security in routing against affirmed attackers has emerged a challenging issue in MANETs. In research community, trust management schemes are used to defend routing against insider attackers. The very focus of this research is to develop a trust management scheme for securing routing from insider attackers to launch blackhole and greyhole attacks. We proposed a trust management scheme, named as MT-SECURER (“Multi Factors Trust for Secure and Reliable Routing in MANETs”), for making routing secure against insider attackers (i.e., blackhole and greyhole attackers). This scheme develops trust from multiple factors, i.e., “node’s cooperation” from communication networks and “node’s relationship maturity” and “mutual friends” from social networks. Whereas for trust development, nodes’ personal observations along with neighbours’ recommendations are utilized. Neighbors’ recommendations, having a pivotal role in computation of trust, if hampered may entail in colossal attacks from dishonest trust recommenders such as “bad mouthing”, “ballot stuffing” and “random opinion”. Therefore, mitigation of dishonest trust recommendations has emerged as a stimulating research issue in trust management systems. In order to cater these challenges associated with dishonest trust recommendations, a technique named “intelligently Selection of Trust Recommendations based on Dissimilarity factor (iSTRD)” has been devised. iSTRD exploits observer node’s personal experience in conjunction with majority vote of the recommenders for removing dishonest trust recommendations. For performance analysis, MT-SECURER is used with AODV and DSR routing protocols and detail simulations are performed in order to examine the proposed scheme’s effectiveness in presence of blackhole and greyhole attackers and nodes’ mobility. The experimental results show significant improvement in “detection rate”, “packet delivery ratio”, throughput and “normalized routing load” with slightly increased “average end-to-end delay” when compared to contemporary schemes. Furthermore, iSTRD successfully removes the trust recommendations of “low trustworthyrecommenders” aswellasdishonesttrustrecommendationsof“highlytrustworthy recommenders”. Its efficacy is evident from enhanced accuracy of “recognition rate”, “false rejection” and “false acceptance”. Moreover, experiential results depict that iSTRD has unprecedented performance compared to contemporary techniques in presence of “bad mouthing”, “ballot stuffing” and “random opinion” attacks.