یہ وہ دعا ہے جو والدین نے سب سے پہلے سکھائی تھی۔ والدہ محترمہ جب بھی کھانا دیتی تھیں تو پہلے یہی پوچھتی تھیں کہ دعا پڑھ لی؟ والد محترم تو جلی حروف میں یہ دعا پڑھتے اور کھانا شروع کرتے ۔ یہ ہے پرانے وقتوں میں سکھانے کا انداز ۔ دعا کا تو ذکر آ گیا ورنہ ہر گھر میں بڑی بوڑھیاں تربیت کے یہی گر اختیار کرتی تھیں اور اس کے نتائج بھی شاندار رہتے تھے۔ انتساب والدین کے نام کرنے کا مقصد یہ ہے کہ خدا کی حمد و ثنا اور خاتم النبیین ؐ، رحمت اللعالمیؐن پر درود و سلام کے بعد اپنے اپنے والدین کو یاد کیجیے۔ اگر وہ حیات ہیں تو ان کی درازی عمر کے لیے دعا کیجیے اور اگر اس دنیا سے رخصت ہو چکے ہیں تو ان کے لیے دعا کیجیے کہ اے رب ہمارے والدین کی قبروں کو جنت کے باغوں میں سے ایک باغ بنا دے اور ان کے لیے جنت کی راہیں آسان بنا دے۔ آمین ثم آمین۔
فکر اقبال متعدد صفات سے متصف ہے۔ اقبال نے اپنے افکار کی پرورش کے لیے اردو اور فارسی شاعری کا ذریعہ اختیار کیا ۔ دونوں جگہ اقبال کی شاعری کا نکتہ توحید، رسالت اور امت مسلمہ کی بیداری رہا۔ اس کے لیے اقبال کبھی خودی کا راستہ سجھاتے دکھائی دیتے ہیں تو کہیں شاہین و عقاب کہہ کر نو جوانوں کا لہو گرماتے ہیں۔ کبھی جذبہ حریت بیدارکرتے دکھائی دیتے ہیں تو کبھی غیرت کو بڑی چیز قرار دے کر حوصلہ بلند کرتے دکھائی دیتے ہیں۔ میر کارواں کو دل نوازی کا درس دیا تا کہ عوام نہ تو حرم سے بدگماں ہو اور نہ ہی کارواں سے ٹوٹنے کا خیال اس کے دل میں جگہ پاسکے۔ رخت سفر کے لیے میر کارواں کو درس دیا کہ وہ...
During the former era of the State of Bahawalpur the Nawabs were in perpetual conflict with their relatives. The Kehlwar family of Sindh and during the modern era remained under influence of the British. So we can say that the State of Bahawalpur remained under constant foreign influence and the Nawabs did not have chance to rule with liberty and ease. In spite of these facts, the government of the State had many Islamic qualities and there are clear effects of Fatwa on judicial system in both eras.
Routing, having focal responsibility in MANET’s successful operation, are based on the assumption of nodes’ cooperation. However, this assumption exposes routing to various insider attackers. These attackers are the legal participants having privileged access to network when inducing attacks on routing. Furthermore, these insider attackers are either in the form of selfish nodes or malicious nodes. The motive of selfish node is saving its resources by not cooperating in routing activities whereas the purpose of malcious node is to attack the network. Therefore, providing security in routing against affirmed attackers has emerged a challenging issue in MANETs. In research community, trust management schemes are used to defend routing against insider attackers. The very focus of this research is to develop a trust management scheme for securing routing from insider attackers to launch blackhole and greyhole attacks. We proposed a trust management scheme, named as MT-SECURER (“Multi Factors Trust for Secure and Reliable Routing in MANETs”), for making routing secure against insider attackers (i.e., blackhole and greyhole attackers). This scheme develops trust from multiple factors, i.e., “node’s cooperation” from communication networks and “node’s relationship maturity” and “mutual friends” from social networks. Whereas for trust development, nodes’ personal observations along with neighbours’ recommendations are utilized. Neighbors’ recommendations, having a pivotal role in computation of trust, if hampered may entail in colossal attacks from dishonest trust recommenders such as “bad mouthing”, “ballot stuffing” and “random opinion”. Therefore, mitigation of dishonest trust recommendations has emerged as a stimulating research issue in trust management systems. In order to cater these challenges associated with dishonest trust recommendations, a technique named “intelligently Selection of Trust Recommendations based on Dissimilarity factor (iSTRD)” has been devised. iSTRD exploits observer node’s personal experience in conjunction with majority vote of the recommenders for removing dishonest trust recommendations. For performance analysis, MT-SECURER is used with AODV and DSR routing protocols and detail simulations are performed in order to examine the proposed scheme’s effectiveness in presence of blackhole and greyhole attackers and nodes’ mobility. The experimental results show significant improvement in “detection rate”, “packet delivery ratio”, throughput and “normalized routing load” with slightly increased “average end-to-end delay” when compared to contemporary schemes. Furthermore, iSTRD successfully removes the trust recommendations of “low trustworthyrecommenders” aswellasdishonesttrustrecommendationsof“highlytrustworthy recommenders”. Its efficacy is evident from enhanced accuracy of “recognition rate”, “false rejection” and “false acceptance”. Moreover, experiential results depict that iSTRD has unprecedented performance compared to contemporary techniques in presence of “bad mouthing”, “ballot stuffing” and “random opinion” attacks.