Search or add a thesis

Advanced Search (Beta)
Home > الهبة والهدية في ضوء السنة

الهبة والهدية في ضوء السنة

Thesis Info

Author

سيد محمد شاهد ترمذي

Department

Department of Hadith

Program

MS

Institute

International Islamic University

Institute Type

Public

City

Islamabad

Country

Pakistan

Thesis Completing Year

2011

Thesis Completion Status

Completed

Page

222

Subject

Hadith

Language

Arabic

Other

Available at Centeral Library International Islamic University, Pakistan on 297.124ت ر ه

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676721210076

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

شاہی قلعہ

شاہی قلعہ

شاہی قلعہ کے یہ کھنڈرات پاکستان پیپلز پارٹی کی ظلم و جبر کے خلاف ایک طویل جان گسل جد وجہد کی یاد دلاتے ہیں ۔کامریڈ امتیاز خان جو کہ لندن میں رہتے ہیں راولپنڈی میں محلے دار ہونے کے ساتھ ساتھ شاہی قلعہ میںبھی ہمسایہ تھے پاکستان گئے تو چند تصایر پوسٹ کر کے پرانی تلخ مگر خوبصورت یادیں تازہ کر دیں دن کو اگر یہ شاہی قلعہ تشدد مارپیٹ کی آوزوں سے گونجتا تھا تو شام ہوتے ہی ترانوں گانوں اور باتوں کی محفلیں سج جاتیں ۔جیالے پنجاب بھر سے گرفتار کر کے لائے جاتے رہے آخر شاہی قلعہ کے سیل کم پڑگئے تو 20نئے سیل بنانے پڑ گئے بہت سو کو تو لال قلعہ لاہور منتقل کیا گیا ۔اب سنا ہے کہ عقوبت خانوں کا یہ حصہ گر ا دیا گیا لیکن میں سمجھتا ہوںکہ اسے دوبارہ تعمیر ہو نا چاہیے کہ آنے والی نسلوں کو بتا سکیں کہ مارشل لا ء کے خاتمہ اور جمہوریت کے لیے جنگ لڑنے والوں کو کہاں اور کیسے رکھا جاتا تھا ۔

 

The Role of Money in Capitalistic and Islamic Economic Systems: A Comparative Study

Money has a great role to play in the economic system. It is a backbone of all commercial and financial transactions. Its role is well defined and established since ages; the fundamental role as a medium of exchange and standard of values. Furthermore, if the functional role of money is positive and productive, it leads to the economic growth and expansion of economic activities. Likewise, the injudicious role of money created several economic fluctuations and frequent financial distortions in the economic history. The article suggests that the injudicious role of money created economic disorder and caused financial crisis in the global economy. The research paper attempts to explore the role of money from Islamic and Capitalistic perspectives. In the capitalistic system, the money is being used as a tradable commodity in the banking and financial sector. The Islamic perspective is based on the teachings of Quran and Sunnah, and jurisdictions of Muslim scholars, in this context, money is only a means of exchange and measure of value. The qualitative research approach has been applied to the discussion and based on the literature review and available data, it is recommended that there is a dire need to review the role of money. The role of money as a tradable commodity caused distortions in the existing system.  It is recommended that the banking business needs to be operated on profit and loss sharing rather than the trading of money as a commodity.  

Cope With a Malicious Host in Mobile Adhoc Networks Manet

From a security perspective, a jamming attack is easy to launch and relatively hard to detect. Jamming attacks are generally directed towards seizing the medium completely by transmitting fake packets violating the medium access protocol, either constantly or periodically. This work analyzes the effects of different types of jammers using Conservation of Flow (CoF), which has been useful for detecting other attacks in wired networks. Additionally, simulation results are presented in justification of proposed methodology. With the miniaturization of wireless devices, the popularity and usage has increased in recent past, especially due to portability. Since the design of such devices does not primarily emphasize heavy computation and secure communication, these are treated as add-ons. In setting up an ad hoc network rather than choosing all or more than the channels offered by 802.11 standard, only a single channel is generally utilized to minimize delay and synchronization issues. However, by using additional available multiple channels, significant gain in terms of overall system performance can be achieved. This, and other limitations like a shared medium which is open to all, attracts intruders in wireless networks. Mainly, the use of a lone channel can become single point of failure in case of an attack, especially a jamming attack. In contrast to other security attacks, no special hardware and computation is required in launching jamming attacks. Additionally, even if the attacker does not get hold of the communication, he can emit radio signals periodically to jam legitimate conversation. Thus, legitimate nodes escape physically or logically to avoid a jammer at the cost of additional overhead involving coordination amongst nodes to resume communication. The overhead involved in either of the methods is considered worthy in terms of regaining the performance of the network. In this thesis, a couple of MAC layer-based algorithms are proposed to mitigate the effects of jamming attacks efficiently; the first is a reactive mechanism and the second is a proactive proposal. The work starts with an investigation of different jamming types and their effects on wireless communication. For this purpose, a simulation model was developed and the resulting data set was verified using AI algorithms, which predicted 98% accuracy. Next, a reactive technique namely packet-feed is proposed to keep the jammer busy on the jammed channel. Once the nodes detect the existence of the jammer and hop to another channel, they alternatively visit the earlier channel to feed the jammer with valid packets. This way, the nodes pretend to the jammer that the earlier channel is still in use. Finally, a proactive channel hopping protocol is proposed where each node has a separate and dynamically selected control channel. Additionally, rather than each of them feeding the other its channel hopping sequence, both parties coordinate to come up with a new channel where data transfer can take place. Thus, provision of redundant channels is provided to each node. Following on from this, the proposed idea is analyzed with the existence of a jammer.