Search or add a thesis

Advanced Search (Beta)
Home > شعر الأندلس عند شوقي وإقبال: دراسة مقارنة

شعر الأندلس عند شوقي وإقبال: دراسة مقارنة

Thesis Info

Author

عبيد الرحمن محمد بشير

Department

Department of Literature

Program

MA

Institute

International Islamic University

Institute Type

Public

City

Islamabad

Country

Pakistan

Thesis Completing Year

2004

Thesis Completion Status

Completed

Subject

Literature

Language

Arabic

Other

Available at Centeral Library International Islamic University, Pakistan on MA/MSc 892.71 ع ب ش

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676721282133

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

مولانا لقاء اﷲ عثمانی

مولانا لقاء اﷲ عثمانی
افسوس ہے پچھلے دنوں مولانا لقاء اﷲ صاحب عثمانی کاان کے وطن پانی پت میں انتقال ہوگیا۔عمراگر چہ اسی (۸۰) برس سے زیادہ تھی لیکن قویٰ اچھے تھے۔ شب کے آخری حصہ میں ان پر دل کادورہ پڑااور صبح تک مرغِ روح قفسِ عنصری سے پرواز کرگیا۔انا ﷲ وانا الیہ راجعون ۔
مولانا تحریکِ خلافت اور پھر تحریک آزادی دونوں کے ممتاز زعما میں تھے اور اس جرم میں عمر کے سات برس قیدوبندکی سختیاں برداشت کرچکے تھے۔ان کا ساجری، بے خوف اور بے لوث ہونا سخت مشکل ہے۔ ستمبر ۱۹۴۷ء کا تصور کیجیے، ملک کوتقسیم ہوئے ابھی دوہفتے ہوئے ہیں پورامشرقی پنجاب قتل وغارت گری کی آگ میں جل رہاہے اور پانی پت بھی اس سے مستثنیٰ نہیں۔مسلمان قافلہ درقافلہ روانہ ہورہے ہیں یہاں تک کہ شام آئی جب کہ پورے پانی پت میں صرف ایک مولانا تنہامسلمان رہ گئے۔ عزم واستقلال اور پھر مخلصانہ خدمتِ خلق کانتیجہ یہ ہوا کہ جولوگ مسلمان کی صورت تک دیکھنے کے روادار نہ تھے وہ بھی مولانا کے گرویدہ اورخدمت گزار ہوگئے۔ طبعاً نہایت شگفتہ مزاج اورعملاً بڑے عابد و مرتاض تھے۔ مجھ پرہمیشہ بڑی شفقت فرماتے تھے ۔چند برس ہوئے علی گڑھ اپنی آنکھ بنوانے کی غرض سے آئے ہوئے تھے اوراپنے ایک عزیز کے ہاں مقیم تھے۔ میں حاضر ہواتوحسبِ معمول غیرمعمولی شفقت بزرگانہ کے ساتھ پیش آئے اور جس چارپائی پر وہ بیٹھے تھے میں اس کی پائینتی کی جانب بیٹھنے لگاتو فرمایا کہ یہ ہر گز نہیں ہوگا اور ہاتھ پکڑ کرزبردستی سراہنے بٹھایا۔ میں نے عرض کیاحضرت! آج یہ خلاف معمول اس درجہ تکلف کیوں؟ چمک کر جواب دیا ’’ہوں !تمہاری کتاب ’صدیق اکبر‘ اﷲ کے ہاں مقبول ہوگئی ہے اور یہ مجھے خواب میں دکھایا گیا ہے تو کیا اب بھی میں تمہاری تعظیم نہیں کروں گا ‘‘۔اﷲ...

INVESTIGATING THE BINGE-WATCHING BEHAVIOR ON INSOMNIA AND OBESITY AMONG GENERATION Z

Background and Aims: The study identified the risks of increased screen time on generation z considering two parameters i.e., insomnia and obesity and the moderating role of self-control. Methodology: A cross-sectional study was conducted by convenient sampling technique. The survey only included people who were born between 1997 and 2002. The analysis of the effects of variables took into account only a few parameters.  Discriminant validity and convergent validity was used to check reliability and validity while path coefficient analyzed the hypothesis. Results: Binge-watching has positive significant impact on insomnia and obesity (p<0.05), and the self-control strongly effect the relationship of binge-watching, obesity and insomnia as a moderator (p<0.05). Conclusion: Binge-watching caused insomnia and obesity while self-control in direct relation to obesity and insomnia controlled the prevalence rate. The moderating role of self-control showed that insufficiency of self-control during binge-watching led to obesity and insomnia. The outcome indicated that Generation Z needs to be encouraged to practice self-control through public health initiatives, social media, seminars, workshops, etc. At the same time, people need to be made aware of how binge-watching affects their health. Keywords: Insomnia, obesity, self-control, screen time, technology, mortality, exercise.

A Secure Network Architecture for Net Centric Operations

The thesis presents a secure communication architecture for net centric operations which is a relatively new paradigm for gaining superiority in the battlefield. The net centric operation (NCO) dictates communication as an enterprise to maximize performance for reducing the cost by optimally allocating resources and functionality across terrestrial, air and space layers. The net centric operation connects sensors, communications systems and weapons’ systems on information grid for providing real time information to war fighters, policy makers and support personnel. The proposed network architecture comprises of static nodes, semi-mobile nodes and fully mobile nodes. The static nodes form strategic network, fully mobile nodes form tactical network while semi-mobile nodes act as a gateway between strategic network and tactical network for long range connectivity. A secure cognitive network device (SCND) is presented to cater for the ubiquitous connectivity required for the proposed architecture. A cognitive layer is embedded in the SCND that integrates different networking and physical interfacing technologies together thus adding another dimension in the field of networking. The presented cross-layer architecture integrates different networking technologies by exploiting vertical handoffs between networks employing different standards. The cognitive layer is augmented by GPS device to learn the environment by remembering the locations of patches of areas where connectivity tends to drop. The cognitive controller routes the call on alternate carrier, having the best QoS in that patch. The cognitive device therefore improves the link reliability and network coverage by situational awareness and intelligent processing. The concept of SCND is further extended for secure mobile backbone architecture for tactical communication. The architecture comprises of mobile backbone nodes (MBNs) and simple mobile nodes. This architecture supports long range communication especially for mission critical applications like net centric warfare demanding rapid deployment of communication infrastructure. The MBNs form clusters and adjust their positions to provide optimum connectivity to their respective mobile nodes. The MBNs are equipped with SCNDs and serve as the cluster head or centroid of the cluster. When the mobile nodes in a cluster move, the MBN adjusts its position in such a way that on ivone hand it provides optimum connectivity to its cluster nodes and on the other hand, it remains connected to its backbone nodes. The MBN is assumed to have digital elevation information. This is accomplished in reality by augmenting the nodes with digital elevation models (DEMs). The height information helps for adjustment of different antennae positions to achieve line of sight according to the terrain. The proposed architecture also supports distributed computing with a novel framework of application migration. The mobile nodes with limited battery life and computational resources can offload their computational intensive applications to their corresponding MBNs. In the proposed architecture, as the mobile node moves to become a part of another MBN, its offloaded applications are automatically migrated to the new MBN. A specially designed programmable and scalable security processor is another significant component of secure network architecture. The programmability of the security processor enables the porting of current and proprietary security algorithms as well. The scalable and layered architecture supports very high data rates by instantiating multiple layers in the design. The modularity of the design makes it suitable for national secure mobile network infrastructure. The proposed SCND employed in tactical communication for NCO is also applicable in vehicular networks (VNet). Therefore, based on SCND, a secure cognitive vehicular communication architecture is also presented for dispatching location aware, safety critical and value added services in a unified vehicular network. The network incorporates communication nodes with hybrid network access technologies in vehicles and roadside infrastructure. The vehicular network consists of vehicle-to-vehicle, vehicle to roadside infrastructure and backbone communication with control and monitoring centers. The system incorporates integrated multi telecommunication technologies like HF, VHF, UHF, GSM, Satellite, Broadband Wireless and wired links. The architecture divides the entire geographical region into major and minor zones. Each major zone has its registrar to register and authenticate the nodes of its geographical area. The nodes in the minor zones form local MANETS to exchange safety critical messages and form heterogeneous networks for value added services.