Search or add a thesis

Advanced Search (Beta)
Home > Issues of National identity formation in Pakistan domestic and International implication 1971-2011

Issues of National identity formation in Pakistan domestic and International implication 1971-2011

Thesis Info

Author

Muhammad Sajjad ur Rehman

Supervisor

Husnul Amin

Department

Department of Politics and International Relations

Program

PhD

Institute

International Islamic University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2016

Thesis Completion Status

Completed

Page

243

Subject

Politics and International Relations

Language

English

Other

PhD 320.95491 MUI

Added

2021-02-17 19:49:13

Modified

2023-02-17 21:08:06

ARI ID

1676721676255

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

ڈاکٹر پی کے عبدالغفور

ڈاکٹر پی۔کے۔ عبدالغفور
افسوس ہے ۲۳/مئی کوڈاکٹر پی۔کے۔عبدالغفور کااپنے وطن کالی کٹ میں انتقال ہوگیا۔مرحوم اس دن بالکل تندرست اورچاک وچوبند تھے۔دوسرے دن مدراس،بمبئی اوردہلی کے طویل سفر پرروانہ ہونے والے تھے۔ساڑھے تین بجے سہ پہر کاوقت تھا اپنے چیمبر میں ایک مریض کا معائنہ کررہے تھے کہ ان کاقلم جیب سے نکل کر زمین پرگرا،ڈاکٹر صاحب قلم کواٹھانے کے لیے ذرانیچے جھکے ہی تھے کہ اچانک سینہ میں درد اٹھااوربڑھتا چلا گیا۔فوراً میڈیکل کالج میں داخل کردیے گئے، اعلیٰ سے اعلیٰ علاج، دیکھ بھال اورراحت وآرام،مرحوم کے لیے ان میں سے کس چیز کی کمی ہوسکتی تھی لیکن حملہ اس قدر سخت تھا(Massive Heart Attack)کہ کوئی تدبیر کارگر نہ ہوئی اوردیکھتے ہی دیکھتے روح قفس عنصری سے پرواز کرگئی۔اناﷲ واناالیہ راجعون
عمرساٹھ،پچپن کے لگ بھگ ہوگی، ڈاکٹر صاحب کے نام اوران کے کام سے شمالی ہند کے عام مسلمان توکم ہی واقف ہوں گے۔لیکن جنوبی ہند کے بچہ بچہ کی زبان پران کانام تھا۔وہ مسلمانوں کے نہایت مخلص اورسرگرم وپُرجوش لیڈر تھے، انہوں نے آل انڈیا مسلم ایجوکیشنل سوسائٹی، کالی کٹ کے صدر کی حیثیت سے مسلمانوں کی جوتعلیمی اوراقتصادی نہایت شاندار خدمات انجام دی ہیں انھیں کا یہ اثرہے کہ تعلیم میں آج کیرالا مسلمان سب ریاستوں کے مسلمانوں سے آگے ہے، پہلے یہ سوسائٹی جنوبی ہند کے لیے خاص تھی، لیکن بعد میں جب ڈاکٹر صاحب کوشمالی ہند کے مسلمانوں کی تعلیمی پسماندگی کی طرف متوجہ کیا گیا(اور توجہ دلانے والوں میں خاکسار راقم الحروف بھی ہے جوسوسائٹی کی مجلس عاملہ کادیرینہ ممبر ہے اورجس سے ڈاکٹر صاحب کے شخصی اورذاتی تعلقات نہایت شگفتہ اور دوستانہ تھے) توڈاکٹر صاحب نے اس میدان میں بھی کام کرنے کاعزم کیا۔ چنانچہ اس کاپہلا قدم یہ تھا کہ گزشتہ ماہ دسمبر میں سوسائٹی کاایک نہایت عظیم الشان آل انڈیا اجتماع نئی دہلی میں منعقد ہوا، اس...

مسئلہ ختم نبوت پر دلائل کا منہج و اسلوب : تجزیاتی مطالعہ

The belief of the finality of Prophet Hood (Khatm e Nabuwwat) is the basic belief of the Muslim Ummah, and this belief has been adopted since the first day. From the time of the Prophet ﷺ until now, the belief in the end of Prophet Hood has been protected on practical grounds and intellectually. Muslim scholars and philosophers, while strengthening it on the basis of rational and simulated arguments, did not leave a single aspect from which it could be undermined. They presented simulated arguments for the misguided sects in Muslim Ummah and for the non-Muslims, presented rational arguments in such a way that there was no reason left to disbelieve this belief. In this research article, there is a description of the simulated and rational arguments that are usually presented, such as the Quranic verses and their interpretation, the Hadiths, and the sayings of the scholars. And it has also been narrated what their style of reasoning is, in the same way, the legislation that has been passed in this regard in Pakistan has been presented in detail. Hopefully, this will make it clear what are the services of scholars and thinkers on this issue and what is their style.

Smart Routing Based on Ddos Detection With Intelligent Survivable Centric Network Agent

The DDoS attacks are the most common attacks of the network and the mechanism and nature of these attacks change day by day. DDoS attacks can simply exhaust the network communication resources, it cause the failure of the network within a less time. The fundamental technologies and network protocols have flaws and vulnerabilities that can open doors for attackers to attack the network. This problem is a hurdle for secure and reliable communication with in network. To overcome this issue, there is a need to create a more effective and accurate attack detection algorithm specifically for DDoS attack. Numerous attack detection mechanisms already developed to detect a DDoS attack in network. An effective attack detection mechanism that can provide the entire attack details is therefore required to overcome the problem. Additionally, need to develop such a diverse system to address not only DDoS attack details and also provide proactive measures to avoid the same kind of attacks in future by designing intelligent system. Therefore, in this thesis, we propose SRDD, a smart routing based DDoS detection system for entire network. In SRDD, the DDoS attacks can be detected at the initial phase. In this research, we have been developed a DDoS detection system which is based on decision tree algorithm to prevent the DDoS attack. The decision tree algorithm, include with signature based detection methodologies, perform automatic prediction, and provide effective detection of malicious traffic. The decision tree algorithm classifying the received packets and making a decision based on the classification of results. For validation of proposed system, selected some of other machine learning techniques and provide comparison with our proposed system. This proposed SRDD system evaluates the network resources and the traffic dataset in order to train the centric agent for detection system to detect legitimate and malicious traf?c. The proposed SRDD system allowed legitimate traffic to pass through network and malicious traf?c is ?agged malicious to go through detection system. Finally, the results are discussed in terms of accuracy, exposure and specificity. The system not only can identify the attacks, but also detect the attacker IPs and start a process of mitigation to provide very well protection of the network system at initial stage of an attack is identified. The proposed research focused on the security aspect of legacy protocols as the baseline for mapping our desired research objectives to align with intelligent survivable centric network agent.