اقبال کا شاعرانہ سفر، شاعرانہ انداز اور شاعرانہ مقاصد دوسروں سے مختلف تھے۔ اس لیے اقبال نے شاعرانہ محاسن کو بھی اپنے خاص مقاصد کے لیے استعمال کیا۔ اس طرح کلام اقبال میں صنائع بدائع کا ذکر بھی موجود ہے اور شعری محاسن کو اقبال نے جس طرح استعمال کہا ہے قاری پڑھ کر حیران رہ جاتا ہے۔ تشبیہ کے حوالہ سے پروفیسر عبدالحق کہتے ہیں:
”صنائع بدائع کاایک بڑا ذ خیرہ کلام میں موجود ہے۔ تشبیہات کی ندرت اور ان کی
ارزانی پر حیرت ہوتی ہے“ (10)
اقبال کے کلام میں تشبیہ کی بہت سی مثالیں دیکھی جاسکتی ہیں۔ اقبال نے انہیں اپنے خاص مقاصد کے لیے استعمال کیا ہے۔ صرف شاعرانہ لطف وکرم کے لیے با لذت کے لیے تشبیہ کا سہارا نہیں لیا ۔نظم ”ساقی نامہ“ کے یہ اشعار دیکھیے۔
یہ عالم ،یہ بت خانۂ شش جہات
اسی نے تراشا ہے یہ سومنات
یہ عالم ،یہ بت خانۂ چشم و گوش
جہاں زندگی ہے فقط خوردو نوش (11)
ان اشعار میں ”بت خانہ شش جہات“ اور” بت خانۂ چشم و گوش “جیسے الفاظ و تراکیب حکیمانہ اور فلسفیانہ خیالات کے حامل ہیں اور اقبال نے انہیں تشبیہ کے طور پر استعمال کیا ہے۔ اقبال کے اسلوب شعر میں اور بھی بہت سی تشبیہات استعمال ہوئی ہیں۔ ان کا تعلق عمرانیات ،سیاسیات اور تہذیب سے بھی ہے۔اقبال نے اپنی شاعری کا بڑا حصہ عالم انسانیت کے عمرانی اور سیاسی مسائل کی تشریح اور تعبیر کی نذر کر دیا۔ انہوں نے زندگی کی ان غیر دلکش اور کھردری حقیقتوں کو لباس حسن و زیبائی میں پیش کر کے شعری اسلوب کو ایک نئے آہنگ سے روشناس کیا۔
آزاد کی رگ سخت ہے مانند رگ سنگ
محکوم کی رگ نرم ہے مانند رگ تاک (12)
”رگِ سنگ“ اور ”رگِ تاک“ کی تشبیہ...
Here are two opposing views of scholars and different religions regarding the permission or non-permission of war on the basis of honor and lawfulness of human life. The Hindus and Jews legalize war, whereas the Buddhists and Christians consider it illegal. Islam follows the middle path and attributes the legality of war to its purpose because only the purpose tells the righteousness or wrongfulness of any deed. Islam has prevented from all those purposes that eliminate the cause of Allah Almighty from war. Islam does not legalize war for any worldly purpose so the pursuit of fame, kingship, booty, conquering another land or national or personal revenge is not legal. Jihad has been enjoined for the elimination of hurdles in the path of Allah. It clarifies the policy of Islam that war is not an end but it is a means to an end. Today the west is doing propaganda against Islam that Islam spread through sword and the concept of jihad is being related to terrorism. The purposes of jihad should be kept in mind in order to understand the philosophy of jihad. The aim of this paper is to highlight the purposes of jihad and its importance. Views of various scholars have been observed in this study along with references from Quran and Hadith.
Software Quality Prediction (SQP) has been an area of interest for the last four decades. The aim of quality prediction has been to identify the defect prone modules in software. With the help of SQP the defect prone modules can be identified and thus improved at early stages of software development. SQP is done using models that predict the defect prone modules. These prediction are based on software metrics. Software metrics and defect related information is recorded in form of datasets. These defect datasets contain instances of defect prone and not-defect prone modules. Major motive behind quality prediction is to identify defect prone modules correctly in early phases of development. Imbalanced datasets and late predictions are problems that affect this motive. In most of the datasets, the number of instances of not-defect prone modules dominate the number of instances of defect prone modules. This creates imbalance in the datasets. The defect prone modules are not identified effectively due to the imbalance. Effectively predicting defect prone modules and achieving high Recall using the public datasets becomes a challenging task. Predictions based on code metrics are considered late. Majority of the metrics in the datasets are code metrics which means that accurate predictions can be made once code metrics become available. Another issue in the domain of software quality and metrics is that software metrics used so far have inconsistent nomenclature which makes it difficult to study certain software metrics. In this thesis an association mining (AM) based approach is proposed that improves prediction of defect prone modules. The proposed approach modifies the data in a manner that a prediction model learns defect prone modules better even if there are few instances of defect prone modules. We use Recall to measure performance of the model developed after proposed preprocessing. The issue of late predictions has been handled by using a model which can work with imprecise values of software metrics. This thesis proposes a Fuzzy Inference System (FIS) based model that helps predict defect prone modules when exact values of code metrics are not available. To handle the issue of inconsistent nomenclature this thesis provides a unification and categorization framework that works on the principle of chronological use of metric names. The framework has been used to identify same metrics with different names as well as different metrics with same name. The association mining based approach has been tested using public datasets and Naive Bayes classifier. Naive Bayes classifier is the simplest and is considered as one of the best performers. The proposed approach has increased Recall of the Naive Bayes classifier upto 40%. Performance of the proposed Fuzzy Inference System (FIS), used to handle the issue of late predictions, has been compared with models like neural networks, classification trees, and linear regression based classifiers. The FIS model has performed as good as other models. Upto 10% improvement in Recall has been observed in case of FIS model. The nomenclature unification of approximately 140 metrics has been done using the proposed unification framework. Out of these 140 metrics approximately 6% different metrics have been used with same name in literature. Their naming issues have been resolved based on the chronological use of the names. Achieving better Recall using the proposed approach can help avoid costs incurred due to identification of a defect prone module late in software lifecycle when cost of fixing defects becomes higher. The proposed FIS model can be used for earlier rough estimates initially. Later, better and accurate estimates can be made when code metrics become available.