المبحث السابع:قصيدة بديع حقي
حصلت الشاعرۃ علی قصیدۃ حرۃ منشورہ للشاعر بدیع حقی وذلک قبل صدور قصیدتھا وقصیدۃ بدر السیاب، وهذا مقطع من قصیدۃ بدیع حقي:
أي نسمۃ۔
حلوۃ الخفق علیلۃ۔
تمسح الأوراق في لین ورحمۃ۔
تھرق الرعشۃ في طیبات نغمۃ
وأنا في الغاب أبکي۔
أملاً ضاع وحلماً ومواعید ظلیلۃ۔
والمنى قد ھربت من صفرۃ الغصن النحیلۃ۔
فا نمحى النور وھام الظلّ یحکي
بعض وسواسي وأوھامي البخیلۃ[1]۔
وذکرت نازک عن الباحث الدکتور أحمد مطلوب بأنہ أورد في کتابہ "النقد الحدیث في العراق"، وقد حصل علی أقدم قصیدۃ في الشعر الحر المعنونۃ ’’بعد موتي‘‘ المنشورۃ في جریدۃ العراق سنۃ 1921م تحت عنوان ’’النظم الطلیق‘‘ ولکن لم یذکر الشاعر اسمُہ بل رمز لاسمہ (ب۔ن)، ویدل ذلک علی أن ھناک محاولات ومباحثات حول الشعر الحر ، ودارت مناقشات بین النقاد والدارسین حول الأسبقیۃ الزمنیۃ في نظم الشعر الحر: أي القصیدتين سبقت الأخری، ھل کانت قصیدۃ ’’الکولیرا‘‘ لنازک أم قصیدۃ ’’ھل کان حباً؟‘‘ لبدر شاکر السیاب، وإلی من ترجع الریادۃ (ریادۃ الشعر الحر)؟
وقد اعترفت نازک، بأن المسألۃ لیست مصادفۃ، إذا ھو مشروع ثقافي وإبداع کامل المحکم بالوعي والإرادۃ[2]. وتقول أیضاً بأن الریادۃ لم تکن لھؤلاء الشعراء الذین نظموا قصیدۃ واحدۃ او اثنین وعادوا إلی أسلوب الشطرین۔
وتعتقد نازک بأنّھا لو لم تبدأ ھي حرکۃ الشعر الحر، لبدأھا بدر شاکر السیاب، ولو لم یبدأھا بدر السیاب لبدأھا شاعر عربي آخر غیرہ، لأن في تلک السنین أصبح العصر یقبل الشکل الجدید ویرحب بکل ما ھو حدیث. ویتضح من المناقشات السابقۃ أن نازک الملائکۃ ھي ’’ رائدۃ الشعر الحر ‘‘ ۔
Introduction: A total of 144 medical colleges are contributing to the country’s progress. Excessive usage of social media is a cause of not only the deterioration of physical and psychological health of medical students, but has also become a defining reason of procrastination and attaining less than ideal grades. Where most western institutes implement strict social media policies in medical schools, those in Pakistan are gravely lacking. Objective: The objective of this research implementation of social media in medical schools of Pakistan and then identify the need to develop such policies. Methods: We conducted qualitative research in which method of data collection was primarily focus group discussions (FGD) of a total of 40 participants from five different medical colleges of Pakistan. The participants included medical practitioners and medical students(n=20) who were further divided into four groups of five participants each. FGD was conducted online. Results: Content analysis revealed seven core themes as point of discussions to be highlighted. Almost all participants were grossly unaware of the importance of social media usage regulation and its implementation in medical schools. Conclusion: At the end of the FGD it was unanimously agreed upon that there must be a uniform and standard social media policy defined by the regulating bodies of medical schools. This research may further be conducted by including policymakers in the sample. KEYWORDS: Social media, policy, medical colleges.
Revolution in generation, storage, and communication of digital information has brought about profound changes in our society. The digital information age has evolved with numerous opportunities and new challenges. The goal of this thesis is to provide a framework based on watermarking techniques that can be used for verifying the integrity of a cover work along with the recovery of the intentionally/unintentionally distorted cover work. In this context, multiple semi- fragile watermarking techniques are proposed for not only protecting the digital content from alteration but also to recover it after alteration. In these techniques, watermarks remain intact with the image under minor enhancement and is broken only in case of major manipulations. In this thesis, a hybrid scheme is developed that can both authenticate and recover the altered image. The first phase of this thesis encompasses an improvement of a self-recovery authentication scheme for digital images. The second phase then considers the reduction in computational complexity. Finally, a novel model is proposed in the third phase that not only perform accurate authentication of images but also recovers the altered image. In this thesis, the concept of multiple watermarking is employed; authentication and recovery watermarks. Both of these independent watermarks strengthen the security aspect of each other and it is user choice to use both of the watermarks or one of them according to the requirement of application. The authentication watermark is correlated to the host image for resisting collage attack and then embedded in the wavelet subbands. Unlike the conventional block-based approaches, it has the ability to determine the regions concisely where the integrity verification fails. The recovery watermark recovers the image with original quality even after manipulation of the watermarked image. Lossless compression (Huffman coding) and BCH (Bose, Ray-Chaudhuri, and Hocquenghem) coding are utilized while generating the recovery watermark. Integer DCT is utilized instead of conventional DCT because the integer DCT contents can be highly compressed by Huffman coding. In addition, integer wavelet transform, which is a fast approach of discrete wavelet transform, also reduces the computational complexity of the proposed algorithm. In contrast to the earlier authentication algorithms, the proposed techniques exploit flexibility in both of the watermarks, where a trade-off can be made by the user according to the requirement of application. Experimental investigations are performed to evaluate the performance of multiple semi-fragile watermarks. It is demonstrated that the performance of the proposed methods is better compared to the conventional block-based approaches in context of tamper detection. In summary, efficient techniques have been developed in this thesis which makes trade-off between three contradicting properties of watermarking; imperceptibility, robustness, and capacity. The proposed watermarking techniques are able to answer these questions, i) Has the image been processed? ii) Has the image been processed incidentally or maliciously? iii) Which part of the image has been processed and how much? Additionally, a self-recovery approach makes it possible to recover the exact version of the host image even after the image has been incidentally/maliciously processed.