In present investigation, extraction, characterization and bio-evaluation of protein isolates from different indigenous legumes i.e. chickpea, lentil, broad and kidney beans were carried out to develop complementary foods. In tested legumes, after inactivation of anti-nutritional factors, protein isolates were prepared through isoelectric precipitation method. The highest protein yield as 80.47±5.71% was estimated in lentil protein isolates (LPI) followed by 73.14±3.44% in chickpea protein isolates (CPI) and 67.58±3.70% in broad bean protein isolates (BPI) while the lowest yield 52.83±3.36% was in kidney bean protein isolates (KPI). Moreover, protein isolates were assessed for their functional properties like bulk density, oil & water absorption, emulsifying & foaming properties etc. Maximum bulk density was revealed in LPI followed by CPI, KPI and BPI. Likewise, higher water absorption capacity was recorded in CPI tracked by LPI and BPI whilst the lowest in KPI. Maximum foaming capacity (FC) was revealed in BPI followed by KPI and LPI, respectively and the minimum in CPI. Electrophorogram through SDS-PAGE showed that legume protein isolates had protein bands in the range of 4 to 70kDa. Amino acid quantification was also performed with reference to requisite profile for the pre-schoolers. Among the essential amino acids, higher lysine content (4.54±0.21g/100g) was found in KPI followed by CPI (3.70±0.09g/100g) and LPI (3.66±0.20g/100g) whilst BPI showed minimum values (3.51±0.21g/100g). Simultaneously, amino acid scores were also determined with values of 39.6, 40.0, 40.0 and 56.0 in CPI, LPI, BPI and KPI, respectively. Bio-evaluation of respective isolates was performed through growth study parameters. Among the resultant protein isolates, the highest values were observed in LPI followed by CPI and BPI while the lowest for KPI regarding protein efficiency ratio (PER), net protein (NPR) and relative net protein ratio (RNPR), respectively for the year 2009-10. Similarly, nitrogen balance study parameters showed the highest values for true digestibility (TD), biological value (BV) & net protein utilization (NPU) in LPI tracked by CPI and BPI whereas the lowest values for these traits were recorded in KPI. However, BV value was high in KPI as compared to BPI. Similar trend for growth and nitrogen balance studies was observed in the next year 2010- 11. On the basis of overall yield, functional properties and bio-evaluation, two best protein isolates namely LPI and CPI were selected along with control for complementary foods preparation. The prepared formulations based on LPI (C1) and CPI (C2) congregated the FAO criteria for supplementary infant foods. The developed weaning foods were analyzed for chemical composition, energy value, bulk density, reconstitution index, viscosity and amino acid profile. Additionally, gross calorific values were observed as 401.70±20.42, 401.15±20.50 and 410.16±20.90kcal/100g for C1, C2 and control complementary foods, respectively. The essential amino acids were found to be sufficient in lentil and chickpea protein supplemented weaning foods. In addition to amino acid quantification for infant formulations, amino acid scores were also estimated. In complementary foods, maximum calorific value was contributed by fat followed by protein. Formulations in current study are capable of delivering 120.22±6.80, 122.49±6.36 and 123.27±6.09kcal per single meal for C1, C2 and control, respectively. Hedonic response regarding various sensory attributes also showed acceptance towards developed complementary foods. The acceptability appraisal of prepared infant formulations was conducted through short term infant feeding trial with the help of nursing mothers. The acceptability remained as 61.40 to 65.00% at the initiation of study and reached to 80.80 to 83.20% at the end of trial. Correlation studies also showed strong association among various variables and refelect their positive and negative contributions. The upshots of this project indicated that indigenous legumes have potential to yield protein isolates with appreciable functional and nutritional quality for application in array of foods with special reference to complementary foods.
زندگانی اور کتابوں کے تعارف کے بعد پروفیسر عبدالحق نے اس مونو گراف میں اقبال کی شاعری پر بھی روشنی ڈالی ہے۔ پروفیسر عبدالحق نے ابتدائی دور کی نظموں نا لۂ یتیم،ہلالِ عید کا حوالہ دیا ہے۔ اس دور کی شاعری میں بھی ثقافتی اور قومی احساس نظر آتا ہے۔ حضرت محمدؐ سے محبت اقبال کی شاعری کا خاص وصف رہا ہے جو ابتدا سے اختتام تک جاری رہا۔ اقبال کے شاعری چونکہ ایک پیغام رکھتی تھی اس لیے پیغام خطابیہ انداز سے ہی دیا جا سکتا تھا۔ اقبال نے بھی خطابیہ انداز اختیار کیا۔ ابتدا میں کچھ عرصہ داغ کی شاگردی اختیار کی اور تاریخ کا رنگ بھی شاعری میں نظر آتا ہے۔ تامل تو تھا ان کو آنے میں قاصد مگر یہ بتا طرز انکار کیا تھی (17) اقبال کا پہلا شعری مجموعہ تین حصوں میں منقسم ہے۔ اس میں اقبال کے شباب کا انداز بھی نظر آئے گا۔ اسی دور میں انگریزی ادب کا مطالعہ اور فلسفہ کی تدریس کے مرحلہ سے بھی دوچار ہیں۔ اس سے پہلے گھر کے صوفیانہ ماحول اور مولوی میر حسن کی وساطت سے سرسید تحریک کا اثر بھی لیے ہوئے ہیں۔ اقتدار سے محروم غلام قوم کی نفسیاتی بے چارگی کے اثرات کچھ انگریزی ادب سے ماخوذ نظموں کے اردو تراجم بانگ درا کی زینت ہیں۔ اقبال نے ہندوستانی قوم کی بیداری کے لیے خلوص دل سے نظمیں لکھیں۔ ہندوستان میں اردو کے علاوہ کسی دوسری زبان میں شاید ہی ایسی پر خلوص نظمیں لکھی گئی ہوں ۔ فکری اور روحانی شاعری میں بھی کوئی اقبال کا مقابل نہیں ہے۔ اقبال نے انقلاب اور احتجاج کے لیے جو آواز بلند کی ہے آج تک کوئی بھی راہبر وہ انداز اختیار کرنے کی جرات نہ کر سکا۔ اقبال کی نظموں میں وطن اور وطن سے نسبت رکھنے والی چیزوں...
Allama Ahmad Shakir was a great researcher and has a good command on religious literatures and studies. In his era, he took a great place among the scholars as a specialist in hadith, Islamic jurisprudence, Quranic interpretation, history & principals of aforementioned Subjecta. Now, he is recognized as an authority on principalities of sciences of hadith and jurisprudence. He discussed in his books regarding Sciences of hadith about narrators of hadith which are called ahl e bid‘at and the status of their Ahad?th. Because, there is a huge conflict between many principalities in perspective of accepting their Ahad?th or rejecting them. In this article, based an analytical study, some of his major and innovent concepts and justified principals about ahl e bid‘at are discussed which he had presented in his books or shows his research methodologies in different books with a special study on al-musnad by Imam Ahmad Bin Hanbal (r.a). The research shows his viewpoints regarding this kind of narrators that they are, with some conditions, acceptable and their Ahad?th are also should be narrated. Although, some ancient scholars do not allow with primarily conditions, which are described in this study along with their status & conditions.
During the last decade, authentication of sensor node and secure routing of data been remained an open challenges in Wireless Networks due to their applications in various vulnerable environments. These challenges become more signi cant when Wireless Sensor Networks (WSN) composed of tiny inexpensive nodes are consid- ered. This is due to the fact that the solutions proposed for the similar purposes in conventional wireless networks cannot be exploited for sensor networks because of high complexities and power consumptions involved in their algorithms. This thesis proposes a two-fold solution for the issues of node authentication and secure routing in Wireless Sensor Networks. In therst part of the thesis, a low complexity Sybil attack detection mechanism for Wireless Sensor Networks is pro- posed; while in the second part, a Secure Energy E cient Routing scheme called SEER is presented for the data security. Both of the proposed schemes are based on the Signed Response (SRes) authentication and voice encryption mechanism developed for Global System for Mobile (GSM) communications. The proposed Sybil attack detection scheme use pre-distributed key embedded in the sensor nodes. A modi ed version of A3 algorithm used in node authentication produces a SRes with the help of pre-distributed keys against a random challenge number sent by the sink or Cluster Head (CH). The 32 bit SRes is sent back to the sink or CH by the node to prove its legitimacy. The design of node authentication scheme is made exible so that it can be implemented in both hierarchical and centralized Wireless Sensor Networks. The scheme is analyzed for its performance under var- ious Sybil attacks. The scheme is evaluated for its probability of detecting Sybil nodes when di erent authentication key pool sizes are utilized. After extensive simulations, it is observed that the proposed scheme is able to counter Sybil at- tacks with higher probability as compared to notable existing schemes. Moreover, it has also been observed that the proposed Sybil detection scheme exhibits lesser computational cost and power consumption as compared to the existing schemes for the same Sybil attack detection performance.In the second part of the thesis, a secure mechanism for routing of data in Wire- less Sensor Networks; SEER is proposed. The proposed protocol is based on A5 encryption scheme developed for voice encryption in GSM. After successful au- thentication, a modi ed version of A5 algorithm is used to encrypt data during its routing from source to the sink or relay node. SEER uses GRACE (GRAdient Cost Establishment) routing protocol for transmission. For this purpose, a 64-bit ciphering key is used which is produced through a complicated process of pertur- bation in order to make it harder to be traced. SEER has been tested through simulations in MATLAB R by setting up hostile and vulnerable Wireless Sensor Network scenarios with respect to data integrity. The results obtained are then compared with two notable existing secure routing protocols. It is proved that the proposed mechanism SEER helps achieve the desired performance under dy- namically changing network conditions with various numbers of malicious nodes. Due to its linear complexity, lesser power consumption and more dynamic route updation, the proposed Sybil detection and SEER schemes can be easily extended to cater to the needs of emerging industrial wireless sensor networks, Dust Sen- sor Networks and IoT. Emerged from the conventional Wireless Sensor Networks, all the aforementioned networks have got the same nature of vulnerabilities and threats along with the inherited limitations with respect to their hardware and processing capabilities.