53. An-Najm/The Star
I/We begin by the Blessed Name of Allah
The Immensely Merciful to all, The Infinitely Compassionate to everyone.
53:01
a. By the star when it sets.
53:02
a. Your companion who has lived amongst you for forty years is neither strayed nor is he deluded,
53:03
a. nor does he speak out of his own personal desire with regard to what he recites to you of The Qur’an,
53:04
a. that which he conveys to you - The Qur’an - it is nothing but a Divine Revelation, being
revealed on to him.
53:05
a. Taught to him by the One of Awesome in Power,
53:06
a. Full of wisdom.
b. HE stood poised,
53:07
a. while HE was on the highest part of the horizon.
53:08
a. Then HE drew near and came close,
53:09
a. so much so that it was left only a space of the strings of two bows – facing each other, surrounding him in all directions - or even closer than that.
53:10
a. So HE revealed on to HIS Servant Muhammad whatever HE revealed.
53:11
a. The Prophet’s heart did not lie about what it saw.
b. He neither perceived it as an illusion nor was it a hallucination.
c. It was a reality.
53:12
a. Are you, then, going to argue with him what he saw?
53:13
a. And, certainly, he saw HIM yet again at another time, too,
53:14
a. by the Lote Tree of the Extremity,
53:15
a. close to which is the...
This article exposes Updike’s use of the Qur’anic verses in his novel Terrorist. Apparently, the writer wants to investigate a Muslim terrorist’s mind, which causes him to launch deadly attacks against the American people. However, the results of Updike’s investigation are problematic and subjective. Updike seems to be a new Orientalist who manipulates the Qur’anic scripture to assert his mastery, neutrality and intolerance of Islam for non-believers. It proves that his presentation of Islam is based on stereotyped myths and lies. The narrator claims that the protagonist “Ahmad”, under the guidance of his religious teacher Sheikh Ahmed, inspired by the irrational and suppressed tone of the Qur’an, commits a suicide attack at Lincoln Tunnel but in the end, he is persuaded by his Jewish- school- councilor to discard this idea. Conclusively, it sounds that Updike fails to detach himself from his characters and misuses the Qur’anic verses to defend his pre-supposed ideology against Islam.
Due to the strict management policy and limited space in wireless spectrum, it is very difficult to overcome the demands of high data rate and bandwidth requirements in the wireless communication. To deal with this problem effectively, random allocation of the spectrum is considered, which resulted in the concept of cognitive radio network (CRN). Resource Allocation and Spectrum sensing in CRN is of high interest, where opportunistic users also called secondary users (SUs), have to detect the licensed primary user (PU) spectrum and make use of the vacant. The effects of multipath fading, shadowing and receiver uncertainty lead to poor spectrum sensing performance of individual users. Cooperative spectrum sensing (CSS) is a solution to acquire accurate information about the PU channel in the fading and shadowing environment. CSS enables each user to share its local sensing information with the neighbors to reach a more precise spectrum sensing decision. The malicious users (MUs) false sensing reports prevent the fusion center (FC) from taking a precise final decision, hence it can reduce effectiveness of CSS system. Many detection and suppression schemes are found in the literature to make the FC decision secure and robust in the presence of these abnormalities. This dissertation is a contribution to the above mentioned areas. The dissertation is mainly divided into three parts. In the first part, we have proposed two variants of the Kullback Leibler (KL) divergence, including simple KL divergence and weighted KL divergence schemes to prevent the system from always yes, always no, opposite and random opposite categories of MUs without identification. The final decision made by the FC, using simple KL divergence and weighted KL divergences schemes is more precise with high detection, less false alarm and low energy consumption. In the second part, we have proposed heuristic algorithms, including Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) based soft and hard fusion combination schemes at the FC. In the last part, for efficient detection and mitigation of MUs, we have proposed statistical techniques. In this section, FC is allowed to take its cooperative decision normally about the sensing channel, based on the received local decisions of the cooperative SUs. When enough statistics are collected about the reporting users, Box-whisker‟s plot (BWP) and Hampel‟s test (HT) are employed to detect and separate the false sensing data provided by MUs as abnormal data and is able to further shape the hard and soft fusion decisions based on the reported data of the normally reporting users. The effectiveness and reliability of our proposed techniques are demonstrated in the results and simulations where graphs are plotted for the detection, false alarm, miss-detection and error probabilities against different types of MUs, total number of cooperative users and signal to noise ratios (SNRs). The spectrum sensing responsibility in the presence of various categories of MUs is a challenging job that is made authentic using KL divergence, GA, PSO and some statistical techniques in the dissertation. The proposed techniques in the dissertation allow the FC to estimate the PU channel status accurately so that the SUs are able to make use of the available spectral holes without any disturbances and interference to the legitimate users. In the industrial environment, sensors and robot in coordination detect the abnormal behavior of any robot, as the malfunctioning in such robots due to any reason reduce overall performance of the system. Therefore, the proposed CSS model can precisely detect faulty sensors and robots in the industrial environment and it has a centralized performance monitoring mechanism.