Compression of data has become a worldwide phenomenon during the past few decades for rea- son of achieving savings in band-width (BW) and hence makes it cost effective. The widespread practice of encryption of data has generated interest for many decades and it mainly aims at pro- tection of data. Combining these two apparently contrary processes (in terms of BW) is quite challenging. Whereas the research on concurrent data compression and data protection (encryp- tion) is still on, the methodology adopted by the author is unique and quite new. The most impor- tant aim of data compression technique is the need for curtailing the data storage and communi- cation expenses. The source message (long) is converted to a codeword (small). The key objec- tive of data encryption is to guard the integrity of data if it is intercepted by an eavesdropper. The plaintext is transformed in to ciphertext using an encryption key or keys. Combining the processes of compression and encryption together must be done in this order, that is, compres- sion followed by encryption because all compression techniques heavily rely on the redundancies inherently part of a regular text or speech. The speech compression has been achieved using Lempel-Ziv 78 algorithm and a new algorithm for encryption/decryption, named ―The Random- One, abbreviated as TR-1‖ is developed during this study and is thoroughly tested. The results obtained are quite encouraging. Firstly, contrary to the use of conventional methods the algo- rithm developed in this study does not use exclusive-OR (XOR) operation in Permutation (P) and Distribution (D) boxes for producing ciphertext from the plaintext. In this scheme pseudo ran- dom number (PRN) is used only to deceive the intruder by adding more confusion (meaning compared to the confusion due to the use of some tested algorithms used in this research). In fact only the sender of information and the intended recipient (not intruders) should be aware of the 44 bit positions filled by the PRN in a 128 word. The intended recipient discards these during deciphering process at the right time (these are disposed of before performing the inverse map- ping in the P-Box). Secondly, protection against attacks is further ensured by using two supple- mentary keys, one for the P-Box, and another for the D-box. In addition the routine key-set of the N selected algorithms further enhances the security. In a small set-up, the distribution of key-set can be mutually agreed upon by the users; but in a large set-up, the distribution of these sets can be accomplished using standard key distribution techniques. Moreover, the proposed algorithm- - also differs from the other methods currently in use due to deployment of a ―sentinel marker”; which is not adopted by other algorithms and this proposal is purely the brain child of the author. The sentinel marker is part of the secret key which is pre-decided and predetermined by the sender and the intended recipient of the information. Twenty bits (out of a total of 128) are used for the sentinel marker which amounts to 2^20 = 1,048,576 possibilities combined with 2^44 = 17.6 trillion possibilities of the ciphertext produced by the PRN. The job for the cryptanalyst to break this cipher becomes formidable and a fool-proof security of data is ensured.
فلسفہ تعزیرات وہ جرائم جو ہر انسانی معاشرے میں نہیں ہوتے بلکہ کسی معاشرے میں ہوتے ہیں اور کسی میں نہیں ہوتے۔ ان جرائم کی روک تھام اور سزاؤں کے حوالے سے شریعت مطہرہ نے بنیادی اصول وضع کردیے ہیں۔ ان بنیادی اصولوں کو مدِ نظر رکھتے ہوئے اس دور ، اس علاقے کے ارباب حل وعقد اور اولی الامر جو مناسب سزا مقرر کرنا چاہیں ، مقررکرسکتے ہیں ۔ نیز ان جرائم پر دین ، جان ، عقل ، نسل اور مال کی حفاظت کابھی انحصار نہیں۔ تعزیر کی سزا کے تقرر کے اصول مندرجہ ذیل ہیں: 1. سب سے پہلا اصول یہ ہے کہ اس سزا کا بنیادی مقصد امت مسلمہ اور عوام کے جان و مال کا تحفظ ہو ، محض کسی ایک گروہ یا کسی ایک فرد کے مفاد کی حفاظت نہ ہو۔ 2. دوسر ا اصول یہ ہے کہ وہ مصالح جن کو شریعت نے تسلیم کیا ہے اور جو شریعت میں قابل قبول ہیں ، ان میں سے کسی مقصد کا تحفظ اس سزا سے پورا ہوتا ہو ۔ 3. تیسرا اصول یہ ہے کہ اس سزا کے نتیجے میں اس برائی کے کم ہونے کا امکان ہو، زیادہ پھیلنے کا اندیشہ نہ ہو ۔ سزا دینااصل میں ایک آپریشن کرنا ہے۔ بعض بیماریاں آپریشن سے ختم ہوجاتی ہیں اور بعض آپر یشن سے پھیل بھی سکتی ہیں ۔ اب یہ ڈاکٹر کا فرض ہے کہ آپریشن کرنے سے پہلے وہ اطمینان کرے کہ یہ بیماری آپریشن کرنے سے پھیل تو نہیں جائے گی ۔ اسی طرح سزا دینے سے پہلے حاکم یاجج کو دیکھنا چاہیے کہ اس سزا کے نتیجے میں برائی ختم ہوجائے گی یا مزید بڑھے گی۔ 4. چوتھا اصول یہ ہے کہ جرم اور سزا کے درمیان تناسب ہو ۔ یہ نہ ہو کہ...
Pakht┴n society has its own justice system which has different types of penalties and remedies to maintain the justice in the society. This study concentrates to investigate the nature of pecuniary punishment’s practice in distressing issues like killing, civil injuries and criminal offences. Perpetrators are punished to resolve the disputes. On one hand, this paper aims to find out answer to the methods of inflicting decisions in Pakht┴n’s cult and on other hand, to shed light on the legal status of arbitration regarding resolving such issues in the light of Qur’an and Sunnah. Study results illustrate that in some cases the offenders are charged in term of money to facilitate the victims, while in other cases both of the parties, perpetrators and victims, are called upon on meal for reconciliation of their dispute. Besides this, sometimes it is observed that the offenders are not only awarded pecuniary punishment but they are exiled as well.
The allowed charge-changing transitions are considered to be the most general weak processes of spin-isospin ( ) form that play a crucial role in several nuclear processes. Equally important is their contribution in astrophysics, particularly in nuclear synthesis and supernovaexplosions. As per previous simulation results, weak interaction rates on fp shell nuclide are considered intensely signi cant for supernova physics. These transitions have significant in uence on the stellar core vis- a-vis controlling the lepton content (Ye) of stellar matter throughout the silicon shell burning stages of massive stars to the presupernova and core-collapse stages. Simulation of stellar events require Gamow-Teller (GT) strength distributions, preferably for hundreds of nuclei. Because of scarcity of experimental data, one is compelled to calculate GT strength distributions using microscopic theoretical nuclear models. The knowledge of measured GT strength should be broadened and theoretical attempts should be done to reproduce them and the charge-changing transitions of nuclei that are present far away from the stability line should be calculated. Therst-forbidden (FF) transition becomes important, in the circumstances where allowed charge-changing transitions are not favored, speci cally for neutron-rich (heavier) nuclide due to phase space considerations. In this thesis the deformed proton-neutron quasi-particle random phase approximation (pn- QRPA) theory was applied in stellar environment, for the investigation of allowed GT and uniquerst-forbidden (U1F) transitions (j Jj = 2) strength for a number of astrophysical important (medium heavy and heavy) nuclei. The calculated terrestrial beta-decay halflives (T1=2) values were compared with previous theoretical work and experimental results where it was concluded that the deformed pn-QRPA calculation are in decent comparison with measured data. The agreement of the calculated T1=2 values with the experimental data provide an idea about the correctness of the calculated weak-rates. The stellar weak interaction rates (GT and U1F) were computed over broad range of stellar temperature (0.01 GK { 30 GK) and density (10 { 1011 g/cm3) domain for astrophysical applications. viii We have compared the calculated weak-rates with previous other theoretical models compilations (wherever possible). Di erences were noticed with these previous models results and their impacts on the presupernova mechanism and for core-collapse supernova were discussed. In a recent study by Cole et al. [A. L. Cole, et al., Phys. Rev. C 86, 015809 (2012)], it was concluded that QRPA calculations show larger deviations and overestimate the total experimental GT strength. It was also concluded that QRPA calculated electron capture rates exhibit larger deviation than those derived from the measured charge-changing transitions strength. This work has probed the conclusion of the Cole et al. study and provides useful information on the performance of QRPA-based models. Ourndings showed that this is not the case for all type of QRPA models. In this work we did not assume Brink- Axel hypothesis as considered in previous shell models calculation. This made the current calculation unique and fully microscopic in nature. It is hoped that these microscopic compilations of stellar rates (allowed GT and U1F) will demonstrate enormous signi cance for core-collapse simulator worldwide. Our study suggests that the addition of rank (0 and 1) operators in FF transitions can further improve the comparison which remains unattended in this work.