طفیل ہوشیار پوری(۱۹۱۴ء۔۱۹۹۳ء) کا اصل نام محمد طفیل اور شہرت طفیل ہوشیار پوری کے نام سے ہوئی۔ طفیل ضلع ہوشیارپورکی تحصیل گڑھ شنکر کے ایک گاؤں بینے والی میں پیدا ہوئے۔ ۱۹۳۴ء میں ہوشیار پور سے ہجرت کر کے سیالکوٹ میں مستقل سکونت اختیار کر لی ۔یہاں انھوں نے اپنے بڑے بھائی کے ساتھ مل کر منیمی(حساب کتاب) سکول قائم کیا۔ اس سکول میں سیالکوٹ کے ممتاز تاجر ان کے شاگرد رہے ہیں۔(۶۰۷)
۱۹۴۳ء میں طفیل آل انڈیا ریڈیو سے منسلک ہو گئے۔ ۱۹۵۴ء میں ان کا ناطہ فلمی دنیا سے جڑ گیا ۔ اور آپ فلموں کے لیے گیت لکھنے لگے۔یہ گیت اردو اور پنجابی زبان میں ہیں۔۱۹۵۴ء میں ہی انھوں نے لاہور سے ایک ادبی اور علمی رسالے کا اجرا کیا جس کا نام ’’محفل‘‘ تھا۔ آپ ہفت روزہ رسالہ ’’صاف گو‘‘ کے مدیر اعلیٰ بھی رہے ہیں۔(۶۰۸)
حُب وطن پر مشتمل نظموں اور جنگی ترانوں پر مشتمل ’’میرے محبوب وطن‘‘ طفیل کا پہلا شعری مجموعہ کلام ہے۔ جوجنوری ۱۹۶۶ء میں شائع ہوا۔مولانا ابو الا علیٰ مودودی نے حرفِ اول لکھا۔ جسٹس ایس۔اے رحمان نے ’’پیشِ لفظ‘‘ سید عابد علی عابد نے ’’دیباچہ‘‘ اور سید نذیرنیازی نے ’’مقدمہ ‘‘ اور طفیل نے’’میں خود کہوں تو‘‘ کے عنوان سے اپنی قومی نظموں کا پس منظر بیان کیا ہے۔ جامِ مہتاب طفیل کا دوسرا شعری مجموعہ ہے۔ جو رباعیات و قطعات پر مشتمل ہے ۔یہ مجموعہ ۱۹۷۵ء میں شائع ہوا۔ حرفِ آغاز جسٹس ایس ۔اے رحمان نے لکھا۔’’تعارف و تقریظ‘‘ مولانا حامد علی خان نے لکھا۔ عرضِ حال کے عنوان سے طفیل نے اس کتاب میں اپنی شاعری پر روشنی ڈالی ہے۔ ڈاکٹر سید عبداﷲ نے ’’شعلہ جام پر ایک نظر‘‘ کے عنوان سے مضمون قلم بند کیا ہے۔ ڈاکٹر عبادت بریلوی نے مقدمہ لکھا ہے۔ جب کہ شاعر لکھنوی نے ’’شعلہ جام سے طفیل ہوشیار...
There are several points which illustrate Qur’ānic I‘jāz and probably rely on Islamic Theologians -Mutakallimin’s- efforts as well as exertions regarding Qur’ānic I‘jāz. Mutakallimin for having good command over Arabic rhetorical structures have demonstrated Qur’ānic I‘jāz in two contexts: theoretically and empirically. They actually validated, that Qur’ān is the book of Allah Almighty, through comparing both standard Arabic texts: prose and poetry into face of Qur’ānic text. All these cherished efforts of Mutakallimin are rooted in Arabic rhetoric which stands for that Arabic Rhetoric and ‘ilm al-Kalām; both have very primary relation resulting in that cannot be ignored while analyzing I‘jāz phenomenon.
Data provenance has an essential role in establishing the trustworthiness of data in many applications, where critical decisions have to be made based on the data collected from diverse sources. Therefore, it is indispensable to use authentic and accurate data for such mission-critical applications. In order to fully trust the data provenance itself, it is extremely important to secure the data provenance from forgeries and misuse. Provenance generation, management, and dissemination have received substantial attention from the research community. However, provenance security in a collaborative distributed network has earned less heed from the research community. The traditional time-honoured security solutions cannot be directly applied because of the chained or directed acyclic graph structure of the provenance. For a collaborative distributed network, in the literature, some security solutions have been proposed to secure the provenance information. However,these schemes are not without their limitations. The existing schemes assume transitive trust among participating users, thus attacks initiated by multiple consecutive colluding users on a provenance chain cannot be detected. Such an assumption is beyond the reality, especially working in a file sharing environment or distributed network. Moreover, the existing schemes introduce an additional element to chain the provenance records which results an extra storage overhead. To overcome the aforementioned loopholes, we have proposed secure provenance schemes for a document/file sharing n etwork. The proposed schemes can detect the attacks launched by either consecutive or non-consecutive adversaries. For the provenance records chaining, these schemes aggregate the signatures of the participating users. Experimental results show that the proposed schemes outperform as compared to existing schemes in terms of computation and storage cost. Provenance size is a major hindrance to the adoption of provenance in a resourceconstrained network. The provenance size increases drastically when the number of nodes in the network grow. The growing provenance size becomes the per formance bottleneck especially in Wireless Sensor Networks (WSNs). Different solutions have been proposed in the literature to compress the provenance in formation along with its security. However, in existing provenance compression schemes, the provenance’s size grows linearly with the number of nodes in a WSN. Furthermore, the existing provenance compression schemes are designed for static nodes only and do not account for the mobility factor. Moreover, some secure provenance compression schemes use overlapped arithmetic coding to compress the provenance information. However, there is no criterion to find the overlapping ratio. To overcome the above-mentioned issues, we have proposed a secure provenance compression scheme for mobile nodes of a WSN. Moreover, a novel mechanism has been devised to calculate the overlapping ratio for overlapped arithmetic coding. Furthermore, the proposed scheme assures the confidentiality, integrity, and fresh ness of the provenance information. It is evident from the simulation results that the proposed scheme has higher compression and lower false positive rate.