Poststructuralist and Postcolonial Analysis of the Myth of Objectivity of Anglo-American Literary Tradition Anglo-American Literary Tradition is humanist, mimetic, teleological and canonical. Humanism manifests itself in its emphasis on individual as a unified entity and a rational being and culminates in valorizing the author and the reader. Mimesis signifies representation, depiction, presentation, realism, correspondence, and resemblance. Mimetic view of language suggests that language describes and represents reality objectively. Anglo-American Literary Tradition is canonical. Shakespeare is presented as the centre of Western literary canon and is considered as indispensable to the western culture as Christ is to Christianity. Teleology reflects itself in the concern among the western critics and authors for the maintenance of form of literature and its role in life. The objectivity of Anglo-American Literary Tradition implies that it is neutral, impersonal and universal. Poststructuralism challenges and subverts the traditional concepts of language, author, text, meaning and reading practices. It exposes the western culture to be phonocentric, phallocentric and logocentric. Postmodernism denies all claims to objectivity, universality and teleology. It denies all truth claims and privileges hyper-reality. Postcolonial criticism exposes western art and literature to be complicit in the colonization project. The postcolonial critics show how the myths of universality and objectivity were enlisted in projecting western culture and ideology through art and literature in the once colonized world. Shakespeare was imposed on the colonized people as a source of universal values. His works were projected as embodying human nature. Shakespeare was enrolled in the colonization project for his valorizing western race and culture and condemnation of people of other cultures and religions. Presence of racist and colonial content in his work has seriously dented his reputation as champion of humanity. The critics from the postcolonial world are taking Shakespeare to task for his involvement in race politics.
عبدالمجید صاحب سالک پنجاب میں مولانا ظفر علی خاں مرحوم کے بعد ادب و صحافت کے میدان میں سب سے ممتاز اور رنگارنگ شخصیت عبدالمجید صاحب سالک مرحوم کی تھی، وہ ادیب و شاعر بھی تھے اور صحافی و مزاح نگار بھی، ان کا مذاق بڑا ستھرا اور قلم متوازن تھا، ایک زمانہ میں ان کی ذات لاہور کی ادبی سرگرمیوں کا مرکز تھی، پنجاب کے بہت سے نوجوان ادیب و صحافی ان ہی کے دامن تربیت کے پروردہ ہیں، طبعاً بڑے باغ و بہار، سخن طراز اور بزم آرا تھے، انھوں نے علم و ادب کے ساتھ ملک و ملت کی بھی خدمت انجام دی، متعدد علمی و ادبی تصانیف ان کی یادگار ہیں، ان میں ’’مسلم ثقافت ہندوستان میں‘‘ ان کے حسن مذاق کا نمونہ ہے، ابھی تھوڑے دن ہوئے ’’ہم نہیں ہوں گے‘‘ کی ردیف و قافیہ میں ان کی ایک بڑی دلکش نظم نظر سے گذری تھی، کیا معلوم تھا کہ یہ شاعری اتنی جلد واقعہ کی شکل اختیار کرلے گی، علم و ادب کی محفلوں میں مدتوں ان کی یاد آتی رہے گی، اﷲ تعالیٰ علم و ادب کے اس خادم کو اپنی رحمت و مغفرت سے سرفراز فرمائے۔ (شاہ معین الدین ندوی،نومبر ۱۹۵۹ء)
The immune system also called as the defense system involves many different cells that work as soldiers in an individual. These immune cells provide protection against various pathogens. For better protection of an individual the immune systems has the ability to memorize or remember the pathogen. This ability is known as immunological memory. With the help of immunological memory the immune memory cells remember the antigen and are prepared if there is an encounter with the antigen in future. The immunological memory can be developed against certain strains with the help of different types of vaccines. Such types of vaccines that are currently being used to save lives are, Live attenuated vaccines, Toxoid vaccines, Subunit vaccines, Glyco-conjugated vaccines, and Killed/Inactivated vaccines. These vaccine show different efficiency. Hence, the immunological memory generated after a single vaccination may wear off with time. Multiple numbers of shots are required for the development of long term memory. All these types of vaccines vary from each other in their manufacturing and also in their mechanism of providing long term immunological memory. They show many pros and cons but their advantages are greater than their disadvantages. Thus, are preferred to be used for the betterment of mankind.
Compression of data has become a worldwide phenomenon during the past few decades for reason of achieving savings in band-width (BW) and hence makes it cost effective. The widespread practice of encryption of data has generated interest for many decades and it mainly aims at protection of data. Combining these two apparently contrary processes (in terms of BW) is quite challenging. Whereas the research on concurrent data compression and data protection (encryption) is still on, the methodology adopted by the author is unique and quite new. The most important aim of data compression technique is the need for curtailing the data storage and communication expenses. The source message (long) is converted to a codeword (small). The key objective of data encryption is to guard the integrity of data if it is intercepted by an eavesdropper. The plaintext is transformed in to ciphertext using an encryption key or keys. Combining the processes of compression and encryption together must be done in this order, that is, compression followed by encryption because all compression techniques heavily rely on the redundancies inherently part of a regular text or speech. The speech compression has been achieved using Lempel-Ziv 78 algorithm and a new algorithm for encryption/decryption, named ―The RandomOne, abbreviated as TR-1‖ is developed during this study and is thoroughly tested. The results obtained are quite encouraging. Firstly, contrary to the use of conventional methods the algorithm developed in this study does not use exclusive-OR (XOR) operation in Permutation (P) and Distribution (D) boxes for producing ciphertext from the plaintext. In this scheme pseudo random number (PRN) is used only to deceive the intruder by adding more confusion (meaning compared to the confusion due to the use of some tested algorithms used in this research). In fact only the sender of information and the intended recipient (not intruders) should be aware of the 44 bit positions filled by the PRN in a 128 word. The intended recipient discards these during deciphering process at the right time (these are disposed of before performing the inverse mapping in the P-Box). Secondly, protection against attacks is further ensured by using two supplementary keys, one for the P-Box, and another for the D-box. In addition the routine key-set of the N selected algorithms further enhances the security. In a small set-up, the distribution of key-set can be mutually agreed upon by the users; but in a large set-up, the distribution of these sets can be accomplished using standard key distribution techniques. Moreover, the proposed algorithm also differs from the other methods currently in use due to deployment of a ―sentinel marker”; which is not adopted by other algorithms and this proposal is purely the brain child of the author. The sentinel marker is part of the secret key which is pre-decided and predetermined by the sender and the intended recipient of the information. Twenty bits (out of a total of 128) are used for the sentinel marker which amounts to 2^20 = 1,048,576 possibilities combined with 2^44 = 17.6 trillion possibilities of the ciphertext produced by the PRN. The job for the cryptanalyst to break this cipher becomes formidable and a fool-proof security of data is ensured.