نئے ہزارہ کے ربع اول کے عالمی، قومی اور مقامی مابعد جدید تناظر میں نئے عہد کی ناولاتی تخلیقیت کا جشن عالیہ قائم ہے۔ گو بڑے ناول نہ سہی، لیکن اچھے، سچے، اہم اور معنی خیز ناول لکھے جا رہے ہیں۔ بڑے بڑے ناول روز روز وجود میں نہیں آتے۔ اِس ضمن میں فکشن کی شعریات زیادہ تر فکری اور فنی دُشواریاں پیدا کرتی رہی ہے۔ تاہم عالمی ناولاتی تخلیقیت میں بالزاک کے پہلو بہ پہلو مارسل پُروست، جیمس جوائس، ورجینیاولف، الزبیٹھ بوون، کے چشمہئئ شعور کے ناولوں کے علاوہ روب گرئیے، مائیکل بوتر اور مادام ستراط کے ”نو ؤ رو ماں“ میں اور دوسروں کازو اُواِشی گورو (KAZOO ISHIGURO) سیمول بیکٹ، بورہس (بورخیز غلط ہے) گبریل گار شیامار کیز (مارخیز غلط ہے) اِٹالو کالونیو اور امرتوایکو کے یہاں بھی شدت سے محسوس ہوتا ہے کہ ناولاتی فکشن ان دُوگروپوں (مثلاً فاکنر، گریسیا مار کو ئیز، میلان کندیرا، جُو لیو کور تیزار، رینالڈ وار نیاز، اِنجیلا کارٹر اور جنیٹ ونٹرس، ٹونی ماریسن، سلمان رشدی، گنٹر گراس اور میلکم لاوی وغیرہ کے درمیان ایک پیچیدہ لا متناہی مکالمہ قائم و دائم ہے جو دنیا سے ہم رشتگی کے باوجود شدید انفرادی ردّ عمل سے وجود پذیر ہوتا ہے اور مختلف و متنوع ناولاتی رنگ و آہنگ اختیار کرلیتا ہے۔
انتظار ح”ہندوستانی قومی اور مقامی تجربہ“ ”یوروپی تجربہ“ سے مختلف ہے تو ہندوستانی ناول کی بوطیقا یوروپی ناول کی بوطیقا سے مختلف ہوگی۔ وہ ہمارے معاشرتی، تہذیبی، ثقافتی تجربہ، ہماری یاد، ہماری ذہنی کنڈیشنگ، وقت اور ارتقا کی بابت ہمارے فطری ذہنی رویہ اور عمل برتاؤ کے مطابق ہوگی۔ بنیادی سوال یہ ہے کہ ہم اردو ناولوں کی صحیح قدر و قیمت کس بوطیقائی کسوٹی پر متعین کرتے ہیں؟ جب تک ہم اِس فکشنی شعریاتی کسوٹی کے لئے کھری فکریاتی کسوٹی نہیں ڈھونڈتے۔ خود ناول کی...
Ibn Taymiyya is known as a controversial figure due to his differences. Most of the scholars have differed with him on most of the jurisprudential and principled issues. There are many reasons for Ibn Tamiya’s differences. The difference between intellect and its use is the most important, that is, the way of thinking. The jurisprudential ability and competence that elevated him to the status of ijtihad was a result of uniqueness in ijtihad and jurisprudence. Disagreements can be caused by the circumstances of that era and the behavior of the people of that era. All the principles and their preferred methods based on which he solved jurisprudential and doctrinal issues and all the reasons why he disagreed with a section of the ummah and the ummah know these differences in the form of the differences of Ibn Taymiyya. It is very important that his jurisprudential insight and ijtihad efforts be revealed, although in many issues the majority of the scholars of the ummah have disagreed with him and their opinion differs from the great taste. Ibn Tamiya’s method of inference in jurisprudential and principled issues and the principles by which he formed an opinion on an issue and on what basis he preferred principles in solving problems are the key issues that will be discussed in the following article.
Pervasive computing is characterized by large numbers of roaming entities and the absence of a globally available fixed infrastructure. In such an environment entities need to collaborate with little known or even unknown entities. In traditional environments with clearly defined administrative boundaries security decisions are usually delegated to a centralized administrative authority. In the pervasive computing environment no single entity can play this role, entities are required to make their own security decisions and as a result traditional techniques are not an option. Human notion of trust enables human societies to collaborate and interact based on personal and shared experiences. Thus a security model based on the real world characteristics of trust can provide the internal security for autonomous computing devices embedded in pervasive environment before taking action, despite uncertainty and inadequate information. The work presents an adaptive trust and recommendation based access control model based on human notion of trust. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any past interaction with the service. A mathematical formula together with adaptable security policies is introduced to handle malicious strategic attack in direct trust computation. The model encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. The performance of indirect trust computation models (based on recommendations) can be easily compromised due to the subjective and social-based prejudice of the provided recommendations. Eradicating the influence of such recommendation remains an important and challenging issue in indirect trust computation models. An effective model for indirect trust computation is also proposed which is capable of identifying dishonest recommendations. Dishonest recommendations are identified by using deviation based detecting technique. The concept of measuring the credibility of recommeni dation (rather than credibility of recommender) using fuzzy inference engine is also proposed to determine the influence of each honest recommendation. The proposed model has been compared with other existing evolutionary recommendation models in this field, and it is shown that the model is more accurate in measuring the trustworthiness of unknown entity. An XML-over-UDP based recommendation exchange protocol to share recommendation information between smart devices, is also outlined to complement the model. Implementation of the proposed model on android smart phone using OSGi is presented to demonstrate the effectiveness of the protocol in pervasive computing environment. Experimental results demonstrate that using HTTP or TCP for recommendation exchange between smart devices in wireless environment lead to significantly higher overhead as compared to XML-over-UDP. In general, our research work presents a comprehensive framework for secure trust based access control that will augment future research towards real world implementation of pervasive computing environment.