Search or add a thesis

Advanced Search (Beta)
Home > Fixed Point Results in Metric Spaced Endowed With Graph: M. Phil Mathematics

Fixed Point Results in Metric Spaced Endowed With Graph: M. Phil Mathematics

Thesis Info

Author

Maqsood Matin

Supervisor

Nasir Rehman

Program

Mphil

Institute

Allama Iqbal Open University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2020

Thesis Completion Status

Completed

Page

vii, 39p.

Language

English

Other

Classification: 515.732 MAF

Added

2022-07-09 15:11:20

Modified

2023-02-19 12:33:56

ARI ID

1676729766877

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

ادبی زندگی کا آغاز

ادبی سفر کا آغاز

                 ناطق کے ادبی سفر کا آغاز بچپن سے ہی ہوا تھا۔وہ بتاتے ہیں کہ شروع میں مصوری کرنا انھیں پسند تھا اپنے دوستوں کی ڈرائنگ کاپیاں بنایا کرتے تھے۔ پھر مجسمہ سازی میں بھی اپنا ہنر آزمایا۔وہ ادبی سفر کے آغاز میں اپنے تجربات بتاتے ہوئے کہتے ہیں کہ :

’’ہمارے گھر کے پاس ایک شیشم کا درخت تھا جس پر ایک دن کوئل بیٹھی تھی۔وہ ایک درخت سے دوسرے درخت پر جابیٹھی تو اسے دیکھ کر میں نے کہا کہ یہ تو میں بھی کرسکتا ہوں۔تو میں نے بھی ویسے ہی کرنے کی کوشش کی لیکن میں منہ کے بل نیچے خس وخاشاک پہ آگرا۔اسی طرح کے تجربات میں کرتا رہتا تھا۔ہر چیز کو آزمایا اور آزمانے کے بعد نتیجہ نکالا کہ یہ میں کرسکتا ہوں اور یہ میں نہیں کر پاؤں گا۔"(1)

                تجربات کے بعد جب ناطق نتیجہ نکالتے تو وہ اس چیز کو ترک کردیتے جو وہ نہیں کرپاتے تھے مگر وہ اسے دیکھ کر کرنے کی کوشش ضرور کرتے تھے۔پھر کتابیں پڑھنا شروع کیں تو پڑھتے ہوئے میں نے سوچا کہ یہ کتنا اچھا لکھا ہوا ہے اور پھر یہ شوق بڑھتا گیا بچپن میں ہی اپنے دوستوں پر خاکے لکھنا شروع کر دیے اور شاعری کرنا شروع کردی وہ بتاتے ہیں کہ شاعری کی طرف پہلے راغب ہوا۔ناطق کا خاندان جب ہجرت کرکے پاکستان آیا تو اتنے مشکل حالات میں بھی ان کے دادا جان جو عربی اور فارسی دونوں زبانوں پر کمال عبور رکھتے تھے۔ہندوستان سے اپنی کتابیں ساتھ لانے میں کامیاب رہے ،وہ ان کی ادب سے دلچسپی تھی۔انہوں نے بتایا کہ وہ اپنے بچپن میں اپنے دادا کی کتابیں پڑھتے تھے۔ کہانیاں پڑھنے کا شوق وہ بچپن ہی سے...

صفات الجنة في سورة الرحمن: دراسة موضوعية

Thus the whole sayings or acts of the Prophet Muhammad (PBUH) proved to be the explanation of the Qur’an. Keeping this reality in view the writer has studied the whole treasure of the Hadith analytically and discussed the duty of the Prophet Muhammad (PBUH) for explanation of the Qur’an and primary and secondary sources of this pious duty pointing out different aspects of the explanation of the Qur’an by the Hadith; Qur’anic words, Qur’anic terms, Qur’anic notions, Qur’anic thoughts and even valuable points and conclusions the Prophet (PBUH) made through pondering upon this Holy Book.

Design and Analysis of Multi Receiver Signcryption Schemes on Elliptic Curves

Multicast is an efficient means of information dissemination to a set of nodes. It has low utilization of bandwidth and communication resources as compare to unicast. Secure multicast preserves confidentiality and authenticity of information to legitimate group members, adopted in emerging commercialization of wireless applications. Elliptic curves cryptography has promising industrial attraction. National Security Agency (NSA) of USA purchased license of ECC from Certicom. It will use ECC in its cryptographic modernization initiative, which aims to replace about 1.3 million existing security equipments over the next 10 years. Public Key Infrastructure (PKI) is the most popular centralized and hierarchical infrastructure, consists of trusted third parties registration authority and certificate authority and provides solution for proving authenticity of public keys. Multi receiver signcryption ensure confidential and authenticated dissemination of information to multicast group member instead of multi recipient encryption and digital signature. It is attractive for stateful secure multicast to distribute and update session keys and stateless secure multicast to disseminate multicast messages. In this thesis, we proposed six multi-receiver signcryption schemes on elliptic curve in PKI setting. First, multi-receiver signcryption scheme has functionalities of confidential and authenticated multicast session key agreement and instant secure message communication. It is efficient in term of computation and communication cost and suitable for secure multicast communication. Second, multi receiver signcryption with forward secrecy has additional functionality of forward secrecy of messages. It ensures confidentiality even if an attacker has stolen the sender private key. Its low communication overhead could make this construction a better option for use in resource constrained secure multicast communication. xvii Third, multi receiver signcryption for firewalls has additional functionality of encrypted message authentication. It enables firewall to verify encrypted message without disclosing message contents and obtaining any secret parameter from the participants. In case of dispute judge can also verify the authenticity of ciphertext and solve the dispute with obtaining any secret parameter from the participants. Its security attributes and cost effectiveness makes it suitable choice for efficient and secure multicast firewalls applications. Fourth, generalized multi receiver signcryption scheme based on elliptic curves has functionality of digital signature or multi receiver encryption or multi receiver signcryption with single algorithm. Fifth, blind multi receiver signcryption scheme has additional functionality of sender anonymity. It has significance in applications as privacy preserving multicast communication; electronic voting and payment system to protect the sender privacy and guarantees the freedom of thoughts and freedom of opinion. Sixth, proxy multi receiver signcryption scheme has functionality of designated a proxy agent, who makes multicast communication on the behalf of original user. It has applications in privilege delegation mechanism, an essential service in modern enterprises and organizations to extend and operate business via designated agent due to temporal absence, lack of time or processing capability.