Search or add a thesis

Advanced Search (Beta)
Home > کلامِ نبویؐ میں محاورات و استعارات کا استعمال: صحاح ستہ کے خصوصی حوالے سے

کلامِ نبویؐ میں محاورات و استعارات کا استعمال: صحاح ستہ کے خصوصی حوالے سے

Thesis Info

Author

محمد ہارون خان

Institute

University of Karachi

City

کراچی

Language

Urdu

Keywords

شمائلِ نبویؐ

Added

2023-02-16 17:15:59

Modified

2023-02-16 17:33:40

ARI ID

1676730105293

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

مولاناشاہ حلیم عطا

مولانا شاہ حلیم عطا
دوسرا حادثہ دارالعلوم ندوۃ العلماء کے شیخ الحدیث مولانا شاہ حلیم عطا صاحب کی وفات ہے، وہ حضرت شاہ پیر محمد عطا سلونویؒ کی اولاد میں تھے اور موجودہ سجادہ نشین شاہ نعیم عطا صاحب کے چھوٹے بھائی تھے۔ یہ خاندان علم و فضل دونوں کا جامع رہا ہے۔ شاہ حلیم عطا صاحب بڑے وسیع النظر عالم اور اسلامی علوم کا زندہ کتب خانہ تھے۔ خصوصاً حدیث اور اس کے متعلقہ فنون پر ان کی نظراتنی گہری اور وسیع تھی کہ اس دور کے علماء میں اس کی مثالیں کم ملیں گی۔ حضرت الاستاذؒ فرمایا کرتے تھے کہ شاہ صاحب کے علم کی تھا نہیں ملتی اور اس علم و فضل کے ساتھ ایسے خاکسار اور متواضع، سادہ مزاج اور بھولے بھالے تھے کہ ان کو دیکھ کر کوئی شخص مشکل سے ان کے لکھے پڑھے ہونے کا گمان کرسکتا تھا۔ اپنے سے کمتر علم والوں کی باتیں اس شوق اور توجہ سے سنتے کہ معلوم ہوتا خود استفادہ کررہے ہیں۔ حافظہ حیرت انگیز تھا، کتابوں کے صفحے کے صفحے زبانی یاد تھے مگر ان کمالات کے ساتھ قوت گویائی اور قوت ِ تحریر نہ تھی، اس سے بھی زیادہ ان کی تواضع اور استغنانے ان کو نام و نمود سے بے نیاز کردیا تھا، اس لیے ایک محدود علمی حلقہ کے سوا علمی دنیا بھی ان کے کمالات سے واقف نہ ہوسکی، تقریباً پندرہ سال سے دارالعلوم ندوۃ العلماء میں حدیث نبوی کا درس دیتے تھے اور اسی مبارک شغل میں چند دنوں فالج میں مبتلا رہ کر انتقال کیا۔ انتقال کے وقت ۶۵ سال کی عمر رہی ہوگی۔ اﷲ تعالیٰ اس پیکر علم و اخلاق کو اس کے پاک شغل کے طفیل میں عالم آخرت کی سربلندی عطا فرمائے۔
(شاہ معین الدین ندوی، نومبر ۱۹۵۵ء)

مولانا شاہ حلیم...

الشھید و اقسامہ مع استعمالاتہ الخاطئتہ فی العصر الحاضر

Islamic concept about Jihad is very different as what is interpreted by the western scholars. This Jihad is not only the name of giving just his own life but to a specific purpose, which is only to create peace and to prevent cruelty and injustice in the society. There are several verses of Quran and Hadith, which explore this concept, but Islam also regulates the rules and regulation for this. To explain the misconception about Jihad, some points have been explored in this research article to guide the people effectively that how jihad should be conducted, while other activities named as “jihad” and an activist intending to take part in such activities might not be counted as a “martyr”. So the important points to be kept in mind are: · In Islam the martyr has a very great value, but in specific terms. · Martyr in Islam is not simply means of giving life. · There are some rules and regulations that must to be followed, i. E., a person must be a Muslim and his intention is only for Allah, and not for his worldly desires, and he follow the rules what Islam justified for the war. · His jihad will not be accepted without the permission of his parents or if he dies in the state of sin etc. · Islam does not allow killing innocent persons, Muslims or non-Muslims, without caring the color and caste, if he does so he would be answerable to Allah.

Study of Watermarking for Image and Text Based Applications

Due to the rapid development of multimedia and communications technologies, issues related to data vulnerability and copyrights violation has increased. Digital content can be manipulated and reproduced effortlessly. Consequently, there is a considerable requirement for techniques aimed at content protection and authentication. Watermarking techniques can provide copyrights enforcement and authentication to prevent the illegitimate use of digital content. These techniques can be classified into two categories i.e. robust watermarking and reversible watermarking. In this thesis, research work is carried out in three phases. The first phase proposes a robust watermarking technique, which is resilient against the geometrical attacks. It is helpful in executing copyright protection. In robust watermarking, watermark is able to survive in case of attack on the digital content and can be successfully retrieved on extraction. The proposed technique exploits both the robust image feature points and local Zernike moments for embedding secret information. Delaunay tessellation is employed to divide an image into distinct triangular segments based on robust features identified using Harris detector. Zernike moments are calculated for each selected triangular segment, and then the watermark is embedded in the magnitude of Zernike moments using dither modulation. In the second phase, a reversible watermarking technique is proposed. Reversible watermarking is a special type of watermarking technique in which watermark is extracted along with restoration of the host media. Whereas, in case of robust watermarking, we are not able to retrieve the original image. Such watermarking system finds its application in medical and law enforcement, etc. The proposed watermarking scheme is based on pixel value ordering. Image is divided into sub blocks and each block is assessed using a threshold value. If the block belongs to the smooth category, watermark bit is embedded. In contrast, if it is classified as rough block, then the sub block is left unchanged. This technique does not require a location map since it uses histogram shifting. In third phase, the watermarking approaches and their applications for the protection DNA sequences are explored. In DNA watermarking, which is type of text watermarking; watermark information should be embedded in DNA sequence in such a way that it should not raise any functional disorders in the living organism. A watermark is embedded in a DNA sequence through synonymous substitution of nucleotides. The proposed approach ensures Amino Acid conservation, efficient utilization of the available embedding space in DNA sequences, and achieves mutation resistance by since it employs Reed-Solomon codes. The performance of these techniques has been evaluated on the standard test datasets. In some of the cases, the proposed watermarking approaches performed better than the recent existing approaches and showed comparable performance in other cases. The first technique finds its application in protecting the copyrights of the owner. The second watermarking technique can be used in applications where significant amount of data needs to be embedded e.g. information related to the patient in medical images. The third technique related to the DNA watermarking can be used for protection of DNA sequences and also to provide biological data storage as large amount of data can be stored.