آہ!مولانا سید ابوالاعلیٰ مودودی
موت وحیات قانون فطرت ہے، جو اس دنیا میں آیاہے اسے ایک دم جانا ضرور ہے، لیکن بعض شخصیتیں ایسی ہوتی ہیں کہ جب وہ اس جہان آب وگل سے رخصت ہوکرعالم آخرت کی طرف پرواز کرتی ہیں توایسا محسوس ہوتاہے کہ قلب و دماغ کی دنیا میں ایک زلزلہ ساآگیاہے اورخرمن ہوش وحواس پربجلی گرپڑتی ہے، اس زلزلہ اورصاعقہ فگنی کااحساس مقید اور محدود نہیں ہوتا بلکہ عالمگیر ہوتاہے اور اس کی شدت اورکرب مشرق ومغرب اورشمال وجنوب میں یکساں محسوس ہوتا ہے، یہی وہ شخصیتیں ہوتی ہیں جن کی وفات پرنطق ربانی کے لفظوں میں زمین وآسمان روتے ہیں اوران کی موت عربی کے اس شعر کامصداق ہوتی ہے:
وماکان قیس ھلکہ ھلک واحد
ولکنہ بنیان قوم تھدما
اس میں کوئی شبہ نہیں ہوسکتا کہ مولانا سید ابوالاعلیٰ مودودی کی وفات ایسی ہی ایک شخصیت کی وفات ہے۔
اب سے ساٹھ اکسٹھ برس پہلے کون کہہ سکتا تھا کہ جس سبزہ آغاز نوجوان نے اپنے والد ماجد کی ناگہانی وفات کے باعث معاشی ضرورت سے مجبور ہوکر اور اپنی تعلیم کوادھورا چھوڑ کر تاج(جبل پور)اورمسلم والجمعیت(دہلی)کی ایڈیٹری کو قبول کیا تھا، وہ ایک روزعالم اسلام کے افق پر آفتاب بن کرچمکنے اور ملت بیضا کی ایک نامور و عظیم تر شخصیت بننے والاہے لیکن موخرٔ الذکر اخبار کی ایڈیٹری (از۱۹۲۵ء تا۱۹۲۸ء)کے زمانہ میں ہی بعض مضامین اور خصوصاً ’’الجہاد فی الاسلام‘‘جواس نوجوان ایڈیٹر کے قلم سے نکلے وہ زبان و بیان اورحقائق و مطالب کے اعتبار سے اس درجہ موثر اورجاذب توجہ تھے کہ غیر منقسم ہندوستان کے ارباب فکر ونظر کی زبان بیساختہ نواسنج تحسین وآفریں ہوگئی اور دوراندیش نگاہوں نے تاڑ لیا کہ جرنلزم کے آسمان پرجو آج ہلال نوبن کر نمودار ہواہے وہ کل علم وتحقیق کے افق پرماہ کامل کی صورت میں جلوہ گر ہوگا۔
جیسا کہ...
This research is motivated by a phenomenon of poor communication between parents and children. In the world of education, there was a lack of approaches and methods used by educators in providing subject matter so that what was delivered by the educator did not achieve the expected goals. The problem in this research is how the participatory methods, lectures and discussions contained in the As-Shaffat letter verse 102. The purpose is to describe the educational methods contained in the As-Shaffat letter verse 102 in the form of participatory methods, lecture methods and discussion methods. This research is a Library Research. The method of interpretation used in this study is the method of interpretation of maudhu 'or thematic methods which interpret verses of the Qur'an based on specific themes. The method used in the explanation of the verse is the method of tahlili or analysis that explains the verses of the Qur'an by examining its aspects and revealing its whole purpose. The results of study and analysis, as well as data processing from various sources, obtained the first result that the educational method contained in the As-Shaffat verse 102 is a participatory method used by educators, which involves all elements in the educational process especially students, with active participation from participants students will facilitate educators in delivering the material to be given. Both lecture methods, in conveying information, especially learning materials can be done with the lecture method. An educator prioritizes good attitudes so that the material can be accepted by students. The third method of discussion is to involve students in giving their opinions. With the discussion in learning, the lessons will become warmer and will train students to be more courageous in opinion.
Distributed Denial of Service (DDoS) attack does not aims to disrupts or interfere with the real sensor data, rather they take advantage of disparity that exists between the network bandwidth and the limited resource availability of the victim. Detecting and preventing such attacks in cloud- assisted Wireless Body Area Networks (WBANs) is an important concern. Such attacks can be avoided by first detecting followed by prevention and mitigation. Attack detection is an initial step of any defense approach that needs to be taken prior to attack mitigation techniques. Similarly, attack prevention also plays an important role in protecting a network from malicious attacks. This research is mainly focused on the DDoS attack detection and prevention algorithms and propose a novel solution that not only consumes less resources but also produce efficient results. The limited resources of WBAN are not enough to mitigate the huge amount of traffic generated by DDoS attack. Therefore, there is a need for lightweight approaches and capable of handling real-time high speed sensor data for detection of such attacks in cloudassisted WBAN environment. The concern of detecting and preventing the DDoS attack in cloud- assisted WBAN remains unresolved, existing solutions proposed for such attacks in conventional networks are not directly applicable in cloud-assisted WBAN environment due to the resource scarceness of these networks. Moreover, multiple entry points into these networks leave them more vulnerable to such attacks which makes the attack detection and prevention process a challenging task. The aim of this research is to design a lightweight, in-network, distributed and scalable approach for detecting DDoS attack that is capable of handling high speed streaming data generated by WBAN sensors in cloud- assisted WBAN environment. The goal is to propose the attack detection technique with improved performance when compared with existing techniques in terms of: i) improved attack detection accuracy; ii) minimizing overall resource usage and iii) reducing overall computational cost. Analyzing and comparing the existing techniques for detecting attacks in both conventional and wireless sensor networks concludes that Very Fast Decision Tree (VFDT) has proved to be the most promising solution for identifying the malicious behavior of nodes in these networks through pattern discovery. Therefore, in this research , we have selected and explored VFDT technique that is lightweight and have further optimized it for handling high-speed streaming data originating from WBAN sensors. The performance evaluation is done through simulation experiments and real-time WBAN testbed deployment to test the effectiveness of proposed attack detection approach. In addition, the quantitative results obtained from the simulation experiments are benchmarked with corresponding results acquired from the existing techniques. The results comparison shows the advantages and significance of deploying stream mining approach in such networks, for detecting DDoS attacks in an efficient and timely manner. Another objective of this research is to propose an efficient traceback technique specifically for cloud- assisted WBAN environment that incur minimal overhead on the WBAN network. The goal is to propose a technique that is efficient in packet marking and path reconstruction procedures in order to traceback and identify the source of DDoS attack with less convergence time. Different traceback techniques have been analyzed and their comparison drawn to the conclusion that Probability Packet Marking (PPM) is most appropriate and widely used approach in both conventional and wireless sensor networks. The key issue of PPM lies in assigning the marking probability for path reconstruction. Therefore, we model the traceback of DDoS attack as a marking probability assignment problem and further optimized it for efficient traceback of DDoS attack in cloud- assisted WBAN environment. The evaluation is performed through simulation experiments to test the effectiveness of the proposed traceback technique. In addition, the quantitative results acquired from the simulations are benchmarked with equivalent results acquired from a fish bone traceback technique. The result comparisons prove the effectiveness of proposed traceback technique in WBAN networks, for identifying the source of DDoS attacks with less convergence time and minimum overhead.