فصل پنجم: آیاتِ استفہام میں فہمِ عقیدہ آخرت (تفسیر تدبرِ قرآن کی روشنی میں تخصیصی مطالعہ)
حیات بعد الممات کا سوال ایک فلسفیانہ سوال نہیں ہے بلکہ اس کا ہمارے عملی زندگی سے بہت گہرا تعلق ہے اگر انسان کو جوابدہ کا احساس نہ ہو تو وہ اپنے اعمال پر کبھی بھی محاسبہ کرنا پسند نہیں کرے گا اس کے اخلاقی تصورات ہی بدل جائیں گے اس کا پورا اخلاقی نظام خود غرضی، بے حسی اور نفسانیت کی بنیاد پر تعمیر ہوگا اس کے برعکس اگر اعمال کی جوابدہی کا تصور ہوگا تو وہ اچھے یا برے انجام کے باعث نتیجے پر غور کرے گا۔جو لوگ قیامت کا انکار کرتے ہیں انکے بارے میں قرآن میں بیان کیا جا رہا ہے:
"وَقَالُوْٓا ءَ اِذَا كُنَّا عِظَامًا وَّرُفَاتًا ءَاِنَّا لَمَبْعُوْثُوْنَ خَلْقًا جَدِيْدًا"۔[[1]]
"اور انہوں نے کہا کہ جب ہم زمین میں گم ہو جائیں گے تو کیا ہم پھر نئے سرے سے پیدا ہونگے؟"
اس آیت میں منکرین قیامت کی روش بیان کی جا رہی ہے کہ وہ لوگ بطور تعجب کے کہتے ہیں کہ ہم مر جائیں گے ہڈیاں بوسیدہ ہو جائیں گی ہمارا وجود مٹی میں مل جائے گا تو دوبارہ کیسے پیدا ہو سکتے ہیں ؟ جبکہ یہ بات واضح ہے کہ جو خالق انکو بغیر کسی ماڈل کے پہلی بار تخلیق کرنے پر قادر ہے تو دوبارہ پیدا کیوں نہیں کر سکتا بلکہ اس کے لئے تو دوبارہ پیدا کرنا بہت ہی آسان بات ہے ۔
"اسلام نے وضاحت فرما دی ہے کہ کارخانہ ہستی کا حدوداربعہ صرف وہی عالم رنگ و بو نہیں ہے جو تمہارے چاروں طرف پھیلا ہوا ہے میدانوں ، کھلیانوں، دریاؤں ، پہاڑوں ،آبشاروں، بادلوں ، آسمان...
The political reality of many countries in the Muslim World is untenable and reforms and change is absolutely necessary. This article argues that use of force and violence for political change is making things worse as one can witness in Syria and Iraq. The article advances a Qur’ānic perspective on the desirability of peace as a goal and peaceful means as instruments of change. The article acknowledges that the Qur’ānic sanction for use of force to defend religious freedom prcludes the advocacy of pacifism but nevertheless the article does make a strong case for privileging peace over use of force.
Pervasive computing is characterized by large numbers of roaming entities and the absence of a globally available fixed infrastructure. In such an environment entities need to collaborate with little known or even unknown entities. In traditional environments with clearly defined administrative boundaries security decisions are usually delegated to a centralized administrative authority. In the pervasive computing environment no single entity can play this role, entities are required to make their own security decisions and as a result traditional techniques are not an option. Human notion of trust enables human societies to collaborate and interact based on personal and shared experiences. Thus a security model based on the real world characteristics of trust can provide the internal security for autonomous computing devices embedded in pervasive environment before taking action, despite uncertainty and inadequate information. The work presents an adaptive trust and recommendation based access control model based on human notion of trust. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any past interaction with the service. A mathematical formula together with adaptable security policies is introduced to handle malicious strategic attack in direct trust computation. The model encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. The performance of indirect trust computation models (based on recommendations) can be easily compromised due to the subjective and social-based prejudice of the provided recommendations. Eradicating the influence of such recommendation remains an important and challenging issue in indirect trust computation models. An effective model for indirect trust computation is also proposed which is capable of identifying dishonest recommendations. Dishonest recommendations are identified by using deviation based detecting technique. The concept of measuring the credibility of recommeni dation (rather than credibility of recommender) using fuzzy inference engine is also proposed to determine the influence of each honest recommendation. The proposed model has been compared with other existing evolutionary recommendation models in this field, and it is shown that the model is more accurate in measuring the trustworthiness of unknown entity. An XML-over-UDP based recommendation exchange protocol to share recommendation information between smart devices, is also outlined to complement the model. Implementation of the proposed model on android smart phone using OSGi is presented to demonstrate the effectiveness of the protocol in pervasive computing environment. Experimental results demonstrate that using HTTP or TCP for recommendation exchange between smart devices in wireless environment lead to significantly higher overhead as compared to XML-over-UDP. In general, our research work presents a comprehensive framework for secure trust based access control that will augment future research towards real world implementation of pervasive computing environment.