Search or add a thesis

Advanced Search (Beta)
Home > تحریکِ ختم نبوت 1974ء میں جمعیت علمائے پاکستان کا کردار: تجزیاتی مطالعہ

تحریکِ ختم نبوت 1974ء میں جمعیت علمائے پاکستان کا کردار: تجزیاتی مطالعہ

Thesis Info

Author

محمد اسلم

Supervisor

عقیل احمد

Program

Mphil

Institute

The University of Lahore

City

لاہور

Degree Starting Year

2017

Degree End Year

2019

Language

Urdu

Keywords

رسالتؐ , ختم نبوت

Added

2023-02-16 17:15:59

Modified

2023-02-19 12:20:59

ARI ID

1676731804024

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

Introduction

Introduction

The Divine Promise to the human species at the time of its exit from the heavens – Q.02:38- 39 – was held through ages of human history. It started with Adam, continued through Enoch, Noah, Abraham, Isaac, Moses, Jesus and culminated with Muhammad. May Allah’s peace and blessings be upon them.

The foundations of Faith are, prima facie, based on the Absolute Supremacy of One Divine Being. The teachings of all Scriptures came from the same Divine Source with the purpose of providing guidance for a life of righteousness within societies along a Straight and Optimal Path
– Qur’an 06:126, 07:16; and The Torah/Proverbs 4:23-27.

The Qur’an is the grand finale of all Divine Revelations and the Ultimate Truth. Allah, The Exalted and The Almighty, guaranteed to preserve its Sacred Arabic Text in its entirety and original form safe from any satanic change – Q.15:09.

Enriched with themes, history, law, images, symbols, language, recitation and a unique literary style – it is a master piece of a revelation that has been bestowed on humanity as a matchless text signifying the very name it carries – Al Kitab – The Book.

As The Qur’an was being revealed on to the last of the Prophets - Prophet Muhammad, in the Arabic language, he would dictate it to his appointed companions to serve as scribes over the 23- year period of its phased-revelation.

The Qur’an contains the narratives of past nations and the events of future generations to facilitate comprehension of the meaning and value of the Qur’anic Message. It also sets out examples and analogies for people so that they may reflect and take heed - Q.39:27. Its message transcends...

The Prophet Muḥammad (S. A. W) : A Universal Messenger of Peace (An Overview of the Prophet Muḥammad (SAW) ’s Relations With the Non-Muslims

Islām, as the religion of peace and mercy, teaches and preaches peace, justice, tolerance, goodwill and equality among the human beings. Being the trustee of Allāh, man has been prescribed some requirements for the regulation of human conduct. The Prophet Muḥammad (r) is the personification of these teachings and commandments of Allāh. His conduct is “the Perfect Example” and “the Role Model” to be followed by human beings. He has been titled in The Qur’ān as (al-Raḥmah) the mercy for all the worlds. Whatever aspect of the Prophet Muḥammad (r) ’s life is investigated, it is proved to be unbiased and stands as a hallmark for the universal peace, justice, tolerance and equality, not only for the believers, but, for the non-Muslims, even for the worst enemies, as well. The first part of this paper describes the concept of peace in Islām and the role of the Prophet Muḥammad (r) as the messenger of the religion of peace. The second part of the paper focuses on the characteristics of the Prophet Muḥammad (r) as the messenger of peace in every aspect of life. While the third part of the paper is about the study of the historical facts, which discuss the life of the Prophet Muḥammad (r) as a historical figure and there is no doubt in his personality and character.

Secure Authenticated Key Agreement Schemes for Smart Grid Communications in Power Sector

The Internet of Things (IoT) has abundant non-trivial applications and Smart Grid is one of them. The IoT capacitate effortless and adept adoption of Smart Grid. Currently, it is anticipated as the mostprevalentmanifestationoftheIoT.SmartGridisemergingasthenextgenerationpowergrid due to its reliability, flexibility, and efficiency. It is a state-of-the-art distributed power generation and supply infrastructure with significant auxiliary traits of intelligence and two-way communication. The utility can monitor and control power consumption of the consumer for load balancing, in real time. Similarly, the consumer can keep a trail of his power usage to plan it as per his affordability or budget. The Smart Grid also furnishes an adequacy to integrate renewable energy sources. Despite the ample amelioration, Smart Grid faces some critical security challenges such as the denial-of-service, message injection, man-in-the-middle and replay attacks etc. Moreover, provision of an IP-based communication system in this very grid has made it more vulnerable to stern securityattacks. Iftheseattacksarenotproperlyaddressed,anadversarycanmaliciouslycompromise the user/device to degrade the performance of the Smart Grid. Itisstrenuoustoemployclassicaltechniquesinordertopreventabove-mentionedsecurityattacks due to soaring communication and computation overhead. Since the Smart Grid is delay sensitive and traffic intensive environment, it is therefore inevitable to concoct and realize security techniquesinsuchawaysothattheydonotpersuadedelayduetocomplexandcomputationintensive cryptographic operations. Theperplexingarchitectureandassortedsecuritydesideratumisthemajorhindrancetoofferaprevailing solution for Smart Grid security. This research work has undertaken to design and develop lightweight authentication protocols for insuring the Smart Grid. The optimal authentication protocolsforSmartGriddelaycriticalenvironmentnotonlywithstandpotentialsecurityattacksbutit also experiences scanty communication and computation overhead due to primitive cryptographic operations. In this research, we have embellished lightweight authentication protocols for endowing secure andreliableenvironmentattheexpenseofinsignificantcommunicationandcomputationoverhead. These protocols are capable of impeding well-nigh all sorts of trivial and non-trivial attacks. The first authentication protocol is based on a hybrid Diffie-Hellman algorithm. This lightweight protocol exploits typical cryptosystems of Advanced Encryption Standard (AES) and Rivest, Shamir and Adleman (RSA) to engender a session key. Additionally, Hash-based Message Authentication Code (HMAC) is also employed in it to perpetuate data integrity. Moreover, this authentication protocol promises to commence mutual authentication by averting major attacks such as man-inthe-middle and replay attack. The second authentication protocol is an Elliptic Curve Cryptography (ECC)-based solution for retaining Smart Grid security. Since ECC promises to offer analogous security clout with significantly reduced key size as compared to other cryptographic security solutions e.g. Diffie-Hellman (D-H), Digital Signature Algorithm (DSA) and RSA. This proposed protocol realizes mutual authentication with meager resource utilization. It is also verified that the proposed scheme can relentless the security attacks. Keeping in mind the complex and delay sensitive nature of the Smart Grid, a lightweight ECC-based authentication scheme is proposed. This ECC-based protocol not only provides mutual authentication with low computation and communication cost but also withstand absolute familiar security attacks. The third security solution is realized through bilinear pairing. This protocol enables the smart meters to get connected with utility control anonymously to avail the services provided by them. The smart meters realize this objective with the private key in the absence of trusted authority. The trusted authority is involved only during the registration phase. Thereafter, the fourth scheme presented in this research work is actually an enhanced identity-based key establishment protocol. This enhanced scheme is introduced after identifying the weaknesses in the protocol presented by Mohammadali et al. (published in IEEE Trans on Smart Grid, 2018). The formal and informal security analysis is carried out under predefined adversarial threat model to verify the robustness of the proposed authentication protocols against stern attacks. BurrowsAbadi-Needham logic (BAN logic) is utilized to evaluate the integrity of the exchanged information. In the end, the performance of the proposed authentication protocols is compared with recently presented related protocols in the literature. Performance comparisons reveal the computation and communication requirements of the proposed protocols as compared to homologous protocols.