Search or add a thesis

Advanced Search (Beta)
Home > حضرت مولانا احمد علی کی زندگی اور آپ کی دینی اور علمی خدمات

حضرت مولانا احمد علی کی زندگی اور آپ کی دینی اور علمی خدمات

Thesis Info

Author

لال دین اخگر

Supervisor

علاوٴ الدین صدیقی

Program

PhD

Institute

University of the Punjab

City

لاہور

Degree Starting Year

1976

Language

Urdu

Keywords

شخصیات

Added

2023-02-16 17:15:59

Modified

2023-02-17 21:08:06

ARI ID

1676731839446

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

علی اکبر ناطق۔۔۔ سوانح و تخلیقات

علی اکبر ناطق۔۔۔سوانح و تخلیقات

                علی اکبر ناطق پاکستانی ناول نگار ،افسانہ نگار، شاعر اور نقاد ہیں۔عصری اردو ادب میں ’علی اکبر ناطق‘‘ ان شخصیات میں نمایاں مقام رکھتے ہیں جو پچھلی دہائی میں اردو ادب کے افق پر ابھر کر سامنے آئی ہیں۔ادب کی بہت ساری جہتوں میں مصنف  مذکور نے اپنی قسمت آزمائی ہے اور وہ اس میں کامیاب دکھائی دیتے ہیں۔شاعری ،ناول نگاری،افسانہ نگاری اور تنقید مصنف کے اہم میدان ہیں شاعری میں ان کی پانچ کتابیں ہیں’’سبز بستیوں کے غزال ‘‘غزلیات کا مجموعہ جبکہ’’ بے یقین بستیوں میں‘‘،’’یاقوت کے ورق ‘‘،’’سر منڈل کا راجہ ‘‘،’’ریشم بننا کھیل نہیں‘‘ ان منظومات کے مجموعے ہیں۔حال ہی میں انہوں نے اپنے ادبی سفر میں ایک اور کتاب کا اضافہ کیا ہے جس کا نام’’سفیر لیلی‘‘ہے ،اس میں نظمیں اور غزلیں دونو ں شامل ہیں’’ریشم بننا کھیل نہیں‘‘ کتاب میں مصنف مذکور نے اپنی تینوں کتابوں (نظموں) کے مجموعے کو ایک ہی جلد میں شائع کروایا ہے جو سانجھ پبلی کیشنز سے 2019 ء میں شائع ہوئی۔تینوں مجموعوں کے دیباچے بھی اس کتاب  میں ایک ساتھ شائع کیے گئے ہیں اس کے علاوہ دو افسانوی مجموعے اور ناول نگاری میں ناطق کے ناول’’نولکھی کوٹھی ‘‘اور ’’کماری والا‘‘ ادبی دنیا میں اپنا مقامپیدا کر چکے ہیں۔محمد حسین آزاد کا مرقع لکھنے کے ساتھ ساتھ تنقید پر بھی ایک کتاب ’’ہئیت شعر ‘‘شائع ہو چکی ہے ۔مصنف کی کچھ کتابیں ابھی غیر مطبوعہ ہیں۔ہر وہ مصنف جو ادب کی مختلف اصناف پر کام کر چکا ہو اور صفِ اول کا ادیب جانا جائے تو اس کی ادبی جہات کا مطالعہ اپنی جگہ نہایت اہمیت کا حامل ہے۔

سیرت النبی ﷺ میں احتسابی عمل کی مثالیں: وفاقی محتسب پاکستان کے فرائض کا اختصاصی مطالعہ

In any society, the administration has the status of a pillar, and its good or bad move directly impacts society. There are institutions to compensate public complaints on government initiatives in many countries of the world that keep check on government administrations. For this purpose "Federal Ombudsman" was established in Pakistan. The main responsibilities of this institution include the execution to enjoin the right and forbid the wrong (Amr bil Ma’rūf wal Nahi ‘An al Munkar), monitoring government employees in administrative matters, hearing the complaints of the public against organizations and preventing them from violating individual rights. In this article, it has been reviewed that how we can seek guidance from the Sīrah of the Prophet (P.B.U.H) is in this matter, to evaluate the present system of "Federal Ombudsman". In addition, the main responsibilities of the "Federal Ombudsman" were discussed in the article. In conclusion recommendations have been made for further improvement.

Efficient and Anonymous Multi-Server Authentication and Key Agreement Protocol Framework

On our way to switching from single-server to multi-server authentication, one of the great challenges is to design a secure and computationally efficient multi-server authentication protocol. Multi-server Authentication (MSA) relieves the user of separate and individualized registration procedures from various service providers in a network. Following MSA paradigm, a user gets registered from a trusted authority first, and then the former may benefit itself from any service being offered by any service provider without registering again, engendering overhead efficiency. Another objective for switching towards multi-server architecture was to relieve the user of maintaining multiple passwords as much as the number of servers. A robust MSA architecture makes the access of sever-oriented network services not only convenient but also readily available for users. The remote internet authentication often entails the type of multiserver authentications, which further underscores the need of MSA protocol’s efficiency and robustness against threats. The service providers in an MSA-based network authenticate and verify the users on the basis of credentials provided by Registration Centre (RC) to the users during registration phase. In traditional MSA protocols, service providers consult online RC for verifying the user’s authenticity after receiving a login request. Besides, we witness MSA protocols where RC is bypassed during mutual authentication between user and service provider. The latter class of schemes takes less communicational cost and eliminates few bottlenecks, perceptibly, due to bypassing trusted RC from mutual authentication phase. The research academia came up with many authentication protocols lately, to enhance security and minimizing communicational overhead. However, the presented solutions are costly due to employing expensive bilinear operations, on the first hand. Besides, there are light-weight MSA protocols as well, nevertheless bearing many other drawbacks making those protocols unfit for practical implementations. We address these problems by presenting a novel multi-server authentication protocol framework that is not only efficient but also free of the hassle of key management and distribution problems. The protocol framework comprises a blend of the usage of selected crypto-primitives, messages and participating entities in such a way that leads to overall efficiency and achieves the security objectives as well. In this dissertation, we present state-ofthe-art review on MSA-based protocols and then propose corresponding protocols to address the above limitations. Our proposed work not only contributes a light-weight multi-server authentication protocol framework that could establish mutual authentication without RC engagement, but also improves upon many MSA schemes (Trusted and Non-trusted environment) to enhance security and reduce communication or computational delay for establishment of an authenticated session key between user and server. To prove the security claims, the formal security analysis is performed for each protocol and the results are also validated and verified using automated simulation tools.