کیوں کر مجھ کو درد دیا ہے
آخر میرا قصور بھی کیا ہے
جانے اُس کے دل میں کیا ہے
وہ بالکل خاموش کھڑا ہے
تیری یادیں ، تیری باتیں
اور اس دل میں کیا رکھا ہے
سب دعوے میرے جھوٹے ہیں
تیرا پیار بھی سب جھوٹا ہے
چاروں سمت اندھیارے رکھ کر
وہ سورج کیا سوچ رہا ہے
اپنے دل کی ہر دھڑکن میں
تجھ کو مَیں نے یاد کیا ہے
اُس بھولی بھالی صورت نے
میرا دل تو لوٹ لیا ہے
اشکوں کی برسات میں اکثر
دل کا کمرا گر پڑتا ہے
ناصر کی ’’پہلی بارش‘‘ میں
صادق پورا بھیگ چکا ہے
Abu Al-Rab ‘ Sulaymn Bin Msá Al-Kal‘ (565 A. H -- 634 A. H) is a great Srah writer. In this article, his scholarly and personal characteristics, the list of his works, tributes from scholars to his services and scholarly rank of Al-Kal‘ are presented. After presenting his personal features, an introduction and research analysis of his book “AlIktif’ fi Maghz Al-Mutafá wa Al-thalthah Al-Khulaf ’ ” is given. Al-Kal‘ was a great scholar and authentic Srah writer. He got knowledge of Hadth from Abul ‘At’. He attended the lectures of various scholars of Hadth such as Abul Qsim bin Al-Jaysh, Abu Bakr bin Jadd, Abu Abdullh bin Zarkn, Abdullh bin Fakhkhr, Abu Muhammad bin Jamhr, Najbah bin Yahy. Many great scholars of Hadth such as Q Tnas were his pupils and brought his knowledge to far off countries. Al-Kal‘ wrote many books on Hadth and Srah. Ibn Farhn, Abul Abbs and many other scholars have praised and paid tribute to Al-Kal‘ in their works. Main objective of the book under discussion, Al-Iktif’, is to disseminate knowledge of Srah and Hadth prolifically. Al-Kal‘ has kept in mind the caution and the principles of Srah writing derived from the Holy Qur’n. Sulaymn Bin Msá has a great quality of writing Srah books. He can be called a born scholar and a writer. His quest for knowledge took him in different cities and he gained the best of knowledge and intellect that can be seen in all of his writings. He can be called a preserver and a protector of Srah literature. He is considered the most honored and dignified person among the scientific and cultural tradition of Andalusiyah. This article proves his abilities, qualities and excellence of work.
Knowledge Networks are gaining momentum within cyber world. Knowledge leads to innovation and for this reason organizations focus on research and information gathering in order to gain and improve existing knowledge. In this age of information, which is primarily based on internet and world wide web technologies, enable significantly expanded networks of people to communicate and collaborate „virtually‟ across teams of the entire organization, across organizations and the world, anytime and anyplace. Therefore, wonderful innovations in computing and telecommunications have transformed the corporations from structured and manageable type to interwoven network of blurred boundaries such as; ad hoc networks and mobile wireless networks, semantic web technology etc. This study explores the means of knowledge networks in Information Technology and security leaks that are found and measures that are taken to counter this menace are coming up with optimal Secure Clustered Power Centric node network. The study estimates these measures, evaluating and integrating them to come up with a secured network design. This study seeks to establish these threats and attacks and counter security measures in Wireless Sensor Networks, Mobile Ad-hoc Networks and Semantic Web technology and propose architecture for the purpose of establishing secure routing in knowledge networks called Optimized Network Security Solution for Knowledge Networks – ONSS-KN. Design and development of power-aware, scalable and performance efficient routing protocols for Knowledge Networks (KNs) is an active area of research. In this dissertation, we show that insect colonies based intelligence – commonly referred to as Swarm Intelligence (SI) – provides an ideal metaphor for developing routing protocols for KNs because they consist of minimalists, autonomous individuals that through local interactions self-organize to produce system-level behaviors that show lifelong adaptability to changes and perturbations in an external environment. In this context, we propose a clustering and secure data routing protocol for KNs (iRoutCluster) – inspired by the foraging principles of honey bees. Qaisar Javaid (1094-212001) Page vi To conclude this study, we perform simulation studies to analyze and compare the performance of the final iRoutCluster design with existing protocols. The simulation results demonstrate that iRoutCluster outperforms its competitors in all assumed scenarios and metrics. We then implement the iRoutCluster protocol in MATLAB® simulator to further investigate its performance in mobile networks and large-scale static sensor networks. The results clearly show that iRoutCluster not only performs well in large-scale networks, but is equally good in MANETs as well. Therefore, iRoutCluster is a viable protocol for hybrid ad hoc networks.