Search or add a thesis

Advanced Search (Beta)
Home > تحقیقات در اسلامی بینکنگ: شماریاتی جائزہ

تحقیقات در اسلامی بینکنگ: شماریاتی جائزہ

Thesis Info

Author

Saira Bibi

Supervisor

Allah Ditta

Program

BS

Institute

وفاق المدارس الاسلامیہ رضویہ پاکستان

Institute Type

Public

Affiliation

Federal Government College for Women Multan Cantt

City

Multan

Province

Punjab

Country

Pakistan

Thesis Completing Year

2024

Thesis Completion Status

Completed

Language

Urdu

Added

2024-06-19 10:17:01

Modified

2024-06-20 11:04:21

ARI ID

1718863461342

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

چئیر مین بھٹو شہید کے بہادر اور غیرت مند بیٹے

چیئر مین بھٹو شہید کے بہادر اور غیرت مند بیٹے

میرے لیڈرز میر مرتضی بھٹو اور شاہ نواز بھٹو شہید کی ایک نایاب وڈیو ۔کابل میں کافی عرصہ مجھے مرتضی بھٹو اور شاہ نواز بھٹو کے ساتھ وقت گزارنے کا موقع ملا ۔جیسا کہ اس وڈیو میں آپ نے دیکھا دونوں کو اتنا ہی دلیر اور بہادر پا یا ۔دونوںنے جس بہادری سے جنرل ضیاء الحق سے جنگ لڑی وہ اپنی مثال آپ ہے ۔اس لڑائی میں میر مرتضی بھٹو اور شاہنواز بھٹو کا جس طرح کرنل قذافی اور حافظ السد نے ساتھ دیا انہوںنے چیئرمین بھٹو سے اپنی دوستی کا حق ادا کیا ۔

مجھے فخر ہے کہ میں میر مرتضی بھٹو شہید اور شاہ نواز بھٹو شہید کے قافلے کا ایک سپاہی تھا ۔

سکھر جیل کی 48سینٹی گریڈ کی گرمی میں پھٹ چکی جلد ،پھنسیوں سے بھر چکے جسم ،کان کے  شدید انفیکشن میں مبتلا نصرت بھٹو کی پنکی (بے نظیر) جو پیلے گدلے پانی سے پیاس بجھانے کی ناکام کوشش کرتی رہتی ہے اسے ماں اپنی قید سے اس کی قید میں خط بھیجتی ہے

میری بہت ہی پیاری پنکی !

دن میں تین چار مرتبہ اپنے جسم پر پانی ڈالوتا کہ حدت کم محسوس ہو ۔اس کو آزمائو ،میں بھی سر جھکا کر گردن کے پیچھے اور سر کے اوپر پانی کے مگ ڈالتی ہوں ۔پھر پنکھے کے نیچے بستر پر لیٹ جاتی ہوں ۔اس طرح کپڑے خشک ہونے تک بہت ٹھنڈک نصیب ہوتی ہے ۔اس طریقے سے پھنسیوں سے بھی حفاظت رہتی ہے ۔یہ شاندار نسخہ ہے ۔میں اس کی پرزور سفارش کرتی ہوں ۔

پیار کے ساتھ

تمہاری ممی

 

سیکولرازم اور مسلم معاشرے میں اس کا ارتقاء: تحقیقی مطالعہ

The concept of Secularism came to the Muslim world after Renaissance. Historically, the initial thoughts on the subject are found in the teachings of Greek Philosophers like Epicurus and Zeno. It was at first a discussion regarding the separation of religion and the state, the scientific advancements and the regime system in Modern Europe. Religion was considered as an obstacle by the West in their progress on the basis of reason and inquiry. Adaptation of secular approach helped the western countries to flourish in material fields. In Islamic world, secularism was not seen as a threat for religion before the twentieth century. Under colonization of many Muslim countries and particularly after the demise of Ottoman Empire which paved way to abolish Caliphate, the Muslim states adopted various western secular laws. Moreover, the Muslim countries went under heavy debts taken from European countries. They relied on foreign advisors and western education system for progress. The concept regarding the authority of Caliph changed. During the twentieth century, Muslim countries suffered politically and their geographical frontiers were changed. It created a kind of revolution in Muslim states. Revival of religious authority in modern political Muslim states is visible in central eastern countries during the last fifty years.

Optimization of Block Encryption Based Speech Coder Against Transmission Channel Noise

Compression of data has become a worldwide phenomenon during the past few decades for reason of achieving savings in band-width (BW) and hence makes it cost effective. The widespread practice of encryption of data has generated interest for many decades and it mainly aims at protection of data. Combining these two apparently contrary processes (in terms of BW) is quite challenging. Whereas the research on concurrent data compression and data protection (encryption) is still on, the methodology adopted by the author is unique and quite new. The most important aim of data compression technique is the need for curtailing the data storage and communication expenses. The source message (long) is converted to a codeword (small). The key objective of data encryption is to guard the integrity of data if it is intercepted by an eavesdropper. The plaintext is transformed in to ciphertext using an encryption key or keys. Combining the processes of compression and encryption together must be done in this order, that is, compression followed by encryption because all compression techniques heavily rely on the redundancies inherently part of a regular text or speech. The speech compression has been achieved using Lempel-Ziv 78 algorithm and a new algorithm for encryption/decryption, named ―The RandomOne, abbreviated as TR-1‖ is developed during this study and is thoroughly tested. The results obtained are quite encouraging. Firstly, contrary to the use of conventional methods the algorithm developed in this study does not use exclusive-OR (XOR) operation in Permutation (P) and Distribution (D) boxes for producing ciphertext from the plaintext. In this scheme pseudo random number (PRN) is used only to deceive the intruder by adding more confusion (meaning compared to the confusion due to the use of some tested algorithms used in this research). In fact only the sender of information and the intended recipient (not intruders) should be aware of the 44 bit positions filled by the PRN in a 128 word. The intended recipient discards these during deciphering process at the right time (these are disposed of before performing the inverse mapping in the P-Box). Secondly, protection against attacks is further ensured by using two supplementary keys, one for the P-Box, and another for the D-box. In addition the routine key-set of the N selected algorithms further enhances the security. In a small set-up, the distribution of key-set can be mutually agreed upon by the users; but in a large set-up, the distribution of these sets can be accomplished using standard key distribution techniques. Moreover, the proposed algorithm also differs from the other methods currently in use due to deployment of a ―sentinel marker”; which is not adopted by other algorithms and this proposal is purely the brain child of the author. The sentinel marker is part of the secret key which is pre-decided and predetermined by the sender and the intended recipient of the information. Twenty bits (out of a total of 128) are used for the sentinel marker which amounts to 2^20 = 1,048,576 possibilities combined with 2^44 = 17.6 trillion possibilities of the ciphertext produced by the PRN. The job for the cryptanalyst to break this cipher becomes formidable and a fool-proof security of data is ensured.