Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Chapter 3: An Introduction of Famous Tafasir and Translations Of the 20th Century

Translations of the 20th Century

(1)     Tesīr Al-Qur’ān By Maulānā ‘Abd Al- Raḥmān Kelānī

Author's Introduction

            Maulānā‘Abd al- Raḥmān Kelānī was born on 11th November, 1341A. H/1923A. D at the famous Caligraphic Centre of Ḥaḍrat Kelianwāla, District Gujrānwāla. His respectable father Nūr Ilāhī (d:1362A. H/943A. D) was also a well-known Caligrapher. [1]‘Abd al- Raḥmān Kelānī studied upto Matric (1360A. H/1941A. D). He appeared in a military examination in 1363A. H/1944A. D to serve in the Army and stood first. The Brigadier Examiner lay down a condition that if he shaved off the beard, he would stand selected to join the Brigade but he refused to do so. Like a commoner, he was thus recruited as an ordinary clerk and sent to Rāwalpindī. In 1366A. H/1947A. D, he left the Army to join the institution of Fīrōz Sons and took up his family profession as a Caligrapher. He commenced the writing of the Qur’ān in 1366A. H/1947A. D and by end of 1401A. H/1981A. D, he took down nearly fifty scripts. In 1405A. H/1985A. D, he passed the examination of Wafāq al-Madāris in the 1st division. [2]He authored several books. On 18th December1416A. H/1995A. D, he came from his home to the mosque to say ‘Ish’a prayer in the congregation; bowed down in 1st rak‘at for the 1stSajidah and never got up again to breathe his last.

Tesīr al-Qur’ān

Translation: MaulānāAbd al- Raḥmān Kelānī

Margin (sideline): Ḥāfīẓ ‘Atīq al-Raḥmān Kelānī

Islāmic Press “Dār al-Salām” Wassanpurah, Lāhore

Volume: 686 Pages

Literal or Proverbial Translation

While translating the Qur’ān in its literal meaning and proverbial style, an effort has been made to...

تطوّر العقيدة الإلحادية فى المجتمعات الإسلامية والغير الإسلامية وإنعكاساتها فى الجوانب المختلفة للحياة الإنسانية (دراسة تحليلية من المنظور الإسلامي)

The science of Islamic belief had been considered most valuable discipline among other disciplines of knowledge as it played an important, rather pivotal role in the practical life. Qualitative research technique was used for the collection, analysis, and demonstration of data. The research had addressed the four major dimensions of the topic which particularly include Meanings of Atheism and its essential elements, Development of Atheism in Islamic and Un-Islamic societies and response of Muslim scholars, Reflections of Atheism in various aspects of human life, and Analysis of Atheism in Islamic Perspective. The systematic review of literature disclosed that Atheism in Islamic perspective included the denial of God, Prophet Hood and hereafter or any of these elements. Atheism had equally affected the Muslim and Non-Muslim societies by blowing the materialism into social, economic and political system. In this connection, Muslim scholars were divided into four types in terms of their response to Atheism which was discussed in detail in paper. Moreover, Atheism had also affected the individual as well as collective life. The author had critically analyzed the Atheism in Islamic perspective and presented the conclusion and recommendations at the end.

A Framework for Network Security, Privacy and Adaptability Management Through Mobile Software Agents

This thesis targets network security – an essential area of computer science, which has gained progressively attention of researchers due to concerns and potential damages in various organizations. More specifically, it deals with insider threat that is less focused than the external threat. Software agents have been used as a technology in this research that autonomously roam around network. Software agents are diversified research area that covers artificial intelligence, programming abstraction and distributed computing. During literature surveys of various agent platforms it has been summed up that both agent standards, FIPA and MASIF, have their own advantages and disadvantages but still some missing features were pointed out such as security, distributed events and multicasting that are not well focused at all by any of the available standards. There are two possible ways to focus the problem, i.e. either these two standards may be combined or another standard may be proposed to include all features necessary for a true agent system. While working on the Agent based Security Framework, first a vulnerability assessment model has been developed that presents an agent based solution and demonstrates that both insiders and outsiders exploit the weaknesses of the system. The literature survey and the practical results of the model reveal that the insider threat is more critical than the outsider. During development of vulnerability assessment model many practical issues have been identified and appropriate solution has been proposed. For the assessment, both agent platform-dependent and platform- independent approaches were used to achieve the task. After comparing results of both approaches, it was proposed that a qualitative, standardized and comprehensive management of the agents is only possible with established and recognized agent platforms. Considering privacy as another component of dissertation, the Agent-based Profiling model has been developed. The model considers an individual’s personality profile to identify real personality in the cyberspace; Guard and guide to use internet resources, and analyzing social interactions to create social community. Major indicators involving profile generation and personality identification have been viiiargued and implemented. The framework helps to create virtual social community in the cyberspace where users are guarded and guided to use internet resources according to their actual profiles and the interests. The profiling model has been implemented in two different ways, i.e. JADE and .Net framework. Test results show that .Net framework supports many advanced tools and technologies therefore and agent platform on the top of the .Net framework is proposed to develop agent based models. Hence, the proposed solution to insider threat will be integrated on the top of agent technology to autonomously monitor and predict human behavior. As human behavior is difficult to predict, therefore autonomously monitoring user behavior is the key solution to avoid insider threat. The FIPA-compliant agent framework for profiling, ACENET (Agent Collaborative Environment based on .NET), has been developed to solve the problem. The proposed profiling framework allows identifying anomalies in user activities either online or offline. Online monitoring is carried out in real time that is used to catch the sensitive activity started by user against organization’s policy. Offline monitoring is carried out on daily, weekly and monthly basis and is based on the analysis of specified factors. Both online and offline monitoring use agent based approach to identify anomalies in user activities. Motivation behind the proposed model is that many procedural security measures are being taken by the organizations at lower level. This dissertation focuses on high level security measures through profiling based agent system to detect the activities user is performing in the organization. It is also checked out that if the user-activities are in accordance with organization’s policy or not? The research has been conducted about insider threat and several issues are addressed and solution has been provided. The major developments are: Monitoring behavior either suspicious or normal, Certifying user’s authenticity to use resources, Checking limitations of the users, Monitoring that user comes into view from the assigned location or not, Analyzing the level of the destruction caused by user, etc. The ACENET scores every user of the organization and maintains a detailed profile. It is really a cumbersome process to determine whether a legitimate user is doing any malicious activity. Expectantly such activity would stand out as strange when compared to the user''s routine behavior. ACENET is adaptable to deploy in any ixorganization. Agents have been designed as service on the top layers of the model. The developed agents create and maintain user-profiles and monitor activities autonomously. The threats have been categorized in various classes and for each category agents have been designed. Communication among agents takes place by message passing at upper level whereas internally socket based communication is underway. To resolve conflict between users and organizations, some professional ethical issues pertaining to privacy, have been addressed and appropriate solution has been proposed to implement the framework in accordance with the recognized standards. A matrix or grid of the trust levels ‘trust grid’ is designed similar to ACL where diverse access privileges are assigned to different level of the users. Currently grid has been divided in two categories: Binary [access given, not given] and Gradient [strong, moderate, weak, none]. The professional issues regarding activity monitoring were studied and it has been proposed that organization may announce in advance what can be monitored and what cannot be monitored, by providing a user monitoring policy. In the light of organization’s policy weight-age has been assigned to profile attribute to identify threat contribution of each suspicious activity and user. The Agent-based Security Framework, ACENET, was tested on real data, obtained from the organizations, and the performance has also been evaluated on the basis of specified parameters. Framework’s results were analyzed to match with the targeted objectives. Finally future directions for the extension of the framework have been presented.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.