Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

سرمنڈل کا راجہ

سرمنڈل کاراجہ

                سرمنڈل کا راجہ ناطق کی نظموں کا تیسرا مجموعہ ہے۔اس کتاب کو پڑھنے کے بعد قاری کے دل میں جو تاثر رہ جاتا ہے وہ کچھ ایسا ہے کہ جب وہ اپنی ایک نظم کے بعد دوسری نظم لکھتے ہیں تو گویا ایک منزل پالی اور دوسری منزل کی طرف گامزن ہوجاتے ہیں۔ایسا محسوس ہوتا ہے کہ وہ کوئی فتح حاصل کرنا چاہتے ہیں ایک ایسا قلعہ ایک ایسا پہاڑ سر کر لینا چاہتے ہیں جس کی بلندی تک پہنچتے پہنچتے خود ناطق راستے میں آنے والی ہر مشکل کو بھی جیسے خوش دلی سے سراہ رہے ہوں۔ سرمنڈل کا راجہ میں وہ دیسی رنگ ڈھنگ کا اظہار کرتے ہوئے نظر آتے ہیں۔نظمیں پڑھتے ہوئے قاری کو  پنجاب کی مٹی کی سوندھی سوندھی خوشبو بھی محسوس ہوتی ہے۔یقین سے باہر لگتی ہے یہ بات کہ ایک شاعر نے پنجاب کا ایسا رنگ تخلیق کیا ہے۔اس پر زیف شاہ اظہار خیال کرتے ہوئے لکھتے ہیں :

’’ناطق کی نظم کا بیج مٹی میں ضرور ہوتا ہے لیکن نظم اوپر اور اوپر اٹھتے اٹھتے جاودانی آسمانوں کی وسعتوں سے ہم آہنگ ہوکر آفاقی اسطورہ بن جاتی ہے جسے آپ غیر فانی اساطیر کے پہلو میں دیکھ سکتے ہیں۔‘ ‘(6)

                کتاب قاری پر ایک خوشگوار تاثر چھوڑ جاتی ہے۔پنجاب سے محبت اس کی مٹی کی خوشبو کے ساتھ ساتھ قاری خود کو پنجاب میں چلتا پھرتا محسوس کرتا ہے۔وہ کوئی فتح حاصل کرنا چاہتے ہیں۔ اس کتاب کے پڑھنے پر قاری کے دل و دماغ میں یہ بات نقش ہو جاتی ہے۔

ریشم بننا کھیل نہیں

                ناطق کی نظموں کے مجموعہ کو سانجھ پبلی کیشنز لاہور نے 2019ء میں ’’ریشم بننا کھیل نہیں‘‘ کے...

موجودہ نظام تعلیم میں اسلامی اقدار کے سمونے کے مراحل واقدامات

Pakistan came into being on the basis of Islamic Ideology. Therefore, our educational system and policies should be based upon the Islamic ideology. Our national leaders also stressed upon the enforcement of Islamic values in all walks of life of the people of Pakistan. It was theoretically stated in all the educational policies that our national ideology would be the only basis of our educational system. The purpose of this research was to critically analyze the inclusion and effects of Islamic values in our educational system with special reference to our national educational policies. The method used for the research was descriptive and analytical. The review of literature revealed that practically nothing could be done. All steps taken in the educational policies for the inclusion of Islamic values in our educational system confined to papers only. It was also revealed that our national educational system was completely unable to produce honest, loyal, faithful and true Muslims and sincere Pakistanis. Our educational system and educational policies were devoid of Islamic character. The realization of the true sprite of Islamic values in our national educational policies remained a dream. Consequently, our present educational system could not give intended outcomes. In order to achieve the desired objectives, our educational policies and educational system should be in consonance with Islamic values and teachings. Holistic practical measures are required for this purpose. To foster in the hearts and minds of people of Pakistan in general and student in particular, a deep loyalty to Islam and Pakistan, our present educational system urgently requires radical changes on the basis of Quran and Sunnah.

A Signed-Response Based Node Authentication and Data Securing Scheme for Wireless Sensor Networks

During the last decade, authentication of sensor node and secure routing of data been remained an open challenges in Wireless Networks due to their applications in various vulnerable environments. These challenges become more signi cant when Wireless Sensor Networks (WSN) composed of tiny inexpensive nodes are consid- ered. This is due to the fact that the solutions proposed for the similar purposes in conventional wireless networks cannot be exploited for sensor networks because of high complexities and power consumptions involved in their algorithms. This thesis proposes a two-fold solution for the issues of node authentication and secure routing in Wireless Sensor Networks. In therst part of the thesis, a low complexity Sybil attack detection mechanism for Wireless Sensor Networks is pro- posed; while in the second part, a Secure Energy E cient Routing scheme called SEER is presented for the data security. Both of the proposed schemes are based on the Signed Response (SRes) authentication and voice encryption mechanism developed for Global System for Mobile (GSM) communications. The proposed Sybil attack detection scheme use pre-distributed key embedded in the sensor nodes. A modi ed version of A3 algorithm used in node authentication produces a SRes with the help of pre-distributed keys against a random challenge number sent by the sink or Cluster Head (CH). The 32 bit SRes is sent back to the sink or CH by the node to prove its legitimacy. The design of node authentication scheme is made exible so that it can be implemented in both hierarchical and centralized Wireless Sensor Networks. The scheme is analyzed for its performance under var- ious Sybil attacks. The scheme is evaluated for its probability of detecting Sybil nodes when di erent authentication key pool sizes are utilized. After extensive simulations, it is observed that the proposed scheme is able to counter Sybil at- tacks with higher probability as compared to notable existing schemes. Moreover, it has also been observed that the proposed Sybil detection scheme exhibits lesser computational cost and power consumption as compared to the existing schemes for the same Sybil attack detection performance.In the second part of the thesis, a secure mechanism for routing of data in Wire- less Sensor Networks; SEER is proposed. The proposed protocol is based on A5 encryption scheme developed for voice encryption in GSM. After successful au- thentication, a modi ed version of A5 algorithm is used to encrypt data during its routing from source to the sink or relay node. SEER uses GRACE (GRAdient Cost Establishment) routing protocol for transmission. For this purpose, a 64-bit ciphering key is used which is produced through a complicated process of pertur- bation in order to make it harder to be traced. SEER has been tested through simulations in MATLAB R by setting up hostile and vulnerable Wireless Sensor Network scenarios with respect to data integrity. The results obtained are then compared with two notable existing secure routing protocols. It is proved that the proposed mechanism SEER helps achieve the desired performance under dy- namically changing network conditions with various numbers of malicious nodes. Due to its linear complexity, lesser power consumption and more dynamic route updation, the proposed Sybil detection and SEER schemes can be easily extended to cater to the needs of emerging industrial wireless sensor networks, Dust Sen- sor Networks and IoT. Emerged from the conventional Wireless Sensor Networks, all the aforementioned networks have got the same nature of vulnerabilities and threats along with the inherited limitations with respect to their hardware and processing capabilities.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.