Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

معین الدین حارث

معین الدین حارث
( سید شہاب الدین دسنوی)
۳۱؍ جولائی ۱۹۸۳؁ء کو ممبئی میں معین الدین حارث کا انتقال ہوگیا۔ ان کا ماتم سیاسی، تعلیمی اور سماجی حلقوں میں منایا گیا۔ دلی میں جامعہ ملیہ اسلامیہ کی درسگاہیں بند ہوگئیں۔ شریف آف ممبئی نے شہریوں کی جانب سے تعزیتی جلسہ طلب کیا۔ سابق وزیر اعظم مرارجی ڈیسائی، اشوک مہتا، ایس۔پی۔گودریج، پروفیسر مدھو ڈنڈوتے، میر آف ممبئی اور دوسرے مقررین نے خارج عقیدت پیش کیا۔ ممبئی میونسپل کارپوریشن اورکئی دوسرے اداروں نے تعزیتی قرارداد منظور کر کے اپنے اجلاس ملتوی کردیئے۔ جہاں تک انجمن اسلام کا تعلق ہے (جس کے حارث صاحب کئی سال سے صدر ہوتے چلے آرہے تھے) اس پر تو گویا یتیمی چھاگئی۔ یہ سب کچھ ایک ایسے آدمی کے لیے ہوا۔ جس نے زندگی بھر دوسروں کو دیا۔ خود کچھ نہیں لیا۔
معین الدین حارث ممبئی کے مضافاتی علاقہ نالا سُپارہ کے رہنے والے تھے، جہاں کوکنی مسلمانوں کی اچھی خاصی آبادی ہے۔ پچپن سے سیاسی تحریک سے دلچسپی رہی سرکاری اسکول کی تعلیم ترک کرکے قوم کی طرف سے کھولے گئے اسکول میں داخل ہوئے اور جب جامعہ ملیہ اسلامیہ قائم ہوئی تو وہاں چلے گئے اور ۱۹۲۷؁ء میں بی، اے کیا۔ خوش قسمتی سے انھیں مولانا محمد علی جوہر، ڈاکٹر ذاکر حسین، پروفیسر محمد مجیب، ڈاکٹر سید عابد حسین، مولانا، اسلم جبراجپوری، مولانا سواتی، خواجہ عبدالحئی فاروقی اور کیلاٹ صاحب جیسے مخلص، بلند کردار اور علم و فضل کے درخشندہ ستارے استاد ملے، جن کی تعلیم اور اعلیٰ اخلاق کا رنگ ان پر ایسا چڑھا کہ تادم حیات قائم رہا۔
بی۔ اے کرلینے کے بعد حارث صاحب نے ممبئی میں اجمل پریس قائم کیا اور روزنامہ اجمل جاری کیا جو سالہا سال ان کی ادارت میں چلتا رہا۔
ممبئی میں میونسپل کارپوریشن لیجسلیٹو کونسل، مرکزی حج کمیٹی ، ممبئی یونیورسٹی کی سینٹ...

Frequency of Cardiovascular Complications in Coronavirus-19 infected Patients during the second wave in a tertiary care Hospital of Lahore, Pakistan Cardiovascular Complications in COVID-19 patients

Coronavirus 2019 (COVID-19) affects the cardiorespiratory systems by causing inflammation of the circulatory systems, hence, causing more cardiac complications in COVID-19 patients Objective: To observe the frequency of cardiac complications in COVID-19 patients during the second wave Methods: 235 COVID-19 patients presenting with cardiac complication to the Cardiology Department of Mayo Hospital, Lahore during 6 month periods of second wave of COVID-19 were included. Data regarding the medical history, age, gender was taken and the observed cardiac complication were noted Results: There were 76.6% male patients and 23.4% female patients. 56.2 % patients were already hypertensive, 37.9% were diabetic, 18.3% had familial history of cardiac diseases. The cardiovascular manifestations observed were, myocardial infarction (57.82%), 7.3% had angina, 21.3% had acute coronary syndrome and 12.3% had non ST elevation myocardial infarction. Conclusions: Our study suggests that there is a prevalence of cardiovascular diseases in COVID-patients which is a major concern as they are at increased risk for severe infection.

O Ptimization of B Lock E Ncryption B Ased S Peech C Oder a Gainst T Ransmission C Hannel N Oise

Compression of data has become a worldwide phenomenon during the past few decades for rea- son of achieving savings in band-width (BW) and hence makes it cost effective. The widespread practice of encryption of data has generated interest for many decades and it mainly aims at pro- tection of data. Combining these two apparently contrary processes (in terms of BW) is quite challenging. Whereas the research on concurrent data compression and data protection (encryp- tion) is still on, the methodology adopted by the author is unique and quite new. The most impor- tant aim of data compression technique is the need for curtailing the data storage and communi- cation expenses. The source message (long) is converted to a codeword (small). The key objec- tive of data encryption is to guard the integrity of data if it is intercepted by an eavesdropper. The plaintext is transformed in to ciphertext using an encryption key or keys. Combining the processes of compression and encryption together must be done in this order, that is, compres- sion followed by encryption because all compression techniques heavily rely on the redundancies inherently part of a regular text or speech. The speech compression has been achieved using Lempel-Ziv 78 algorithm and a new algorithm for encryption/decryption, named ―The Random- One, abbreviated as TR-1‖ is developed during this study and is thoroughly tested. The results obtained are quite encouraging. Firstly, contrary to the use of conventional methods the algo- rithm developed in this study does not use exclusive-OR (XOR) operation in Permutation (P) and Distribution (D) boxes for producing ciphertext from the plaintext. In this scheme pseudo ran- dom number (PRN) is used only to deceive the intruder by adding more confusion (meaning compared to the confusion due to the use of some tested algorithms used in this research). In fact only the sender of information and the intended recipient (not intruders) should be aware of the 44 bit positions filled by the PRN in a 128 word. The intended recipient discards these during deciphering process at the right time (these are disposed of before performing the inverse map- ping in the P-Box). Secondly, protection against attacks is further ensured by using two supple- mentary keys, one for the P-Box, and another for the D-box. In addition the routine key-set of the N selected algorithms further enhances the security. In a small set-up, the distribution of key-set can be mutually agreed upon by the users; but in a large set-up, the distribution of these sets can be accomplished using standard key distribution techniques. Moreover, the proposed algorithm- - also differs from the other methods currently in use due to deployment of a ―sentinel marker”; which is not adopted by other algorithms and this proposal is purely the brain child of the author. The sentinel marker is part of the secret key which is pre-decided and predetermined by the sender and the intended recipient of the information. Twenty bits (out of a total of 128) are used for the sentinel marker which amounts to 2^20 = 1,048,576 possibilities combined with 2^44 = 17.6 trillion possibilities of the ciphertext produced by the PRN. The job for the cryptanalyst to break this cipher becomes formidable and a fool-proof security of data is ensured.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.