Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

پروفیسر رشید احمد صدیقی

پروفیسر رشید احمد صدیقی
افسوس ہے ابھی مولانا عبدالماجد دریابادی کے اشک ماتم خشک بھی نہیں ہوئے تھے کہ اردو ادب وانشا کے میدان کاایک اورشہسوار گرا یعنی پروفیسر رشید احمد صاحب صدیقی نے کم وبیش پچاسی برس کی عمر میں علی گڑھ میں وفات پائی اور وہیں سپردخاک ہوئے۔ مرحوم کا اصل وطن جونپور تھا لیکن طالب علمی کے زمانہ میں علی گڑھ آئے تو بس یہیں کے ہوکر رہ گئے، یہیں انھوں نے تعلیم حاصل کی۔ اُس زمانہ میں اردو میں ایم۔اے نہیں ہوتاتھا اس لیے فارسی میں ایم۔اے کیا، پھر یہیں اردوکے لیکچرر ہوئے اورایک عرصہ کے بعدریڈر بنے۔ڈاکٹر ذاکر حسین صاحب جن کومرحوم ہمیشہ مرشد کہتے اورلکھتے تھے اُن کی وائس چانسلری کے زمانہ میں پروفیسر ہوگئے لیکن اس عہدہ پرفائز ہوئے ابھی دو ہی برس ہوئے تھے کہ ملازمت سے سبکدوش کردیے گئے۔ یونیورسٹی کے قانون کے مطابق وہ ابھی توسیع کے مستحق تھے لیکن اس زمانہ میں یونیورسٹی میں جو سیاست چل رہی تھی وہ مانع ہوئی اور شیخ عبدالرشید(شعبۂ تاریخ)وغیرہ کے ساتھ یہ بھی ریٹائرڈ کرد یے گئے۔ مرحوم نہایت خوددار اورحساس تھے اس لیے انھوں نے شکوہ شکایت کسی سے نہیں کیا لیکن انھیں اس کااحساس عمر بھررہا چنانچہ وہ علی گڑھ میں ہی اپنے ذاتی طویل و عریض مکان میں ایسے گوشہ نشین ہوکربیٹھ گئے کہ نہ کبھی اردو ڈپارٹمنٹ میں قدم رکھا اورنہ یونیورسٹی کی کسی تقریب،کسی پارٹی اورفنکشن میں کہیں نظر آئے۔
مرحوم نے اگرچہ کوئی مستقل کتاب کبھی نہیں لکھی اورنہ کوئی علمی اورتحقیقی کام کیا لیکن وہ اردو زبان کے عظیم نکتہ دان اورادیب تھے، اس لیے مضامین کثرت سے لکھے جن کے دومجموعے ’ ’طنزیات ومضحکات‘‘ اور ’’مضامین رشید‘‘ کے نام سے طبع ہوکر ارباب ذوق میں مقبول اورمشہور ہوئے۔ علاوہ ازیں بعض خطبات بھی چھپے ہیں۔ ان کااردو، فارسی اور انگریزی ادب...

Contact Tracing: A Forgotten Tool?

Contact tracing is done to interrupt the spread or transmission of the causative agent to others who are in close contact with the index case and are vulnerable by not being immune. Public health experts have relied on contact tracing to reduce the spread of infections throughout history. Now the same method is being used for COVID 19. The healthcare systems in developing countries are ill-equipped to respond to pandemics of this kind. Our healthcare facility effectively employed the traditional contact tracing tool that formed the basis of a strong support system for all those employees who contracted Corona virus infection.

An Efficient, Reliable and Secure Core-Assisted Multicast Routing Protocol for Mobile Ad-Hoc Network

Mobile Ad hoc Network (MANET) is a collection of mobile nodes that are connected wirelessly forming random topology through decentralised administration. In MANETs, multicasting is an important mechanism which can increase the network efficiency and reliability by sending multiple copies to a group of nodes in a single transmission without using several unicast transmissions. Multicast routing can be classified into tree based and mesh based multicasting. Mesh based protocols offer path redundancy for packets to move from senders to receivers. Thus, they offer greater resilience to link breakages than tree based protocols which offer only a single path from senders to receivers. Mesh based protocols have higher packet delivery ratios on the cost of higher overhead due to maintaining redundant paths. Receiver initiated mesh based multicast routing is the improved version having reliability and reduced overhead because the receivers only report the missing packets to the sender as compared to the sender initiated approach where each successful packet is reported to the sender. Receiver initiated mesh based multicast routing strongly relies on proper selection of a core node. The existing schemes suffer from various problems. First, the core selection process is not sophisticated that usually selects core in a manner that may decrease core lifetime and deteriorate network performance in the form of frequent core failures. Second, the existing schemes cause too much delay for core re-selection(s) process. The performance becomes worse in situations where frequent core failures occur and hence, the protocols may become unsuitable for delay sensitive applications. Finally, a malicious node may try to illegitimately become selected as core node (for some malicious purposes) or selfishly evade the core election process to save its resources. To solve the above issues, we propose an efficient, reliable and secure core assisted multicast Adhoc routing protocol (ERASCA) in which an efficient/stable core is selected based on parameters like battery capacity and location in a group. The selection of a stable core within the group minimizes the core failure scenario, thereby minimizes the flooding for finding another core and will decrease the overhead. To minimize delay and data collection process during core election after failures, we introduce the concept of mirror core in a group; hence, after the failure of the core the mirror core will take the responsibility as the main core without data collection process and delay and hence increases the overall reliability. To prevent the malicious/selfish nodes from illegitimately become core or evade the process of being a core node for saving resources, a iv malicious/selfish receiver is detected and discarded within the mesh by estimating their battery capacity. To collect the data for the estimation of battery capacity, we propose an overhearing based approach. To further protect the data from malicious/selfish receiver and to preserve the integrity of data, a packet authentication process is used. The proposed protocol is evaluated in NS-2 and compared against PUMA and MAODV which are the state of the art protocols in mesh based and tree based multicasting respectively. We compare these protocols under different metrics, such as mobility, number of senders, number of receivers, interface queue length and simulation area. According to the simulation results, ERASCA and ERASCA-MC attains higher packet delivery ratios and throughput than PUMA and MAODV, while incurring far less overhead, delay and energy consumption because of the efficient core election and with the introduction of the mirror core. To secure the core election process from malicious and selfish receivers, multiple simulations in NS-2 are performed in the presence and absence of detection technique. Simulation proves that in the presence of detection technique, core election will be more secured with improved performance in PDF, overhead, throughput and energy utilization.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.