Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

پروفیسر سید حسن

پروفیسر سید حسن مرحوم
افسوس کہ ۱۸؍ نومبر ۸۸؁ء کی صبح ۳۰:۸ بجے اردو اور فارسی کے نامور معلم محقق جناب پروفیسر سید حسن کا پٹنہ میڈیکل کالج میں انتقال ہوگیا، اناﷲ وانا الیہ راجعون۔ چند دنوں پہلے ان پر فالج کا حملہ ہوا تھا، انتقال کے وقت ان کی عمر تقریباً ۷۸ برس کی تھی۔
وہ ۱۹۱۱؁ء میں اپنے نانہالی گاؤں شیخ پورہ ضلع مونگیر میں پیدا ہوئے، اسی ضلع کا الہرہ گاؤں ان کا آبائی وطن تھا، یہاں کے سادات کا تعلق حضرت سید احمد جاجنیریؒ سے ہے، پروفیسر سید حسن کا خاندان بھی جاجنیری تھا، والدہ کا سلسلہ نسب حضرت مخدوم شیخ شعیبؒ برادر عم زاد حضرت شیخ شرف الدینؒ احمد یحییٰ منیری سے ملتا ہے، جب وہ ۷؍۸ سال کے تھے تو ان کے والد کا انتقال ہوگیا، لیکن ماں کی شفقت و تربیت نے یتیمی اور محرومی کا احساس نہ ہونے دیا اور نامساعد حالات کے باوجود وہ تعلیمی مراحل طے کرتے رہے اور مڈل، میڑک، انٹر اور پھر گریجویشن کے سارے امتحانات میں اول آئے، ۳۵؁ء میں اردو میں ۳۷؁ء میں فارسی میں ایم اے کیا، ۳۶؁ء میں انھوں نے ایجوکیشن میں ڈپلوما بھی لیا، بعد میں ۱۹۰۶؁ء میں انھوں نے دانش گاہ تہران ایران سے فارسی جدید، زبان پہلوی اور فارسی قدیم میں ڈپلوما حاصل کیا، طہران میں ڈاکٹر نذیر احمد اور پروفیسر سید امیر حسن عابدی وغیرہ بھی ان کے ساتھ تھے۔تعلیم ختم ہونے کے بعد ان کے مشغلہ تدریس کا آغاز ہوا، ۳۷؁ء میں بہار نیشنل کالج میں وہ فارسی اردو کے لکچرر مقرر ہوئے، ۷ سال کے بعد ۴۴؁ء میں پٹنہ کالج میں لکچرر مقرر ہوئے اور اسی کالج میں وہ ۵۰؁ء میں اسسٹنٹ پروفیسر اورچھ سال کے بعد ترقی کرکے ۶۱؁ء تک پروفیسر رہے، اسی عرصہ میں حکومت بہار نے عربی و فارسی میں مطالعہ و...

مسئلہ حجاب: فرانسیسی مسلمان خواتین اور اسلامی تعلیمات

Human history is replete with preposterous and unjustifiable incidents of unearned sufferings against the women. Sometimes they were maltreated and molested harshly and sometimes they were abused, persecuted bestially. Contrary to these incidents occasionally they were considered superior and super angelic but on the contrary Islam has bestowed a dignified status to them regarding their rights and responsibilities. In this regard a comprehensive manifestation has been introduced by the Islam and until this manifestation was being followed by the Muslims no single complain was lodged by any woman against the violation of her basic in the Islamic societies till the climax of Islamic regime. But today some European countries are holding discussions to impose illegal sanctions against the veil of women and girls. The parliament of France has approved a discriminatory law against veil of the Muslim women or girls. It is amazing that Christian nun is at her liberty to cover her head with scarf or not but if Muslim women consider themselves safe in veil they are contemptuously scorned with derision and disdained. In this article views of France and Islamic teachings have been brought under discussion.

Rate Optimization and Resource Allocation in Cooperative Cognitive Radio Networks

Rate Optimization and Resource Allocation in Cooperative Cognitive Radio Networks The phenomenal rise in the number of connected devices and the demand for service quality and channel capacity in wireless networks is severely limited by the scarcity of available resources such as energy and bandwidth. New communications and networking paradigms such as cooperative communication and cognitive radio networks have emerged in recent years which can intelligently and efficiently utilize these resources. Cognitive radio enables the cognitive nodes or Secondary Users (SUs) to sense any opportunity for transmission without degrading the Primary Users (PUs) transmission. This helps in efficient utilization of the available radio spectrum. Cooperation among PUs and SUs can greatly enhance the performance of the cognitive radio network. In this thesis, we have considered various spectrum access strategies in Cooperative Cognitive Radio Networks (CCRNs) using distributed matching algorithms in order to optimize the PU and/or SU sum-rate. SUs cooperatively relay PUs messages based on Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative techniques, in exchange for accessing some of the spectrum for their secondary communications. From the literatures, we found that the Conventional Distributed Algorithm (CDA) and Pragmatic Distributed Algorithm (PDA) aim to maximize the PU sum-rate resulting in a lower sum-rate for the SU. In this contribution, we have investigated a suit of distributed matching algorithms. More specifically, we investigated SU-based CDA (CDA-SU) and SU-based PDA (PDA-SU) that maximize the SU sum-rate. We have also proposed the All User-based PDA (PDA-ALL), for maximizing the sum-rates of both PU and SU groups. All schemes are investigated under the idealistic scenario involving perfect coding and perfect modulation, as well as under practical scenario involving actual coding and actual modulation. Explicitly, our practical scenario considers the adaptive coded modulation based DF schemes for transmission flexibility and efficiency. More specifically, we have considered the Self-Concatenated Convolutional Code (SECCC), which exhibits low complexity, since it invokes only a single encoder and a single decoder. Furthermore, puncturing has been employed for enhancing the bandwidth efficiency of SECCC. As another enhancement, physical layer security has been applied to our system by introducing a unique Advanced Encryption Standard (AES) based puncturing to our SECCC scheme. Furthermore, we present a secrecy sum-rate maximization based matching algorithm between PUs and SU cooperative jammers in the presence of an eavesdropper. We present the achievable secrecy regions by employing friendly jammers which transmit noise to impair the eavesdropper’s ability to decode the message. The cooperative jammers are allocated a fraction of the bandwidth in compensation for their help to transmit jamming signals towards the eavesdropper, which in our case is an untrusted relay node. We provide results for the secrecy rate regions, where we consider only relaying link between the source and the destination. We also provide results for the secrecy rate regions when we consider a direct link between the source and destination in addition to the relaying link. The Conventional Distributed Algorithm (CDA) and the Pragmatic Distributed Algorithm (PDA), which were originally designed for maximizing the user’s sum rate, are modified and adapted for maximizing the secrecy sum-rate for the primary user. In the end we considered a scenario such that a single PU can acquire help from multiple SUs. More explicitly, we consider an untrusted relay scenario, where the relay is a potential eavesdropper. The transmission of the proposed scheme is divided into three time slots, i.e., broadcast and jamming phase, relaying phase and the jammer’s secondary transmission phase or utility phase. We employ multiple jammers where we first fix the position of two jammers and study the behavior of introducing another moving jammer to maximize the secrecy further. We consider a leader-follower game theoretic model where the primary user (source) is the leader and the secondary users (jammers) are the followers. To facilitate the behavior of cooperative jammers, a Nash equilibrium based power control mechanism is employed. We consider two scenarios for our power control mechanism, where in the first case the jammers simultaneously transmit their information (non-orthogonal) during the jammer’s utility phase, while in the second case the jammer’s utility time slot is divided equally among the participating jammers (orthogonal) to mitigate interference caused by the participating jammers.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.