Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

77. Al-Mursalat/(Winds) Sent Forth

77. Al-Mursalat/(Winds) Sent Forth

I/We begin by the Blessed Name of Allah

The Immensely Merciful to all, The Infinitely Compassionate to everyone.

77:01
a. By those which are sent in swift succession,

77:02
a. and then forcing on with force as tempests,

77:03
a. and spreading clouds far and wide,

77:04
a. thus separating that separates,

77:05
a. and those bringing the reminder to hearts,

77:06
a. to serve either as an excuse for forgiveness from HIM or as a means of warning of HIS punishment,

77:07
a. that what is being promised is surely going to happen -

77:08
a. - when the stars’ light will extinguish,

77:09
a. and when the celestial realm will split apart,

77:10
a. and when the mountains will be crushed to pieces and blown away as dust,

77:11
a. and when the time to bring the Messengers together will arrive,

77:12
a. for what Time are these things promised -

77:13
a. for the Time of Division?
b. The Time of Judgment.

77:14
a. And what may enable you to perceive the Time of Division?

77:15
a. It will be too bad a Time for those who keep denying and belying the coming of this Time.

77:16
a. Have WE not destroyed the earlier generations for their persistent denial and disbelief of this Time?
b. Indeed, WE did!

77:17
a. Then WE made others who disbelieved to follow them in destruction.
b. WE...

Concept of Islamic Leadership in Syed Muhammad Naquib Al-Attas’s Philosophy

Islamic leadership is defined as a divine trust (amanah) from Allah, based on the Tauhidic paradigm of oneness of Allah that is focusing to serve HIM as HIS servant, while at the same time be the servant of Allah, perform the role of Khalefah (vicegerent) of Allah fully adheres to the Sunnah central to Islamic personality, characteristics and aklaq (Islamic moral and ethical) that was exemplified by the prophet (s.a.w), leading followers to the organization goals and to the straight path of the success in the Hereafter. It is based on this adopted definition that the paper tries to look into the notion from perspective of a Malaysian Muslim Philosopher to the core, Syed Muhammad Naquib Al-Attas, who believes in delivering amanah given to him, and at the same time perform the role of vicegerent of Allah. He suggests that lack of good leaders or rise of unqualified and false ones is one of the major problems of Ummah. Content analysis approach is engaged on both primary and secondary data collected. That is to say, it is a qualitative research in nature. The finding shows that the basis of Al-Attas’s concept of leadership is entrenched in Al-Qur’an and the tradition of the prophet in addition to his deep understanding on the Islamic Sciences such as Islamic theology, philosophy, and metaphysis and so on.

Application of Chaos, Residue Number System and Fuzzy Logic in Digital Watermarking for Information Security Enhancement

Digital watermarking for authentication and copyright protection is one of the interesting areas of research in information security. This technique is no more limited to the images but also applied to the audio, video, softwares and databases. However, the limitation of digital watermarking is that it introduces small distortions in the original cover contents, thus causing slight degradation. These distortions are undesirable in some sensitive applications data like medical, military and law-enforcement etc, where imperceptibility is also desired. However, there are certain applications in which this requirement is just opposite. For example, in medical images, the original image contents must be hidden from the naked eye to ensure the privacy. The problem is formulated into two parts. Firstly, to enhance the security of medical images by hiding the contents of image along with the recovery and fragility. Secondly, to optimize the three conflicting parameters of digital watermarking namely, capacity, imperceptibility and robustness so that we could find an appropriate way to embed the watermark information in the image while satisfying the said parameters.In the first part, our main thrust is that image contents should not be visible to the naked eye. Moreover, the watermarked image should be recoverable along with the watermark on the receiving end. Lastly any tampering in the image should be detectable. In this regard, we have proposed residue number system (RNS) along with the chaotic key for the reversible watermarking of medical images by presenting five different schemes. In the first two schemes, watermark information and original image both are fragile, so that any tampering in the image contents can be easily indicated. In the rest of the schemes, image is kept fragile, while the watermark information is made robust so that it can withstand some reasonable amount of modifications. The second part is concerned with general images carrying hidden information. Our main focus is to optimize the three parameters of digital watermarking, namely capacity, imperceptibility and robustness. In this regard, we have proposed a fuzzy rule base system (FRBS) along with human visual system (HVS) in three different schemes. In first two schemes, FRBS for optimizing capacity or imperceptibility is proposed while keeping the other fixed. It is achieved by finding the HVS features of the image and then tradeoff is made between the imperceptibility and viii capacity using FRBS. In the third scheme, we have jointly optimized the three parameters using FRBS and HVS. In summary, efficient watermarking schemes are developed which can protect the medical images from the naked eye along with the reversibility and fragility. The proposed schemes for the second part can also either optimize the two parameters or jointly optimize the three parameters. The proposed schemes are compared with the well known schemes of digital watermarking in the literature.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.