Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

سر محمد یعقوب

سر محمد یعقوب
سر محمد یعقوب کی ناگہانی وفات کا سانحہ اخباروں میں آچکا ہے، مرحوم مراد آباد کے رہنے والے تھے، ان کے والد ماجد مولوی محمد اسماعیل صاحب وکیل شاہجانپور نہایت نیک، متین و دیندار بزرگ تھے، ندوۃ العلماء کے رکن تھے اور ۱۹۰۸؁ء کی تبلیغی تحریک میں مولانا شبلی مرحوم کے ساتھ تھے، سر محمد یعقوب نے گو انگریزی تعلیم پائی تھی، مگر مذہبی ذوق ورثہ میں پایا تھا اور بڑے خوش قسمت تھے، مراد آباد کی کامیاب وکالت سے لے کر کونسل کی صدارت تک اور پھر سرکار نظام کے مشیر اصلاحات کے رتبہ تک انہوں نے جو ترقی کی وہ سراسر ان کی خوش قسمتی کا نتیجہ تھی، دعا ہے کہ اﷲ تعالیٰ ان کو اس عالم میں بھی خوش قسمت بنائے، وہ بہت خوش خلق، متواضع، متحمل اور حاجت مندوں اور ضرورت مندوں کی امداد میں کشادہ دست تھے، غفر اﷲ تعالیٰ۔ (سید سلیمان ندوی، دسمبر ۱۹۴۲ء)

 

اسلامی فوجداریت کا ضابطۂ قرائن

Qara’in - usually translated as circumstantial evidence - is a derived form of Arabic word " " قر ن which literally means a fact associated or accompanied with an event or circumstances. But when an event or circumstances discloses such associated or accompanied fact then such a fact becomes circumstantial evidence. Both proto-juristic and modern legal terms held circumstantial evidence for an evidence which is offered to prove certain attendant circumstances from which the existence of the fact at issue may be inferred. In Islamic Law, majority of jurists do not endorse Qara’in as an authoritative evidence, particularly, in offences leading to corporal punishments. On the other side, Ibn Farhun from Malikites and Ibn Qayyem from Hanbalites terms it equal to the direct evidence of Iqrar and Shahadah. It is not very strange that Dr. Anwarullah, a prominent Muslim scholar and Prof. Robert Preach are of the opinion that circumstantial evidence is, after all, more authentic even than the aforesaid two evidences. Herbert Broom- a western legal expert- also says that certain hidden facts can be deducted from the mode of a relevant act or to some extent it is modus operandi which gives birth to a circumstantial evidence. In this shortened article the juristic opinion of some early and contemporary legal experts has been discussed as to judge the legal mode and authenticity of circumstantial evidence.

Securing Routing in Mobile Adhoc Networks Manets Form Insider Attackers Through Trust Management

Routing, having focal responsibility in MANET’s successful operation, are based on the assumption of nodes’ cooperation. However, this assumption exposes routing to various insider attackers. These attackers are the legal participants having privileged access to network when inducing attacks on routing. Furthermore, these insider attackers are either in the form of selfish nodes or malicious nodes. The motive of selfish node is saving its resources by not cooperating in routing activities whereas the purpose of malcious node is to attack the network. Therefore, providing security in routing against affirmed attackers has emerged a challenging issue in MANETs. In research community, trust management schemes are used to defend routing against insider attackers. The very focus of this research is to develop a trust management scheme for securing routing from insider attackers to launch blackhole and greyhole attacks. We proposed a trust management scheme, named as MT-SECURER (“Multi Factors Trust for Secure and Reliable Routing in MANETs”), for making routing secure against insider attackers (i.e., blackhole and greyhole attackers). This scheme develops trust from multiple factors, i.e., “node’s cooperation” from communication networks and “node’s relationship maturity” and “mutual friends” from social networks. Whereas for trust development, nodes’ personal observations along with neighbours’ recommendations are utilized. Neighbors’ recommendations, having a pivotal role in computation of trust, if hampered may entail in colossal attacks from dishonest trust recommenders such as “bad mouthing”, “ballot stuffing” and “random opinion”. Therefore, mitigation of dishonest trust recommendations has emerged as a stimulating research issue in trust management systems. In order to cater these challenges associated with dishonest trust recommendations, a technique named “intelligently Selection of Trust Recommendations based on Dissimilarity factor (iSTRD)” has been devised. iSTRD exploits observer node’s personal experience in conjunction with majority vote of the recommenders for removing dishonest trust recommendations. For performance analysis, MT-SECURER is used with AODV and DSR routing protocols and detail simulations are performed in order to examine the proposed scheme’s effectiveness in presence of blackhole and greyhole attackers and nodes’ mobility. The experimental results show significant improvement in “detection rate”, “packet delivery ratio”, throughput and “normalized routing load” with slightly increased “average end-to-end delay” when compared to contemporary schemes. Furthermore, iSTRD successfully removes the trust recommendations of “low trustworthyrecommenders” aswellasdishonesttrustrecommendationsof“highlytrustworthy recommenders”. Its efficacy is evident from enhanced accuracy of “recognition rate”, “false rejection” and “false acceptance”. Moreover, experiential results depict that iSTRD has unprecedented performance compared to contemporary techniques in presence of “bad mouthing”, “ballot stuffing” and “random opinion” attacks.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.