Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

مارجرجس ، مفارہ، مریم اور موم بتی

مارجر جس ،مفارہ ،مریم ؑ اور موم بتی

مسجد عمر و بن العاص کے قریب ہی ایک پرانا کلیسا مارجر جس ہے جو اپنی قدامت اور طرزِ تعمیر کی وجہ سے نہ صرف عیسائی بلکہ مسلم ،یہودی اور دوسرے مذاہب کے زائرین اور سیاحوں کو بھی اپنی طرف متوجہ کر تا ہے ۔مارجر جس سے منسوب کنویں کو عیسائی مقدس مانتے ہیں ،اطمینان ِ قلب کے لیے ایک یادگار بھی یہاں بنی ہے جہاں زائرین موم بتیاں جلاتے ہیں ۔ اس کلیسا کے ساتھ ہی ایک اور کلیسا المفارہ ہے جو دو عیسائی پیشوائوں سرجیوس اور باخس کی یاد میں تعمیر کیا گیا ہے ۔یہاں حضرت عیسی ؑ کے ان دونوںپیرو کاروں کو قتل کر دیا گیا تھا ۔ المفارہ کے صدر دروازے پر ایک بڑا بورڈ آویزاں ہے جس پر اس سفر کا نقشہ کھینچا گیا ہے جس کے بارے دعویٰ ہے کہ حضرت عیسیؑ کی پیدائش کے بعد حضرت بی بی مریم نے فلسطین کے اس وقت کے بادشاہ کے خوف سے کیا تھا ۔ دس سال مصر میں جلا وطنی کے بعد واپسی کے سفر میں جن جن راستوں مقامات سے ہو کر بی بی مریمؑ گزری تھیں نقشے میں انھیں واضح کیا گیا ہے ۔ مسافر کوبی بی مریم ؑ کے اس سفر اور نقشے میں موجود سفری لکیروں نے تاریخ کی ورق گردانی کی جانب راغب کیا کہ آیا حضرت بی بی مریم ؑ نے واقعی یہ سفر کیا تھا یا عیسائی زائرین کو تاریخ اور حقائق سے دور رکھ کر صرف سیاحت کے فروغ کی خاطر یہاں ایک مذہبی کشش پیدا کر نے کے لیے کہانی گھڑی گئی ہے ۔

اس حوالے سے جامعہ کراچی کی تاریخ کی پرو فیسر اور کئی کتابوں کی مصنفہ ڈاکٹر نگار سجاد ظہیر کی رائے معتبر لگی ۔وہ لکھتی...

اسلام میں اہلیت اجتہاد کا معیار

Ijtihad is not an ordinary matter, but an important and sensible religious responsibility from Sharia’h perspective. That is why, Islam does notpermits everyone to indulge in, rather imposes some pre-requisites of widespread knowledge, penetrating insight, intellectual wisdom and similar ext ra ordinary capabilities, without which Ijtihad is deemed as unacceptable and unauthentic. Similarly, any such so-called Ijtihad is also worthless which is not based on knowledge and argument. Several threats have been mentioned in Ahadith on such types of Ijtihad. However, acceptable and reward earning Ijtihad is one which is based on knowledge and arguments, fulfilling all pre-requisite conditions for the task. The essential conditions for indulging in Ijtihad are: expertise in Arabic language, deep understanding of Quran and Sunnah, knowledge of principles of Islamic jurisprudence especially analogy (Qayas), God-gifted intellect and wisdom, know- how about demands of contemporary age, knowledge about demanding situation for making Ijtihad, its procedure and about Shariah perspectives in this regard, and piousness. These conditions are agreed upon with consensus. Besides, there are some conditions which arouse difference of opinion, e.g. Knowledge of Usul-e-Deen, Logics, and particular problems of Islamic jurisprudence, etc. Some scholars consider them amongst essential conditions for Ijtihad, while rest majority do not deem them as necessary. Allama Shatibi, in his individual opinion contradicting to that of majority, has allowed for non-Muslims also to do Ijtihad. However, majority of scholars opine that Islam is the first pre-requisite condition for the task, hence non-Muslim is not capable for that.

Extending the Authentication Mechanism in Ip Multimedia Subsystems for Universal Mobile Telecommunication System

IP multimedia subsystem (IMS) is an emerging platform for provisioning multimedia services (e.g., data, voice, and video) in 4G/5G networks. IMS authentication is an important procedure which grants legitimate users to access multimedia services. However, periodic re-authentication of mobile users results in significant signaling traffic overhead due to complete execution of hectic procedure. Moreover, signaling protocol such as SIP overlooks user’s confidentiality by leaving unprotected public and private identities. In IMS each user entering from another network like UMTS or VOLTE has to authenticate itself. However, it already passed through the same authentication process in its own network. Therefore, IMS core entities are affected by high signaling that could be a source of congestion. . The Session Initiation Protocol (SIP) is used in IMS to establish and manage sessions. It is easy for a hacker to attack IMS with flooding SIP messages. However, IMS does not provide any functions to prevent such kind of attacks. This research presents a secure aauthentication protocol (SAP) which creates a secure channel through the deployment of KMC (Key Management Center) for transmitting user identities; ECC (Elliptic curve cryptography) is used for key generation that provides reduced encryption and decryption time than existing schemes for IMS. FAP strives to minimize signaling overhead of periodic re-authentications. Once a user completes authentication, FAP grants a valid ticket for a particular time which can be used for subsequent re-authentications until it expires. This research introduce a header in SIP to hold the ticket. This research employ protocol composition logic for formal modeling and verification of SAP. The performance of SAP, FAP is validated through FOKUS IMS test bed. The results demonstrate the performance appraisal of FAP compared to other contemporary schemes in terms of signaling overhead, bandwidth consumption and response time. This research presents a Low congestion and Certificate based One-pass Authentication Protocol (COAP) that avoids duplication of authentication steps and makes its authentication efficient through the use of digital certificates. An authenticated user is allotted a certificate to restrict the repetition of complete authentication procedure until the certificate expires. COAP results in reduction of signaling traffic, which eliminates v the congestion problem, it also reduces bandwidth and delivery cost which make this scheme more efficient in terms of bandwidth consumption. An intrusion detection system is designed where a pair of subsystems is working, one is spoofing detection and prevention subsystem and other is flooding detection and prevention subsystem. A zero-watermarking scheme detects the spoofing attack.Watermark embedding is done by the original author and extraction done later by KMC to prove ownership. The flooding detection system is working on misuse rules and anomaly detection algorithms which provide successful detection and prevention for IMS and VOLTE environment. The results has shown that better than other schemes it is compared to i.e. when the no of requests are 30 the detection rate is 90.19 however, when no of request are 40 the accuracy rate of the proposed scheme is 100 percent.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.