Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

ایٹمی توانائی کا پُر امن استعمال

ایٹمی توانائی کا پرامن استعمال
آنکھ جو کچھ دیکھتی ہے لب پہ آ سکتا نہیں
محو حیرت ہوں کہ دنیا کیا سے کیا ہو جائے گی
ہماراوطن عزیز پاکستان بھی ایک ترقی پذیر ملک ہے۔ اسے اپنی تعمیر وترقی کے لیے مختلف ذرائع و وسائل سے کام لینا چا ہیے۔ ہمارے مشہور وسائل قوت، معدنی تیل، قدرتی گیس، برقی طاقت اور بائیوگیس وغیرہ ہیں۔ شمسی توانائی بھی ایک وسیلہ قوت ہے لیکن اس سلسلے میں ابھی تک کوئی قابل قدر پیش رفت نہیں ہوئی ۔تعمیر وترقی کے میدان میں ہماری ضروریات اس قدر وسیع اور لامحدود ہیں کہ موجودہ وسائل اور ذرائع قطعاً نا کافی ہیں۔ اس لیے ہمیں لامحالہ ایٹمی توانائی کے حصول اور پھر اس کے پرامن استعمال پر اپنی مساعی اور کوششوں کو مرکوز کرنا ہے۔ بڑھتی ہوئی آبادی اور پیہم روز افزوں ضروریات کے پیش نظر اگر ہم نے اس شعبے میں غفلت اور کوتاہی سے کام لیا تو ہماری تعمیر وترقی کا تمام تر نظام اور پروگرام درہم برہم ہو کر رہ جائے گا۔
اپنی توانائی کے حصول کے بعد اس سے ایٹمی دھما کہ مطمع نظر نہیں ہونا چاہیے بلکہ اس کا پر امن استعمال پیش نظرر ہے۔ اس سے منشاء اور مراد ہو کہ ٹیکنالوجی کے شعبے میں استحکام اور فروغ ہوتا کہ اپنے پاؤں پر کھڑا ہوسکیں اور عوام کو پر مسرت زندگی کی ساعتیں دے سکیں۔
ایٹمی ٹیکنالونی میں پیش قدمی کا صنعت و زراعت پر اچھا اثر پڑتا ہے۔ ایٹمی پیش رفت نے الیکٹرانک انڈسٹری پر خوشگوار اثر ڈالا ہے اور بہتر نتائج سامنے آرہے ہیں۔ تعلیم کے میدان میں بھی کافی ترقی ہوئی ہے۔ ایٹمی توانائی کے پرامن استعمال سے ہم اپنے مختلف شعبہ ہائے زندگی میں عظیم انقلاب برپا کر سکتے ہیں مثال کے طور پر ہم تکنیک استعمال کر کے زرعی پیداوار میں دس...

Religiosity for Promotion of Behavior: Role of Islamic Worships in Moral Development of Muslim Youth

The question of moral rectitude and upbringing of youth in the current social arena is the contemporary discovery attributed to social and family norms that also undergo change due to social and economic reasons. Consequently, deferring levels of piety become more or less acceptable according to an individual’s surroundings and age. The study was done to determine the association between religiosity and behaviors likely to improve the moral, social and psychological habits of young Muslims. The discussion of the article contextualizes the effects of observing practices of Islam on a larger scale. A sample study of this research can be used as evidence to counter the contemporary environment which inevitably generates contradictions for young people. The contradictions result in uncertainty and materialistic atmosphere which does not cater to their spiritual needs and the requirements to develop as the youth of Ummah. Yet, we cannot stop or avoid the negative channels and their effects prevailing on the internet. We can; however, extend the positive spiritual energy in youth that is only possible through careful observance of religious practices comprising regular prayers, fasting, charity and pilgrimage (Hajj). The current apathy of our youth towards the religious injunctions may be attributed to social and family norms that are in some cases relative to the economic conditions and social backup. This will evaluate and assess the way and means of effective inlaying of moral fields where our young people can improve their moral aptitude and rectitude. The impasse of current moral turpitude can be shattered with the bounding relation of human activity and Islamic ritual.

Secure Authenticated Key Agreement Schemes for Smart Grid Communications in Power Sector

The Internet of Things (IoT) has abundant non-trivial applications and Smart Grid is one of them. The IoT capacitate effortless and adept adoption of Smart Grid. Currently, it is anticipated as the mostprevalentmanifestationoftheIoT.SmartGridisemergingasthenextgenerationpowergrid due to its reliability, flexibility, and efficiency. It is a state-of-the-art distributed power generation and supply infrastructure with significant auxiliary traits of intelligence and two-way communication. The utility can monitor and control power consumption of the consumer for load balancing, in real time. Similarly, the consumer can keep a trail of his power usage to plan it as per his affordability or budget. The Smart Grid also furnishes an adequacy to integrate renewable energy sources. Despite the ample amelioration, Smart Grid faces some critical security challenges such as the denial-of-service, message injection, man-in-the-middle and replay attacks etc. Moreover, provision of an IP-based communication system in this very grid has made it more vulnerable to stern securityattacks. Iftheseattacksarenotproperlyaddressed,anadversarycanmaliciouslycompromise the user/device to degrade the performance of the Smart Grid. Itisstrenuoustoemployclassicaltechniquesinordertopreventabove-mentionedsecurityattacks due to soaring communication and computation overhead. Since the Smart Grid is delay sensitive and traffic intensive environment, it is therefore inevitable to concoct and realize security techniquesinsuchawaysothattheydonotpersuadedelayduetocomplexandcomputationintensive cryptographic operations. Theperplexingarchitectureandassortedsecuritydesideratumisthemajorhindrancetoofferaprevailing solution for Smart Grid security. This research work has undertaken to design and develop lightweight authentication protocols for insuring the Smart Grid. The optimal authentication protocolsforSmartGriddelaycriticalenvironmentnotonlywithstandpotentialsecurityattacksbutit also experiences scanty communication and computation overhead due to primitive cryptographic operations. In this research, we have embellished lightweight authentication protocols for endowing secure andreliableenvironmentattheexpenseofinsignificantcommunicationandcomputationoverhead. These protocols are capable of impeding well-nigh all sorts of trivial and non-trivial attacks. The first authentication protocol is based on a hybrid Diffie-Hellman algorithm. This lightweight protocol exploits typical cryptosystems of Advanced Encryption Standard (AES) and Rivest, Shamir and Adleman (RSA) to engender a session key. Additionally, Hash-based Message Authentication Code (HMAC) is also employed in it to perpetuate data integrity. Moreover, this authentication protocol promises to commence mutual authentication by averting major attacks such as man-inthe-middle and replay attack. The second authentication protocol is an Elliptic Curve Cryptography (ECC)-based solution for retaining Smart Grid security. Since ECC promises to offer analogous security clout with significantly reduced key size as compared to other cryptographic security solutions e.g. Diffie-Hellman (D-H), Digital Signature Algorithm (DSA) and RSA. This proposed protocol realizes mutual authentication with meager resource utilization. It is also verified that the proposed scheme can relentless the security attacks. Keeping in mind the complex and delay sensitive nature of the Smart Grid, a lightweight ECC-based authentication scheme is proposed. This ECC-based protocol not only provides mutual authentication with low computation and communication cost but also withstand absolute familiar security attacks. The third security solution is realized through bilinear pairing. This protocol enables the smart meters to get connected with utility control anonymously to avail the services provided by them. The smart meters realize this objective with the private key in the absence of trusted authority. The trusted authority is involved only during the registration phase. Thereafter, the fourth scheme presented in this research work is actually an enhanced identity-based key establishment protocol. This enhanced scheme is introduced after identifying the weaknesses in the protocol presented by Mohammadali et al. (published in IEEE Trans on Smart Grid, 2018). The formal and informal security analysis is carried out under predefined adversarial threat model to verify the robustness of the proposed authentication protocols against stern attacks. BurrowsAbadi-Needham logic (BAN logic) is utilized to evaluate the integrity of the exchanged information. In the end, the performance of the proposed authentication protocols is compared with recently presented related protocols in the literature. Performance comparisons reveal the computation and communication requirements of the proposed protocols as compared to homologous protocols.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.