Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

عمل سے زندگی بنتی ہے جنت بھی جہنم بھی

عمل سے زندگی بنتی ہے جنت بھی جہنم بھی
نحمدہ ونصلی علی رسولہ الکریم امّا بعد فاعوذ بااللہ من الشیطن الرجیم
بسم اللہ الرحمن الرحیم
والعصر ان الانسان لفی خسر . الا الذین امنو وعملو الصلحت ط
صدر ِذی وقار اور میرے ہم مکتب ساتھیو!
آج مجھے جس موضوع پر لب کشائی کا موقع ملا ہے وہ ہے ڈاکٹر علا مہ محمد اقبال رحمۃ اللہ علیہ کے شعر کا مصرع:’’عمل سے زندگی بنتی ہے جنت بھی جہنم بھی‘‘
جنابِ صدر!
اگرچہ پڑھنے میں قاری کو ایک مصرع نظر آتا ہے۔ لیکن اپنے اندر مفا ہیم اور مطالب کا ایک جہان آباد کے ہوئے ہے۔ علامہ اقبال رحمۃ اللہ علیہ قوم کو خواب غفلت سے بیدار کرتے ہوئے فرماتے ہیں کہ عمل کے بغیر تصور زیست ممکن ہی نہیں، زندگی حرکت وعمل کا دوسرا نام ہے۔ اوربے عملی یا جمود کا دوسرا نام موت ہے، عمل سے ہی زندگی کا بگاڑ ہے، اورعمل سے ہی زندگی کا نکھار ہے۔ جام زندگی کے دوام کا راز گردش پیہم میں پوشیدہ ہے۔ بے عملی نہ صرف انسان کو کاہل ، سست اور کمزور بناتی ہے بلکہ بے یقین اور بزدل بھی بناتی ہے، اس کے برعکس عمل انسان کومستعد ،معتمد اور معزز بناتا ہے۔ اقبال کے الفاظ ہیں :
چلنے والے نکل گئے ہیں
جو ٹھہرے ذرا کچل گئے ہیں
کلام پاک میں یہ بات قسم اُٹھا کر بتائی جارہی ہے کہ انسان نقصان میں ہے لیکن جو لوگ ایمان لائے اور نیک کام کرتے ہیں وہ نقصان میں نہیں ۔معلوم ہوا کہ انسان کا انسانیت کی معراج پر فائز ہونابغیر عمل کے ممکن نہیں۔ بقول شاعر:۔
خود عمل تیرا ہے صورت گر تری تقدیر کا
شکوہ کرنا ہو تو اپنا کر مقدر کا نہ کر
جو انسان صاحب عمل ہوتا ہے وہ اپنے کسی کام...

Mīthāq Al-Madīnah: A Universal Charter of Peace an Analytical Study in the Modern Socio-Political Context

Different religious, political and social leaders tried their best to establish peace and prosperity in the society in different phases of the human history. An influential effort out of these efforts is that of the Prophet (r) Muḥammad. The Prophet (r) faced a pluralistic society of different faiths and religions in Madīnah. So, to make a better relationship and establish peace between the Muslims and the other communities of Madīnah, an agreement, which is called Mīthāq al-Madīnah, was made. Mīthāq al-Madīnah was not only a deed, but it presents all those principles and regulations, which were mandatory for peace building in a state or society. The excellent aspect of this charter is that the recipients of this charter were not the Muslims only, but a pluralistic society of different faiths. These communities were bound to establish peace with an agreement. This charter is an excellent model of peace, prosperity, freedom and human rights. According to this charter, all the parties were free with their religious beliefs and social interests. It was also the constitution of Madīnah. The renowned Muslim scholars are unanimously agreed that it was the first written constitution of the world. This agreement provides all other communities of Madīnah (the Jews, the Christians, and the polytheists) equal rights and freedom. Consequently, the charter of Madīnah can become a base for enduring peace and peaceful coexistence in a pluralistic world for the sake of the welfare of the human beings.

O Ptimization of B Lock E Ncryption B Ased S Peech C Oder a Gainst T Ransmission C Hannel N Oise

Compression of data has become a worldwide phenomenon during the past few decades for rea- son of achieving savings in band-width (BW) and hence makes it cost effective. The widespread practice of encryption of data has generated interest for many decades and it mainly aims at pro- tection of data. Combining these two apparently contrary processes (in terms of BW) is quite challenging. Whereas the research on concurrent data compression and data protection (encryp- tion) is still on, the methodology adopted by the author is unique and quite new. The most impor- tant aim of data compression technique is the need for curtailing the data storage and communi- cation expenses. The source message (long) is converted to a codeword (small). The key objec- tive of data encryption is to guard the integrity of data if it is intercepted by an eavesdropper. The plaintext is transformed in to ciphertext using an encryption key or keys. Combining the processes of compression and encryption together must be done in this order, that is, compres- sion followed by encryption because all compression techniques heavily rely on the redundancies inherently part of a regular text or speech. The speech compression has been achieved using Lempel-Ziv 78 algorithm and a new algorithm for encryption/decryption, named ―The Random- One, abbreviated as TR-1‖ is developed during this study and is thoroughly tested. The results obtained are quite encouraging. Firstly, contrary to the use of conventional methods the algo- rithm developed in this study does not use exclusive-OR (XOR) operation in Permutation (P) and Distribution (D) boxes for producing ciphertext from the plaintext. In this scheme pseudo ran- dom number (PRN) is used only to deceive the intruder by adding more confusion (meaning compared to the confusion due to the use of some tested algorithms used in this research). In fact only the sender of information and the intended recipient (not intruders) should be aware of the 44 bit positions filled by the PRN in a 128 word. The intended recipient discards these during deciphering process at the right time (these are disposed of before performing the inverse map- ping in the P-Box). Secondly, protection against attacks is further ensured by using two supple- mentary keys, one for the P-Box, and another for the D-box. In addition the routine key-set of the N selected algorithms further enhances the security. In a small set-up, the distribution of key-set can be mutually agreed upon by the users; but in a large set-up, the distribution of these sets can be accomplished using standard key distribution techniques. Moreover, the proposed algorithm- - also differs from the other methods currently in use due to deployment of a ―sentinel marker”; which is not adopted by other algorithms and this proposal is purely the brain child of the author. The sentinel marker is part of the secret key which is pre-decided and predetermined by the sender and the intended recipient of the information. Twenty bits (out of a total of 128) are used for the sentinel marker which amounts to 2^20 = 1,048,576 possibilities combined with 2^44 = 17.6 trillion possibilities of the ciphertext produced by the PRN. The job for the cryptanalyst to break this cipher becomes formidable and a fool-proof security of data is ensured.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.