Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

۵۳۔ تندور رہک رہا ہے

تندوردہک رہا ہے

تندور دہک رہا ہے

 لوگ بھوکے پڑے ہیں

سب کے بدن سوکھے پڑے ہیں

یہ خواہشوں کے مارے معصوم انسان

انسانوں کے جنگل میں،ضرورتوں کے مارے

معاش کے درخت کاٹتے اور ضرورت کی شاخیں جمع کرتے

اور دیکھتے ہیں

کہیں بہار کی رنگینیاں تو کہیں خزاں کے ویرانے

کہیں خوشیوں کے سریلے گیت تو کہیں آرزوئوں کے ماتم

کوئی ٹانگیں پسارے پڑا ہے تو کوئی...

علم الجنین و تخلیق جنین کے مختلف ادوار و مراحل قرآن کریم اور سائنس کے تناظر میں

Embryology is such an academic discipline which was based upon the Qura’nic revelation purely and its details were provided by The Holy Prophet (SAW) whereas the scientists remained totally unaware of its intricate details until twentieth century. It was the time when they discovered various stages of the creation and development of fetus inside the mother’s womb and after examination of all these stages through various scientific instruments they openly admitted that Qura’nic verses about fetal development are absolutely accurate. Their acknowledgement is a strong evidence of the authenticity and veracity of The Holy Qura’n for scientific minded people. Not only this but these embryologists also admitted that the information provided in the Holy Qura’n and the A╒adith of The Holy Prophet (SAW) helped them a great deal in formulating the basic hypotheses of their research. So, these scientific discoveries are clear proofs of the miraculous character of Holy Qura’n. The current article is an effort to elaborate the link of modern embryology with the details given in the sacred literature of Islam.

Hybrid Technique to Detect the Black Hole Attack in the Mobile Ad-Hoc Networks Manets

Mobile Ad-hoc Networks (MANETs) are self-organized wireless networks without any central administration like Base Station (BS) or Access Point (AP). Due to the dynamic and open operational environment of these networks, malicious user gains the opportunity to initiate different types of attacks. Black Hole (BH) is a packet dropping attack in which malicious node deceives the source by advertising a fake shortest path to the destination and drops most of the packets. From the previous two decades a lot of research has been conducted by researchers to detect and prevent black hole attack in MANETs. Redundant route replies and comparison of the destination sequence number with a threshold value are two effective methods for detection and prevention these attacks. Both solutions are not effective autonomously so in this proposed research both techniques are combined to strengthen the black hole attack detection and prevention process.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.