Latest Entries
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Explore Further
اتوں بھولا وچوں ٹھگ
اتوں بھولا وچوں ٹھگ
وکھری یار اے تیری رگ
آخر سجن ملسی آ
کجھ دیہاڑے ہور وی تگ
صبح ویلے پیندا اے بندہ
چاہ دا بھریا ہویا مگ
جے توں شملہ اچا چاہویں
لہویں نہ کسے دی پگ
مکھ سجن دا اینویں چمکے
جیویں مندری اتے نگ
اس کولوں وی نیڑے رہندا
بندیا جو تیری شہ رگ
الحديث الضعيف وما يتعلق به من الأحكام
Legitimation among scholars, since they fall to category of hadith dho’if (weak). Therefrom, several scholars argued that we might use them for hujjah mutlaq (absolute argumentation), while some others said it might be wiser not to use them at all. Yet there is also another opinion which said it could be used under special conditions. Based on this, this study aims to uncover and shed light the disagreements above scientifically, as well as to find he differences and the influence of the jurisprudence of law-making (fiqh). Then, the researchers sought to raise a strong opinion based on the arguments presented in the thesis, so which the researchers and or anyone who wants to practice the Hadith may find helpful.Secure Provenance for Distributed Environment
Data provenance has an essential role in establishing the trustworthiness of data in many applications, where critical decisions have to be made based on the data collected from diverse sources. Therefore, it is indispensable to use authentic and accurate data for such mission-critical applications. In order to fully trust the data provenance itself, it is extremely important to secure the data provenance from forgeries and misuse. Provenance generation, management, and dissemination have received substantial attention from the research community. However, provenance security in a collaborative distributed network has earned less heed from the research community. The traditional time-honoured security solutions cannot be directly applied because of the chained or directed acyclic graph structure of the provenance. For a collaborative distributed network, in the literature, some security solutions have been proposed to secure the provenance information. However,these schemes are not without their limitations. The existing schemes assume transitive trust among participating users, thus attacks initiated by multiple consecutive colluding users on a provenance chain cannot be detected. Such an assumption is beyond the reality, especially working in a file sharing environment or distributed network. Moreover, the existing schemes introduce an additional element to chain the provenance records which results an extra storage overhead. To overcome the aforementioned loopholes, we have proposed secure provenance schemes for a document/file sharing n etwork. The proposed schemes can detect the attacks launched by either consecutive or non-consecutive adversaries. For the provenance records chaining, these schemes aggregate the signatures of the participating users. Experimental results show that the proposed schemes outperform as compared to existing schemes in terms of computation and storage cost. Provenance size is a major hindrance to the adoption of provenance in a resourceconstrained network. The provenance size increases drastically when the number of nodes in the network grow. The growing provenance size becomes the per formance bottleneck especially in Wireless Sensor Networks (WSNs). Different solutions have been proposed in the literature to compress the provenance in formation along with its security. However, in existing provenance compression schemes, the provenance’s size grows linearly with the number of nodes in a WSN. Furthermore, the existing provenance compression schemes are designed for static nodes only and do not account for the mobility factor. Moreover, some secure provenance compression schemes use overlapped arithmetic coding to compress the provenance information. However, there is no criterion to find the overlapping ratio. To overcome the above-mentioned issues, we have proposed a secure provenance compression scheme for mobile nodes of a WSN. Moreover, a novel mechanism has been devised to calculate the overlapping ratio for overlapped arithmetic coding. Furthermore, the proposed scheme assures the confidentiality, integrity, and fresh ness of the provenance information. It is evident from the simulation results that the proposed scheme has higher compression and lower false positive rate.Journals by Discipline
Journals by Language
Journals by Starting Year
Journal by Frequency
Journals by Cities
Journals by Provinces
Journals by Countries
Recent Searches
Khankah(monastic system) مغازی Diagnostic hystero-laparoscopy Presisi Literature exceptional cases S฀rah writers the+Prophet's+biography پاکستانی رسوم و رواج بیعت Ú©ÛŒ شرعی Øیثیت نورالانوار ارکان ایمان طبرانی مولانا حشمت علی شیخ عبد القادر Scientific Consequences مشکلات کا سامنا احكام القرآن تھانوی mohadditheen Intelligence System in Islam Worship Rituals تاملات traditions Rad چین فلسفہ اور مذہب سماجی و اقتصادی انصاف عشرہ مبشرہ al-idrak Chronological order of the Surah حضرت لقمان کی نصیحت Qura Saba-Ashra learning output ethics فتوی کی تعریف palmar face قرآن میں موجود حدود ایک جائزہ Mix Marketing harga اسلام کا اقتصادي نظام اسماء introduction of pricing اختلاف تصویر Secondary Schools economic Disagreement Among the Jurists تكافل Penal code Molana Saharanpuri