Present Condition and Causes of Decay of Tomb of Jahangir at Shahdara, Lahore

Authors

  • M. Y. Awan
  • N. S. Kazmi

Abstract

All the materials used in the construction of historical buildings undergo deterioration when exposed to aggressive environments. The rate and symptoms of such a process is influenced by a number of factors, including the properties of material itself, the natural factors and humanactions. These factors either act separately or in various combinations. Conservation refers to systematic measures taken to keep the monument in good condition. The monument of Jahangir’s tomb is about 370 years old. Several times, since its construction, it has gone through various repairs and restoration work, though never under a comprehensive conservation plan. The nature of restoration work included the restoration/repair of cenotaph, stone pavements and some facades of main building. This paper is focused on the study and analysis of the present condition of structure of building of this very important historic monument, the ‘Tomb of Jahangir’, situated at Shahdara, Lahore. The aim of the paper is to identify the causes of decay and deterioration of the building through a detailed visual examination carried out by authors of the paper during the year 2004. An examination of the building has shown that there is no single cause responsible for the deterioration and decay of Jahangir’s tomb. It has been found that there are number of intrinsic (internal) as well as extrinsic (external) causes responsible for decay of the building. Thus this paper is an attempt to facilitate the work of conservator/conservation-architect by providing necessary information required for the conservation/restoration of a historic monument.

References

Royer, E. and Toh, C. K.; IEEE Personal Communications, (April 1999), 46–55.

Toh, C. K.; Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall, (2001).

Perkins, C., and Bhagwat, P.; Proc. of ACM SIGCOMM’94 Conference on Communications Architectures, Protocols and Applications, (1994), 234–244.

Perkins, C. and Royer, E.; Proc. of Second IEEE Workshop on Mobile Computing Systems and Applications, (February 1999), 90–100.

David, B. J. and David, A. M.; Mobile Computing, Kluwer Academic Publishers, (1996), 153–181.

Zhou, L. and Haas, Z. J.; IEEE Network Magazine, 13(6)(1999), 24–30.

Suresh, S., Mike, W. and Raghavendra, C. S.; Proc. of Fourth ACM/IEEE Conference on Mobile Computing and Networking, (1998), 181–190.

Christine, E. J., Krishna, M. S., Prathima A. and JyhCheng C.; Wireless Networks, 7(4) (2001), 343–358.

Laura, M. F.; Mobile Networks and Applications, 6(3) (2001), 239–249.

Yih-Chun, H., Adrian, P. and David, B. J.; Wireless Networks, 11(1-2)(2005), 21–38.

Zapata, M. G.; Internet-Draft, draft-guerrero-manetsaodv-05.txt, February, 2005.

Stallings, W.; Cryptography and Network Security - Principles and Practices, Pearson Educ. Inc., 2003.

Dasgupta, D.; Artificial Immune Systems and Their Applications, Springer-Verlag, Berlin, (1998), 3–21.

Hofmeyr, S.; An immunological model of distributed detection and its application to computer security, PhD Thesis, University of New Mexico, 1999.

Kim, J. and Bentley, P.; Proc. of EUFIT’99, 1999.

Aickelin, U., Greensmith, J. and Twycross, J.; Proc. of 3rd International Conference on Artificial Immune Systems, LNCS 3239, Springer-Verlag, (2004), 316– 329.

Kim, J. and Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G. and Twycross, J.; Natural Computing, 6(4) (2007), 413–466.

Sarafijanovic, S. and Le Boudec, J. Y.; IEEE Transactions on Neural Networks, 16(5), Sep 2005.

Caro, G. Di, Ducatelle, F. and Gambardella, L. M.; Proc. of Parallel Problem Solving from Nature, LNCS 3242, Springer-Verlag Berlin Heidelberg, (2004), 461– 470.

Caro, G. Di, Ducatelle, F. and Gambardella, L. M.; European Transactions on Telecommunications, 16(2)( 2005), 443–455.

Roth, M. and Wicker, S.; Proc. of Second Mediterranean Workshop on Ad-Hoc Networks, 2003.

Roth, M. and Wicker, S.; In Proc. Stigmergic Optimization, Studies in Computational Intelligence, Springer Berlin Heidelberg, 31(2006), 155–184.

Roth, M. and Wicker, S.; In Proc. of IEEE GLOBECOM, Dec 2003.

Wedde, H. F. and Farooq, M.; Proc. of IEEE Swarm Intelligence Symposium, (2005), 341–348.

Wedde, H. F. and Farooq, M., Pannenbaecker, T., Vogel, B., Mueller, C., Meth, J. and Jeruschkat R.; Proc. of ACM Genetic and Evolutionary Computation Conference, (June 2005), 153–160.

Wedde, H. F. and Farooq, M., Timm, C., Fischer, J., Kowalski, M., Langhans, M., Range, N., Schletter, C., Tarak, R., Tchatcheu, M., Volmering, F., Werner, S. and Wang, K.; Technical Report PG-460, LS III, School of Computer Science, University of Dortmund, 2005.

Li, J., Blake, C., Douglas, S. J. De Couto, Hu I. L., and Morris, R.; Proc. of 7th ACM International Conference on Mobile Computing and Networking, July 2001.

Rodoplu, V. and Meng, T. H.; IEEE Journal on Selected Areas in Communications, 17(8)(August 1999), 1333-1344.

Seeley, T. D.; The Wisdom of the Hive, Harvard University Press, London, 1995.

Von Frisch, K.; The Dance Language and Orientation of Bees, Harvard University Press, Cambridge, 1967.

Mazhar, N. and Farooq, M.; Proc. 9th Annual Conference on Genetic and Evolutionary Computation, (July 2007), 102–109.

Mazhar, N. and Farooq, M.; Proc. 6th International Conference on Artificial Immune Systems, LNCS 4628, Springer-Verlag Berlin Heidelberg, (Aug 2007), 370–381.

Mazhar, N. and Farooq, M.; Proc. 10th Annual Conference on Genetic and Evolutionary Computation, July 2008.

Stallings, W.; Data & Computer Communications, Pearson Educ. Inc., 2000.

Perlman, R.; Network layer protocols with byzantine robustness, PhD Thesis, Deptt of Elec. Engg. and Computer Science, MIT, 1998.

De Castro L. N. and Timmis, J.; Artificial Immune Systems: A New Computational Intelligence Approach, Springer-Verlag, UK, Sep 2002.

Hofmeyr, S. and Forrest, S.; Evolutionary Computation Journal, (2000), 443–473.

Ranang, M. T.; An artificial immune system approach to preserving security in computer networks, MS Thesis, Norwegian University of Science and Technology, June 2002.

De Castro, L. N.; Proc. of the ICANNGA, April 2001.

Marrack, P. and Kappler, J.; Scientific American, 263(3)(Sep 1993), 48–55.

Matzinger, P.; Annual Reviews in Immunology, 12(1994), 991–1045.

Hart, E. and Timmis, J.; Proc. of 4th International Conference on Artificial Immune Systems, LNCS 3627, (2005), 483–497.

Forrest, S., Perelson, A., Allen, L. and Cherukuri, R.; Proc. of IEEE Symposium on Security and Privacy, IEEE Computer Society, (1994), 202.

Debar, H., Dacier, M. and Wepsi, A.; Computer Networks, (2000), 361–378.

Forrest, S., Hofmeyr, S. and Somayaji, A.; Proc. of IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1996.

Forrest, S., Hofmeyr, S. and Somayaji, A.; Computer immunology, Communications of the ACM, (1997), 88–96.

Kim, J. and Bently, P. J.; IEEE Transactions on Evolutionary Computing, 2001.

Kim, J. and Bently, P. J.; Proc. of Congress on Evolutionary Computation (CEC), (2001), 1244–1252.

Kim, J. and Bently, P. J.; Proc. of Genetic and Evolutionary Computation Conference, (2002), 1330– 1337.

Gonzalez, F., Dasgupta, D. and Nino, L. F.; Proc. of 2nd International Conference on Artificial Immune Systems, LNCS 2728. Springer-Verlag, 2003.

Ji, Z. and Dasgupta, D.; Proc. of the ACM Genetic and Evolutionary Computation Conference, USA, 2004.

Aickelin, U., Bentley, P., Cayzer, S., Kim, J. and McLeod, J.; Proc. of 2nd International Conference on Artificial Immune Systems (ICARIS’03), LNCS 2728, Springer-Verlag, (2003), 147–155.

Aickelin, and Cayzer, S.; Proc. of 1st International Conference on Artificial Immune Systems, University of Kent, Canterbury Printing Unit, (2002), 141–148.

Danger Project. http://www.dangertheory.com.

Greensmith, J.; The dendritic cell algorithm, PhD Thesis, University of Nottingham, Oct 2007.

Twycross, J.; Integrated innate and adaptive artificial immune systems applied to process anomaly detection, PhD Thesis, University of Nottingham, Jan 2007.

Greensmith, J., Aickelin, U. and Cayzer, S.; Proc. of 4th International Conference on Artificial Immune Systems, LNCS 3627, Springer-Verlag, (2005), 153– 167.

Greensmith, J., Aickelin, U. and Twycross, J.; Proc. of 5th International Conference on Artificial Immune Systems, LNCS 4163, (2006), 404–417.

Greensmith, J., Twycross, J., and Aickelin, U.; Proc. of Congress on Evolutionary Computation (CEC), (2006), 664–671.

Peterson, L. L. and Davie, B. S.; Computer Networks: A Systems Approach, Morgan Kaufmann, 1996.

Feeney, L. M. and Nilsson, M.; Proc. of IEEE INFOCOM, 2001.

Downloads

Published

2016-06-22

Issue

Section

City and Regional Planning, Environmental Engineering, Architecture