Search or add a thesis

Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

سخنان چند

سخنانِ چند
عصرِ حاضرمیں محبت کی ندرت اور مشاہدے کی گہرائی کے ساتھ اپنے خارج و باطن میں جھانک کر اور حرف ومعانی سے اپنے والہانہ لگائو سے فن شعر سے وابستگی رکھنے کی روایت کس مقام پہ ہے اس کو نقدو نظر کی دنیا کے امام ہی بہتر جانتے ہیں لیکن اس گئے گزرے دور اور عہد ناپُرساں میں قلم و قرطاس سے اپنا رشتہ مضبوطی سے قائم رکھنے والوں میں جو اہلِ قلم میں اپنے ہونے کا یقین کامل دلاتے ہیں ان میں تائب نظامی کا نام اپنی منفرد شناخت رکھتا ہے۔
ان کے اشعار میں ہمارے تہذیبی معاشرتی اورفکری رویوں کی بازگشت بڑی نمایاں ملتی ہے۔ گردوپیش کی زندگی اور اس کا منظرنامہ ان کے ہاں ایک فکری رنگ میں یوں سامنے آتا ہے کہ ہم خود شاعر کے فی بطنہہٖ موجود احساسات کے ساتھ خود کو ہم آمیز پاتے ہیں۔ فنی وفکری التزامات ہوں یا سہلِ ممتنع کے انداز میں شعرگوئی تائب نظامی اس کائنات میں اپنی ریاضت فن کے جوہر دکھلاتے نظرآتے ہیں انسانوں کی زندگی پر انسانوں ہی کے ستم ، بے رُخی اور اجارہ داریوں کے زخموں کا بیاں ہو، محبتوں کی ناسپاسی اور بے قدری کا ذکر ہو یا معاشرتی رویوں کے ہاتھوں انسانوں کے آنسوئوں کا تذکرہ ہو، یہ سب ان کی شاعری کا حسن بیاں ہے۔ سیاست کے مکروہ جہاں کے اندھیروں میں لوٹ کھسوٹ کا عالم ہو یا گئے زمانوں کی محبتوں کے مزار پہ اپنے اشکوں کا نذرانہ عقیدت ہو تائب نظامی کے ہاں ایک سلجھی ہوئی علمی روایت کے دیپ روشن نظر آتے ہیں۔
ان کے ’’صبحِ قفس ‘‘ میں حمد و نعت کے پھول ہوں یا منقبت اہلِ بیت و صحابہ کرامؓ کے روشن دیپ ہوں ان کی ارادت و عقیدت ’’قربان جائیے‘‘ کا رُوپ لیے اپنا اظہار کرتی ہے۔ اُن کی غزل...

Why I left and why I want to leave: A Phenomenological Perspective of Asian Employees Turnover

The current research was conducted to explore the possible causes of actual employee turnover and turnover intentions. Using Post positivism research philosophy, phenomenological qualitative research method was used to explore the phenomena. Semi-structured interviews of 21 bank employees (selected using purposive sampling) were conducted which were analyzed using NVivo 12. The research findings suggest many uniques themes in order to overcome the problem of employee turnover, especially for banks. The themes which were developed consisted of five significant themes such as the bank appraisals and reward system was identified as biased and based more on favoritism, employee feel that their actual performance is not evaluated properly and sincerely. The other factor concluded by the research findings is that the employees are dissatisfied with the salary and benefits, as they felt that there should a consistent effort to identify employee personal needs which should be customized accordingly in their compensation plans as well. The very essential factor recognized in the research finding was the upward and downward communication gaps with the employees. Such perceptions generated related issues as the employees felt that branches are much deprived to have a direct communication channel with the top team heads. The other very essential factor discovered after the investigation of the phenomena of turnover is lack of career growth. Lastly, another important cause of employee turnover was the transfers, which took place without the consent of the employee. Employees felt demotivated due to such transfers and changes in their work locations. Recommendations and future research directions have been at the end of the research

Key Management in Wireless Sensor Networks

Wireless sensor networks(WSNs) consist of a large number of low power nodes, with limited processing, communication, and storage resources. Large scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource constrained devices communicating via wireless links.The standard security requirements in WSNs include confiden- tiality, authentication and availability. These security requirements can be provided by encryption and authentication services which in turn demands a comprehensive key management scheme. The goal of key management is to pre-distribute cryptographic keys or keying materials among the nodes prior to the deployment, revoke keys if nodes leave the network, assign new keys to the nodes joining the network and periodically refreshing the keys. However, providing key manage- ment in WSNs is difficult due to the unknown network topology prior to deployment, intermittent connectivity and resource limitations of the sensor network environment. Key management schemes consider hierarchical HSN consisting of a small number of high-end sensors (H-node) and a large number of low-end sensors (L-node). A key generation process is incorporated, where instead of generating a large pool of random keys, a key pool is represented by a small number of generation keys, in order to address storage overhead problem in the con- straint sensor nodes. For a given generation key and a publicly known seed value, a keyed-hash function generates a key chain; these key chains collectively make a key pool. In the scheme proposed, after discovering the shared pairwise keys with neighbors, all H-node and L-node de- stroy their initial key rings and generate new key rings by applying one-way hash function on node’s ID and initial key ring. As a consequence, new nodes can still be added in the network beyond the initial deployment even after the deletion of initial key rings from nodes memory. In addition, a self-healing group key distribution scheme is developed for secure multicast commu-nications in HSN environment. This scheme presents a strategy for securely distributing rekeying messages and specifies techniques for joining and leaving a group. Access control in multicast system is usually achieved by encrypting the content using an encryption key, known as the group key (session key) that is only known by the group controller and all legitimate group members. In proposed scheme, all rekeying messages, except for unicast of an individual key, are transmitted without any encryption using one-way hash function and XOR operation. Further, nodes are capa- ble of recovering lost session keys on their own, without requesting additional transmission from the group controller. Also the time-limited node revocation is achieved without any intervention from the GC. This research reports the implementation and the performance of the proposed schemes on Cross- bow’s MicaZ motes running TinyOS and evaluates the computation and storage costs of two keyed-hash algorithms for key chain generation, HMAC-SHA1 and HMAC-MD5. The results show that proposed scheme can significantly reduce the storage requirements as compared to other random key pre-distribution schemes. The performance analysis of the collusion resistant mechanism shows that even if a large number of nodes are compromised, an adversary can only exploit a small number of keys nearby the compromised nodes, while other keys in the network remain safe. Also, the resiliency against node capture is better than previous key pre-distribution schemes. The security analysis of secure group key distribution scheme shows that the proposed scheme is computationally secure and meets the security requirements for forward and backward secrecy.
Supervisor