Search or add a thesis

Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

چور دی مدد

چور دی مدد

اک دفعہ دا ذکر اے کہ اک شہر وچ اک عورت رہندی سی۔ اچا لماں تے گورا رنگ تے چنگی موٹی۔ اوہ بیوٹی پارلر دا کم کردی سی تے اکثر رات نوں لیٹ دکان بند کر دی سی۔

اک رات اوس گیاراں وجے اپنی دکان بند کیتی تے اپنا بیگ موہڈیاں تے پاء کے اپنے گھر ول جا رہی سی۔ سڑک اتے اک تھاں اتے ہنیرا سی۔ جس دا فائدہ چکدے ہویا اک پندراں سالاں دے منڈے نے اوس کولوں بیگ کھوہن دی کوشش کیتی۔ اوہ منڈ اپنی کوشش کامیاب ہو گیا پر نس دے ہوئے ٹھیڈا لگن نال اوہ ڈگا تے اوس زنانی نے اوس نوں گریبان توں پھڑ لیا۔ اوس نوں کافی جٹکے دتے جس پاروں اوہدیاں اکھاںباہر آگئیاں۔ اوس نوں اپنا ساہ گھٹ دا ہویا لگا تے اوہ نڈھال ہو گیا۔ اوہ بہت ڈر گیا سی۔ لوک اوس نوں ویکھ رہے سن پر عورت دے غصے سامنے کسے نوں جرأت نئیں سی پے رہی کہ اوہ چھڈن دا آکھن۔

عورت اوس نوں گھسیٹ دی ہوئی زبردستی اپنے نال گھر لے آئی۔ اوس منڈے کولوں پچھیا کہ تیری کیہڑی مجبوری اے جس تینوں ایہہ حرکت کرن تے مجبور کیتا اے۔ اوس آکھیا کہ میرا تعلق اک غریب گھرانے نال اے۔ میرا والد پنج سال پہلے فوت ہو گیا تے ماں لوکاں دے گھر کم کر کے اساڈا ڈھڈ بھر دی اے۔ میرے کول جیہڑے بوٹ سن اوہ ٹٹ گئے نیں۔ جس پاروں میرے پیراں نوں ٹھنڈا بہت لگدی اے۔ میں جس دکان اتے کم کردا آں۔ مالک نوں آکھیا مینوں نویں بوٹ لے دے۔ اوس مینوں ماریا تے آکھیا کہ ہن توں نویں بوٹ لین لئی میری دکان توں چوری کریں گا۔ ایس لئی تینوں نوکری توں جواب اے۔ اوس میری تنخواہ دے...

Analysis of Factors that Influence Purchasing Decisions for Wardah Cosmetics in Pekanbaru City

The objective of this study was to identify the factors that influence consumers' decisions to purchase Wardah cosmetics in Pekanbaru city. The sample size consisted of 100 participants selected using the accidental sampling technique. This study aimed to be unbiased, clear, and concise, utilizing a formal register and precise language to ensure comprehension. The data analysis employed quantitative multiple linear regression, and the data were analyzed using the SPSS software. Based on the results of this study, it is evident that product quality has an impact on the decision to purchase Wardah cosmetics in the city of Pekanbaru. The customer's perception of prices also affects their decision to purchase the said cosmetics, as well as promotions.  The independent variables, namely product quality, price perception, and promotion, have a significant impact on the dependent variable, i.e., purchasing decision, concerning Wardah Cosmetics in Pekanbaru city. The R Square value of 0.845 or 84.5% indicates that the purchasing decision is influenced by product quality, price, and promotion while 15.5% is attributable to other variables not considered in this study.

Modelling Interaction Using Trust and Recommendations in Pervasive Computing Environment

Pervasive computing is characterized by large numbers of roaming entities and the absence of a globally available fixed infrastructure. In such an environment entities need to collaborate with little known or even unknown entities. In traditional environments with clearly defined administrative boundaries security decisions are usually delegated to a centralized administrative authority. In the pervasive computing environment no single entity can play this role, entities are required to make their own security decisions and as a result traditional techniques are not an option. Human notion of trust enables human societies to collaborate and interact based on personal and shared experiences. Thus a security model based on the real world characteristics of trust can provide the internal security for autonomous computing devices embedded in pervasive environment before taking action, despite uncertainty and inadequate information. The work presents an adaptive trust and recommendation based access control model based on human notion of trust. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any past interaction with the service. A mathematical formula together with adaptable security policies is introduced to handle malicious strategic attack in direct trust computation. The model encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. The performance of indirect trust computation models (based on recommendations) can be easily compromised due to the subjective and social-based prejudice of the provided recommendations. Eradicating the influence of such recommendation remains an important and challenging issue in indirect trust computation models. An effective model for indirect trust computation is also proposed which is capable of identifying dishonest recommendations. Dishonest recommendations are identified by using deviation based detecting technique. The concept of measuring the credibility of recommeni dation (rather than credibility of recommender) using fuzzy inference engine is also proposed to determine the influence of each honest recommendation. The proposed model has been compared with other existing evolutionary recommendation models in this field, and it is shown that the model is more accurate in measuring the trustworthiness of unknown entity. An XML-over-UDP based recommendation exchange protocol to share recommendation information between smart devices, is also outlined to complement the model. Implementation of the proposed model on android smart phone using OSGi is presented to demonstrate the effectiveness of the protocol in pervasive computing environment. Experimental results demonstrate that using HTTP or TCP for recommendation exchange between smart devices in wireless environment lead to significantly higher overhead as compared to XML-over-UDP. In general, our research work presents a comprehensive framework for secure trust based access control that will augment future research towards real world implementation of pervasive computing environment.
Supervisor