Search or add a thesis

Advanced Search (Beta)
Home > An Evaluation of the Implementation of Educational Plans and Policies in Pakistan 1947-2002

An Evaluation of the Implementation of Educational Plans and Policies in Pakistan 1947-2002

Thesis Info

Author

Khalida Makhdum

Supervisor

Mahmood Hussain Awan

Institute

Allama Iqbal Open University

Institute Type

Public

City

Islamabad

Country

Pakistan

Thesis Completing Year

2007

Thesis Completion Status

Completed

Page

130

Subject

Education

Language

English

Other

Call No: 379 KHE; Publisher: Aiou

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676709691671

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

غربت و افلاس جبری مشقت اور تشدد

غربت و افلاس، جبری مشقت اور تشدد

                ایک ان پڑھ اور غریب معاشرہ کبھی بھی ترقی کی منازل طے نہیں کر سکتا۔اسی وجہ سے بڑھتی ہوئی روز بروزسماجی تفریق اور غربت معاشرے میں ناسور کی شکل اختیارکرتی جا رہی ہے۔ معاشرے کا ایک طبقہ اگر زندگی کی ضروریات کو پورا کرنے سے محروم رہتا ہے تو غربت کسی بھی معاشرے میں اس سماجی تقسیم کا نام ہے جس میں  ایک گروہ خوب ترقی کی منزلیں طے کرے تو دوسری طرف دوسرا گروہ مسلسل غربت و افلاس سے تنگ و تاریک زندگی گزارنے پر مجبورہو۔ کیونکہ اختیارات رکھنے والے کبھی بھی تنگ و تاریک زندگی گزارنے والے سفید پوش لوگوں کو ان کا حق نہیں دیں گے۔لوٹ کا بازار ایسا گرم ہے کہ مردہ ضمیر لوگ یہ بھول بیٹھے ہیں کہ ایک نوالہ ان کے لیے وجہ رحمت بن سکتا ہے۔غربت کی اسی رفتار کو ماپتے ہوئے کہا جا سکتا ہے کہ نوجوان نسل اور بچے اس غربت کا شکار ہو رہے ہیں۔بھوک سے تنگ انسان خوشحال و مطمئن زندگی نہیں گزار سکتا، وہ محروم ہے ہر اس پل سے جسے وہ سوچ کر خوش بھی نہیں ہو سکتا۔ انہوں نے بھی اس درد کو محسوس کیا اور ناول نو لکھی کوٹھی میں اس کو اپنا موضوع بنایا۔

مولوی کرامت کا گھرانہ جو پچھلے تیس سال سے چھوٹے سے گاؤں میں رہتا تھا۔گاؤں کی آبادی سو پچاس گھروں پر مشتمل تھی۔مولوی کا دادا بھی جب اس گاؤں میں آیا تو گدا گری اور چندے سے کام چلاتا تھا۔تب گاؤ ں کی مسجد خالی پڑی تھی۔اس نے ادھر ہی گڈری جما لی اور نماز پڑھنے لگا۔ شروع شروع میں لوگ غربت کو مدنظر رکھتے ہوئیترس کھا کر روٹی دے دیتے تھے۔دیکھا دیکھی گاؤں کے کچھ لوگوں نے اس کے پیچھے نماز...

Cryptocurrency Business Covers the Psychological Impact of the Business Market on the Youth Segment

In comparison to the production of physical currency, e-money is a commodity that is provided by banks or financial-sector firms, such as paypal. Then the transaction and investment processes shifted with technical advancements. Today, cryptocurrencies seem to render commerce and transaction structures simpler. The invention of electronic money would help young people expand, given the universal usage of transaction resources to promote goods owned by business owners in all international countries. The blockchain mechanism will operate separately, apart from the transaction speed, without any agency regulating or manipulating all continuing transactions.

Real Time Vulnerability Assessment of Wlan and its Digital Forensics

Wireless local area network (WLAN) has changed the paradigm of communication and become ubiquitous. As the number of devices connected on wireless is increasing, it is therefore, essential to find vulnerabilities in the security of wireless networks. In this research, WLAN security vulnerabilities are exposed in real time and digital forensics of WLAN for Windows and Android operating system-based clients are conducted. A real time wardriving was conducted in a residential area to emphasize the fact that WLAN broadcast sensitive information. The results of wardriving showed that 97% of WLAN access points (AP) were using WPA2. According to the data collected it was found that channel 11 and channel 1 were used by 52% WLAN APs and the average number of clients per AP was 1.59. Tenda WiFi wireless access point was set up with MAC filtering, hidden SSID and WPA2 security mechanisms in different combinations in such a way as to add an additional layer of security to previous configuration. The vulnerability assessment of security mechanisms of residential AP was performed with Kali Linux version 2017.1. A practical demonstration of exploiting MAC filtering, Hidden SSID with MAC filtering and WPA2-PSK with hidden SSID and MAC filtering security mechanisms of AP was carried out in real time. It was observed that the existing security mechanisms were vulnerable. Furthermore, the digital traces left behind or stored in 802.11 based devices were also explored in order to investigate wireless network attacks. Researchers have proposed probabilistic models for detecting MAC spoofing attacks of WLAN clients. However, in this research, a live forensic method based on changing position of legitimate client with respect to attack detector and observing received signal strength of wireless packets to detect MAC filtering bypass attack was proposed. De-authentication attacks on wireless networks were also detected. This thesis also explored the methods of finding WLAN artifacts from Windows and Android OS devices to determine whether a particular device was connected to an unauthorized wireless network or not. Researchers have exploited many security mechanisms of WLAN focusing upon a single parameter of WLAN security at a time. However, in this work, three available security mechanisms were cascaded to produce a three-layer security mechanism which was exploited in real-time.