Search or add a thesis

Advanced Search (Beta)
Home > پاکستانی اُردو ناولوں میں ضمنی کرداروں کا مطالعہ

پاکستانی اُردو ناولوں میں ضمنی کرداروں کا مطالعہ

Thesis Info

Author

عشرت ناز

Department

Urdu Department

Program

PhD

Institute

National University of Modern Languages

Institute Type

Public

City

Islamabad

Country

Pakistan

Thesis Completion Status

Under Process

Subject

Urdu Literature

Language

Urdu

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676710986830

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

ایاز سموں

ایاز سموں

پیپلز پارٹی کا یہ جیالہ 1959ء میں سندھی خاندان میں پیدا ہو ا ۔شروع شروع میں سندھی نیشنلسٹ گروپ میں شامل ہوا ۔1977ء میں PSFمیں شمولیت اختیار کی ۔دہشت گردی کے الزام میں گرفتار ہو کر جیل پہنچ گیا ۔1985ء میں فوجی عدالت نے سزائے موت سنائی اور26جون کو اسے پھانسی دے دی گئی ۔پھانسی کے وقت اس کی عمر 26سال تھی ۔

 

 

حدیث کے انسائیکلوپیڈیا اور ان کا تعارف

Since the inception of the ancient era, it has been the utmost trial of scholars related to every field of knowledge that they could save the knowledge of various fields. For meeting the purpose of saving, different tasks had been done in different periods, but, the most appreciating one is the preparation of an encyclopedia. In every era, different encyclopedias of different arts have been designed. Although the processes in Islamic studies remained to continue and various encyclopedias in the Islamic studies were prepared in which the encyclopedia of hadith is the most popular. Therefore, the compilation of hadith has begun from the 3rd Islamic century and a large number of muhadiseen have rendered their best services in this field and represented Hadith and books related to all arts, but, along with that a very important task was to assemble all books of Hadith at one place so that no one may get in trouble to find the Hadith, but it was a hard nut to crack that is why Allah has chosen such scholars who have compiled all the Hadith with their untiring efforts out of them the topmost in the list are: Jama-al-Joma, Kanzal-al-Amal, Almusand-al-Jamia, Mosoaa, Jamiat-ul-ahadees-al-zaeefa wal-mozooat, and almudavina-tul-Jamia are included.

Ultralight Weight Cryptography for Low Cost Passive Frid Tags

Radio Frequency IDentification (RFID) is one of the most promising identification schemes in the field of pervasive systems. Non-line of sight capability makes RFID systems more protuberant than its contended systems (such as barcode, magnetic tape etc.). RFID systems mainly consist of three main components: tag, reader and the backend database. A tag is a small electronic chip (transponder) implanted on an object which needs to be identified. A reader scans the tags, collects identification information and forwards this information towards the backend database (server) for the final verification. Security and privacy are the two major concerns of RFID based identification systems which are associated with the tag’s cost. On the basis of the tag’s cost and computational capabilities, the RFID tags can be classified into two types: high and low cost tags. Our research work focuses on low cost RFID tags. High cost tags are resourceful enough to support traditional cryptographic algorithms and primitives such as AES, hash functions, stream ciphers etc. for security. These conventional cryptographic algorithms and primitives have excessive power, memory and silicon (chip) area requirements; which are transcendent from the low cost tag’s computational capabilities. Hence, a new field ultralightweight cryptography has been introduced to ensure the security of low cost RFID tags in recent years. Ultralightweight cryptography avoids the use of costly operations and supports only simple T-functions and some special purpose ultralightweight primitives for the security. This research examines the security issues of low cost RFID systems and makes five contributions. First, we perform the security analysis of numerous Ultralightweight Mutual Authentication Protocols (UMAPs) and discuss the pitfalls in the design of these protocols. Secondly, we present a sophisticated security model to validate the security claims of the UMAPs and cryptanalyze four eminent UMAPs (EMAP, SASI, Yeh et al. and RAPP). We use Recursive Linear Cryptanalysis (RLC) on SASI protocol and quasi linear cryptanalysis on Yeh et al. to retrieve tag’s secret ??. Further desynchronization and two Denial of Service (DoS) attacks on RAPP protocol have also been highlighted. Thirdly, we propose three new UMAPs (RCIA, SASI using Recursive Hash and KMAP) which are robust against all possible existing attacks. Moreover, a counter based methodology has also been assimilated with GOASSMER protocol and R2AP to avoid multiple DoS attacks and traceability attacks. Since the proper hardware implementation of such UMAPs has been long neglected, hence it is unclear that whether such protocols are practically compatible with low cost RFID tags having limited on-chip hardware compatibility or not. We therefore present an efficient hardware implementation of proposed UMAPs for EPC-C1G2 tags using both FPGA and ASIC design flows as our fourth contribution. The simulation and synthesis results of the proposed optimized hardware architecture show the compatibility of the proposed UMAPs with extremely low cost RFID tags. The low cost RFID tags don’t support conventional cryptographic primitives such as on-chip random number generators and conventional hash functions due to resource constraints. We propose two new primitives, Rot and Recursive Hash, to generate the Pseudorandom Numbers which result in Ultralightweight Pseudorandom Number Generators (UPRNGs). We analyze their performance analysis, statistical properties and the efficient hardware implementation to validate their practical feasibility with the low cost RFID tags.