Search or add a thesis

Advanced Search (Beta)
Home > Awareness and Use of Van Riper Therapy Among Speech and Language Therapists in Lahore, Pakistan

Awareness and Use of Van Riper Therapy Among Speech and Language Therapists in Lahore, Pakistan

Thesis Info

Author

Sehrish Jan

Supervisor

Hina Saleem

Program

MS

Institute

Riphah International University

Institute Type

Private

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2018

Thesis Completion Status

Completed

Page

xii, 34 . ; 30 cm. +CD

Language

English

Other

In partial fulfillment of requirements for the award of degree of Master of Sciences in Speech Language Pathology; Includes bibliographical references.; Thesis (MS SLP)--Riphah International University, Lahore; English; Call No: SEH 616.855

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676711426510

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

سید عدید ؔ

سید عدید ؔ(۱۹۶۵ء پ) کا اصل نام تنویر حسین شاہد ہے۔ آپ کھروٹہ سیداں سیالکوٹ میں پیدا ہوئے۔ ایم۔اے اردو گورنمنٹ مرے کالج سیالکوٹ سے کیا۔ ۱۹۸۰ء میں مرے کالج میں آپ حلقہ اربابِ ذوق کے جائنٹ سیکرٹری تھے۔ آپ نے شاعری میں یوسف نیر اور اصغر سودائی سے ابتدائی راہنمائی لی۔ سب سے پہلے مرے کالج کے ادبی رسالے ’’مفکر‘‘ میں آپ کا کلام شائع ہوا۔ ’’بالتحقیق ‘‘ سیالکوٹ اور ’’اخبار جہاں‘‘ لاہور میں بھی ان کا ابتدائی کلام چھپتا رہا۔ (۱۱۴۹) ’’وقت ‘‘ سید عدید کا پہلا شعری مجموعہ ہے۔ جو سیالکوٹ سے ۱۹۸۸ء کو شائع ہوا۔ دوسرا شعری مجموعہ ’’تلاش‘‘۱۹۹۴ء میں شائع ہوا۔ ’’ہم نفس‘‘ تیسرا شعری مجموعہ ہے جو ۱۹۹۵ء میں شائع ہوا۔ آپ کا چوتھا شعری مجموعہ ’’فریب دے کر چلا گیا ہے‘‘ ہے جسے ادیب پبلی کیشنز لاہور نے ۱۹۹۶ء میں شائع کیا۔ ’’محبتوں میں حساب کیا‘‘عدید کا پانچواں شعری مجموعہ ہے جسے الحمد پبلی کیشنز لاہور نے ۱۹۹۸ء میں شائع کیا۔ چھٹا شعری مجموعہ ’’پیاربے اختیار ہوتا ہے‘‘ جسے الحمد پبلی کیشنز لاہور نے ۲۰۰۰ء میں شائع کیا۔ ’’ساتھ تمہار ا اگر ملے‘‘ ساتواں شعری مجموعہ ہے۔ جسے القلم پبلی کیشنز لاہور نے ۲۰۰۶ء میں شائع کیا۔ آٹھواں شعری مجموعہ ’’تیرے بن زندگی‘‘ ہے جسے مراد پبلی کیشنز لاہور نے ۲۰۱۰ء میں شائع کیا۔ اس کے علاوہ ’’وفائیں ساتھ رہتی ہیں‘‘ ،’’گردش‘‘ ،’’تمنادل میں رہتی ہے‘‘، ’’درد کے سمندر میں‘‘،عدید کے زیر طبع کتابوں کے نام ہیں جو جلد شائع ہونے والی ہیں۔کافی مسودے ایسے بھی ہیں جن کے نام ابھی تک تجویز نہیں کیے گئے ہیں۔

                عشق مجازی سید عدیدؔ کی شاعری کا بڑا موضوع ہے۔ ان کے ہاں نسوانی عشق کے ساتھ ساتھ جنون بھی ملتا ہے۔ وہ محبوب کی بات بھی کرتے ہیں اور ا س کے ظلم و ستم کا ذکر بھی کرتے ہیں۔ انھیں اپنے محبوب سے سچی...

المنھج اللغوي في التفسير و تاريخه

The Holy Quran was revealed in Arabic Language, it is, therefore necessary to seek Arabic Diction to gain the direct guidance from it. The companions of Holy Prophetr, Tabeen, and the reverent Imams strictly rebuked those interpreters who interpret the Holy Quran without having command over Arabic Language. The verses of Quran that are clear in comprehension, explicit and easy, do require the source of interpretation as “Arabic Diction”. This method highlights the positive trends to Arabic Diction. But in the matter of ambiguity and resemblance in verses and deduction of Masael, this Diction will be given second priority. Mere Diction and Arabic Socio-Diction may not be titled as most authentic. Diction is not the ‘last word. ’ The very first priority will be given to the verses of Quran, Hadith e Nabvi and Quotations of Companions of Holy Prophetr. The companions themselves were the native Arabs but they used to do consult some Quranic terms with the Holy Prophetr. As time passed, some strayed sects and atheists ignored this positive trend (Tafseer-bil-Mathur), and accustomed a new trend of interpretation of Holy Quran i. E. Depending upon Arabic Diction only so that they may endorse their own thoughts. It was a negative source of interpreting the Holy Quran i. E. Only by Arabic Diction. The present article explores its historical perspectives after evaluating its negative trends. The Motazila sect got this trend nourished. The representing interpretations of Holy Quran of this trend have been analyzed in this article. At the end, Molana Ameen Ahsan Islahi’s approach to Diction and his Tafseer ‘Tadabbur e Quran’ has been evaluated.

A Specification-Based Distributed Intrusion Detection Framework for Wireless Sensor Network

Wireless Sensor Networks (WSNs) have a great potential to assist in storing and processing data collected from tiny sensors placed in various environments such as smart homes, vehicles, hospitals, enemy surveillance areas, volcanoes, oceans, etc. The sensors may be implanted to inspect the physical aspects of the external environment such as temperature, moisture, humidity, pressure, motion, magnetic fields, light, sound, gravity, vibration, electrical fields, and others or inspect the physical aspects of the internal environments such as motion of the organism, glucose level, oxygen level and others. The data recorded by these sensors can further be used for several applications as well as services. Here, the data is acquired from sensors through the wireless medium. Recent studies show that WSNs are vulnerable to various kinds of security threats and there is a requirement of a security solution that can safeguard them from lethal attacks. Several security schemes have been proposed in the recent past to counter the attacks launched at different layers of WSNs. Intrusion detection systems (IDS) focus on the detection of malicious activity at the network layer. Most of the proposed IDS based security approaches for WSNs lack completeness with respect to data acquisition, detection policy and the way actions should be taken once the malicious behavior is detected. Further, they lack the proper testing of the proposed schemes with respect to the performance metrics such as energy consumption, throughput, false positive rate, intrusion detection rate, and accuracy etc. Hence, there is a requirement of a purely distributed security scheme that works independently and communicates the anomalous behavior of sensor nodes with the base station (BS). The scheme should be lightweight and is able to perform efficiently with respect to energy efficiency and throughput. Moreover, it should be able to achieve low false positive rate and high detection rate. In this thesis, a novel intrusion detection framework is proposed for securing WSNs from routing attacks. The proposed system works in a distributed environment to detect intrusions by collaborating with the neighboring nodes. It works in two modes: online prevention allows safeguarding from those abnormal nodes that are already declared as malicious, while offline detection finds those nodes that are being compromised by an adversary during the next epoch of time. The proposed framework is a specification-based detection framework that works for a flat WSN scenario. To test the performance of the proposed framework, a simulator is implemented, and results are produced. The results show that a centralized distributed approach cannot properly figure out the actual condition of the network. Therefore, a purely distributed security system is more appropriate for WSNs. The results also show that the specification-based detection scheme achieves higher detection rate and low false positive rate. These results also guide that each node should be treated independently in WSNs, and centralized distributed detection schemes may fail to identify the network behavior whether it is normal or is under any attack. As a second contribution, the low-energy adaptive clustering hierarchy (LEACH) protocol for WSNs is modified by adding the functionality of the proposed intrusion detection framework to secure it from sink-hole, black-hole, and selective forwarding attacks. The modified protocol is called LEACH++. We performed two types of analyses: (1) numerical analysis to check the effect on vi throughput and energy, and (2) simulations in Network Simulator-2 (NS-2) to prove the results found from the numerical analysis. The results are quite promising and favor LEACH++ over LEACH under attack with respect to throughput and energy consumption. The third contribution is to perform a security analysis of the LEACH++ protocol to validate the proposed specification-based detection scheme with respect to accuracy, false positive rate, and detection rate. For this purpose, we simulate LEACH++ by launching various numbers of attacks in different patterns for different configurations. The experiments are carried out against the LEACH++ protocol for black hole and sinkhole attacks in different patterns. The results show that the proposed scheme achieves high accuracy and detection rate for LEACH++ and shows very low false positive rate.