Search or add a thesis

Advanced Search (Beta)
Home > Students and Teachers Preception About Peer Feedback and Self-Assessment in Pakistani Efl Classrooms

Students and Teachers Preception About Peer Feedback and Self-Assessment in Pakistani Efl Classrooms

Thesis Info

Author

Sajid Ali

Supervisor

Hasnat Ahmed

Program

MS

Institute

Riphah International University

Institute Type

Private

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2019

Thesis Completion Status

Completed

Page

iv, 88 . ; 30 cm. + CD : ill.

Subject

English

Language

English

Other

A thesis submitted in partial fulfillment of the requirements for the degree of Master of philosphy in english (linguistics); Includes bibliographic references; Thesis (MS)--Riphah International University, 2019; English language; Call No: 420 SAJ

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676711773840

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

ڈاکٹر پال کارس

ڈاکٹر پال کارس

            ان کے چند ہی روز بعد یورپ کے ایک اور نامور فاضل ڈاکٹر پال کارس نے بھی انتقال کیا، ڈاکٹر موصوف کا مولد جرمنی تھا، لیکن مسکن امریکا تھا، وہ مشرقی فلسفہ و مذاہب کے عالم تھے، اور ہندو فلسفہ و مذہب سے انہیں خاص شغف تھا، چنانچہ فلسفہ گوتم بدھ وغیرہ پر ان کی متعدد تصنیفات ہیں، امریکا کا مشہور فلسفیانہ رسالہ موئسٹ انہیں کی ایڈیٹری میں نکلتا تھا۔ ( ’’مولوی عبدالماجد‘‘، جون ۱۹۱۹ء)

 

Moral Reforms in a Community: Modus Operandi in the Light of Sīrah

It’s always the people who define the status of a society. If the people of a society are civilized, the society will be called an ideal society. Moral reforms and behavioural therapy of individuals of the society are basic factors to establish an ideal society. Such an ideal society was established by Prophet Muḥammad (P.B.U.H) in Madina where he laid the foundations of brotherhood and equality among citizens of that state. He showed tolerance towards people belonging to different religions by protecting all their human rights and by providing indiscriminate and quick justice. He not only made the social institutions strong but also developed a history of human civilization. We simply need to work on our moral values and behaviours. We should study the daily life of Muḥammad (P.B.U.H) and mould our lives according to that. Dire need of the modern world is the rectification of human behavior in the light of the ideal life of Muḥammad (P.B.U.H). It will give an opportunity to breathe the same spirit into the contemporary social attitudes so that our society may become peaceful.

A Framework for Network Security, Privacy and Adaptability Management Through Mobile Software Agents

This thesis targets network security – an essential area of computer science, which has gained progressively attention of researchers due to concerns and potential damages in various organizations. More specifically, it deals with insider threat that is less focused than the external threat. Software agents have been used as a technology in this research that autonomously roam around network. Software agents are diversified research area that covers artificial intelligence, programming abstraction and distributed computing. During literature surveys of various agent platforms it has been summed up that both agent standards, FIPA and MASIF, have their own advantages and disadvantages but still some missing features were pointed out such as security, distributed events and multicasting that are not well focused at all by any of the available standards. There are two possible ways to focus the problem, i.e. either these two standards may be combined or another standard may be proposed to include all features necessary for a true agent system. While working on the Agent based Security Framework, first a vulnerability assessment model has been developed that presents an agent based solution and demonstrates that both insiders and outsiders exploit the weaknesses of the system. The literature survey and the practical results of the model reveal that the insider threat is more critical than the outsider. During development of vulnerability assessment model many practical issues have been identified and appropriate solution has been proposed. For the assessment, both agent platform-dependent and platform- independent approaches were used to achieve the task. After comparing results of both approaches, it was proposed that a qualitative, standardized and comprehensive management of the agents is only possible with established and recognized agent platforms. Considering privacy as another component of dissertation, the Agent-based Profiling model has been developed. The model considers an individual’s personality profile to identify real personality in the cyberspace; Guard and guide to use internet resources, and analyzing social interactions to create social community. Major indicators involving profile generation and personality identification have been viiiargued and implemented. The framework helps to create virtual social community in the cyberspace where users are guarded and guided to use internet resources according to their actual profiles and the interests. The profiling model has been implemented in two different ways, i.e. JADE and .Net framework. Test results show that .Net framework supports many advanced tools and technologies therefore and agent platform on the top of the .Net framework is proposed to develop agent based models. Hence, the proposed solution to insider threat will be integrated on the top of agent technology to autonomously monitor and predict human behavior. As human behavior is difficult to predict, therefore autonomously monitoring user behavior is the key solution to avoid insider threat. The FIPA-compliant agent framework for profiling, ACENET (Agent Collaborative Environment based on .NET), has been developed to solve the problem. The proposed profiling framework allows identifying anomalies in user activities either online or offline. Online monitoring is carried out in real time that is used to catch the sensitive activity started by user against organization’s policy. Offline monitoring is carried out on daily, weekly and monthly basis and is based on the analysis of specified factors. Both online and offline monitoring use agent based approach to identify anomalies in user activities. Motivation behind the proposed model is that many procedural security measures are being taken by the organizations at lower level. This dissertation focuses on high level security measures through profiling based agent system to detect the activities user is performing in the organization. It is also checked out that if the user-activities are in accordance with organization’s policy or not? The research has been conducted about insider threat and several issues are addressed and solution has been provided. The major developments are: Monitoring behavior either suspicious or normal, Certifying user’s authenticity to use resources, Checking limitations of the users, Monitoring that user comes into view from the assigned location or not, Analyzing the level of the destruction caused by user, etc. The ACENET scores every user of the organization and maintains a detailed profile. It is really a cumbersome process to determine whether a legitimate user is doing any malicious activity. Expectantly such activity would stand out as strange when compared to the user''s routine behavior. ACENET is adaptable to deploy in any ixorganization. Agents have been designed as service on the top layers of the model. The developed agents create and maintain user-profiles and monitor activities autonomously. The threats have been categorized in various classes and for each category agents have been designed. Communication among agents takes place by message passing at upper level whereas internally socket based communication is underway. To resolve conflict between users and organizations, some professional ethical issues pertaining to privacy, have been addressed and appropriate solution has been proposed to implement the framework in accordance with the recognized standards. A matrix or grid of the trust levels ‘trust grid’ is designed similar to ACL where diverse access privileges are assigned to different level of the users. Currently grid has been divided in two categories: Binary [access given, not given] and Gradient [strong, moderate, weak, none]. The professional issues regarding activity monitoring were studied and it has been proposed that organization may announce in advance what can be monitored and what cannot be monitored, by providing a user monitoring policy. In the light of organization’s policy weight-age has been assigned to profile attribute to identify threat contribution of each suspicious activity and user. The Agent-based Security Framework, ACENET, was tested on real data, obtained from the organizations, and the performance has also been evaluated on the basis of specified parameters. Framework’s results were analyzed to match with the targeted objectives. Finally future directions for the extension of the framework have been presented.