Search or add a thesis

Advanced Search (Beta)
Home > A Stylistic Analysis of Shamsie S Salt and Saffron

A Stylistic Analysis of Shamsie S Salt and Saffron

Thesis Info

Author

Saima Khadam Hussin

Institute

Riphah International University

Institute Type

Private

Campus Location

Faisalabad Campus

City

Faisalabad

Province

Punjab

Country

Pakistan

Thesis Completing Year

2016

Thesis Completion Status

Completed

Page

84 . : ill. ; 29 cm.

Subject

English Literature

Language

English

Other

; Call No: 820 SAI

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676711860719

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

بیوقوف بلی تے سیانے چوہے

بیوقوف بلی تے سیانے چوہے

پرانے زمانے دی گل اے کہ اک گھر وچ بلی رہندی سی۔ اوس دے تن بچے وی سن۔ بلی انتہائی بدمزاج تے لڑاکی سی۔ چھوٹی چھوٹی گل تے لڑنا اوس دی عادت سی۔ جس پاروں اوس نوں کوئی وی پسند نئیں سی کردا تے نا ای دوستی۔ جے کر اوہدے کولوں کوئی چیز منگن آندا تاں بلی اوس دی بے عزتی کردیندی۔ انتہائی کنجوس بلی ہر ویلے اپنے کول اک تھیلا رکھدی سی۔ اوس تھیلے وچ اوہنے اپنے بچیاں لئی کھان دا سامان رکھیا ہوندا۔ جے کر کوئی اوس کول کھان لئی کوئی شے منگدا تاں بلی اوس نوں نئیں سی دیندی۔ تھیلے وچ کیہ کجھ اے ایس بارے صرف بلی ای جاندی سی کہ ایس نے تھیلے وچ کوئی قیمتی شے لکائی ہوئی اے۔ ایس لئی اوس محلے دے سارے جانور خاص طور تے چوہے ایس ٹوہ وچ رہندے کہ ویکھیا جاوے کہ تھیلے وچ بلی نے کیہ کجھ لکویا اے ایس بارے صرف بلی ای جاندی سی۔ باقی دے جانوراں نوں ایہو پتہ سی کہ بلی نے ایس تھیلے وچ کوئی قیمتی شے لکائی ہوئی اے۔ پر بلی تھیلا ویکھن دا کوئی وی موقع کسے نوں نہ دتا۔

اک دن محلے دے سارے چوہے اکٹھے ہوئے تے پروگرام بنایا کہ بلی نوں اپنے بچیاں نال بہت پیار اے۔ جدوں رات نوں بلی سوں جاوے گی تاں اسیں اوس دے بچیاں دے کپڑے پاء کے آرام نال تھیلے دی تلاشی لے لواں گے۔ ایس دران جے بلی دی اکھ کھل وی گئی تاں اوہ اپنے بچے سمجھ کے ساہنوں کجھ وی نئیں آکھے گی۔

پروگرام دے مطابق جدوں ادھی رات نوں بلی تے اوہدے بچے گہری نیند سوں گئے تاں کجھ چوہے بلی دے کمرے وچ داخل ہوئے پہلاں اوہناں بلی دے...

Participatory Based Transactions in Sharī‘ah (Islamic Commercial Law) and Their Role in the Development of Rural Local Agricultural Sector in Khyber Pakhtunkhwa

Local farming is, indeed, the most important sector of agriculture through which farmers grow food. However, owing to their weak financial conditions, they are not able to get maximum benefits from their labours for most of the times. The case of Pakistani farmers, particularly in rural areas of KP (Khyber Pakhtunkhwa), is not different in this connection. They frequently resort to formal and informal sources of financing to accomplish their basic agricultural requirements: both crops and non-crops inclusive. However, all these sources advance financing facility on interest basis. Being typical Muslims, such agricultural credit is, therefore, avoided by these farmers and, as a result, they always endure on their financial grounds. In such situations, some substitute arrangements are recommended to reciprocate with their problems. This alternative is offered by Sharī‘ah through various commercial transactions – among which participatory based transaction i.e. Mushārakah is the most suitable and important one. In the present work, various models are proposed on the basis of such transaction to fulfill various agricultural requirements of farmers, living in rural areas of KP.  In addition, such models are structured in the light of basic theory, available in the classical literature of Islamic law, in order to make them more Sharī‘ah based rather Sharī‘ah compliant. The proposed models are then, at the second stage, tested at ground level to strengthen further their viability for all stake holders. Findings show that all agricultural requirements, particularly heavy machinery and transport, can be realized through such models provided if they are applied in their true spirit. Moreover, content analysis and focused group technique of qualitative research have been used, as a research methodology, for the investigation of the issue in the present work.

Optimization of Block Encryption Based Speech Coder Against Transmission Channel Noise

Compression of data has become a worldwide phenomenon during the past few decades for reason of achieving savings in band-width (BW) and hence makes it cost effective. The widespread practice of encryption of data has generated interest for many decades and it mainly aims at protection of data. Combining these two apparently contrary processes (in terms of BW) is quite challenging. Whereas the research on concurrent data compression and data protection (encryption) is still on, the methodology adopted by the author is unique and quite new. The most important aim of data compression technique is the need for curtailing the data storage and communication expenses. The source message (long) is converted to a codeword (small). The key objective of data encryption is to guard the integrity of data if it is intercepted by an eavesdropper. The plaintext is transformed in to ciphertext using an encryption key or keys. Combining the processes of compression and encryption together must be done in this order, that is, compression followed by encryption because all compression techniques heavily rely on the redundancies inherently part of a regular text or speech. The speech compression has been achieved using Lempel-Ziv 78 algorithm and a new algorithm for encryption/decryption, named ―The RandomOne, abbreviated as TR-1‖ is developed during this study and is thoroughly tested. The results obtained are quite encouraging. Firstly, contrary to the use of conventional methods the algorithm developed in this study does not use exclusive-OR (XOR) operation in Permutation (P) and Distribution (D) boxes for producing ciphertext from the plaintext. In this scheme pseudo random number (PRN) is used only to deceive the intruder by adding more confusion (meaning compared to the confusion due to the use of some tested algorithms used in this research). In fact only the sender of information and the intended recipient (not intruders) should be aware of the 44 bit positions filled by the PRN in a 128 word. The intended recipient discards these during deciphering process at the right time (these are disposed of before performing the inverse mapping in the P-Box). Secondly, protection against attacks is further ensured by using two supplementary keys, one for the P-Box, and another for the D-box. In addition the routine key-set of the N selected algorithms further enhances the security. In a small set-up, the distribution of key-set can be mutually agreed upon by the users; but in a large set-up, the distribution of these sets can be accomplished using standard key distribution techniques. Moreover, the proposed algorithm also differs from the other methods currently in use due to deployment of a ―sentinel marker”; which is not adopted by other algorithms and this proposal is purely the brain child of the author. The sentinel marker is part of the secret key which is pre-decided and predetermined by the sender and the intended recipient of the information. Twenty bits (out of a total of 128) are used for the sentinel marker which amounts to 2^20 = 1,048,576 possibilities combined with 2^44 = 17.6 trillion possibilities of the ciphertext produced by the PRN. The job for the cryptanalyst to break this cipher becomes formidable and a fool-proof security of data is ensured.