Search or add a thesis

Advanced Search (Beta)
Home > Automatic Power Factor Correction Using Microcontroller [Bs Program] [+Cd]

Automatic Power Factor Correction Using Microcontroller [Bs Program] [+Cd]

Thesis Info

Author

Shahzad Ahmad; Shahzad Akbar, Muhammad; Usman, Muhammad

Supervisor

Asif Hussain; Nluman Ahmad

Department

University of Management and Technology

Program

BS

Institute

University of Management and Technology

Institute Type

Private

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2013

Thesis Completion Status

Completed

Page

var . CD

Subject

Engineering

Language

English

Other

Report presented in partial reaquirement for BS degree Advisor: Asif Hussain and Nluman Ahmad; EN; Call No: TP 621.315 SHA-A

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676713231594

Similar


Loading...

Similar Thesis

Showing 1 to 20 of 100 entries
TitleAuthorSupervisorDegreeInstitute
BS
University of Management and Technology, Lahore, Pakistan
BS
International Islamic University, Islamabad, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
International Islamic University, Islamabad, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
University of Engineering and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
BS
University of Management and Technology, Lahore, Pakistan
TitleAuthorSupervisorDegreeInstitute
Showing 1 to 20 of 100 entries

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

اداریہ

سیالکوٹ کی تہذیب قدامت کے لحاظ سے پانچ ہزار سال سے بھی پہلے کے آثار ظاہر کرتی ہے۔راجہ شل نے اس تہذیب کو پروان چڑھانے میں اہم کردار ادا کیا۔اس شہر کی تہذیبی روایات اور علمی آثار " مہابھارت" میں بدرجہ اُتم موجود ہیں۔سیالکوٹ کی مٹی بڑی زرخیز اور مردم خیز ہے۔سرزمین سیالکوٹ نے علم وادب وفنون لطیفہ کے میدانوں میں گراں قدر خدمات سرانجام دی ہیں۔سیالکوٹ کی علمی وادبی  اہمیت مسلمہ ہے۔ہر دور میں خواہ وہ ہندو راج ہو ، مغلیہ راج ہویا انگریز راج سیالکوٹ نے ہردور میں علمی وادبی مرکز کے حوالے سے اپنی شناخت قائم رکھی ہے۔یہاں سے بہت سی نامور روحانی اور علمی وادبی شخصیات نے جنم لیا ہےاور بعض نے یہاں کی روحانی اور علمی وادبی شخصیات سے فیض حاصل کیا ہے۔٧٠٠ قبل مسیح سے٦٠٠ قبل مسیح تک یہ اتنا عظیم تعلیمی مرکز تھا۔کہ بنارس کے شہزادے حصول علم کے لیے یہاں آتے تھے۔

اکیسویں صدی عیسویں میں بھی شہرِ اقبال اپنی تہذیبی و ادبی  روایات کی بازیافت کے لیے خاصا سرگرم عمل ہے۔ملا عبدالحکیم سیالکوٹی ،مولانا فیروزالدین،اقبال ،فیض ،مولانا ظفر علی خاں،  ہاشم شاہ،حضرت رائج سیالکوٹی، دلشاد ،منشی میراں بخش جلوہ،محمد الدین فوق ،اثر صہبائی ،سلیم واحد سلیم ،بدری ناتھ سدرشن،جوگندر پال ،غلام الثقلین نقوی ،رجندر سنگھ بیدی،عبدالحمید عرفانی،سرمد صہبائی،خالد نظیر صوفی، ڈاکٹر جاوید اقبال،ساغر جعفری،مولوی ابراہیم میر،آسی ضیائی رامپوری،طفیل ہوشیارپوری،اے ڈی اظہر،حفیظ صدیقی،صابر ظفر،اصغر سودائی اور جابر علی سید دنیائے شعروادب کے اہم ستارے ہیں۔جن کا تعلق سیالکوٹ کی دھرتی کے ساتھ تادمِ حیات رہا ۔موجودہ دور میں بھی خطہ سیالکوٹ علمی وادبی میدان میں مضافاتی دائرے سے نکل کر قومی وبین الاقوامی ادبی دھارےمیں شامل ہونے کے لیے پرتول رہا ہے۔پنجاب لٹریری فورم سیالکوٹ اسی سلسلے میں اہم کردار ادا کررہا ہے۔اس ادبی تحریک کا ثمر اس خطے کی ادبی سرگرمیوں کی نشاة ثانیہ کی...

حديث أُمرت أن أقاتل الناس حتى يشهدوا: دراسة في حرية الاعتقاد والفعل

One of the greatest epistemological accomplishments that Muslims have achieved is the establishment of an accurate system of deriving rulings from Sharia texts, which is known as ‘principles of jurisprudence’ or Usūl ul Fiq. Among the significant contents of these subject is dealing with the text which apparently contradicts to other basic principles of Islam or objectives of Sharī’ah. The job of a jurist becomes more significant and difficult in devising the judgments and interpreting the texts as reported by the fundamentalists: inquiring the validity of the texts, finding its weakness with respect to strong argument, and comparing them in terms of authenticity. Other times, he tries to reconcile between the contradictions by keeping in view a meaning consistent with Sharī’ah. The application of these principles gave birth to the variety and diversity of opinions on account of Ijtihād. Keeping in view the above preamble, the author addressed one of the famous Ahadith of Holy Prophet PBUH: “I have been ordered to fight against the people until they testify.”. This saying of Holy Prophet PBUH attracted Muslim thinkers in past and present to address its meanings and application. Likewise some related debate has emerged in the modern period as regards whether the term "people" in the hadith is used generically or specifically - forcing these people to Islam after defeating? The author in this context, addressed the terminology of hadith, its apparent contradiction with the principles of Sharī’ah, legal maxims, provisions, diverse interpretations, and added his own opinion. Descriptive and qualitative research approach was employed for the collection, demonstration and analysis of data.

An Anomaly Based Adaptive Fuzzy Framework for Detecting Network Intrusions

Anomaly based Intrusion detection systems have proved their worth by detecting zero age intrusions but suffers from large number of false alarms mainly because of imprecise definitions of their normal profile or detection models. Building accurate and precise normal profiles or detection models for intrusion detection is a complex process. It is because it involves highly dynamic network behavior, concept drift phenomenon and evolving intrusion patterns. To accommodate these network dynamics in intrusion de- tection models, we require extensive training data-sets. These data sets must contain a uniform distribution of theoretically possible intrusion patterns and normal network traffic instances. Deviation in training data-set with real time network data and skewed class distribution in training data set will result in a biased detection model. Concept drift phenomenon, huge network data, highly imbalance traffic distribution, addition of new applications and abstract boundaries between normal and abnormal behavior has limited the accuracy of generalized detection models or shortened their detection models useful life. Due to these limitations and complexities in building long term intrusion de- tection models, it is proposed in this thesis that instead of building a generalized profile responsible for detecting all the intrusions it is more helpful if short-term profiles are used to detect an intrusion or even a phase of an intrusion active in certain time space. These short term profiles are evolved by changing cost functions according to changed anomaly conditions, current network traffic patterns and security policies. The evolved profiles remain valid for a short period of time in which network dynamics can be as- sumed as piece-wise linear. In this thesis an anomaly based Adaptive SEmi-supervised Evolutionary Security (ASEES) fuzzy framework is proposed. It is based on adaptive distributed and cooperative fuzzy agents which use evolved short-term profiles. These profiles are evolved for different objectives to detect specific intrusions. Evolved pro- files are switched and activated according to current network and anomaly conditions, network security policies and based on forecasted attacks. The ASEES fuzzy framework is tested under two different attacks; DoS attack and viireconnaissance attack i.e. port scan. The results show good detection times and high detection rate due to similarity of the training and testing data-set. The results also shows a performance increase in using short term profiles along with generalize normal profiles for denial of service attacks.