Search or add a thesis

Advanced Search (Beta)
Home > Impact of Child Abuse and Maltreatment on Self-Compassion and Emotion Regulation Capacities in Adoloscence and Young Adulthood

Impact of Child Abuse and Maltreatment on Self-Compassion and Emotion Regulation Capacities in Adoloscence and Young Adulthood

Thesis Info

Author

Sana Usman[14004142007]

Department

University of Management and Technology

Institute

University of Management and Technology

Institute Type

Private

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2016

Thesis Completion Status

Completed

Page

47 . Include[cd]

Subject

Psychology

Language

English

Other

EN; Call No: TP 152.4 SAN-I

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676713510174

Similar


Loading...

Similar Thesis

Showing 1 to 20 of 100 entries
TitleAuthorSupervisorDegreeInstitute
University of Management and Technology, Lahore, Pakistan
MS
University of Management and Technology, Lahore, Pakistan
Mphil
University of Management and Technology, Lahore, Pakistan
MS
Riphah International University, Lahore, Pakistan
MS
International Islamic University, Islamabad, Pakistan
MS
International Islamic University, Islamabad, Pakistan
MS
University of Management and Technology, Lahore, Pakistan
MS
University of Management and Technology, Lahore, Pakistan
Mphil
University of Management and Technology, Lahore, Pakistan
MS
University of Management and Technology, Lahore, Pakistan
Riphah International University, Faisalabad, Pakistan
PhD
Government College University, Lahore, Pakistan
PhD
Government College, Lahore, Pakistan
Mphil
Quaid-i-Azam University, Islamabad, Pakistan
MSc
Quaid-i-Azam University, Islamabad, Pakistan
MSc
Quaid-i-Azam University, Islamabad, Pakistan
MS
International Islamic University, Islamabad, Pakistan
Mphil
Quaid-i-Azam University, Islamabad, Pakistan
MS
International Islamic University, Islamabad, Pakistan
MSc
Quaid-i-Azam University, Islamabad, Pakistan
TitleAuthorSupervisorDegreeInstitute
Showing 1 to 20 of 100 entries

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

3۔اسلامی نظام تعلیم

نظام تعلیم سے مراد تعلیم سے متعلقہ عناصر کا ایسا مجموعہ ہے جو باہمی طور پر مربوط اور منظم اندازمیں تسلسل کے ساتھ مقاصد کےٍ حصول کے لیے ایک یونٹ کی شکل میں کام کرتا ہے۔ اس کے عناصرمندرجہ ذیل ہیں : فلسفہ حیات، نظریہ حیات، مقاصدتعلیم، نصاب ، طریقہ ہائے تدریس، تربیت اساتذہ ، امتحانات ، انتظامیات اورتحقیق وغیرہ۔ ریاستی انتظام و انصرام کو بہتر طور پر چلانے کے لیے اہل اور تجربہ کار افراد کا وجود لازمی امر ہے ۔اس تناظر میں ریاست میں بہترین تعلیمی نظام کا ہونا ضروری ہےاور تعلیم وہ اجتماعی عمل ہے جس کے ذریعے معاشرہ نوخیز نسلوں کو اسلامی تصور حیات سکھاتا ہے۔ اسلامی عقائد وا قدار ان کے اذہان میں راسخ کرتاہے اور اسلامی افکار کی روشنی میں آداب زندگی اور اخلاق کی تربیت دیتا ہے۔ اسلام نے مردوں کے ساتھ ساتھ عورتوں کی تعلیم و تر بیت پر زور دیا تاکہ معاشرے کی تعمیر و ترقی میں صحیح طورپر عورت اپنا کردار ادا کر سکے ۔ رسول اللہ ﷺ پر وحی کی ابتدا "اقرا" سے ہوئی۔لہذا اسلام کو ماننے والوں کو تعلیم و تربیت سے ضرور آراستہ ہونا پڑے گا۔ اسی وجہ سے رسول اللہ ﷺ نے صحابہ کرام کی تعلیم و تربیت پر زور دیا اور اس سے متعلق آپ ﷺ نے ارشاد فرمایا
"طلب العلم فريضة على كل مسلم۔ "355
"علم کی طلب ہر مسلمان پر فرض ہے ۔ "
اس بات پرالبتہ اہل علم کا اختلاف ہے کہ کون سا علم حاصل کرنا فرض ہے اور کون سا مستحب ۔ اس حوالے سے آپ ﷺ نے ارشادفرمایا
"بني الإسلام على خمس شهادة أن لا إله إلا الله وأن محمدا رسول الله وإقام الصلاة وإيتاء الزكاة والحج وصوم رمضان۔ "356
"اسلام کی بنیاد پانچ چیزوں پر ہے اس بات کی گواہی دینا کہ اللہ...

دور جدید میں کرائے کی ماں (Surrogate Mothering) کا تصور اور اسلامی نقطہ نظر

Artificial insemination is a means of attaining pregnancy not involving sexual intercourse. A couple having trouble getting pregnant can benefit from the exact timing and placement of the sperm. It can overcome instances where a woman's immune system can reject her partner's sperm as invading molecules. In the case of an impotent male, donor sperm may be used. It is also a means for a woman to conceive when two women wish to parent a child, or a single woman does not have a male partner, when she does not want a male partner, or when a male partner's physical limitation impedes his ability to impregnate her by sexual intercourse. A relationship in which one woman bears and gives birth to a child for a person or a couple who then adopts or takes legal custody of the child; called Surrogate Motherhood. In surrogate motherhood, one woman acts as a surrogate, or replacement, mother for another woman, sometimes called the intended mother, who either cannot produce fertile eggs or cannot carry a pregnancy through to birth, or term. Surrogate mothering phenomena is prevailing all over the world now days especially in America and European countries. The first recognized surrogate mother arrangement was made in 1976. Surrogate mothering is also introducing in Islam in some extend but Islam has its own laws regarding each and every problem of life. This Article is a summary of all positive and negative aspects of said issue and a critical analysis of its implications according to the Islamic injunctions in modern era.

Evaluation of Hidden Markov Model for Malware Behavioral Classification

Malware is a growing threat to computer systems and networks around the world. Ever since the malware construction kits and metamorphic virus generators became easily available, creating and spreading obfuscated malware has become a simple matter. The cyber-security vendors receive thousands of new malware samples everyday for analysis. It has become a challenging task for the malware analysts to identify if a given malware sample is a variant of a known malware or belongs to a new breed altogether. Since making an accurate decision about the nature of an unknown malware sample is crucial for updating of signature databases and propagation of the update to their customers, therefore vendors of cyber-security products need accurate malware classi cation techniques for this purpose. The research community has been active for providing a solution to the above problem, and a number of diverse avenues have been explored such as machine learning, graph theory,nite state machines, etc. Furthermore, many syntactic and semantic aspects of computer programs have been tried out in search of the best aspect that could be used to distinguish between harmful and harmless computer programs, and to di erentiate malware belonging to di erent families. All the proposed approaches have merits and demerits of their own, and the search for a solution that maximizes the classi cation accuracy with minimal computational costs is continued. This dissertation formulates malware classi cation as a sequence classi cation problem, and evaluates a widely used sequence classi cation tool, Hidden Markov Model (HMM), for the task of malware classi cation. HMM has been a method of choice for a broad range of sequential pattern matching applications such as speech analysis, behavior modeling and handwriting recognition to name a few. The dissertation rst proposes and evaluates novel methods of malware classi cation by combining HMM and malware behavioral features, which are attributes frequently used to distinguish between normal and malicious programs and to di erentiate x among malware families. As an another major contribution, the dissertationlls a signi cant research gap by studying the role of an important HMM parameter, the number of hidden states, in malware classi cation applications. Based on observations from comprehensive experiments conducted on a large and diverse dataset consisting of malware behavioral reports, the dissertation concludes that although HMM shows encouraging results when used for malware classi cation tasks, its potential from a practical standpoint is fairly limited. The dissertation makes the third contribution by proposing to replace the HMM component of malware classi cation method with Markov Chain Model (MCM), and performing comparative evaluation between the two models. Results of the comparison prove that classi cation performance achieved by HMM can be attained much more e - ciently by MCM, and therefore MCM should be preferred over HMM for malware classi cation applications.