Search or add a thesis

Advanced Search (Beta)
Home > Diphthong Shift in the Speech of Punjabi Speakers [M. Phil Applied Linguistics]

Diphthong Shift in the Speech of Punjabi Speakers [M. Phil Applied Linguistics]

Thesis Info

Author

Mahwish Javaid

Supervisor

Rao Jaleel Ahmed

Department

UMT; Department of English Language &Amp; Literature

Program

Mphil

Institute

University of Management and Technology

Institute Type

Private

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2017

Thesis Completion Status

Completed

Page

78 . CD

Subject

Linguistics

Language

English

Other

Advisor : Rao Jaleel Ahmed; Eng; Call No: TP 414 MAH-D

Added

2021-02-17 19:49:13

Modified

2023-02-19 12:33:56

ARI ID

1676713623313

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

شورشؔ کاشمیری

شورش کاشمیری
شورش کاشمیری کی وفات بھی بڑا سانحہ ہے، ان کی نشوونما آزادیٔ ہند کی جدوجہد کے دوران ہوئی، انھوں نے آزادیٔ وطن کے علم برداروں کے ساتھ زندگی کا بڑا حصہ گزارا، مولانا آزاد، عطاء اﷲ شاہ بخاری اور مولانا ظفر علی خان سے انھیں گہرا تعلق تھا، ملک کی تقسیم سے پہلے ان کا قیام لاہور میں تھا، آزادی کے بعد وہ وہیں رہ گئے، لیکن انھیں وہاں کبھی اطمینان نصیب نہیں ہوا، ان کی زندگی کا بڑا حصہ جیلوں میں بسر ہوا، کبھی کبھی دارورسن کا خطرہ بھی ہوا مگر ان کے پائے ثبات کو کبھی لغرش نہیں ہوئی وہ بڑے قادر الکلام شاعر اور پرزور خطیب تھے، ان کا زور بیان اور حسن کلام مولانا ظفر علی خاں کی یاد دلاتا تھا، اعلان حق میں بڑی جری تھے اور اس راہ میں شدائد و مصائب سے کبھی ہراساں نہیں ہوئے، زندگی بھر تکلیفیں برداشت کرتے رہے، مگر کبھی باطل سے سمجھوتہ نہیں کیا، وہ دارالمصنفین کے بڑے ہمدرد اور بہی خواہ تھے اور اس کی خدمت و اعانت کے لئے ہمیشہ تیار رہتے تھے، اﷲ تعالیٰ ان کو اپنے سایۂ رحمت میں جگہ دے اور ان کی حق گوئی کا پورا صلہ عطا فرمائے۔ (عبد السلام قدوائی ندوی، نومبر ۱۹۷۵ء)

 

Mental Health Disorders and Challenges faced by developing countries

Mental disorders are common and contribute to the highest burden of disease across the globe. Depression and anxiety has become the most frequent disorder in these times. However, it is notconsidered a disease mostly and there are no proper policies and treatment all over the world but thedeveloping countries are affected the most. Mental health care services are lacking and inaccessible tomost of the patients worldwide. Apart from this fact, the stigma associated with this ailment is a majorhindrance in the way of treatment. Lack of human resource and their proper training is also lacking. Thereis a dire need to enhance research capacity to actually estimate the burden and magnitude of the problem, preparing a policy and above all, its implementation to bring a change in the treatment of mental healthproblems. Low and middle income countries are suffering the most due to these disorders and ironicallyit is not considered a disease thereMostly, the uneducated people attribute such mental health issues to supernatural phenomenonsuch as ghosts or magic etc. Additionally, for the treatment of these so-called “supernatural phenomenon”and to get rid of ghosts, they tend to go to “peers” or “baba” who are illiterate people, pretending to havecure for these patients. But infact, such malpractices and misconceptions among masses lead to adisastrous situation. It causes worsening of the condition of patient by not getting the proper medical andpsychiatric treatment, secondly, they are caught up by wrong people who extort huge amount of money. These are the challenges that developing countries are facing for the treatment of mental health issues. Evidence-based interventions and practice by trained personals in community and primary health carefacilities can improve the understanding and treatment of these ailments. Exercise, healthy life style, healthy dietary+ patterns and physical activities may also work wonders in these conditions.

Secret Data Transmission Using Steganography

Cryptography, watermarking and steganography are among the rapidly emerging techniques pertaining to sustain, authenticate, and exhume the hidden data, especially when it is transmitted over a public network/channel. In cryptography, the message is executed and encrypted artistically that the intended message becomes incomprehensible. Whereas, water marking technique conceals the data in some cover file quite tactfully that the data engrossed in the host signal/ entity becomes imperceptible which is likely to be authenticated later on. Likewise, steganography approach veils the data in the cover signal indistinctly to deflect the interception of undesired user. The exchange of encompassed message by cryptographic system may create suspense for the intruder. But, contrary to it, in steganography the user is less attracted to the hidden information. Therefore, the harmonization of both of these technologies can produce invisible higher level of message protection. In this dissertation, the problem of imperceptibility, data rate and robustness is formulated and different approaches are proposed and investigated to solve it. In first approach, a novel technique to embed information into the audio signals is proposed. In this regard, the set of all possible values of amplitudes of audio signals are termed as “audio sample space”. An algorithm is proposed to subdivide this sample space into subspaces and the information was embedded into these subspaces. On the other hand, an algorithm for decoding on receiver side is also proposed. The algorithm has the capability to work on real time systems and provide sufficient security at commercial level. The amount of imperceptibility achieved is, quite a distinct viii benefit concerning perceptual evaluation of speech quality (PESQ). In second approach, an innovative steganography technique has been engineered named as weighted pattern matching (WPM) which is utilized to collaborate the lifting wavelet transform. The message bits are insert in the indistinguishable places that are picked from the coefficients of detail sub-bands by taking edge of the proposed WPM technique. WPM captures the correlation between the message data block and detail coefficients help us to configure the exact location that can contain the data block invisibly. The ultimate results of the experiment exhibit that the WPM technique enhances invisibility significantly in addition to lossless massage retrieval. In third approach, another sustained efficient, imperishable approach brimmed of heavy payload, named compressive weighted pattern matching (CWPM) has been invented and applied. CWPM technique has been born from the combination of compressive sensing (CS) with WPM. Use of CS provides the higher level of security and bigger payload by means of compression and encryption. CWPM holds the position where data block can be embedded on the basis of a weighted correlation. Our engineered techniques have been compared with the well-known steganography elaborated in literature review. The results ingenuity proves that all designed models are far better firm and ingratiating.