Search or add a thesis

Advanced Search (Beta)
Home > A Study of Humoral Immune Response in Buffalo Calves Following Various Foot and Mouth Disease Vaccines

A Study of Humoral Immune Response in Buffalo Calves Following Various Foot and Mouth Disease Vaccines

Thesis Info

Author

Aatka Jamil

Department

Department of Microbiology, QAU

Program

Mphil

Institute

Quaid-i-Azam University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2013

Thesis Completion Status

Completed

Page

54

Subject

Microbiology

Language

English

Other

Call No: DISS/M. Phil BIO 3571

Added

2021-02-17 19:49:13

Modified

2023-02-19 12:33:56

ARI ID

1676714999058

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

مولانا سید ابوظفر ندوی

مولانا سید ابوظفر ندوی
ابھی یہ سطور لکھی جا رہی تھیں کہ اچانک اطلاع ملی کہ مولانا سید ابوظفر ندوی نے اپنے وطن دیسنہ(بہار) میں وفات پائی۔اناﷲ واناالیہ راجعون۔مرحوم پرانے دور کے ندوی تھے۔ تمام علوم اسلامیہ وعربیہ میں دسترس رکھتے تھے،لیکن تاریخ ان کاخاص فن تھا، چنانچہ مرحوم نے جتنے مقالات لکھے اور جتنی کتابیں تالیف کیں اُن میں سے اکثر وبیشتر اسی موضوع پرہیں۔ اس فن کابڑا عمدہ اورصاف ستھرا مذاق رکھتے تھے، جو کچھ لکھتے تھے شگفتہ زبان میں لکھتے اور تحقیق کے ذریعہ فراہمی معلومات کاحق اداکردیتے تھے۔ ’مختصر تاریخ ہند‘ اور ’تاریخ سندھ‘ دارالمصنفین کی طرف سے شائع ہوکر مقبول عام وخاص ہوچکی ہیں۔ایک ضخیم کتاب ’’تاریخ گجرات‘‘ کے نام سے ندوۃ المصنفین کے زیرِ اہتمام طبع ہورہی ہے۔مختلف کالجوں میں پروفیسر رہے اوراب ادھر سالہا سال سے احمدآباد میں گجرات اکاڈمی سے وابستہ تھے۔ مولانا سید سلیمان ندویؒ کے بھانجہ یا بھتیجے تھے اور یوں بھی صورۃً وسیرۃً سیدصاحب سے اس درجہ مشابہ تھے کہ ۵۵ء میں اپنی صاحبزادی کی شادی کے سلسلہ میں کلکتہ آئے اور پہلے سے کسی اطلاع کے بغیر اچانک راقم الحروف سے ملنے کی غرض سے دفتر میں تشریف لے آئے تومرحوم کودیکھ کرسید صاحب کی شکل وصورت کا نقشہ آنکھوں میں پھر گیا اور بے قرار کرگیا،یہ بالکل پہلی ملاقات تھی مگروہی بزرگانہ شفقت ومحبت ، باتوں میں علمیت اورذہانت کے ساتھ وہی بھولا پن اورسادگی ،وہی غایتِ کرم اور توجہ۔ سمدھیانہ میں شادی کا ہنگامہ بپاتھا اس لیے شب غریب خانہ پر ہی بسر کی۔ احمد آبادسے بھی وقتاًفوقتاً خط لکھتے رہتے تھے اوراُس میں بھی وہی مشفقانہ اور بزرگانہ انداز ہوتاتھا۔میر ے اور اپنے خانگی معاملات پراس طرح گفتگو کرتے تھے کہ گویا ہم دونوں قریبی رشتہ دار ہوں۔ان ذاتی اخلاق کے علاوہ بڑے متشرع اور متدین تھے، دو راتیں میرے مکان پر...

قرآن کریم میں مذکور اسماءالنبیﷺکی تفہیم اور مطالعہ سیرت میں ان کی اہمیت Understanding the Names of the Prophet ﷺ mentioned in the Holy Quran and their importance in the study of Sirah

In the Qur'an, Allah mentioned His Beloved ﷺ in addition to his personal names, but also with different attribute names which, apart from his greatness and dignity, highlight different aspects of the life of the Prophet ﷺ. Along with increasing the love of the Prophetﷺ, these names cover various aspects of the Prophet's life, from which many jurisprudential issues can be derived in addition to his dawah life, private and political affairs. Therefore, your names are scattered in the Holy Quran like pearls, which the people of love wrap around their necks and live in the love of the Prophet ﷺ. In the article under review titled "Understanding the Names of the Prophet ﷺ in the Holy Quran and their Importance in Studying the Sirah" the personal and attribute names of the Holy Prophet ﷺ will be explained in the light of different interpretations and hadiths which will not only make it possible to understand the blessed name but will also shed light on various aspects of Seerat Tayyaba. Key words: Names of the Prophet ﷺ, Prophet's biography, personal names, attribute names, study of the Qur'an.

Secure Communication Using Steganography in Image Processing

Research in information security and secrecy is becoming more and more important, as well as, demanding as the information is exponentially exploding. There has been a good bit of focus on cryptography, but with cryptanalysis and crypto attacks, researches have looked into the alternative means, like steganography. Steganography conceals the message into the cover file. In this dissertation we have focused on image steganography and we have tried to improve the key parameters of the system which are capacity, imperceptibility and robustness. In the first part of the thesis the presented work comprises of two contributions. In the first contribution the secret information is preprocessed by using latest devised right translated gray substitution box and BCH error correction codes. This process enhances the security of the information as data retrieval is impossible without the information of mapping rule applied and secret key. Differential embedding to the LSBs of optimized chaotically selected pixels through GA is another step to make detection difficult and avoid error to propagate. In second contribution we introduce an advance technique for embedding based on representing cover image pixels using a new 13-bit prime series representation resulting into 3-times increase in capacity. The payload has been reduced by applying 2D DCT to secret image and thresholding of the coefficients ensuring high imperceptibility. An innovative algorithm has also been proposed to ensure the uniform spread of message into the cover image by adjusting average separation between the chaotically selected pixels of cover image for embedding based on size of secret information and cover image In the second part of the thesis the presented work is an application of compressed sensing. The main advantage we have gained is the huge increase in security of the information along with the payload reduction. Utilizing compressed sensing made the system more secure as reconstruction of the data is impossible without knowing the measurement basis, as the generation process of measurement basis is random and requires huge computations to predict them. We have presented two problems. The first contribution focuses on combining compressive sensing and steganography to enhance security of image steganography. The secret image is encrypted and compressed using compressive sensing. The encrypted data is then embedded to randomly selected pixels of cover image using a secret chaotic key. Simulation results presented show the efficient recovery and reconstruction of secret image using reduced payload. In the second contribution we have focused on security and payload capacity enhancement of an image steganography system for an audio message by using compressed sensing theory. However, in order to utilize compressed sensing, the audio message is first converted to an equivalent grayscale image which is sparsified using 2D-DCT and thresholding. The sparsified image is further compressed using the proposed compressed sensing algorithm which enhances the security to a high level and also payload capacity improves significantly, without losing imperceptibility of the system. The compressed image is embedded in chaotically chosen pixels of the cover image. At receiver the compressed sensing reconstruction algorithm is used to reconstruct the grayscale image which is then converted back to the audio message. Presented results indicate that the proposed system is highly imperceptible, secure and robust against various image processing attacks. It is able to reconstruct secret audio message with high PSNR value.