ﷺ
رفعتِ ذکرِ نبیؐؐ کی چار سُو گونجی صدا
فرش سے تا عرش ہے توصیف کا یہ سلسلہ
سرورِ عالمؐ کی مدحت کے ترانے کُو بہ کُو
رحمۃ اللعالمیںؐ کے تذکرے ہیں جا بجا
مشکلوں کے دور میں وردِ زبانِ حال ہے
ہے یہی ردِ بلا ، صلِ علیٰ ، صلِ علیٰ
اُمّتی کی سرگزشتِ غم سے بھی ہیں باخبر
بلبلاتے اُونٹ کی جو جانتے تھے التجا
ڈوبتا خورشید پلٹا ٹکڑے ٹکڑے چاند تھا
صاحبِ شق القمرؐ کا اِک اشارہ کیا ہوا
ٓٓٓآپؐ کا اعجازِ نسبت ناز ہے کونین کا
’’تاجداؐرِ انبیائ! خیراؐلبشر خیرالوریٰؐ‘‘
ربِّ کعبہ کا اُسے عرفانؔ ہوتا ہے فقط
لذتِ عشقِ محمدﷺ سے ہوا جو آشنا
The main purpose of the study was to explore educators' views on children's the early years' curriculum and pedagogy implemented in Pakistan. This research study is grounded in qualitative design i.e. Case study. The case included examining educators, the early years' and school managers' critical reflections on children's learning and development during the early years' education. This research study is first of its kind in the context of Pakistan as the early years teachers' views about their teaching practices have rarely incorporated in recent studies. The main finding of this study was that curriculum and pedagogies used in early years' program has never been concentrated earlier as potential research themes. Though many research studies have been conducted on the implementation of ECE programs, but not any specific study concentrated on matching curriculum goals with its implementation to facilitate children's holistic development. It was learnt that national curriculum framework 2007 is not followed in most ECE classes. The main reason was found that many practitioners i.e. Educators and managers have not seen or read it. Consequently, national philosophy is compromised while nurturing children holistically It is therefore recommended for teachers and educators to study the national and now provincial curriculum framework because it has set a benchmark as what to achieve and suggested how to achieve the goals.
The DDoS attacks are the most common attacks of the network and the mechanism and nature of
these attacks change day by day. DDoS attacks can simply exhaust the network communication
resources, it cause the failure of the network within a less time. The fundamental technologies
and network protocols have flaws and vulnerabilities that can open doors for attackers to attack
the network. This problem is a hurdle for secure and reliable communication with in network. To
overcome this issue, there is a need to create a more effective and accurate attack detection
algorithm specifically for DDoS attack. Numerous attack detection mechanisms already
developed to detect a DDoS attack in network. An effective attack detection mechanism that can
provide the entire attack details is therefore required to overcome the problem. Additionally,
need to develop such a diverse system to address not only DDoS attack details and also provide
proactive measures to avoid the same kind of attacks in future by designing intelligent system.
Therefore, in this thesis, we propose SRDD, a smart routing based DDoS detection system for
entire network. In SRDD, the DDoS attacks can be detected at the initial phase. In this research,
we have been developed a DDoS detection system which is based on decision tree algorithm to
prevent the DDoS attack. The decision tree algorithm, include with signature based detection
methodologies, perform automatic prediction, and provide effective detection of malicious
traffic. The decision tree algorithm classifying the received packets and making a decision based
on the classification of results. For validation of proposed system, selected some of other
machine learning techniques and provide comparison with our proposed system. This proposed
SRDD system evaluates the network resources and the traffic dataset in order to train the centric
agent for detection system to detect legitimate and malicious traf?c. The proposed SRDD system
allowed legitimate traffic to pass through network and malicious traf?c is ?agged malicious to go
through detection system. Finally, the results are discussed in terms of accuracy, exposure and
specificity. The system not only can identify the attacks, but also detect the attacker IPs and start
a process of mitigation to provide very well protection of the network system at initial stage of
an attack is identified. The proposed research focused on the security aspect of legacy protocols as the baseline for mapping our desired research objectives to align with intelligent survivable
centric network agent.