Search or add a thesis

Advanced Search (Beta)
Home > Clinical and Phenotypic Variability in Polydactyly Families Ascertained from Rawalpindi-Islamabad, Pakistan

Clinical and Phenotypic Variability in Polydactyly Families Ascertained from Rawalpindi-Islamabad, Pakistan

Thesis Info

Author

Huma Fatima

Department

Department of Biological Sciences, QAU

Program

Mphil

Institute

Quaid-i-Azam University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2013

Thesis Completion Status

Completed

Page

69

Subject

Biological Sciences

Language

English

Other

Call No: Diss. M.Phil / BIO /3329

Added

2021-02-17 19:49:13

Modified

2023-02-19 12:33:56

ARI ID

1676716242912

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

مولاناعنایت اﷲ دہلوی

مولانا عنایت اﷲ صاحب دہلوی مرحوم
گزشتہ اکتوبر کو علمی جماعت کے پرانے ممتاز رکن مولوی عنایت اﷲ صاحب دہلوی مرحوم سابق ناظم دارالترجمہ حیدرآباد دکن نے انتقال کیا، مرحوم علی گڑھ کالج کے دور اول کے ممتاز تعلیم یافتہ تھے، علم و ادب کا مذاق اپنے نامور باپ مولوی ذکاء اﷲ صاحب دھلوی سے ورثہ میں پایا تھا، طالب علمی ہی کے زمانہ سے ان کے یہ جوہر نمایاں تھے، سرسید کے بہت سے علمی اور ترجمہ وغیرہ کے کام وہی انجام دیتے تھے، اس دور کے ان کے بعض تراجم اب تک یادگار ہیں، ان میں سب سے اہم پروفیسر آرنلڈ کی مشہور کتاب ’’پریچنگ آف اسلام‘‘ کا ترجمہ ’’دعوتِ اسلام‘‘ ہے، تعلیم سے فراغت کے بعد ۱۸۹۳؁ء میں وہ کالج لائبریری کے لائبریرین مقرر ہوئے، کچھ دونوں تک ریاضی کی پروفیسری کی۔ اعزازی خدمت اور تہذیب الاخلاق کی ادارت کے فرائض انجام دیئے، ۱۹۰۰؁ء میں گورنمنٹ کے سلسلۂ ملازمت میں داخل ہوئے اور جونپور کی عدالت ججی میں منصرم مقرر ہوئے، ۱۹۱۵؁ء میں ریاست گوالیار نے گورنمنٹ سے ان کی خدمت مستعار لے کر اپنے شعبہ فنانس کا انڈر سکریٹری بنایا۔ دوران ملازمت میں ترجمہ کا مشعلہ برابر جاری رہا اور اس میں ان کو اتنی شہرت حاصل ہوگئی کہ جامعہ عثمانیہ کے قیام کے سلسلہ میں حیدرآباد میں جب دارالترجمہ کا قیام عمل میں آیا، تو گورنمنٹ نظام نے ان کو حیدرآباد میں منتقل کراکے ۱۹۲۰؁ء میں ان کو دارالترجمہ کا ناظم مقرر کیا، ۱۴ سال تک بڑی قابلیت کے ساتھ اس خدمت کو انجام دیتے رہے، ۱۹۳۴؁ء میں اس سے سبکدوشی حاصل کرکے دہرہ دون کی پر سکون فضا میں قیام اختیار کیا اور یہیں ۲۲؍ اکتوبر ۱۹۴۳؁ء کو وفات پائی۔
مرحوم کا خاص کمال ترجمہ کی مہارت تھی، اس میں ان کو ایسا ملکہ حاصل تھا کہ غیر زبانوں کی کتابوں...

Domestic Violence Against Female Beggars in Hyderabad District: A Case Study Qasimabad

This Paper analyses the causes of the domestic violence against female beggars and their impacts on their lives. The paper is strictly limited to Taluka Qasimabad, District Hyderabad. The domestic violence against women exits in various forms. However, it is pretty horrible in the form being inflicted against female beggars in Qasimabad. The scores of causes for the domestic violence against female beggars range from rising poverty to population explosions with deep physical and mental impacts on the sufferers. For data collection qualitative research through Focused Group discussion method has been used through snow ball technique. 10 Cases of female beggars have been opted for the FGDs out of which two participated with their social backgrounds. The study concludes the pathetic condition of the female beggars due to multiple factors and their serious implications both physically as well as mentally. The study recommends prompt action from the Government as well as social scientist to go deep further in the social issues such as violence against the female beggars. Simultaneously there is immediate intervention of Government and the concerned department to address these issues on emergent basis as the number is likely to reach an alarming level.

Secure Provenance for Distributed Environment

Data provenance has an essential role in establishing the trustworthiness of data in many applications, where critical decisions have to be made based on the data collected from diverse sources. Therefore, it is indispensable to use authentic and accurate data for such mission-critical applications. In order to fully trust the data provenance itself, it is extremely important to secure the data provenance from forgeries and misuse. Provenance generation, management, and dissemination have received substantial attention from the research community. However, provenance security in a collaborative distributed network has earned less heed from the research community. The traditional time-honoured security solutions cannot be directly applied because of the chained or directed acyclic graph structure of the provenance. For a collaborative distributed network, in the literature, some security solutions have been proposed to secure the provenance information. However,these schemes are not without their limitations. The existing schemes assume transitive trust among participating users, thus attacks initiated by multiple consecutive colluding users on a provenance chain cannot be detected. Such an assumption is beyond the reality, especially working in a file sharing environment or distributed network. Moreover, the existing schemes introduce an additional element to chain the provenance records which results an extra storage overhead. To overcome the aforementioned loopholes, we have proposed secure provenance schemes for a document/file sharing n etwork. The proposed schemes can detect the attacks launched by either consecutive or non-consecutive adversaries. For the provenance records chaining, these schemes aggregate the signatures of the participating users. Experimental results show that the proposed schemes outperform as compared to existing schemes in terms of computation and storage cost. Provenance size is a major hindrance to the adoption of provenance in a resourceconstrained network. The provenance size increases drastically when the number of nodes in the network grow. The growing provenance size becomes the per formance bottleneck especially in Wireless Sensor Networks (WSNs). Different solutions have been proposed in the literature to compress the provenance in formation along with its security. However, in existing provenance compression schemes, the provenance’s size grows linearly with the number of nodes in a WSN. Furthermore, the existing provenance compression schemes are designed for static nodes only and do not account for the mobility factor. Moreover, some secure provenance compression schemes use overlapped arithmetic coding to compress the provenance information. However, there is no criterion to find the overlapping ratio. To overcome the above-mentioned issues, we have proposed a secure provenance compression scheme for mobile nodes of a WSN. Moreover, a novel mechanism has been devised to calculate the overlapping ratio for overlapped arithmetic coding. Furthermore, the proposed scheme assures the confidentiality, integrity, and fresh ness of the provenance information. It is evident from the simulation results that the proposed scheme has higher compression and lower false positive rate.