Search or add a thesis

Advanced Search (Beta)
Home > Timeline History of Pakistan Movement

Timeline History of Pakistan Movement

Thesis Info

Author

Husnain Warraich

Department

Department of Computer Science, QAU

Program

MSc

Institute

Quaid-i-Azam University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2012

Thesis Completion Status

Completed

Page

45

Subject

Computer Sciences

Language

English

Other

Call No: DISS/M.Sc.COM/1965

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676716271009

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

وچھوڑے دا دکھ

وچھوڑے دا دکھ
(آنحضور قبلہ خواجہ سائیں ملتان شریف ملک خورشید صاحب کے ہاں تشریف لے گئے
راقم کی ڈیوٹی دربار اقدس پر لگائی اس وقت یہ اشعار تحریر میں آئے )

تیرے باہجھوں جگ سارا دسدا ہنیر وے
ماڑی والے خواجہ سائیاں واگاں چھیتی پھیر وے

کلاّ نئیں میں جگ سارا ہویا ہے اداس وے
ہر کہیں نوں ملنے دی لگّی ہوئی پیاس وے

واسطے خدا دے ہن کریں نہ توں دیر وے
تیرے باہجھوں جگ سارا دسدا ہنیر وے

سائیں دے فقیر نت در تیرے آئوندے
دیکھ خالی تھاواں ہُن پچھاں مڑ جائوندے

سبھناں دے دلاں اُتے غماں والے ڈھیر وے
تیرے باہجھوں جگ سارا دسدا ہنیر وے

پیا باہجھوں دل میرا بہو ہے پکار دا
پتہ مینوں لیاء کے دیو کوئی سوہنے یار دا

اللہ جانے دور تھیسیں کدوں ایہہ نکھیر وے
تیرے باہجھوں جگ سارا دسدا ہنیر وے

تیرے بناں لکّھاں ایتھے کسے دی نہ کار وے
ہکناں دے بھاگ بھلے لکّھاں نوں پئے تار دے

در تیرا ایویں ساہنوں جیویں اجمیر وے
تیرے باہجھوں جگ سارا دسدا ہنیر وے

قادری سائیںؔ تیرے شعر ہے بناوندا
سجناں دے باجھوں پیا دل کرلائوندا

شام لنگھ جائے تاہنگاں رکھیاں سویر وے
تیرے باہجھوں جگ سارا دسدا ہنیر وے

Students’ Awareness and Usage of Open Educational Resources (OER) as Learning Tool in their Course Studies at the University of the Philippines Open University (UPOU)

The abundance of technology nowadays is contributing to the development of learning practices. This gives learners greater opportunity to find, access, and use resources to benefit learning. Open educational resources (OER) are one of the few educational developments that emerged with technology. While it is true that there are a lot of OERs available on the internet, it is unsure how many learners are aware of their existence. This research aimed to identify how many students are aware of OERs, where they use OERs, and whether the educational institution encourages OERs. The researchers surveyed several students within the University of the Philippines Open University. The survey included learner demographics, statistics on learners' awareness and usage of OERs, learners' OER access locations, and the challenges they encounter when using OERs. The survey showed that the learners, regardless of age, are aware of OERs. They mostly access videos, research, and journals on web pages and Wikis. They find the OERs accessible and relevant, but reliability and visibility are challenging.

Digital Watermarking for Image Authentication and Recovery

Revolution in generation, storage, and communication of digital information has brought about profound changes in our society. The digital information age has evolved with numerous opportunities and new challenges. The goal of this thesis is to provide a framework based on watermarking techniques that can be used for verifying the integrity of a cover work along with the recovery of the intentionally/unintentionally distorted cover work. In this context, multiple semi- fragile watermarking techniques are proposed for not only protecting the digital content from alteration but also to recover it after alteration. In these techniques, watermarks remain intact with the image under minor enhancement and is broken only in case of major manipulations. In this thesis, a hybrid scheme is developed that can both authenticate and recover the altered image. The first phase of this thesis encompasses an improvement of a self-recovery authentication scheme for digital images. The second phase then considers the reduction in computational complexity. Finally, a novel model is proposed in the third phase that not only perform accurate authentication of images but also recovers the altered image. In this thesis, the concept of multiple watermarking is employed; authentication and recovery watermarks. Both of these independent watermarks strengthen the security aspect of each other and it is user choice to use both of the watermarks or one of them according to the requirement of application. The authentication watermark is correlated to the host image for resisting collage attack and then embedded in the wavelet subbands. Unlike the conventional block-based approaches, it has the ability to determine the regions concisely where the integrity verification fails. The recovery watermark recovers the image with original quality even after manipulation of the watermarked image. Lossless compression (Huffman coding) and BCH (Bose, Ray-Chaudhuri, and Hocquenghem) coding are utilized while generating the recovery watermark. Integer DCT is utilized instead of conventional DCT because the integer DCT contents can be highly compressed by Huffman coding. In addition, integer wavelet transform, which is a fast approach of discrete wavelet transform, also reduces the computational complexity of the proposed algorithm. In contrast to the earlier authentication algorithms, the proposed techniques exploit flexibility in both of the watermarks, where a trade-off can be made by the user according to the requirement of application. Experimental investigations are performed to evaluate the performance of multiple semi-fragile watermarks. It is demonstrated that the performance of the proposed methods is better compared to the conventional block-based approaches in context of tamper detection. In summary, efficient techniques have been developed in this thesis which makes trade-off between three contradicting properties of watermarking; imperceptibility, robustness, and capacity. The proposed watermarking techniques are able to answer these questions, i) Has the image been processed? ii) Has the image been processed incidentally or maliciously? iii) Which part of the image has been processed and how much? Additionally, a self-recovery approach makes it possible to recover the exact version of the host image even after the image has been incidentally/maliciously processed.