Search or add a thesis

Advanced Search (Beta)
Home > Scanning Electron Microscopy of High Temperature Superconductors

Scanning Electron Microscopy of High Temperature Superconductors

Thesis Info

Author

Naseer Ahmad

Department

Deptt. of Physics, QAU.

Program

Mphil

Institute

Quaid-i-Azam University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

1989

Thesis Completion Status

Completed

Page

97

Subject

Physics

Language

English

Other

Call No: DISS/M.Phil PHY/82

Added

2021-02-17 19:49:13

Modified

2023-02-19 12:33:56

ARI ID

1676717664723

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

ایم ۔ حبیب خان

ایم۔ حبیب خاں
یہ سطریں زیر تحریر تھیں کہ معلوم ہوا کہ جناب ایم حبیب خاں بھی رحلت فرماگئے وہ انجمن ترقی اردو ہند کے اسسٹنٹ سیکریٹری اور جناب خلیق انجم جنرل سیکریٹری کے دست راست تھے، نیک طبع اور شریف انسان تھے، جب بھی ملاقات ہوتی تو اپنے خلوص و محبت کا نقش دل پر بٹھا دیتے، دارالمصنفین سے بھی لگاؤ رکھتے، گزشتہ برس لکھنؤ میں ملاقات ہوئی تو دیر تک اس کے مسائل پر تبادلہ خیال کرتے رہے، مدت دراز سے انجمن سے وابستہ تھے، ادب و تنقید ان کا خاص موضوع تھا، اس پر ان کی کئی کتابیں چھپ چکی ہیں، ۶۴؍ ۶۵ برس عمر رہی ہوگی اور صحت اچھی تھی مگر دو ماہ قبل جگر کے کینسر کا عارضہ ہوا اور چل بسے اﷲ تعالیٰ اپنی رحمت کاملہ سے نوازے۔
(ضیاء الدین اصلاحی، مارچ ۱۹۹۸ء)

 

پاکستان میں رائج جبری شادیوں کا تعارف اور شرعی جائزہ

The Islamic Jurisprudence has given a great importance to the existence of family system of life. That is why the Qur‘ān has described the laws of family life with details in comparison with worship of Allah. In family system of life, marriage has a great importance but marriage is not only essential part of worship. Its purposes one the existence   of human generation along with the survival society where there must be modesty and justice but it is only possible if the family system of life is established on everlasting principles. That is why our Islamic Jurisprudence has declared the willingness of both bridegroom and bride and their family more importance in the marriages. Such marriages are always durable and permanent. On the contrary, if there is no willingness of both the bridegroom and bride in marriages. Then such marriages are not durable and permanent. In marriage a girl is a party and the Islamic jurisprudence has given a great deal of importance to her willingness but in pusthoon society, sometimes such marriages are conducted in which the bride concerned has no approval rather she is forced to accept that bond of marriage such marriages are commonly called “Forced Marriages”. The article below is defining the different kinds of forced marriages in vogue and is trying to find out their religious and dogmatic status as well.

Protection of Client Data Confidentiality and Computation Integrity in Infrastructure As a Service Based Cloud

One of the most critical issue to the wide adoption of cloud-based services is the concern about the client data confidentiality and computation integrity. Research work [Wang et al., 2015][Vasudevan et al., 2016] in the past on cloud platforms security has predominantly focused either on protecting these platforms from malicious cloud clients or on protecting cloud clients from each others unwanted activities. The problem of protecting clients from the possible malicious acts of insiders such as cloud providers is not adequately addressed. In this dissertation, we present a practical approach to protect client data confidentiality and computation integrity from cloud insiders, such as cloud administrator, in an infrastructure-as-a-service (IaaS) based cloud environment. Our approach makes use of remote attestation[Coker et al., 2011], and a late launch based technique, called Flicker[McCune et al., 2008], to verify the integrity of the cloud platform. This technique secures the virtual machine (VM) launch operation and further allows the launched VM to perform operations on sensitive data in full isolation. We have demonstrated through a real-world scenario of how the origin integrity and authenticity of health-care multimedia content processed on the cloud providers platform can be verified using digital watermarking in a secure and isolated execution environment without revealing the watermark details to the cloud administrator. We have also demonstrated using formal verification tool ProVerif that cryptographic operations and protocol communication cannot be compromised using a realistic attacker model. Performance analysis of our implementation demonstrates that it adds negligible overhead. In this dissertation, we have also presented a framework to rank cloud platform nodes according to the security guarantees they provide. Platform ranking helps to meet the needs of organizations with different security requirements. The framework introduces averification is indirectly perform Trusted Party (TP) for the verification of security properties of a cloud platform to the clients. The given framework is also thin client friendly as platform attestation and verification is indirectly performed through TP without the direct involvement of clients. Performance analysis shows that the cost of our presented approach is lower in order of magnitude when compared with traditional trusted computing based solutions.