Search or add a thesis

Advanced Search (Beta)
Home > The Weibull Distribution for Paired Comparison Modeling & the Bayesian Analysis of Developed Model

The Weibull Distribution for Paired Comparison Modeling & the Bayesian Analysis of Developed Model

Thesis Info

Author

Said Farooq Shah

Department

Department of Statistics, QAU

Program

Mphil

Institute

Quaid-i-Azam University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2013

Thesis Completion Status

Completed

Page

83

Subject

Statistics

Language

English

Other

Call No: Diss/ M.Phil / STAT / 159

Added

2021-02-17 19:49:13

Modified

2023-02-19 12:33:56

ARI ID

1676718291070

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

منشی عطاء اﷲ

منشی عطاء اﷲ 
افسوس ۲؍ فروری کو دارالمصنفین کے مخلص اور قدیم کارکن منشی عطاء اﷲ صاحب نے داعی اجل کو لبیک کہا، ان کا اصلی وطن کیرانہ ضلع مظفرنگر تھا، ۱۹۱۶؁ء میں دارالمصنفین میں پریس قائم ہوا تو ان کے بڑے بھائی منشی عبدالحفیظ صاحب مرحوم نے اس کے انصرام کی ذمہ داری قبول کی، ان ہی کے ساتھ یہ بھی اعظم گڑھ آکر شعبۂ طباعت سے وابستہ ہوئے، جب کبرسنی کی وجہ سے ملازمت ترک کرنی چاہی تو سید صباح الدین صاحب مرحوم کا شدید اصرار اس میں مانع ہوا، پھر اپنے سعادت مند فرزند ڈاکٹر محمد نعیم ندوی کے اصرار سے گھر پر آرام کرنا منظور تو کرلیا لیکن ان کا دل دارالمصنفین ہی میں لگا رہتا تھا، اس لیے جب تک قوت رہی برابر دوسرے تیسرے روز یہاں آتے رہے، وہ طبعاً نیک، صلح پسند اور دیندار تھے، اپنی دینداری کی وجہ سے اپنے اکلوتے بیٹے ڈاکٹر محمد نعیم ندوی کو حفظ کرانے کے بعد ندوہ میں داخل کیا، جو فراغت کے بعد دارالمصنفین کے رفیق رہے اور اب ابوظہبی کے محکمۂ شرعیہ سے وابستہ ہیں، منشی عطاء اﷲ صاحب اپنی نیکی، بھلمنساہت اور ملنساری کی وجہ سے شہر میں مقبول تھے، اﷲ ان کی مغفرت فرمائے اور متعلقین کو صبر جمیل عطا فرمائے۔
(ضیاء الدین اصلاحی، فروری ۱۹۹۲ء)

 

DOSE RESPONSE OF PLYOMETRIC TRAINING ON AGILITY IN CRICKET PLAYERS

Aims of Study: From last one decade, advancements in formats of cricket demand agility in the players so that they can play in better way without injury. The aim of this study was to determine which dose of plyometric training is effective to enhance agility in cricket players. Methodology: Randomized Controlled Trial was registered in US clinical Trial registry (NCT04350385). 40 cricket players were recruited in study, out of which n=20 players were placed in experimental group and n=20 players were in control group. Assessments were taken as baseline and after third week and on sixth week through Illinois Agility Run test, T test and Vertical jump test. Data analysis was done through SPSS version 23. Independent t test was used for between group analysis and paired t test for within group. Results: Group comparison through T-agility and Illinois test shows significant effect in experimental group (p>0.009). Post intervention Mean±SD of vertical jump test in experimental group was 31.90±2.55 with significant effect (p=0.001). Limitation and Future Implications: This study can be done on both genders. Players can improve their performance by working on plyometric training and agility. Originality: This was original work and never published before. Conclusion: It is concluded from this study that plyometric training is effective in improving agility of the cricket players. Players can improve their performance by working on plyometric training and agility.

Extending the Authentication Mechanism in Ip Multimedia Subsystems for Universal Mobile Telecommunication System

IP multimedia subsystem (IMS) is an emerging platform for provisioning multimedia services (e.g., data, voice, and video) in 4G/5G networks. IMS authentication is an important procedure which grants legitimate users to access multimedia services. However, periodic re-authentication of mobile users results in significant signaling traffic overhead due to complete execution of hectic procedure. Moreover, signaling protocol such as SIP overlooks user’s confidentiality by leaving unprotected public and private identities. In IMS each user entering from another network like UMTS or VOLTE has to authenticate itself. However, it already passed through the same authentication process in its own network. Therefore, IMS core entities are affected by high signaling that could be a source of congestion. . The Session Initiation Protocol (SIP) is used in IMS to establish and manage sessions. It is easy for a hacker to attack IMS with flooding SIP messages. However, IMS does not provide any functions to prevent such kind of attacks. This research presents a secure aauthentication protocol (SAP) which creates a secure channel through the deployment of KMC (Key Management Center) for transmitting user identities; ECC (Elliptic curve cryptography) is used for key generation that provides reduced encryption and decryption time than existing schemes for IMS. FAP strives to minimize signaling overhead of periodic re-authentications. Once a user completes authentication, FAP grants a valid ticket for a particular time which can be used for subsequent re-authentications until it expires. This research introduce a header in SIP to hold the ticket. This research employ protocol composition logic for formal modeling and verification of SAP. The performance of SAP, FAP is validated through FOKUS IMS test bed. The results demonstrate the performance appraisal of FAP compared to other contemporary schemes in terms of signaling overhead, bandwidth consumption and response time. This research presents a Low congestion and Certificate based One-pass Authentication Protocol (COAP) that avoids duplication of authentication steps and makes its authentication efficient through the use of digital certificates. An authenticated user is allotted a certificate to restrict the repetition of complete authentication procedure until the certificate expires. COAP results in reduction of signaling traffic, which eliminates v the congestion problem, it also reduces bandwidth and delivery cost which make this scheme more efficient in terms of bandwidth consumption. An intrusion detection system is designed where a pair of subsystems is working, one is spoofing detection and prevention subsystem and other is flooding detection and prevention subsystem. A zero-watermarking scheme detects the spoofing attack.Watermark embedding is done by the original author and extraction done later by KMC to prove ownership. The flooding detection system is working on misuse rules and anomaly detection algorithms which provide successful detection and prevention for IMS and VOLTE environment. The results has shown that better than other schemes it is compared to i.e. when the no of requests are 30 the detection rate is 90.19 however, when no of request are 40 the accuracy rate of the proposed scheme is 100 percent.