Search or add a thesis

Advanced Search (Beta)
Home > Scattering of Electromagnetic Waves from Perfect Electromagnetic Conductor Pemc Structures

Scattering of Electromagnetic Waves from Perfect Electromagnetic Conductor Pemc Structures

Thesis Info

Author

Shakeel Ahmed

Department

Deptt. of Electronics, QAU.

Program

PhD

Institute

Quaid-i-Azam University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2009

Thesis Completion Status

Completed

Page

x, 117

Subject

Electronics

Language

English

Other

Call No: DISS/Ph.D ELE/145

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676718715514

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

بناوٹ اور مکاری

چیزوں کو چھپانا محض کمزور قسم کی پالیسی اور عقل ہے ۔ جبکہ مضبوط عقل اور طاقتور دل رکھنے والے جانتے ہیں کہ کب سچ بولنا ہے اوروہ واقعتاً ایسا کرتے ہیں ۔اس لیے یہ کمزور قسم کے سیاست دان ہیں جو اپنی سیاسی طاقت کو چھپارکھتے ہیں ۔ (Tacitus) کہتا ہے کہ (Livia) اپنے خاوند کی فن کاریوں اور بیٹے کی(Simulation)سے اچھی طرح متفق تھی ۔ Simulationکے فن کو Augustusاور Dissimulation کو Tiberiusسے منسوب کیا جات ہے۔ اور دوبارہ جب Mucianusنے Vitelliusکے خلاف بغاوت میں Vespasianکی مدد کی، وہ کہتا ہے کہ ہم Augustusکی باریک بینی اورTibrerius کی رازداری کے خلاف بغاوت نہیں کرتے، آئین جہانبانی اور مکاری یا راز داری وہ خوبیاں ہیں جو کہ بلا شبہ عادات اور صلاحیتوں کو نمایاں کرتی ہیں۔ اگر آدمی میں فہم و فراست کی طاقت ہے کہ وہ چیزوں کی حقیقت کو نیچے تک دیکھنے کی صلاحیت رکھتا ہے، جیسا کہ وہ سمجھ سکتا ہے کہ کونسی چیزوں کو واضح بیان کرنا ہے اور کیا راز میں رکھنا ہے۔ اور کس کو اور کب کیا آدھا بیان کرنا ہے اور آدھا چھپا کر رکھنا ہے۔ جیسا کہTacitus ان کو حکومت کے فن اور عام روزمرہ زندگی کے معاملات کی مہارتیں کہتا ہے۔ مکاری اس کی عادات کے لیے ایک رکاوٹ اور کمزوری تھی ۔ اگر آدمی سمجھ بوجھ کی طاقت حاصل نہیں کر سکتا تو اسے راز داری یا چیزوں کے چھپانے کو عام طور پر ترک کر دینا چاہیے ۔ جہاں آدمی انتخاب نہیں کر سکتا یا اپنے آپ کو حالات کے مطابق نہیں ڈھال سکتا تو اسے چاہیے کہ اپنے آپ کو محفوظ راستے پر ڈال دے ۔ اس آدمی کی طرح آہستہ آہستہ چلے جود دیکھ نہیں سکتا یقیناً قابل آدمی ہمیشہ اپنے معاملات میں صاف گوئی سے کام لیتے ہیں اور صاف گوئی میں...

ملت ابراہیمی کے احیاء کےلیے حضرت عبدالمطلب کی کاوشیں قرآن کی روشنی میں : ایک تحقیقی مطالعہ Efforts of Hazrat Abd al-Muṭṭalib for the Revival of Millat-e-Ibrāhimī in the Light of the Qur’ān: An Exploratory Study

This exploratory study delves into the remarkable efforts of Hazrat Abd al-Muttalib, the revered grandfather of the Holy Prophet Muhammad, in rejuvenating the Millat-e-Ibrahimi, the Abrahamic faith, in pre-Islamic Arabia. This study investigates the pivotal role played by Hazrat Abd al-Muttalib in preserving and strengthening the monotheistic beliefs of his forefathers, Abraham and Ishmael, against the backdrop of a polytheistic society. Drawing from historical accounts, oral traditions, and early Islamic sources, the research uncovers the strategies and initiatives employed by Hazrat Abd al-Muttalib to foster unity among the disparate Arabian tribes and uphold the principles of monotheism. This study sheds light on a crucial yet often understudied period in Islamic history, exploring the legacy of Hazrat Abd al-Muttalib as a precursor to the prophethood of his grandson, the Holy Prophet Muhammad. By examining his actions and their impact, it provides valuable insights into the early foundations of the Islamic faith and the broader context of religious development in the Arabian Peninsula. Keywords: Hazrat Abd al-Muṭṭalib, Millat-e-Ibrāhimī, Abrahamic faith, Pre-Islamic Arabia, Monotheism, Revival efforts, Arabian tribes۔

Modelling Interaction Using Trust and Recommendations in Pervasive Computing Environment

Pervasive computing is characterized by large numbers of roaming entities and the absence of a globally available fixed infrastructure. In such an environment entities need to collaborate with little known or even unknown entities. In traditional environments with clearly defined administrative boundaries security decisions are usually delegated to a centralized administrative authority. In the pervasive computing environment no single entity can play this role, entities are required to make their own security decisions and as a result traditional techniques are not an option. Human notion of trust enables human societies to collaborate and interact based on personal and shared experiences. Thus a security model based on the real world characteristics of trust can provide the internal security for autonomous computing devices embedded in pervasive environment before taking action, despite uncertainty and inadequate information. The work presents an adaptive trust and recommendation based access control model based on human notion of trust. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any past interaction with the service. A mathematical formula together with adaptable security policies is introduced to handle malicious strategic attack in direct trust computation. The model encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. The performance of indirect trust computation models (based on recommendations) can be easily compromised due to the subjective and social-based prejudice of the provided recommendations. Eradicating the influence of such recommendation remains an important and challenging issue in indirect trust computation models. An effective model for indirect trust computation is also proposed which is capable of identifying dishonest recommendations. Dishonest recommendations are identified by using deviation based detecting technique. The concept of measuring the credibility of recommeni dation (rather than credibility of recommender) using fuzzy inference engine is also proposed to determine the influence of each honest recommendation. The proposed model has been compared with other existing evolutionary recommendation models in this field, and it is shown that the model is more accurate in measuring the trustworthiness of unknown entity. An XML-over-UDP based recommendation exchange protocol to share recommendation information between smart devices, is also outlined to complement the model. Implementation of the proposed model on android smart phone using OSGi is presented to demonstrate the effectiveness of the protocol in pervasive computing environment. Experimental results demonstrate that using HTTP or TCP for recommendation exchange between smart devices in wireless environment lead to significantly higher overhead as compared to XML-over-UDP. In general, our research work presents a comprehensive framework for secure trust based access control that will augment future research towards real world implementation of pervasive computing environment.