Search or add a thesis

Advanced Search (Beta)
Home > E-Property

E-Property

Thesis Info

Author

Muhammad Umair Abid

Supervisor

Basit Raza

Department

Department of Computer Science

Program

BCS

Institute

COMSATS University Islamabad

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2017

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676719895338

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

اپنی مثال آپ

اپنی مثال آپ
ڈاکٹر غلام شبیر اسدؔ
ہر چند شاعری تخلیقی محرک کی محتاج ہوتی ہے مگر موضوعی شاعری دراصل اس وقت زور دارہوتی ہے جب فیضان و عقل، جذبِ درروں اور بیدار قوتِ فیصلہ یا پھرشعور و لاشعور کے دھارے آپس میں مل جاتے ہیں۔یہ وہ مقام ہوتا ہے جہاں عرفان و وجدان اور فہم وخرد کی توانائی ایک دوسرے کو سہارتے ہوئے باہم آمیز ہو جاتے ہیں۔یہ حقائق اپنی جگہ بجا لیکن جب بھی کسی تخلیق کار کو اخلاقی موضوع کا سامنا کرنا ہوتا ہے تو شرطِ اوّل کے طور پر ذہنی وقلبی،نزہت و متانت ، نیاز مندی ،عاجزی و انکساری اور مثالی اسلوبِ کلام کا حامل ہونا لازم آتا ہے۔متحرک و منور اسلوب کی بنیادی غذا ،تخلیق کار کی شخصیت، حُبِ موضوع ،مقام کا حاملعلم و کردار ،تقویٰ و ایمان ،طبعی مناسبت، تہذیب کے اِساسی زاویوں سے آگاہی اور وفورِ شوق سے تیار ہوتی ہے۔اردو نعتیہ سرمائے کی متنوع جہات میں سیرتِ النبیﷺ کے حتی الامکان پہلوئوںکواجاگر کرنا کسی بھی شاعر کے لیے آزمائش سے کم نہیں ، پھر اس سے بڑی آزمائش ہیئت مسدس میں اظہار، جس کا مزاج ہمیشہ متقاضی رہا ہے کہ مترنم اور رواں دواں وسہل اوزان کے ساتھ ساتھ دلوں میںاترتا شفاف کومل لہجہ اورآبِ زُلال سے دھلی زبان شیتل سی مخمور لے پوری قدرتوں کے ساتھ بہم ہو۔میں سمجھتا ہوں کہ یہ سب لطائفِ پر نور روحِ بندگی سے میسر آتے ہیں۔ اگر ایسا نہ ہو تو معلومات کو شعر میں لانے سے ثقالت کا احساس حاوی رہتا ہے، جس کامسدس متحمل نہیں ہو سکتا۔
انھی موضوعی اور معروضی خوبیوں کے سبب پورے وثوق سے کہا جا سکتا ہے کہ مسدس ہی ایک ایسی صنفِ سخن ہے جسے دنیا بھر کی مستند و اعلیٰ نظموں کے مدِ مقابل رکھا جاسکتا ہے۔
انیس، دبیر حالی ، چکبست ،امانت...

The Risk of Developing Central Line-Associated Bloodstream Infections in Integrated Health Care System of Pakistan-A Meta-Analysis

Studies regarding the prevalence of CLABSIs in Pakistan are limited. However, it is known that healthcare-associated infections are a concern in many low- and middle-income countries, including Pakistan. The present study is aimed to identify the relative risk of developing CLABSIs in the hospital care setups of Pakistan. The risk of biases in included studies was assessed using Cochrane tool parameters. Analysis of results revealed a relative risk of getting CLABSIs is 1.78 (p<0.001) among patients admitted in the hospitals for greater than 72 hours. This shows that the chances of getting infected at the central line site were more than 50% among patients admitted to ICUs in Pakistan. It has been concluded that the relative risk of CLABSIs in the integrated healthcare system of Pakistan is high.   DOI: https: //doi. Org/10.59564/amrj/01.01/003  

Black Hole Attacksprevention Through Mac Based Aodv Protocol in Constraint Oriented Networks

Wireless sensor network (WSN) consists of a large number of sensor nodes with data collecting, processing and communication capabilities. Its primary objectives are how to exchange information securely to achieve authenticity, integrity and availability of data in an efficient manner. These networks are easily compromised by different attacks, i.e. Jamming attacks, Denial of service attacks (DoS), Sybil attacks, tampering attacks, and Black hole attacks. Black hole attacks are one of the most lured attacks that are used to highjack the security, functionality and performance of the WSNs. Ad hoc on demand distance vector (AODV) and Enhanced ad hoc on demand distance vector (E-AODV) protocols were proposed to resolve this issue. However, a tightly coupled issue associated with these approaches is their inconsistency to block an intruder node, i.e. every node doesn?t know anything about an intruder node until this information is shared by the concerned destination node. Moreover, communication process with the concerned destination node is an energy harvesting and time consuming process. Therefore, an energy efficient and secure routing protocol is needed to resolve the aforementioned issue i.e., black hole attack. In this research, a secure and lightweight routing protocol is proposed to prevent black hole attacks in constraint oriented networks i.e. WSNs, IoT and ad hoc networks. The proposed scheme is a hybrid of media access control (MAC) and Ad hoc on demand distance vector (AODV) protocols. Initially, every node is registered with nearest gateway/Cluster Head module through the MAC addressing scheme and only registered nodes are allowed to communicate. Registration process is useful in solving black hole attacks in WSNs i.e. due to communication restriction, intruder node(s) cannot interact either with gateway/CH or registered nodes. If somehow an adversary is able to send a message to the controller, it is not entertained or simply neglected by gateway/CH module. Simulation tool OMNeT++ was used to verify the authenticity, performance and security of the proposed scheme against field proven techniques such as AODV and EAODV.The simulation results of the proposed scheme were compared with the said techniques on the basis of key parameters such as latency, packet lost ratio and end to end delay.