Search or add a thesis

Advanced Search (Beta)
Home > Online Electronics Business

Online Electronics Business

Thesis Info

Author

Fahad Alishah

Supervisor

Basit Raza

Department

Department of Computer Science

Program

BCS

Institute

COMSATS University Islamabad

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2015

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676719999112

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

المبحث السادس: وفاتها

المبحث السادس: وفاتها
خرجت بروین شاکر في صباح 26 دیسمبر 1994م في الساعۃ التاسعۃ حسب الروتین الیومي من بیتھا ذاھبۃ إلی عملھا، ولکن بسبب انقطاع الکھرباء کانت الإشارات (إشارات المرور، أو إشارات الطریق) لا تعمل، وکان سائقھا أراد أن یقطع الطریق فاصطدم بالباص الممتلئ بالمسافرین، توفي السائق في مکان الحادث علی الفور، ونُقلت الشاعرۃ في حالۃ خطرۃ إلی مستشفی إسلام آباد، حاول الأطباء مداواتها ولكن لم يفلحوا۔
وبوفاۃ الشاعرۃ المعروفۃ بروین شاکر قامت ضجۃ في الأدب الأردو، وقد فقد الأدب والشعر الأردو أکبر منتج لدیهما۔ وھذا الموت المفاجيء قد أصاب علی الشعر الحديث بمسحة من الیأس والحرمان۔ ودُفنت الشاعرۃ في26 دیسمبر في مقبرۃ (H.8) ایتش، ایت في إسلام آباد. تقول الشاعرۃ:
مر بھی جاؤں تو کہاں لوگ بُھلا ہی دیں گے
لفظ میرے، مرے ہونے کی گواہی دیں گے

الترجمہ: إ ذا متت، فالناس لن تنساني
کلماتي، ستشھد علی وفاتي

کارڈز میں کفالہ کی شرعی و فقہی حیثیت اور عصرِ حاضر کے مالیاتی اداروں میں اس کا عملی تطبیق

Cards are the plastic money of current era, and Kafala by means of their warranty is little much we know about. In this article we will discuss the necessity, use and framework of Kafala for the Debit & Credit cards issued by banks and financial institutes, in the light of Qur’an and Sunnah, Ijma-e-Umma and religious researchers.

Trust Based Security Framework for Secure Routing in Mobile Ad Hoc Networks

Trust Based Security Framework for Secure Routing in Mobile Adhoc Networks Mobile Ad hoc Networks (MANETs) are infrastructure-less networks without central authority. Messages among distant nodes are exchange using multi-hop communication with an assumption that all nodes are trustworthy. However, aforementioned assumption is beyond reality in a network, such as MANETs. A relay node may misbehave by dropping or altering messages either to save resources or due to the malicious intention. To cater for the aforementioned security issues, range of trust-based security schemes has been proposed in the literature to detect and mitigate the adverse e ect of the misbehaving nodes in MANETs. Most of the existing trust-based security schemes in MANETs lack comprehensive and adaptive trust criteria. Proposed schemes are based on single trust attribute, such as packet loss. Each packet loss is considered as an indicator of possible attack by a malicious node. However, there can be several reasons of packet loss, such as interference, queue over ow, and node mobility. Moreover, single trust attribute may cause the bootstrapping problem, which refers to the time required for the evaluation of the trustworthiness of a node. Because of the bootstrapping problem, malicious nodes remain undetected for longer period of time, thus providing more opportunities to malicious nodes to carry out adverse activities. Furthermore, use of static trust parameters, such as trust threshold, weights assignment torst-hand and second-hand reputation information, and trust update frequency in existing trust-based security schemes may result in high false positives rate, low malicious node detection rate, and network partitioning. To address the aforementioned challenges, we have presented an Adaptive Trustbased Security Framework (ATSF) that is based on the comprehensive trust criteria with adaptive trust parameters. The ATSF is based on the multi-attribute trust criteria with a mechanism to identify the real underlying causes of packet losses. Moreover, the ATSF adapts and update the trust parameters, such as xi trust threshold, weights assignment torst-hand and second-hand reputation information, and trust update frequency, based on the run-time network conditions. We provide an implementation of ATSF on a standard routing protocol, the Optimized Link State Routing (OLSR) protocol, and evaluate it through extensive simulations with NS-2 under varying network conditions. We have evaluated the e ectiveness and performance of the ATSF in comparison to existing trust based security schemes under di erent network parameters and con gurations. The experimental results show that the ATSF achieves 98{100% detection rate of malicious nodes with only 1{2% false positives. Moreover, ATSF achieves 75{90% packet delivery ratio compared to 65{80% of static scheme with slight increase in end-to-end delay and energy dissipation of the nodes.