Search or add a thesis

Advanced Search (Beta)
Home > i work manager

i work manager

Thesis Info

Author

Jawad Nasir

Supervisor

Muhammad Nasir

Department

Department of Computer Science

Program

BS

Institute

International Islamic University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2014

Thesis Completion Status

Completed

Page

41

Subject

Computer Science

Language

English

Other

BS 005.3 JAW

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676721874466

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

ادب میں دلچسپی

ادب میں دلچسپی

                ناطق کو بچپن ہی سے ادب میں گہری دلچسپی تھی بتاتے ہیں کہ وہ میٹرک تک نصاب کی کتا بیں نہیں پڑھا کرتے تھے بلکہ دوسری کتابو ں کو پڑھنے اور گھر کے پاس سکول کی لائبریری جانے میں زیادہ دلچسپی تھی اور بقول ان کے انھوں نے بچپن میں ہی ایسی کتا بیں پڑھ رکھی تھیں جن میں کسی کوکم ہی گہری دلچسپی ہو سکتی ہے مثلاً ’’داستان امیر حمزہ‘‘’’الف لیلا‘‘ یہ کتابیں وہ بچپن میں ہی پڑھ چکے تھے اور ان میں سے بہت سے صفحات ان کو زبانی یاد بھی تھے ایک دلچسپ واقعہ جس کاذکر کرتے ہوئے وہ کہتے ہیں :

’’آب حیات کتاب جب میں نے پڑھی تو وہ مجھے ایسے ماحول اور کلچر میں لے گئی کہ وہ کتاب میں نے تقریباًچالیس دفعہ پڑھی ہوگی جب بھی پڑھتا ہوں تو ایک نیا لطف آتا ہے۔میں نے سوچا کہ شاعر ایسے ہوتے ہیں یہ تو بہت اچھے لوگ ہیں اور ان کی حرکتیں  بھی مجھے راس آئیں اس میں جتنے شاعر تھے میرے لیے خاص طور پر ان دنوں وہاں مجھے انشاء جی بہت بھائے جس طرح مولوی آزاد صاحب نے مصحفی ساتھ ان کی مبالغہ آرائی کروائی ہے۔بچپن میں ایک بندے کو ہیرو کی طرح سمجھ لیا جاتا ہے میرے لیے مصحفی ان دنوں ولن تھا مولوی آزاد نے ان کو ولن بنا کررکھ دیا تھا۔اب ہوش آیا توپتا چلا مولوی آزاد کیسے کھیل کھیلتے تھے۔(2)

                کتابوں سے دلچسپی ان کی نہ صرف ادب سے راہیں ہموار کرتی گئی بلکہ ادبی دنیا میں ممتاز لکھاری کے طور پر پہچان کا باعث بنی۔

The British Colonial Encounter with the Pukhtuns: An Appraisal of Faqir Ippi’s Struggle against the British Raj (1936-1947)

The North-West Frontier region of the British Empire in India during the Great Game was part of the ‘Ring Fence Strategy’, framed by the Raj against its adversaries and rivals in Central and South Asia. To protect her ‘Jewel in the Crown’- India, the British Raj made several moves in the strategically placed Pukhtun1 land. The Pukhtun populace, adherent to their centuries old code of conduct, Puḳhtūnwali, consistently resisted the British encroachment of their territory. Mirza Ali Khan, popularly known as Faqir Ippi, was one of the many freedom fighters who challenged the imperialist power in this region. Taking notice of Islam Bibi’s case, a Hindu Convert, Faqir Ippi mobilized the Pukhtuns of Waziristan in defying and fighting the British. He was a serious contestant to the British authority with his well-known fighting skills, effective planning and guerilla tactics in one of the most difficult terrains. The entire Tribal Belt, especially Waziristan, proved to be a ‘turbulent frontier’ for nearly eleven years, i.e. 1936-1947. This insurgency started bringing bad name to the crown and encouraging others to rise against the British. To contain and end Faqir Ippi’s resistance, Governor George Cunningham hired the locals to instigate and bribe his followers to rise and fight against him. The aim of this paper is a critical evaluation of the British strategy in this region and an appraisal of Faqir Ippi’s response and assessment of how successful he was in invigorating Pukhtun resistance to defend their motherland, using both colonial and local sources.

Securing Routing in Mobile Adhoc Networks Manets Form Insider Attackers Through Trust Management

Routing, having focal responsibility in MANET’s successful operation, are based on the assumption of nodes’ cooperation. However, this assumption exposes routing to various insider attackers. These attackers are the legal participants having privileged access to network when inducing attacks on routing. Furthermore, these insider attackers are either in the form of selfish nodes or malicious nodes. The motive of selfish node is saving its resources by not cooperating in routing activities whereas the purpose of malcious node is to attack the network. Therefore, providing security in routing against affirmed attackers has emerged a challenging issue in MANETs. In research community, trust management schemes are used to defend routing against insider attackers. The very focus of this research is to develop a trust management scheme for securing routing from insider attackers to launch blackhole and greyhole attacks. We proposed a trust management scheme, named as MT-SECURER (“Multi Factors Trust for Secure and Reliable Routing in MANETs”), for making routing secure against insider attackers (i.e., blackhole and greyhole attackers). This scheme develops trust from multiple factors, i.e., “node’s cooperation” from communication networks and “node’s relationship maturity” and “mutual friends” from social networks. Whereas for trust development, nodes’ personal observations along with neighbours’ recommendations are utilized. Neighbors’ recommendations, having a pivotal role in computation of trust, if hampered may entail in colossal attacks from dishonest trust recommenders such as “bad mouthing”, “ballot stuffing” and “random opinion”. Therefore, mitigation of dishonest trust recommendations has emerged as a stimulating research issue in trust management systems. In order to cater these challenges associated with dishonest trust recommendations, a technique named “intelligently Selection of Trust Recommendations based on Dissimilarity factor (iSTRD)” has been devised. iSTRD exploits observer node’s personal experience in conjunction with majority vote of the recommenders for removing dishonest trust recommendations. For performance analysis, MT-SECURER is used with AODV and DSR routing protocols and detail simulations are performed in order to examine the proposed scheme’s effectiveness in presence of blackhole and greyhole attackers and nodes’ mobility. The experimental results show significant improvement in “detection rate”, “packet delivery ratio”, throughput and “normalized routing load” with slightly increased “average end-to-end delay” when compared to contemporary schemes. Furthermore, iSTRD successfully removes the trust recommendations of “low trustworthyrecommenders” aswellasdishonesttrustrecommendationsof“highlytrustworthy recommenders”. Its efficacy is evident from enhanced accuracy of “recognition rate”, “false rejection” and “false acceptance”. Moreover, experiential results depict that iSTRD has unprecedented performance compared to contemporary techniques in presence of “bad mouthing”, “ballot stuffing” and “random opinion” attacks.