Search or add a thesis

Advanced Search (Beta)
Home > Benazir Income Support Programme its Impact on Food Security and Poverty in Sindh, Pakistan

Benazir Income Support Programme its Impact on Food Security and Poverty in Sindh, Pakistan

Thesis Info

Access Option

External Link

Author

Pasha, Muhammad Ali

Program

PhD

Institute

Shah Abdul Latif University

City

Khairpur

Province

Sindh

Country

Pakistan

Thesis Completing Year

2018

Thesis Completion Status

Completed

Subject

Economics

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/10683/1/Muhammad%20Ali%20Pasha_Eco_2018_SALU_PRR.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676724533311

Similar


This research investigates the Benazir Income Support Program (BISP) and its impact on food security on poverty in Sindh, Pakistan. Data was collected from Primary as well as secondary sources. Data were analyzed by using E-Views-7.The study‟s objectives and suppositions are of subject nature. Hence the design is of research based on objectives and resources for example accessibility of food to rural communities are subject to their socio-economic life and the extent of poverty in the area. In addition, employment and income generation were also taken into account, while setting a methodology and collecting methods of data. The data was collected through a sample survey of the household. Those who live on or under the poverty line. The people from Benazir Income Support Program (BISP) are taken into account while collecting primary data. Study universe, therefore, is the recipient of BISP. The sample was drawn through probability design. The figure is 230. It was revealed that as on account of education, public spending in Pakistan stays low at only 0.35 percent of Gross Domestic Product. At present, health services at the household level are mainly financed from own health care costs. It was found BISP is related to an expansion in thequantityof expanding humanservices costsfor grown-ups by PKR 50. This outcome gives an impression of being of the recipient families in Sindh, 32% of them are living in ranges influenced by flooding within the assessment time frame. It was further revealed that the assessment gathers quantitative and qualitative data for various years on the association of key pointers and supporting information. The effective investigation is done by utilizing a blended technique that joins subjective research with a semi-trial quantitative examination. The quantitative study is completed in 488 clusters (towns and neighborhoods) in ninety districts of four evaluationprovinces:Punjab,Sindh,Khyber-PakhtunkhwaandBaluchistan.An example of 8,675 family units was arbitrarily chosen and met towards the start before the arranged organization, which was finished in July 2013. These family units have such that similar families are then met on a yearly premise, and the first round of observation is finished in July 2014. A couple of rounds of the overviewwere finished in July 2015 and July 2016. Qualitative research directed in eight areas in each round of preparing, intentionally were chosen from the four appraisal provinces to give distinctive settings. Information accumulation for the principle ensuing rounds was held during May and June 2013.Two more adjustments were made in provinces research at their quantitative components. The First measure of the effect of the Programs controlled by the examination of the gauge and the second primary information on follow-up activities that was changing the circumstance of recipient families through the harmonization of execution pointers during the two years of BISP program.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

نیا ز احمد صدیقی

آہ! جناب نیاز احمد صدیقی
اسی مہینہ یعنی مارچ ۱۹۸۳؁ء میں جناب نیاز احمد صدیقی تقریباً ۸۴ سال کی عمر میں اﷲ کو پیارے ہوئے، وہ کوئی ادیب شاعر، نقاد اور مصنف نہ تھے، شروع سے آخر تک انگریزی زبان کے قابل قدر استاذ رہے، وطن مریاہو ضلع جونپور تھا، اردو زبان کے مایہ ناز ادیب اور نقاد جناب رشید احمد صدیقی کے چھوٹے بھائی تھے، مسلم یونیورسٹی علی گڑھ سے ایم اے، ایل ایل بی اور بی ٹی کی ڈگریاں حاصل کرکے شبلی اسکول اعظم گڑھ میں انگریزی کے استاد ہوئے، پھر جب یہ اسکول انٹر اور ڈگری کالج بنا، تو اس کے انگریزی کے لکچرر مقرر کئے گئے، آخر میں محمد حسن انٹر کالج کے پرنسپل بنے، وہاں سے ریٹائر ہونے کے بعد دارالعلوم ندوۃ العلماء میں کچھ دنوں انگریزی پڑھاتے رہے، یہی ان کی زندگی کی مختصر روداد ہے، مگر وہ ان چند شریف انسانوں میں تھے، جو حدیث سوزو ساز زندگی کے حامل، اخوت کے بیان اور محبت کی زبان بن کر اپنے گھر والوں، دوستوں اور معاصروں کے ساتھ رہے، اپنی اس طویل زندگی کے سولہ برس دارالمصنفین کے احاطہ میں گزارے اور اس کے شب و روز کو پر کیف بنانے میں کوئی کسر اٹھا نہیں رکھی، کوئی مسئلہ ہوتا، کوئی نازک وقت آتا، یا کوئی تقریب ہوتی، تو ہر موقع پر اپنے مخلصانہ، مشفقانہ اور ناصحانہ مشوروں سے سب کی دل داری، دلنوازی اور رہنمائی کرتے، وہ یہاں کی زندگی کے جزولاینفک ہوگئے تھے، اپنے شریفانہ برتاؤ، اخلاقی بلندی اور روزمرہ کی زندگی کے لین دین کی طہارت اور صاف باطنی میں قرونِ اولیٰ کی روایت کو تازہ کرتے، ان کی پاک اور طاہر زندگی پر اس وقت رشک آتا جب دارالمصنفین کے احاطہ کے اندر بعض لوگوں کی زبان سے یہ سننے میں آتا کہ ایک صحابی کی زندگی...

فتوی کا اسلامی منہج: مجموع فتاوی ابن تیمیہ کے تناظر میں

Im฀m Ibn Taymiyyah is a well-known scholar of Muslims. He was an ocean of knowledge and wisdom. His books prove his excellence He was born in 661 Hijrah in Harr฀n (Syria). He learned every kind of knowledge especially religious knowledge i. E knowledge of Qur’฀n, Tafs฀r, Had฀th, Fiqh, Jurisprudence, philosophy, inheritance law, mathematics, grammar, literature, and poetry etc. He wrote hundreds of books about the above mentioned fields. He was permitted to give Fatw฀ (verdict) in his early age. He was successful in achieving the position of Ijtih฀d (authoritative interpretation of Islamic Law). Ibn Taymiyyah Studied the Profound Books of religions and sects. Then he analyzed the works in the light of senior Imams and Qur฀n and Sunnah. He is an extra ordinary person in his knowledge and writings. In brief we can say the fatw฀s of Imam Ibn Taymiyyah have printed in thirty seven volumes. His first ratiocination in Fatwa is from the Holy Qur฀n. He presents the arguments from the Hadith and Sunnah of the Holy Prophet (S. A. W). He considered Ijm฀ ‘ (consensus of Muslim opinion) as a proof of Shar฀‘ah. He presents the point of view of various schools of thought, He trusted in the books of ancient scholars. He also answers the anticipating ambiguity and complication. A few of his fatwas begin with all praise to Allah. His fatw฀s are concordant with the life of the Muslims. In this article a deep study of fatwa of Ibn Taymiyyah has been taken as a guideline for fatwa in Islamic methodology.

A Signed-Response Based Node Authentication and Data Securing Scheme for Wireless Sensor Networks

During the last decade, authentication of sensor node and secure routing of data been remained an open challenges in Wireless Networks due to their applications in various vulnerable environments. These challenges become more signi cant when Wireless Sensor Networks (WSN) composed of tiny inexpensive nodes are consid- ered. This is due to the fact that the solutions proposed for the similar purposes in conventional wireless networks cannot be exploited for sensor networks because of high complexities and power consumptions involved in their algorithms. This thesis proposes a two-fold solution for the issues of node authentication and secure routing in Wireless Sensor Networks. In therst part of the thesis, a low complexity Sybil attack detection mechanism for Wireless Sensor Networks is pro- posed; while in the second part, a Secure Energy E cient Routing scheme called SEER is presented for the data security. Both of the proposed schemes are based on the Signed Response (SRes) authentication and voice encryption mechanism developed for Global System for Mobile (GSM) communications. The proposed Sybil attack detection scheme use pre-distributed key embedded in the sensor nodes. A modi ed version of A3 algorithm used in node authentication produces a SRes with the help of pre-distributed keys against a random challenge number sent by the sink or Cluster Head (CH). The 32 bit SRes is sent back to the sink or CH by the node to prove its legitimacy. The design of node authentication scheme is made exible so that it can be implemented in both hierarchical and centralized Wireless Sensor Networks. The scheme is analyzed for its performance under var- ious Sybil attacks. The scheme is evaluated for its probability of detecting Sybil nodes when di erent authentication key pool sizes are utilized. After extensive simulations, it is observed that the proposed scheme is able to counter Sybil at- tacks with higher probability as compared to notable existing schemes. Moreover, it has also been observed that the proposed Sybil detection scheme exhibits lesser computational cost and power consumption as compared to the existing schemes for the same Sybil attack detection performance.In the second part of the thesis, a secure mechanism for routing of data in Wire- less Sensor Networks; SEER is proposed. The proposed protocol is based on A5 encryption scheme developed for voice encryption in GSM. After successful au- thentication, a modi ed version of A5 algorithm is used to encrypt data during its routing from source to the sink or relay node. SEER uses GRACE (GRAdient Cost Establishment) routing protocol for transmission. For this purpose, a 64-bit ciphering key is used which is produced through a complicated process of pertur- bation in order to make it harder to be traced. SEER has been tested through simulations in MATLAB R by setting up hostile and vulnerable Wireless Sensor Network scenarios with respect to data integrity. The results obtained are then compared with two notable existing secure routing protocols. It is proved that the proposed mechanism SEER helps achieve the desired performance under dy- namically changing network conditions with various numbers of malicious nodes. Due to its linear complexity, lesser power consumption and more dynamic route updation, the proposed Sybil detection and SEER schemes can be easily extended to cater to the needs of emerging industrial wireless sensor networks, Dust Sen- sor Networks and IoT. Emerged from the conventional Wireless Sensor Networks, all the aforementioned networks have got the same nature of vulnerabilities and threats along with the inherited limitations with respect to their hardware and processing capabilities.