Search or add a thesis

Advanced Search (Beta)
Home > Evaluation of Regional Services Network of Allama Iqbal Open University and Developing a Plan of Action for Future

Evaluation of Regional Services Network of Allama Iqbal Open University and Developing a Plan of Action for Future

Thesis Info

Access Option

External Link

Author

Sajjad Ahmad

Program

PhD

Institute

Allama Iqbal Open University

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2016

Thesis Completion Status

Completed

Subject

Education

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/12439/1/sajjad%20ahmad_edu%20plan%20%26%20mangt%202016%20aiou.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676724693664

Similar


The AIOU has a large Regional Services Network of Regional Centres and Campuses all over the country. Students are getting guidance and strengthening the process of learning. In Distance Education the Regional Network is of importance, where teaching and learning is actually taking place. Regional Centers are implementing the multidisciplinary education for about one million students every year. The research aimed at An Analytical study of Regional Services Network of Allama Iqbal Open University. It also aimed developing a Plan of Action for Future in the field of Distance Education at national level. The research study was descriptive in nature for which six questionnaires were designed after the study of related literature on five point lekirt scale and for which survey was conducted through the questionnaires. The objectives of the study were, to examine the functioning of the present system and the role of different functionaries in the AIOU regional network, identify the problems in the implementation of the process in order to achieve the defined AIOU objectives in the regions, to determine standard and usefulness of the services being provided to students in the regions, in term of tutors, resource person ,technological aids and physical facilities already available in the regions and to propose a plan of action to meet the future needs of AIOU regional network. The population of the study comprised all Tutors and Students of M.Ed programme, all Regional Directors, all Regional Coordinators, Study Centre Coordinators and the Director Regional Services. The sample of the study comprised 150 Tutors, 350 Students, 25 Regional Directors, 80 Regional Coordinators, 150 Study Coordinators and the Director Regional Services. For this purpose six questionnaires were prepared in consultation with the supervisor and other experts in the field. The collected data was presented and tabulated in Chapter IV. Different statistical tools including percentage, Chi-square were applied for the analysis the data. Based on the analysis of data findings and conclusions were drawn and recommendations were made. Major finding of the study indicated that present system needs further strengthening of the structure. The other findings indicated lack of training, resources and man power. Technology and latest communication equipments were also common deficiencies in the region. Future studies have also been recommended by the researcher as Open Universities are important educational innovations of 21st century and developed a Model of Distance Education System in Pakistani perspective.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

15۔دہشت گردی اور فرقہ واریت

دہشت گردی اور فرقہ واریت اسلامی ممالک میں اتنی بڑھ گئی ہے کہ ان مسائل میں ہی حکومتیں الجھ کر رہ گئی ہیں۔ دوسری طرف ہر اسلامی ملک میں مزاحمتی تحریکیں ، جو کہ بنیادی طور پر اپنے ممالک میں اسلامی قوانین کے نفاذ میں ممدومعاون اور اپنی فوج کا ہراول دستہ سمجھی جا تی ہیں ، بیرونی مداخلت اور شہ پر ہی انہیں اپنے ملک کا دشمن اور باغی تصور کیا جا رہا ہے ۔ عام طور پر تمام اسلامی ممالک کی افواج ان کے خلاف فوجی آپریشن شروع کرکے اپنے بیرونی آقاؤں کو خوش کرتی رہتی ہیں ۔ آئے روز دھماکے اور ڈرون حملے اس بات کی علامت ہیں کہ اسلامی دنیا کو اس معاملہ میں بین الاقوامی طور پر خصوصی طور پر ہی نشانہ بنایا جا رہا ہے۔ان حالات میں حکومت کو دیگر مسائل پر زیادہ توجہ دینی پڑتی ہے، جس سے قوانین حدود وقصاص کے نفاذ میں تاخیر ہوتی ہے۔

عصر حاضر اور اجماع

Ijmaa is the fourth source of Islamic law. It is the product of collective Ijthihad of Islamic jurists. This is one of the principal source of Islamic law and is based on the Qur'an and Sunna. It is in a way a kind of Ijthihad and can be termed as a collective Ijthihad. In modern day it can be exercised through parliament or a committee on Ijthihad. Its scope can be further widened for the Umma through an international council or congress of Islamic scholars.

Matrix Based Hybrid Key Establishment Schemes for Securing the Communication in Group Based Wsn

Secure key distribution is extremely crucial in commercial and military applications of WSN and wireless sensor and Actor networks (WSAN) for providing confidentiality to messages shared among sensors. It becomes more challenging when two cluster heads cannot communicate directly due to communication range. In this case, an ordinary node located at cluster boundaries to play a role of gateway node that has established keys in both clusters. Entire communication between clusters is transmitted through these gateway nodes. The main problem is that compromised gateway node exposes all keys transmitted through that node and relevant links are compromised before establishment. We have proposed Key Distribution using Key Fragmentation (KDKF) scheme that solves the problem. Sender divides the actual key into fragments using key fragmentation algorithm and sends these using gateway nodes as intermediaries. Receiver Node assimilates these key fragments using XOR operation to interpret actual key. KDKF scheme provides deployment scenarios and detailed protocol description to elaborate the message structure to exchange security credentials between distant nodes. Moreover, formal modeling is performed using Rubin Logic to verify and analyze the proposed protocol. Performance and resilience of protocol is validated through simulations using ns-2.35. It proves that a compromised gateway node cannot retrieve the actual key and only gets the key fragment. To assimilate the single actual key, adversary needs to subvert exactly those gateway nodes that participated in key fragments transmission. In contemporary schemes, all future keys transmitted through compromised gateway nodes were exposed. Results proof that KDKF is much more resilient against compromising attack and keys in network are not exposed to adversary. To further improve the communication overheads and better connectivity, we have proposed a Matrix based Key Establishment Scheme (MKES) where actual key is never transmitted on network. In MKES, each node is pre-loaded with one row and one column from a matrix. After deployment, indices for row and column are exchanged between the two nodes and values at intersection of row and column index is used to calculate the key on each node. It can establish keys with neighboring nodes, cluster heads, SINK and even across different WSN using same matrix values. Results are produced for analyzing resilience, storage and communication costs to prove dominance of MKES. It is also tested by deploying on android for securing messaging. Moreover, MKES is used in Critical Data Reclamation (CDR) that provides aggregated data extraction in isolated clusters where cluster head (GH) is destroyed. GH receives the query from sink node to send towards the cluster members and then transmits the aggregated Ata Ullah 52-FBAS/PHDCS/F09 vAbstract response to sink node. In the absence of GH, gateway nodes located at common boundary of neighboring clusters communicate with the neighboring GHs to transmit critical data to sink in a timely manner until a new GH is not added in the cluster. A secure protocol scenario is discussed in a stepwise manner to add new GH to the network. Proposed schemes is simulated and evaluated for Density of cluster, Connectivity, Resilience, Storage and Communication overhead.