It is attempted to assess the status of poverty in Sindh and its possible alleviation through economic up-gradation of the society with use of appropriate technology at the micro level and determination of relationship between the two. The phenomenon is termed as Micro Techno-Economic Dynamics (MTED). A new literature review framework termed as GRD- Framework is developed and successfully used for this study. It is limited to the use of solar thermal technology, identified as an appropriate technology. It has provided global, regional (national) and domestic (Sindh) perspective for technology utilization for poverty alleviation and MTED. On the basis of literature surveyed and the background research already done by the author, two indigenous research frameworks Primary and Secondary are designed to conduct this research. The primary framework provides the basic MTED scenario for poverty alleviation in Sindh, whereas the secondary framework sketches the in-depth MTED scenario. The research methodology of the Primary framework based upon the process laid down by Cai et al (2009) is applied through a field study in a community comprising of mainly farmers, who form a large portion of poor in the society. The survey under this framework has helped further in identifying the major institutions underlying the innovation system that shapes the MTED in Sindh. Afterwards, the Bergek et al (2008) framework is merged with the Primary framework to produce the Secondary framework. The Secondary framework utilizes the data collected from the institutions identified in Primary framework through another survey. It is based upon seven functional parameters identified by the Bergek et al (2008), which are modified for this study in the context of Sindh. xii The data collected further identifies the significant difference in perceptions at the levels of an individual and the society, as a whole. It helps in testing hypotheses formed to identify the hurdles in promotion of MTED for poverty alleviation in Sindh. These hurdles are mapped with such issues identified and addressed in the national policies before and some more realistic policy recommendations are framed. And the key policy recommendations that emerge are: Ø The Government of Sindh should strengthen the Science and Technology (S&T) Cell in the Department of Planning and Development or better revive and reestablish the separate Department of Science and Technology established earlier but abandoned soon after. Ø The S&T Cell or the Department should frame a comprehensive policy and its plan of action to introduce the MTED, rather make it feasible though out Sindh up to village level, to alleviate poverty. Ø The policies framed and action plans introduced in this respect be reviewed on regular basis. Ø A detailed survey of human and natural resources and other requirements be conducted for each feasible unit at Taluka, Village, etc. level for whole of Sindh and a relevant appropriate technology (s) be identified for each different unit to introduce MTED phenomenon for poverty alleviation effectively in that area. xiii Ø An appropriate comprehensive program be launched for vocational education and technical training for generation of suitable manpower in Techno-Economic Development and Innovation to promote MTED. The concepts may be introduced in general through special topics/ courses at secondary level of education to generate creative minds in this field. Ø Financial Incentives may be provided to promote RETs/STTs and other relevant technologies in order to keep the wheel of MTED in Sindh moving. Ø The Government must encourage linkages among different concerned organizations to form themselves into an Innovation System to achieve the objectives of poverty alleviation through MTED Ø The role of NGOs and private sector be strengthened in MTED effort to rapidly bring the benefits of RETs/STTs and other appropriate technologies to common people. Ø Funds be provided for small pilot field studies and training to provide RETs/STTs and other appropriate technologies first-hand knowledge to common people.
اختلاف نسخ: تدوین متن میں میں مختلف نسخوں کے اختلافات نسخہ: کسی قلمی یا مطبوعہ کتاب کی ایک جلد اساسی نسخہ/بنیادی نسخہ: وہ نسخہ جسے تدوین میں اہم ترین مان کر متن دیا جائے۔ خطی نسخہ/قلمی نسخہ: ہاتھ سے لکھا ہوا نسخہ دستخطی نسخہ: مصنف کے ہاتھ کا لکھا یا ٹائپ کیا ہوا نسخہ وحید نسخہ: اگر کسی متن کا دنیا میں ایک ہی نسخہ ملتا ہو اور کوئی نقل نہ ہو تو اسے وحید نسخہ کہتے ہیں۔ آمیختہ نسخہ: وہ نسخہ جس کا متن پہلے کے دو نسخوں سے ملا کر تیار کیا گیا ہو۔ ماخذی نسخہ: جس نسخے سے کسی دوسرے نسخے کی نقل کی جائے ماخذ: کتابیات کا پہلا مفہوم مسودہ/کاپی ٹیکسٹ: جو صاف نسخہ تیارکرکے طباعت کے لیے دیا جاتا ہے کلیات: کسی شاعر کا مجموعہ کلام (نثر /نظم) جو شاعر نے خود یا پھر کسی دوسرے شخص نے مرتب کیا ہو۔ اشاریہ: کتاب کے آخر میں متن میں مذکورہ اشخاص، مقامات، کتب، اداروں وغیرہ کی ہجائی ترتیب مع صفحہ نمبر اوقاف: جملے، فقرے اور لفظ میں توقف اور تخصیص وغیرہ کے نشانات رموزاوقاف: اوقاف کی علامتیں بیاض: کسی کی ذاتی کاپی جس میں وہ اپنے یا دوسروں کے اشعار ، نظمیں یا غزلیں لکھ لیتا ہے۔ تحریف: کسی شعر یا نثری جملیکے اصل متن میں تبدیلی کردینا تخریج: کسی ادیب یا شاعر کے کلام میں دوسرے کلام کی نشاندہی کرنا تحشیہ: کسی متن پر حاشیے لکھنا ترقیمہ: مخطوطے کے آخر میں کاتب کی اختتامیہ عبارت جس میں کاتب کا نام، مالک کتاب یا فرمائش کنندہ کا نام، زمان و مکان کتابت، اختتامی شعر وغیرہ میں سے کچھ یا سب دیے ہوں تسوید: کسی مضمو ن یا کتاب کا پہلا مسودہ لکھنا تصحیح: متن میں اگر کچھ صریحا غلط ہے تو اس کو درست کرنا حاشیہ:...
The field of finance, fintech, and even finance companies like insurers has become part of the world of the internet. Indeed, the digital economy has now entered the areas of shipping, banking, agriculture and urban planning. This is characterized by the usage of technologies and the internet for various uses, including digitalization, of culture. Hence the improvements in the organizational and even marketing processes to the customer element level and numerous transactional regulatory structures is important and common in industries. Youth are also facing challenges in social network marketing, including reliance on technological development, safety and privacy issues, balanced personalization and privacy, marketing transparency, uneven Internet infrastructure in ASEAN Countries, and tight competition. This is an important aspect of the youth's efforts.
Anomaly based Intrusion detection systems have proved their worth by detecting zero age intrusions but suffers from large number of false alarms mainly because of imprecise definitions of their normal profile or detection models. Building accurate and precise normal profiles or detection models for intrusion detection is a complex process. It is because it involves highly dynamic network behavior, concept drift phenomenon and evolving intrusion patterns. To accommodate these network dynamics in intrusion de- tection models, we require extensive training data-sets. These data sets must contain a uniform distribution of theoretically possible intrusion patterns and normal network traffic instances. Deviation in training data-set with real time network data and skewed class distribution in training data set will result in a biased detection model. Concept drift phenomenon, huge network data, highly imbalance traffic distribution, addition of new applications and abstract boundaries between normal and abnormal behavior has limited the accuracy of generalized detection models or shortened their detection models useful life. Due to these limitations and complexities in building long term intrusion de- tection models, it is proposed in this thesis that instead of building a generalized profile responsible for detecting all the intrusions it is more helpful if short-term profiles are used to detect an intrusion or even a phase of an intrusion active in certain time space. These short term profiles are evolved by changing cost functions according to changed anomaly conditions, current network traffic patterns and security policies. The evolved profiles remain valid for a short period of time in which network dynamics can be as- sumed as piece-wise linear. In this thesis an anomaly based Adaptive SEmi-supervised Evolutionary Security (ASEES) fuzzy framework is proposed. It is based on adaptive distributed and cooperative fuzzy agents which use evolved short-term profiles. These profiles are evolved for different objectives to detect specific intrusions. Evolved pro- files are switched and activated according to current network and anomaly conditions, network security policies and based on forecasted attacks. The ASEES fuzzy framework is tested under two different attacks; DoS attack and viireconnaissance attack i.e. port scan. The results show good detection times and high detection rate due to similarity of the training and testing data-set. The results also shows a performance increase in using short term profiles along with generalize normal profiles for denial of service attacks.