Search or add a thesis

Advanced Search (Beta)
Home > A Study of Professional Development of School Leaders in Federal Government Educational

A Study of Professional Development of School Leaders in Federal Government Educational

Thesis Info

Author

Ch. Muhammad

Department

Department of Education

Program

Mphil

Institute

National University of Modern Languages

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2008

Subject

Education

Language

English

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676728680168

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


The purpose of this study was to investigate whether the secondary school principals of the Federal Government Educational Institutions (Cantonments & Garrisons) were getting appropriate opportunities for their professional development or not. The population consisted of 181 principals out of which a sample of 126 was selected by using stratified random design. The instrument comprised a survey questionnaire containing 14 question items, structured telephonic interview of the responsible heads of the governing bodies, and the policy document of the Federal Government Educational Institutions for its evaluation to obtain qualitative data. The results of the study indicate that despite their earnest desire, the secondary school principals of Federal Government Educational Institutions were not getting appropriate opportunities for their professional development in terms of frequency of holding of development courses, methods of organizing the courses, rate of participation, and practical value of the courses. The findings reveal that the policy document of the Directorate of Federal Government Educational Institutions does not contain any specific provisions pertaining to the professional development of their school principals and it has been left to the discretion of the regional offices without any obligation and monitoring by the directorate.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

جوزف کونرو

جوزف کونرو


گذشتہ ماہ کا علمی حادثہ مسٹر جوزف کونرو کی موت ہے، مسٹر موصوف انگریزی کے مشہور افسانہ نگار تھے، ان کا اصلی وطن پولینڈ تھا، لیکن ۱۸۷۸؁ء میں انھوں نے مستقل طور سے برطانوی رعایاکی حیثیت سے انگلستان میں اقامت اختیار کرلی، ان کے افسانے ہر طبقہ اور ہر عمر کے لوگوں میں بہت مقبول ہوئے ہیں۔ (دسمبر ۱۹۲۴ء)

Congenital Heart Disease: Causes and Risk Factors Congenital Heart Disease: Causes and Risk Factors

Congenital Heart Defect (CHD) is a multifactorial disorder based on both genetic and environmental factors involved in development. The basic problem lies in the structure of heart leading to CHD that occurs in walls, valves, arteries and veins of heart. During cell cycle, the gene that controls this process may mutate, causing disturbance in any portion of heart leading to disturbed blood flow, blood flow in wrong direction or complete blockage. Defect may range from simple with no manifestations to complex with severe symptoms. Simple defects need no treatment while some babies with complex birth defects during birth require special care, vaccination, medication or otherwise treated with surgery. The incidence of CHD has declined from 80 to 20% due to progress in heart surgery techniques, medical treatment and interventional cardiology. Various genetic and non-genetic increase the susceptibility for CHD. The diagnosis and treatment of CHD has greatly improved in recent years. Almost all the children with CHD survive to adulthood and spend healthy and active lives after being treated.

Secret Data Transmission Using Steganography

Cryptography, watermarking and steganography are among the rapidly emerging techniques pertaining to sustain, authenticate, and exhume the hidden data, especially when it is transmitted over a public network/channel. In cryptography, the message is executed and encrypted artistically that the intended message becomes incomprehensible. Whereas, water marking technique conceals the data in some cover file quite tactfully that the data engrossed in the host signal/ entity becomes imperceptible which is likely to be authenticated later on. Likewise, steganography approach veils the data in the cover signal indistinctly to deflect the interception of undesired user. The exchange of encompassed message by cryptographic system may create suspense for the intruder. But, contrary to it, in steganography the user is less attracted to the hidden information. Therefore, the harmonization of both of these technologies can produce invisible higher level of message protection. In this dissertation, the problem of imperceptibility, data rate and robustness is formulated and different approaches are proposed and investigated to solve it. In first approach, a novel technique to embed information into the audio signals is proposed. In this regard, the set of all possible values of amplitudes of audio signals are termed as “audio sample space”. An algorithm is proposed to subdivide this sample space into subspaces and the information was embedded into these subspaces. On the other hand, an algorithm for decoding on receiver side is also proposed. The algorithm has the capability to work on real time systems and provide sufficient security at commercial level. The amount of imperceptibility achieved is, quite a distinct viii benefit concerning perceptual evaluation of speech quality (PESQ). In second approach, an innovative steganography technique has been engineered named as weighted pattern matching (WPM) which is utilized to collaborate the lifting wavelet transform. The message bits are insert in the indistinguishable places that are picked from the coefficients of detail sub-bands by taking edge of the proposed WPM technique. WPM captures the correlation between the message data block and detail coefficients help us to configure the exact location that can contain the data block invisibly. The ultimate results of the experiment exhibit that the WPM technique enhances invisibility significantly in addition to lossless massage retrieval. In third approach, another sustained efficient, imperishable approach brimmed of heavy payload, named compressive weighted pattern matching (CWPM) has been invented and applied. CWPM technique has been born from the combination of compressive sensing (CS) with WPM. Use of CS provides the higher level of security and bigger payload by means of compression and encryption. CWPM holds the position where data block can be embedded on the basis of a weighted correlation. Our engineered techniques have been compared with the well-known steganography elaborated in literature review. The results ingenuity proves that all designed models are far better firm and ingratiating.