صحافت
یار صحافت عین عبادت کریئے جے کر سچ دے نال
جان دکھاں وچ پا صحافی بنندے ہین غریب دی ڈھال
جدوں ایہہ خبراں ڈھونڈن ویندے غم اندوہ نیں جردے
ماڑیاں تے مظلوماں اُتے ہتھ شفقت دا دھردے
جابر ظالم حاکم اگے ڈٹ جاندے نہ ڈردے
خوف ذرا نہ کھاندے ویکھو کردے صدق مقال
شہر محلے کوچہ کوچہ ہر جا ویکھو جاندے
ظالم لوگ غریباں تائیں حدوں ودھ ستاندے
مرہم زخم غریباں دے تے ہین صحافی لاندے
حق دی گل نیں کردے نالے رہندے حق دے نال
دفتراں اَتے کچہریاں وچ، کدی پھردے رہن بزاراں
سجریاں تازیاں خبراں ڈھونڈ کے چھاپن وچ اخباراں
چنگیاں مندیاں خبراں پڑھ کے پرچن دل ہزاراں
پنچھیاں وانگ توکل رب تے رہندے نیں خوشحال
یار صحافی چنگے نیں، ایہہ بولن بول رسیلہ
دکھیاں تے دکھیاراں دا ایہہ بن دے ہین وسیلہ
راہ ڈکن ایہہ اَگوں بھانویں ہووے شیر مریلہ
جس دے نال ایہہ دل تھیں ٹردے دکھڑے دیندے ٹال
اللہ سوہنے رزق انہاندا لکھیا کس بہانے
مالک روزی ہر نوں دیندا ، بھولے تے مستانے
کر مزدوری تے کھا چوری، کہہ گئے مرد ربانے
منگو یار دعاواں سب نوں لبھے رزق حلال
قادریؔ جی اخبار دی خدمت عزت بہت بناندی
عزت، شہرت ، دولت تائیں غربت شان گنواندی
اللہ سوہنا راضی تھیوے جتھے پیش نہ جاندی
خوفِ خدا تھیں روندیاں نوں تے بخشے گا ذوالجلال
The main purpose of the study was to explore educators' views on children's the early years' curriculum and pedagogy implemented in Pakistan. This research study is grounded in qualitative design i.e. Case study. The case included examining educators, the early years' and school managers' critical reflections on children's learning and development during the early years' education. This research study is first of its kind in the context of Pakistan as the early years teachers' views about their teaching practices have rarely incorporated in recent studies. The main finding of this study was that curriculum and pedagogies used in early years' program has never been concentrated earlier as potential research themes. Though many research studies have been conducted on the implementation of ECE programs, but not any specific study concentrated on matching curriculum goals with its implementation to facilitate children's holistic development. It was learnt that national curriculum framework 2007 is not followed in most ECE classes. The main reason was found that many practitioners i.e. Educators and managers have not seen or read it. Consequently, national philosophy is compromised while nurturing children holistically It is therefore recommended for teachers and educators to study the national and now provincial curriculum framework because it has set a benchmark as what to achieve and suggested how to achieve the goals.
During the last decade, authentication of sensor node and secure routing of data been remained an open challenges in Wireless Networks due to their applications in various vulnerable environments. These challenges become more signi cant when Wireless Sensor Networks (WSN) composed of tiny inexpensive nodes are consid- ered. This is due to the fact that the solutions proposed for the similar purposes in conventional wireless networks cannot be exploited for sensor networks because of high complexities and power consumptions involved in their algorithms. This thesis proposes a two-fold solution for the issues of node authentication and secure routing in Wireless Sensor Networks. In therst part of the thesis, a low complexity Sybil attack detection mechanism for Wireless Sensor Networks is pro- posed; while in the second part, a Secure Energy E cient Routing scheme called SEER is presented for the data security. Both of the proposed schemes are based on the Signed Response (SRes) authentication and voice encryption mechanism developed for Global System for Mobile (GSM) communications. The proposed Sybil attack detection scheme use pre-distributed key embedded in the sensor nodes. A modi ed version of A3 algorithm used in node authentication produces a SRes with the help of pre-distributed keys against a random challenge number sent by the sink or Cluster Head (CH). The 32 bit SRes is sent back to the sink or CH by the node to prove its legitimacy. The design of node authentication scheme is made exible so that it can be implemented in both hierarchical and centralized Wireless Sensor Networks. The scheme is analyzed for its performance under var- ious Sybil attacks. The scheme is evaluated for its probability of detecting Sybil nodes when di erent authentication key pool sizes are utilized. After extensive simulations, it is observed that the proposed scheme is able to counter Sybil at- tacks with higher probability as compared to notable existing schemes. Moreover, it has also been observed that the proposed Sybil detection scheme exhibits lesser computational cost and power consumption as compared to the existing schemes for the same Sybil attack detection performance.In the second part of the thesis, a secure mechanism for routing of data in Wire- less Sensor Networks; SEER is proposed. The proposed protocol is based on A5 encryption scheme developed for voice encryption in GSM. After successful au- thentication, a modi ed version of A5 algorithm is used to encrypt data during its routing from source to the sink or relay node. SEER uses GRACE (GRAdient Cost Establishment) routing protocol for transmission. For this purpose, a 64-bit ciphering key is used which is produced through a complicated process of pertur- bation in order to make it harder to be traced. SEER has been tested through simulations in MATLAB R by setting up hostile and vulnerable Wireless Sensor Network scenarios with respect to data integrity. The results obtained are then compared with two notable existing secure routing protocols. It is proved that the proposed mechanism SEER helps achieve the desired performance under dy- namically changing network conditions with various numbers of malicious nodes. Due to its linear complexity, lesser power consumption and more dynamic route updation, the proposed Sybil detection and SEER schemes can be easily extended to cater to the needs of emerging industrial wireless sensor networks, Dust Sen- sor Networks and IoT. Emerged from the conventional Wireless Sensor Networks, all the aforementioned networks have got the same nature of vulnerabilities and threats along with the inherited limitations with respect to their hardware and processing capabilities.