Ifra Khan - Academia.edu (original) (raw)
Related Authors
NIPER(National institute of pharmaceutical education & research
Dr. Ram Manohar Lohiya National Law University
Yunnan University of Nationalities, P.R.China
Uploads
Papers by Ifra Khan
International Journal of Social Science & Entrepreneurship
Transgender community have been facing socioeconomic problems in Pakistan for long. It is imperat... more Transgender community have been facing socioeconomic problems in Pakistan for long. It is imperative to identify such issues to resolve these problems for the betterment of the transgender community. This study is primarily focused on theidentification and evaluation of socioeconomic problems faced by the transgender individuals in the Dera Ghazi Khan division, Punjab, Pakistan. The study shows that the transgender individuals lack the access to better healthcare facilities, haveno access to education, and have no employment opportunities. Consequently transgender community have to live in severe economic conditions with meagreincome levels. Moreover, they do not have any social recognition and status. Thefindings of the study draws attention of the government and policymakers topromulgate policies to ensure the provision of better healthcare, educational, andemployment opportunities to the deprived transgender individuals.
SSRN Electronic Journal, 2021
Data Security plays a pivotal and decisive role in current times. Passwords could be authenticate... more Data Security plays a pivotal and decisive role in current times. Passwords could be authenticated easily using brute forces. Various other technologies used such as an OTP or code generators require third hand devices. Users authentic password are amalgamated with honeywords and stored as sweet words in an encrypted file within the database. These sweet words even after getting in the hands of an invader bewail him. The proffered system has an additional security authentication i.e. the key validity stage. The intruder when enters password with conjecture then after three attempts he will be directed towards a page showing decoy files and at the same time an alert will be send to the genuine user notifying him about the infringement.
International Journal of Innovative Computing and Applications, 2019
Proceedings of the 2006 IEEE International Workshop on Imagining Systems and Techniques (IST 2006)
2010 IEEE International Test Conference, 2010
Page 1. Shadow Checker (SC): A Low-Cost Hardware Scheme for Online Detection of Faults in Small M... more Page 1. Shadow Checker (SC): A Low-Cost Hardware Scheme for Online Detection of Faults in Small Memory Structures of a Microprocessor Rance Rodrigues and Sandip Kundu University of Massachusetts at Amherst Department ...
International Journal of Social Science & Entrepreneurship
Transgender community have been facing socioeconomic problems in Pakistan for long. It is imperat... more Transgender community have been facing socioeconomic problems in Pakistan for long. It is imperative to identify such issues to resolve these problems for the betterment of the transgender community. This study is primarily focused on theidentification and evaluation of socioeconomic problems faced by the transgender individuals in the Dera Ghazi Khan division, Punjab, Pakistan. The study shows that the transgender individuals lack the access to better healthcare facilities, haveno access to education, and have no employment opportunities. Consequently transgender community have to live in severe economic conditions with meagreincome levels. Moreover, they do not have any social recognition and status. Thefindings of the study draws attention of the government and policymakers topromulgate policies to ensure the provision of better healthcare, educational, andemployment opportunities to the deprived transgender individuals.
SSRN Electronic Journal, 2021
Data Security plays a pivotal and decisive role in current times. Passwords could be authenticate... more Data Security plays a pivotal and decisive role in current times. Passwords could be authenticated easily using brute forces. Various other technologies used such as an OTP or code generators require third hand devices. Users authentic password are amalgamated with honeywords and stored as sweet words in an encrypted file within the database. These sweet words even after getting in the hands of an invader bewail him. The proffered system has an additional security authentication i.e. the key validity stage. The intruder when enters password with conjecture then after three attempts he will be directed towards a page showing decoy files and at the same time an alert will be send to the genuine user notifying him about the infringement.
International Journal of Innovative Computing and Applications, 2019
Proceedings of the 2006 IEEE International Workshop on Imagining Systems and Techniques (IST 2006)
2010 IEEE International Test Conference, 2010
Page 1. Shadow Checker (SC): A Low-Cost Hardware Scheme for Online Detection of Faults in Small M... more Page 1. Shadow Checker (SC): A Low-Cost Hardware Scheme for Online Detection of Faults in Small Memory Structures of a Microprocessor Rance Rodrigues and Sandip Kundu University of Massachusetts at Amherst Department ...