Ifra Khan - Academia.edu (original) (raw)

Ifra Khan

Related Authors

Anuja Agrawal

Rahul Singh

Rahul Singh

NIPER(National institute of pharmaceutical education & research

Vikramendra Kumar

Yash Arya

Yash Arya

Dr. Ram Manohar Lohiya National Law University

Delphine Thivet

Tahir Ashraf

Ejaz Karim

Ejaz Karim

Yunnan University of Nationalities, P.R.China

Pinki Mathur Anurag

Abid Rashid

Uploads

Papers by Ifra Khan

Research paper thumbnail of A Study on Socio-Economic Problems Faced by the Transgender: The Evidence from Dera Ghazi Khan, Pakistan

International Journal of Social Science & Entrepreneurship

Transgender community have been facing socioeconomic problems in Pakistan for long. It is imperat... more Transgender community have been facing socioeconomic problems in Pakistan for long. It is imperative to identify such issues to resolve these problems for the betterment of the transgender community. This study is primarily focused on theidentification and evaluation of socioeconomic problems faced by the transgender individuals in the Dera Ghazi Khan division, Punjab, Pakistan. The study shows that the transgender individuals lack the access to better healthcare facilities, haveno access to education, and have no employment opportunities. Consequently transgender community have to live in severe economic conditions with meagreincome levels. Moreover, they do not have any social recognition and status. Thefindings of the study draws attention of the government and policymakers topromulgate policies to ensure the provision of better healthcare, educational, andemployment opportunities to the deprived transgender individuals.

Research paper thumbnail of An Empirical Study on Financial Behavior of Household Finance: Impact of Subjective and Objective Financial Knowledge, Self-Control, Self-Efficacy and Subjective Financial Wellbeing

SSRN Electronic Journal, 2021

Research paper thumbnail of Prevention of Data Using Concept of Honeywords

Data Security plays a pivotal and decisive role in current times. Passwords could be authenticate... more Data Security plays a pivotal and decisive role in current times. Passwords could be authenticated easily using brute forces. Various other technologies used such as an OTP or code generators require third hand devices. Users authentic password are amalgamated with honeywords and stored as sweet words in an encrypted file within the database. These sweet words even after getting in the hands of an invader bewail him. The proffered system has an additional security authentication i.e. the key validity stage. The intruder when enters password with conjecture then after three attempts he will be directed towards a page showing decoy files and at the same time an alert will be send to the genuine user notifying him about the infringement.

Research paper thumbnail of Increased PSNR with improved DWT digital watermarking technique

International Journal of Innovative Computing and Applications, 2019

Research paper thumbnail of A Second Order Spread Spectrum Watermarking Scheme Using Multi-Threshold Wavelet Codec

Proceedings of the 2006 IEEE International Workshop on Imagining Systems and Techniques (IST 2006)

Research paper thumbnail of A Study on Socio-Economic Problems Faced by the Transgender: The Evidence from Dera Ghazi Khan, Pakistan

Research paper thumbnail of Shadow checker (SC): A low-cost hardware scheme for online detection of faults in small memory structures of a microprocessor

2010 IEEE International Test Conference, 2010

Page 1. Shadow Checker (SC): A Low-Cost Hardware Scheme for Online Detection of Faults in Small M... more Page 1. Shadow Checker (SC): A Low-Cost Hardware Scheme for Online Detection of Faults in Small Memory Structures of a Microprocessor Rance Rodrigues and Sandip Kundu University of Massachusetts at Amherst Department ...

Research paper thumbnail of A Study on Socio-Economic Problems Faced by the Transgender: The Evidence from Dera Ghazi Khan, Pakistan

International Journal of Social Science & Entrepreneurship

Transgender community have been facing socioeconomic problems in Pakistan for long. It is imperat... more Transgender community have been facing socioeconomic problems in Pakistan for long. It is imperative to identify such issues to resolve these problems for the betterment of the transgender community. This study is primarily focused on theidentification and evaluation of socioeconomic problems faced by the transgender individuals in the Dera Ghazi Khan division, Punjab, Pakistan. The study shows that the transgender individuals lack the access to better healthcare facilities, haveno access to education, and have no employment opportunities. Consequently transgender community have to live in severe economic conditions with meagreincome levels. Moreover, they do not have any social recognition and status. Thefindings of the study draws attention of the government and policymakers topromulgate policies to ensure the provision of better healthcare, educational, andemployment opportunities to the deprived transgender individuals.

Research paper thumbnail of An Empirical Study on Financial Behavior of Household Finance: Impact of Subjective and Objective Financial Knowledge, Self-Control, Self-Efficacy and Subjective Financial Wellbeing

SSRN Electronic Journal, 2021

Research paper thumbnail of Prevention of Data Using Concept of Honeywords

Data Security plays a pivotal and decisive role in current times. Passwords could be authenticate... more Data Security plays a pivotal and decisive role in current times. Passwords could be authenticated easily using brute forces. Various other technologies used such as an OTP or code generators require third hand devices. Users authentic password are amalgamated with honeywords and stored as sweet words in an encrypted file within the database. These sweet words even after getting in the hands of an invader bewail him. The proffered system has an additional security authentication i.e. the key validity stage. The intruder when enters password with conjecture then after three attempts he will be directed towards a page showing decoy files and at the same time an alert will be send to the genuine user notifying him about the infringement.

Research paper thumbnail of Increased PSNR with improved DWT digital watermarking technique

International Journal of Innovative Computing and Applications, 2019

Research paper thumbnail of A Second Order Spread Spectrum Watermarking Scheme Using Multi-Threshold Wavelet Codec

Proceedings of the 2006 IEEE International Workshop on Imagining Systems and Techniques (IST 2006)

Research paper thumbnail of A Study on Socio-Economic Problems Faced by the Transgender: The Evidence from Dera Ghazi Khan, Pakistan

Research paper thumbnail of Shadow checker (SC): A low-cost hardware scheme for online detection of faults in small memory structures of a microprocessor

2010 IEEE International Test Conference, 2010

Page 1. Shadow Checker (SC): A Low-Cost Hardware Scheme for Online Detection of Faults in Small M... more Page 1. Shadow Checker (SC): A Low-Cost Hardware Scheme for Online Detection of Faults in Small Memory Structures of a Microprocessor Rance Rodrigues and Sandip Kundu University of Massachusetts at Amherst Department ...

Log In