Top Downloads section combines the most popular scholarly articles from IOARP conferences and journals published in IOARP Digital Library. Besides providing an insight into publications other researcher are interested in, Top Downloads are also a reflection of the recent trends and directions in a particular research domain.

 

If you are interested in Top Downloads of a particular conference or a journal, please visit the Top Downloads section in its respective website. If you want to access the list of our conferences and journals, please visit Browse Subjects menu option in IOARP website. If you are Still unsure, please write to us on info@ioarp.org.



Collecting Statistical Parameters on Mobile Phones for Detection of Security Attacks and Mobile Malware

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Abstract

Communication between mobiles using technologies like Bluetooth, MMS, SMS, Mobile and Home Broadband can increases their susceptibility to mobile security threats. In the past few years, mobile malware has emerged as one of the major threats for modern-day mobile devices. Since the first malware outbreak in 2004, hundreds of mobile viruses, worms, Trojans and spyware and over thousands of their variants have been discovered. With such a large number of ever-evolving malware, it is challenging to develop an electronic system capable of detecting such malware. In this work, the statistical data generated as a consequence of interactions on mobile devices and the mechanism of recording this data against statistical parameters on mobile devices is discussed. We also provide a detailed taxonomy of the low and high-order statistical parameters, and discuss how these parameters (besides utilisation in other scenarios) can be affectively utilised in the detection of a variety of security attacks and malware types.

Read More...
Smart Cities: Challenges and Beyond

Muhammad Hassan Raza, Munam Ali Shah, Muhammad Kamran Abbasi

Abstract

A smart city is an interconnection of objects in which each object plays a role of a source node. The data and information is collected from the source node for further computation and communication. A city can only be called a smart city if certain attributes are available such as clean water, good transport, energy efficiency, well-structured infrastructure, Internet of Things (IoT), mobile health (m-health), and Information and Communication Technologies (ICT). In this paper, we provide a comprehensive overview of the things that form a smart city. We focus on applications and technologies and identify different challenges in a smart city. Furthermore, the critical evaluation of different standards, architectures and frameworks form part of the paper. 

Read More...
5G Technology: An Overview of Applications, Prospects, Challenges and Beyond

Maryam Fizza, Munam Ali Shah

Abstract

This paper provides a comprehensive overview of an emerging mobile wireless communication technology, i.e., 5G. We provide a concise view of the advancements which are currently being investigated to deploy 5G wireless technology in an effective and beneficial way. We aim to provide an easy and state of the art view of architectures, applications and challenges of the 5G technology. We group existing approaches and provide a critical overview of the underlying details adapted by the 5G technology.

Read More...
Technical Evaluation of the Functionality of Popular Mobile Payment Protocols

Munir Hussain, Syed Usman Jamil

Abstract

Today, mobile commerce flexibility has totally changed businesses in the world due to easy mobile-based online bookings and payments. Its implementation is not limited to any single area but it can be utilized in all sorts of situations and organizations in various ways. It can be utilized in banking, electronic publication distribution, online sales, online payments for different utility bills and online booking of airlines etc. These kinds of online booking, buying and selling, and their payment services are available to anyone 24/7 in the world. When using these types of facilities, one needs to understand and study different types of characteristics of this new technology i.e., it is important to understand different modes of payments, various technologies using mobile payment system, and different M-commerce payment protocols. As we know that energy consumption is a critical issue in M-commerce, so it is important to reduce battery power consumption as much as possible. In this paper, we will explore some of the most popular mobile payment protocols step-by-step to fully understand their working environment.  

Read More...
Analysis of Efficient Market Hypothesis and Behavioral Finance

Emine Beyza Arikan, Bernd Sanger, Mehul Mehta

Abstract

The efficient market hypothesis suggests that at any given time in a capital market, the prices of stock reflect all available information. Hypothesis implies that it is impossible to beat the market because the market price always incorporates all the relevant information that may influence the price of a stock. Some researchers, based on the historic evidence, contradict with this hypothesis and challenge the presence of a perfect rationale behind the hypothesis. Behavioural finance on the other hand combines behavioural and cognitive psychological theory with economics and finance to provide explanations behind the irrational financial decisions investors make. Using these theories, behavioural finance explains stock market anomalies such as severe rises or falls in stock price. Behavioural finance assumes that both information structure and the characteristics of market investors influence investment decision of the individuals. This paper provides a thorough analysis of efficient market hypothesis and behavioural finance by taking into account the literature and market statistics.

Read More...
Analysis of Embedded Web Resources in Web of Things

Muhammad Nazim, Munam Ali Shah, Muhammad Kamran Abbasi

Abstract

It is estimated that 42 million devices are currently connected to the Internet. These devices are accessible to a web interface through which a user can easily connect and utilize these devices by a simple Internet web browser forming a Web of Things (WoT). The connectivity of millions of devices through WoT has eliminated the need of a proprietary or control software. In this paper, we investigate these web services and analyze web embedded devices and related services in WoT. We aim to provide an easy and concise view of the underlying WoT model adapted by each approach.

Read More...
On the Importance of Communicating Behaviour Expectations in the First Session of a Class

Muhammad Adeel

Abstract

Classroom management has a critical impact on effective teaching and learning. Classroom disruptions are the pattern of repeated behaviour that significantly interrupts the teaching and learning process. It, therefore, becomes vital to handle these disruptions and the ability of a teacher to handle classroom discipline is given key priority in observation of teaching and learning conducted by the regulators. In this paper, we will focus on evaluating the importance of communicating behaviour expectations to the students in the very first session and its impact on effective teaching and learning. The analysis is based on the review of the literature, interviews, and a survey questionnaire completed by the teachers.

Read More...
Evaluation of the MPeersim – A Simulation Environment for Mobile Networks

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Abstract

MPeersim is a simulation environment for mobile and mobile P2P networks. It simulates different types of mobile nodes and communication technologies such as Bluetooth, MMS, and SMS. With a primary emphasis of evaluation of MPeersim in terms of simulation statistics, this paper will elaborate on various MPeersim functionalities in context of availability of generic, node, and network-specific simulation parameters, node and network-specific statistics available for various types of analyses, and on the capabilities of MPeersim in terms of presenting empirical data in different formats including graphs and visualisation for monitoring purposes. Providing a comprehensive understanding of the relationship between parameters and statistics will assist researchers in planning for developing simulation environments.

Read More...
Curriculum Development for Inclusive Education

Asghar Hussain

Abstract

Using a short revision course as a test case, this paper will look at the wider issues revolving around developing a curriculum; it will look closely at the process and praxis of the educational journey to attain the product with a deeper understanding of what is being studied. The paper will also discuss how the managing of product and process, amidst a lecturer/teacher’s knowledge of their students is increasingly important. In addition, recognizing the student’s objectives and pushing them to search out (with a certain degree of autonomy) their own objectives through reflection and contextualization of learning.

Read More...
Analysis of Critical Aspects of M-commerce and Mobile Payment Systems

Munir Hussain

Abstract

The fast spreading of wireless technology services are more focusing on businesses area rather than targeting customers. Even now, this advancement in the mobile technology continues to bang the international business market intensely, modern mobile technologies and their applications are more focusing the mobile business area. Today, the world of electronic transactions is switching from E-commerce to M-commerce. In order to solve critical issues in M-commerce it becomes vital to understand different concepts and technologies associated with M-commerce. The first part of this paper gives overview of M-commerce in terms of their characteristics, applications, and issues pertaining to it, including many critical issue such battery power consumption in M-commerce transactions. Battery is one of the most important and scarce resources in mobile devices thus to extend the mobile devices battery lifetime, it becomes important to save the battery resource as much as possible. The second part of this paper focuses on exploring various aspects of enabling mobile payment systems, mobile payment modes and characteristics and the payments system requirements.  

Read More...
Efficient Market Hypothesis: An Evaluation of the Efficiency of Indian Capital Markets

Bernd Sanger, Emine Beyza Arikan, Mehul Mehta, Asma Hosseini

Abstract

Market efficiency refers to the accuracy and quickness with which prices reflect market related information. Decisions of investment by an investor in a market is influenced by many factors, one of the most important is the market efficiency. Research reveals that if a market is efficient, it is extremely difficult to make excessive returns. In an efficient market there exist next to none undervalued securities. With the first stock exchange started functioning in 1875 Indian stock markets have been lucrative for the traders from around the world. This paper attempts to analyse the efficiency of the Indian capital markets. Research from the literature and the interviews of the renowned investors have been used to reach a conclusion. Some tips in context of investment strategy have also been provided.

Read More...
Lightweight Secure and Scalable Key Sharing Protocol for Wireless Sensor Networks

Munir Hussain, Khalid Khan

Abstract

Wireless Sensor Networks (WSN) technology is still immature and thus faces a variety of problems due to limited memory, CPU and battery power resources. WSNs are prone to active and passive attacks. While the former is capable of affecting minimal resources, the latter type of attack is difficult to launch but very powerful in terms of affecting critical resources. Most shared key security protocols used in WSNs are not scalable as they depend upon third party or KDC. Although in some situations this concept works well, besides reducing scalability, finding a trustworthy third party is also very difficult in KDC concept of key sharing. This paper gives a brief overview of WSNs, posed security threats to these networks and relevant security issues. This paper also brings in a novel key sharing model for traversing secret key in WSNs that does not depend on third party concept and hence it is a more scalable and secure.

Read More...
Understanding Employee Retention: Processes, Best Practices, Myths, and Important Factors

Assem Bin Bandar, Ahmed Alhoqail, Jiangling Liu

Abstract

The study describes the relationship between the Human Resource Management practices and the employee retention. It has become essential to retain the best employees to the organisations performance. The research reviews relevant literature to identify HR practices that influence the employee retention and also the effect on the overall organisational performance by retaining the right and efficient employees. Therefore, it is important to have a productive and efficient workforce to collectively focus on the organisation’s success. In this paper we provide highlight the importance of employee retention in HRM, discuss the critical process and best practices in employee retention, briefly summarise the myths in the context, and provide a detailed discussion on the factors affecting employee retention.

Read More...
ICN Framework and Its Challenges for IOT Applications

Syed Usman Jamil, Khalid Khan

Abstract

The early internet user needs were coped by current internet architecture that was based on host-centric communication model. Now a day, usage as well as requirements of internet is changed however mostly internet users are interested to access large amount of data/information regardless of physical location.  This paradigm changes in the internet usage model along with mobility support, better security and pressing needs of users has invited researchers to consider radical changes in the internet architecture. By following this direction, we have reviewed many on-going efforts of researchers in which the future internet can be developed on the foundation of Information- Centric Networking. To sync billions of objects over the internet is promised by the internet of things (IOT). To deploy numerous individual IOT architectures, in domains of diverse nature, the ongoing trend is to deploy a common IOT platform, so that objects may be accessible and synchronized with applications across domains and organizations. To achieve this goal, limited proposals are developed to model unified host centric IOT infrastructure operate at upper layer of current host centric internet. Therefore, fundamental mismatch is evident in between the today’s host centric nature of internet and IOT system having information centric nature. We propose to develop common set of services and protocols to resolve this mismatch, which form a platform for IOT, on the basis of ICN paradigm, which may be named as ICN-IOT platform.  ICN-IOT merger is the ICN salient feature and therefore enables seamless scalability, mobility support and efficient service and content delivery. The main aim of these investigations is to find out the core functionalities of ICN architectures, overview of IOT functionalities and architectural requirements, and the review of ICN over IOT implementations and their advantages and challenges to sketch out the key unresolved challenges in this field of networking research. 

Read More...
Evaluation of Employee Retention Strategies in Indian BPO Industry: IBM Case Study

Assem Bin Bandar, Qusai Farouq Almeqdadi, Jiangling Liu

Abstract

Over the past two decade the importance of the employee retention has grown. Most of the organisations understand that human resources are one of the primary factors for the organisational success and their growth. In the globalised world the competition between the organisations has increased and they are not going back to pay the price to acquire and retain the best talents in the market. Efficient and dedicated employees will drive the organisation towards goals. In the Human resource management the employee retention is one of the top most priorities for the organisation’s performance.
The study explores the importance of the employee retention and how it affects the organisational performance. The study also investigates the strategies adopted by the IBM India. With the aid of valuable data, the study explores the link between retaining the best talents in the market and an increase in the organisational performance.

Read More...
Professionalism: Understanding its Meaning and Impact in Relation to Effective Teaching and Learning

Asghar Hussain

Abstract

This paper will focus on elucidating what it means to be a modern professional in the teaching sector. It will discuss the notion of professionalism in light of changes in education and educational reform. Furthermore, it will highlight the importance of reflective practice, and as a consequence, the teachers will develop a clear understanding of their position within the educational sector as professional practitioners.

Read More...
Creating Brands for Airline Industry – Marketing Planning to Launch a Commercial Helicopter Service

Adnan Ashraf, Yousaf Raheel, Muhammad Adeel, Asghar Hussain

Abstract

Over the years, tourism industry has remained a key player in Pakistani economy. It has although seen its worst downfall in history due to the incidents of terrorism in the past 15 years, in the recent years, this industry is on the rise/booming again. Airline industry has played a key role in connecting far-flung tourist heavens of Pakistan to the mainland. After researching the Pakistani airline industry, this work provides a preliminary marketing plan for a proposed commercial helicopter service for a leading airline in Pakistan. The paper includes a comprehensive internal and external analysis of the airline to assess the feasibility of the proposed service. Besides providing a situation analysis, this paper also includes a detailed 4 Ps analysis, and an evaluation of value addition for the consumer in the proposed marketing strategy.

Read More...
Internal and External Analysis of a UK Retailer and Identification of Variables for Assessment

Braydon Guascoine, Surintan Binti

Abstract

Before devising a strategy, it is requisite to perform the internal and external analysis of the company to better understand its market position. This paper aims to provide a detailed assessment of the UK retailer Sainsbury’s through PEST analysis, Porter’s Five Force model, SWOT analysis, 7S model and a brief financial position analysis. The research will not only help identify the current position and future opportunities for Sainsbury’s but will also help identify the variables through which other UK retailers could be assessed in future.

Read More...
An Evaluation of the Fresh Fruit and Vegetable Supply Chain of a UK Retailer

Braydon Guascoine, Surintan Binti, Zhang Yongtan

Abstract

With over 1100 stores nation-wide and revenue of more than £23 billion Sainsbury’s is one of the UK’s largest retail groups. This paper provides a much-needed insight into the supply chain of Sainsbury’s in context of fast-spoiling fresh fruit and vegetable product line. A detailed overview of literature has been conducted to highlight the best practices in supply chain management process which has helped identify important components of the SCM an organisation should focus on. With the help of this overview, questionnaires were prepared to conduct a survey from the customers and the staff of Sainsbury’s. As a result of this survey, critical problems in Sainsbury’s supply chain management process for fresh fruit and vegetables were identified  

Read More...
SKEP & SEEKDP: Towards Secure and Energy-Efficient Key Exchange and Distribution in Wireless Sensor Networks

Munir Hussain, Khalid Khan

Abstract

Security and Energy are important issues when wireless sensor network (WSN) is deployed in harsh environments. WSN security becomes real challenge for the researchers because these networks are vulnerable to security attacks due to the broadcast nature of transmission. Due to the limited memory, CPU, and battery power of sensor nodes, traditional asymmetric-key distribution protocols are expensive and rather infeasible. Thus only a very few conventional protocols can readily be used in sensor networks and key management schemes should be designed carefully to reduce computations power over the sensor node as well. In this paper we analyse existing Key Management Protocols like SPINS, SEKEN, SNAKE, Security Architecture for Mobile WSNs and BROSK for their vulnerabilities against Denial of Service attacks. In WSNs, where the most protocols working on point-to-point handshaking procedures to negotiate link dependent keys, this influence the scalability of the network, we present a novel protocol SKEP to construct link dependent keys by unicasting. We also propose SEEKDP a security protocol that prevents certain attacks, distribute keys, exchange information in an efficient manner and provide security by consuming less energy of regular sensor node.

Read More...
Strategic Planning: Analysis of the Past, Present, and Future Strategies of the Vodafone

Bernd Sanger , Emine Beyza Arikan, Asma Hosseini

Abstract

This paper provides an evaluation of the past, present, and future strategic plans of Vodafone. To design any strategy for future, it is imperative to analyse the important parts of strategic plans of the company in the past. Thus in this work, we provides a detailed analysis of Vodafone’s strategic plan from the past decade. Similarly, to identify the aspects of strategic importance for Vodafone in the present times, this work provides an overview of the key components of the current strategic plan of Vodafone. Finally, based on the study of the past and present strategies, and critical variables affecting telecom industry in general and Vodafone in particular, this work proposes some critical components of any future strategic plan for Vodafone. Based on the analysis as part of this work, we also propose various improvements to the value chain of Vodafone.

Read More...
Analysis of the Key Components of Supply Chain of a UK Retailer in the Context of Fresh Fruit and Vegetable

Braydon Guascoine, Surintan Binti, Zhang Yongtan, Panagiotis Lekakos

Abstract

This paper is aimed at evaluation of the supply chain of Sainsbury’s, one of the leading UK retailers in context of delivery of fruits and vegetables. We will assess supply chain of Sainsbury’s in context of key components such as inventory, facilities, transportation, and warehousing technologies. We attempt to analyse how Sainsbury’s manages their supply chain function to ensure the effective and efficient flow of fresh fruit and vegetable into operation, so as to better serve customer and reduce costs. We will explore their practices and discuss how recent improvements in their supply chain have helped Sainsbury’s become a more efficient and cost-effective.

Read More...
Lateness and Absenteeism in Observed Classes: A Reflection on Practice

Asghar Hussain, Muhammad Adeel

Abstract

This paper focuses on the issues of creativity in teaching, motivation, and the ways in which various strategies can be implemented to promote inclusive teaching practice. Furthermore, through the use of these strategies, and, a selection of relevant learning theories, we will attempt to come to logical and reasoned conclusions on how best to tackle the critical incidents presented in this case study.

Read More...
Privacy-Preserving in Collaborative Working Environments

Wajeeha Naeem, Munam Ali Shah, Ahmad Kamran Malik

Abstract

A Collaborative Working Environment (CWE) requires information sharing but at the same time users’ privacy is another important requisite. In order to perform collaborative tasks efficiently, a user requires sharing of some of his information with other collaborating users. To manage the sharing and privacy issues effectively, we need to extend NIST standard Role-Based Access Control (RBAC) model. This will help users in order to allow them to specify their own rules that can be dynamically adapted at run time. There are some other models which are introduced to enhance collaborative sharing and improving privacy of users’ information such as Team-based Access Control (TMAC) Model and Extended RBAC Model which is an enhancement of core RBAC model. In this paper, these aforementioned models, which are related to sharing and privacy preservation, are discussed and after their implementation, they are compared and evaluated using privacy, sharing and rule based metrics.

Read More...
Consumer Marketing Engagement and Segment Multimedia Strategy for Launching a Beverage Product in Pakistan

Adnan Ashraf, Yousaf Raheel, Muhammad Adeel, Asghar Hussain

Abstract

Soft drinks market is the third largest revenue participant of Central Board of Revenue in terms of sales tax and excise duties. Pakistani beverage market has been growing since its inception. With several local and international companies interested in this lucrative business, this paper attempts to provide a much sought-after insight into various aspects of Pakistani consumer market by providing a consumer engagement and segment multimedia strategy for a future beverage product as a case study. The theories on consumer engagement and their application in perspective of Pakistani society, and a detailed analysis of considerable factors in consumer engagement in context of segment multimedia strategy are the highlights of this work. Although focused on Pakistani market, this case study is perfectly applicable in context of other Asian and African countries with similar socio-culture environment. 

Read More...

Copyright © 2015-2019 IOARP