Top Downloads section combines the most popular scholarly articles from IOARP conferences and journals published in IOARP Digital Library. Besides providing an insight into publications other researcher are interested in, Top Downloads are also a reflection of the recent trends and directions in a particular research domain.

 

If you are interested in Top Downloads of a particular conference or a journal, please visit the Top Downloads section in its respective website. If you want to access the list of our conferences and journals, please visit Browse Subjects menu option in IOARP website. If you are Still unsure, please write to us on info@ioarp.org.



Collecting Statistical Parameters on Mobile Phones for Detection of Security Attacks and Mobile Malware

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Abstract

Communication between mobiles using technologies like Bluetooth, MMS, SMS, Mobile and Home Broadband can increases their susceptibility to mobile security threats. In the past few years, mobile malware has emerged as one of the major threats for modern-day mobile devices. Since the first malware outbreak in 2004, hundreds of mobile viruses, worms, Trojans and spyware and over thousands of their variants have been discovered. With such a large number of ever-evolving malware, it is challenging to develop an electronic system capable of detecting such malware. In this work, the statistical data generated as a consequence of interactions on mobile devices and the mechanism of recording this data against statistical parameters on mobile devices is discussed. We also provide a detailed taxonomy of the low and high-order statistical parameters, and discuss how these parameters (besides utilisation in other scenarios) can be affectively utilised in the detection of a variety of security attacks and malware types.

Read More...
Smart Cities: Challenges and Beyond

Muhammad Hassan Raza, Munam Ali Shah, Muhammad Kamran Abbasi

Abstract

A smart city is an interconnection of objects in which each object plays a role of a source node. The data and information is collected from the source node for further computation and communication. A city can only be called a smart city if certain attributes are available such as clean water, good transport, energy efficiency, well-structured infrastructure, Internet of Things (IoT), mobile health (m-health), and Information and Communication Technologies (ICT). In this paper, we provide a comprehensive overview of the things that form a smart city. We focus on applications and technologies and identify different challenges in a smart city. Furthermore, the critical evaluation of different standards, architectures and frameworks form part of the paper. 

Read More...
5G Technology: An Overview of Applications, Prospects, Challenges and Beyond

Maryam Fizza, Munam Ali Shah

Abstract

This paper provides a comprehensive overview of an emerging mobile wireless communication technology, i.e., 5G. We provide a concise view of the advancements which are currently being investigated to deploy 5G wireless technology in an effective and beneficial way. We aim to provide an easy and state of the art view of architectures, applications and challenges of the 5G technology. We group existing approaches and provide a critical overview of the underlying details adapted by the 5G technology.

Read More...
Technical Evaluation of the Functionality of Popular Mobile Payment Protocols

Munir Hussain, Syed Usman Jamil

Abstract

Today, mobile commerce flexibility has totally changed businesses in the world due to easy mobile-based online bookings and payments. Its implementation is not limited to any single area but it can be utilized in all sorts of situations and organizations in various ways. It can be utilized in banking, electronic publication distribution, online sales, online payments for different utility bills and online booking of airlines etc. These kinds of online booking, buying and selling, and their payment services are available to anyone 24/7 in the world. When using these types of facilities, one needs to understand and study different types of characteristics of this new technology i.e., it is important to understand different modes of payments, various technologies using mobile payment system, and different M-commerce payment protocols. As we know that energy consumption is a critical issue in M-commerce, so it is important to reduce battery power consumption as much as possible. In this paper, we will explore some of the most popular mobile payment protocols step-by-step to fully understand their working environment.  

Read More...
Analysis of Efficient Market Hypothesis and Behavioral Finance

Emine Beyza Arikan, Bernd Sanger, Mehul Mehta

Abstract

The efficient market hypothesis suggests that at any given time in a capital market, the prices of stock reflect all available information. Hypothesis implies that it is impossible to beat the market because the market price always incorporates all the relevant information that may influence the price of a stock. Some researchers, based on the historic evidence, contradict with this hypothesis and challenge the presence of a perfect rationale behind the hypothesis. Behavioural finance on the other hand combines behavioural and cognitive psychological theory with economics and finance to provide explanations behind the irrational financial decisions investors make. Using these theories, behavioural finance explains stock market anomalies such as severe rises or falls in stock price. Behavioural finance assumes that both information structure and the characteristics of market investors influence investment decision of the individuals. This paper provides a thorough analysis of efficient market hypothesis and behavioural finance by taking into account the literature and market statistics.

Read More...
Analysis of Embedded Web Resources in Web of Things

Muhammad Nazim, Munam Ali Shah, Muhammad Kamran Abbasi

Abstract

It is estimated that 42 million devices are currently connected to the Internet. These devices are accessible to a web interface through which a user can easily connect and utilize these devices by a simple Internet web browser forming a Web of Things (WoT). The connectivity of millions of devices through WoT has eliminated the need of a proprietary or control software. In this paper, we investigate these web services and analyze web embedded devices and related services in WoT. We aim to provide an easy and concise view of the underlying WoT model adapted by each approach.

Read More...
On the Importance of Communicating Behaviour Expectations in the First Session of a Class

Muhammad Adeel

Abstract

Classroom management has a critical impact on effective teaching and learning. Classroom disruptions are the pattern of repeated behaviour that significantly interrupts the teaching and learning process. It, therefore, becomes vital to handle these disruptions and the ability of a teacher to handle classroom discipline is given key priority in observation of teaching and learning conducted by the regulators. In this paper, we will focus on evaluating the importance of communicating behaviour expectations to the students in the very first session and its impact on effective teaching and learning. The analysis is based on the review of the literature, interviews, and a survey questionnaire completed by the teachers.

Read More...
Problems Encountered By a Pre-School Teacher

Enzo Gomes Faria, Limoncho Tatoyoz, Muhammad Juman

Abstract

In this paper we aim at understanding the various problems encountered by a preschool teacher. The purpose of this paper is to elaborate root problems which are faced by teachers of all spectrums in kindergarten schools. We will also discuss different scenarios these super humans encounter in their day to day routine. It is often thought that teaching kids is fun, which is not always true. The toddlers have sudden mood swings and this can be very irritating for teachers when they have to handle a big class full kids who can’t even handle themselves and find every solution in crying. Patience and engaging activities planned by teachers is the only way which helps them in class control. The other problems faced by them are related to curriculum planning, hectic paperwork, handling administration, working in alliance with parents, low pays, and most of all handling toddler’s behavior.

Read More...
Wireless Body Area Network (WBAN): Security and Authentication Methods

Munir Hussain

Abstract

The demand for WBAN has increased for last few years because it is useful network to monitor and improve various health conditions of human being. Information’s exchanges among different entities are very sensitive, so it is vital to keep this information’s secure from unauthorized access in order to avoid unpleasant incidents. Security and privacy are the most critical issues. Security is the important issue for any network and especially in WBANs its proper management is very crucial otherwise biomedical data collected by sensor nodes should be mixed with other user’s data. Also patients do not want their personal data to be misused and WBAN should provide the privacy to prevent eavesdropping. Mutual authentication is also a key challenge in WBAN and patients’ data originality and integrity are important for their treatment diagnosis etc. Development of the new mutual authentication schemes in healthcare applications without considering security makes patient privacy vulnerable. In this paper, we discuss communication technologies, possible attacks and recently most used popular authentication methods in WBANs.

Read More...
Roles of Glycine Betaine and Proline in Improving Plant Abiotic Stress Resistance

Joana Filho, Luís Cardoso, Héctor Rosado

Abstract

Glycine betaine and proline are two prominent natural osmolytes that gather in a variety of plant species in response to environmental stresses. In spite of the fact that their real jobs in plant osmotolerance stay controversial, both compounds are thought to have positive effects on enzyme and membrane integrity along with adaptive roles in mediating osmotic adjustment in plants grown under stress conditions. While numerous investigations have shown a positive connection between accumulation of glycine betaine and proline and plant stress tolerance, some have contended that the increase in their concentrations under stress is a product of and not an adaptive response to stress (Ashraf & Foolad, 2007). The accumulation of osmolytes like glycine betaine in the cell is known to ensure life forms against abiotic stresses by means of osmoregulation or osmoprotection. Transgenic plants designed to create glycine betaine accumulate very low concentration of glycine betaine, which normally cannot be sufficient for osmoregulation. In this manner, different jobs of glycine betaine like cell macromolecule security and ROS detoxification have been recommended as components in charge of abiotic stress resilience in transgenic plants. Moreover, glycine betaine impacts articulation of a few endogenous genes in the transgenic plant. New insights gained about the mechanism of stress tolerance in glycine betaine amassing transgenic plants are discussed further. (Giri, 2011)

Read More...
Evaluation of the MPeersim – A Simulation Environment for Mobile Networks

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Abstract

MPeersim is a simulation environment for mobile and mobile P2P networks. It simulates different types of mobile nodes and communication technologies such as Bluetooth, MMS, and SMS. With a primary emphasis of evaluation of MPeersim in terms of simulation statistics, this paper will elaborate on various MPeersim functionalities in context of availability of generic, node, and network-specific simulation parameters, node and network-specific statistics available for various types of analyses, and on the capabilities of MPeersim in terms of presenting empirical data in different formats including graphs and visualisation for monitoring purposes. Providing a comprehensive understanding of the relationship between parameters and statistics will assist researchers in planning for developing simulation environments.

Read More...
Efficient Data Aggregation Scheme in Secure Tree based Wireless Sensor Networks (EDAS)

Khalid Khan

Abstract

Wireless sensor networks (WSNs) have emerged as an important area of research from the last two decades. In WSNs, sensors have limited memory, computational capability and battery power. One of the solutions to these issues is to reduce the data transmission and today, various data aggregation protocols have been proposed to reduce network traffic. But they created security issues like authentication, data integrity and freshness. Hop-by-hop secure data aggregation protocols were proposed to provide security along with data aggregation function. But, data on the aggregators still need to be secured because aggregators are exposed to node compromises. End-to-end secure data aggregation protocols are proposed. They provide end-to-end security and privacy of data. One of these protocols is Secure End-to-End Data Aggregation (SEEDA), which ensured end-to-end privacy of data. However, the protocol has higher communication cost and computational overheads because it sends extra bits/data regarding non-responding nodes and performs unnecessary computations for non-responding nodes. I proposed new protocol, EDAS which reduces 12% to 25% communication and computational overheads as compared to SEEDA and it is also efficient in energy consumption.

Read More...
Curriculum Development for Inclusive Education

Asghar Hussain

Abstract

Using a short revision course as a test case, this paper will look at the wider issues revolving around developing a curriculum; it will look closely at the process and praxis of the educational journey to attain the product with a deeper understanding of what is being studied. The paper will also discuss how the managing of product and process, amidst a lecturer/teacher’s knowledge of their students is increasingly important. In addition, recognizing the student’s objectives and pushing them to search out (with a certain degree of autonomy) their own objectives through reflection and contextualization of learning.

Read More...
Analysis of Critical Aspects of M-commerce and Mobile Payment Systems

Munir Hussain

Abstract

The fast spreading of wireless technology services are more focusing on businesses area rather than targeting customers. Even now, this advancement in the mobile technology continues to bang the international business market intensely, modern mobile technologies and their applications are more focusing the mobile business area. Today, the world of electronic transactions is switching from E-commerce to M-commerce. In order to solve critical issues in M-commerce it becomes vital to understand different concepts and technologies associated with M-commerce. The first part of this paper gives overview of M-commerce in terms of their characteristics, applications, and issues pertaining to it, including many critical issue such battery power consumption in M-commerce transactions. Battery is one of the most important and scarce resources in mobile devices thus to extend the mobile devices battery lifetime, it becomes important to save the battery resource as much as possible. The second part of this paper focuses on exploring various aspects of enabling mobile payment systems, mobile payment modes and characteristics and the payments system requirements.  

Read More...
Efficient Market Hypothesis: An Evaluation of the Efficiency of Indian Capital Markets

Bernd Sanger, Emine Beyza Arikan, Mehul Mehta, Asma Hosseini

Abstract

Market efficiency refers to the accuracy and quickness with which prices reflect market related information. Decisions of investment by an investor in a market is influenced by many factors, one of the most important is the market efficiency. Research reveals that if a market is efficient, it is extremely difficult to make excessive returns. In an efficient market there exist next to none undervalued securities. With the first stock exchange started functioning in 1875 Indian stock markets have been lucrative for the traders from around the world. This paper attempts to analyse the efficiency of the Indian capital markets. Research from the literature and the interviews of the renowned investors have been used to reach a conclusion. Some tips in context of investment strategy have also been provided.

Read More...
Understanding Employee Retention: Processes, Best Practices, Myths, and Important Factors

Assem Bin Bandar, Ahmed Alhoqail, Jiangling Liu

Abstract

The study describes the relationship between the Human Resource Management practices and the employee retention. It has become essential to retain the best employees to the organisations performance. The research reviews relevant literature to identify HR practices that influence the employee retention and also the effect on the overall organisational performance by retaining the right and efficient employees. Therefore, it is important to have a productive and efficient workforce to collectively focus on the organisation’s success. In this paper we provide highlight the importance of employee retention in HRM, discuss the critical process and best practices in employee retention, briefly summarise the myths in the context, and provide a detailed discussion on the factors affecting employee retention.

Read More...
Lightweight Secure and Scalable Key Sharing Protocol for Wireless Sensor Networks

Munir Hussain, Khalid Khan

Abstract

Wireless Sensor Networks (WSN) technology is still immature and thus faces a variety of problems due to limited memory, CPU and battery power resources. WSNs are prone to active and passive attacks. While the former is capable of affecting minimal resources, the latter type of attack is difficult to launch but very powerful in terms of affecting critical resources. Most shared key security protocols used in WSNs are not scalable as they depend upon third party or KDC. Although in some situations this concept works well, besides reducing scalability, finding a trustworthy third party is also very difficult in KDC concept of key sharing. This paper gives a brief overview of WSNs, posed security threats to these networks and relevant security issues. This paper also brings in a novel key sharing model for traversing secret key in WSNs that does not depend on third party concept and hence it is a more scalable and secure.

Read More...
Professionalism: Understanding its Meaning and Impact in Relation to Effective Teaching and Learning

Asghar Hussain

Abstract

This paper will focus on elucidating what it means to be a modern professional in the teaching sector. It will discuss the notion of professionalism in light of changes in education and educational reform. Furthermore, it will highlight the importance of reflective practice, and as a consequence, the teachers will develop a clear understanding of their position within the educational sector as professional practitioners.

Read More...
ICN Framework and Its Challenges for IOT Applications

Syed Usman Jamil, Khalid Khan

Abstract

The early internet user needs were coped by current internet architecture that was based on host-centric communication model. Now a day, usage as well as requirements of internet is changed however mostly internet users are interested to access large amount of data/information regardless of physical location.  This paradigm changes in the internet usage model along with mobility support, better security and pressing needs of users has invited researchers to consider radical changes in the internet architecture. By following this direction, we have reviewed many on-going efforts of researchers in which the future internet can be developed on the foundation of Information- Centric Networking. To sync billions of objects over the internet is promised by the internet of things (IOT). To deploy numerous individual IOT architectures, in domains of diverse nature, the ongoing trend is to deploy a common IOT platform, so that objects may be accessible and synchronized with applications across domains and organizations. To achieve this goal, limited proposals are developed to model unified host centric IOT infrastructure operate at upper layer of current host centric internet. Therefore, fundamental mismatch is evident in between the today’s host centric nature of internet and IOT system having information centric nature. We propose to develop common set of services and protocols to resolve this mismatch, which form a platform for IOT, on the basis of ICN paradigm, which may be named as ICN-IOT platform.  ICN-IOT merger is the ICN salient feature and therefore enables seamless scalability, mobility support and efficient service and content delivery. The main aim of these investigations is to find out the core functionalities of ICN architectures, overview of IOT functionalities and architectural requirements, and the review of ICN over IOT implementations and their advantages and challenges to sketch out the key unresolved challenges in this field of networking research. 

Read More...
Creating Brands for Airline Industry – Marketing Planning to Launch a Commercial Helicopter Service

Adnan Ashraf, Yousaf Raheel, Muhammad Adeel, Asghar Hussain

Abstract

Over the years, tourism industry has remained a key player in Pakistani economy. It has although seen its worst downfall in history due to the incidents of terrorism in the past 15 years, in the recent years, this industry is on the rise/booming again. Airline industry has played a key role in connecting far-flung tourist heavens of Pakistan to the mainland. After researching the Pakistani airline industry, this work provides a preliminary marketing plan for a proposed commercial helicopter service for a leading airline in Pakistan. The paper includes a comprehensive internal and external analysis of the airline to assess the feasibility of the proposed service. Besides providing a situation analysis, this paper also includes a detailed 4 Ps analysis, and an evaluation of value addition for the consumer in the proposed marketing strategy.

Read More...
Evaluation of Employee Retention Strategies in Indian BPO Industry: IBM Case Study

Assem Bin Bandar, Qusai Farouq Almeqdadi, Jiangling Liu

Abstract

Over the past two decade the importance of the employee retention has grown. Most of the organisations understand that human resources are one of the primary factors for the organisational success and their growth. In the globalised world the competition between the organisations has increased and they are not going back to pay the price to acquire and retain the best talents in the market. Efficient and dedicated employees will drive the organisation towards goals. In the Human resource management the employee retention is one of the top most priorities for the organisation’s performance.
The study explores the importance of the employee retention and how it affects the organisational performance. The study also investigates the strategies adopted by the IBM India. With the aid of valuable data, the study explores the link between retaining the best talents in the market and an increase in the organisational performance.

Read More...
An Evaluation of the Fresh Fruit and Vegetable Supply Chain of a UK Retailer

Braydon Guascoine, Surintan Binti, Zhang Yongtan

Abstract

With over 1100 stores nation-wide and revenue of more than £23 billion Sainsbury’s is one of the UK’s largest retail groups. This paper provides a much-needed insight into the supply chain of Sainsbury’s in context of fast-spoiling fresh fruit and vegetable product line. A detailed overview of literature has been conducted to highlight the best practices in supply chain management process which has helped identify important components of the SCM an organisation should focus on. With the help of this overview, questionnaires were prepared to conduct a survey from the customers and the staff of Sainsbury’s. As a result of this survey, critical problems in Sainsbury’s supply chain management process for fresh fruit and vegetables were identified  

Read More...
Internal and External Analysis of a UK Retailer and Identification of Variables for Assessment

Braydon Guascoine, Surintan Binti

Abstract

Before devising a strategy, it is requisite to perform the internal and external analysis of the company to better understand its market position. This paper aims to provide a detailed assessment of the UK retailer Sainsbury’s through PEST analysis, Porter’s Five Force model, SWOT analysis, 7S model and a brief financial position analysis. The research will not only help identify the current position and future opportunities for Sainsbury’s but will also help identify the variables through which other UK retailers could be assessed in future.

Read More...
SKEP & SEEKDP: Towards Secure and Energy-Efficient Key Exchange and Distribution in Wireless Sensor Networks

Munir Hussain, Khalid Khan

Abstract

Security and Energy are important issues when wireless sensor network (WSN) is deployed in harsh environments. WSN security becomes real challenge for the researchers because these networks are vulnerable to security attacks due to the broadcast nature of transmission. Due to the limited memory, CPU, and battery power of sensor nodes, traditional asymmetric-key distribution protocols are expensive and rather infeasible. Thus only a very few conventional protocols can readily be used in sensor networks and key management schemes should be designed carefully to reduce computations power over the sensor node as well. In this paper we analyse existing Key Management Protocols like SPINS, SEKEN, SNAKE, Security Architecture for Mobile WSNs and BROSK for their vulnerabilities against Denial of Service attacks. In WSNs, where the most protocols working on point-to-point handshaking procedures to negotiate link dependent keys, this influence the scalability of the network, we present a novel protocol SKEP to construct link dependent keys by unicasting. We also propose SEEKDP a security protocol that prevents certain attacks, distribute keys, exchange information in an efficient manner and provide security by consuming less energy of regular sensor node.

Read More...
Integrated Marketing Communication Strategy: Launching a Beverage Product in South Asian Markets

Yousaf Raheel

Abstract

This paper provides an integrated marketing communication strategy for launching a beverage product in Pakistan. Context analyses conducted as part of this study include internal and external analysis, business analysis, stakeholder analysis, and customer analysis. In context of marketing communication strategy, this research includes SMART marketing communication objectives, a detailed discussion on considerations in developing marketing communication strategy, a comprehensive strategy to achieve marketing communication objectives, and discussion on the mechanism of controlling and evaluation of marketing communications plan. It is important to highlight that although in this work, a focus has been placed on the consumer market of Pakistan, due to socio-cultural and demographic similarities between the countries in South Asia, this strategy will prove equally effective in India, Bangladesh, Afghanistan, Sri Lanka, Maldives, Nepal and Bhutan.

Read More...

Copyright © 2015-2019 IOARP