460 research outputs found

    Designing evaluation framework for the empirical assessment of COVID-19 mobile apps in Pakistan

    Get PDF
    The significant proliferation in the mobile health applications (Apps) amidst Coronaviruses disease 2019 (COVID-19) resulted in decision making problems for healthcare professionals, decision makers and mobile users in Pakistan. This decision making process is also hampered by mobile app trade-offs, multiple features support, evolving healthcare needs and varying vendors. In this regard, evaluation model for mobile apps is presented which completes in three different phases. In first phase, features-based criteria is designed by leveraging Delphi method, and twenty (20) mobile apps are selected from app stores. In second stage, empirical evaluation is performed by using hybrid multi criteria decision approaches like CRiteria Importance Through Inter-criteria Correlation (CRITIC) method has been used for assigning weights to criteria features; and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) method has been used for assessment of mobile app alternatives. In last step, decision making is performed to select the best mobile app for COVID-19 situations. The results suggest that proposed model can be adopted as a guideline by mobile app subscribers, patients and healthcare professionals.Qatar National Library and Qatar University - grant No. IRCC.2021-010

    GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment

    Get PDF
    Industry Internet of Things (IIoT) has become the most evolving area over the last few years. The number of IoT devices connected in industry has sharply elevated but this surge has led to the vulnerability and data breach such as if a malicious entry is made to the secure network, it will forfeit all the network resources. For this purpose a full pledged secure authentication method is essential to safeguard IIoT network. There is a bulky list of number of authentications protocols available to keep network safe with a variety of features so but it becomes herculean task for network administrator to pick the strong and secure authentication method due to huge number of criteria, conflicting objectives and availability of authentication protocols in industry environment. It has become imperative to get the most rational authentication method in devices operating in IIoT. To address this issue, a feature-oriented assessment framework is put forward to provide a ground for ranking and selection of best authentication mechanism. This framework uses a mathematic approach known as Graph Theory Matrix Approach (GTMA) and selects the best authentication method based on the number of features. These features are related to authentication and covers almost every aspect of authentication method and are used as benchmark for selection purposes. This framework takes into account the most important features and helps in selecting the best and most ideal features-oriented authentication method that can be employed in IIoT to keep the integrity and security of connected devices and overall network infrastructure.Qatar National Library and Qatar University - grant No. QUHI-CBE-21/22-1

    IoT platforms assessment methodology for COVID-19 vaccine logistics and transportation: a multi-methods decision making model

    Get PDF
    The supply chain management (SCM) of COVID-19 vaccine is the most daunting task for logistics and supply managers due to temperature sensitivity and complex logistics process. Therefore, several technologies have been applied but the complexity of COVID-19 vaccine makes the Internet of Things (IoT) a strong use case due to its multiple features support like excursion notification, data sharing, connectivity management, secure shipping, real-time tracking and monitoring etc. All these features can only feasible through choosing and deploying the right IoT platform. However, selection of right IoT platform is also a major concern due to lack of experience and technical knowledge of supply chain managers and diversified landscape of IoT platforms. Therefore, we introduce a decision making model for evaluation and decision making of IoT platforms that fits for logistics and transportation (L&T) process of COVID-19 vaccine. This study initially identifies the major challenges addressed during the SCM of COVID-19 vaccine and then provides reasonable solution by presenting the assessment model for selection of rational IoT platform. The proposed model applies hybrid Multi Criteria Decision Making (MCDM) approach for evaluation. It also adopts Estimation-Talk-Estimation (ETE) approach for response collection during the survey. As, this is first kind of model so the proposed model is validated and tested by conducting a survey with experts. The results of the proposed decision making model are also verified by Simple Additive Weighting (SAW) technique which indicates higher results accuracy and reliability of the proposed model. Similarly, the proposed model yields the best possible results and it can be judged by the precision, accuracy and recall values i.e. 93%, 93% and 94% respectively. The survey-based testing also suggests that this model can be adopted in practical scenarios to deal with complexities which may arise during the decision making of IoT platform for COVID-19 SCM process.This work is supported by Qatar National Library, Doha, Qatar and QU Grant No. 2021-010.Scopu

    A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare

    Get PDF
    Internet of Things (IoT) devices have drawn significant attention over the last few years due to their significant contribution to every domain of life, but the major application of these devices has been witnessed in the healthcare sector. IoT devices have changed the complexion of healthcare set-up, however, the major limitation of such devices is susceptibility to many cyberattacks due to the use of embedded operating systems, the nature of communication, insufficient software updates, and the nature of backend resources. Similarly, they transfer a huge amount of sensitive data via sensors and actuators. Therefore, the security of Internet of Health Things (IoHT) devices remains a prime concern as these devices are prone to various cyberattacks, which can lead to compromising and violating the security of IoT devices. Therefore, IoT devices need to be authenticated before they join the network or communicate within a network, and the applied method of authentication must be robust and reliable. This authentication method has to be evaluated before being implemented for the authentication of IoT devices/equipment in a healthcare environment. In this study, an evaluation framework is introduced to provide a reliable and secure authentication mechanism based on authentication features. The proposed framework evaluates and selects the most appropriate authentication scheme/method based on evaluating authentication features using a hybrid multicriteria decision-making approach. It completes this in two steps: in the first step, the analytic hierarchy process (AHP) method is applied for assigning criteria weights; and in the second step, the technique for order preference by similarity to ideal solution (TOPSIS) approach selects the best authentication solution for IoHT devices based upon identified authentication features. This is the first attempt to present a features-based authentication model for selecting the improved authentication solution employed in IoHT devices.This research was funded by the Qatar National Library, Doha, Qatar and Qatar University internal grant IRCC-2021-010

    Metode Ijtihad Dan Dinamika Persoalan Di Kalangan Imam Madzhab

    Get PDF
    Background. There is no corner of space that is not touched by Islamic law, the difference in legal products from the results of ijtihad scholars is a blessing for the people. The problem is; Why do scholars differ on a religious issue? Aim. This study aims to explore the ijtihad method of madhhab scholars used as a tool to analyze all phenomena that occur, so that the roots of these differences are known.Methods. This research is a type of qualitative research in the form of library research, by exploring the arguments and methods used by scholars who then make legal products that are different from one another.Results. The results of this study indicate that differences are mercy, as long as these differences do not cause division, and always bring benefit with logical arguments and can be accepted by common sense, even though there are two types of differences, namely differences in reason (ikhtilaf al-aql), and differences in morals. (ikhtilaf al-akhlak), differences occur due to unequal contextualization, thus requiring different arguments and methods of ijtihad, resulting in unequal products from one another.Background. There is no corner of space that is not touched by Islamic law, the difference in legal products from the results of ijtihad scholars is a blessing for the people. The problem is; Why do scholars differ on a religious issue? Aim. This study aims to explore the ijtihad method of madhhab scholars used as a tool to analyze all phenomena that occur, so that the roots of these differences are known.Methods. This research is a type of qualitative research in the form of library research, by exploring the arguments and methods used by scholars who then make legal products that are different from one another.Results. The results of this study indicate that differences are mercy, as long as these differences do not cause division, and always bring benefit with logical arguments and can be accepted by common sense, even though there are two types of differences, namely differences in reason (ikhtilaf al-aql), and differences in morals. (ikhtilaf al-akhlak), differences occur due to unequal contextualization, thus requiring different arguments and methods of ijtihad, resulting in unequal products from one another

    Determinants of Banks Profitability: A Comparative Study of Islamic Verses Non Islamic, Foreign Verses Local, and Public Verses Private Banks in Pakistan

    Get PDF
    This study examines the determinants of banks profitability in Pakistan. The main objectives of the study are to determine the factors that influence banks profitability in Pakistan and to make recommendations for management decision making and policy objectives. A panel data of 25 banks (commercial, Islamic, foreign and local banks) in Pakistan was analyzed over period of 2006-2015, using panel data regression method to estimate common, fixed and random effect regression models. The two key measures of profitability (dependent variables) analyzed in this study comprised of ROA and Return ROE. The bank-specific factors were incorporated into the regression models, were Credit risk, Expenses Management, Deposits to total assets, non-interest income and size. The results for the ROA model indicate that size and deposit to total assets of bank is positively significant to bank profitability while credit risk, expenses management and non interest income are negatively affect the profitability. Moreover the results of ROE model indicates that credit risk and NII are negatively significant and Size is positively significant with banks profitability. This study also indicates the comparison between Islamic verses non Islamic, Foreign verses local, and public verses private banks which shows there different results on banks profitability

    The Influence of Board Characteristics on Shareholders Assessment of Risk for Small and Large Firms: Evidence from Pakistan

    Get PDF
    This unique study examines the alliance between board characteristics and shareholders assessment of risk as revealed in the volatility of stock returns for Pakistani listed companies. For this purpose, a sample of 30 manufacturing companies is used that are listed on Karachi Stock Exchange for the period of 2004 to 2013.  The study uses panel data analysis and reports that random effect model is the best results yielding method. Our hypothesis incorporates preceding evidence that the small and large firms have spectacularly diverse constitution of boards, shimmering the firms diverse monitoring and counseling needs. It is hypothesized and locate confirmation with the intention of entrenched the large firms are able to produce affirmative net benefits, in the appearance of lesser risk, form board independence, gender diversity and director ownership. On the other hand the finding of this study showed the board size is negatively associated with the shareholder assessment of risk for large firms and the positive associated with the assessment of risk for small firms. The CEO duality is positive associated with the assessment of risk for large and negative associated amid assessment of risk for small firms. The results have insinuation for regulatory authorities, shareholders and directors to take steps to improve the board competanices for better performance. Keywords: Board Characteristics, Shareholders Assessment of Risk, Panel Data Analysis, Karachi Stock Exchange JEL Classifications: G32, G34, G38

    Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review

    Get PDF
    Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, actuators, transceivers, or other wearable devices. Data in the IoT environment is susceptible to many threats, attacks, and risks. Therefore, a robust security mechanism is indispensable to cope with attacks, vulnerabilities, security, and privacy challenges related to IoT. In this research, a systematic literature review has been conducted to analyze the security of IoT devices and to provide the countermeasures in response to security problems and challenges by using mobile computing. A comprehensive and in-depth security analysis of IoT devices has been made in light of mobile computing, which is a novel approach. Mobile computing's technological infrastructures such as smartphones, services, policies, strategies, and applications are employed to tackle and mitigate these potential security threats. In this paper, the security challenges and problems of IoT devices are identified by a systematic literature review. Then, mobile computing has been used to address these challenges by providing potential security measures and solutions. Hardware and software-based solutions furnished by mobile computing towards the IoT security challenges have been elaborated. To the best of our knowledge, this is the first attempt to analyze the security issues and challenges of IoT in light of mobile computing and it will open a gateway towards future research

    Eco-Friendly Management of Nausinoe Geometralis Through Botanical Extracts on Jasmine Plant

    Get PDF
    Jasmine leaf webworm, Nausinoe geometralis, is a significant pest of Jasminum spp. commonly known as Jasmine plant. This plant holds a special place in Pakistan\u27s culture; as it is declared as its national flower. N. geometralis feeds on the leaves of the jasmine plant; leaving it damaged and unattractive. Current study aimed to evaluate the efficacy of four botanical extracts (i.e. Neem, Taramira, Lemon grass, and Cactus) against N. geometralis; to explore an effective and eco-friendly method to protect the jasmine plant. Different concentrations of extracts were prepared using distilled water. Bioassays were performed on third instar larvae of N. geometralis following leaf dip method for various exposure intervals. Outcomes revealed that Neem extract was highly effective to manage the test insect pest followed by Taramira, Lemon grass, and Cactus. LC50 values of Neem after 24, 48, 72, and 96 hours were 22.25, 11.11, 11.31, and 15.82 ppm, respectively. It was concluded that botanical extracts can be utilized as promising agents in developing effective management strategies against N. geometralis. Future research should focus on optimizing the application methods and exploring the synergistic effects of these botanical extracts with other eco-friendly control measures to enhance their effectiveness against N. geometralis in field conditions
    • …
    corecore