40 research outputs found

    HRM practices for knowledge management and retail firms’ performances: a comparative study among Malay and Chinese firms

    Get PDF
    The current study examines the impact of human resource management (HRM) practices for knowledge management (KM) on perceived business performances among Malay and Chinese firms in Malaysia. Data were collected through a face-to-face survey with 200 owners of firms, comprising 100 Malay entrepreneurs and 100 Chinese entrepreneurs, operating in the retail sector of Klang Valley, Malaysia. Data were analysed using Partial Least Squares Structural Equation Modeling (PLS-SEM) and Multi-Group Analysis (MGA). The results of PLSSEM revealed that HRM practices for KM have a direct and positive impact on the perceived financial performance, perceived non-financial performance, and perceived business growth of Malay and Chinese firms. However, non-significant impact of HRM practices for KM on perceived performance relative to competitors was found among Chinese firms. Results of MGA revealed significant differences between Malay and Chinese firms in relation to the impact of HRM practices for KM on perceived financial performance and perceived performance relative to competitors

    Blockchain-Based Land Registration System: A Conceptual Framework

    Get PDF
    Land registration authorities are frequently held accountable for the alleged mismanagement and manipulation of land records in various countries. Pakistan’s property records are especially vulnerable to falsification and corruption because of the country’s poverty. Different parties therefore claim varying degrees of authority over a specific piece of land. Given the fact that this data has been consolidated, it has become significantly more vulnerable to security threats. The goal of decentralized system research has been to increase the reliability of these systems. In order to fix the flaws of centralized systems, blockchain-based decentralized systems are currently in development. By using significant land record registration models as the basis for this research, we hope to create a proof-of-concept system or framework for future use. Pakistan’s land registration agency will benefit from our proposed conceptual framework. For the Pakistani government to implement a decentralized land record registry system, we propose a conceptual framework that outlines the essential components.publishedVersio

    Design of Multiplexers for IoT-Based Applications Using Stub-Loaded Coupled-Line Resonators

    Get PDF
    This paper presents the design of microstrip-based multiplexers using stub-loaded coupled-line resonators. The proposed multiplexers consist of a diplexer and a triplexer, meticulously engineered to operate at specific frequency bands relevant to IoT systems: 2.55 GHz, 3.94 GHz, and 5.75 GHz. To enhance isolation and selectivity between the two passband regions, the diplexer incorporates five transmission poles (TPs) within its design. Similarly, the triplexer filter employs seven transmission poles to attain the desired performance across all three passbands. A comprehensive comparison was conducted against previously reported designs, considering crucial parameters such as size, insertion loss, return loss, and isolation between the two frequency bands. The fabrication of the diplexer and triplexer was carried out on a compact Rogers Duroid 5880 substrate. The experimental results demonstrate an exceptional performance, with the diplexer exhibiting a low insertion loss of 0.3 dB at 2.55 GHz and 0.4 dB at 3.94 GHz. The triplexer exhibits an insertion loss of 0.3 dB at 2.55 GHz, 0.37 dB at 3.94 GHz, and 0.2 dB at 5.75 GHz. The measured performance of the fabricated diplexer and triplexer aligns well with the simulated results, validating their effectiveness in meeting the desired specifications.publishedVersio

    Exploring Lightweight Deep Learning Solution for Malware Detection in IoT Constraint Environment

    Get PDF
    : The present era is facing the industrial revolution. Machine-to-Machine (M2M) communication paradigm is becoming prevalent. Resultantly, the computational capabilities are being embedded in everyday objects called things. When connected to the internet, these things create an Internet of Things (IoT). However, the things are resource-constrained devices that have limited computational power. The connectivity of the things with the internet raises the challenges of the security. The user sensitive information processed by the things is also susceptible to the trusability issues. Therefore, the proliferation of cybersecurity risks and malware threat increases the need for enhanced security integration. This demands augmenting the things with state-of-the-art deep learning models for enhanced detection and protection of the user data. Existingly, the deep learning solutions are overly complex, and often overfitted for the given problem. In this research, our primary objective is to investigate a lightweight deep-learning approach maximizes the accuracy scores with lower computational costs to ensure the applicability of real-time malware monitoring in constrained IoT devices. We used state-of-the-art Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), and Bi-directional LSTM deep learning algorithm on a vanilla configuration trained on a standard malware dataset. The results of the proposed approach show that the simple deep neural models having single dense layer and a few hundred trainable parameters can eliminate the model overfitting and achieve up to 99.45% accuracy, outperforming the overly complex deep learning models.publishedVersio

    Internet of Things-Based Fire Alarm Navigation System: A Fire-Rescue Department Perspective

    Get PDF
    In the past few years, fire alarm systems have become increasingly sophisticated and more capable and reliable. The two main objectives are the protection of life and property. As a result of state and local codes, fire protection has become more concerned with life safety over the past two decades. Several safety measures have been implemented to address the problems caused by the fires and reduce the number of fatalities and property damage. Our project is to develop and review a fire alarm navigation system and application that uses the internet of things. Fire alarm systems are designed to warn people about fires in advance so that they can evacuate the fire-affected area and take immediate action to control the fire. There will be a GPS module, a flame sensor, a smoke sensor, buzzers, LEDs, and a GSM module to ensure early notification to authorities and fire stations. The aim is to reduce the loss of lives and property. A questionnaire was designed to conduct a brief survey in a multinational sports production company in Sialkot, Pakistan, regarding the IoT fire alarm navigation system. Besides installing the system in the factory, we compare the results with fire incident response time with and without this system at rescue 1122 fire head station.publishedVersio

    An Efficient and Secure Energy Trading Approach with Machine Learning Technique and Consortium Blockchain

    Get PDF
    In this paper, a secure energy trading mechanism based on blockchain technology is proposed. The proposed model deals with energy trading problems such as insecure energy trading and inefficient charging mechanisms for electric vehicles (EVs) in a vehicular energy network (VEN). EVs face two major problems: finding an optimal charging station and calculating the exact amount of energy required to reach the selected charging station. Moreover, in traditional trading approaches, centralized parties are involved in energy trading, which leads to various issues such as increased computational cost, increased computational delay, data tempering and a single point of failure. Furthermore, EVs face various energy challenges, such as imbalanced load supply and fluctuations in voltage level. Therefore, a demand-response (DR) pricing strategy enables EV users to flatten load curves and efficiently adjust electricity usage. In this work, communication between EVs and aggregators is efficiently performed through blockchain. Moreover, a branching concept is involved in the proposed system, which divides EV data into two different branches: a Fraud Chain (F-chain) and an Integrity Chain (I-chain). The proposed branching mechanism helps solve the storage problem and reduces computational time. Moreover, an attacker model is designed to check the robustness of the proposed system against double-spending and replay attacks. Security analysis of the proposed smart contract is also given in this paper. Simulation results show that the proposed work efficiently reduces the charging cost and time in a VEN.publishedVersio

    Wildfire Monitoring Based on Energy Efficient Clustering Approach for FANETS

    Get PDF
    Forest fires are a significant threat to the ecological system’s stability. Several attempts have been made to detect forest fires using a variety of approaches, including optical fire sensors, and satellite-based technologies, all of which have been unsuccessful. In today’s world, research on flying ad hoc networks (FANETs) is a thriving field and can be used successfully. This paper describes a unique clustering approach that identifies the presence of a fire zone in a forest and transfers all sensed data to a base station as soon as feasible via wireless communication. The fire department takes the required steps to prevent the spread of the fire. It is proposed in this study that an efficient clustering approach be used to deal with routing and energy challenges to extend the lifetime of an unmanned aerial vehicle (UAV) in case of forest fires. Due to the restricted energy and high mobility, this directly impacts the flying duration and routing of FANET nodes. As a result, it is vital to enhance the lifetime of wireless sensor networks (WSNs) to maintain high system availability. Our proposed algorithm EE-SS regulates the energy usage of nodes while taking into account the features of a disaster region and other factors. For firefighting, sensor nodes are placed throughout the forest zone to collect essential data points for identifying forest fires and dividing them into distinct clusters. All of the sensor nodes in the cluster communicate their packets to the base station continually through the cluster head. When FANET nodes communicate with one another, their transmission range is constantly adjusted to meet their operating requirements. This paper examines the existing clustering techniques for forest fire detection approaches restricted to wireless sensor networks and their limitations. Our newly designed algorithm chooses the most optimum cluster heads (CHs) based on their fitness, reducing the routing overhead and increasing the system’s efficiency. Our proposed method results from simulations are compared with the existing approaches such as LEACH, LEACH-C, PSO-HAS, and SEED. The evaluation is carried out concerning overall energy usage, residual energy, the count of live nodes, the network lifetime, and the time it takes to build a cluster compared to other approaches. As a result, our proposed EE-SS algorithm outperforms all the considered state-of-art algorithms.publishedVersio

    Anomaly Detection in Traffic Surveillance Videos Using Deep Learning

    Get PDF
    In the recent past, a huge number of cameras have been placed in a variety of public and private areas for the purposes of surveillance, the monitoring of abnormal human actions, and traffic surveillance. The detection and recognition of abnormal activity in a real-world environment is a big challenge, as there can be many types of alarming and abnormal activities, such as theft, violence, and accidents. This research deals with accidents in traffic videos. In the modern world, video traffic surveillance cameras (VTSS) are used for traffic surveillance and monitoring. As the population is increasing drastically, the likelihood of accidents is also increasing. The VTSS is used to detect abnormal events or incidents regarding traffic on different roads and highways, such as traffic jams, traffic congestion, and vehicle accidents. Mostly in accidents, people are helpless and some die due to the unavailability of emergency treatment on long highways and those places that are far from cities. This research proposes a methodology for detecting accidents automatically through surveillance videos. A review of the literature suggests that convolutional neural networks (CNNs), which are a specialized deep learning approach pioneered to work with grid-like data, are effective in image and video analysis. This research uses CNNs to find anomalies (accidents) from videos captured by the VTSS and implement a rolling prediction algorithm to achieve high accuracy. In the training of the CNN model, a vehicle accident image dataset (VAID), composed of images with anomalies, was constructed and used. For testing the proposed methodology, the trained CNN model was checked on multiple videos, and the results were collected and analyzed. The results of this research show the successful detection of traffic accident events with an accuracy of 82% in the traffic surveillance system videos.publishedVersio

    Classification of EEG Signals for Prediction of Epileptic Seizures

    Get PDF
    Epilepsy is a common brain disorder that causes patients to face multiple seizures in a single day. Around 65 million people are affected by epilepsy worldwide. Patients with focal epilepsy can be treated with surgery, whereas generalized epileptic seizures can be managed with medications. It has been noted that in more than 30% of cases, these medications fail to control epileptic seizures, resulting in accidents and limiting the patient’s life. Predicting epileptic seizures in such patients prior to the commencement of an oncoming seizure is critical so that the seizure can be treated with preventive medicines before it occurs. Electroencephalogram (EEG) signals of patients recorded to observe brain electrical activity during a seizure can be quite helpful in predicting seizures. Researchers have proposed methods that use machine and/or deep learning techniques to predict epileptic seizures using scalp EEG signals; however, prediction of seizures with increased accuracy is still a challenge. Therefore, we propose a three-step approach. It includes preprocessing of scalp EEG signals with PREP pipeline, which is a more sophisticated alternative to basic notch filtering. This method uses a regression-based technique to further enhance the SNR, with a combination of handcrafted, i.e., statistical features such as temporal mean, variance, and skewness, and automated features using CNN, followed by classification of interictal state and preictal state segments using LSTM to predict seizures. We train and validate our proposed technique on the CHB-MIT scalp EEG dataset and achieve accuracy of 94%, sensitivity of 93.8% , and 91.2% specificity. The proposed technique achieves better sensitivity and specificity than existing methods.publishedVersio
    corecore