252 research outputs found

    Government employment statistics for Pakistan

    Get PDF

    Commercial policy of Pakistan

    Get PDF

    Problems of budgetary reform in Pakistan

    Get PDF

    AM-DisCNT: Angular Multi-hop DIStance based Circular Network Transmission Protocol for WSNs

    Full text link
    The nodes in wireless sensor networks (WSNs) contain limited energy resources, which are needed to transmit data to base station (BS). Routing protocols are designed to reduce the energy consumption. Clustering algorithms are best in this aspect. Such clustering algorithms increase the stability and lifetime of the network. However, every routing protocol is not suitable for heterogeneous environments. AM-DisCNT is proposed and evaluated as a new energy efficient protocol for wireless sensor networks. AM-DisCNT uses circular deployment for even consumption of energy in entire wireless sensor network. Cluster-head selection is on the basis of energy. Highest energy node becomes CH for that round. Energy is again compared in the next round to check the highest energy node of that round. The simulation results show that AM-DisCNT performs better than the existing heterogeneous protocols on the basis of network lifetime, throughput and stability of the system.Comment: IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, Franc

    Acute-on-chronic Liver Failure: MELD Score 30-day Mortality Predictability and Etiology in a Pakistani Population

    Full text link
    Background: Cirrhosis is a pathological condition that ultimately leads to liver failure. Acute on chronic liver failure (ACLF) has a high short term mortality rate. Viral hepatitis is the most common cause of liver failure in our local population. We carried out this study to identity the 30-day mortality and etiology of patients presenting with ACLF using Model for End-Stage Liver Disease (MELD) score predictability. Methodology: This was a descriptive case series, conducted at Sheikh Zayed Hospital, Lahore, Pakistan from January 31, 2018 to July 30, 2018. One hundred and eighty five patients who met the inclusion criteria were enrolled using 95% confidence level and 4% margin of error. Data was entered and analyzed with SPSS version 23.0. Numerical variables including age was presented by Mean ± S.D. Categorical variables i.e. gender, etiology of acute-on-chronic liver failure and 30-day mortality were presented by frequency and percentage. Data was stratified for age, gender, duration of chronic liver disease and MELD grade to address the effect modifiers. Post-stratification chi-square test was calculated using 95% significance (p≤0.05). Results: Majority of the enrolled patients were male (74.6%) while only 25.4% of the patients were female. One hundred and thirty patients (70.3%) had underlying viral hepatitis while twelve patients (6.5%) and forty three patients (23.2%) presented with alcoholic liver disease and drug-induced ACLF, respectively. Eighty patients (43.2%) died within 30 days of admission.The 30-day mortality with respect to MELD grade was statistically significant (p<0.001) with the highest mortality noted in grade-IV and thirty five patients (43.8%) dying within 30 days of admission (p<0.001). Grade-II and III MELD scores also contributed to the 30-day mortality with twenty three patients (28.8%) and nineteen patients (23.8%) dying within 30 days of admission (p<0.001). Conclusion: MELD scores are able to accurately predict the short-term mortality in patients with ACLF and viral hepatitis was the most common etiology in our population. Early detection and use of appropriate prognostic models may alleviate mortality and morbidity in paitents with ACLF

    SIMPLE: Stable Increased-throughput Multi-hop Protocol for Link Efficiency in Wireless Body Area Networks

    Full text link
    In this work, we propose a reliable, power efficient and high throughput routing protocol for Wireless Body Area Networks (WBANs). We use multi-hop topology to achieve minimum energy consumption and longer network lifetime. We propose a cost function to select parent node or forwarder. Proposed cost function selects a parent node which has high residual energy and minimum distance to sink. Residual energy parameter balances the energy consumption among the sensor nodes while distance parameter ensures successful packet delivery to sink. Simulation results show that our proposed protocol maximize the network stability period and nodes stay alive for longer period. Longer stability period contributes high packet delivery to sink which is major interest for continuous patient monitoring.Comment: IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, Franc

    BIG DATA IN SMART CITIES: A SYSTEMATIC MAPPING REVIEW

    Get PDF
    Big data is an emerging area of research and its prospective applications in smart cities are extensively recognized. In this study, we provide a breadth-first review of the domain “Big Data in Smart Cities” by applying the formal research method of systematic mapping. We investigated the primary sources of publication, research growth, maturity level of the research area, prominent research themes, type of analytics applied, and the areas of smart cities where big data research is produced. Consequently, we identified that empirical research in the domain has been progressing since 2013. The IEEE Access journal and IEEE Smart Cities Conference are the leading sources of literature containing 10.34% and 13.88% of the publications, respectively. The current state of the research is semi-matured where research type of 46.15% of the publications is solution and experience, and contribution type of 60% of the publications is architecture, platform, and framework. Prescriptive is least whereas predictive is the most applied type of analytics in smart cities as it has been stated in 43.08% of the publications. Overall, 33.85%, 21.54%, 13.85%, 12.31%, 7.69%, 6.15%, and 4.61% of the research produced in the domain focused on smart transportation, smart environment, smart governance, smart healthcare, smart energy, smart education, and smart safety, respectively. Besides the requirement for producing validation and evaluation research in the areas of smart transportation and smart environment, there is a need for more research efforts in the areas of smart healthcare, smart governance, smart safety, smart education, and smart energy. Furthermore, the potential of prescriptive analytics in smart cities is also an area of research that needs to be explored

    Prevalence of Muscle Dysmorphia and Associated Health Activities in Male Medical Students in Karachi, Pakistan

    Full text link
    Background: Muscle Dysmorphia (MD) is a subtype of body dysmorphic disorder (BDD) and is currently classified under anxiety disorders (subheading: Obsessive-compulsive disorder) in DSM 5. MD is hypothesized to affect the self-esteem and social outlook of the younger generation. MD shows a higher rate in males and may influence their self-confidence rendering them more prone towards using steroids, supplementary proteins and other drugs to alter their physical outlooks as shown in previous studies. This problem has been on the rise lately due to revolutionary advancement in the media and film industry and the abrupt changes about the standards of physical good looks and body shapes. With the lack of studies done in our population, our study will be helpful to consider the prevalence of the disease in our setting and increase awareness in the general public and clinicians. We hope to help clinicians/ therapists find better options in managing the disease. Materials: We performed a cross-sectional study with a sample size of 246 medical school students in Karachi to collect data through self-administered questionnaires. We used the DSM 5 criteria for the diagnosis of BDD and additional questions on the presence of MD. Nutritional habits, exercise routines, use of supplements and drugs were also obtained for exploratory analysis. Results: Our study predicted the prevalence of MD to be 25%. Other main findings included statistical significant associations between MD and the thoughts and practice of steroid use for muscularity. Conclusion: MD is an underdiagnosed and often unrecognized disease that we believe has significant consequences for the young male population. Further work is needed on this in our part of the world. Our research, we believe, can be a stepping stone for further studies that would incorporate wider populations

    Protocol-specific and sensor network-inherited attack detection in IoT using machine learning

    Get PDF
    For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy Networks (RPL) was developed. Additionally, a number of optimizations have been suggested for its application in other contexts, such as smart hospitals, etc. Although these networks offer efficient routing, the lack of active security features in RPL makes them vulnerable to attacks. The types of attacks include protocol-specific ones and those inherited by wireless sensor networks. They have been addressed by a number of different proposals, many of which have achieved substantial prominence. However, concurrent handling of both types of attacks is not considered while developing a machine-learning-based attack detection model. Therefore, the ProSenAD model is proposed for addressing the identified gap. Multiclass classification has been used to optimize the light gradient boosting machine model for the detection of protocol-specific rank attacks and sensor network-inherited wormhole attacks. The proposed model is evaluated in two different scenarios considering the number of attacks and the benchmarks for comparison in each scenario. The evaluation results demonstrate that the proposed model outperforms with respect to the metrics including accuracy, precision, recall, Cohen’s Kappa, cross entropy, and the Matthews correlation coefficient

    A three-level ransomware detection and prevention mechanism

    Get PDF
    Ransomware encrypts victim's files or locks users out of the system. Victims will have to pay the attacker a ransom to decrypt and regain access to the user files. Petya targets individuals and companies through email attachments and download links. NotPetya has worm-like capabilities and exploits EternalBlue and EternalRomance vulnerabilities. Protection methods include vaccination, applying patches, et cetera. Challenges faced to combat ransomware include social engineering, outdated infrastructures, technological advancements, backup issues, and conflicts of standards. Three- Level Security (3LS) is a solution to ransomware that utilizes virtual machines along with browser extensions to perform a scan, on any files that the user wishes to download from the Internet. The downloaded files would be sent over a cloud server relay to a virtual machine by a browser extension. Any changes to the virtual machine after downloading the file would be observed, and if there were a malfunction in the virtual machine, the file would not be retrieved to the user's system
    • …
    corecore