454 research outputs found

    Designing evaluation framework for the empirical assessment of COVID-19 mobile apps in Pakistan

    Get PDF
    The significant proliferation in the mobile health applications (Apps) amidst Coronaviruses disease 2019 (COVID-19) resulted in decision making problems for healthcare professionals, decision makers and mobile users in Pakistan. This decision making process is also hampered by mobile app trade-offs, multiple features support, evolving healthcare needs and varying vendors. In this regard, evaluation model for mobile apps is presented which completes in three different phases. In first phase, features-based criteria is designed by leveraging Delphi method, and twenty (20) mobile apps are selected from app stores. In second stage, empirical evaluation is performed by using hybrid multi criteria decision approaches like CRiteria Importance Through Inter-criteria Correlation (CRITIC) method has been used for assigning weights to criteria features; and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) method has been used for assessment of mobile app alternatives. In last step, decision making is performed to select the best mobile app for COVID-19 situations. The results suggest that proposed model can be adopted as a guideline by mobile app subscribers, patients and healthcare professionals.Qatar National Library and Qatar University - grant No. IRCC.2021-010

    GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment

    Get PDF
    Industry Internet of Things (IIoT) has become the most evolving area over the last few years. The number of IoT devices connected in industry has sharply elevated but this surge has led to the vulnerability and data breach such as if a malicious entry is made to the secure network, it will forfeit all the network resources. For this purpose a full pledged secure authentication method is essential to safeguard IIoT network. There is a bulky list of number of authentications protocols available to keep network safe with a variety of features so but it becomes herculean task for network administrator to pick the strong and secure authentication method due to huge number of criteria, conflicting objectives and availability of authentication protocols in industry environment. It has become imperative to get the most rational authentication method in devices operating in IIoT. To address this issue, a feature-oriented assessment framework is put forward to provide a ground for ranking and selection of best authentication mechanism. This framework uses a mathematic approach known as Graph Theory Matrix Approach (GTMA) and selects the best authentication method based on the number of features. These features are related to authentication and covers almost every aspect of authentication method and are used as benchmark for selection purposes. This framework takes into account the most important features and helps in selecting the best and most ideal features-oriented authentication method that can be employed in IIoT to keep the integrity and security of connected devices and overall network infrastructure.Qatar National Library and Qatar University - grant No. QUHI-CBE-21/22-1

    A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare

    Get PDF
    Internet of Things (IoT) devices have drawn significant attention over the last few years due to their significant contribution to every domain of life, but the major application of these devices has been witnessed in the healthcare sector. IoT devices have changed the complexion of healthcare set-up, however, the major limitation of such devices is susceptibility to many cyberattacks due to the use of embedded operating systems, the nature of communication, insufficient software updates, and the nature of backend resources. Similarly, they transfer a huge amount of sensitive data via sensors and actuators. Therefore, the security of Internet of Health Things (IoHT) devices remains a prime concern as these devices are prone to various cyberattacks, which can lead to compromising and violating the security of IoT devices. Therefore, IoT devices need to be authenticated before they join the network or communicate within a network, and the applied method of authentication must be robust and reliable. This authentication method has to be evaluated before being implemented for the authentication of IoT devices/equipment in a healthcare environment. In this study, an evaluation framework is introduced to provide a reliable and secure authentication mechanism based on authentication features. The proposed framework evaluates and selects the most appropriate authentication scheme/method based on evaluating authentication features using a hybrid multicriteria decision-making approach. It completes this in two steps: in the first step, the analytic hierarchy process (AHP) method is applied for assigning criteria weights; and in the second step, the technique for order preference by similarity to ideal solution (TOPSIS) approach selects the best authentication solution for IoHT devices based upon identified authentication features. This is the first attempt to present a features-based authentication model for selecting the improved authentication solution employed in IoHT devices.This research was funded by the Qatar National Library, Doha, Qatar and Qatar University internal grant IRCC-2021-010

    Metode Ijtihad Dan Dinamika Persoalan Di Kalangan Imam Madzhab

    Get PDF
    Background. There is no corner of space that is not touched by Islamic law, the difference in legal products from the results of ijtihad scholars is a blessing for the people. The problem is; Why do scholars differ on a religious issue? Aim. This study aims to explore the ijtihad method of madhhab scholars used as a tool to analyze all phenomena that occur, so that the roots of these differences are known.Methods. This research is a type of qualitative research in the form of library research, by exploring the arguments and methods used by scholars who then make legal products that are different from one another.Results. The results of this study indicate that differences are mercy, as long as these differences do not cause division, and always bring benefit with logical arguments and can be accepted by common sense, even though there are two types of differences, namely differences in reason (ikhtilaf al-aql), and differences in morals. (ikhtilaf al-akhlak), differences occur due to unequal contextualization, thus requiring different arguments and methods of ijtihad, resulting in unequal products from one another.Background. There is no corner of space that is not touched by Islamic law, the difference in legal products from the results of ijtihad scholars is a blessing for the people. The problem is; Why do scholars differ on a religious issue? Aim. This study aims to explore the ijtihad method of madhhab scholars used as a tool to analyze all phenomena that occur, so that the roots of these differences are known.Methods. This research is a type of qualitative research in the form of library research, by exploring the arguments and methods used by scholars who then make legal products that are different from one another.Results. The results of this study indicate that differences are mercy, as long as these differences do not cause division, and always bring benefit with logical arguments and can be accepted by common sense, even though there are two types of differences, namely differences in reason (ikhtilaf al-aql), and differences in morals. (ikhtilaf al-akhlak), differences occur due to unequal contextualization, thus requiring different arguments and methods of ijtihad, resulting in unequal products from one another

    Determinants of Banks Profitability: A Comparative Study of Islamic Verses Non Islamic, Foreign Verses Local, and Public Verses Private Banks in Pakistan

    Get PDF
    This study examines the determinants of banks profitability in Pakistan. The main objectives of the study are to determine the factors that influence banks profitability in Pakistan and to make recommendations for management decision making and policy objectives. A panel data of 25 banks (commercial, Islamic, foreign and local banks) in Pakistan was analyzed over period of 2006-2015, using panel data regression method to estimate common, fixed and random effect regression models. The two key measures of profitability (dependent variables) analyzed in this study comprised of ROA and Return ROE. The bank-specific factors were incorporated into the regression models, were Credit risk, Expenses Management, Deposits to total assets, non-interest income and size. The results for the ROA model indicate that size and deposit to total assets of bank is positively significant to bank profitability while credit risk, expenses management and non interest income are negatively affect the profitability. Moreover the results of ROE model indicates that credit risk and NII are negatively significant and Size is positively significant with banks profitability. This study also indicates the comparison between Islamic verses non Islamic, Foreign verses local, and public verses private banks which shows there different results on banks profitability

    The Influence of Board Characteristics on Shareholders Assessment of Risk for Small and Large Firms: Evidence from Pakistan

    Get PDF
    This unique study examines the alliance between board characteristics and shareholders assessment of risk as revealed in the volatility of stock returns for Pakistani listed companies. For this purpose, a sample of 30 manufacturing companies is used that are listed on Karachi Stock Exchange for the period of 2004 to 2013.  The study uses panel data analysis and reports that random effect model is the best results yielding method. Our hypothesis incorporates preceding evidence that the small and large firms have spectacularly diverse constitution of boards, shimmering the firms diverse monitoring and counseling needs. It is hypothesized and locate confirmation with the intention of entrenched the large firms are able to produce affirmative net benefits, in the appearance of lesser risk, form board independence, gender diversity and director ownership. On the other hand the finding of this study showed the board size is negatively associated with the shareholder assessment of risk for large firms and the positive associated with the assessment of risk for small firms. The CEO duality is positive associated with the assessment of risk for large and negative associated amid assessment of risk for small firms. The results have insinuation for regulatory authorities, shareholders and directors to take steps to improve the board competanices for better performance. Keywords: Board Characteristics, Shareholders Assessment of Risk, Panel Data Analysis, Karachi Stock Exchange JEL Classifications: G32, G34, G38

    Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review

    Get PDF
    Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, actuators, transceivers, or other wearable devices. Data in the IoT environment is susceptible to many threats, attacks, and risks. Therefore, a robust security mechanism is indispensable to cope with attacks, vulnerabilities, security, and privacy challenges related to IoT. In this research, a systematic literature review has been conducted to analyze the security of IoT devices and to provide the countermeasures in response to security problems and challenges by using mobile computing. A comprehensive and in-depth security analysis of IoT devices has been made in light of mobile computing, which is a novel approach. Mobile computing's technological infrastructures such as smartphones, services, policies, strategies, and applications are employed to tackle and mitigate these potential security threats. In this paper, the security challenges and problems of IoT devices are identified by a systematic literature review. Then, mobile computing has been used to address these challenges by providing potential security measures and solutions. Hardware and software-based solutions furnished by mobile computing towards the IoT security challenges have been elaborated. To the best of our knowledge, this is the first attempt to analyze the security issues and challenges of IoT in light of mobile computing and it will open a gateway towards future research

    Efficacy of Botanical Plant Extracts on the Population Dynamics of Cotton Aphid, Aphis gossypii Glover (Hemiptera; Aphididae)

    Get PDF
    Synthetic pesticides are excessively consumed to control crop pests but abundant use of chemicals may implicate the whole ecosystem badly in the end. Despite the growing concern, few natural products are commercialized for pest control whilst on-farm use of existing botanically-based pesticides remains a small, but growing, component of crop protection practice. The experiment was conducted to assess the potential trade-offs of using botanical extracts (Neem leaf extract, NLE, and Moringa leaf extract, MLE) along with synthetic insecticide, Confidor 200 SL, against Aphis gossypii Glover. Meanwhile, impact of these insecticides on natural enemies were also determined in the field experiment. Data were recorded 12h before, as well as 1, 3, and 7 days after the application (DPA) of insecticides. Results revealed that chemical insecticide after 1DPA were showed higher mortality (%) of aphid’s population at leaf (33%) and boll stage (41%), whereas, the botanical treated plots showed lower mortality used alone as well combined application but lower numbers were observed on the negative controls. The same trend of insecticidal activity was observed from all treatments after 3DPA, but interestingly, after 7DPA, the resurgence of beneficial insects were only recorded in botanical extract-treated plots. The Confidor presented an adverse effect on natural enemies whereas no or few natural enemies were observed compared to herbal extracts. Overall, for long-term control, the combined use of botanical insecticides is proved to be more efficient in the management of the aphids than Confidor and caused no or little adverse impact on the beneficial insects
    • …
    corecore