GLOBAL DIGITAL LIBRARY
Global Digital Library provides an opportunity to the researchers to access high-quality content published in our conferences, journals, and books.
Stay updated with the latest research and developments across various disciplines. The Recent Publications page highlights the newest scholarly articles from conference proceedings and journals published in the Global Digital Library. Whether you’re interested in pioneering research in physical sciences and engineering, cutting-edge advancements in medical sciences, or fresh perspectives in social sciences and humanities, you’ll find the most current and impactful content available.
To access the full list of our conference proceedings and journals, please visit the Browse Subjects tab on this website.
Michael James Wood
AbstractThis paper discusses the management and development of information systems in a small to medium sized cash and carry organization based in the United Kingdom. The paper discusses development for IT requirements, maintenance and the Input/outputs of operations for employees working in data processing or an IT department. Social and ethical issues are also discussed as well as how data base management systems can be useful to produce reports for middle to higher management.
Published in IOARP Journal of Business and Management
Read More...Hamza Abid
AbstractThis paper provides a comprehensive comparative analysis of emerging wireless network technologies, focusing on 5G, Wi-Fi 6, and Wi-Fi 7. The study evaluates these technologies based on key performance metrics such as speed, latency, and capacity, as well as their real-world applications. By examining the technical specifications and practical implementations of each technology, this paper aims to offer insights into their implications for the future of wireless communication. The analysis highlights the advancements brought by each technology, their potential to meet the growing demand for high-speed connectivity, and their suitability for various applications ranging from consumer electronics to industrial automation. The findings of this study are intended to guide stakeholders in making informed decisions about adopting and integrating these technologies into their networks.
Published in IOARP Journal of Communication and Networks
Read More...Muhammad Ali Paracha, Syed Noman Jamil, Abdul Rasheed, Nadia Jamil
AbstractThis research paper investigates the realm of Cyber-Edge computing, further reviewing its fundamental concepts, challenges, and applications. In a rapidly evolving landscape of interconnected devices and data-driven paradigms, the convergence of edge computing and cybersecurity takes centre stage. The paper commences by explaining the core components of Cyber-Edge architecture, encompassing policies, management, and protocols. Furthermore, it explores the Cyber-Edge applications, showcasing its transfor- mative potential in domains such as smart agriculture, smart homes, and enhanced healthcare systems. In navigating the landscape of Cyber-Edge, inherent challenges surface, ranging from cyber threats to privacy concerns, thereby prompting an analysis of future directions. Additionally, the paper formulates pivotal research questions that pave the way for further exploration in this dynamic field. The manuscript is structured on Cyber-Edge fundamentals, examines challenges, highlights practical IoT applications within the Edge paradigm and finally, presents research questions, followed by comprehensive conclusions. As the digital landscape continues to evolve, the interdependent relationship between Cyber-Edge computing and security emerges as a cornerstone in shaping the landscape of the Internet of Things (IoT) and edge networking.
Published in IOARP Journal of Communication and Networks
Read More...Yousaf Raheel
AbstractThis paper provides an integrated marketing communication strategy for launching a beverage product in Pakistan. Context analyses conducted as part of this study include internal and external analysis, business analysis, stakeholder analysis, and customer analysis. In context of marketing communication strategy, this research includes SMART marketing communication objectives, a detailed discussion on considerations in developing marketing communication strategy, a comprehensive strategy to achieve marketing communication objectives, and discussion on the mechanism of controlling and evaluation of marketing communications plan. It is important to highlight that although in this work, a focus has been placed on the consumer market of Pakistan, due to socio-cultural and demographic similarities between the countries in South Asia, this strategy will prove equally effective in India, Bangladesh, Afghanistan, Sri Lanka, Maldives, Nepal and Bhutan.
Published in IOARP Journal of Social Sciences and Humanities Research
Read More...Yousaf Raheel
AbstractIn this paper we will discuss the role of social workers in helping out the people who suffered from disasters. It is evident that Social Workers have always been whole heartedly supporting the people as well as governmental organizations to combat challenges that occur immediately after any disaster such as hunger, lack of shelter homes, lack of blood donors, issues in accessing deserving people, distribution of food items, digging out the corpse, helping people recover from the loss and many more challenges. In this paper we will focus on four major disasters which resulted in a large number of causalities and the role of social workers in the recovery process.
Published in IOARP Journal of Social Sciences and Humanities Research
Read More...Munir Hussain
AbstractThe demand for WBAN has increased for last few years because it is useful network to monitor and improve various health conditions of human being. Information’s exchanges among different entities are very sensitive, so it is vital to keep this information’s secure from unauthorized access in order to avoid unpleasant incidents. Security and privacy are the most critical issues. Security is the important issue for any network and especially in WBANs its proper management is very crucial otherwise biomedical data collected by sensor nodes should be mixed with other user’s data. Also, patients do not want their personal data to be misused and WBAN should provide the privacy to prevent eavesdropping. Mutual authentication is also a key challenge in WBAN, and patients’ data originality and integrity are important for their treatment diagnosis etc. Development of the new mutual authentication schemes in healthcare applications without considering security makes patient privacy vulnerable. In this paper, we discuss communication technologies, possible attacks and recently most used popular authentication methods in WBANs.
Published in IOARP Journal of Communication and Networks
Read More...Babar Zaman, Mohammad A Shahzad
AbstractThis paper is aimed at evaluation of the supply chain of Sainsbury’s, one of the leading UK retailers in context of delivery of fruits and vegetables. We will assess supply chain of Sainsbury’s in context of key components such as inventory, facilities, transportation, and warehousing technologies. We attempt to analyse how Sainsbury’s manages their supply chain function to ensure the effective and efficient flow of fresh fruit and vegetables into operation, to better serve customer and reduce costs. We will explore their practices and discuss how recent improvements in their supply chain have helped Sainsbury’s become a more efficient and cost-effective.
Published in IOARP Journal of Business and Management
Read More...Khalid Khan
AbstractWireless sensor networks (WSNs) have emerged as an important area of research from the last two decades. In WSNs, sensors have limited memory, computational capability and battery power. One of the solutions to these issues is to reduce the data transmission and today, various data aggregation protocols have been proposed to reduce network traffic. But they created security issues like authentication, data integrity and freshness. Hop-by-hop secure data aggregation protocols were proposed to provide security along with data aggregation function. But, data on the aggregators still need to be secured because aggregators are exposed to node compromises. End-to-end secure data aggregation protocols are proposed. They provide end-to-end security and privacy of data. One of these protocols is Secure End-to-End Data Aggregation (SEEDA), which ensured end-to-end privacy of data. However, the protocol has higher communication cost and computational overheads because it sends extra bits/data regarding non-responding nodes and performs unnecessary computations for non-responding nodes. I proposed new protocol, EDAS which reduces 12% to 25% communication and computational overheads as compared to SEEDA and it is also efficient in energy consumption.
Published in IOARP Journal of Communication and Networks
Read More...Mehul Mehta
AbstractOver the past two decade the importance of the employee retention has grown. Most of the organisations understand that human resources are one of the primary factors for the organisational success and their growth. In the globalised world the competition between the organisations has increased and they are not going back to pay the price to acquire and retain the best talents in the market. Efficient and dedicated employees will drive the organisation towards goals. In the domain of human resource management, the employee retention is one of the topmost priorities related to the organisation’s performance.
The study explores the importance of the employee retention and how it affects the organisational performance. The study also investigates the strategies adopted by the IBM India. With the aid of valuable data, the study explores the link between retaining the best talents in the market and an increase in the organisational performance.
Published in IOARP Journal of Business and Management
Read More...Asghar Hussain
AbstractUsing a short revision course as a test case, this paper will look at the wider issues revolving around developing a curriculum; it will look closely at the process and praxis of the educational journey to attain the product with a deeper understanding of what is being studied. The paper will also discuss how the managing of product and process, amidst a lecturer/teacher’s knowledge of their students is increasingly important. In addition, recognizing the student’s objectives and pushing them to search out (with a certain degree of autonomy) their own objectives through reflection and contextualization of learning.
Published in IOARP Journal of Social Sciences and Humanities Research
Read More...Hamza Abid
AbstractThis paper discusses the major causes of terrorism in Europe. Terrorism is a complex set of phenomena. There are common root causes which result in the proliferation of violence in different parts of the world including Europe. This paper provides a comprehensive discussion about the role of right wing and left-wing extremism, and national, regional, and international terrorist groups, and the way they affect the peace in the region. The paper also discusses how the treatment of minorities and their suppression might lead to incidents of extremism and terrorism. The aspects of religious and political differences between the people living in the Europe, and how these differences make Europe more vulnerable are covered as well. Based on our previous study (Encinas, 2018), this paper divides Europe into 7 strategic blocks to help understand the terrorism in a regional perspective.
Published in IOARP Journal of Social Sciences and Humanities Research
Read More...Yousaf Raheel
AbstractThis paper provides a marketing plan for a proposed Head & Shoulders Olive Oil Extracts shampoo brand. Internal and external market analysis has been provided using SWOT, PESTEL, and Porter 5 Force Model. A thorough marketing strategy has been provided though 4 Ps Marketing Mix model along with a detailed assessment of value to consumers as a consequence of the marketing strategy.
Published in IOARP Journal of Business and Management
Read More...Munir Hussain, Syed Usman Jamil
AbstractOver the last few years, the popularity of both electronic and mobile commerce (M-Commerce) has increased due to advancement in the Information Technology (IT). Evaluation of E-commerce and M-commerce protocols has always remained a subject of sustained effort to find an optimal solution. Mobile devices are resource constrained in terms of memory, processing and battery power. There have been efforts in the past for evaluation of such protocols based on the issues like privacy, security and efficiency. In this paper special consideration however is given to the battery power and thus evaluates few well-known M-commerce payment protocols for their battery requirements in terms of energy cost and compares energy cost of these protocols to find the most optimal solution for mobile payment. Initial objective of this paper finds out energy consumption for every individual entity involved in the most popular mobile payments protocols. After the earlier has been achieved, the second and the most fundamental objective of this work is to calculate the overall energy consumption and to analyze these selected protocols to find out the most energy efficient protocol.
Published in IOARP Journal of Communication and Networks
Read More...Mohammad A Shahzad
AbstractThis research evaluates the causes and consequences of the global financial crisis of 2008. The analysis indicates that the unrealistic assumptions were the major reason behind mispricing in the unregulated market causing credit default swaps which finally resulted in explosion of residential mortgage defaults. In the second half of the paper, we will discuss the consequences of this financial crisis and how it affected the global economy and resulted in unprecedented job losses.
Published in IOARP Journal of Business and Management
Read More...Waseem Ahmed
AbstractThe Middle East is a diverse region with heterogeneity in culture. In this paper we will discuss different cultural aspects of the Middle East, generating a comprehensive picture of its cultural values and how over the course of time it has changed. We will also discuss religious shift in the region as Middle East is a birthplace of three main religions: Islam, Christianity and Judaism. We will also talk about their day-to-day life and art and architecture.
Published in IOARP Journal of Social Sciences and Humanities Research
Read More...Farrukh Aqeel
AbstractNew Media has played an increasingly central role in American elections since they first appeared in 1992. While television remains the primary source of election information for a dominant part of voters, digital communication platforms have become prominent. New Media have activated changes in the campaign strategies of political parties, candidates, and political associations; reshaped election media coverage; and influenced voter commitment. The new media condition is dynamic and continues to develop in the novel, sometimes unanticipated, ways that have genuine ramifications for democratic governance and politics. The manner in which individuals, exchange ideas through digital media were intensified all through the election process. Online media have favorable positions over conventional media in view of its capacity to control message content. However, content on social media sites tends to be unfiltered, allowing inaccuracies disseminated. The 2016 presidential election is an example of how citizens must “make sense of the world” by making a “sense of the flood of information” (Dekat, 2017).
Published in IOARP Journal of Social Sciences and Humanities Research
Read More...Hamza Abid
AbstractIn order to explore the root causes of terrorism in future this, paper records the instances of terrorism in different parts of the Europe. European Union comprises of several nations with entirely different set of issues in the context of terrorism. Although considering every nation individually would have been the ideal way to record the instances, in favor of space, we prefer studying Europe divided into different strategic blocks. This paper briefly discusses various recent instances of terrorism in Europe. We hope that a comprehensive picture emerges from this work about terrorism issues in Europe. This research will help us highlight the root causes of terrorism in future publications.
Published in IOARP Journal of Social Sciences and Humanities Research
Read More...Mohammad A Shahzad
AbstractFinancial crises present a significant challenge for managers and enterprises. The primary objective of this research paper is to evaluate the root causes of financial instability in small and medium-scale enterprises (SMEs). Financial crises leave the companies with insufficient financial resources, hindering their ability to adapt and overcome the ensuing crisis. This paper aims to systematically evaluate potential factors influencing the financial situation of SMEs. Additionally, it will provide relevant insights to enrich the analysis and propose practical recommendations to address these challenges and enhance the resilience of SMEs in the face of financial instability.
Published in IOARP Journal of Business and Management
Read More...Munir Hussain
AbstractThe fast spreading of wireless technology services are more focusing on businesses area rather than targeting customers. Even now, this advancement in the mobile technology continues to bang the international business market intensely, modern mobile technologies and their applications are more focusing the mobile business area. Today, the world of electronic transactions is switching from E-commerce to M-commerce. In order to solve critical issues in M-commerce it becomes vital to understand different concepts and technologies associated with M-commerce. The first part of this paper gives overview of M-commerce in terms of their characteristics, applications, and issues pertaining to it, including many critical issues such battery power consumption in M-commerce transactions. Battery is one of the most important and scarce resources in mobile devices thus to extend the mobile devices battery lifetime, it becomes important to save the battery resource as much as possible. The second part of this paper focuses on exploring various aspects of enabling mobile payment systems, mobile payment modes and characteristics and the payments system requirements.
Published in IOARP Journal of Communication and Networks
Read More...Waseem Ahmed
AbstractTesco is the third-largest retailer in the world measured by gross revenues and ninth-largest retailer in the world measured by revenues. This paper analyses the strategic management at Tesco in different dimensions. We attempt to study its business economics using objectives and mission statement, PESTEL analysis, and SWOT analysis. We analyse its strategy and processes by evaluation of the alignment of company’s direction with its vision statement, and through the use of balance scorecards and utilising game theory technique. We also explore the aspects of the international expansion strategy of Tesco by evaluating various positional international markets and through employing PEST analysis.
Published in IOARP Journal of Business and Management
Read More...Waseem Ahmed
AbstractEurope is a diverse region with heterogeneity in culture. In this paper we will discuss different aspects of culture including religion and beliefs, art and architecture, linguistics, and music in different eras of Europe. A comprehensive picture will emerge from this work about Europe from the earliest human in the continent to modernized Europe.
Published in IOARP Journal of Social Sciences and Humanities Research
Read More...Michael James Wood
AbstractThis paper investigates the logical and physical network design considerations for a small business. Moreover, the paper investigates how a business facing data consistency issues may address the issue by implementing a network design solution and how networks can be monitored and protected from security threats.
Part one of this paper investigates the networking solution and networking topologies. Part two discusses networking infrastructure such as the purchasing of necessary networking devices to centralize the businesses data communications and background and foreground services. Part three of this paper discusses various aspects of network and data communication monitoring using a networking tool provided by SolarWinds. The last section, part four investigates a security proposal for the businesses network and discusses data recovery, malware and authentication.
Published in IOARP Journal of Communication and Networks
Read More...Azhar Khan
AbstractIn the context of South African multinational restaurant Nando’s, this paper explores aligning team performance with strategic goals and discusses a range of tools to establish performance targets and evaluates the utility of these tools in predicting and measuring future team performance. The paper specifically focuses on the aspects such as individual commitment, mentoring and coaching, and their importance in organisational success. The paper explores whether close monitoring of team actions enhances performance, and if assessment and using adaptable strategies play a role. The paper concludes with a discussion on influencing and persuading strategies and how individuals’ dynamics, their interests, and organizational politics impacts team commitment.
Published in IOARP Journal of Business and Management
Read More...Munir Hussain, Khalid Khan
AbstractWireless Sensor Networks (WSN) technology is still immature and thus faces a variety of problems due to limited memory, CPU and battery power resources. WSNs are prone to active and passive attacks. While the former is capable of affecting minimal resources, the latter type of attack is difficult to launch but very powerful in terms of affecting critical resources. Most shared key security protocols used in WSNs are not scalable as they depend upon third party or KDC. Although in some situations this concept works well, besides reducing scalability, finding a trustworthy third party is also very difficult in KDC concept of key sharing. This paper gives a brief overview of WSNs, posed security threats to these networks and relevant security issues. This paper also brings in a novel key sharing model for traversing secret key in WSNs that does not depend on third party concept and hence it is a more scalable and secure.
Published in IOARP Journal of Communication and Networks
Read More...Imtiaz Khan
AbstractThe role of the media, and particularly social media, in the Arab Spring has been broadly debated in the scholarly world. The Arab Middle East, specifically, tends to be constructed in public disclosure as experiencing social, political and financial hardships, to legitimize military activity and development assistance. Moving toward the issue of media and democratization from another edge, we dissect and analyze the ways of journalistic understanding, which thusly direct to the transition process. 21st-century struggles for democracy occur in a media-saturated environment where the media's tenets of the game impact the crafting and working of political establishments. The venture will speculate the media's job, in political polarization in the contemporary Middle East and clarify how mechanisms we know about media influence the majority.
Published in IOARP Journal of Social Sciences and Humanities Research
Read More...