• Title/Summary/Keyword: Lahore

Search Result 139, Processing Time 0.02 seconds

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

Trends and Analysis of Cancer Incidence for Common Male and Female Cancers in the Population of Punjab Province of Pakistan during 1984 to 2014

  • Masood, Khalid;Masood, Andleeb;Zafar, Junaid;Shahid, Abubaker;Kamran, Mujahid;Murad, Sohail;Masood, Misbah;Alluddin, Zafar;Riaz, Masooma;Akhter, Naseem;Ahmad, Munir;Ahmad, Fayyaz;Akhtar, Javaid;Naeem, Muhammad
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.13
    • /
    • pp.5297-5304
    • /
    • 2015
  • Background: The Pakistan Atomic Energy Commission Cancer Registry (PAECCR) program has made availability of a common cancer incidence database possible in Pakistan. The cancer incidence data from nuclear medicine and oncology institutes were gathered and presented. Materials and Methods: The cancer incidence data for the last 30 years (1984-2014) are included to describe a data set of male and female patients. The data analysis concerning occurrence, trends of common cancers in male and female patients, stage-wise distribution, and mortality/follow-up cases is also incorporated for the last 10 years (2004-2014). Results: The total population of provincial capital Lahore is 9,800,000. The total number of cancer cases was 80,390 (males 32,156, females 48,134). The crude incidence rates in PAECCR areas were 580.8/$10^5$ during 2010 to 885.4/$10^5$ in 2014 (males 354.1/$10^5$, females 530.1/$10^5$). The cancer incidence rates for head and neck (15.70%), brain tumors (10.5%), and non-Hodgkin lymphoma (NHL, 9.53%) were found to be the highest in male patients, whereas breast cancer (46.7%), ovary tumors (6.80%), and cervix (6.31%) cancer incidence rates were observed to be the most common in female patients. The age range distribution of diagnosed and treated patients in conjunction with the percentage contribution of cancer patients from 15 different cities of Punjab province treated at the Institute of Nuclear Medicine and Oncology, Lahore are also included. Leukemia was found to be the most common cancer for the age group of 1-12 years. It has been identified that the maximum number of diagnosed cases were found in the age range of 51-60 years for males and 41-50 years for female cancer patients. Conclusions: Overall cancer incidence of the thirty years demonstrated that head and neck and breast cancers in males and in females respectively are the most common cancers in Punjab province in Pakistan, at rates almost the highest in Asia, requiring especial attention. The incidence of brain, NHL, and prostate cancers among males and ovarian and cervix cancers among females have increased rapidly. These data from a major population of Punjab province should be helpful for implementation of appropriate planning, prevention and cancer control measures and for determination of risk factors within the country.

The Effect of Corporate Governance Practices on Firm Performance: Evidence from Pakistan

  • Muhammad, Hussain;Rehman, Ashfaq U.;Waqas, Muhammad
    • Asian Journal of Business Environment
    • /
    • v.6 no.1
    • /
    • pp.5-12
    • /
    • 2016
  • Purpose - The purpose of this study is to investigate the effect of corporate governance practices such as (board size, board composition, CEO duality and audit committee) on the performance of selected Pakistani firms. Research design, data, and methodology - This study examines corporate governance structure by using the data of 80 non-financial firms listed on Karachi Stock Exchange Pakistan during 2010-2014. Hypotheses of the study were tested by using both descriptive and inferential statistics. Result - The findings indicate that board size and audit committee is positively related to the firm performance (ROA & ROE). In contrast, board composition and CEO duality are negatively related to the firm performance (ROA & ROE). As far as controlling variables is concerned, leverage is negative, whereas firm size is positively related to all measures of performance. Conclusions - Empirical findings concluded that corporate governance practices affect the firm performance. Therefore, it is suggested that managers should understand the governance mechanisms to work more efficiently in the firm.

SOFT INTERSECTION AND SOFT UNION k-IDEALS OF HEMIRINGS AND THEIR APPLICATIONS

  • Anjum, Rukhshanda;Lodhi, Aqib Raza Khan;Munir, Mohammad;Kausar, Nasreen
    • Korean Journal of Mathematics
    • /
    • v.30 no.2
    • /
    • pp.263-281
    • /
    • 2022
  • The main aim of this paper is to discuss two different types of soft hemirings, soft intersection and soft union. We discuss applications and results related to soft intersection hemirings or soft intersection k-ideals and soft union hemirings or soft union k-ideals. The deep concept of k-closure, intersection and union of soft sets, ∧-product and ∨-product among soft sets, upper 𝛽-inclusion and lower 𝛽-inclusion of soft sets is discussed here. Many applications related to soft intersection-union sum and soft intersection-union product of sets are investigated in this paper. We characterize k-hemiregular hemirings by the soft intersection k-ideals and soft union k-ideals.

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.

NEW QUANTUM VARIANTS OF SIMPSON-NEWTON TYPE INEQUALITIES VIA (α, m)-CONVEXITY

  • Saad Ihsan Butt;Qurat Ul Ain;Huseyin Budak
    • Korean Journal of Mathematics
    • /
    • v.31 no.2
    • /
    • pp.161-180
    • /
    • 2023
  • In this article, we will utilize (α, m)-convexity to create a new form of Simpson-Newton inequalities in quantum calculus by using q𝝔1-integral and q𝝔1-derivative. Newly discovered inequalities can be transformed into quantum Newton and quantum Simpson for generalized convexity. Additionally, this article demonstrates how some recently created inequalities are simply the extensions of some previously existing inequalities. The main findings are generalizations of numerous results that already exist in the literature, and some fundamental inequalities, such as Hölder's and Power mean, have been used to acquire new bounds.

Advanced Business Process Management with Digital Innovations (Review)

  • Masood Ahmed Khalid;Muhammad Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.121-126
    • /
    • 2023
  • Many organizations are looking for digital innovation to apply in business process management and this information revolution leaves its effect on the businesses and anticipate competitors. In this article, investigates the strength of the relationship between business process management (BMP) and Digital Innovations (DI) since it has been underdeveloped. The results and findings are extracted from international survey with explanations of expert panel to generalized a positive and moderate link of multiple factors that are affecting the strategic decision-making in business process management. It is extended to the Technology Organization Environment (TOE) framework and contour organizations along their Digital Process Innovation (DPI).

Use of Blockchain to Support the Security of Internet of Things: A Review

  • Saher Un Nisa;Maryam Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.149-154
    • /
    • 2023
  • Internet of Things (IoT) is now spreading everywhere. It's the technology of every person's need so we can't step back from IoT but we can secure it as it is spreading quickly so it has greater chances of danger and being misused. There is an urgent need to make IoT devices secure from getting cracked or hacked. A lot of methods had tried and still trying to mitigate IoT security issues. In this paper Blockchain is going to be the solution of most of the IoT issues or problems. We have discussed or highlighted security issues with centralized IoT and then provided solution of such security challenges through the use of blockchain because is based on a decentralized technology that is hard to modify or update.

Investigating the long-term behavior of creep and drying shrinkage of ambient-cured geopolymer concrete

  • Asad Ullah Qazi;Ali Murtaza Rasool;Iftikhar Ahmad;Muhammad Ali;Fawad S. Niazi
    • Structural Engineering and Mechanics
    • /
    • v.89 no.4
    • /
    • pp.335-347
    • /
    • 2024
  • This study pioneers the exploration of creep and shrinkage behavior in ambient-cured geopolymer concrete (GPC), a vital yet under-researched area in concrete technology. Focusing on the influence of sodium hydroxide (NaOH) solution concentration, the research utilizes low calcium fly ash (Class-F) and alkaline solutions to prepare two sets of GPC. The results show distinct patterns in compressive strength development and dry shrinkage reduction, with a 14 M NaOH solution demonstrating a 26.5% lower dry shrinkage than the 16 M solution. The creep behavior indicated a high initial strain within the first 7 days, significantly influenced by curing conditions and NaOH concentration. This study contributes to the existing knowledge by providing a deeper understanding of the time-dependent properties of GPC, which is crucial for optimizing its performance in structural applications.