scispace - formally typeset
Search or ask a question
Institution

National University of Modern Languages

EducationIslamabad, Pakistan
About: National University of Modern Languages is a education organization based out in Islamabad, Pakistan. It is known for research contribution in the topics: Government & The Internet. The organization has 526 authors who have published 684 publications receiving 3896 citations. The organization is also known as: National University of Modern Languages (NUML).


Papers
More filters
Journal ArticleDOI
15 Mar 2019-Energy
TL;DR: In this article, the authors examined the long-run and short-run impacts of fossil fuels consumption, foreign direct investment and economic growth on carbon emissions in fifteen developing Asian countries.

374 citations

Journal ArticleDOI
TL;DR: The framework proposed in this paper discusses the effectiveness of the polling process, hashing algorithms’ utility, block creation and sealing, data accumulation, and result declaration by using the adjustable blockchain method.
Abstract: The electronic voting has emerged over time as a replacement to the paper-based voting to reduce the redundancies and inconsistencies. The historical perspective presented in the last two decades suggests that it has not been so successful due to the security and privacy flaws observed over time. This paper suggests a framework by using effective hashing techniques to ensure the security of the data. The concept of block creation and block sealing is introduced in this paper. The introduction of a block sealing concept helps in making the blockchain adjustable to meet the need of the polling process. The use of consortium blockchain is suggested, which ensures that the blockchain is owned by a governing body (e.g., election commission), and no unauthorized access can be made from outside. The framework proposed in this paper discusses the effectiveness of the polling process, hashing algorithms’ utility, block creation and sealing, data accumulation, and result declaration by using the adjustable blockchain method. This paper claims to apprehend the security and data management challenges in blockchain and provides an improved manifestation of the electronic voting process.

145 citations

Journal ArticleDOI
TL;DR: In this paper, the authors examined the pattern of behavior of turnover intentions in developing countries vis-a-vis design/methodology/approach, and used a sample of 329 collected from 16 public universities in the province of Sindh with about 3,500 population for analysis.
Abstract: Purpose – This study aims to examine the pattern of behavior of turnover intentions in developing countries vis-a-vis Design/methodology/approach – The study uses a sample of 329 collected from 16 public universities in the province with about 3,500 population for analysis. The hypothesized relationships are tested using Amos 18 through path analysis. Findings – The results indicate employee's turnover intention is predicted by employee development perceptions. The study validates the theory of development-attitude-behavior relationship. Research limitations/implications – The paper carries discussion about the methodology used in the paper, limitations of the research and recommendations for possible future research. Originality/value – This is an empirical study of academia in a region of Pakistan with a sufficiently large sample that has not been carried out earlier. The study has importance for those at the helm of affairs and policy makers.

121 citations

Journal ArticleDOI
TL;DR: This paper has presented a systematic literature review of existing clone node detection schemes and provided the theoretical and analytical survey of the existing centralized and distributed schemes for the detection of clones in static WSNs with their drawbacks and challenges.
Abstract: The recent state of the art innovations in technology enables the development of low-cost sensor nodes with processing and communication capabilities. The unique characteristics of these low-cost sensor nodes such as limited resources in terms of processing, memory, battery, and lack of tamper resistance hardware make them susceptible to clone node or node replication attack. The deployment of WSNs in the remote and harsh environment helps the adversary to capture the legitimate node and extract the stored credential information such as ID which can be easily re-programmed and replicated. Thus, the adversary would be able to control the whole network internally and carry out the same functions as that of the legitimate nodes. This is the main motivation of researchers to design enhanced detection protocols for clone attacks. Hence, in this paper, we have presented a systematic literature review of existing clone node detection schemes. We have also provided the theoretical and analytical survey of the existing centralized and distributed schemes for the detection of clone nodes in static WSNs with their drawbacks and challenges.

106 citations

Journal ArticleDOI
TL;DR: A survey of different data collection and secure transmission schemes where fog computing based architectures are considered is presented in this article, where fog assisted smart city, smart vehicle and smart grids are also considered that achieve secure, efficient and reliable data collection with low computational cost and compression ratio.
Abstract: Internet of medical things (IoMT) is getting researchers’ attention due to its wide applicability in healthcare Smart healthcare sensors and IoT enabled medical devices exchange data and collaborate with other smart devices without human interaction to securely transmit collected sensitive healthcare data towards the server nodes Alongside data communications, security and privacy is also quite challenging to securely aggregate and transmit healthcare data towards Fog and cloud servers We explored the existing surveys to identify a gap in literature that a survey of fog-assisted secure healthcare data collection schemes is yet contributed in literature This paper presents a survey of different data collection and secure transmission schemes where Fog computing based architectures are considered A taxonomy is presented to categorize the schemes Fog assisted smart city, smart vehicle and smart grids are also considered that achieve secure, efficient and reliable data collection with low computational cost and compression ratio We present a summary of these scheme along with analytical discussion Finally, a number of open research challenges are identified Moreover, the schemes are explored to identify the challenges that are addressed in each scheme

104 citations


Authors

Showing all 535 results

NameH-indexPapersCitations
Muhammad Sajid5249510089
Abdul Ghafoor425999122
Muhammad Zia-ur-Rehman271154347
Shafqat Hussain24921616
Arif Ali Khan221021332
Muhammad Sohail211251436
Shuib Basri181211352
Basit Shahzad1567824
Muhammad Azeem1464853
Ata Ullah1447465
Imran Hanif1231807
Fazli Subhan1250553
Farman Ullah Khan1021266
Aisha Anjum1026276
Muhammad Azhar Ehsan1034311
Network Information
Related Institutions (5)
Georgia Southern University
8.5K papers, 173.9K citations

73% related

University of Derby
4.6K papers, 90.3K citations

73% related

COMSATS Institute of Information Technology
21.2K papers, 340.9K citations

73% related

Bahauddin Zakariya University
5.5K papers, 84.6K citations

72% related

Multimedia University
7.3K papers, 102.4K citations

72% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20241
20235
202210
2021172
2020141
2019108