Journal of Computing and Management Studies (JCMS)

Journal Papers (82) Details Call for Paper Manuscript submission Publication Ethics Contact Authors' Guide Line
1 A Simulation Based Study of Routing Protocols in Mobile Ad-hoc Networks , A. Z. M. Obaidullah
 Mobile ad-hoc is a temporary network without a pre-established infrastructure. Because of the absence of centralized structure, mobile ad hoc networks are facing several problems such as security, routing, limitation of bandwidth, energy and hidden terminal, which need efficacious solutions. Ad-hoc on-demand distance vector (AODV) is a reactive protocol. Mobile ad-hoc on-demand data delivery protocol (MAODDP) is new addition in reactive protocols. It can support both unicast and multicast routing. In this thesis, I evaluate and compare the performances of AODV and MAODDP by means of simulation using SWAN. From the experiments for MAODDP, we see that Route Query and Data Delivery Packet (RQDD), Acknowledge Message (ACK), and routes are increasing with increasing nodes, but these are increasing more sharply than Route Request (RREQ), Route Replies (RREP) and routes for AODV. These observations notify that MAODDP is safer than AODV because more data query and data delivery make routing trustworthy and reliable. ACK and RREP both are increasing, but there is a big difference between ACK and RREP increase. The increase of ACK messages informs us that MAODDP is more dependable in routing table compared with AODV. The most important observation is in energy consumption. AODV saves more energy than MAODDP with a number of nodes up 150. However, MAODDP starts saving more energy than AODP with 200 nodes and this information tells us that MAODDP is more capable for a large network.  
2 Cloud Computing – Threats and Challenges , I. Ahmad, H. Bakht, U. Mohan
3 Management of Home Healthcare using Networked Appliances , Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Arshad Haroon.
4 Management of Home Healthcare using Networked Appliances , Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Arshad Haroon.
5 Cloud Computing – A Comprehensive Definition , I. Ahmad, H. Bakht, U. Mohan.
6 A Wireless Platform for the Early Detection of Arthritis using Home and Body Sensor Network , A. Haroon, P. Fergus, A. Shaheed, M. Merabti. 
7 A Study of Business Strategy, Human Resource Management and Strategic Human Resource Management , Ghulam Rasool. 
8 Computer Based Analysis of Sea Water Conductivity Measurement , Muhammad Abbas Khan, Piao Yan
9 An Overview of Key Management in Wireless Sensors Network, Akhlaq Ahmed
10 The Association of Business Strategies and Different Organizational Factors with Human Resource Management, Ghulam Rasool.
11 Communication Architecture in Wireless Sensors Network , Akhlaq Ahmed
12 Approaches and Models for Strategic Human Resource Management (SHRM) , Ghulam Rasool
13 Approaches and Models for Strategic Human Resource Management (SHRM) , Ghulam Rasool.
14 Query Processing in Wireless Sensor’s Network , Asfandyar
15  Impact of IT on the Growth of SME's , Akhlaq Ahmed
16 Holes Formation in Wireless Sensor's Network , Asfandyar
17 The Factors Affecting Citizens’ Adoption of E-government System in Developing Countries. Nigeria case Study , AnekeO Sampson, Humayun Bakht, Amare Desta
18 A Survey on Schemes to Aid Group Communication in Wireless Sensor’s Network , Adnan Sultan.
19 An Evaluation of Methods for Teaching Grammar in the EFL Classroom , Samir Hilal Said Al Khrusi.
20 The Role of Leadership in Successful Change Management , Kamran Nawaz
21 Evaluation of Revenue and Expenditure Hypotheses: Evidence from Pakistan (1972-2015) Using EViews Software , Muhammad Baqir Ali and Amjad Amin
22 Controllability of Buildings:Computing and Managing Energy in Practice , Dr.Khalid. Y
23 The Teacher's Guide of Running a Lesson , Samir Hilal Said Al Khrusi.
24 Payment Operational Models for Mobile Payment System , Abiola Adekunle, Dr.Humayun Bakht, Dr. Amare Desta.
25 Presentation Practice Production Approach (PPP) for Teaching English as a Second Language , Samir Hilal Said Al Khrusi
26 A Survey on TCP based Routing Schemes for Mobile Ad-Hoc Network , F.Alam.
27  An Analysis of E-commerce Barriers in Small to Medium Size Enterprises(SMEs) , Xiaoxiangyu He.
28 An Empirical Investigation of Patients’ Expectations and Perceptions in Developing Country Hospitals , Saad Anis
29 An Empirical Investigation of Patients’ Expectations and Perceptions in Developing Country Hospitals , Saad Anis
30 Programmable Logic Controllers and Direct Digital Controls in Buildings , Dr. Khalid.Y
31 Management of Service Quality for the Consumer of Health Care Services , Saad Anis
32 An Analysis of Benefit of Wind Turbine Blade , Zeid Saleh
33 An Analysis of Benefit of Wind Turbine Blade , Zeid Saleh
34 Monitoring Consumer Behavior of Lebara Mobile , Zeeshan Saeed
35 An Analysis of Complexity Metrics for Website , Yuhui Ma
36 A Study of Theories on Consumer Behavior , Zeeshan Saeed
37 Appraisal of an Expanding Global Internet-Related Crime. The Case of Cyber Crime in Nigeria , Yusuf Usman and Jafar Abdulkadir
38 A Study on Impact of Motivation on Employees’ Performance in Fast Food Industry , Mir Asfand Y
39 Developing a Long Term Relationship with the Customers , Zeeshan Saeed
40 Cloud Computing Challenges in a General Perspective , Ngo Yang Chong
41 Concept of Integrated Marketing Communications (IMC) , Mir Asfand Y
42 Role of Universities in Fostering Entrepreneurial Mindset through Education and Training: Evidence from Pakistan , Zafar Ali
43 An Analysis of Anti Money Laundering Laws to Curb Money Laundering , Zeeshan Saeed.
44 The Adoption of e-Government Services in Nigeria using UTUAT Model. , Sampson Aneke
45 Management of Islamic Organizations in New Zeland. , Tahir Nawaz
46 Challenges to e-government implementation in developing countries. Nigeria case Study. , Sampson Aneke
47 Management of Cash Flow Information for Investment Decisions. , Mohamed Ahmed Matook
48 The Significance of Information Contained in the Cash Flow Statement of Libyan Investment Companies , Dr Mohamed Ahmed Matook and Dr Mohamed Abulgasem Yakalhef.
49 Islamic Financing Contracts , Siraj Khan
50 State-Societal System, Values and Culture in New Zealand , Tahir Nawaz,
51 Transition to Islamic Banking , Siraj Khan
52 Talent Management, Human Resource Management and Strategic Human Resource Management. , Humayun Bakht
53 Risk Management System of the Islamic Banking , Siraj Khan
54 An Investigation of Wind Turbine Blade. , Zeid Saleh
55 The Youth, the Pioneers of Explaining and Safeguarding Islamic Identity , Tahir Nawaz
56 Influence of Trust in Somalia’s Mobile Payment System. , Ismail Mohamoud Mohamed,
57 Risk Management in Islamic and Conventional Banking , Siraj Khan
58 Mobile Payment Trust. , Ismail Mohamoud Mohammed
59 An Evaluation of Samsung Corporation Status Quo , Marwan Suliman
60 Mobile Payment Landscape and its Effects on Financial Inclusion in the Unbanked Sector. , Ismail Mohamoud Mohamed.
61 Organisational Behavior. TESCO PLC , Marwan Suliman
62 Factors Affecting Implementation of Information Technology in Small to Medium Size Enterprises (SMEs) , Ikhlaq Ahmad.
63 Hedge Fund, Banks Regulations and the Role of Central Bank.. , Marwan Suliman
64 Information Technology in Small to Medium Size Enterprises (SMEs) , Ikhlaq Ahmad
65 Corporate. Social Responsibility (CSR) in Poverty Reduction. , Marwan Suliman
66 Security Goals and Challenges in Wireless Sensor’s Network.. , Ikhlaq Ahmad
67 A Comparison of GROW and ABCDE Models , Mir Asfand Yar Bakht Ali.
68 Parallel Society and Muslim Diversity in New Zealand , Tahir Nawaz
Diversity aids recognition of individual dissimilarities, such as ethnicities, cultural background, language and religious beliefs, and working together to balance this perspective on the benefit of nation building.  Inclusiveness on the other hand, is a way of appreciating and respecting the values of different culture by incorporating them into society. More so, assisting in developing their talents, potentials, knowledge and skills aids the general enhancement of the country.
69 Parallel Society and Muslim Diversity in New Zealand. , Tahir Nawaz
70 Leading Organizational Design and Development. , Asfand Yar Bakht Ali.
71 Smart Meter with Load Management and Electrical Theft Control System. , Dr. Muhamma Abbas Khan, Muhammad Jibran Khan, Ijaz Ahmad, Arsalan Ahmed,    Musarat Hussain..
72 Smart Meter with Load Management and Electrical Theft Control System. , Dr. Muhamma Abbas Khan, Muhammad Jibran Khan, Ijaz Ahmad, Arsalan Ahmed,    Musarat Hussain..
73 The Muslims as a Minority in New Zealand: An Analysis of the Relationship between Muslim Community and New Zealand Government. , Tahir Nawaz
74 Human Resource Management in Context. , Asfand Yar Bakht Ali.
Many organizations regularly use STEEPLE analysis to avoid obstacles and to further change their strategies based on these external factors to achieve the organization's goals. It has been observed that these factors have a significant impact on organizations. The STEEPLE analysis identifies the actual scenario that helps the organization to reduce the risk of failure caused by these external forces. Managers and their teams are responsible to monitor these forces and report to the top management in the decision-making process. It is better to rectify the impact of these external forces at the initial stage and prepare the best possible strategy to deal with it.    Numerous studies have shown that there is a close relationship between HR professionals and the organization. Companies cannot deny the contribution of HR professionals to business success. There are many areas where HRM experts can help develop the strategy. The HRM professional needs to be updated through a learning process to solve future problems because the current situation has radically changed the concept of HRM work. It is the fact that Coronavirus pandemic has given a tough time as well as an opportunity for HR professionals to once again prove themselves. It is time for them to increase knowledge, information, and deliver the best of the best.
75 Role of Leadership in Leading a Diverse Group. , Asfand Yar Bakht Ali.
This work investigates the role of leadership in leading a diverse group. This research found that Planning for leading a diverse group is simply based on what, when, why, how, and where. A plan should be completely systematic because it reduces the likelihood of being inaccessible or unrealistic. We have to look at each step at the micro-level based on the goals of each level. After the plan is created, we need to organize the plan and the resources required to classify the task, assign the task to the people who are committed and responsible for the task assigned, and organize the training and coordinate it with the appropriate authority.
76 Differential Services Model for Providing the Internet with Quality of Services (QoS) Capabilities. , Amjad Al-Jabr
Long ago the public switched telephone network (PSTN) used the circuit-switched network to facilitate the connections in the world. This type of network was suitable to handle voice traffic for communication. After around fifty years of use (PSTN), the packet-switched network appeared in the world of specialists in the network field. This type of network is achieved by breaking up the data into many packets to carry them in independent routes through the network from source to destination. Since the 1990s, IP has been considered the technology of choice for the network because of its ease of use and the improvement in the use of real-time traffic. Quality of Service (QoS) is an important factor that enables the IP network to match all types of traffic on the networks such as video, voice, and various types of data over the packet-switched network. (Szigeti and Hattingh, 2004, sec. A Brief Historical Perspective) Quality of Service (QoS) can be defined as a technique that allows network devices to manage the packets for each type of traffic in an unequal way. (Szigeti and Hattingh, 2004, sec. A Brief Historical Perspective) In addition, (QoS) has another definition that can be widely used. This definition defines (QoS) as a technique used to manage and control some types of data. This can be done by providing a priority for the intended type that is different from the priority of the other types to address some factors such as packet loss, latency, and jitter decrease in the network
77 Detecting Collective Anomalies of Large Scale URL Datasets to Identify Malicious URL Data or Behaviour. , Ismail Al- Jahdhami.
The internet has become the place of communication between various parties and online services like e-business, e-learning, e-shopping, e-government, etc. The number of websites has increased significantly, as have the communication methods. Therefore, large amounts of data are being generated. However, many websites have been created to impersonate and steal information from users and therefore there is a need to use techniques that can identify such behaviours on the World Wide Web. The contribution of this work is to analyse and detect a group of anomalous activities of a certain large-scale data set that was collected from online learning and that contains 2.4 million data examples and 3.2 million features. This dataset is based on host-based and lexical characteristics of the associated URLs and was collected over 120 days, representing one file each day. Therefore, to process such a dataset with such a large number of features and data points, the researcher used big data technology to be able to find anomalous data from the large URL dataset. Apache Spark was selected as the big data framework with the PysPark programming language. To find a collective anomaly, the study used unsupervised learning techniques (clustering algorithm) to identify the pool of normal and malicious URLs from the entire data set. To evaluate the model used in the study, the silhouette score, and the sum of the squared error within the group was used. The finding of this research shows that the system was able to visualize the grouped data to find anomalous collective data. In addition, it was able to process and produce the count of the URLs of the entire dataset to identify malicious and normal URLs. Besides, it was possible to build a big data pipeline to process the data in its entirety for further analysis. It was quite challenging to use a dimensionality reduction technique like PCA to reduce the number of features as there were so many. As a result, the number of functions that PCA can handle was reduced and the data was then transformed into pandas to prepare it for visualizations.
78 Network Design Scenario Local Area Network (LAN). , Amjad Al-Jabr.
This work discusses the creation of a local area network (LAN), which is needed by a small business to connect three departments, sales, administration, and marketing departments. Each department requires four computers, and the network address begins with IP (10.0.0.0). The results of this research show that a simulator tool called (Parcel Tracking) could be used to create the required computer network, which shows the distribution of the cables, computers, switches, and routers in the network topology,
79 The Concept of Positive Psychology in the Workplace. , Asfand Yar Bakht Ali.
The leaders and managers can play a crucial part in the work-life balance. Many studies showed that they can introduce new policies and strategies that will help employees to balance their work and life. Managers and leaders can motivate them by providing a friendly work environment with many suitable options like part-time work, flexible working hours, friendly work environment, telecommuting, etc. managers can plan, organize, control, lead and monitor these options and help the employee to achieve common goals.  
80 Open Systems Interconnection (OSI) Reference Model. , Amjad Al-Jabr. 
A computer network is a group of end devices that are connected to one another via the media in order to exchange information. The devices that run the network, such as the router, switch, and hub, have many rules called protocols. The end devices have an exclusive identifier (IP) or MAC (Media Access Control Address) which can be used to identify the sender and recipient. The Internet is a global system of a computer network and the very network that connects the number of networks. The purpose of this work is to analyse and discuss the Open Systems Interconnection (OSI) reference model and to explain the purpose and functions of each layer.
81 Economic Integration and Multinational Enterprises Strategies. , Marwan Suliman
Globalization is multifaceted and implies the interaction between companies, services, governments and societies across national borders. As a result, the influx of foreign direct investment, international trade in goods and services, and the economic interdependence of the world's nations have all increased. The findings of this work confirm that the consequences of the globalization of production and consumption could be understood as political challenges, and the response to these changes has led to the effects of global capitalism and its moral basis being called into question.
82 Multi National Enterprises and International Joint Venture. , Marwan Suliman.
International Joint Venture Companies (IJV) encompasses many aspects of social and cognitive processes and could potentially have a much larger impact. In this context, it should be mentioned that multinational corporations could provide developing countries with the perfect opportunity to support each other in producing high quality products or services through International Joint Ventures. If, on the one hand, this could create an opportunity, then on the other hand, it is possible that the international joint venture will at some point fail to achieve the desired goals. There are many reasons for the benefits of a successful International Joint venture that companies should consider before entering into such arrangements. Researchers who have worked in this area have highlighted several factors related to the international joint venture concept. This work analysis when multinational companies are likely to use an international joint venture and when would these companies choose a strategic partnership? The findings of this research show that Incentive preferences for international joint ventures depend on the type of investment, market orientation, investment rate, geographic location, year of investment, and product type.