• We are available for your help 24/7
  • Email: info@isindexing.com, submission@isindexing.com


Journal of Computing and Management Studies (JCMS)

ISSN(p): | ISSN(e):2516-2047
Journal Papers (184) Details CONTACT US Authors Guidelines
...
Indexed Journal

1 A Simulation Based Study of Routing Protocols in Mobile Ad-hoc Networks , A. Z. M. Obaidullah
 Mobile ad-hoc is a temporary network without a pre-established infrastructure. Because of the absence of centralized structure, mobile ad hoc networks are facing several problems such as security, routing, limitation of bandwidth, energy and hidden terminal, which need efficacious solutions. Ad-hoc on-demand distance vector (AODV) is a reactive protocol. Mobile ad-hoc on-demand data delivery protocol (MAODDP) is new addition in reactive protocols. It can support both unicast and multicast routing. In this thesis, I evaluate and compare the performances of AODV and MAODDP by means of simulation using SWAN. From the experiments for MAODDP, we see that Route Query and Data Delivery Packet (RQDD), Acknowledge Message (ACK), and routes are increasing with increasing nodes, but these are increasing more sharply than Route Request (RREQ), Route Replies (RREP) and routes for AODV. These observations notify that MAODDP is safer than AODV because more data query and data delivery make routing trustworthy and reliable. ACK and RREP both are increasing, but there is a big difference between ACK and RREP increase. The increase of ACK messages informs us that MAODDP is more dependable in routing table compared with AODV. The most important observation is in energy consumption. AODV saves more energy than MAODDP with a number of nodes up 150. However, MAODDP starts saving more energy than AODP with 200 nodes and this information tells us that MAODDP is more capable for a large network.  
2 Cloud Computing – Threats and Challenges , I. Ahmad, H. Bakht, U. Mohan
3 Management of Home Healthcare using Networked Appliances , Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Arshad Haroon.
4 Management of Home Healthcare using Networked Appliances , Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Arshad Haroon.
5 Cloud Computing – A Comprehensive Definition , I. Ahmad, H. Bakht, U. Mohan.
6 A Wireless Platform for the Early Detection of Arthritis using Home and Body Sensor Network , A. Haroon, P. Fergus, A. Shaheed, M. Merabti. 
7 A Study of Business Strategy, Human Resource Management and Strategic Human Resource Management , Ghulam Rasool. 
8 Computer Based Analysis of Sea Water Conductivity Measurement , Muhammad Abbas Khan, Piao Yan
9 An Overview of Key Management in Wireless Sensors Network, Akhlaq Ahmed
10 The Association of Business Strategies and Different Organizational Factors with Human Resource Management, Ghulam Rasool.
11 Communication Architecture in Wireless Sensors Network , Akhlaq Ahmed
12 Approaches and Models for Strategic Human Resource Management (SHRM) , Ghulam Rasool
13 Approaches and Models for Strategic Human Resource Management (SHRM) , Ghulam Rasool.
14 Query Processing in Wireless Sensor’s Network , Asfandyar
15  Impact of IT on the Growth of SME's , Akhlaq Ahmed
16 Holes Formation in Wireless Sensor's Network , Asfandyar
17 The Factors Affecting Citizens’ Adoption of E-government System in Developing Countries. Nigeria case Study , AnekeO Sampson, Humayun Bakht, Amare Desta
18 A Survey on Schemes to Aid Group Communication in Wireless Sensor’s Network , Adnan Sultan.
19 An Evaluation of Methods for Teaching Grammar in the EFL Classroom , Samir Hilal Said Al Khrusi.
20 The Role of Leadership in Successful Change Management , Kamran Nawaz
21 Evaluation of Revenue and Expenditure Hypotheses: Evidence from Pakistan (1972-2015) Using EViews Software , Muhammad Baqir Ali and Amjad Amin
22 Controllability of Buildings:Computing and Managing Energy in Practice , Dr.Khalid. Y
23 The Teacher's Guide of Running a Lesson , Samir Hilal Said Al Khrusi.
24 Payment Operational Models for Mobile Payment System , Abiola Adekunle, Dr.Humayun Bakht, Dr. Amare Desta.
25 Presentation Practice Production Approach (PPP) for Teaching English as a Second Language , Samir Hilal Said Al Khrusi
26 A Survey on TCP based Routing Schemes for Mobile Ad-Hoc Network , F.Alam.
27  An Analysis of E-commerce Barriers in Small to Medium Size Enterprises(SMEs) , Xiaoxiangyu He.
28 An Empirical Investigation of Patients’ Expectations and Perceptions in Developing Country Hospitals , Saad Anis
29 An Empirical Investigation of Patients’ Expectations and Perceptions in Developing Country Hospitals , Saad Anis
30 Programmable Logic Controllers and Direct Digital Controls in Buildings , Dr. Khalid.Y
31 Management of Service Quality for the Consumer of Health Care Services , Saad Anis
32 An Analysis of Benefit of Wind Turbine Blade , Zeid Saleh
33 An Analysis of Benefit of Wind Turbine Blade , Zeid Saleh
34 Monitoring Consumer Behavior of Lebara Mobile , Zeeshan Saeed
35 An Analysis of Complexity Metrics for Website , Yuhui Ma
36 A Study of Theories on Consumer Behavior , Zeeshan Saeed
37 Appraisal of an Expanding Global Internet-Related Crime. The Case of Cyber Crime in Nigeria , Yusuf Usman and Jafar Abdulkadir
38 A Study on Impact of Motivation on Employees’ Performance in Fast Food Industry , Mir Asfand Y
39 Developing a Long Term Relationship with the Customers , Zeeshan Saeed
40 Cloud Computing Challenges in a General Perspective , Ngo Yang Chong
41 Concept of Integrated Marketing Communications (IMC) , Mir Asfand Y
42 Role of Universities in Fostering Entrepreneurial Mindset through Education and Training: Evidence from Pakistan , Zafar Ali
43 An Analysis of Anti Money Laundering Laws to Curb Money Laundering , Zeeshan Saeed.
44 The Adoption of e-Government Services in Nigeria using UTUAT Model. , Sampson Aneke
45 Management of Islamic Organizations in New Zeland. , Tahir Nawaz
46 Challenges to e-government implementation in developing countries. Nigeria case Study. , Sampson Aneke
47 Management of Cash Flow Information for Investment Decisions. , Mohamed Ahmed Matook
48 The Significance of Information Contained in the Cash Flow Statement of Libyan Investment Companies , Dr Mohamed Ahmed Matook and Dr Mohamed Abulgasem Yakalhef.
49 Islamic Financing Contracts , Siraj Khan
50 State-Societal System, Values and Culture in New Zealand , Tahir Nawaz,
51 Transition to Islamic Banking , Siraj Khan
52 Talent Management, Human Resource Management and Strategic Human Resource Management. , Humayun Bakht
53 Risk Management System of the Islamic Banking , Siraj Khan
54 An Investigation of Wind Turbine Blade. , Zeid Saleh
55 The Youth, the Pioneers of Explaining and Safeguarding Islamic Identity , Tahir Nawaz
56 Influence of Trust in Somalia’s Mobile Payment System. , Ismail Mohamoud Mohamed,
57 Risk Management in Islamic and Conventional Banking , Siraj Khan
58 Mobile Payment Trust. , Ismail Mohamoud Mohammed
59 An Evaluation of Samsung Corporation Status Quo , Marwan Suliman
60 Mobile Payment Landscape and its Effects on Financial Inclusion in the Unbanked Sector. , Ismail Mohamoud Mohamed.
61 Organisational Behavior. TESCO PLC , Marwan Suliman
62 Factors Affecting Implementation of Information Technology in Small to Medium Size Enterprises (SMEs) , Ikhlaq Ahmad.
63 Hedge Fund, Banks Regulations and the Role of Central Bank.. , Marwan Suliman
64 Information Technology in Small to Medium Size Enterprises (SMEs) , Ikhlaq Ahmad
65 Corporate. Social Responsibility (CSR) in Poverty Reduction. , Marwan Suliman
66 Security Goals and Challenges in Wireless Sensor’s Network.. , Ikhlaq Ahmad
67 A Comparison of GROW and ABCDE Models , Mir Asfand Yar Bakht Ali.
68 Parallel Society and Muslim Diversity in New Zealand , Tahir Nawaz
Diversity aids recognition of individual dissimilarities, such as ethnicities, cultural background, language and religious beliefs, and working together to balance this perspective on the benefit of nation building.  Inclusiveness on the other hand, is a way of appreciating and respecting the values of different culture by incorporating them into society. More so, assisting in developing their talents, potentials, knowledge and skills aids the general enhancement of the country.
69 Parallel Society and Muslim Diversity in New Zealand. , Tahir Nawaz
70 Leading Organizational Design and Development. , Asfand Yar Bakht Ali.
71 Smart Meter with Load Management and Electrical Theft Control System. , Dr. Muhamma Abbas Khan, Muhammad Jibran Khan, Ijaz Ahmad, Arsalan Ahmed,    Musarat Hussain..
72 Smart Meter with Load Management and Electrical Theft Control System. , Dr. Muhamma Abbas Khan, Muhammad Jibran Khan, Ijaz Ahmad, Arsalan Ahmed,    Musarat Hussain..
73 The Muslims as a Minority in New Zealand: An Analysis of the Relationship between Muslim Community and New Zealand Government. , Tahir Nawaz
74 Human Resource Management in Context. , Asfand Yar Bakht Ali.
Many organizations regularly use STEEPLE analysis to avoid obstacles and to further change their strategies based on these external factors to achieve the organization's goals. It has been observed that these factors have a significant impact on organizations. The STEEPLE analysis identifies the actual scenario that helps the organization to reduce the risk of failure caused by these external forces. Managers and their teams are responsible to monitor these forces and report to the top management in the decision-making process. It is better to rectify the impact of these external forces at the initial stage and prepare the best possible strategy to deal with it.    Numerous studies have shown that there is a close relationship between HR professionals and the organization. Companies cannot deny the contribution of HR professionals to business success. There are many areas where HRM experts can help develop the strategy. The HRM professional needs to be updated through a learning process to solve future problems because the current situation has radically changed the concept of HRM work. It is the fact that Coronavirus pandemic has given a tough time as well as an opportunity for HR professionals to once again prove themselves. It is time for them to increase knowledge, information, and deliver the best of the best.
75 Role of Leadership in Leading a Diverse Group. , Asfand Yar Bakht Ali.
This work investigates the role of leadership in leading a diverse group. This research found that Planning for leading a diverse group is simply based on what, when, why, how, and where. A plan should be completely systematic because it reduces the likelihood of being inaccessible or unrealistic. We have to look at each step at the micro-level based on the goals of each level. After the plan is created, we need to organize the plan and the resources required to classify the task, assign the task to the people who are committed and responsible for the task assigned, and organize the training and coordinate it with the appropriate authority.
76 Differential Services Model for Providing the Internet with Quality of Services (QoS) Capabilities. , Amjad Al-Jabr
Long ago the public switched telephone network (PSTN) used the circuit-switched network to facilitate the connections in the world. This type of network was suitable to handle voice traffic for communication. After around fifty years of use (PSTN), the packet-switched network appeared in the world of specialists in the network field. This type of network is achieved by breaking up the data into many packets to carry them in independent routes through the network from source to destination. Since the 1990s, IP has been considered the technology of choice for the network because of its ease of use and the improvement in the use of real-time traffic. Quality of Service (QoS) is an important factor that enables the IP network to match all types of traffic on the networks such as video, voice, and various types of data over the packet-switched network. (Szigeti and Hattingh, 2004, sec. A Brief Historical Perspective) Quality of Service (QoS) can be defined as a technique that allows network devices to manage the packets for each type of traffic in an unequal way. (Szigeti and Hattingh, 2004, sec. A Brief Historical Perspective) In addition, (QoS) has another definition that can be widely used. This definition defines (QoS) as a technique used to manage and control some types of data. This can be done by providing a priority for the intended type that is different from the priority of the other types to address some factors such as packet loss, latency, and jitter decrease in the network
77 Detecting Collective Anomalies of Large Scale URL Datasets to Identify Malicious URL Data or Behaviour. , Ismail Al- Jahdhami.
The internet has become the place of communication between various parties and online services like e-business, e-learning, e-shopping, e-government, etc. The number of websites has increased significantly, as have the communication methods. Therefore, large amounts of data are being generated. However, many websites have been created to impersonate and steal information from users and therefore there is a need to use techniques that can identify such behaviours on the World Wide Web. The contribution of this work is to analyse and detect a group of anomalous activities of a certain large-scale data set that was collected from online learning and that contains 2.4 million data examples and 3.2 million features. This dataset is based on host-based and lexical characteristics of the associated URLs and was collected over 120 days, representing one file each day. Therefore, to process such a dataset with such a large number of features and data points, the researcher used big data technology to be able to find anomalous data from the large URL dataset. Apache Spark was selected as the big data framework with the PysPark programming language. To find a collective anomaly, the study used unsupervised learning techniques (clustering algorithm) to identify the pool of normal and malicious URLs from the entire data set. To evaluate the model used in the study, the silhouette score, and the sum of the squared error within the group was used. The finding of this research shows that the system was able to visualize the grouped data to find anomalous collective data. In addition, it was able to process and produce the count of the URLs of the entire dataset to identify malicious and normal URLs. Besides, it was possible to build a big data pipeline to process the data in its entirety for further analysis. It was quite challenging to use a dimensionality reduction technique like PCA to reduce the number of features as there were so many. As a result, the number of functions that PCA can handle was reduced and the data was then transformed into pandas to prepare it for visualizations.
78 Network Design Scenario Local Area Network (LAN). , Amjad Al-Jabr.
This work discusses the creation of a local area network (LAN), which is needed by a small business to connect three departments, sales, administration, and marketing departments. Each department requires four computers, and the network address begins with IP (10.0.0.0). The results of this research show that a simulator tool called (Parcel Tracking) could be used to create the required computer network, which shows the distribution of the cables, computers, switches, and routers in the network topology,
79 The Concept of Positive Psychology in the Workplace. , Asfand Yar Bakht Ali.
The leaders and managers can play a crucial part in the work-life balance. Many studies showed that they can introduce new policies and strategies that will help employees to balance their work and life. Managers and leaders can motivate them by providing a friendly work environment with many suitable options like part-time work, flexible working hours, friendly work environment, telecommuting, etc. managers can plan, organize, control, lead and monitor these options and help the employee to achieve common goals.  
80 Open Systems Interconnection (OSI) Reference Model. , Amjad Al-Jabr. 
A computer network is a group of end devices that are connected to one another via the media in order to exchange information. The devices that run the network, such as the router, switch, and hub, have many rules called protocols. The end devices have an exclusive identifier (IP) or MAC (Media Access Control Address) which can be used to identify the sender and recipient. The Internet is a global system of a computer network and the very network that connects the number of networks. The purpose of this work is to analyse and discuss the Open Systems Interconnection (OSI) reference model and to explain the purpose and functions of each layer.
81 Economic Integration and Multinational Enterprises Strategies. , Marwan Suliman
Globalization is multifaceted and implies the interaction between companies, services, governments and societies across national borders. As a result, the influx of foreign direct investment, international trade in goods and services, and the economic interdependence of the world's nations have all increased. The findings of this work confirm that the consequences of the globalization of production and consumption could be understood as political challenges, and the response to these changes has led to the effects of global capitalism and its moral basis being called into question.
82 Multi National Enterprises and International Joint Venture. , Marwan Suliman.
International Joint Venture Companies (IJV) encompasses many aspects of social and cognitive processes and could potentially have a much larger impact. In this context, it should be mentioned that multinational corporations could provide developing countries with the perfect opportunity to support each other in producing high quality products or services through International Joint Ventures. If, on the one hand, this could create an opportunity, then on the other hand, it is possible that the international joint venture will at some point fail to achieve the desired goals. There are many reasons for the benefits of a successful International Joint venture that companies should consider before entering into such arrangements. Researchers who have worked in this area have highlighted several factors related to the international joint venture concept. This work analysis when multinational companies are likely to use an international joint venture and when would these companies choose a strategic partnership? The findings of this research show that Incentive preferences for international joint ventures depend on the type of investment, market orientation, investment rate, geographic location, year of investment, and product type.
83 How Technology Play Role in Ageism , ·Mohamad.Danou
There are many social problems that must be completely eliminated. One of the neglected issues is the issue of ageism. It has emerged as an area of ​​interest in a society where older people experience many forms of prejudice in their lives. This paper explores ageism and the factors that contributed to the widespread phenomenon of ageism. The results of this work show that age discrimination against the elderly has been able to create disorder in society. The reason is also due to the idea that younger people have been growing in the age of technology, which made them deal and interact with it from an early age, this means that they are always faster along with rapid development of technology than the older ones. This does not mean at all that older people are lagging behind to keep up with technological advances. They only need a specific education system and assistive technology in relation to a more convenient schedule to receive the amount of information and the ability to apply it in practice. It can be argued, if this system existed, the faster we will see a better application and realization, because it will be, combined with the experience of the elderly
84 Social Media and International Advertising , Marwan Suliman
85 Corruption and International Business , ·Marwan Suliman
86 Translation to New Citizens, German Case , Ahmad Danou
87 Evaluation of Samsung Galaxy S6 , Marwan Suliman
88 Skilled Refugee as an Alternative to German Skilled Labour Shortage , Ahmad Danou
89 How Arabic Evolve through History Until 21st Century , Mohamad.Danou
This work explored various reasons that influenced the development process of Arabic type design. Starting by delving into the history of Arabic script showing how it is originated from the Nabatean script and how Arabic written script became widespread after the beginning of Islam, then pointing at Ibn Muqla’s role, which contributed to the evolution of the Arabic script by putting proportional geometric system for Arabic letters. It was until the seventeenth century, printing presses appeared in the Arab countries, which the Europeans preceded by three centuries, and such a delay was due to religious and political reasons. This paper also explained how the development of Arabic type design was related to the cultural heritage and political events in the Arab world. By reviewing the discourse between the two directions present in the design of contemporary Arabic type, the Findings of this research show that this might be due to the migration of Arabic type designers to the West and receiving their academic studies specialised in this field. Also, gaining feedback from Western specialists affected the creative thought and the development process of the type design, which slowed down the development of Arabic type design in the Arab world.
90 A Simulation Based Study of Routing Protocols in Mobile Ad-hoc Networks , A. Z. M. Obaidullah
 Mobile ad-hoc is a temporary network without a pre-established infrastructure. Because of the absence of centralized structure, mobile ad hoc networks are facing several problems such as security, routing, limitation of bandwidth, energy and hidden terminal, which need efficacious solutions. Ad-hoc on-demand distance vector (AODV) is a reactive protocol. Mobile ad-hoc on-demand data delivery protocol (MAODDP) is new addition in reactive protocols. It can support both unicast and multicast routing. In this thesis, I evaluate and compare the performances of AODV and MAODDP by means of simulation using SWAN. From the experiments for MAODDP, we see that Route Query and Data Delivery Packet (RQDD), Acknowledge Message (ACK), and routes are increasing with increasing nodes, but these are increasing more sharply than Route Request (RREQ), Route Replies (RREP) and routes for AODV. These observations notify that MAODDP is safer than AODV because more data query and data delivery make routing trustworthy and reliable. ACK and RREP both are increasing, but there is a big difference between ACK and RREP increase. The increase of ACK messages informs us that MAODDP is more dependable in routing table compared with AODV. The most important observation is in energy consumption. AODV saves more energy than MAODDP with a number of nodes up 150. However, MAODDP starts saving more energy than AODP with 200 nodes and this information tells us that MAODDP is more capable for a large network.  
91 Cloud Computing – Threats and Challenges , I. Ahmad, H. Bakht, U. Mohan
92 Management of Home Healthcare using Networked Appliances , Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Arshad Haroon.
93 Management of Home Healthcare using Networked Appliances , Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Arshad Haroon.
94 Cloud Computing – A Comprehensive Definition , I. Ahmad, H. Bakht, U. Mohan.
95 A Wireless Platform for the Early Detection of Arthritis using Home and Body Sensor Network , A. Haroon, P. Fergus, A. Shaheed, M. Merabti. 
96 A Study of Business Strategy, Human Resource Management and Strategic Human Resource Management , Ghulam Rasool. 
97 Computer Based Analysis of Sea Water Conductivity Measurement , Muhammad Abbas Khan, Piao Yan
98 An Overview of Key Management in Wireless Sensors Network, Akhlaq Ahmed
99 The Association of Business Strategies and Different Organizational Factors with Human Resource Management, Ghulam Rasool.
100 Communication Architecture in Wireless Sensors Network , Akhlaq Ahmed
101 Approaches and Models for Strategic Human Resource Management (SHRM) , Ghulam Rasool
102 Approaches and Models for Strategic Human Resource Management (SHRM) , Ghulam Rasool.
103 Query Processing in Wireless Sensor’s Network , Asfandyar
104  Impact of IT on the Growth of SME's , Akhlaq Ahmed
105 Holes Formation in Wireless Sensor's Network , Asfandyar
106 The Factors Affecting Citizens’ Adoption of E-government System in Developing Countries. Nigeria case Study , AnekeO Sampson, Humayun Bakht, Amare Desta
107 A Survey on Schemes to Aid Group Communication in Wireless Sensor’s Network , Adnan Sultan.
108 An Evaluation of Methods for Teaching Grammar in the EFL Classroom , Samir Hilal Said Al Khrusi.
109 The Role of Leadership in Successful Change Management , Kamran Nawaz
110 Evaluation of Revenue and Expenditure Hypotheses: Evidence from Pakistan (1972-2015) Using EViews Software , Muhammad Baqir Ali and Amjad Amin
111 Controllability of Buildings:Computing and Managing Energy in Practice , Dr.Khalid. Y
112 The Teacher's Guide of Running a Lesson , Samir Hilal Said Al Khrusi.
113 Payment Operational Models for Mobile Payment System , Abiola Adekunle, Dr.Humayun Bakht, Dr. Amare Desta.
114 Presentation Practice Production Approach (PPP) for Teaching English as a Second Language , Samir Hilal Said Al Khrusi
115 A Survey on TCP based Routing Schemes for Mobile Ad-Hoc Network , F.Alam.
116  An Analysis of E-commerce Barriers in Small to Medium Size Enterprises(SMEs) , Xiaoxiangyu He.
117 An Empirical Investigation of Patients’ Expectations and Perceptions in Developing Country Hospitals , Saad Anis
118 An Empirical Investigation of Patients’ Expectations and Perceptions in Developing Country Hospitals , Saad Anis
119 Programmable Logic Controllers and Direct Digital Controls in Buildings , Dr. Khalid.Y
120 Management of Service Quality for the Consumer of Health Care Services , Saad Anis
121 An Analysis of Benefit of Wind Turbine Blade , Zeid Saleh
122 An Analysis of Benefit of Wind Turbine Blade , Zeid Saleh
123 Monitoring Consumer Behavior of Lebara Mobile , Zeeshan Saeed
124 An Analysis of Complexity Metrics for Website , Yuhui Ma
125 A Study of Theories on Consumer Behavior , Zeeshan Saeed
126 Appraisal of an Expanding Global Internet-Related Crime. The Case of Cyber Crime in Nigeria , Yusuf Usman and Jafar Abdulkadir
127 A Study on Impact of Motivation on Employees’ Performance in Fast Food Industry , Mir Asfand Y
128 Developing a Long Term Relationship with the Customers , Zeeshan Saeed
129 Cloud Computing Challenges in a General Perspective , Ngo Yang Chong
130 Concept of Integrated Marketing Communications (IMC) , Mir Asfand Y
131 Role of Universities in Fostering Entrepreneurial Mindset through Education and Training: Evidence from Pakistan , Zafar Ali
132 An Analysis of Anti Money Laundering Laws to Curb Money Laundering , Zeeshan Saeed.
133 The Adoption of e-Government Services in Nigeria using UTUAT Model. , Sampson Aneke
134 Management of Islamic Organizations in New Zeland. , Tahir Nawaz
135 Challenges to e-government implementation in developing countries. Nigeria case Study. , Sampson Aneke
136 Management of Cash Flow Information for Investment Decisions. , Mohamed Ahmed Matook
137 The Significance of Information Contained in the Cash Flow Statement of Libyan Investment Companies , Dr Mohamed Ahmed Matook and Dr Mohamed Abulgasem Yakalhef.
138 Islamic Financing Contracts , Siraj Khan
139 State-Societal System, Values and Culture in New Zealand , Tahir Nawaz,
140 Transition to Islamic Banking , Siraj Khan
141 Talent Management, Human Resource Management and Strategic Human Resource Management. , Humayun Bakht
142 Risk Management System of the Islamic Banking , Siraj Khan
143 An Investigation of Wind Turbine Blade. , Zeid Saleh
144 The Youth, the Pioneers of Explaining and Safeguarding Islamic Identity , Tahir Nawaz
145 Influence of Trust in Somalia’s Mobile Payment System. , Ismail Mohamoud Mohamed,
146 Risk Management in Islamic and Conventional Banking , Siraj Khan
147 Mobile Payment Trust. , Ismail Mohamoud Mohammed
148 An Evaluation of Samsung Corporation Status Quo , Marwan Suliman
149 Mobile Payment Landscape and its Effects on Financial Inclusion in the Unbanked Sector. , Ismail Mohamoud Mohamed.
150 Organisational Behavior. TESCO PLC , Marwan Suliman
151 Factors Affecting Implementation of Information Technology in Small to Medium Size Enterprises (SMEs) , Ikhlaq Ahmad.
152 Hedge Fund, Banks Regulations and the Role of Central Bank.. , Marwan Suliman
153 Information Technology in Small to Medium Size Enterprises (SMEs) , Ikhlaq Ahmad
154 Corporate. Social Responsibility (CSR) in Poverty Reduction. , Marwan Suliman
155 Security Goals and Challenges in Wireless Sensor’s Network.. , Ikhlaq Ahmad
156 A Comparison of GROW and ABCDE Models , Mir Asfand Yar Bakht Ali.
157 Parallel Society and Muslim Diversity in New Zealand , Tahir Nawaz
Diversity aids recognition of individual dissimilarities, such as ethnicities, cultural background, language and religious beliefs, and working together to balance this perspective on the benefit of nation building.  Inclusiveness on the other hand, is a way of appreciating and respecting the values of different culture by incorporating them into society. More so, assisting in developing their talents, potentials, knowledge and skills aids the general enhancement of the country.
158 Parallel Society and Muslim Diversity in New Zealand. , Tahir Nawaz
159 Leading Organizational Design and Development. , Asfand Yar Bakht Ali.
160 Smart Meter with Load Management and Electrical Theft Control System. , Dr. Muhamma Abbas Khan, Muhammad Jibran Khan, Ijaz Ahmad, Arsalan Ahmed,    Musarat Hussain..
161 Smart Meter with Load Management and Electrical Theft Control System. , Dr. Muhamma Abbas Khan, Muhammad Jibran Khan, Ijaz Ahmad, Arsalan Ahmed,    Musarat Hussain..
162 The Muslims as a Minority in New Zealand: An Analysis of the Relationship between Muslim Community and New Zealand Government. , Tahir Nawaz
163 Human Resource Management in Context. , Asfand Yar Bakht Ali.
Many organizations regularly use STEEPLE analysis to avoid obstacles and to further change their strategies based on these external factors to achieve the organization's goals. It has been observed that these factors have a significant impact on organizations. The STEEPLE analysis identifies the actual scenario that helps the organization to reduce the risk of failure caused by these external forces. Managers and their teams are responsible to monitor these forces and report to the top management in the decision-making process. It is better to rectify the impact of these external forces at the initial stage and prepare the best possible strategy to deal with it.    Numerous studies have shown that there is a close relationship between HR professionals and the organization. Companies cannot deny the contribution of HR professionals to business success. There are many areas where HRM experts can help develop the strategy. The HRM professional needs to be updated through a learning process to solve future problems because the current situation has radically changed the concept of HRM work. It is the fact that Coronavirus pandemic has given a tough time as well as an opportunity for HR professionals to once again prove themselves. It is time for them to increase knowledge, information, and deliver the best of the best.
164 Role of Leadership in Leading a Diverse Group. , Asfand Yar Bakht Ali.
This work investigates the role of leadership in leading a diverse group. This research found that Planning for leading a diverse group is simply based on what, when, why, how, and where. A plan should be completely systematic because it reduces the likelihood of being inaccessible or unrealistic. We have to look at each step at the micro-level based on the goals of each level. After the plan is created, we need to organize the plan and the resources required to classify the task, assign the task to the people who are committed and responsible for the task assigned, and organize the training and coordinate it with the appropriate authority.
165 Differential Services Model for Providing the Internet with Quality of Services (QoS) Capabilities. , Amjad Al-Jabr
Long ago the public switched telephone network (PSTN) used the circuit-switched network to facilitate the connections in the world. This type of network was suitable to handle voice traffic for communication. After around fifty years of use (PSTN), the packet-switched network appeared in the world of specialists in the network field. This type of network is achieved by breaking up the data into many packets to carry them in independent routes through the network from source to destination. Since the 1990s, IP has been considered the technology of choice for the network because of its ease of use and the improvement in the use of real-time traffic. Quality of Service (QoS) is an important factor that enables the IP network to match all types of traffic on the networks such as video, voice, and various types of data over the packet-switched network. (Szigeti and Hattingh, 2004, sec. A Brief Historical Perspective) Quality of Service (QoS) can be defined as a technique that allows network devices to manage the packets for each type of traffic in an unequal way. (Szigeti and Hattingh, 2004, sec. A Brief Historical Perspective) In addition, (QoS) has another definition that can be widely used. This definition defines (QoS) as a technique used to manage and control some types of data. This can be done by providing a priority for the intended type that is different from the priority of the other types to address some factors such as packet loss, latency, and jitter decrease in the network
166 Detecting Collective Anomalies of Large Scale URL Datasets to Identify Malicious URL Data or Behaviour. , Ismail Al- Jahdhami.
The internet has become the place of communication between various parties and online services like e-business, e-learning, e-shopping, e-government, etc. The number of websites has increased significantly, as have the communication methods. Therefore, large amounts of data are being generated. However, many websites have been created to impersonate and steal information from users and therefore there is a need to use techniques that can identify such behaviours on the World Wide Web. The contribution of this work is to analyse and detect a group of anomalous activities of a certain large-scale data set that was collected from online learning and that contains 2.4 million data examples and 3.2 million features. This dataset is based on host-based and lexical characteristics of the associated URLs and was collected over 120 days, representing one file each day. Therefore, to process such a dataset with such a large number of features and data points, the researcher used big data technology to be able to find anomalous data from the large URL dataset. Apache Spark was selected as the big data framework with the PysPark programming language. To find a collective anomaly, the study used unsupervised learning techniques (clustering algorithm) to identify the pool of normal and malicious URLs from the entire data set. To evaluate the model used in the study, the silhouette score, and the sum of the squared error within the group was used. The finding of this research shows that the system was able to visualize the grouped data to find anomalous collective data. In addition, it was able to process and produce the count of the URLs of the entire dataset to identify malicious and normal URLs. Besides, it was possible to build a big data pipeline to process the data in its entirety for further analysis. It was quite challenging to use a dimensionality reduction technique like PCA to reduce the number of features as there were so many. As a result, the number of functions that PCA can handle was reduced and the data was then transformed into pandas to prepare it for visualizations.
167 Network Design Scenario Local Area Network (LAN). , Amjad Al-Jabr.
This work discusses the creation of a local area network (LAN), which is needed by a small business to connect three departments, sales, administration, and marketing departments. Each department requires four computers, and the network address begins with IP (10.0.0.0). The results of this research show that a simulator tool called (Parcel Tracking) could be used to create the required computer network, which shows the distribution of the cables, computers, switches, and routers in the network topology,
168 The Concept of Positive Psychology in the Workplace. , Asfand Yar Bakht Ali.
The leaders and managers can play a crucial part in the work-life balance. Many studies showed that they can introduce new policies and strategies that will help employees to balance their work and life. Managers and leaders can motivate them by providing a friendly work environment with many suitable options like part-time work, flexible working hours, friendly work environment, telecommuting, etc. managers can plan, organize, control, lead and monitor these options and help the employee to achieve common goals.  
169 Open Systems Interconnection (OSI) Reference Model. , Amjad Al-Jabr. 
A computer network is a group of end devices that are connected to one another via the media in order to exchange information. The devices that run the network, such as the router, switch, and hub, have many rules called protocols. The end devices have an exclusive identifier (IP) or MAC (Media Access Control Address) which can be used to identify the sender and recipient. The Internet is a global system of a computer network and the very network that connects the number of networks. The purpose of this work is to analyse and discuss the Open Systems Interconnection (OSI) reference model and to explain the purpose and functions of each layer.
170 Economic Integration and Multinational Enterprises Strategies. , Marwan Suliman
Globalization is multifaceted and implies the interaction between companies, services, governments and societies across national borders. As a result, the influx of foreign direct investment, international trade in goods and services, and the economic interdependence of the world's nations have all increased. The findings of this work confirm that the consequences of the globalization of production and consumption could be understood as political challenges, and the response to these changes has led to the effects of global capitalism and its moral basis being called into question.
171 Multi National Enterprises and International Joint Venture. , Marwan Suliman.
International Joint Venture Companies (IJV) encompasses many aspects of social and cognitive processes and could potentially have a much larger impact. In this context, it should be mentioned that multinational corporations could provide developing countries with the perfect opportunity to support each other in producing high quality products or services through International Joint Ventures. If, on the one hand, this could create an opportunity, then on the other hand, it is possible that the international joint venture will at some point fail to achieve the desired goals. There are many reasons for the benefits of a successful International Joint venture that companies should consider before entering into such arrangements. Researchers who have worked in this area have highlighted several factors related to the international joint venture concept. This work analysis when multinational companies are likely to use an international joint venture and when would these companies choose a strategic partnership? The findings of this research show that Incentive preferences for international joint ventures depend on the type of investment, market orientation, investment rate, geographic location, year of investment, and product type.
172 How Technology Play Role in Ageism , ·Mohamad.Danou
There are many social problems that must be completely eliminated. One of the neglected issues is the issue of ageism. It has emerged as an area of ​​interest in a society where older people experience many forms of prejudice in their lives. This paper explores ageism and the factors that contributed to the widespread phenomenon of ageism. The results of this work show that age discrimination against the elderly has been able to create disorder in society. The reason is also due to the idea that younger people have been growing in the age of technology, which made them deal and interact with it from an early age, this means that they are always faster along with rapid development of technology than the older ones. This does not mean at all that older people are lagging behind to keep up with technological advances. They only need a specific education system and assistive technology in relation to a more convenient schedule to receive the amount of information and the ability to apply it in practice. It can be argued, if this system existed, the faster we will see a better application and realization, because it will be, combined with the experience of the elderly
173 Social Media and International Advertising , Marwan Suliman
174 Corruption and International Business , ·Marwan Suliman
175 Translation to New Citizens, German Case , Ahmad Danou
176 Evaluation of Samsung Galaxy S6 , Marwan Suliman
177 Skilled Refugee as an Alternative to German Skilled Labour Shortage , Ahmad Danou
178 How Arabic Evolve through History Until 21st Century , Mohamad.Danou
This work explored various reasons that influenced the development process of Arabic type design. Starting by delving into the history of Arabic script showing how it is originated from the Nabatean script and how Arabic written script became widespread after the beginning of Islam, then pointing at Ibn Muqla’s role, which contributed to the evolution of the Arabic script by putting proportional geometric system for Arabic letters. It was until the seventeenth century, printing presses appeared in the Arab countries, which the Europeans preceded by three centuries, and such a delay was due to religious and political reasons. This paper also explained how the development of Arabic type design was related to the cultural heritage and political events in the Arab world. By reviewing the discourse between the two directions present in the design of contemporary Arabic type, the Findings of this research show that this might be due to the migration of Arabic type designers to the West and receiving their academic studies specialised in this field. Also, gaining feedback from Western specialists affected the creative thought and the development process of the type design, which slowed down the development of Arabic type design in the Arab world.
179 The Impact of COVID-19 on Industrial Production in Saudi Arabia , ··Saud Ilahi
The continued proliferation of COVID-19 with different waves and variants has resulted in a drastic global economic recession. This crisis has severely affected and continues to rattle the production of goods and services, trade, and MSMEs in particular, which has had economic repercussions in all areas, including employment, income, financial markets, international trade, overall growth, and welfare. The study aims to assess the impact of COVID-19 on industrial production in Saudi Arabia, utilizing Industrial Production Index (IPI) and Gross Domestic Product (GDP) as economic indicators. The results of the analysis show that the IPI and GDP have been hit severely, exclusively in the second quarter of 2020, when the COVID-19 pandemic was at its peak
180 Leadership , Asfand Yar Bakht Ali
Leadership has different meanings depending on the sector, such as corporate governance, political leadership, religious leadership, or academic leadership. In general, however, leadership is known as the power to influence, motivate, and lead people to achieve a goal. The findings of this work show that Most organizations are facing tough times and do not perform well due to the lack of efficient and effective leadership. In such organizations, employees lack a clear vision, mission, and common goal, which lead to lower performance, demotivation, higher financial costs, and non-achievement of goals. Currently, organizations have recognized the importance of effective leadership styles and are trying to apply them in their business environment to gain an advantage.
181 Does The European Union Have A Democracy Deficit? , Ahmad Denno
Economic and political solidarity between the countries of the European Union is the result of policies, treaties, and agreements, which are the cornerstone for the construction of unified and supranational European institutions. But the complexity of these agreements has made the term democratic deficit widespread and used today. It raises the following question "Is Europe witnessing a democratic deficit?" In this context, this paper analyses the available data on European democracy as a whole, followed by an examination of the functioning of the European institutions that run the European Union. Furthermore, this work also studies the number of European voters participating in European elections and how they are affected by the rise in popularity of the far-right, as their demands include breaking away from the European Union and focusing on local national identities in some European countries. The findings of this work show that the term European democratic deficit is one of the most complex terms, especially since not everyone who uses it agrees with the meaning of the term. There is also an exchange of views between supporters and opponents on the meaning of the term and whether the term (democratic deficit) is fact or just hearsay. One of the most basic values ​​of the European Union is democracy, liberalism, and equality among European citizens. However, after the drafting of many treaties and agreements that made the European Union more interdependent from its inception until now, these treaties and agreements had an impact on the people and the scope of their understanding of these newly formulated mechanisms. This in turn caused some to think negatively about the importance of this union and the importance of the role that the institutions of this union play through their internal and external policies.
182 A Comprehensive Critical Analysis of Group Communication Schemes for Wireless Sensors’ Networks/ , Adnan Sultan.
Development in the field of Wireless Communication and Electronics has enabled the development of small size, low power, distributed, and inexpensive devices called Sensor nodes, which normally equipped a sensing device, an on-board processor, Analog-to-Digital converter, transceiver, and a battery unit, mobility assistance and location finding systems are optional as required by some applications. These tiny devices are capable of sensing, processing, and communicating wirelessly through short distances, also called a Micro- Electro-Mechanical system (MEMS) that leverages the idea of Wireless Sensor Networks (WSNs). In this context, group communication plays an important role in the overall operational pattern of Wireless Sensors Networks (WSNs). This work critically examines many of the proposed group communication schemes for WSNs
183 Theory of Quantum Gravity , Tariq Ali and Nawaz Ali 
The theory of quantum gravity is considered to be the missing link in unlocking the Holy Grail of all theories. The theory of everything. The greatest minds, including the Master of Science, Albert Einstein himself, and many eminent scientists have grappled with this problem for the past hundred years, but unfortunately without success. With this in mind, this research fully understands the concern in finding the solution to this gigantic and incredibly difficult problem. On this basis, this proposal for a Theory of Quantum Gravity is not in contradiction with known physical problems. The findings of this research show that the presented theory can answer many irreconcilable problems that further validate the precision of the proposed theory of quantum gravity.
184 Modeling and Analyzing Controversy in Large-Scale Cyber-Argumentation. , Najla Althuniyan.
Online discussions take place across different platforms. These discussions have the potential to extract crowd wisdom and capture the collective intelligence from different perspectives. However, certain phenomena, such as controversy, often appear in online argumentation that heat up the discussion between the participantsoften appear in online argumentation that makes the discussion between participants heated. Heated discussions can be used to extract new knowledge. Therefore, detecting the presence of controversy is an essential task to determine if collective intelligence can be derivedextracted from online discussions. This paper uses existing measures for estimating controversy quantitatively in cyber-argumentation. First, it defines controversy in different fields, and then it identifies the attributes of controversy in online discussions. The distributions of user opinions and the distance between opinions are used to calculate the controversial degree of a discussion. Finally, the results from each controversy measure are discussed and analyzed using an empirical study generated by a cyber-argumentation tool. This is an improvement over the existing measurements because it does not require ground-truth data or specific settings and can be adapted to distribution-based or distance-based opinions