113 results on '"Subhan Ullah"'
Search Results
2. Investigation of cross-diffusion effect on radiative Jeffery-Hamel flow in convergent/divergent stretchable channel with Lorentz force and Joule heating
- Author
-
Subhan Ullah, Ikram Ullah, Amir Ali, Kamal Shah, and Thabet Abdeljawad
- Subjects
Heat transfer ,Jeffery-Hamel flow ,Magneto-hydrodynamic ,Convergent/divergent channels ,Soret and Dufour effect ,Joule heating ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
This article documents the hydro-magnetic, incompressible Jeffery-Hamel flow in convergent/divergent (CD) channels with stretchable walls. Although there seem to be several works on the subject in the available literature, only a few attempts have been made to work into mass and heat transfer analysis. Consequently, novelty of present study is to investigate the significance of Soret/Dufour. Joule heating, and chemical reaction effects on Jeffery-Hamel flow. The governing coupled system of PDEs showing the mathematical framework of the current physical problems is converted into ODEs through proper transformations. The numerical solution of the obtained couple of ODEs is simulated with the assistance of Mathematica-11 solver NDSolve. The computed outcomes depict that Lorentz force developed due to the magnetic field decays the fluid motion for both convergent and divergent channels. Furthermore, incorporating the heat source and Dufour effects yields a sustainable increase in temperature distribution, whereas the Soret number has reverse features on concentration. Furthermore, the numerical outcomes reflect the significant variation in Nusselt number against magnetic, radiation parameter and Soret number.
- Published
- 2024
- Full Text
- View/download PDF
3. Exploring the impact of thermal energy and exothermic-endothermic reactions on differential type fluid flow in a convergent/divergent channel
- Author
-
Marouan Kouki, Ikram Ullah, Subhan Ullah, Mohammad Mahtab Alam, Hamda Khan, and M. Modather M.Abdou
- Subjects
Activation energy ,Soret and Dufour ,Joule heating ,Exothermic-endothermic reaction ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
This study investigates the thermal energy and reactive processes on nanomaterial flow via convergent/divergent channels. The research looks at how varied channel designs, fluid characteristics, and operating conditions affect flow patterns, temperature distributions, and heat transfer rates. The study focuses on the heat transfer mechanisms within the channels and the effect of exothermic/endothermic reactive processes on fluid flow and temperature profiles. The findings provide vital insights into the behavior of such flow systems, aiding in the comprehension of heat transfer phenomena and prospective applications in engineering domains such as energy systems, chemical processes, and aeronautical engineering.
- Published
- 2024
- Full Text
- View/download PDF
4. Influencing Factors and Prediction Models of Mercury Phytoavailability and Transference in a Soil–Lettuce System under Chinese Agricultural Soils
- Author
-
Subhan Ullah, Sajjad Hussain, Yousaf Noor, Tasawar Khanam, Xing Xia, Aminu Inuwa Darma, Ya Feng, and Jianjun Yang
- Subjects
Hg contamination ,lettuce ,soil pH ,path analysis ,prediction models ,Agriculture - Abstract
Mercury (Hg) is a highly toxic contaminant posing serious ecological and human health risks. This study investigates the Hg transfer characteristics and prediction models in a soil–lettuce system, employing bioconcentration factors (BCF), path analysis (PA), and Freundlich-type functions. A pot experiment was conducted in a greenhouse, where lettuce was grown in a range of Chinese agricultural soils (n = 21) and deliberately spiked with Hg using Hg(NO3)2 solution. The results indicated that lettuce grown in Hg-spiked acidic soils (pH < 6.5) accumulated total Hg (THg) levels up to 14.01 µg kg−1, surpassing the safe consumption limit of 10 µg kg−1. The BCF for lettuce THg was less than 1.0, suggesting a low transfer of Hg from soil to lettuce. Notably, BCF values were significantly higher in acidic soils (0.02) compared to alkaline soils (0.005). Path analysis accounted for 82% of the variation in lettuce THg content, identifying soil THg, pH, and amorphous (Amo) Al and Fe oxides as primary direct factors. Additionally, soil-available Hg (AvHg), exchangeable Hg (ExHg), clay, and organic matter (OM) were significant indirect factors affecting lettuce THg content. To validate the findings of the path analysis, an extended Freundlich-type equation was developed using stepwise multiple linear regression (SMLR). This model exhibited high predictive accuracy (R2 = 0.82, p ≤ 0.001), with soil pH, THg, and amorphous Al and Fe oxides being the key variables for predicting Hg transfer in the soil–lettuce system. The insights from this study can guide the management of safe lettuce production in Hg-contaminated soils, ensuring the mitigation of Hg exposure through agricultural produce.
- Published
- 2024
- Full Text
- View/download PDF
5. Assessment and Exposure Analysis of Trace Metals in Different Age Groups of the Male Population in Southern Punjab, Pakistan
- Author
-
Sajjad Hussain, Tasawar Khanam, Subhan Ullah, Fouzia Aziz, Abdul Sattar, Imran Hussain, Muhammad Abu Bakar Saddique, Amna Maqsood, Changfeng Ding, Xingxiang Wang, and Jianjun Yang
- Subjects
trace metals ,arsenic ,exposure source ,health risks ,Pakistan ,Chemical technology ,TP1-1185 - Abstract
In developing countries, like Pakistan, the pursuit of urbanization and economic development disrupts the delicate ecosystem, resulting in additional biogeochemical emissions of heavy metals into the human habitat and posing significant health risks. The levels of these trace elements in humans remain unknown in areas at higher risk of pollution in Pakistan. In this investigation, selected trace metals including Copper (Cu), Chromium (Cr), Lead (Pb) Cadmium (Cd), Cobalt (Co), Nickel (Ni), and Arsenic (As) were examined in human hair, urine, and nail samples of different age groups from three major cities (Muzaffargarh, Multan, and Vehari) in Punjab province, Pakistan. The results revealed that the mean concentrations (ppm) of Cr (1.1) and Cu (9.1) in hair was highest in Muzaffargarh. In urine samples, the mean concentrations (μg/L) of Co (93), As (79), Cu (69), Cr (56), Ni (49), Cd (45), and Pb (35) were highest in the Multan region, while As (34) and Cr (26) were highest in Vehari. The mean concentrations (ppm) of Ni (9.2), Cr (5.6), and Pb (2.8), in nail samples were highest in Vehari; however, Multan had the highest Cu (28) concentration (ppm). In urine samples, the concentrations of all the studied metals were within permissible limits except for As (34 µg/L) and Cr (26 µg/L) in Vehari. However, in nail samples, the concentrations of Ni in Multan (8.1 ppm), Muzaffargarh (9 ppm), Vehari (9.2 ppm), and Cd (3.69 ppm) in Muzaffargarh exceeded permissible limits. Overall, the concentrations of metals in urine, nail, and hair samples were higher in adults (39–45 age group). Cr, Cu, and Ni revealed significantly higher concentrations of metals in hair and water in Multan, whereas As in water was significantly (p < 0.001) correlated with urinary As in Multan, indicating that the exposure source was region-specific.
- Published
- 2023
- Full Text
- View/download PDF
6. Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
- Author
-
Iqra Asghar, Muhammad Ayaz Khan, Tahir Ahmad, Subhan Ullah, Khwaja Mansoor ul Hassan, and Attaullah Buriro
- Subjects
smart home security ,user authentication ,node capture attack ,Chemical technology ,TP1-1185 - Abstract
In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vulnerabilities exploited by the attackers. One severe physical attack is the node capture attack, which allows adversaries to compromise the security of the entire scheme. This research paper advances the state of the art by conducting a security analysis of user-authentication approaches regarding their vulnerability to node capture attacks resulting in revelations of several security weaknesses. To this end, we propose a secure user-authentication scheme to counter node capture attacks in smart home environments. To validate the effectiveness of our proposed scheme, we employ the BAN logic and ProVerif tool for verification. Lastly, we conduct performance analysis to validate the lightweight nature of our user-authentication scheme, making it suitable for IoT-based smart home environments.
- Published
- 2023
- Full Text
- View/download PDF
7. Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol
- Author
-
Muhammad Ayaz Khan, Subhan Ullah, Tahir Ahmad, Khwaja Jawad, and Attaullah Buriro
- Subjects
RFID protocol ,Internet of Healthcare Things ,RFID authentication ,IoT security ,Chemical technology ,TP1-1185 - Abstract
Exploiting Radio Frequency Identification (RFID) technology in healthcare systems has become a common practice, as it ensures better patient care and safety. However, these systems are prone to security vulnerabilities that can jeopardize patient privacy and the secure management of patient credentials. This paper aims to advance state-of-the-art approaches by developing more secure and private RFID-based healthcare systems. More specifically, we propose a lightweight RFID protocol that safeguards patients’ privacy in the Internet of Healthcare Things (IoHT) domain by utilizing pseudonyms instead of real IDs, thereby ensuring secure communication between tags and readers. The proposed protocol has undergone rigorous testing and has been proven to be secure against various security attacks. This article provides a comprehensive overview of how RFID technology is used in healthcare systems and benchmarks the challenges faced by these systems. Then, it reviews the existing RFID authentication protocols proposed for IoT-based healthcare systems in terms of their strengths, challenges, and limitations. To overcome the limitations of existing approaches, we proposed a protocol that addresses the anonymity and traceability issues in existing schemes. Furthermore, we demonstrated that our proposed protocol had a lower computational cost than existing protocols and ensured better security. Finally, our proposed lightweight RFID protocol ensured strong security against known attacks and protected patient privacy using pseudonyms instead of real IDs.
- Published
- 2023
- Full Text
- View/download PDF
8. Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks
- Author
-
Subhan Ullah, Zahid Mahmood, Nabeel Ali, Tahir Ahmad, and Attaullah Buriro
- Subjects
dynamic attribute selection ,DDoS attack classification ,CICI-IDS-2018 dataset ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In this paper, we propose a machine learning pipeline that specifically addresses the issue of DDoS attack detection in IoT networks. Our approach comprises of (i) a processing module to prepare the data for further analysis, (ii) a dynamic attribute selection module that selects the most adaptive and productive features and reduces the training time, and (iii) a classification module to detect DDoS attacks. We evaluate the effectiveness of our approach using the CICI-IDS-2018 dataset and five powerful yet simple machine learning classifiers—Decision Tree (DT), Gaussian Naive Bayes, Logistic Regression (LR), K-Nearest Neighbor (KNN), and Random Forest (RF). Our results demonstrate that DT outperforms its counterparts and achieves up to 99.98% accuracy in just 0.18 s of CPU time. Our approach is simple, lightweight, and accurate for detecting DDoS attacks in IoT networks.
- Published
- 2023
- Full Text
- View/download PDF
9. A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware
- Author
-
Muhammad Haris Khan Abbasi, Subhan Ullah, Tahir Ahmad, and Attaullah Buriro
- Subjects
in-browser cryptojacking ,cryptomining ,Monero ,cryptojacking detection ,cryptojacking prevention ,WASM ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Cryptojacking is a type of computer piracy in which a hacker uses a victim’s computer resources, without their knowledge or consent, to mine for cryptocurrency. This is made possible by new memory-based cryptomining techniques and the growth of new web technologies such as WebAssembly, allowing mining to occur within a browser. Most of the research in the field of cryptojacking has focused on detection methods rather than prevention methods. Some of the detection methods proposed in the literature include using static and dynamic features of in-browser cryptojacking malware, along with machine learning algorithms such as Support Vector Machine (SVM), Random Forest (RF), and others. However, these methods can be effective in detecting known cryptojacking malware, but they may not be able to detect new or unknown variants. The existing prevention methods are shown to be effective only against web-assembly (WASM)-based cryptojacking malware and cannot handle mining service-providing scripts that use non-WASM modules. This paper proposes a novel hybrid approach for detecting and preventing web-based cryptojacking. The proposed approach performs the real-time detection and prevention of in-browser cryptojacking malware, using the blacklisting technique and statistical code analysis to identify unique features of non-WASM cryptojacking malware. The experimental results show positive performances in the ease of use and efficiency, with the detection accuracy improved from 97% to 99.6%. Moreover, the time required to prevent already known malware in real time can be decreased by 99.8%.
- Published
- 2023
- Full Text
- View/download PDF
10. MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization
- Author
-
Attaullah Buriro, Abdul Baseer Buriro, Tahir Ahmad, Saifullah Buriro, and Subhan Ullah
- Subjects
malware detection and categorization ,pattern matching ,binary and multi-class classification ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Malware, short for malicious software, is any software program designed to cause harm to a computer or computer network. Malware can take many forms, such as viruses, worms, Trojan horses, and ransomware. Because malware can cause significant damage to a computer or network, it is important to avoid its installation to prevent any potential harm. This paper proposes a machine learning-based malware detection method called MalwD&C to allow the secure installation of Programmable Executable (PE) files. The proposed method uses machine learning classifiers to analyze the PE files and classify them as benign or malware. The proposed MalwD&C scheme was evaluated on a publicly available dataset by applying several machine learning classifiers in two settings: two-class classification (malware detection) and multi-class classification (malware categorization). The results showed that the Random Forest (RF) classifier outperformed all other chosen classifiers, achieving as high as 99.56% and 97.69% accuracies in the two-class and multi-class settings, respectively. We believe that MalwD&C will be widely accepted in academia and industry due to its speed in decision making and higher accuracy.
- Published
- 2023
- Full Text
- View/download PDF
11. Executive compensation and corporate performance of energy companies around the world
- Author
-
Chaohui Wang, Su Zhang, Subhan Ullah, Raza Ullah, and Farid Ullah
- Subjects
Executive compensation ,Corporate performance ,Energy companies ,Firm performance ,Energy industries. Energy policy. Fuel trade ,HD9502-9502.5 - Abstract
This paper studies the relationship between executive compensation and corporate performance of global energy companies. Data from 121 listed energy companies from 2010 to 2019 were collected for empirical analysis. The results show that in the energy industry, executive compensation has a significant positive impact on corporate performance, which is consistent with agency theory, tournament theory and social network theory. In addition, we found that cash incentives are more useful than equity incentives for senior executives. Therefore, we recommend that energy companies establish a reasonable compensation incentive system to address agency issues in the sector.
- Published
- 2021
- Full Text
- View/download PDF
12. An Insight into the Machine-Learning-Based Fileless Malware Detection
- Author
-
Osama Khalid, Subhan Ullah, Tahir Ahmad, Saqib Saeed, Dina A. Alabbad, Mudassar Aslam, Attaullah Buriro, and Rizwan Ahmad
- Subjects
malware ,filelss malware ,volatility ,cybercrimes ,machine learning ,memory forensics ,Chemical technology ,TP1-1185 - Abstract
In recent years, massive development in the malware industry changed the entire landscape for malware development. Therefore, cybercriminals became more sophisticated by advancing their development techniques from file-based to fileless malware. As file-based malware depends on files to spread itself, on the other hand, fileless malware does not require a traditional file system and uses benign processes to carry out its malicious intent. Therefore, it evades conventional detection techniques and remains stealthy. This paper briefly explains fileless malware, its life cycle, and its infection chain. Moreover, it proposes a detection technique based on feature analysis using machine learning for fileless malware detection. The virtual machine acquired the memory dumps upon executing the malicious and non-malicious samples. Then the necessary features are extracted using the Volatility memory forensics tool, which is then analyzed using machine learning classification algorithms. After that, the best algorithm is selected based on the k-fold cross-validation score. Experimental evaluation has shown that Random Forest outperforms other machine learning classifiers (Decision Tree, Support Vector Machine, Logistic Regression, K-Nearest Neighbor, XGBoost, and Gradient Boosting). It achieved an overall accuracy of 93.33% with a True Positive Rate (TPR) of 87.5% at zeroFalse Positive Rate (FPR) for fileless malware collected from five widely used datasets (VirusShare, AnyRun, PolySwarm, HatchingTriage, and JoESadbox).
- Published
- 2023
- Full Text
- View/download PDF
13. Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance
- Author
-
Mudassar Aslam, Muhammad Abbas Khan Abbasi, Tauqeer Khalid, Rafi us Shan, Subhan Ullah, Tahir Ahmad, Saqib Saeed, Dina A. Alabbad, and Rizwan Ahmad
- Subjects
compliance ,data breaches ,information security policies and procedures ,Personal Identity Information (PII) ,vulnerabilities ,Chemical technology ,TP1-1185 - Abstract
Smart cities assure the masses a higher quality of life through digital interconnectivity, leading to increased efficiency and accessibility in cities. In addition, a huge amount of data is being exchanged through smart devices, networks, cloud infrastructure, big data analysis and Internet of Things (IoT) applications in the various private and public sectors, such as critical infrastructures, financial sectors, healthcare, and Small and Medium Enterprises (SMEs). However, these sectors require maintaining certain security mechanisms to ensure the confidentiality and integrity of personal and critical information. However, unfortunately, organizations fail to maintain their security posture in terms of security mechanisms and controls, which leads to data breach incidents either intentionally or inadvertently due to the vulnerabilities in their information management systems that either malicious insiders or attackers exploit. In this paper, we highlight the importance of data breaches and issues related to information leakage incidents. In particular, the impact of data breaching incidents and the reasons contributing to such incidents affect the citizens’ well-being. In addition, this paper also discusses various preventive measures such as security mechanisms, laws, standards, procedures, and best practices, including follow-up mitigation strategies.
- Published
- 2022
- Full Text
- View/download PDF
14. TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications
- Author
-
Subhan Ullah, Tahir Ahmad, Attaullah Buriro, Nudrat Zara, and Sudipan Saha
- Subjects
android ,malware detection ,pattern matching ,classification ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Trojan Detection—the process of understanding the behaviour of a suspicious file has been the talk of the town these days. Existing approaches, e.g., signature-based, have not been able to classify them accurately as Trojans. This paper proposes TrojanDetector—a simple yet effective multi-layer hybrid approach for Trojan detection. TrojanDetector analyses every downloaded application and extracts and correlates its features on three layers (i.e., application-, user-, and package layer) to identify it as either a benign application or a Trojan. TrojanDetector adopts a hybrid approach, combining static and dynamic analysis characteristics, for feature extraction from any downloaded application. We have evaluated our scheme on three publicly available datasets, namely (i) CCCS- CIC-AndMal-2020, (ii) Cantagio-Mobile, and (iii) Virus share, by using simple yet state-of-the-art classifiers, namely, random forest (RF), decision tree (DT), support vector machine (SVM), and logistic regression (LR) in binary—class settings. SVM outperformed its counterparts and attained the highest accuracy of 96.64%. Extensive experimentation shows the effectiveness of our proposed Trojan detection scheme.
- Published
- 2022
- Full Text
- View/download PDF
15. Kinetic of the Antibody Response Following AddaVax-Adjuvanted Immunization with Recombinant Influenza Antigens
- Author
-
Ted. M. Ross, Naveen Gokanapudi, Pan Ge, Hua Shi, Robert A. Richardson, Spencer R. Pierce, Pedro Sanchez, Subhan Ullah, Eliana De Luca, and Giuseppe A. Sautto
- Subjects
influenza virus ,influenza vaccine ,antibody ,IgG subclasses ,antibody-secreting cells (ASCs) ,adjuvant ,Medicine - Abstract
Notwithstanding the current SARS-CoV-2 pandemic, influenza virus infection still represents a global health concern in terms of hospitalizations and possible pandemic threats. The objective of next-generation influenza vaccines is not only to increase the breadth of response but also to improve the elicitation of an effective and robust immune response, especially in high-risk populations. To achieve this second objective, the administration of adjuvanted influenza vaccines has been considered. In this regard, the monitoring and characterization of the antibody response associated with the administration of adjuvanted vaccines has been evaluated in this study in order to shed light on the kinetic, magnitude and subclass usage of antibody secreting cells (ASCs) as well as of circulating antigen-specific serum antibodies. Specifically, we utilized the DBA/2J mouse model to assess the kinetic, magnitude and IgG subclass usage of the antibody response following an intramuscular (IM) or intraperitoneal (IP) immunization regimen with AddaVax-adjuvanted bivalent H1N1 and H3N2 computationally optimized broadly reactive antigen (COBRA) influenza recombinant hemagglutinins (rHAs). While the serological evaluation revealed a homogeneous kinetic of the antibody response, the detection of the ASCs through a FluoroSpot platform revealed a different magnitude, subclass usage and kinetic of the antigen-specific IgG secreting cells peaking at day 5 and day 9 following the IP and IM immunization, respectively.
- Published
- 2022
- Full Text
- View/download PDF
16. A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things
- Author
-
Muhammad Arif Mughal, Xiong Luo, Ata Ullah, Subhan Ullah, and Zahid Mahmood
- Subjects
Confidentiality ,Complex numbers ,Digital signatures ,Internet of Things (IoT) ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Internet of Things (IoT) comprises of large number of smart devices that can exchange sensed data by availing online services. Smart devices can directly interact with the human beings for sensing the healthcare parameters and transmitting to a central repository. During the data exchange, it is mandatory to secure the messages between sender and receiver to handle the malicious human based attacks. For providing secure communication, a number of signature-based schemes are explored in literature but smart devices need more lightweight operations by ensuring desired security strengths. The main problem during signature based approaches is the computational overhead due to large real numbers required for signature and verification processes. This paper presents a light weight shortened complex digital signature algorithm for providing secure communication between smart devices in human centered IoT. We have used less extensive operations to achieve signature and verification processes like human beings do signatures on legal documents and verify later as per witness. We have also presented a multi-option parameter selection to use a signature-verification pair of expressions at particular index by adopting the common practice of human beings for using different signatures as per document criticality level. It enhances the security strength to guard against traffic analysis attacks. We have developed an experimental setup where a number of cell phones and smart devices are considered for secure communication using existing and proposed digital signature schemes. Results demonstrate the supremacy of our scheme as compared to preliminaries.
- Published
- 2018
- Full Text
- View/download PDF
17. Assessing the design of accounting modules across UK higher educational institutions
- Author
-
Subhan Ullah, Danson Kimani, Yunqian Bai, and Rizwan Ahmed
- Subjects
content analysis ,module handbooks ,learning outcomes ,assessment strategies ,Business ,HF5001-6182 ,Management. Industrial management ,HD28-70 - Abstract
The purpose of this article is to uncover how accounting modules are designed across UK Higher Educational Institutions (HEIs). We carried out a content analysis of Undergraduate Year 1 Accounting Module Handbooks for a sample of 12 UK Universities. The study finds considerable heterogeneity concerning the way accounting modules are designed and delivered across the UK HE sector. Our findings reveal significant variations across the sector in terms of credit hours, module learning outcomes and assessment strategies. This research contributes to accounting/business education literature as no study has previously utilised a content analysis approach to understand how accounting modules are designed and delivered across UK HEIs.
- Published
- 2018
- Full Text
- View/download PDF
18. Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT Applications
- Author
-
Subhan Ullah, Lucio Marcenaro, and Bernhard Rinner
- Subjects
smart cameras ,data security ,elliptic-curve signcryption ,multi-receiver aggregate-signcryption ,Internet of Things ,resource efficiency ,Chemical technology ,TP1-1185 - Abstract
Smart cameras are key sensors in Internet of Things (IoT) applications and often capture highly sensitive information. Therefore, security and privacy protection is a key concern. This paper introduces a lightweight security approach for smart camera IoT applications based on elliptic-curve (EC) signcryption that performs data signing and encryption in a single step. We deploy signcryption to efficiently protect sensitive data onboard the cameras and secure the data transfer from multiple cameras to multiple monitoring devices. Our multi-sender/multi-receiver approach provides integrity, authenticity, and confidentiality of data with decryption fairness for multiple receivers throughout the entire lifetime of the data. It further provides public verifiability and forward secrecy of data. Our certificateless multi-receiver aggregate-signcryption protection has been implemented for a smart camera IoT scenario, and the runtime and communication effort has been compared with single-sender/single-receiver and multi-sender/single-receiver setups.
- Published
- 2019
- Full Text
- View/download PDF
19. Proposing sentiment analysis model based on BERT and XLNet for movie reviews.
- Author
-
Mian Muhammad Danyal, Sarwar Shah Khan, Muzammil Khan 0001, Subhan Ullah, Faheem Mehmood, and Ijaz Ali
- Published
- 2024
- Full Text
- View/download PDF
20. Sentiment analysis of movie reviews based on NB approaches using TF-IDF and count vectorizer.
- Author
-
Mian Muhammad Danyal, Sarwar Shah Khan, Muzammil Khan 0001, Subhan Ullah, Muhammad Bilal Ghaffar, and Wahab Khan
- Published
- 2024
- Full Text
- View/download PDF
21. Correction to: Financial modelling, risk management of energy instruments and the role of cryptocurrencies.
- Author
-
Toan Luu Duc Huynh, Muhammad Shahbaz, Muhammad Ali Nasir, and Subhan Ullah
- Published
- 2024
- Full Text
- View/download PDF
22. Financial modelling, risk management of energy instruments and the role of cryptocurrencies.
- Author
-
Toan Luu Duc Huynh, Muhammad Shahbaz, Muhammad Ali Nasir, and Subhan Ullah
- Published
- 2022
- Full Text
- View/download PDF
23. Aggregate-Signcryption for Securing Smart Camera IoT Applications.
- Author
-
Subhan Ullah, Federico Russo, Lucio Marcenaro, and Bernhard Rinner
- Published
- 2018
- Full Text
- View/download PDF
24. The implications of liquidity ratios: Evidence from Pakistan stock exchange limited
- Author
-
Subhan Ullah, Rizwan Ahmed, Robert Hudson, and Andros Gregoriou
- Subjects
Market capitalization ,Economics and Econometrics ,Measure (data warehouse) ,050208 finance ,05 social sciences ,Market liquidity ,Stock exchange ,0502 economics and business ,Econometrics ,Economics ,Capital asset pricing model ,050207 economics ,Negative correlation ,Emerging markets ,Finance - Abstract
In this paper we test two recently developed liquidity measures the Return-to-Turnover (hereafter RtoTR) proposed by Florackis et al. (2011) and Return-to-Volume (hereafter RtoV) recommended by Amihud, 2002 , for 386 companies listed on the Pakistani Stock Exchange (PSX). Our data is obtained from January 2005 to December 2019. We firstly show the Amihud, 2002 ratio has limited ability to distinguish illiquidity from size effects in asset pricing. Second, the Florackis et al. (2011) measure has distinct features to overcome the limitations of the Amihud, 2002 ratio in the PSX. Our results show that the Capital Asset Pricing Model cannot completely account for the significant RtoV premium. However, this weak evidence for the existence of this premium disappears when Fama–French or Carhart alphas are considered as measures of risk-adjusted performance. This suggests that the RtoTR price impact ratio is more effective in the PSX compared to the RtoV ratio. Our findings suggest that both trading frequency and trading cost are significant factors in examining the returns. The RtoV ratio has a negative correlation with the market capitalization, which suggests that small stocks are inherently illiquid.
- Published
- 2023
- Full Text
- View/download PDF
25. Capital expenditures, corporate hedging and firm value
- Author
-
Farid Ullah, Ja Ryong Kim, Muhammad Irfan, and Subhan Ullah
- Subjects
Economics and Econometrics ,050208 finance ,05 social sciences ,Enterprise value ,Utility maximization ,Monetary economics ,Capital expenditure ,Bankruptcy ,0502 economics and business ,Economics ,050207 economics ,Volatility (finance) ,Empirical evidence ,Finance - Abstract
Despite the well-documented mixed results of hedging on firm value, empirical evidence of why hedging reduces firm value is rare. Theory suggests that hedging can increase firm value by reducing bankruptcy cost and volatility, although it can also decrease firm value through a manager’s utility maximization. This study explores the reduction of market dependence and the over-investment hypothesis that results in decreasing firm value. By studying UK domiciled oil and gas companies, we found that capital expenditure accompanied by hedging reduces firm value, although capital expenditure itself increases firm value. This effect is pronounced when capital expenditure is made by firms with foreign operations, suggesting that hedging reduces the effect of the market’s monitoring role and, therefore, capital expenditure with hedging tends to be perceived as over-investment. This paper is one of the first studies that empirically examine the reduction of market dependence and over-investment through hedging.
- Published
- 2023
- Full Text
- View/download PDF
26. Smart cameras with onboard signcryption for securing IoT applications.
- Author
-
Subhan Ullah, Bernhard Rinner, and Lucio Marcenaro
- Published
- 2017
- Full Text
- View/download PDF
27. Bio-inspired fabrication of zinc oxide nanoparticles: Insight into biomedical applications
- Author
-
Khan Atta Ullah, Ilyas Muhammd, Zamel Doaa, Khan Suliman, Ahmad Abbas, Kaneez Fazeela, Abbas Sakina, Zaidi Syeda Armana, Ullah Hikmat, Adnan Faisal, Khan Shehryar, Rahman Fazal, and Khan Subhan Ullah
- Subjects
General Energy - Abstract
Nanotechnology is starting the characterization, fabrication, and possible applications of numerous materials at the Nano-scale. Over the last few eras, nanomaterials provide a platform for researchers from diverse arenas due to the high surface-to-volume ratio and other novels, and new significant belongings. Zinc oxide nanoparticles are receiving diverse biomedical applications because of their distinctive antimicrobial, antioxidant, anticancer, antifungal, antileishmanial, anti-larvicidal, wound healing, anticholinergic, and anti-diabetic properties. Different physical and chemical approaches have been used to synthesize zinc oxide nanoparticles, but these methods cause ecotoxicity and are time-consuming and costly. Therefore, there is a need for more eco-friendly, cost-effective, and safe methods. Such biogenic Zinc oxide nanoparticles offer more advantages over other physiochemically synthesized methods. In this review, we have summarized the recent literature for the understanding of the green synthesis of Zinc oxide nanoparticles, their characterization, and their various biomedical applications.
- Published
- 2022
- Full Text
- View/download PDF
28. Assessing the influence of celebrity and government endorsements on bitcoin’s price volatility
- Author
-
Subhan Ullah, Rexford Attah-Boakye, Kweku Adams, and Ghasem Zaefarian
- Subjects
Marketing - Published
- 2022
- Full Text
- View/download PDF
29. Next generation live-attenuated influenza vaccine platforms
- Author
-
Ted Ross and Subhan Ullah
- Subjects
Pharmacology ,Orthomyxoviridae Infections ,Influenza Vaccines ,Influenza, Human ,Drug Discovery ,Immunology ,Humans ,Molecular Medicine ,Antibodies, Viral ,Orthomyxoviridae ,Vaccines, Attenuated - Abstract
Influenza virus is a major cause of seasonal epidemics and intermittent pandemics. Despite the current molecular biology and vaccine development, influenza virus infection is a significant burden. Vaccines are considered an essential countermeasure for effective control and prevention of influenza virus infection. Even though current influenza virus vaccines provide efficient protection against seasonal influenza outbreaks, the efficacy of these vaccines is not suitable due to antigenic changes of the viruses.This review focuses on different live-attenuated platforms for influenza virus vaccine development and proposes essential considerations for a rational universal influenza virus vaccine design.Despite the recent efforts for universal influenza virus vaccines, there is a lack of broadly reactive antibodies' induction that can confer broad and long-lasting protection. Various strategies using live-attenuated influenza virus vaccines (LAIVs) are investigated to induce broadly reactive, durable, and cross-protective immune responses. LAIVs based on NS segment truncation prevent influenza virus infection and have shown to be effective vaccine candidates among other vaccine platforms. Although many approaches have been used for LAIVs generation, there is still a need to focus on the LAIVs development platforms to generate a universal influenza virus vaccine candidate.
- Published
- 2022
- Full Text
- View/download PDF
30. A Cross-Sectional Study on Behavioral Manifestation in Alzheimer’s Disease Patients and their Association with Cognitive Impairment
- Author
-
Rizwan Farooq, Unaiza Jawad, Imran Khan, Muhammad Rehman, Muhammad Shoaib Irfan, and Subhan Ullah
- Abstract
Background and Aim: Dementia psychological and behavioral symptoms are significantly associated to Alzheimer’s disease (AD). Clinical profile and characterization of Alzheimer’s disease patients might assist in evolution, diagnosis, and better treatment of the disease. The present study aimed to evaluate the behavioral manifestation of Alzheimer’s disease patients. Methodology: This multi-centered cross-sectional study was carried out on 96 Alzheimer’s disease patients in the department of Psychiatry Lahore General Hospital and Psychiatry unit, Khyber Teaching Hospital Peshawar, Pakistan for duration of six months from 1st July 2021 to 30th December 2021. Alzheimer’s disease patients with lower and higher Behavioural and psychological symptoms of dementia (BPSD) scores (≤25 and 26-50 respectively) were enrolled. The patient’s demographic details and clinical information were gathered. Mini-Mental State Examination (MMSE) was used for the evaluation of dementia severity whereas severity varies from mild 27-21 to severe ≤10. Demographic details, AD pharmacological treatments, psychotic breaks presence, AD diagnosis, treatment of concomitant diseases, and extrapyramidal symptoms such as hypokinesia, fluctuating cognition, tremors, etc. were secondary outcomes. Results: Of the total 96 AD patients, 44 (45.8%) had higher and 52 (54.2%) had lower BPSD scores. About 62 (64.6%) were women and 34 (35.4%) were male patients. The overall mean age was 79.6±8.4 years. The majority of the patients had a BPSD score at inclusion and the incidence of psychotic out breaks was reported in 19 (19.8%) patients. The prevalence of symptoms such as depression, delusions, lack of concentration, lack of cooperation, and tremors was 41 (42.5%), 33 (34%), 52 (54.6%), 34 (35.9%), and 52 (54.6%) respectively. Psychotic symptoms such as hallucinations, delusions, and delirium were significantly prevalent in patients with high BPSD scores whereas Apathy and tearfulness-like emotional symptoms were predominated in lower BPSD patients. ADAS-non cognitive score and MMSE were adversely related (p=0.0314), signifying BPSD and cognitive impairment correlation. Appetite changes and lack of concentration were prominently associated with MMSE (p=0.035 and 0.052). Conclusion: Our study found a higher prevalence of non-cognitive symptoms in Alzheimer’s disease patients. Also, BPSD and cognitive impairment are significantly associated with AD. ADAS-non cognitive is a useful assessment tool. Keywords: Behavioral Manifestation, Alzheimer’s disease, Cognitive Impairment
- Published
- 2022
- Full Text
- View/download PDF
31. Depression and Anxiety among Parkinson’s Disease Patients: Prevalence, Risk Factors, and Impact on Life Quality
- Author
-
Shakil Asif, Rizwan Farooq, Unaiza Jawad, Muhammad Shoaib Irfan, Muazzam Fuaad, and Subhan Ullah
- Abstract
Background and Aim: Parkinson’s disease's common symptoms are anxiety and depression and play a determinant role in the quality of a patient’s life. Numerous studies identified several risk factors but very few investigated the specific risk factors associated with Parkinson's disease (PD). The objective of the present study was to assess the depression and anxiety among Parkinson’s disease patients, prevalence, risk factors, and impact on life’s quality. Methodology: This cross-sectional study was conducted on 78 Parkinson’s disease patients at the department of Psychiatry & Behavioral Sciences LGH Lahore, Pakistan and Div HQ hospital, Mirpur AJK in collaboration with Neurology department for the duration from 15 May 2021 to 15 November 2021. All the patients were assessed for anxiety and depression. Unified Parkinson’s Disease Rating Scale (UPDRS) and Holmes and Rahe scale were used for the evaluation of staging and severity among Parkinson’s disease patients. Clinically diagnosed Parkinson’s disease patients aged between 25 and 85 years and stages 1 to 4 on the H-Y scale were enrolled. Patients with movement disorders other than PD, atypical Parkinson's, deep brain stimulation (DBS), visual loss, and secondary Parkinsonism were excluded. Ethical approval was taken from the institutional ethical committee. Depression and anxiety impact on life quality were assessed using World Health Organization Quality of Life (WHOQOL)-BREF. Results: Of the total 78 Parkinson’s disease patients, the prevalence of depression and anxiety was 26 (33.3%) and 32 (41.03%) respectively. About 40 were male and 38 were female patients. The overall mean age was 67±5.9 years. The young population was more susceptible to anxiety and depression was significantly higher in females. The depression and anxiety overlap were in 19 (24.4%) patients. The UPDRS and H-Y scale variance accounted for depression 34.5% and anxiety 38.9%. The severity and advanced disease stage were depression independent predictors whereas younger age and severity were anxiety main predictors. Overall, anxiety and depression had adverse impacts on life quality of Parkinson’s disease patients. Conclusion: Depression and anxiety were found in 33.3% and 41.03% of current Parkinson's disease patients, respectively. Depression and anxiety are relatively common in Parkinson's disease. The main risk factors for developing depression were female gender, low socioeconomic status, and a history of depression. Anxiety was associated with a young age and a history of anxiety. Both had a negative effect on one's quality of life. Keywords: Depression, Anxiety, Risk factors, Prevalence
- Published
- 2022
- Full Text
- View/download PDF
32. A Study on Clinical Characteristics and Diagnostic Stability in Acute and Transient Psychotic Disorders
- Author
-
Rizwan Farooq, Unaiza Jawad, Imran Khan, Muhammad Shoaib Irfan, Subhan Ullah, and Shakil Asif
- Abstract
Background and Aim: The acute and transient psychotic disorders (ATPDs) as an independent diagnostic entity have become a subject of nosological debate. Numerous studies considered these psychosis as schizophrenia variants or mood disorders leading to diagnostic instability. The present study aimed to investigate the clinical characteristics and diagnostic stability in acute and transient psychotic disorders. Methodology: A total of 45 acute and transient psychotic disorders diagnosed patients were investigated at Psychiatry and Behavioral Sciences LGH Lahore and Psychiatry unit, Khyber Teaching Hospital Peshawar Pakistan for six months duration from 1st June 2021 to 30th November 2021. All the patients with ages ranging from 17 to 65 years fulfilling ATPDs criteria as per ICD-10 were enrolled. The written informed consent form was taken from the patients’ relatives. Patients with drug intoxication, psychotic illness history, brain disorders, mental retardation, and those taking regular antipsychotic treatment were excluded. Patients were followed up for one month and three months and diagnosis was reevaluated after each follow-up. During the follow-up period, global functioning, clinical manifestations, and quality of life were all evaluated on a regular basis. Results: Of the total 45 ATPD diagnosed patients, male and female patients were 18 (40%) and 27 (60%) respectively. Overall mean age was 29.7±7.9 years. After one month follow-up, the prevalence of ATPD, mood disorder, and schizophrenia was 39 (86.7%), 4 (8.9%), and 2 (4.4%) respectively. After 3 months follow-up, the incidence of diagnosed ATPDs, schizophrenia, and mood disorder were 36 (80%), 5 (11.1%), and 4 (8.9%) respectively. About 36 (80%) patients retained ATPDs whereas diagnosis of psychotic disorders changed in 9 (20%) patients. Conclusion: The acute and transient psychotic disorder was diagnostically stable entity. Patient’s sizable proportion of ATPDs initial diagnosis changed to Schizophrenia-related disorders representing early manifestations. Keywords: Acute and Transient Psychotic Disorders, Schizophrenia, Diagnostic Stability
- Published
- 2022
- Full Text
- View/download PDF
33. Corporate strategy, political contributions and corporate risk-taking
- Author
-
Anwar Halari, Sardar Ahmad, Subhan Ullah, and Joseph Amankwah-Amoah
- Subjects
Business, Management and Accounting (miscellaneous) - Abstract
Purpose Despite the importance and prevalence of corporate political activities in modern organizations, there remains limited insight on the potential relationship between political contributions and companies’ risk-taking activities. This study aims to examine the relationship between monetary political contributions of firms and corporate risk-taking activities in the context of unstable political and economic environments. Design/methodology/approach The authors use a two-step system GMM estimation to investigate the subject using a cross-country sample of 307 firms from 22 countries covered over 2002–2017. In line with previous studies, the authors control for various corporate governance mechanisms, firm-level factors and country-level characteristics. Findings The findings demonstrate that firms that make monetary political contributions exhibit lower levels of risk as measured by different proxies for risks, namely, systematic, idiosyncratic and total risk. Practical implications The results suggest that political contributions can be a useful mechanism to mitigate risk exposure. Also, the use of different risk measures and other factors for robustness fosters a better understanding of political connectedness in a more contextualized and dynamic manner. Originality/value This study seeks to contribute to the debate surrounding corporate strategy, political connectedness and corporate risk-taking by using actual monetary political contributions as an explicit measure of political connection. This study furthers scholarly understanding on the dynamics of corporate political activities using political contributions in monetary terms as a measure of political connectedness and its impact on risk-taking. Furthermore, the authors explore this topic using insights from nonmarket strategy literature and studies on political contributions.
- Published
- 2023
- Full Text
- View/download PDF
34. Sustainability Targets in Executive Remuneration Contracts and Corporate Sustainability Performance in the United Kingdom and European Union
- Author
-
Hien Thi Thuc Nguyen, Subhan Ullah, Hanh Thi My Le, and Affan Hameed
- Subjects
General Environmental Science - Published
- 2023
- Full Text
- View/download PDF
35. How to apply the event study methodology in STATA: An overview and a step-by-step guide for authors
- Author
-
Ghasem Zaefarian, Rizwan Ahmed, Subhan Ullah, and Danson Kimani
- Subjects
Marketing ,Actuarial science ,business.industry ,Event study methodology ,Event (computing) ,05 social sciences ,Event study ,Window (computing) ,0502 economics and business ,New product development ,050211 marketing ,Profitability index ,Business ,Market value ,China ,050203 business & management - Abstract
The event study methodology, which is gaining recognition in the business and marketing disciplines, is a technique used to capture the impact of significant events and announcements at the firm level and country level. Originating from the finance and economics disciplines, and being widely used in the finance literature, the method has recently attracted the attention of business and marketing researchers, particularly in the aftermath of Covid-19, which has adversely affected all kinds of businesses across the world. The event study methodology can be implemented to measure the impact of a major corporate announcement (e.g. new product development) or a significant event on corporate financial performance, profitability, and market valuation over a specific event window, such as a few days (a short window) or a few years (a long window). In this article, we provide a detailed explanation of the step-by-step procedure for implementing the event study methodology in STATA, using Covid-19-related death announcements from the United States, France, Spain, Italy, China, and the United Kingdom. We also provide STATA commands that can be used by researchers when implementing the event study methodology.
- Published
- 2021
- Full Text
- View/download PDF
36. A Web-Based Online Shoe Store
- Author
-
Subhan Ullah, Farman Ullah, and Saeed Ullah Jan
- Subjects
History ,Polymers and Plastics ,Business and International Management ,Industrial and Manufacturing Engineering - Published
- 2023
- Full Text
- View/download PDF
37. Climate risk disclosures and global sustainability initiatives: A conceptual analysis and agenda for future research
- Author
-
Thanh Ngo, Tu Le, Subhan Ullah, and Hai Hong Trinh
- Subjects
Strategy and Management ,Geography, Planning and Development ,Management, Monitoring, Policy and Law ,Business and International Management - Published
- 2022
- Full Text
- View/download PDF
38. Examining the bidirectional nexus between financial development and green growth: International evidence through the roles of human capital and education expenditure
- Author
-
Thanh Ngo, Hai Hong Trinh, Ilham Haouas, and Subhan Ullah
- Subjects
Economics and Econometrics ,Sociology and Political Science ,Management, Monitoring, Policy and Law ,Law - Abstract
In the context of the 2030 Agenda for Sustainable Development by the United Nations, the functionality of financial development is undeniable in the wider economy toward Sustainable Development Goals (SDGs). Using novel panel data of 36 countries over the last decades, the study sheds light on the bi-directional nexus between financial development and green growth where human capital and education expenditure present their central roles in sustainable development. The study provides critical findings to the existing literature on climate change, environment, and sustainability. Following the empirical findings, we provide important insights to regulators, policy makers, and organizations in investigating the substantial contributions of financial development including financial markets and financial institutions where their accessibility, depth, and efficiency need a thorough consideration toward SDGs and mitigating climate change impacts worldwide. Apart from using the multidimensional proxies, the empirical findings are validated by a set of econometric approaches.
- Published
- 2022
39. Exploring the 'Ups and Downs' of using WhatsApp Messenger amongst postgraduate students
- Author
-
Kainat Javed, Zil-e-Fatima Naeem, Subhan Ullah, Noorikiran Naeem, Rabia Khan, and Ahmad Hassan Khan
- Subjects
Medical education ,business.industry ,Medicine ,business - Abstract
Objective: This study aimed to explore the use of the WhatsApp instant messaging as a source of learning for postgraduate students enrolled in Master of Health Profession Education. Study Design: Mixed Method Study. Setting: University of Lahore. Period: January 2017 to January 2018. Material & Methods: Eighteen students filled the questionnaire after giving informed consent. This was followed by eight individual interviews of students consenting for interview. Results: The findings of the research suggest that the use of WhatsApp instant messaging may assist students in learning as it fosters a social constructivist environment. This environment supported students in reinforcing various concepts by enhancing interaction within the groups, among teachers as well as assimilation of the content material shared. Conclusion: WhatsApp is perceived to be an acceptable supplementary application for educational purposes, if used appropriately.
- Published
- 2021
- Full Text
- View/download PDF
40. Prevention of Cryptojacking Attacks in Business and FinTech Applications
- Author
-
Subhan Ullah, Tahir Ahmad, Rizwan Ahmad, and Mudassar Aslam
- Abstract
More than 2000 different cryptocurrencies are currently available in business and FinTech applications. Cryptocurrency is a digital payment system that does not rely on banks to verify their financial transactions and can enable anyone anywhere to send and receive their payments. Crypto mining attracts investors to mine and gets some coins as a reward for using the cryptocurrency. However, hackers can exploit the computing power without the explicit authorization of a user by launching a cryptojacking attack and then using it to mine cryptocurrency. The detection and protection of cryptojacking attacks are essential, and thus, miners are continuously working to find innovative ways to overcome this issue. This chapter provides an overview of the cryptojacking landscape. It offers recommendations to guide researchers and practitioners to overcome the identified challenges faced while realizing a mitigation strategy to combat cryptojacking malware attacks.
- Published
- 2022
- Full Text
- View/download PDF
41. Bio-inspired fabrication of zinc oxide nanoparticles: Insight into biomedical applications
- Author
-
Atta Ullah, Khan, primary, Muhammd, Ilyas, additional, Doaa, Zamel, additional, Suliman, Khan, additional, Abbas, Ahmad, additional, Fazeela, Kaneez, additional, Sakina, Abbas, additional, Syeda Armana, Zaidi, additional, Hikmat, Ullah, additional, Faisal, Adnan, additional, Shehryar, Khan, additional, Fazal, Rahman, additional, and Subhan Ullah, Khan, additional
- Published
- 2022
- Full Text
- View/download PDF
42. Prevalence of Psychiatric Disorders in Burn Patients in a Tertiary Care Hospital
- Author
-
Imran Khan, Taimur Khan, Shakil Asif, Syed Azhar Ali Kazmi, Subhan Ullah, and Muhammad Shoaib Irfan
- Abstract
Background and Aim: Burn injuries patients generally suffer from various psychological and mental disorders especially in lower socio-economic groups. It can adversely affect their wellbeing and health. Proper consultation and clinical diagnosis need to be carried out on burns injuries patients from the early critical phase to rehabilitation phase recovery. The current study's aim was to determine the prevalence of psychiatric disorders in burn patients in a tertiary care hospital. Materials and Methods: This cross-sectional study was conducted on 82 attempted burn suicides, adult patients in Khattak Medical Center Peshawar, Khyber Teaching Hospital Peshawar and Divisional Headquarter hospital, Mirpur AJK for duration of six months from June 2020 to December 2020. All the patients admitted with suicides burns were of either gender and had ages above 15 years. The convenience technique was used for sampling. The patients’ demographic details such as psychiatric illness, self-immolation act motivation, burn injury depth, burn total body surface area, inhalation injury, hospitalization duration, and mortality was recorded on pre-designed proforma. Data analysis was carried out with SPSS version 20. Results: The mean age of all 82 patients was 28.9±5.2 with an age range of 14 to 55 years. Of the total, 66 (80.5%) were female while 16 (19.5%) were male. In this study, the most frequent suicidal attempt was made by the marital conflicted patients 50 (61%) followed by love affair failure 8 (9.7%). An overall mean of 53.6±19.6 was observed for total body surface area affected with a range of 15-100%. The hospital duration mean was 8.2±5.9 with a range of 1-38 days. Young, married, and rural area illiterate housewives were the most common self-inflicted/suicide burn injuries. The prime cause of such injuries was getting married. The mortality rate was found at 82.3%. Conclusion: Our study concluded that patient’s well-being and mental health could be severely affected by burn injuries. Prevalent depression was noted among severe burn injuries patients. Depression related to deformity could be prevented with early grafting, wound management, proper splinting, coping ability, intense physiotherapy, and long-term rehabilitation. Keywords: Burn; Depressed mood, Psychiatric morbidity, Posttraumatic stress disorder
- Published
- 2021
- Full Text
- View/download PDF
43. Sustainable tourism development and globalization: Recent insights from the United States
- Author
-
Subhan Ullah, Arshian Sharif, Muhammad Shahbaz, and Mantu Kumar Mahalik
- Subjects
Sustainable development ,Globalization ,Renewable Energy, Sustainability and the Environment ,Political science ,Financial crisis ,Sample (statistics) ,Economic geography ,Development ,Political globalization ,Tourism ,Sustainable tourism - Abstract
Our study explores the relationship between tourism and globalization (both overall, and in terms of three sub‐indices, namely economic, social, and political globalization) in the United States (US) using monthly data from January 1995 to December 2017. We employ the quantile‐on‐quantile (QQ) regression technique for our analysis. The sample period of the present study allows the separate examination of the relationship between globalization and tourism both before the global financial crisis (1995–2007) and after (2008–2017). The findings suggest that in the US during the precrisis era, all the globalization indices and tourism are positively bidirectionally related. During the postcrisis period, all globalization indices positively affect tourism, but tourism has a negative effect on economic and political globalization. The theoretical and policy implications of the empirical findings are discussed.
- Published
- 2021
- Full Text
- View/download PDF
44. The choice of performance measures, target setting and vesting levels in UK firms' Chief Executive Officer equity‐based compensation
- Author
-
Affan Hameed, Carol Padgett, Michael P. Clements, and Subhan Ullah
- Subjects
Economics and Econometrics ,CEO Compensation ,Long-term incentive plans ,Accounting ,Optimal contracting ,Performance target ,Finance - Abstract
This article analyses factors influencing the choice of performance measure in CEO equity-based compensation, for a sample of 3,400 plans from 400 UK firms between 2007 and 2015. We examine the effect of the volatility of earnings per share (EPS) and of total shareholder returns (TSR) on the choice of performance measures, taking into account four categories of measure: EPS alone, TSR alone, EPS and TSR jointly, or neither EPS nor TSR. This allows us to utilize a comprehensive cross-section of plans. The results are robust to controlling for plan types, the use of different compensation consultants, industry and time-specific effects. We find that “EPS and TSR jointly” is the most common category of performance measure employed by firms. Our empirical results show that firms with higher EPS volatility and lower TSR volatility are more likely to choose TSR as a performance measure and that firms with higher EPS volatility are less likely to choose EPS alone; we argue that these results are consistent with optimal contracting theory. Second, we conduct a novel, detailed description of the performance measures, comparator groups, plan choices, threshold targets and vesting levels at minimum and maximum thresholds, used in CEO compensation contracts. We further argue that commonalities across firms in the elements of target-setting are evidence of institutional isomorphism.
- Published
- 2022
45. The moderating effects of <scp>CEO</scp> power and personal traits on say‐on‐pay effectiveness: Insights from the <scp>Anglo‐Saxon</scp> economies
- Author
-
Essam Joura, Qin Xiao, and Subhan Ullah
- Subjects
Economics and Econometrics ,Accounting ,Finance - Published
- 2022
- Full Text
- View/download PDF
46. Work Locus of Control as a Moderator of Relationship between Work Stressor and Counter Productive Work Behavior
- Author
-
Shahnaz Akhtar, Mutayyaba Majeed, Sadia Aman, Syeda Sara Bano, Subhan Ullah, and Noor-I-Kiran Naeem
- Abstract
Purpose: This study was conducted to determine whether the work locus of control is a moderator of the relationship between counterproductive behavior at work and work stressors. Methods: To investigate this relationship, 346 full-time working adults employed at Nishter hospital Multan and Allied hospital Faisalabad were surveyed during the period from January 2019 to January 2020via three checklist questionnaires. Using hierarchical regression analysis, both main and moderator effect were tested in order to determine whether work locus of control influence employee’s tendencies engage in counterproductive behavior in response to work stressors. Results: Shows that the work locus of control interacts significantly with work stressors in predicting counterproductive behavior at work, suggesting that the work locus of control is an important variable to consider when studying productive behavior at work. The implications of these findings and ideas for future research are discussed. Conclusion: CWB has a detrimental effect on organizations and individuals related with the organization; therefore, organizations should be attentive of the probable influences influencing employee participation in CWB. Keywords: Counterproductive behavior at work, Deviations in the workplace, Location of control in the workplace, Stress at work, Personality
- Published
- 2021
- Full Text
- View/download PDF
47. Corporate social responsibility corporate innovation: A <scp>cross‐country</scp> study of developing countries
- Author
-
Subhan Ullah and Di Sun
- Subjects
Cross country ,business.industry ,Strategy and Management ,Corporate governance ,05 social sciences ,Developing country ,Stakeholder engagement ,Context (language use) ,Accounting ,06 humanities and the arts ,Management, Monitoring, Policy and Law ,Development ,0603 philosophy, ethics and religion ,Corporate innovation ,0502 economics and business ,Sustainability ,Corporate social responsibility ,060301 applied ethics ,business ,050203 business & management - Abstract
This paper explores the relationship between corporate social responsibility, corporate innovation, and corporate performance in developing countries. Firm level governance and corporate social responsibility data for 150 companies from 12 developing countries were collected from Datastream and Bloomberg for 2014–2019. The results show that in the context of developing countries there is no significant relationship between corporate social responsibility and corporate innovation. Our findings raise concerns about the level of R&D investments and commitment to corporate social responsibilities in developing economies.
- Published
- 2021
- Full Text
- View/download PDF
48. Analysing spillover between returns and volatility series of oil across major stock markets
- Author
-
Aviral Kumar Tiwari, Subhan Ullah, Muhammad Shahbaz, and Samia Nasreen
- Subjects
Economics and Econometrics ,Brent Crude ,symbols.namesake ,Spillover effect ,Accounting ,symbols ,Economics ,Econometrics ,Volatility (finance) ,Finance ,Stock (geology) - Abstract
Applying recently developed Diebold and Yilmaz (2012) spillover index, this paper investigates the oil–stocks returns and volatility connectedness with weekly data between January 14, 2000 and March 31, 2017. For the purpose of robustness, we have both used WTI and Brent oil prices. Sensitivity of overall spilover index is also examined using different lag‐structures and different forecast horizons. The empirical results are qualitatively similar either when WTI or Brent oil prices are used to examine the spillover amongst series under consideration. Specifically, the spillover index value for WTI and Brent, respectively, is 71.60 and 72.32%. We show that total spillover connectedness, as measured by a rolling‐window approach, has dynamic and volatile characteristics in returns and volatility series across major markets. Last but not least, we find from the net spillover analysis that NYK, SPTSX, IBOV, MICEX, SENSEX, Shanghai, TOP40 and WTI stock markets are net receiver of return spillover, whereas SPX, DAX, UKX, FTSEMIB and CAC40 are the net contributors.
- Published
- 2020
- Full Text
- View/download PDF
49. Risk factors and health related quality of life among adult patients of depression presenting at psychiatric OPD clinic of Aziz Fatima Medical College and Hospital Faisalabad
- Author
-
Zubash Aslam, Ghulam Abbas Shiekh, and Subhan Ullah
- Subjects
Health related quality of life ,medicine.medical_specialty ,Adult patients ,business.industry ,medicine ,Psychiatry ,business ,Depression (differential diagnoses) - Abstract
Objectives: To determine the risk factors of depressive disorders and health related quality of life among adult patients of depression presenting at psychiatric OPD clinic of Aziz Fatima Hospital Faisalabad. Study Design: Cross-sectional study. Setting: Psychiatric OPD clinic of Aziz Fatima Hospital Faisalabad Pakistan. Period: 1st August 2019 to 31st December 2019. Material & Method: 150 patients for the screening of depression Patient Health Questionnaire (PHQ) was used. For measuring health related quality of life World Health Organization Quality of Life (WHOQOL-Brief) was used. Results: It was found that out of 150 patients with depressive disorder 104(69.3%) were female and 46(30.7%) were male patients. Findings of the study assessed that depressive disorder not only impacts on the patients' mood but it also impairs the individuals overall perception of their general health, physical health, psychological wellbeing, social relationship and also distorted perception of their surrounding psychosocial environment. Conclusion: Depressive disorder is common in patients visiting psychiatric OPD clinic and findings of study suggested that age, education level, socio-economic status, death of parent at early age, unemployment, workplace issues, parental separation, loss of partner and family history of depression are important demographic variables which plays the role of significant risk factor for depression and impairs the quality of life among depressive patients.
- Published
- 2020
- Full Text
- View/download PDF
50. Aggregate Suitability of the Late Permian Wargal Limestone at Kafar Kot Chashma Area, Khisor Range, Pakistan
- Author
-
Shafi Muhammad, Subhan Ullah, Muhammad Tahir, Muhammad Asim, Fayyaz Ali, Nazir Rehman, Shuja Ullah, and Rizwan Ullah
- Abstract
This study was carried out for the investigation of the Late Permian Wargal limestone at Kafar Kot Chashma area, Khisor Range to determine its suitability as an aggregate that is used in road construction and civil structures with the help of geological engineering testing. The results of geological engineering testing of Wargal limestone samples show the tolerable values of all standard engineering parameters including the Loss Angles Abrasion value (23.37%), Aggregate impact (16.8%), Crushing value 13.1%, Unit weight 1.67, Soundness (1.007%), Specific gravity (2.70), Water Absorption (0.48%), Flakiness Index (6.5%), Elongation value (7.1%), Coating of bitumen (> 95%), stripping of bitumen (
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.