Faculty Research Publication

Faculty Research Publication

Tool for Different Watermarking Applications Using Low and High DCT Frequencies

Dr. Ahmed Al-Gindy
International Journal of Applied Engineering Research
Year 2017, Volume: 12, Issue 18,
Pages: 7442-7448
Research India Publications.


Abstract

This paper presents a tool for different applications digital watermarking of still colour images. The aim of the scheme is to protect the copyright information or to proof the identity by authenticating the image. In general, all watermarking schemes satisfy only one application. However, the proposed algorithm permits users to use the system for both copyright protection and authentication purposes, even though, both purposes have opposing functions. For instance, watermarking techniques used for copyright protection are meant to be robust and strong against watermark impairment even with massive alterations, whereas watermarking techniques utilized for authentication purposes should be fragile and easily impaired via simple modifications. Nevertheless, any of the aforementioned applications can be selected through one system depending on user’s protection means.

Keywords: watermarking, digital image processing, discrete cosine transform, copyright, authentication, medical images

Digital image watermarking technique for big size watermarks and high-resolution images using discrete cosine transform

Dr. Ahmed Al-Gindy
International Journal of Signal and Imaging Systems Engineering,
Year 2017, Volume: 6, Issue 6,
Pages: 306-315
Inderscience Publishers


Abstract:

The capability of any watermarking system to hide large or small amounts of data while maintaining the robustness and quality is an important challenge in watermarking. The proposed algorithm can store hidden watermarking information up to 25% of the host image size. This means that it can also be an extremely robust technique when working with high-resolution images. The green channel of the RGB model has been used to host the watermark by modifying the very low-frequency coefficients of the discrete cosine transform transformation. The used frequency coefficients are predefined after a process of zigzag patterns. The new technique can resist classical attacks such as JPEG compression, low-pass filtering, median filtering and geometric attacks such as, cropping, rotation, affine and scaling. The method has been applied to high-resolution images that have been found to be extremely robust against attacks. The recovery method is blind because it does not need the original host image for extraction. The simulation results show that the proposed watermarking technique outperforms many other existing techniques.

Keywords: blind; discrete cosine transform (DCT); high capacity; high resolution; RGB; watermarking.

Evaluation of Different Frequency Domain Transformation on Digital Image Watermarking

Dr. Ahmed Al-Gindy
International Journal of Applied Engineering Research
Year 2016, Volume: 11, Issue 13,
Pages: 8080-8084
Research India Publications.


Abstract

This paper studies the different aspects of three implemented watermarking algorithms to evaluate the advantages and disadvantages of each. To achieve a fair comparison, the same host image and watermark are used to test each algorithm while changing the frequency domain transformation. The three algorithms used are blind and do not require the original image for extracting the watermark. PSNR and the structural similarity index measurement (SSIM) between the host image and the watermarked image are used. The quality of the reconstructed signature was evaluated using normalized correlation. The performance of each algorithm is compared to one another.

Keywords: Image processing; DCT; DWT; Watermarking

Evaluation Tool For Generating Attacks on Watermarking Algorithms

Dr. Ahmed Al-Gindy
IJCSNS International Journal of Computer Science and Network Security
Year 2016, Volume: 16, Issue 6,
Pages: 27-33
IJCSNS


Abstract

A new evaluation tool for generating attacks on watermarking algorithms is proposed. The tool is implemented for digital still images but additional attacks for audio or video can be added in the test environment continuously. The implemented tool is comprised of 23 different attacks using a graphical user interface (GUI) to open, select, attack, evaluate, and display the results of both the original and attacked image in ease. It permits user to select any desirable image and perform all aforementioned attacks simultaneously allowing the user to enter or select attack strength parameters. User can also select individual modified images and perform any required changes to the attacked image by adjusting parameters without affecting other attacked images in the scheme. The execution process is performed at a high speed. The tool is much easier for end-users to understand and learn than other traditional tools that need commands to be known or memorized.

Keywords: Image Processing; Watermarking; Attacks; GUI;

Do Big 4 auditors improve the ability of goodwill to forecast future cash flows? The Malaysian evidence

Ahmad Al-Hiyari, Rohaida Abdul Latif, Noor AfzaAmran
Corporate Ownership and Control
Year 2016, Volume: 13, Issue 3,
Pages: 164-172
VIRTUS Enterpress


Abstract

The accounting rules prescribed in Malaysian Financial Reporting Standard (MFRS) 3, Business
combination, and (MFRS) 136, Impairment of Assets, give managers considerable reporting
discretion in allocating goodwill and estimating its actual value. Agency theory predicts that
managers may use the accounting discretion granted by the new rules to pursue their own
interests at the expense of shareholders. Hence, auditors are required to exercise professional
judgement when investigating hard-to-verify management assumptions and valuations. We
exploit this issue by examining whether predictive ability of goodwill improved in the presence
of Big 4 auditors. We provide evidence that goodwill has a significant predictive ability for
second and third-year ahead cash flows which exists only in the firms audited by the large
international reputable accounting firms. This suggests that Big 4 auditors play an important
role in ensuring appropriate implementation of the present accounting for goodwill.

Keywords: Audit Quality, Emerging Markets, Goodwill Impairment, Cash Generating Units, Fair Values, Recoverable Amount, Value In Use

Goodwill Impairment: An Examination of Chief Executive Officer Tenure in Malaysia

Al-Hiyari, Ahmad; Latif, Rohaida Abdul; Amran, Noor Afza
Advanced Science Letters,
Year 2016, Volume: 22, Issue 5-6,
Pages: 13-56-1359
American Scientific Publishers


Abstract:

Accounting for purchased goodwill has changed from amortisation to impairment approach. The standard setters argue that the impairment-only approach will better reflect the underlying economic attributes of goodwill. However, due to the great subjectivity involved in fair values estimate, the impairment approach is susceptible to manipulation. We examine the influence of chief executive officer (CEO) tenure on the amount of goodwill impairment for a sample of 727 companies listed on Bursa Malaysia from years 2011 to 2012. Our empirical results are contradictory to previous research findings that CEOs with shorter tenure are insignificantly associated with magnitude of goodwill impairment. Further analysis reveals that new CEOs are associated with a greater magnitude of impairments only when earnings are positive. The result is consistent with the premise of new CEOs involving in income smoothing, where the incentives to expense goodwill is greatest for profitable firms.

Keywords: Accounting Discretion; CEO Tenure; Corporate Governance; Fair Value; Goodwill Impairment

The value relevance of purchased goodwill in Malaysian firms: The pre- and post-IFRS evidence

Al-Hiyari, Ahmad; Latif, Rohaida Abdul; Amran, Noor Afza
International Journal of Business Research 
Year 2016, Volume: 16, Issue 3,
Pages: 69-80
International Academy of Business and Economics (IABE)


Abstract

Following the adoption of International Financial Reporting Standards (IFRS) in Malaysia, the accounting for goodwill has changed from systematic amortisation to a method based solely on periodic impairment testing. The objective of the impairment test is to ensure that reported goodwill does not have carrying amount in excess of its recoverable amount. Nevertheless, many critics suggest that the new method may allow managements to engage in opportunistic earnings manipulation activities. In this study, we examine the question of whether goodwill is more value relevant after adoption of an IFRS in Malaysia. Using panel data of non-financial firms listed on the Bursa Malaysia over the period from 2002 to 2010, we find evidence that goodwill is not value relevant in either the pre-and post IFRS periods. These findings are in line with the opponents of the new standards, who claim that, the use Fair Value Accounting (FVA) in the reporting of goodwill increases the opportunities for managerial opportunisms. Therefore, the consequences FVA devoid of relevant information for shareholders. We conclude that the existence of an unfavorable environments in Malaysia impedes efficient implementation of the new impairment regime.

A critical review of corporate governance reforms in Malaysia

Ahmad Al-Hiyari
Journal of Governance and Regulation
Year 2017, Volume: 6, Issue 1,
Pages: 38-44
VIRTUS Enterpress

Abstract:

Following the East-Asian financial crisis in 1997 and the corporate accounting scandals, the shareholder’s confidence in the audited financial statements was adversely affected and regulators started to think seriously reforming the existing corporate governance practices. As a result, numerous initiatives were implemented to accelerate improvement of corporate governance practices. One of these initiatives was the Malaysian Code on Corporate Governance (MCCG). The code was derived from the approach applied by the British Hampel Committee, which attempt to mitigate the agency problem between corporate managers and outside owners. This study suggests that the British approach is unsuitable to Malaysian business environment. Particularly, the MCCG that had been lunched since 2011 ignore the uniqueness of Malaysia’s capital market, regulation environment and ownership structure. Therefore, the study recommends that policy makers and other regulators should consider the local business environment when establishing future code on corporate governance.

Keywords: Agency Problem, Codes of Good Governance, Malaysia

Dubai EXPO 2020 - Exploring the drivers impacting sustained changes in UAE Economy

AnuVij
Research Journal of Economics & Business Studies
Year 2016, Volume: 5, Issue 9,
Pages: 1-4
The International Journal Research Publications


Abstract:

Dubai let out a whoop of joy on being chosen the official host of EXPO 2020, thus ending months of speculation, anxiety and curiosity of all concerned. While the tiniest of doubts as to the result of this most awaited and abetted race were being squashed; a new series of concerns and meditation were germinating throughout the business community. The scope and scale of events that would necessarily follow in the aftermath of this historic moment are worth pondering upon.Among the opportunities and facilities that present a wide array of possibilities and promises, a few are coined such as a trade boosting strategic connect between the East and West; an international airport thrumming with commercial/ non commercial flight; opening of the brand new Al Maktoum International Airport etc.Barring a few exceptions, such events in the past generally have had a significant impact on the host countries’ economic climate and therefore remain a major area of concern.In this articlewe discuss the effect of EXPO 2020’s on certain sectors of UAE that are critical to its progress and how that will further impact the economic climate of this country. The forthcoming event heralds key changes in the realestate, trade and commerce, hospitality and infrastructure sectorswhich will eventually prove drivers of growth and development in UAE.

Key words: EXPO 2020, Dubai, Expo

Hyundai Santa Fe in United Arab Emirates: Market Segmentation in a Newer Context

AnuVij
Research Journal of Social Science and Management
Year 2016, Volume: 6, Issue 3,
Pages: 121-130
The International Journal Research Publications


Abstract

Companies, all over the world have been focussed on customer-centric product development. They
conduct market research, surveys, spend significant amount on understanding the customers’ latent
needs. In this case study, the author while briefing about the Hyundai’s way of conducting an
ethnographic study in North America, presents the challenges for the company in a new market place –
United Arab Emirates (UAE). The article brings forth a discussion on the company’s background,
product development, STP (market segmentation, targeting, positioning), prevailing competition,
issues and constraints in a new market place. The article is useful for the marketing practitioners and
scholars to gain insights on creating marketing plans with regard to a new market place.

Key words: Santa Fe, Hyundai, UAE, Market segmentation, targeting, positioning

Marketing Ethics and Relationship Marketing-An Empirical Study that Measure the Effect of Ethics Practices Application on Maintaining Relationships with Customers

Muhammad Alshurideh, B. H. Al Kurdi, AnuVij, Zaid Obiedat, Abdallah Naser
International Business Reserach
Year 2016, Volume: 9, Issue 9,
Pages: 78-90
Canadian Center of Science and Education


Abstract:

The purpose of this study is to measure the effect of ethics embedded practices on maintaining long-term relationships with customers. Based on an extensive literature review, four elements of marketing ethics, namely, honesty, autonomy, privacy and transparency were identified and examined by utilizing a sample of 360 participants. Adopting a quantitative approach, the study conducted on telecommunication sector subscribers revealed that the elements of marketing ethics affected an organization’s ability of maintaining long-term relationships with customers and had a strong influence on feedback, transparency and privacy. The results also showed the crucial role of generating feedback from customers for creating and maintaining long-term relationships. The results will enable marketers to not only analyze the importance of adopting ethical practices in their strategies but also the relative relevance of these practices as perceived by customers.

Keywords: marketing ethics, feedback, relationship marketing, honesty, autonomy, privacy and transparency

Adoption of social media marketing- An overview of UAE service firms

AnuVij
International Journal of Business Administration and Management Research
Year 2017, Volume: 3, Issue 2
Pages: 23-28
Research Plus Journals


Abstract:

Advancement in information technology has impacted almost all the businesses and management functions and operations. In the contemporary times, businesses are integrating internet
based services in their business model and offerings made to customers. Service firms have been pampering customers with facilities readily available through social media websites. The trend points to the fact that firms are aware of the preferences that necessitate providing relevant information to their target market  through social media websites with stylish looks and a lot of imageries. This not only gives the customers a pleasing experience  but also entice them to purchase. This study explores various  marketing efforts made through social media by the services sector. Selected service organizations from hospitality and airlines sector in United Arab Emirates (UAE) are taken into consideration to conduct the study. The study also brings forth opinions of respondents on issues related to social media in the service sector. The research findings provide useful insights for practitioners, brand managers to understand how social media is affecting consumer behavior, enabling them to customize their social media strategies. The study is also helpful for the academicians and  students to further enhance their knowledge on this growing issue of topical interest.

Index Terms - Service Organizations, Social Media Marketing, Hospitality Sector, UAE

Empirical Testing of Green Information Technology Model in UAE

BeenuMago
International Journal of Information Technology and Management Information Systems
Year 2016, Volume: 7, Issue 2
Pages: 18-26
International Association of Engineering and Management Education (IAEME)


Abstract:

Green Information Technology (GIT) is gaining utmost importance as organizations come under pressure to address environmental and economic sustainability. Although, It is a matter of great concern for business, government, researchers and academicians yet measures to determine the capability of organizations to Green their IT remains is still elusive. The ultimate intention of using or adopting GIT is to provide organizations a setup so that they can perform all their processes with zero or negligible effect on the nature's domain. The researcher contend in this research is that there is an sincere requirement to consider the components that propel them to receive green IT as one viable reaction to the risk of a dangerous atmospheric deviation or global warming and other environmental change. A model called as Green IT Adoption Model (GITAM) was proposed by Molla. Researcher has tested the above model in context of UAE to identify the components that motivates the organization to adopt Green IT. The results of this study will help the organization to make sustainable strategies to implement GIT for their economic and environmental sustainability. In this regard, this study fills the gap between the principles of green information technology and sustainability of organizations

Key words: Green Information Technology, Green Computing, Sustainable development, Green IT Adoption Model, Green IT Adoption

A Study On Investigating The Factors Associated With Cheating: Violation Of Academic Integrity In UAE.

BeenuMago
Year 2016
International Conference on Academic Integrity

Linux Platform As A Secure Desktop Solution

Mohammed A. Afifi,  Khawar Nehal
International Journal of Computer Applications (IJCA)
Year 2017, Volume: 164, Issue 3
Pages: 9-11
Foundation of Computer Science


Abstract:

A lot of discussion goes into Enterprise Security, Network Security, and Computer Security. Initially, the most commonly used software are a combination of Operating systems, Desktop, and several standard applications like email clients, web browsers, word processing for document creating and editing. Now, the fact is that the listed common software combinations are the target of the most social engineered attacks, so selecting a secure combination for desktops shall go way far from these attacks into raising the security levels in many organizations. In this paper, we shall look at some of the configurations available in Linux platform that allows it to avoid and mitigate many of these common attacks which are considered to be the main cause of many security breaches.

The Evolution Of The E-Learning Process And Its Future

Mohammed A. Afifi,  Khawar Nehal
Al Dar Research Journal for Sustainability
Year 2017, Volume: 1, Issue 2
Pages: 1-13
Al Dar University College, Dubai, UAE


Abstract

Living alongside the dramatic changes and the rapid evolution of the life style that we are witnessing every day, with the significant growth of responsibilities on everyone, and with multitasking that has already replaced the simple work style; born are the necessities and the needs even more. Half a century or more ago, the conventional classroom learning was not enough to accommodate the needs of every day learners. With the availability and easy use of electronic media and Information Communication Technology (ICT), this became accessible to almost everyone with just a few fingertips away, with numerous amount of information flooding in where learners can greatly benefit from. This paper will look into the history and development of the different learning methodologies and see where are we heading, from the conventional classroom learning to E-learning; then from E-learning to M-learning and then, where to?

Key Terms Electronic / Multimedia / Technology-Enhanced

Analysis of MANET Security Issues: Vulnerabilities, Attacks, and Measures

Mohammed A. Afifi
Al Dar Research Journal for Sustainability
Year 2017, Volume: 2, Issue 1
Pages: 71-78
Al Dar University College, Dubai, UAE


Abstract

Wireless networks became very popular and spread everywhere around us, at home, office, mall, restaurant, and coffee shop etc. It illustrates the necessity and needs of one being connected and being online around the clock.  Mobile Ad hoc NETwork (MANET) is a wireless network that consists of wireless mobile nodes with no infrastructure as the participants’ nodes can simply join and leave the network on their own. There is no fixed set infrastructure and centralized administration in this type of networks.  The lack of infrastructure and the nature of the Mobile Ad hoc NETwork makes it very weak and vulnerable to various types of random attacks rather than planned and engineered attacks.  Since the participating nodes are not static nodes, and most probably they are not related to each other, and the only common interest among them is sharing the same network. Engineered attacks does not target random in the move victims where the attack will never be neither perfect nor effective for granted.  This paper addresses the importance of MANET security issues insight of security measures, needs, and attacks.

Keywords: MANET Security, Mobile Ad hoc Network, Network Security, Wireless Network Security.

Single-Layer and Double-Layer Coating Using Meta-material for Increased Transmission for Solar Cell and Independent from The Incident Angle

Mohammad A Habli
Al Dar Research Journal for Sustainability
Year 2016, Volume: 1, Issue 1
Pages: 69-77
ALDAR University College


Abstract:

Solar cells efficiency is one of the issues that solar system engineers usually try to enhance to maximize the power harvested from the solar system. One of the ways that tackles this issue is the use of anti-reflection coating on the solar cells to minimize the reflection and maximize the transmission of the sun light to the solar system. Light reflection and transmission dependence of many factors and one of them is the angle of incident of the light on the solar system. The angle of incident varies during the day; generally it varies between 0o and 90o. Therefore, the problem in hand is how to maximize transmission for the whole day, from sunrise to sunset. In this paper, the use of meta-materials as antireflection coating is investigated. Meta-materials are artificial materials engineered to provide properties which are not available in nature. Meta-materials have negative index of refraction. Single-layer and double-layer systems are designed by using meta-material as anti-reflection thin film coating for solar cell. The single-layer system gave up to 0.3% reflection and 99.7% transmission. The double layer system gave up to 0.1% reflection and 99.9% transmission. Both systems that are studied operate in the visible light range. The low reflection is observed over a full range of angle of incidents between 0o and 90o. The superiority of this system over the existing ones is that using the existing antireflection system leads to the low reflectance is achieved at certain angle of incident only. However, the use of meta-material gave extraordinary result that low reflectance is independent of the angle of incident.

Key terms: Solar Cells, High Transmission, Single-Layer and Double-Layer Coating, meta-material

Leaders are Born or Made

Om Prakash Bohra
Year 2016
Al Leem Business Congress-8th Annual Leadership Congress Week Management

Multi-Media: The Importance and Reasons of Use in Higher Education

Khalid Ibrahim Abdelaziz Ishaq
El-Hikma for Media & Communication Studies
Year 2017

Gender Differences in Entrepreneurial Process: A Study in the State of UPIndia

Meraj Naem, Fareeda Khan
Research Journal of Commerce & Behavioral Science-RJCBS
Year 2017/7, Volume: 6, Issue 9
Pages: 1-16
The International Journal Research Publication's


Abstract:

The entrepreneurial model is no doubt a successful model towards economic and social development however, the huge gap between the gender participation i.e. Male and Female, remains a challenge to the emerging economies.
The primary data for the article is based on the sample size of 100 Business firms in a state of India and supplemented by secondary data sources. It concludes with the findings about the challenges and opportunities for the women entrepreneurs and the reasons of wide gender gap in participation.

KEYWORDS:  Gender discrimination, Women entrepreneur, Globalization, Social barriers and Economic development.

Sustainable Tourism: Mirror, Mirror Everywhere but Not An Image To Believe

Meraj, Rizwan, Dennis, Tripathi
Al Dar Research Journal for Sustainability
Year 2017/11, Volume: 2, Issue 1
Pages: 28-33
Al Dar University College, Dubai, UAE


Abstract

Sustainability and tourism seems to be antonyms wedded by the ‘business priests’ to gain selfish motives. Sustainability and sustainable development has  stayed with tourism for more than three decades and assumption is that ‘small is better’ (McCool 2013).  Initially sustainable tourism was aligned with natural environments but then it was realized that economic strategies are also governed by sustainability.  The worry about the earth could be related to McHarg’s masterpiece Design With Nature (1967) where he expressed his concerns over the black bruises on the green apple of the earth. This concern should have evoked the genuine concerns about the sustainability issues but it seemed to be a howl of the publicity seeking supporters. The definitions of sustainability created a new issue of being vague. These definitions just directed the public’s attention to the increasing shortage of natural resources. The current research discussion keeping the above mentioned tone discusses the futility of sustainable development in general and sustainable tourism development in particular.

Social Entrepreneurship: An Effective Mode of Promoting Public Private Partnership in Middle East.

Meraj Naem
Asia Pacific Journal of Management and Entrepreneurship Research
Year 2014, Volume: 3, Issue 2
Pages: 10-28
Lebanon International Foundation


Abstract:

The Study is composed of three major sections. Firstly it explores the new  dimensions of Social Entrepreneurship propounded in the form of the theory by the writers  and taken up practically in various instances by the Organizations as well as the Individuals.
The second part of the study is the discussion over the role of government in institutionalizing the Social Entrepreneurship process through Public Private Partnership model and bringing it into some legal and regulatory domain to streamline the process. The study concludes with the finding and suggestions regarding the current status and scope of Social Entrepreneurship in UAE. In the suggestions, a model has been proposed which is an effort to streamline and utilize the resources for fostering Social Entrepreneurship through Public Private Partnership in the region. The work is based on empirical observations.

Continuous Health Monitoring using Smartphones - A Case-Study for Monitoring Diabetic Patients in UAE'

Sujni Paul
12th International Conference on Innovations in Information Technology (IIT) co sponsored by IEEE
Year 2016

An Approach to connect Civilians in War Prone Areas

Sujni Paul
12th International Conference on Innovations in Information Technology (IIT) co sponsored by IEEE
Year 2016

Programmers life made easy through smart souce code generator.

C Beuulah C Latha, S Paul
International Journal of Engineering and Scientific Research,
Year 2017, Volume: 5, Issue 4
Pages: 83-94


Abstract:

Abstract Smart Source Code Generator is an application that allows the user to generate code for C language. In this paper we implement a tool that generates source code for C language automatically. It is specially introduced to make work simple for the developers or learners. It can only be used by the developer or learner to generate a code. The userof this application need not remember the syntax for developing the program, rather the user can concentrate only on the logic for solving the problem.

Enhancing programming logic and algorithmic understandability for students visually using Raptor

Sujni Paul, Beulah ChristalinLatha
AL DAR Research Journal for Sustainability
Year 2017, Volume: 2, Issue 1
Pages: 34-43
Al Dar University College, Dubai, UAE


Abstract:

This research paper helps in predicting diabetes using a data mining technique classification by building a model. In medical diagnosis knowledge discovery is a very crucial part. Diabetes mellitus is a very extensively growing chronic disease and this is being a great challenge worldwide. Today it is common to different age groups ranging from children to adults. With diabetes patients, doubling every year especially in the UAE and India there is a need to curb this epidemic and help those who are affected by this disease so that they can live a peaceful life. Continuous monitoring of health indicators ensures prompt medical attention and reduction in fatalities. The primary challenge to continuously monitor diabetes is that glucose level measurement requires invasive methods. Data mining is growing in relevance to solving such real world disease problems through its tools. This paper proposes to use the UCI repository Pima Diabetes dataset and generates a classification model in order to predict diabetes using recursive partitioning algorithm. The results indicate that the efficiency of the algorithm can be improved by selection of appropriate features and the appropriate training set for the model.

Job Analysis: Case Study of a Multinational Firm

Sunitha Kshatriya
International Journal of Management, IT and Engineering     
Year 2016, Volume: 6, Issue 7
Pages: 204-230
International Journals of Multidisciplinary Research Academy


Abstract:

This primary Job Analysis was developed for a Private multinational company in Canada with global operations in UK, USA, EUROPE, AUSTRALIA and the MIDDLE EAST. It is aimed at developing an effective Recruitment and Selection system based on an accurate, detailed, thorough and thoughtful job analysis for a ‘requisite’ position that of a customer care representative. Author has followed a Functional Job Analysis methodology based on a Canadian Standards approved Job Fact sheet, Job Analysis Questionnaire, and a Task Statements’ sheet using which job duties, job statements and job specifications were identified. Key Knowledge, Skills, Abilities and Other Attributes from the task inventory and task statements were derived. The Job Analysis not only assures Managers that valid selection instruments can be developed based on Job Analysis, but also showed them how systematic selection decisions can be made based on Job Analysis approaches adopted in this research.

Linkage of Job Analysis and Recruitment: A Case Study

Sunitha Kshatriya
International Conference on Management and Information Systems (ICMIS), Bangkok. Thaiand.

Linkage of Job Analysis to Performance Management: A Case Study

Sunitha Kshatriya
International Journal of Management, IT and Engineering     
Year 2016, Volume: 6, Issue 9
Pages: 202-222
International Journals of Multidisciplinary Research Academy


Abstract:

This paper is aimed at developing a valid performance management tool based on an accurate, detailed, thorough and thoughtful functional job analysis methodology set on North American human resources standards’ approved job fact sheet, job analysis questionnaire, task statements’ sheet, job duties, job statements and job specifications that were identified. Based on which, key knowledge, skills, abilities and other attributes (KSAO’s) from the task inventory and task statements were subsequently derived. A performance management tool based on an absolute rating systemusing graphic rating scales was designed along with definition of job performance dimensions for a ‘requisite’ customer care representative position based on the KSAO’s derived. The job analysis carried out not only assures managers that a valid performance management instrument can be developed based on a job analysis, but also demonstrates to HR Managers how systematic human resource decisions can be based on approaches adopted in this research.

Job Analysis and its Impact on key Recruitment and Selection Processes

Sunitha Kshatriya
2nd International Conference on Organization and Management  (ICOM), Abu Dhabi, UAE

Job Analysis and its Impact on key Recruitment and Selection Processes: A Case Study

Sunitha Kshatriya
Al Dar Research Journal of Sustainability 
Year 2016, Volume: 1, Issue 1
Pages: 46-68
Al Dar University College, Dubai, UAE


Abstract:

Following a Functional Job Analysis methodology in which job duties and job specifications were initially identified, key Knowledge, Skills, Abilities and Other Attributes (KSAO’s) were extracted from critical statements using task statements and task inventory for a Canadian National Occupational job classification requisite position. The KSAO’s were further differentiated on the basis of Tasks, Context and Counter-productive behavioral components. A Performance Appraisal tool was developed based on an Absolute Rating System using Graphical Rating Scales aligned to the Knowledge, Skills, Abilities and Other Attributes derived from job analysis. Job Performance Dimensions were explained for each of the task, contextual and counter-productive behaviors in terms of what each dimension meant in the context of the job; with a definition given for each job dimension including verbal anchors attached to a numerical scale with appropriate instructions for making a response. The recruitment action plan developed was then based on the Organizational and KSAO’s derived from the Job Analysis using a structured questionnaire. Findings show that an effective direct linkage can be established between Knowledge, Skills, Abilities and Other Attributes derived as a result of job analysis and a performance management system and with a Recruitment Action Plan, causing a critical alignment leading to effective selection and recruitment decisions, promotion and performance decision as well as many other important Human Resource related decision based on objective job related criteria. The processes adopted in this research illustrate to Managers how an effective Recruitment system along with valid selection instruments can be developed based on an objective and a legally defensible job analysis demonstrating how systematic selection decisions can be made, including a better aligned performance management tool and a recruitment action plan based on approaches adopted in this research.

A Case Study of Job Analysis and its Positive Impact on Behavioral Structured Interview

Sunitha Kshatriya
International Journal of Research in Social Sciences
Year 2017, Volume: 7, Issue 3
Pages: 643-667
International Journals of Multidisciplinary Research Academy 


Abstract:

Following a Functional Job Analysis methodology in which job duties and job specifications were initially identified, key Knowledge, Skills, Abilities and Other Attributes (KSAO’s) were extracted from critical statements using task statements and task inventory for a Canadian National Occupational job classification requisite position. The KSAO’s were further differentiated on the basis of Tasks, Context and Counter-productive behavioral components. A Performance Appraisal tool was developed based on an Absolute Rating System using Graphical Rating Scales aligned to the Knowledge, Skills, Abilities and Other Attributes derived from job analysis. For testing and screening of candidates, a Behavioral Description Interview tool was developed based on the behavioral structured interview tool developed on the basis of the job analysis. This was a Structured Interviewthat consisted of a standardized set of job-related questions based on KSAO’s identified, complete with Probes and a scoring guide. This case study research studies the alignment between Job Analysis conducted and the KSAO’s derived used on a PM tool that are aligned with the Behavioral Interview Questionnaire developed for a Customer Care position for a multinational company

A Case Study of Job Analysis and its Positive Impact on Behavioural Structured Interview

Sunitha Kshatriya
5th Global Conference on Business and Social Sciences (GCBSS), Kualalumpur, Malaysia

Building a Case of Diverse Knowledge Transfer in Higher Education between Finland and Dubai to Facilitate Sustainable 21st Century Learning and Better Engagement of Emirati Students

Sunitha Kshatriya
Al Dar Research Journal of Sustainability   
Year 2017, Volume: 1, Issue 2
Pages: 1-13
Al Dar University College, Dubai, UAE.


Abstract:

The article makes a comparison of learning models being implemented at Al Dar University College, Dubai and Laurea University, Finland while trying to synthesize post-secondary education’s (PSE’s) functions and their role in enabling student success; against a backdrop of PSE’s social and economic impact on 21st century learning skills around the world. This article explores different elements required for student success such as teaching, learning models and education technologies within the UAE, Finland and around the globe focused at 21st century. This article also attempts to derive a common language around concepts such as PSE’s and 21st Century Learning Skills that are understood using different terminologies in these countries. The article also sets some action plans for further development as future goals of learning development, research, and policy/advocacy recommending to draw a future map on how the education in the Emirates should be built by benchmarking best practices from around the world.

A Case Study Of Empowerment: Linking Adult Training To Employment Through Innovative Learning Approaches

Sunitha Kshatriya
MENA Higher Education Leadership Conference (MENA-HELF), Dubai, UAE.


Abstract:

The aim of this 10-workshop based case study project paper is toprepare a customized personal development plan, an action plan including; short-term, mid-term and long-term goals for 3 women learners from diverse backgrounds, on a ‘Status of Women Canada’ funded project titled: ‘Empowerment’. The case study is focussed on aligning learners to their professions either through self-employment or through employment within the government, non-profit or the private sectors.The learners’ comprehension-level learning objectives and their application-level learning objectives were facilitated. Data was analyzed using SWOT, Needs and Functional Job Analysis. Principles of Adult Training, Needs Analysis, Presentation / Facilitation and Evaluation formed the competencies’ framework for carrying out the assessment. Based on initial needs analysis conducted, learners were assessed. The case study project proceeded as per standards laid out by the Ontario Institute of Studies in Education of University of Toronto’s training guidelines. This case study project led to all 3 women gaining meaningful employment in their field of education and training within 6 months of the project’s initiation and stands as a testament to the highly successful innovative techniques that were employed, which enabled all 3 learners employability, contributing to the project’s 100% success. This paper is a reflection on the problems identified, the context within which this occurred, the purpose of the project, the project information related to it, the methodology used and findings

Self Actualization A Perception Study

Sunitha Kshatriya
Omni Scriptum Publishers
ISBN 978 3 330 966 41 3, 1st, ed,
Sub: HRM Pages: 288


Abstract:

What made Mahatma Gandhi, Mother Teresa, Rabindranath Tagore, Helen Keller, Leo Tolstoy, Abraham Lincoln, Albert Einstein heroes of their field and our world? What enabled these individuals forge new paths following none others’ but their own, led by an inner fire raging firmly towards their intrinsic goals? It can be said these individuals achieved their ‘full potential’ or, what Abraham Maslow a social scientist in 1943 termed in his research paper ‘Theory of Human Motivation’ as ‘self-actualization.’ How does one arrive on the path of self-actualization? Can it be taught to an individual? To become more and more of one’s own inner self and to realize one’s potential? These are some of the questions and many more which the book attempts to answer.A research study was carried out to understand the extent to which ‘self-actualization’ was given importance particularly in multinational corporations (MNC’s) as stated in Maslow’s Theory. Since MNC’s are characterized by their global experiences having realized the immense value empowered individuals have on organizational progress, adopting largely human centric policies and programs.

Empowerment

Sunitha Kshatriya
Omni Scriptum Publishers
ISBN 978 3330 976 511, 1st, ed,
Sub: Training & Development Pages: 269


Abstract:

How do we address the issue of unemployment of adult learners irrespective of age, to align their skills in their field of expertise within a new cultural environment? How do we evaluate current skill sets of adult learners, conduct needs analysis and ascertain their training gaps? These are some of the questions this book attempts to answer through its step-by-step process of adult learning. Based on research the book incorporates competencies of adult training, needs analysis, instructional design, presentation and facilitation. This book demonstrates that by preparing a customized personal development plan, an action-plan document, short-term, mid-term and long-term goals for each learner, helps focus and realign their current strengths and skill sets strategically to the job within their key areas of expertise within no time. Thus clearing a path to achieving both comprehension and application level learning objectives for all stakeholders involved - the learners themselves, the author and the reader included - triggering each individual on the path towards his / her Empowerment.

Selection System with Job Analysis

Sunitha Kshatriya
Saarbrücken, Germany: Scholars Press
ISBN 978-620-2-30002-5, 1st, ed,
Sub: Recruitment & Selection Pages: 164


Abstract:

A Selection System with Job Analysis is based on major areas of Recruitment related to Job Analysis such as Performance Appraisal, Recruitment, Screening, Testing, Interviewing and Decision Making. Each segment in the book is interconnected with Job Analysis and is aimed at developing a Recruitment & Selection system for a 'requisite' position within a private Canadian organisation. The book is begins with on an accurate, detailed, thorough and thoughtful job analysis backed up by years of research data in these areas, and the rest of the project flows from this. A Selection System with Job Analysis is based on 8 main areas of Recruitment and Selection that are related to: Job Position, Job Analysis, Performance Appraisal, Recruitment, Screening, Testing, Interviewing and Decision Making. This is aimed at developing a Recruitment & Selection system for a 'requisite' position within a private Multinational organisation based in Canada. Each segment in the book is interconnected with practice that is based on an accurate, detailed, thorough and thoughtful Function Job Analysis technique, backed up by years of research in each of these areas, and rest of the project flows from this.

Experience with Acoustic Sensors in Partial Discharge Detection

Yomna Shaker
IEEE conference on High Voltage Engineering and applications, Chengdu, China, 2016.

Factors that Influence Partial Discharge Acoustic Modelling

Yomna Shaker
Conference on Electrical insulation and dielectric Phenomena, Toronto, Canda,2016

Emirati Preferences among Material and Non-Material Incentives in the Work Plac

Hassan Younies, BelalBarhem, Swapna Gantasala, Tareq Al-Tawil
Emerging Economy Studies
Year 2017, Volume: 3, Issue 1
Pages: 86-97
Sage Journals


Abstract:

The working population of the United Arab Emirates (UAE) in the private sector is characterized by a majority of expatriates and comparatively few UAE nationals. The UAE government encourages firms to hire Emirati nationals in the private sector through various incentives and policies. This article investigates UAE nationals’ preferences for material and non-material incentives in the workplace. The study is based on questionnaires distributed to Emirati nationals in the Emirate of Abu Dhabi. The findings of the research are expected to provide policymakers with insights into Emiratis’ preferred work incentives. In addition, it will, it is hoped, aid in developing appropriate nationalization policies for the UAE in general and UAE private organizations in particular.

How To Sustain Private Business Schools In UAE

Belal Barhem
Al Dar Research Journal for Sustainability
Year 2017, Volume: 2, Issue 1
Pages: 10-20
Al Dar University College, Dubai, UAE


Abstract:

The history of private higher education in UAE is relatively short where the first private university was established in (Ajman University was founded in 1988 as Ajman University College of Science and Technology). The private business schools in UAE facing strong challenge to sustain operations and growth lately. The number of new enrollment relatively decreased as shown in SHED reports. The Deans of Business schools realized the problems every new semester and working hard to understand the case and detect the reasons to manage it. This study aims to define the factors which cause the problem and suggest solutions to help the deans manage the problem effectively and efficiently.

Key Terms: Private Higher Education, University, Business Schools, UAE.

Linux platform as a secure desktop solution

Mohammed A. Afifi,  Khawar Nehal
International Journal of Computer Applications (IJCA)
Year 2017, Volume: 164, Issue 3
Pages: 9-11
Foundation of Computer Science


Abstract:

A lot of discussion goes into Enterprise Security, Network Security, and Computer Security. Initially, the most commonly used software are a combination of Operating systems, Desktop, and several standard applications like email clients, web browsers, word processing for document creating and editing. Now, the fact is that the listed common software combinations are the target of the most social engineered attacks, so selecting a secure combination for desktops shall go way far from these attacks into raising the security levels in many organizations. In this paper, we shall look at some of the configurations available in Linux platform that allows it to avoid and mitigate many of these common attacks which are considered to be the main cause of many security breaches.

The Evolution Of The E-Learning Process And Its Future

Mohammed A. Afifi,  Khawar Nehal
Al Dar Research Journal for Sustainability
Year 2017, Volume: 1, Issue 2
Pages: 1-13
Al Dar University College, Dubai, UAE


Abstract

Living alongside the dramatic changes and the rapid evolution of the life style that we are witnessing every day, with the significant growth of responsibilities on everyone, and with multitasking that has already replaced the simple work style; born are the necessities and the needs even more. Half a century or more ago, the conventional classroom learning was not enough to accommodate the needs of every day learners. With the availability and easy use of electronic media and Information Communication Technology (ICT), this became accessible to almost everyone with just a few fingertips away, with numerous amount of information flooding in where learners can greatly benefit from. This paper will look into the history and development of the different learning methodologies and see where are we heading, from the conventional classroom learning to E-learning; then from E-learning to M-learning and then, where to?

Key Terms Electronic / Multimedia / Technology-Enhanced

Analysis of MANET Security Issues: Vulnerabilities, Attacks, and Measures

Mohammed A. Afifi
Al Dar Research Journal for Sustainability
Year 2017, Volume: 2, Issue 1
Pages: 71-78
Al Dar University College, Dubai, UAE


Abstract

Wireless networks became very popular and spread everywhere around us, at home, office, mall, restaurant, and coffee shop etc. It illustrates the necessity and needs of one being connected and being online around the clock.  Mobile Ad hoc NETwork (MANET) is a wireless network that consists of wireless mobile nodes with no infrastructure as the participants’ nodes can simply join and leave the network on their own. There is no fixed set infrastructure and centralized administration in this type of networks.  The lack of infrastructure and the nature of the Mobile Ad hoc NETwork makes it very weak and vulnerable to various types of random attacks rather than planned and engineered attacks.  Since the participating nodes are not static nodes, and most probably they are not related to each other, and the only common interest among them is sharing the same network. Engineered attacks does not target random in the move victims where the attack will never be neither perfect nor effective for granted.  This paper addresses the importance of MANET security issues insight of security measures, needs, and attacks.

Keywords: MANET Security, Mobile Ad hoc Network, Network Security, Wireless Network Security.