A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saleem, Sehrish
- Feminization of Poverty: A Case Study of Hazara Division of Pakistan
Authors
Source
International Journal of Innovative Research and Development, Vol 5, No 8 (2016), Pagination: 317-321Abstract
The present study aims at to analyze the feminization poverty in Hazara Division of Khyber PakhtunKhwa province of Pakistan. Sample of 200 respondents both from rural as well as urban has been selected for 50 female headed house holds and 150 male headed house holds. The study employs logistic regression estimation technique to find the correlates of poverty. The findings of study suggest that probability of a house hold being poor is positively and significantly correlated with house hold size, dependency ratio, and single parenthood, living of house hold head in rural area, female headed house hold ship. Variables that are negatively and significantly correlated with probability of being poor are: Age of house hold head, Secondary and post secondary education, employment and residing in urban area. The study recommends policy interventions necessary to reduce poverty particularly focusing female-headed households including direct transfer of cash to such families and access to free education to their children.
Keywords
Feminization of poverty, Logistic regression, Hazara Division- Diverging Mysterious in Green Supply Chain Management
Authors
1 College of Internet of Things Engineering, Hohai University Changzhou Jiangsu, CN
2 Muhammad Nawaz Sharif University of Engineering & Technology Multan, PK
3 Petroweld Oilfield Services Kurdistan, IQ
Source
Oriental Journal of Computer Science and Technology, Vol 13, No 1 (2020), Pagination: 22-28Abstract
The sustainability and environmental considera-tions have slowly become divergences, but having greatest influence in the supply chain management that must be contemplates to examine the environmental and organizational factors. The research considers environmental and sustainable strategies within companies, the efficient supply chain management strategies for manufacturers and consumers, and to the environment friendly product design and services, taking a case-by-case perspective and concentrating on enterprise businesses scale. Our finding reveals that green supply chain management firms are delivering exuberant environmental efficiency at an added cost. Among the identified obstacles we identified different obstacles and conceptual relations and barriers are graded based on dependency and driving sand. In future, green policies have greater customer services avenues thereby, appeal for suppliers, manufacturers and officials.Keywords
Bodacious Management, Diverging Trends, Green Management, Supply Chain.References
- K. Bhattacharjee, “Green Supply Chain Management- Challenges and Opportunities,” Manag. Res., vol. 05, no. 01, p. 6.
- K. W. Green, P. J. Zelbst, J. Meacham, and V. S. Bhadauria, “Green supply chain management practices: impact on performance,” Supply Chain Manag. Int. J., vol. 17, no. 3, pp. 290–305, Apr. 2012, doi: 10.1108/13598541211227126.
- S. Ashraf, M. Gao, Z. Chen, S. Kamran, and Z. Raza, “Efficient Node Monitoring Mechanism in WSN using Contikimac Protocol,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, 2017, doi: 10.14569/IJACSA.2017.081152.
- M. Hariga, R. As’ad, and A. Shamayleh, “Integrated economic and environmental models for a multi stage cold supply chain under carbon tax regulation,” J. Clean. Prod., vol. 166, pp. 1357–1371, Nov. 2017, doi: 10.1016/j.jclepro.2017.08.105.
- S. Ashraf, T. Ahmed, A. Raza, and H. Naeem, “Design of Shrewd Underwater Routing Synergy Using Porous Energy Shells,” Smart Cities, vol.3, no. 1, pp. 74–92, Feb. 2020, doi: 10.3390/smartcities3010005.
- M. Igarashi, L. de Boer, and A. M. Fet, “What is required for greener supplier selection? A literature review and conceptual model development,” J. Purch. Supply Manag., vol. 19, no. 4, pp. 247–263, Dec. 2013, doi: 10.1016/j.pursup.2013.06.001.
- M.-L. Tseng, M. S. Islam, N. Karia, F. A. Fauzi, and S. Afrin, “A literature review on green supply chain management: Trends and future challenges,” Resour. Conserv. Recycl., vol. 141, pp. 145–162, Feb. 2019, doi: 10.1016/j.resconrec.2018.10.009.
- S. Luthra, V. Kumar, S. Kumar, and A. Haleem, “Barriers to implement green supply chain management in automobile industry using interpretive structural modeling technique: An Indian perspective,” J. Ind. Eng. Manag., vol.4, no. 2, pp. 231–257, Jul. 2011, doi: 10.3926/jiem.2011.v4n2.p231-257.
- R. M. Grant, “Prospering in DynamicallyCompetitive Environments: Organizational Capability as Knowledge Integration,” Organ.Sci., vol. 7, no. 4, pp. 375–387, Aug. 1996, doi: 10.1287/orsc.7.4.375.
- S. Ashraf, M. Gao, Z. Mingchen, T. Ahmed, A. Raza, and H. Naeem, “USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time,” Wirel. Commun. Mob. Comput., vol. 2020, pp. 1–12, Mar. 2020, doi: 10.1155/2020/9625974.
- S. Ashraf, A. Raza, Z. Aslam, H. Naeem, and T. Ahmed, “Underwater Resurrection Routing Synergy using Astucious Energy Pods,” J. Robot. Control JRC, vol. 1, no. 5, 2020, doi: 10.18196/jrc.1535.
- N. P. Archer, “Supply chains and the enterprise,” J. Enterp. Inf. Manag., vol. 19, no. 3, pp. 241–245, May 2006, doi: 10.1108/17410390610658432.
- G. Kannan, A. N. Haq, P. Sasikumar, and S. Arunachalam, “Analysis and selection of green suppliers using interpretative structural modelling and analytic hierarchy process,” Int. J. Manag. Decis. Mak., vol. 9, no. 2, p. 163, 2008, doi: 10.1504/IJMDM.2008.017198.
- S. Ashraf et al., “Underwater Routing Protocols Analysis of Intrepid Link Selection Mechanism, Challenges and Strategies,” Int. J. Sci. Res. Comput. Sci. Eng., vol. 8, no. 2, pp. 1–9, Apr. 2020, doi: 10.26438/ijsrcse/v8i2.19.
- F. Lettice, C. Wyatt, and S. Evans, “Buyer– supplier partnerships during product design and development in the global automotive sector: Who invests, in what and when?,” Int. J. Prod. Econ., vol. 127, no. 2, pp. 309–319, Oct. 2010, doi: 10.1016/j.ijpe.2009.08.007.
- A. Jean-Vasile, Ed., Food Science, Production, and Engineering in Contemporary Economies: IGI Global, 2016.
- Y.-F. Wang, S.-P. Chen, Y.-C. Lee, and C.-T. (Simon) Tsai, “Developing green management standards for restaurants: An application of green supply chain management,” Int. J. Hosp. Manag., vol. 34, pp. 263–273, Sep. 2013, doi: 10.1016/j.ijhm.2013.04.001.
- X. Chen and G. Xiu, “Research on the Degree of Ecological Supply Chain Management Practice among Chinese Manufacturing Enterprises,” J. Qual. Reliab. Eng., vol. 2014, pp. 1–5, 2014, doi: 10.1155/2014/160957.
- S. Mahapatra, R. Pal, T. Hult, and S. Talluri, “Assessment of Proactive Environmental Initiatives: Evaluation of Efficiency Based on Interval-Scale Data,” IEEE Trans. Eng. Manag., vol. 62, no. 2, pp. 280–293, May 2015, doi: 10.1109/TEM.2015.2413938.
- M. A. Sellitto, J. Luchese, J. M. Bauer, G. G. Saueressig, and C. V. Viegas, “Ecodesign Practices in a Furniture Industrial Cluster of Southern Brazil: From Incipient Practices to Improvement,” J. Environ. Assess. Policy Manag., vol. 19, no. 01, p. 1750001, Mar. 2017, doi: 10.1142/S1464333217500016.
- CMBA- A Candid Multi-purpose Biometric Approach
Authors
1 Department of Computer Science, Muhammad Nawaz Sharif University of Engineering and Technology, PK
2 College of Internet of Things Engineering, Hohai University, Changzhou Campus, CN
Source
ICTACT Journal on Image and Video Processing, Vol 11, No 1 (2020), Pagination: 2211-2216Abstract
All humans are born with unique physically identified body characteristics to other persons which remains unchanged throughout life. These characteristics are taken into account by the emerging technology to get recognized from person to person. The technology used by the traditional human identification system sometimes becomes inefficient when data or images received are not up to the acceptable quality mark or when a person has a face covered with mask-like during epidemic virus fistula. In order to overcome the human recognition challenges, a Candid Multi-purpose Biometric Approach (CMBA) has been proposed which can make human identification easier and approachable. The CMBA human recognition approach uses two uniquely identified modalities such as foot and iris. This approach shrewdly identifies and makes the bodacious recognition among humans and suggests the sagacious result which is foremost better than the traditional biometric system. The CMBA is offering opportunity to take more than two biometric features, by combining them to overcome unimodal biometric system limitations and to achieve optimal results. Using sagacious edge detector and Hough transformation technique, the Iris and foot part are segmented into easy and quick extraction voting system which produce succulent output. In fact, this technique is new in biometric identification era.Keywords
Biometric System, Face Recognition, Modalities, Face Mask.References
- A. Melamed, “2018 Biometric Predictions: Advanced Biometric Technologies Take Off”, Available at: https://www.biometricupdate.com/201801/2018-biometric-predictions-advanced-biometric-technologies-take-off, Accessed at 2018.
- M2SYS, “False Rejection Rate,” Available at: https://www.m2sys.com/blog/important-biometric-terms-to-know/false-rejection-rate-what-does-it-mean-and-why-should-i-care/, Accessed at 2018.
- S. Ashraf, S. Saleem and T. Ahmed, “Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network”, International Journal of Wireless and Microwave Technologies, Vol. 10, No. 4, pp. 22-33, 2020.
- S. Ashraf, M. Gao, Z. Chen, S. Kamran and Z. Raza, “Efficient Node Monitoring Mechanism in WSN using Contikimac Protocol”, International Journal of Advanced Computer Science and Applications, Vol. 8, No. 11, pp. 1-13, 2017.
- MSU Today, “Unlocking New Possibilities for Biometrics”, Available at: http://msutoday.msu.edu/feature/2018/unlocking-new-possibilities-for-biometrics, Accessed at 2020.
- S. Ashraf, S. Saleem and T. Ahmed, “Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network”, International Journal of Wireless and Microwave Technologies, Vol. 10, No. 2, pp. 12-25, 2020.
- M.N. Giannakos, K. Sharma, I.O. Pappas, V. Kostakos and E. Velloso, “Multimodal Data as a Means to Understand the Learning Experience”, International Journal of Information Management, Vol. 48, No. 2, pp. 108-119, 2019.
- J. Pandya, “Hacking Our Identity: The Emerging Threats from Biometric Technology”, Available at: https://www.forbes.com/sites/cognitiveworld/2019/03/09/hacking-our-identity-the-emerging-threats-from-biometric-technology, Accessed on 2020.
- N. Sarfraz, “Adermatoglyphia: Barriers to Biometric Identification and the Need for a Standardized Alternative”, Cureus, Vol. 11, No. 2, pp. 1-9, 2020.
- F.G. Mohameed and Morooj K. Luaibi, “Facial Recognition Based on DWT-HOG-PCA Features with MLP Classifier”, Journal of Southwest Jiaotong University, Vol. 54, No. 6, pp. 1-14, 2019.
- D. Gafurov, “Emerging Biometric Modalities: Challenges and Opportunities”, Springer, 2020.
- R. Singh, “The essence of eigenvalues and eigenvectors in Machine Learning”, Available at: https://towardsdatascience.com/the-essence-of-eigenvalues-and-eigenvectors-in-machine-learning-f28c4727f56f, Accessed at 2019.
- J.F. Doriguello and A. Montanaro, “Quantum Sketching Protocols for Hamming Distance and Beyond”, Physical Review A, Vol. 99, pp. 1-13, 2019.
- A. Herbadji, Z. Akhtar, K. Siddique and M. Cheniti, “Combining Multiple Biometric Traits Using Asymmetric Aggregation Operators for Improved Person Recognition”, Symmetry, Vol. 12, No. 3, pp. 1-19, 2020.
- S. Ashraf, Z.A. Arfeen, M.A. Khan and T. Ahmed, “SLM-OJ: Surrogate Learning Mechanism during Outbreak Juncture”, International Journal for Modern Trends in Science and Technology, Vol. 6, No. 5, pp. 162-167, 2020.
- S. Ashraf, A. Raza, Z. Aslam, H. Naeem and T. Ahmed, “Underwater Resurrection Routing Synergy using Astucious Energy Pods”, Journal of Robotics and Control, Vol. 1, No. 5, pp. 1-12, 2020.
- B. Ammour, L. Boubchir, T. Bouden and M. Ramdani, “Face-Iris Multimodal Biometric Identification System”, Electronics, Vol. 9, No. 1, pp. 85-94, 2020.
- S. Ashraf, M. Gao, Z. Mingchen, T. Ahmed, A. Raza and H. Naeem, “USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time”, Wireless Communications and Mobile Computing, Vol. 2020, pp. 1-12, 2020.
- A. Mohammadi, N. Aghazadeh and S Rezapour, “Haar Wavelet Collocation Method for Solving Singular and Nonlinear Fractional Time-Dependent Emden-Fowler Equations with Initial and Boundary Conditions”, Mathematical Sciences, Vol. 13, pp. 255-265, 2019.
- S. Ashraf, A. Ahmad, A. Yahya and T. Ahmed, “Underwater Routing Protocols: Analysis of Link Selection Challenges”, AIMS Electronics and Electronics Engineering, Vol. 4, No. 2, pp. 200-215, 2020.
- I.S. Reed and X. Chen, “Reed-Solomon Codes”, Error Control Coding for Data Networks, Springer, pp. 233-284, 1999.
- S. Ashraf and T. Ahmed, “Underwater Routing Protocols Analysis of Intrepid Link Selection Mechanism, Challenges and Strategies”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol. 8, No. 2, pp. 1-9, 2020.
- Log Gabor Filter, “Log Gabor Filter”, Available: https://en.wikipedia.org/w/index.php?title=Log_Gabor_filter&oldid=959860559, Accessed at 2020.
- P. Kapoor, D. Lee, B. Kim and S. Lee, “Computation-Efficient Quantization Method for Deep Neural Networks”, Proceedings of International Conference on Learning Representations, pp. 1-8, 2018.
- S. Ashraf, T. Ahmed, A. Raza and H. Naeem, “Design of Shrewd Underwater Routing Synergy Using Porous Energy Shells”, Smart Cities, Vol. 3, No. 1, pp. 74-92, 2020.
- Bayometeric, “False Acceptance Rate and False Recognition Rate”, Available at: https://www.bayometric.com/false-acceptance-rate-far-false-recognition-rate-frr, Accessed at 2020.
- False Rejection, “What is false rejection rate (FRR)? Webopedia Definition.” Available at: https://www.webopedia.com/TERM/F/false_rejection.html, Accessed at 2020.
- S. Ashraf, T. Ahmed, S. Saleem and Z. Aslam, “Diverging Mysterious in Green Supply Chain Management”, Oriental Journal of Computer Science and Technology, Vol. 13, No. 1, pp. 22-28, 2020.