About Academy  |  About IRBAS  |    Contact Us                                                                                                                                  ISSN (Online) : 2308-7056

International Review of Basic
and Applied Sciences (IRBAS)

Home     Editorial Board     Current Issue     Archive     Indexing      Call for papers     Authors Guideline      Manuscript Submission      Contact

News & Events

Thursday, September 10, 2020
IRBAS Volume 8 Issue 4 will publish in October 2020.
Thursday, September 10, 2020
IRBAS Volume 8, Issue 3 has been published.
Thursday, September 10, 2020
IRBAS Published on Quarterly basis from Volume 8.
Tuesday, January 17, 2017
Recruitment of Reviewers. Reviewers name and affiliation will be listed on the IRBAS journals webpage.

IRBAS Citation Report

  All Since 2020
 Citation  117 16
 h-index 06 01
 i10-index 03 01

Hit Counter

Total 476016
Today's 97
Yesterday's 68

 Country Wise Counter

Academy Publication Ethics

Academy of IRMBR Volume  1, August, 2013
Move your mouse curser on the title to view the abstract of the paper
S.No. Title Authors Pages Download

A Comparative Study of Synchronous and Asynchronous Remote Usability Testing Methods

Traditional in-lab usability testing has long been the standard method for evaluating and improving the usability of software interfaces. In-lab testing, though effective, has its drawbacks such as unavailability of representative end-users, high testing costs, and the difficulty of reproducing a user‟s everyday environment. To overcome these issues, various alternative usability evaluation methods (UEMs) have been developed over the past two decades. One of the most commonly used is the remote usability testing method. Ever since remote usability testing was introduced fourteen years ago, its effectiveness has been judged and evaluated against that of traditional in-lab testing. However, there is a distinct lack of research exploring the effectiveness of the various modes of remote usability testing. This research aimed to conduct a comparative study of two types of remote usability testing methods namely: synchronous and asynchronous remote usability testing. These two methods were compared through an evaluation of a website, which involved three points of comparison: number and type of problems discovered, overall task performance, and test participants‟ satisfaction. The results of the study showed that the synchronous testing method performed better than the asynchronous testing method in terms of the number and types of usability problems discovered, although no statistical significant differences were found. The participants in the synchronous test were notably more successful than the participants in the asynchronous test in completing the test tasks. However, the asynchronous test participants were significantly quicker than synchronous participants in performing those tasks. Participants in the synchronous tests also scored slightly higher satisfaction rate with regards to the targeted website. However, asynchronous participants were considerably more satisfied with the remote method that they had participated in. The paper concludes with a set of recommendations for conducting such research.
Keywords: Usability testing, Remote usability testing, Synchronous and Asynchronous remote usability testing.

Analysis of Workforce Diversity, Commitment of Employee’s and its Effects on Organizational Performance: Corporate Sector in Islamabad Pakistan

Workforce diversity and employees commitment in the context of Globalization has attained significant attention of today’s Researchers. This paper endeavors to ascertain major factors of work-setting and its effects on organizational performance. Two independent variables i.e workforce diversity and committed workforce relations have been analyzed on employee’s organizational performance. Data was collected from 286 respondents from employee’s belonging to the corporate sector of Islamabad Pakistan. Middle level management tiers were segment of the study age ranging from 30 to 40 years. Questionnaire was administered using five point likert scale. Result revels that there is 71% variation between committed work force and organizational performance: henceforth, that committed work force is an important factor of organizational growth with a t-value of (17.295). The p-value values indicates that the variables are significant as P<.05. Similarly, committed work force effects have variation on organizational performance by 20 %. The results further represent that the variables are significant with the p-value of <.05). It is evident from the analysis that diverse workforce once managed well on the work environment and employee’s are committed then organizational performance is with t-value of 6.679. It is therefore imperative for the organizations to accord due priority to the major work-setting like diversity and employee commitment in the organizations facilitating employees to yield befitting organizational loyalty.
Keywords: Work-setting, conducive work environment, organizational loyalty, and employees commitment

Improve Quality of Service and Secure Communication in Mobile Adhoc Networks (Manets) Through Group Key Management

Mobile Adhoc networks (MANETs) is compendium of self-governing terminals, which basically interconnect and exchange information with each other and by establishing a multi-hop network for to maintain connectivity in a decentralized approach. In this research group key management approach is used, which further uses a symmetric group key for to communicate inside the cluster. Clusterhead is responsible for the generation of group key and is responsible for the communication of other nodes throughout a secure path which uses public key cryptography scheme. Encryption of messages is used for group keys to communicate inside the cluster and within the group for secure communication. In this research the results are shown through how to secure communication in MANETs through group key and clustering scheme minimizes the packet damages as compared to centralized approach. And also examine the system for proper authentication of public and private keys and evaluates the functioning of proposed methodology.
Key Words: Public Key Cryptography, MANETs, Group Key, Authentication, Hash tree
MUHAMMAD IMRAN KHAN KHALIL 107-115 Download(486)

Copyright © www.academyirmbr.com : 2012-21. All Rights Reserved.