This study quantifies and analyzes the Unexplored Export Potential (UEP) of Surgical Goods of Pakistan (SGP) to 42 selected countries that are leading export markets for these goods. The quantification of UEP of SGP is expected to help the concerned Pakistani exporters for setting right their export priorities towards selected export markets. The study differentiates the selected export markets on the basis of presence and absence of UEP of SGP. Thus, to serve the purpose and make the analysis more meaningful, out of total 42 selected export markets, top 9 markets have been classified as “TOP-9 Importers of SGP”. The remaining 33 markets have been classified with regard to their membership of different regional groups that are; ASEAN, EU, GCC, ECO, and SAARC. Current study is a disaggregate level research. It utilizes disaggregated level data of the surgical goods‟ industry of Pakistan. In fact, international trade literature is relatively limited for such disaggregate level researches, which is because of the reason that required data to accomplish such researches are found on discontinuous basis. The discontinuous availability of required data leads to missing values‟ problem, which refrains the accomplishment of such researches. Current study solves the missing values‟ problem by using Tobit model. Moreover, this study utilizes augmented Gravity Model of Trade for the used panel data (1990-2010) and ensures the statistical adequacy of the estimated parameters by applying unit root and co-integration tests. The results obtained through Augmented Dickey-Fuller test indicate that for each selected country at least two of the data series are unit root. Thus, for validation of regression results, Engel-Granger two-step co-integration test has been applied, which confirms the long run relationship between dependent and all the independent variables, in all 42 countries‟ cases. xii Moreover, UEP is usually quantified either by using the out-of-sample projection approach or the in-sample projection approach. However, researchers believe that both these approaches are inefficient in serving the purpose of quantification of UEP. Thus, current study employs Empirical Bayes (EB) method for the quantification of UEP of SGP. The EB methodology is especially useful for panel data that are with short time series dimension, as is the case in current study. The application of EB method for quantification of UEP of SGP is a pioneering attempt. Estimation results show that signs of all parameters are in line with the economic theory. Moreover, the results indicate that the export potential for surgical goods exists in Philippines, Singapore, Indonesia and Malaysia in ASEAN, only Thailand is over-traded in this group. The potential prevails in all selected countries of EU, only Czech Republic is over-traded; it exists in all selected countries of GCC. The potential is absent in case of Turkey, which is the sole selected member from ECO; it does not exist in all the selected countries of SAARC. Lastly, the export potential exists only in case of Italy in TOP-9 Importers of SGP, the remaining 8 members of this group are over-traded. In the light of empirical findings of this study, the exporters of SGP and concerned policy makers at government level could better set their priorities regarding export of SGP to selected export markets.
علی اکبر ناطق اپنے بہن بھائیوں میں سب سے بڑے ہیں ان کے چھ بھائی ہیں۔ دو بھائی آرکی ٹیکٹ، کچھ کھیتوں میں کام کرتے ہیں اور کچھ نے اپنا خاندانی پیشہ ’’معماری ‘‘ جاری رکھا ہوا ہے۔ تمام بھائی ان سے چھوٹے ہیں۔ کل نو بہن بھائی ہیں ایک بہن تمام بہن بھائیوں سے چھوٹی ہے۔
ان کے چھوٹے بھائی اصغر جن کی وفات ایک حادثے میں ہوئی۔وہ اپنی بہن کے بارے میں بتاتے ہیں کہ ان کا نام خدیجہ تھا ،وہ سکول ٹیچر تھیں ،ان کا قتل ان کے شوہر نے کیا تھا اور ناطق وجہ بھی بتاتے ہیں کہ ان کے شوہر نے ان کا قتل انشورنس کے پیسوں کے لیے کیا تھا۔
This research presents an overview of the principle of accountability of the executive in an Islamic state. The existence and survival of any state is not sustainable without process of accountability as per the law of the land and the provision of the constitution. The elite class was exempted from any sort of accountability and treated above the law in pre-Islamic period whereas man in the street was dealt with strict compliance of rules and regulations. This paper has provided strong evidence from the perspective of historical research that the executive in the Islamic state has not been exempted from the process of transparent of accountability. Moreover, this article also builds up strong argument in light of Quran and Sunnah as well as line of action adopted by orthodox caliphs. It also highlights various incidents of accountability and legal precedence that occurred during Khilafat e Rashda and post era as well.
From a security perspective, a jamming attack is easy to launch and relatively hard to detect. Jamming attacks are generally directed towards seizing the medium completely by transmitting fake packets violating the medium access protocol, either constantly or periodically. This work analyzes the effects of different types of jammers using Conservation of Flow (CoF), which has been useful for detecting other attacks in wired networks. Additionally, simulation results are presented in justification of proposed methodology. With the miniaturization of wireless devices, the popularity and usage has increased in recent past, especially due to portability. Since the design of such devices does not primarily emphasize heavy computation and secure communication, these are treated as add-ons. In setting up an ad hoc network rather than choosing all or more than the channels offered by 802.11 standard, only a single channel is generally utilized to minimize delay and synchronization issues. However, by using additional available multiple channels, significant gain in terms of overall system performance can be achieved. This, and other limitations like a shared medium which is open to all, attracts intruders in wireless networks. Mainly, the use of a lone channel can become single point of failure in case of an attack, especially a jamming attack. In contrast to other security attacks, no special hardware and computation is required in launching jamming attacks. Additionally, even if the attacker does not get hold of the communication, he can emit radio signals periodically to jam legitimate conversation. Thus, legitimate nodes escape physically or logically to avoid a jammer at the cost of additional overhead involving coordination amongst nodes to resume communication. The overhead involved in either of the methods is considered worthy in terms of regaining the performance of the network. In this thesis, a couple of MAC layer-based algorithms are proposed to mitigate the effects of jamming attacks efficiently; the first is a reactive mechanism and the second is a proactive proposal. The work starts with an investigation of different jamming types and their effects on wireless communication. For this purpose, a simulation model was developed and the resulting data set was verified using AI algorithms, which predicted 98% accuracy. Next, a reactive technique namely packet-feed is proposed to keep the jammer busy on the jammed channel. Once the nodes detect the existence of the jammer and hop to another channel, they alternatively visit the earlier channel to feed the jammer with valid packets. This way, the nodes pretend to the jammer that the earlier channel is still in use. Finally, a proactive channel hopping protocol is proposed where each node has a separate and dynamically selected control channel. Additionally, rather than each of them feeding the other its channel hopping sequence, both parties coordinate to come up with a new channel where data transfer can take place. Thus, provision of redundant channels is provided to each node. Following on from this, the proposed idea is analyzed with the existence of a jammer.