30 August 2015

Inderscience is media partner for 4th BSLab Symposium

Inderscience is a media partner for the 4th BSLab Symposium (24-26 August 2016, Vilnius, Lithuania).

The journals involved are:

Special issue published: "Human Resource and Behaviour Intention"

Journal for Global Business Advancement 8(3) 2015

Extended versions of papers presented at the KMITL-AGBA Global Conference 2013.
  • The effects of HRM practices on firm performance in Thailand's manufacturing industry
  • Investigating the effect of a hotel's physical environment on customers' pleasure, satisfaction, loyalty and behavioural intentions: a conceptual framework
  • Examining job seekers' perception and behavioural intention toward online recruitment: a PLS path modelling approach
  • Factors influencing job productivity: a case study of the Kingdom of Saudi Arabia
  • Developing a model to analyse the effects of brand constructs on word-of-mouth and purchase intention for Halal brands
  • A study of the relationship between using Instagram and purchase intention

Call for papers: "Advances in Biometrics and Their Security in Cloud Computing"

For a special issue of the International Journal of Embedded Systems.

Biometrics technology is rapidly being adopted in a wide variety of security applications such as electronic and physical access control, electronic commerce, digital rights management, homeland security and defense. Cloud computing is a new computing paradigm with special emphasis on distributed system architecture and big data managing and processing methods. Along with the rapid development of personalised service and large-scale data exchange, biometrics technology will be deeply embedded into cloud computing.

The goal of this special issue is to focus on the key technologies for biometrics technology-based cloud security, present a set of methods and technologies for security development, share high-quality resources and data based on cloud computing, help build innovative and efficient cloud platforms, and to open up new pathways for theory and practice in security data-share based on biometric technologies.

The issue will carry revised and substantially extended versions of selected papers presented at the 7th International Symposium on Intelligence Computation and Applications (ISICA 2015), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

Suitable topics include, but are not limited to, the following:
  • Biometrics-based cloud security
  • Distributed and parallel computing
  • Access control
  • Biometric recognition
  • Future internet computing
  • Application of biometrics technology
  • Management of data centre networks
  • Security and privacy for cloud data
  • Security outsourcing cloud storage systems
  • Soft biometrics
  • Multimodal biometrics
  • Biometric keys
  • Machine learning and biometrics mining

Important Dates
Submission of manuscripts: 30 November, 2015
Notification to authors: 20 January, 2016
Final versions due: 20 February, 2016

Free sample articles newly available from International Journal of Intellectual Property Management

The following sample articles from the International Journal of Intellectual Property Management are now available here for free:
  • Innovation protection in the Dutch printing industry
  • A knowledge-based system for assessing and managing intellectual property managerial risks for small-and-medium sized technological enterprises
  • Integrated marketing communications in the commercialisation of intellectual property
  • The consumer's protection against false trade descriptions in light of the Jordanian legislation
  • Agricultural patent analysis during 2005-2012 in India
  • Is 505(b)(2) filing a safer strategy: avoiding a known risk?

29 August 2015

Special issue published: "Management of Copyright and Related Rights by Collective Management Organisations: Part II"

  • Praise and criticism of the collective management of copyrights: a Spanish and European view
  • The new EU Directive 2014/26 as a catalyst for film and digital content innovation in Europe
  • The elements of the Directive 2014/26/EU on collective management and multi-territorial licensing that may influence the administration of performers' rights in the online environment
  • Enjoy your online music carefully: collective management of music copyrights in the USA
  • Practices of collective management of copyright on musical works and related rights on audio-video products in China

Call for papers: "Algorithm and Technology Advances for Future Internet"

For a special issue of the International Journal of High Performance Computing and Networking.

Recent years have witnessed the remarkable growing dominance of emerging technology and applications in the internet. The latest advances in data processing and transmission over the internet, network management and optimisation and smart network services have all contributed to this global phenomenon. Both challenges and opportunities have emerged in multiple research disciplines involved in future internet architecture.

Computational intelligence has been demonstrated as being highly useful in a large number of applications of many different domains such as design, engineering, multimedia, telecommunications and bioinformatics. Modern technologies based on computational intelligence have also been applied in the field of network computing and optimisation in the last few years. These can help to explore optimal solutions beyond the knowledge of researchers or automatically learn the properties of an environment and adapt their behaviour to its changing conditions.

Hence the main motivation for this special issue is to bring together researchers and practitioners working in related fields in computational intelligence and network computing to present current research issues and advances. The aim of the issue is to provide insight for the discussion of major research challenges and achievements in various topics of interest.

The issue will carry revised and substantially extended versions of selected papers presented at the 7th International Symposium on Intelligence Computation and Applications (ISICA 2015), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

Suitable topics include, but are not limited to, the following:
  • Theory, applications and challenges for emerging internet architecture
  • Computational intelligence, algorithms, optimisation and applications
  • Distributed and parallel computing
  • QoS and QoE in pervasive communications infrastructure
  • Management of data centre networks
  • Mobile sensing and social computing
  • Security, protection, integrity, trust and privacy issues for mobile internet
  • Data gathering, aggregation, storage, processing, fusion and mining
  • Semantic web and ontology for Internet of Things
  • Cloud computing and applications
  • Big data management

Important Dates
Submission of manuscripts: 20 November, 2015
Notification to authors: 31 January, 2016
Final versions due: 20 February, 2016

Special issue published: "Intelligent and Knowledge-Based Systems using Semantic Technology"

International Journal of Computational Vision and Robotics 5(3) 2015
  • Mining frequent closed itemsets from multidimensional databases
  • Neural network-based ideation learning for intelligent agents: e-brainstorming with privacy preferences
  • Sentence level text classification in the Kannada language - a classifier's perspective
  • Content-based image retrievals based on generalised gamma distribution and relevance feedback mechanism
  • DESRM: a disease extraction system for real-time monitoring
Additional papers
  • Polygonal approximation of digital planar curve using local integral deviation
  • Audio visual isolated Hindi digits recognition using HMM
  • Design of a cryptosystem for DCT compressed image using Arnold transform and fractional Fourier transform

Int. J. of Embedded Systems to publish expanded papers from SBESC 2015

Extended versions of papers presented at the Brazilian Symposium on Computing Systems Engineering (3-6 November 2015, Iguassu Falls, Brazil) will be published by the International Journal of Embedded Systems.

28 August 2015

Special issue published: "Software Life Cycle Management Focusing on Validation in Software Applications"

International Journal of Computer Aided Engineering and Technology 7(3) 2015
  • STORMKIT: a decision support tool for stormwater system analysis and design
  • Conformance testing with ioco proxy-testers: application to web service compositions deployed in clouds
  • Formal testing theory of stochastic systems under maximality semantics
  • TGG-based process for automating the transformation of UML models towards B specifications
  • Software development life cycle model to inculcate exception handling

Call for papers: "Creative Research for Education and Technology"

For a special issue of the International Journal of Knowledge and Learning.

The aim of creative research (CR) is to provide fresh and innovative ideas that allow us to see our daily research work from diverse perspectives. In CR, our research work can be pleasurable and adventurous, and this change of thinking can make us more enthusiastic about and focused on our research work with greater excitement.
 
For this special issue, we cordially invite original research papers focused on education and technology (ET) and exploring a variety of emerging CR issues for the cultivation of the traditional education domain and its technological approaches.
 
Suitable topics include, but are not limited to, the following:
  • Educational administration
  • Educational foundations
  • Educational measurement and evaluation
  • Educational psychology
  • Educational technology
  • Educational engineering
  • Education policy and leadership
  • Human resource development
  • Academic advising and counseling
  • Student affairs
  • Teacher/counselor education
  • Distance education
  • Curriculum, research and development
  • Language and literacy education
  • Mathematics education
  • Science education
  • Social studies education
  • Art/music education
  • Business education
  • Health education
  • Early childhood, elementary, secondary, higher and adult education
  • Indigenous education, special education
  • E-Learning, u-learning, m-learning and smart-learning
  • Cross-disciplinary areas of education
  • Other topics of education and technology
  • Liberal arts and general education in college/university
 
Important Dates
Submission of abstracts (by email): 30 September, 2015
Submission of full papers (online): 20 November, 2015
Notification to authors: 19 February, 2016
Final versions due: 18 May, 2016

Special issue published: "Multiple Criteria Decision-Making in Finance and Investment"

International Journal of Multicriteria Decision Making 5(3) 2015

Extended versions of papers presented at the International Conference on Multidimensional Finance, Insurance and Investment (ICMFII’13).
  • Media planning and preferences: a fuzzy goal programming model
  • A comprehensive multi-criteria decision-making system using analytical hierarchy process and decision tree tools to choose the best alternative for a refinery master plan
  • An information delivery strategy for multi criteria reporting: a case study on bankruptcy prediction analysis
  • The control problem of the supervisory board in a manager-auditor-conflict in banking
  • Parameter estimation through the weighted goal programming model
  • Investment decision-making by a two-step multi-criteria procedure

27 August 2015

Call for papers: “Advances in Information Security and Networks”

For a special issue of the International Journal of High Performance Computing and Networking.

Information security is more and more important in the modern network, it is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are critical requirements for the security of modern computation paradigms, such as cloud computation, distributed computation and P2P networks etc. Information security also handles risk management. Sensitive information must be kept confidential, it cannot be changed, altered or transferred without permission. For example, a message could be modified during transmission by someone intercepting it before it reaches the intended recipient. Good cryptography tools, especially encryption, can help mitigate this security threat. Digital signatures can improve information security by enhancing authenticity processes and prompting individuals to prove their identity before they can gain access to computer data. Trust software can ensure the network running smoothly, secure image processing are among the most useful techniques to securing the social networks like facebook etc, information hiding techniques can also find applications in networks to fingerprint some important digital contents.

The issue will carry revised and substantially extended versions of selected papers presented at the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

Suitable topics include, but are not limited to, the following:
  • Encryption and authentication techniques to ensure information security
  • Trustworthy software and networks
  • Secure image processing in networks
  • Secure protocols for communication networks
  • Secure techniques for cloud computation
  • Information hiding techniques for networks

Important Dates

Submission of manuscripts: 1 December, 2015
Notification to authors: 30 April, 2016
Final versions due: 30 June, 2016

Special issue published: "Semantic and Cloud Computing"

International Journal of High Performance Computing and Networking 8(3) 2015
  • A semantic driven approach for requirements consistency verification
  • Real-time event management in cloud environments
  • VMInformant: an instrumented virtual machine to support trustworthy cloud computing
  • Towards the future internet: the RESERVOIR, VISION Cloud, and CloudWave experiences
  • Design and implementation of a cloud computing platform for electromagnetic modelling
  • Exploiting model profiles in requirements verification of cloud systems
  • How the cognitive features testing can assist in evaluating collective ontology engineering
  • MIDAS: a cloud platform for SOA testing as a service

Call for papers: "Security for Embedded and Related Systems"

For a special issue of the International Journal of Embedded Systems.

All kinds of complex technical systems rely more and more on embedded and related systems. Embedded equipment is now increasingly becoming the key technological component of numerous large practical systems, ranging from vehicles, telephones, audio-video equipment, aircraft, toys, security systems, medical diagnostics, to weapons, pacemakers, climate control systems, manufacturing systems, intelligent power systems etc. However, solving the security-related problems of these embedded systems is very challenging. Issues include how to implement encryption and decryption algorithms fast, how to ensure the software environment can be trusted, how to implement basic cryptographic tool like elliptic curve cryptography quickly, how to resist side channel attack, how to ensure the content in the memory or register is safe etc.

The issue will carry revised and substantially extended versions of selected papers presented at the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

Suitable topics include, but are not limited to, the following:
  • Encryption and authentication techniques for embedded and related systems
  • Trust software for information systems using embedded techniques
  • Trust network environment for information systems using embedded techniques
  • Secure protocols for communication network
  • Secure outsourcing techniques for mobile equipments in cloud environment
  • New Information hiding techniques for embedded and related systems
  • System security for mobile network and embedded security

Important Dates
Submission of manuscripts: 1 December, 2015
Notification to authors: 30 April, 2016
Final versions due: 30 June, 2016

Microbeam radiation therapy

Both the efficacy and side effects of radiation therapy depend not only on the exposure dose but also on the volume of tissue exposed to that radiation. As a general rule, the smaller the volume, the greater the tolerance. As such, microbeam radiation therapy, which relies on the high power and pinpoint accuracy of synchrotron X-rays has for the last two decades or so been the focus of pre-clinical studies on various laboratory mammals. The planar microbeams are generated by a multi-slit collimator in the synchrotron, which cuts the emerging X-rays into horizontal beam slices tens of micrometres thick. Typically, target tissues are exposed to multiple quasi-parallel slices separated by a few hundred micrometres.

Now, Sigen Wang of the FROS Radiation Oncology Cyberknife Center, at Manhattan Radiation Oncology, in New York City and Xin Qian of the Department of Radiation Oncology, at New York Presbyterian Hospital, part of Columbia University, also in NYC, USA have reviewed this promising medical technology in the International Journal of Computational Biology and Drug Design. They point out that the state of the art preclinical studies suggest that radiation doses as high as several hundred Greys are surprisingly well tolerated by healthy tissues. Moreover, these same microbeams cause preferential damage to malignant tumour tissues.

The benefits to treating tumours that are close to sensitive organs in diseases such as ocular melanoma, pituitary adenoma, and tumours of the spinal cord, could be substantial. In addition, the same technology might also be extended to the treatment of other diseased tissues such as those brain tissues invoked in epilepsy and movement disorders, such as Parkinson’s disease. “The potential of microbeams for central nervous system (CNS) research is very large,” the team says. “Our review shows that microbeams can selectively ablate slices of neurons, oligodendrocytes, and astrocytes in the CNS because of the differential dose sensitivity of different cell types, without causing tissue necrosis.”


Wang, S. and Qian, X. (2015) ‘Microbeam radiation therapy: a review’, Int. J. Computational Biology and Drug Design, Vol. 8, No. 2, pp.127-138. Wang, S. and Qian, X. (2015) ‘Microbeam radiation therapy: a review‘, Int. J. Computational Biology and Drug Design, Vol. 8, No. 2, pp.127-138.

Original article: Microbeam radiation therapy.
via Science Spot » Inderscience http://ift.tt/1Km8YQq

26 August 2015

Special issue published: "Application of Workflows in Business Process Management"

International Journal of Business Process Integration and Management 7(3) 2015
  • An approach to business process registration for enterprise collaboration: using BPEL as an example
  • A community-oriented workflow reuse and recommendation technique
  • An approach to extract RESTful services from web applications
  • Using simulation to explore reciprocal help seeking in a lifelong learning context
  • Peer-to-peer mobile data flow in a crop field
Additional paper
  • Monte Carlo simulation as a service in the Cloud

Call for papers: "New Techniques for Secure Internet and Cloud Computation"

For a special issue of the International Journal of Computational Science and Engineering.

Cloud and Internet computing technologies have emerged as new paradigms for solving complex problems by enabling large-scale aggregation and sharing of computational, data and other geographically distributed computational resources. The continuous development of the internet and the construction of new internet and cloud computing infrastructures are making the development of large scale applications from many fields of science and engineering possible. Cloud and internet computing is an emerging and promising discipline which can have applications ranging from engineering, science, finance, and economics, to arts and humanities. New challenges arise in the modelling of complex systems, sophisticated algorithms, advanced scientific and engineering computing and associated (multidisciplinary) problem-solving environments for internet and cloud computation. This special issue will focus on the development of new techniques related to internet and cloud computation, including security-related techniques and various other interesting techniques.

The special issue will carry revised and substantially extended versions of selected papers presented at the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

Suitable topics include, but are not limited to, the following:
  • Encryption and authentication techniques to secure internet and cloud computation
  • Secure search techniques for cloud storage
  • Secure protocols for communication network
  • New routing and resource management algorithms for internet network and cloud
  • Information hiding techniques in cloud environment
  • Novel cryptographic techniques for internet and cloud computation

Important Dates
Submission of manuscripts: 1 December, 2015
Notification to authors: 30 April, 2016
Final versions due: 30 June, 2016

Special issue published: "Expressive Interactive Systems That Tell a Story"

International Journal of Arts and Technology 8(3) 2015

Extended versions of papers presented at the Fourth Conference on Intelligent Technologies for Interactive Entertainment (INTETAIN 2011).
  • A tabletop interactive storytelling system: designing for social interaction
  • A user experience model for tangible interfaces for children
  • Virtual shadow puppet play with intelligent instructional tool and interactive real-time animation 
  • Single value devices

25 August 2015

Special issue published: "Risk Management Technologies in Structurally Complex Economic, Social and Technical Systems and Processes"

International Journal of Risk Assessment and Management 18(3/4) 2015
  • Monitoring and crediting process control with use of logical and probabilistic risk model
  • Logic and probabilistic risk models for management of innovations system of country
  • Logical probabilistic analysis and its history
  • Reliability assessment for three-state element systems using ARBITR software
  • Synthesis and analysis of probabilities of events by non-numeric, inaccurate and incomplete expert information
  • Conceptual description of integrated risk modelling problems for managerial decisions in complex organisational and technical systems
  • Risk management technologies in structural complex systems
Additional papers
  • A fuzzy AHP methodology for selection of risk assessment methods in occupational safety
  • An expert opinion elicitation method based on binary search and Bayesian intervals

Call for papers: "Tourism and the Place of Memory"

For a special issue of the International Journal of Tourism Anthropology.

This special issue invites submissions focusing on the multiple connections between tourism, memory and place. Tourism entertains a complex and intricate relation with memory, intended both as the personal ability of recalling the past and as the social act of reconstructing it.
 
At an individual level, the cognitive act of remembering has a fundamental role in tourists’ experiences: whilst tourists long to live memorable experiences, an important part of the material and sensory dimension of their personal journey is projected towards “bringing back memories”. Thus tourists take pictures, purchase souvenirs or collect mementos in order to construct and evoke a personal narration. On a different register, places of memory become often tourist attractions, and are considered fundamental to the tourist’s understanding of a place. In memory sites, the past is rendered present in a social and collective way. As there are many ways to address and narrate the past, the process of making memory available as a tourist product always involves a mechanism of interpretation, construction and validation of the past. An act that implies the confrontation of sometimes conflicting powers and discourses: political, moral, cultural, economic. In some cases, the reconstruction can be part of an institutional political agenda, as a form of categorisation and dominance. In others, it can be used as an active form of resistance, as a mechanism for dislocating hegemonic narratives and foster a plurality of discourses.
 
In these processes, local communities find themselves in the ambiguous position of actors, producers and recipients of narrations and discourses about their own past. A deeper understanding of the relation between tourism and memory as a social phenomenon would therefore help to disentangle the intricate relations between these different levels of discourses and ways of transmission.
 
How is memory appropriated in tourism? How is tourism useful in the shaping of memory? To which extent tourism in memory sites, intended as a way of narrating a story to ′outsiders′, can function as a mechanism to soothe, share and process a trauma? Is the relation between tourism and memory mainly embodied in the commemoration of conflicts, crimes and/or tragic events, - as it is the case in dark tourism? How is memory commodified in tourism spaces? What role do emotions play in tourism at memory sites? And finally, which diverse purposes does memory fulfil in tourism sites – from the simple act of recognition that something occurred, to educational purposes, to the need of commemoration, demanding absolution and forgiveness?
 
It has been said that memory is far from absent from tourism studies. This special issue is an invitation to a critical investigation of the diversity of possible modes in which memory is produced, appropriated and negotiated in tourism experiences and places. It welcomes submissions from various disciplines, including social anthropology, history, sociology, geography, tourism studies, cultural studies, heritage and museum studies, as well as collaborative work by interdisciplinary research teams are sought. Both empirical and theoretical papers are welcome.
 
Topics appropriate for this special issue include, but are not limited to, the following subject areas:
  • Tourists' practices and the shaping of individual and collective memories
  • The role of tourism in the production of memory sites. Which memory, whose memory? Politics, remembrance, identity and the influence of hegemonic discourses
  • Collective memory, tourism and heritage-making processes
  • Contributions to the conceptualisation of "memory tourism(s)": dark tourism, roots tourism, diaspora tourism, battlefield tourism etc. Different typologies of memorial institutions
  • Tourism and the commodification of Nostalgia (Bartoletti, 2010)
  • Mechanisms of transmission at memory sites: imaginaries, practices, representations
 
Important Dates
Submission of manuscripts: 1 February, 2016
Notification to authors: 1 April, 2016
Final versions due: 1 June, 2016

Special issue published: "Institutional and Personal Reflexivity – Levels of Innovation Capability"

International Journal of Work Innovation 1(2) 2015

Extended versions of papers presented at the 8th International Conference in Interpretive Policy Analysis and CMS Critical Management Studies Conference.
  • Creating innovative work practices through reflexive interventions
  • Reflexivity in the 'productisation' of services
  • Institutional and personal reflexivity in processes of organisational learning
  • Individual and institutional reflexivity - a mutual basis for reducing gender bias in unquestioned practices
  • Immaterial common goods and institutional reflexivity
  • Reflexivity for sustainability: appreciating entanglement and becoming relationally reflexive

24 August 2015

Free sample articles newly available from International Journal of Liability and Scientific Enquiry

The following sample articles from the International Journal of Liability and Scientific Enquiry are now available here for free:
  • Showing they care, but about what? Does corporate social responsibility show companies have a nice side or that they are merely adapting to suit their environment?
  • Towards democratic consolidation in Africa? A look at the 28 November 2011 elections in the Democratic Republic of Congo
  • Imprints of liberalisation, privatisation and globalisation on third world economies with focus on India
  • A synopsis of problems and prospects of SADC, EAC and COMESA tripartite free trade area
  • Can regulation stop financial crises? An evaluation of banking laws in the USA, the UK and Australia after the financial crisis 2007/2008 in the light of what lesson can be learned and how such a crisis can be prevented in the future - part two
  • Can regulation stop financial crises? An evaluation of banking laws in the USA, the UK and Australia after the financial crisis 2007/2008 in the light of what lesson can be learned and how such a crisis can be prevented in the future - part one
  • Assessment of the liability risk in the Nordic port
  • The medico-legal and ethical considerations associated with intraoperative neurophysiological monitoring in the USA: overview and proposed guidelines for legal and risk management professionals
  • An overview of post-divorce support for Muslim children in the context of South African Law, Islamic Law and the proposed 2010 Muslim Marriages Bill
  • Harnessing marine renewable energy from Poole Harbour: a case study

Inderscience is media partner for International SAP Conference on Product Lifecycle Management

Inderscience is a media partner for the International SAP Conference on Product Lifecycle Management (1-2 October 2015, Darmstadt, Germany).

The journal involved is the International Journal of Product Lifecycle Management.

More information on this event is available here.




Free sample articles newly available from International Journal of Power Electronics

The following sample articles from the International Journal of Power Electronics are now available here for free:
  • Development of LabVIEW-based multilevel inverter with reduced number of switches
  • A control method to improve the efficiency of a soft-switching non-isolated bidirectional DC-DC converter for hybrid and plug-in electric vehicle applications
  • Experimental design approach to explore suitability of PI and SMC concepts for power electronic product development
  • Bond graph models of DC-DC converters operating for both CCM and DCM
  • Three-level NPC rectifier-based midpoint converter-fed SRM drive