30 November 2015

7 tips to avoid hijacked journals

In an earlier post about hijacked journals, we discussed research suggesting that the existence of fraudulent journals that spoof legitimate journals is causing significant problems for the ranking of academics in parts of the world where awareness of the issue is not widely known. Now, the author of that post has a follow-up and related paper due to appear in the International Journal of Advanced Intelligence Paradigms on the fraudulent use of similar journal names.

Mehdi Dadkhah of the Department of Computer and Information Technology, at Foulad Institute of Technology, in Fouladshahr, Isfahan, Iran and colleagues there and in Bulgaria and India, explain that every day, the academic world is confronted with new challenges and possible scams and lack of information and awareness is a serious issue when searching for validated resources, such as journals. Previously, hijacked journals that phish academic authors under the pretext of offering them paid-for open access publication in fake journal has become apparent, as have bogus conferences and fraudulent impact factors.

“Journals are the most important academic resource for a researcher however certain unethical practices have come to light regarding authenticity of certain Journals,” the team says. “Journals with names that are similar to existing (and reputed) journals is one of the recently noted problem.”

The team offers a seven-point checklist for academics looking for a genuine journal in which to publish. If answers to any of these questions raises suspicions then authors should be extra vigilant in their due diligence before accepting a commission to submit a paper or submitting to such a journal speculatively.

  • From what source did you learn of the target journal, was it only via a commissioning email?
  • Does the journal have an academic editorial team whose members are well known in your field or are associated with genuine organizations and institutes?
  • Does the name of the journal match the address if it claims to be “British”, “European” or “American” does it have accredited offices in those places?
  • Does it use proprietary email addresses, such as those offered for free by search engines and internet service providers rather than an address tied to the company or organization’s website address?
  • Does it have a complete listing and links to archives of previous volumes of the journal?
  • If an impact factor is declared, a journal has to be at least 5 years old to have a valid metric from Thomson Reuters in their scheme, when was vol 1(1) of the target journal?
  • Does the journal cover many disparate fields of science but isn’t one of the well-known general journals?

The wary author will diligently check these various factors before accepting a commission and certainly before paying any publication fees. There is a growing number of hijacked and predatory journals around created by fraudsters and fake publishers as well as companies whose aggressive commissioning policies border on the criminal.


“Similar Names in Academic Literature as a Tools to Deceive Researchers”, Mehdi Dadkhah, Ashok K Shyam, Christova Bagdassarian, Mohammad Davarpanah Jazi , Int J Adv Intell Paradigms, in press

Original article: 7 tips to avoid hijacked journals.
via Science Spot » Inderscience http://ift.tt/21pjPk7

Inderscience is media partner for Annual Conference on Social Media within the Utilities Sector

Inderscience is a media partner for the 5th Annual Conference on Social Media within the Utilities Sector (11-12 April 2016, London, UK).

The journals involved are:

Special issue published: "High Performance Computing and Communications"

International Journal of Autonomous and Adaptive Communications Systems 8(4) 2015
  • An energy-efficient data transfer strategy with link rate control for Cloud
  • Adaptive call admission control scheme with optimal resource allocation for multi-class cellular networks
  • A SLA-based cloud resource provisioning optimisation mechanism for multi-tenant applications 
  • Optimal VM placement in data centres with architectural and resource constraints
  • Optimising MPI tree-based communication for NUMA architectures
  • Dynamic MPI parallel task scheduling based on a master-worker pattern in cloud computing

Free sample articles newly available from International Journal of Collaborative Enterprise

The following sample articles from the International Journal of Collaborative Enterprise are now available here for free:
  • Performance comparison of four triage-based patient flow interventions in the emergency department
  • Operating room turnaround time analysis: a case study
  • System analysis and process redesign for quality improvement of sepsis resuscitation
  • Disease management: clustering-based disease prediction
  • Contact network based risk assessment to prevent potential pandemics
  • Balancing nurses' workload to enhance the quality of care in an outpatient cancer clinic
  • Improving knowledge sharing in healthcare through social network analysis
  • Improving Kaizen event success in healthcare through shorter event duration

Special issue published: "Advances in Advertising and Sponsorship Effectiveness"

International Journal of Sport Management and Marketing 15(5/6) 2014
  • Predicting decisions to purchase from sponsors of the Vancouver 2010 Olympics
  • Determinants of purchase intention toward sponsoring product: mediating role of sponsor identification in Korean professional baseball games
  • Consumer responses to on-site Olympic sponsorship activation: the impact of interactivity, emotions, and perceived image fit on brand attitude formation
  • The extended match-up hypothesis model: the role of self-referencing in athlete endorsement effects
  • Alcohol, sponsorship, and new media activation: an investigation of Molson Canadian and the 2014 Olympic Games
  • Sponsorship network portfolio of corporate partners in the National Basketball Association

29 November 2015

Call for papers: "Structural, Economic and Human Seismic Loss Estimations"

For a special issue of the International Jourrnal of Forensic Engineering.

Earthquakes can have devastating impact in a matter of seconds. Their unpredictable nature and the potential scale of their impact make them one of the most lethal of all disasters, claiming an average of 27,000 lives a year worldwide since the 1990s. There are more than 1.4 million earthquakes a year around the planet, an average of almost 4,000 per day. Of course, if earthquake phenomena occur in uninhabited areas where they do not have any human impact, they remain hazards rather than disasters. If, on the other hand, they strike urban areas with high population density or communities where buildings are not earthquake-resistant, there is the potential for major disasters with large-scale human loss, especially in the case of larger earthquakes.
 
Management of earthquake risks is a process that involves pre-, co- and post-seismic phases. Rapid response systems go into action immediately after the earthquake and provide assessment of the distribution of ground shaking intensity (so-called Shake-Maps) and information on physical (buildings) damage, casualties (fatalities) and economic losses. This rapid information on the consequences of an earthquake can serve to direct search and rescue teams to the areas they're most needed and assist civil protection authorities in emergency action. As such, the need for a rapid loss estimates after an earthquake has been recognised and requested by governments and international agencies.
 
Subject coverage includes, but isn't limited to, the following:
  • Developing/improving seismic loss estimation tools and platforms
  • Structural damage following an earthquake with a specific focus on new methodologies for rapid risk and vulnerability assessments
  • Non-structural damage following an earthquake with a specific focus on direct physical damage to building stock
  • Human causalities/fatalities following an earthquake with a specific focus on methodologies to reduce casualties in highly populated urban areas
  • Proposing methodologies to formulate direct social losses as a function of casualties
  • Economic issues and downtime
  • Proposed improvements for HAZUS-MH and similar platforms
  • Developing fragility functions for complex and critical structures and infrastructures
  • Uncertainties in the loss estimation process
  • Repair, retrofit and rehabilitation of damaged structures
 
Important Dates
Submission of manuscripts: 31 March, 2016
Notification to authors: 15 June, 2016
Final versions due: 15 July, 2016

28 November 2015

Special issue published: "Bio-Inspired Hardware"

International Journal of Bio-Inspired Computation 7(6) 2015
  • Demonstrating the performance, flexibility and programmability of the hardware architecture of systemic computation modelling cancer growth
  • A general-purpose framework for FPGA-accelerated genetic algorithms
  • Design and simulation of a molecular arithmetic logic unit using seesaw-gate method
Additional papers
  • A hybrid discrete firefly algorithm for solving multi-objective flexible job shop scheduling problems
  • An optimisation algorithm based on the behaviour of locust swarms

New Editor for International Journal of Organisational Design and Engineering

Associate Prof. Lapo Mola from SKEMA Business School in France has been appointed to take over editorship of the International Journal of Organisational Design and Engineering.

27 November 2015

Call for papers: “Big Data Management in the Cloud”

For a special issue of the International Journal of Services Technology and Management.

Big data has become an emerging paradigm for practitioners and researchers exploring the value of datasets whose size is beyond the ability of commonly used software tools. Cloud computing, as an emerging platform for delivering information infrastructures and resources as IT services, is driving the innovations of big data. Both technologies continue to evolve. It makes sense that cloud computing offers a cost-effective way to support big data technologies and the advanced analytics applications that can drive business value.

This special issue aims to foster the dissemination of state-of-the-art research in the area of datacentres and big data in the cloud. It will cover theory, architecture and utilities, particularly in relation to the use of cloud computing technologies to deal with big data. We invite the submission of high-quality papers describing future potential or ongoing work.

The issue will carry revised and substantially extended versions of selected papers presented at the Second International Conference of Cloud Computing Technologies and Applications (CLOUDTECH’2016), but we also strongly encourage researchers unable to participate in the conferences to submit articles for this call.

Subject coverage includes, but is not limited to, the followings:
  • Big data in the cloud
  • Cloud computing techniques for big data
  • Big data as a service
  • Big data in pervasive computing
  • Big data management
  • Security applications of big data
  • Big data for enterprise 

Important Dates
Original paper submission: 30 October, 2016

Special Issue published: "Mobility Management and Wireless Access"

International Journal of Ad Hoc and Ubiquitous Computing 20(3) 2015

Includes extended version of papers presented at the 11th ACM International Symposium on Mobility Management and Wireless Access.
  • Candidate selection algorithms in opportunistic routing based on distance progress
  • Smart cross-layer protocol integration for efficient wireless communications
  • Improving sensor network performance with wireless energy transfer
  • Subject-independent human activity recognition using Smartphone accelerometer with cloud support
  • COME: cost optimisation with multi-chaining for energy efficient communication in wireless sensor networks
  • How to be an efficient asynchronous neighbourhood discovery protocol in opportunistic cognitive wireless networks

26 November 2015

Finding fake feedback

How can you, the consumer, trust the customer feedback posted at online shopping sites when hoping to make a purchasing decision? Conversely, as the company running the site, how can it protect its reputation from false negative feedback? Researchers in Australia hope to answer these questions with computer software that can detect false feedback and ensure the integrity of ecommerce trust management systems. They provide details in the International Journal of Trust Management in Computing and Communications.

Soon Keow Chong and Jemal Abawajy of the Parallel and Distributed Computing Lab at Deakin University, Geelong, Australia, explain that trust management is a vital component of any ecommerce site; it forms and maintains the relationships between trading partners. However, it relies on feedback proffered by the trading partners and as such is not infallible. There is always the potential for feedback to be manipulated strategically to the detriment of the site’s reputation on the small-scale and in the worst case scenario a site might undergo a “rating attack” that could cause serious damage to brand and company image.

The team has now successfully developed an algorithm that can identify and block falsified feedback being sent to a site’s trust management system and so make it more robust against rating manipulation attacks. The team points out that the algorithm can detect when an established, credible user who has built up trust on a system suddenly begins cheating or when a multitude of new users are pushing false feedback on to the site.

The team explains that the feedback verification scheme uses a clustering algorithm to group similar ratings together and define the majority rating. The trust value of the rater is based on his/her past behavior and the frequency of rating submissions. In order to determine the quality of a rating, the team uses a trust threshold which designates a minimum value required to establish the trust relationship. All ratings that fall within the majority cluster are combined with the trust value of the rater, the transaction frequency and the transaction value to determine the credibility of the ratings.

The algorithm then adds “weight” (credibility) depending on various factors: rating frequency, total submissions, low value versus high value transactions, total feedback on a given product and other parameters. It thus determines whether any given feedback falls below a set threshold for credibility and defines those that do as false and so avoids adding it to the trust management system, it also scores against the user’s individual trust value.


Chong, S.K. and Abawajy, J.H. (2015) ‘Mitigating malicious feedback attacks in trust management systems‘, Int. J. Trust Management in Computing and Communications, Vol. 3, No. 1, pp.1-18.

Original article: Finding fake feedback.
via Science Spot » Inderscience http://ift.tt/1MERBtX

25 November 2015

Companies being responsible on social media

Companies that attempt to use social networking to communicate ethical messages of corporate responsibility to consumers are wasting their human resources and money if they do not engage with users directly, according to research published in the International Journal of Business Information Systems.

Reza Jamali of Tarbiat Modares University (TMU), in Tehran, Iran, and colleagues have undertaken a qualitative study of documents in the public domain published by fifty Fortune global 500 companies. The analyzed the terms and statements that the companies used to describe their social responsibility policies and identified the types of social media they used as part of their efforts. The team also surveyed almost 1300 consumers who used at least one of those fifty companies for their interests and preferences.

Their results indicate that common “digital strategies” failed to meet the objectives of the companies in disseminating information about their corporate social responsibilities activities. Fundamentally, the team suggests that the main reason underlying this failure is that consumers are constantly bombarded by such messages but have little interest in them. Moreover, consumers seem to prefer video and photo messages whereas the majority of messages are coming from corporate websites and the company social network page. “Using social media without engaging users cannot be considered a success and should be considered an expense with no return,” the team reports.

At least three quarters of Fortune 500 companies are officially on Twitter and more than two thirds on Facebook page, the team adds, and yet, consumers do not perceive the presence of these companies as being effective in communicating with them, despite the companies themselves imagining that social media is an effective tool for them. Businesses that demonstrate social responsibility attract more supporters, that much is clear. However, the research suggests that companies in “broadcast” mode, simply churning out information is generally not listened to. The team concludes that a modern “digital strategy”, or in the parlance of the research literature, “social strategy”, must take into account the needs of customers almost at the individual level and must create interactions as if between friends or at the very least acquaintances, rather than between consumers en masse and the opaque company profile.


Jamali, R., Moshabaki, A. and Kordnaeij, A. (2016) ‘The competitiveness of CSR communication strategy in social media’, Int. J. Business Information Systems, Vol. 21, No. 1, pp.1–16.

Original article: Companies being responsible on social media.
via Science Spot » Inderscience http://ift.tt/1lhb5eD

23 November 2015

Special issue: "Electrified Vehicles and Transportation Systems"

International Journal of Vehicle Design 69(1/2/3/4) 2015

  • Direct yaw moment control for electric and hybrid vehicles with independent motors
  • Vehicle stability and attitude improvement through the coordinated control of longitudinal, lateral and vertical tyre forces for electric vehicles
  • A ZCS buck excitation converter for electric vehicle with wound rotor synchronous motors
  • Thermal modelling for permanent magnet synchronous motors based on electrical and thermal characteristics
  • Stochastic dynamic programming for the energy management of a serial hybrid electric bus
  • Analysis and comparison of optimal power management strategies for a series plug-in hybrid school bus via dynamic programming
  • Development of an optimal control system for longitudinal and lateral stability of an individual eight-wheel-drive electric vehicle
  • Self-organising map based classification of LiFePO4 cells for battery pack in EVs
  • Multiple model adaptive backstepping control for antilock braking system based on LuGre dynamic tyre model
  • Design of dual winding permanent magnet synchronous machines for hybrid electric vehicle accessory drives
  • A heuristic-based electricity trade coordination for microgrid-level V2G services
  • Performance analysis of high-frequency isolated dual half-bridge three-level bidirectional DC/DC converter with dual-phase-shifting control
  • Design and optimisation of interior PM machines with distributed and fractional-slot concentrated-windings for hybrid electric vehicles
  • Multi-speed torque coupler of hybrid electric vehicle to exploit energy reduction potential
  • Design and analysis of plug-in hybrid electric school bus
  • Experimentations on the adaptive sliding mode control for a trajectory tracking applied on a bi-steerable car
  • Robust guaranteed cost state-delayed control of yaw stability for four-wheel-independent-drive electric vehicles with active front steering system
  • Electric drive system control strategies of articulated vehicles with four motor-driven wheels

20 November 2015

Tourism tweets

Twitter engagement in the tourism sector

Tourism and travel companies hoping to gain traction and credibility and likes on social media sites, such as Twitter, should take note of a new study from researchers in the UK. A team in the Business School at Brunel University London has analysed almost 3000 tweets – updates on the Twitter microblogging platform – from six major companies in the tourism sector (Booking, Hostelworld, Hotels, Lastminute, Laterooms and Priceline) and found that there are certain features of a tweet that will attract the most attention from users of the site and gain more retweets and “likes”.

The team reports that posts which contain pictures, hyperlinks, product or service information, direct answers to customers and brand centrality are more likely to be retweeted and favourited by users. Electronic word-of-mouth marketing has become increasingly important in the era of web 2.0 and online social networking, where a single comment can make or break a reputation should it gain traction among even just a small proportion of the hundreds of millions of users of such services. As such, company marketing departments must try to get themselves ahead of the game, generate their own content and push the positive message as and when they can.

Fundamentally, social media puts the individual user in a much greater position of power than ever before, with one-on-one interactions between user, whether wouldbe customer or current consumer, and a company representative now taking up a large amount of corporate time for marketing departments. The online conversations between customers and commerce and between different customers can have a significant effect on intention to buy.

An earlier analysis of the 500 million or so daily tweets as of the time of writing reveals a large proportion of those contain reference to a specific brand or company that might express positive or negative feelings about the products or services associated with that company. “Our findings show that, in terms of contextual characteristics, pictures, hyperlinks, hashtags and mentions are the most important drivers for electronic word-of-mouth,” the team says. The team points out, however, that of all the various factors, product or service information is the only attribute that significantly affects retweet and favourite rates. “This result suggests that customers pay more attention to posts and tweets that provide information about products or services,” they conclude.


Alboqami, H., Al-Karaghouli, W., Baeshen, Y., Erkan, I., Evans, C. and Ghoneim, A. (2015) ‘Electronic word of mouth in social media: the common characteristics of retweeted and favourited marketer-generated content posted on Twitter’, Int. J. Internet Marketing and Advertising, Vol. 9, No. 4, pp.338–358.

Original article: Tourism tweets.
via Science Spot » Inderscience http://ift.tt/1kL4ARR

17 November 2015

Special issue published: "The Evolution of Green Energy and Vehicle Technology"

Progress in Industrial Ecology, An International Journal 9(2) 2015

Extended versions of papers presented at the National Conference on ‘Evolution of Green Energy and Vehicle Technology’.
  • Experimental performance assessment of single glazing flat plate solar photovoltaic thermal (PV/T) hybrid system
  • Performance analysis of linear Fresnel reflector concentrating solar system with varying reflector width using analytical and ray trace techniques
  • Recent developments in solar energy-based absorption cooling systems
  • Thermodynamic analysis of different cycles for high-temperature concentrated solar power applications
  • Computational investigation of Savonius wind turbines with classical and novel blade configurations
  • Optimisation of process parameters of wet scrubbing of biogas from night soil and vegetable waste using historical and Taguchi design
  • Tar mitigation in biomass gasifiers using nano-structured Ni/SiO2 catalyst: an experimental study
  • Flexible charging time and geography independent dual thermal cycle based energy storage
  • Analysis on surface roughness in abrasive water jet machining of aluminium
  • Diesel engine performance improvement with suitable low cost technologies for tractor applications

13 November 2015

Special issue published: "Advanced Computing Services for Biomedical Image Analysis"

International Journal of Image Mining 1(2/3) 2015

Extended versions of papers presented at the 2014 Iberian Grid Infrastructure Conference.
  • A large-scale graph processing system for medical imaging information based on DICOM-SR
  • The ARTFIBio web platform
  • A cloud infrastructure for scalable computing on population imaging databanks
  • Fuzzy PGA filter technique performance on the mini-MIAS database of mammograms
  • Machine learning methods for breast cancer CADx over digital and film mammograms
  • Ensemble features selection method as tool for breast cancer classification
  • ALOE platform: an overview of a service-oriented architecture for research in breast cancer diagnosis supported by e-infrastructures
  • Performance analysis of machine learning algorithms for automated diagnosis using a dataflow-based approach on the grid

What is the Internet of Things, really?

The Internet of Things, IoT, the cloud, big data…buzzwords for the modern age. But, asks Won Kim, Jaehyuk Choi and colleagues in the Department of Software at Gachon University, in Gyeonggi-do, South Korea: Is the IoT actually anything new and how does it work? Writing in the International Journal of Web and Grid Services, the team offer some answers and a high-level view of the IoT from the perspective of its architecture.

“The IoT is defined as the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure,” explain the researchers. The “things” are smart devices with some kind of sensor and network communication functionality and can include anything from webcams and microphones to environmental gas sensors, medical diagnostics devices and infamously the smart refrigerator.

“In a sense, the IoT is not really new,” the team says. “All the components of the IoT have been around for some time: the Internet, smart embedded devices, sensors of various types and communication technologies that connect devices.” They point out that there have been available for some time services that collect data from sensors, transmit it to other devices or central servers for data processing and data mining and tools that actuate and manage remote devices, such as weather stations and even vacuum-cleaning robots and lawnmowers.

One thing that is perhaps new is that increasingly the smart devices that make up the IoT now usually require their own internet protocol, IP, address. Research suggests that by 2020 there will be 30 billion or so connected “things” each with a unique IP and the majority of those will be wireless devices. Such vast numbers and the vast quantities of data they will generate will almost certainly only be manageable with distributed “cloud services” and “big data” computer facilities.

“Although many IoT applications have come to the market, the big challenge is to develop IoT applications and business models that will fill the unmet needs and wants of users,” the team reports. Moreover, these solutions must be commercially viable. The trade press and early adopters are finding their way testing the smart devices and systems. However, the Internet of Things is yet to mature to match the hyperbole, energy requirements, applications, and costs must all shift substantially to allow us to recognize and realize what benefits the IoT will ultimately bring us.


Kim, W., Choi, J., Jeong, O-R., Han, W-J., Kim, C., Loh, W-K. and Yoo, J. (2015) ‘On the Internet of Things’, Int. J. Web and Grid Services, Vol. 11, No. 4, pp.410–426.

Original article: What is the Internet of Things, really?.
via Science Spot » Inderscience http://ift.tt/1QlXMGX

Research Picks extra – November 2015

Indian balancing act

Researchers at Pondicherry (Central) University have investigated the issues surrounding the so-called work-life balance among dual-career couples in India, and specifically those people working in knowledge-based organizations. Earlier work suggested that balancing career and personal life offers a severe dilemma for couples. Now, the Pondicherry team has provided empirical evidence to support this finding and also shown that demographic characteristics affect the severity of the dilemma experienced by couples attempting to find balance. There are important differences related to gender and family structure, the team reports, in terms of personal satisfaction with one’s work-life balance and how this affects overall quality of life. “Dual-career couples in India are helplessly caught in the act of juggling between professional and personal lives as they cannot afford to compromise on one for the sake of the other,” the team concludes. Inability to manage time, improper delegation of work and home priorities, succumbing to the pressures of long work hours, physical and mental ill-health due to stressors are problems many dual-career couples in this preliminary study of 155 such couples in Chennai face.

Delina, G. and Raya, R.P. (2016) ‘Dilemma of work-life balance in dual-career couples – a study from the Indian perspective’, Int. J. Indian Culture and Business Management, Vol. 12, No. 1, pp.1–27.

 

Facial manipulation

Computer scientists in Taiwan have devised a new computer program that can seamlessly “morph” one face into another, a popular animation task for the entertainment industry and commonly used in pop music videos, fantasy and science fiction movies and TV shows and much more beside. The same software might also have application in education and other areas, such as demonstrating the evolution of the human face through prehistory or showing how a person might age. The team’s flexible approach provides users with control points and a guiding mode to allow one face to be morphed into a second more smoothly and more realistically than is possible with some other techniques. The team adds that the system has no limit to the shape, size, and plane rotation of the faces in both the source image and the target image and so can allow faces viewed from different angles to be morphed into each other.

Kao, Y-T., Yang, F-W. and Lin, H.J. (2015) ‘Flexible facial morphing’, Int. J. Computational Science and Engineering, Vol. 11, No. 3, pp.312–321.

 

All grapes, no wrath

There are several wine-producing nations with a long history, Italy among them. None of them seem to have a long-term vision of how this heritage might be exploited for tourism and to improve sales of wine and associated products. Now, Italian business experts have developed a scientific framework that could support the development of wine tourism by allowing the various ” stakeholders” to understand, design, and develop a wine tourism structured system based on service-dominant logic. The same framework could also offer insights for “New World” wine producers in California, Australia, South Africa and those in the developing nations of South America and Asia.

Festa, G., Vrontis, D., Thrassou, A. and Ciasullo, M.V. (2015) ‘A value co-creation model for wine tourism’, Int. J. Management Practice, Vol. 8, No. 3, pp.247–267.

 

Hijacked journals

A warning to the scientific community to be on the look out for fraudulent “hijacked” journals commissioning paid research papers comes from researchers writing in the International Journal of Technology Enhanced Learning. The problem first detected in 2012 is different from the increasingly well-known concept of predatory journals established to piggyback in the advent of the open access movement in publishing. Instead, hijacked journals duplicate the website and details of a legitimate journal and then send spam email to potential paying “authors” in what amounts to a high-brow phishing attack on academics. There is a significant difference between them…hijacked journals are not academic journals at all, they use fake websites to make their fake journals appear authentic and essential defraud unwary academics out of their money on the pretext of requesting author charges for publication of a paper.

Dadkhah, M. and Maliszewski, T. (2015) ‘Hijacked journals – threats and challenges to countries’ scientific ranking’, Int. J. Technology Enhanced Learning, Vol. 7, No. 3, pp.281–288.

Original article: Research Picks extra – November 2015.

via Science Spot » Inderscience http://ift.tt/1Qlft9C

12 November 2015

Special issue published: "Techmining for the Management of Technology"

International Journal of Technology Management 69(3/4) 2015

Extended versions of papers presented at the e Global Tech Mining Conference 2013.
  • Brokering knowledge in networks: institutional intermediaries in the Taiwanese biopharmaceutical innovation system
  • Analysis on patent collaborative patterns for emerging technologies: a case study of nano-enabled drug delivery
  • Study on the measurement of international knowledge flow based on the patent citation network 
  • Biodiesel in Brazil: science, technology and innovation indicators
  • Patent overlay maps: Spain and the Basque Country
  • Advancing the forecasting innovation pathways approach: hybrid and electric vehicles case 
Additional paper
  • Managing technologies within an industrial cluster: a case from a toolmakers cluster of Slovenia

Special issue published: "Nature-Inspired Algorithms: Theory and Applications"

International Journal of Innovative Computing and Applications 6(3/4) 2015
  • An optimisation method for urban artery coordinated control based on the cosine modified adaptive genetic algorithm
  • Multi-strategy ensemble artificial bee colony algorithm for large-scale production scheduling problem
  • rEDA: reverse estimation of distribution algorithm for classification
  • Particle swarm optimisation-based KNN for improving KNN and ensemble classification performance
  • An efficient clustering method for mobile users based on hybrid PSO and ABC
  • Bat algorithm with oscillation element
  • Bio-inspired algorithms for cloud computing: a review
  • A fuzzy DEMATEL approach based on intuitionistic fuzzy information for evaluating knowledge transfer effectiveness in GSD projects
  • An adaptive transpose measurement matrix algorithm for signal reconstruction in compressed sensing
Additional papers
  • Genetic and backtracking search optimisation algorithms applied to localisation problems
  • A differential evolution-based memetic algorithm for project

Inderscience is media partner for Modeling, Simulation & Crash Safety Congress 2016

Inderscience is a media partner for Modeling, Simulation & Crash Safety Congress (26-27 January 2016, Detroit, USA).

The journal involved is the International Journal of Simulation and Process Modelling.





Special issue published: "Intervention Studies in Human Factors and Ergonomics"

International Journal of Human Factors and Ergonomics 3(3/4) 2015

Extended versions of papers presented at the 11th International Symposium on Human Factors in Organisational Design and Management (ODAM) and 46th Annual Nordic Ergonomics Society (NES) Conference.
  • Lean implementation at different levels in Swedish hospitals: the importance for working conditions and stress
  • Implementation of a participatory organisational-level occupational health intervention - focusing on the primary task
  • Applying the chronicle workshop as a method for evaluating participatory interventions 
  • Facilitating and inhibiting factors in change processes based on the lean tool 'value stream mapping': an exploratory case study at hospital wards
  • Participatory design of integrated safety and health interventions in the workplace: a case study using the Intervention Design and Analysis Scorecard (IDEAS) Tool
Additional papers
  • Attitudinal predictors of relative reliance on human vs. automated advisors
  • SCOPED: a set of design hypotheses targeting the visual perceptibility of interface items
  • Operational functionality test of offshore helicopter seat harness in wet and dry conditions
  • Manual material handling and occupational low back disorders: a narrative literature review emphasising maximum acceptable weight of load

11 November 2015

Inderscience is media partner for Soldier Equipment and Technology Advancement Forum

Inderscience is a media partner for the Soldier Equipment and Technology Advancement Forum (14-15 March 2016, London, UK).

The journals involved are:

Inderscience journals to publish expanded papers from International Symposium on Big Data and Cloud Computing Challenges

Extended versions of papers presented at the 3rd International Symposium on Big Data and Cloud Computing Challenges (10-11 March 2016, Chennai, India will be published by the following journals:

Inderscience is media partner for Annual Joint Forces Simulation & Training Conference

Inderscience is a media partner for the 7th Annual Joint Forces Simulation & Training Conference (3-4 February 2016, London, UK).

The journals involved are:

10 November 2015

Inderscience is media partner for Annual Nordic Card Markets and Future Payment Solutions

Inderscience is a media partner for 15th Annual Nordic Card Markets and Future Payment Solutions (25-26 January 2016, Copenhagen, Denmark).

The journals involved are:

Special issue published: "Soft Computing and Intelligent Information Systems"

International Journal of Reasoning-based Intelligent Systems 7(3/4) 2015
  • The architecture design of commercial banks' ex-post supervision systems
  • Application of fractional order PID in controlling constant current
  • Improved quantum-inspired cuckoo search algorithm based on self-adapting adjusting of search range
  • Enhanced perceptual feature space with context drift information for query by humming system
  • A light-weight linear coding cipher model for rechargeable wireless sensor networks
  • Machine learning techniques for decoding GP sentences: effects of processing breakdown
  • Intrusion detection system design of cloud computing based on abnormal traffic identification 
  • The study of modelling problems of GLM for outstanding claims reserving based on prediction error of reserve
  • An improved artificial bee colony algorithm for numerical functions
  • Study on cellular iterative location algorithm with Gaussian noise
  • Improvement in multiple nodes positioning accuracy for wireless sensor networks based on unknown transmitted powers
  • Forward tentative selection with backward propagation of selection decision algorithm for attribute reduction in rough set theory
  • A new approach to soft sets, soft multisets and their properties
  • A new approach to intrusion detection in databases by using artificial neuro fuzzy inference system
  • A bio-inspired, incremental clustering algorithm for semantics-based web service discovery
  • Ontological classification of individuals: a multi-viewpoints approach
  • Colouring graph by the kernel P system
  • An integrated covering-based rough fuzzy set clustering approach for sequential data
  • Automatic annotation generation of medical documents for effective medical information retrieval
  • Motif-Plus: incorporation of network motifs into top-n friendship recommendations
  • Firefly algorithm assisted multi-user detection for OFDM/SDMA uplink system
  • Novel research framework on SN's NoSQL databases for efficient query processing

Call for papers: "New Technologies and Applications in Mobile Networks"

For a special issue of the International Journal of Mobile Network Design and Innovation.

Mobile network design is a characteristic and important issue in today's wireless world. Networks and systems, such as mobile RFID systems, mobile ad hoc networks, the mobile IP environment and so on, are examples of important networks and systems used every day. However, many domains cannot use mobile networks directly, and new technologies and applications are therefore required in order to adapt mobile networks to the new domains.

This special issue is aimed at presenting high-quality research dealing with problems related to new technologies and applications in mobile networks. Research articles are solicited in all aspects including theoretical studies, algorithms, practical applications, open issues and challenges.

Suitable topics include, but are not limited to, signal processing, security and privacy in regard to the following:
  • Numerical computation and mathematical modelling
  • Mobile communications, networking and applications
  • Mobile computing systems
  • Mobility, location and handoff management
  • RFID technology and applications
  • Wireless and mobile networking
  • Routing protocols for wireless and mobile networks
  • Mobile and wireless IP protocols
  • Security in wireless and mobile networks
  • End-to-end protocols for wireless and mobile networks
  • Mobile middleware
  • Emerging wireless and mobile applications

Important Dates
Deadline for paper submission: 15 March, 2016

Int. J. of Work Organisation and Emotion to publish expanded papers from Nursing Caring Science conference

Extended versions of papers presented at the Nursing Caring Science International Conference (4-5 January 2016, Alexandria, Egypt) will be published by the International Journal of Work Organisation and Emotion.

9 November 2015

Special issue published: "Adaptive and Creative System Design"

International Journal of Signal and Imaging Systems Engineering 8(6) 2015
  • Intermittent fault diagnosis in dynamic topology MANETs
  • Robust embedded vision system for face detection and identification in smart surveillance
  • Performance of different window functions for designing quadrature mirror filter bank using closed form method
  • Sub-band discrete cosine transform-based greyscale image watermarking using general regression neural network
Additional papers
  • Fault diagnosis of high-speed rolling element bearings using wavelet packet transform
  • FinFET-based 6T SRAM cell design: analysis of performance metric, process variation and temperature effect

Inderscience is media partner for Superbugs and Superdrugs 2016

Inderscience is a media partner for Superbugs and Superdrugs (16-17 March 2016, London, UK).

The journals involved are:

More information on the event is available here.

Special issue published: "Sustainability in the Agriculture Sector in Europe"

International Journal of Agricultural Resources, Governance and Ecology 11(2) 2015
  • Associating farmers in the producers' organisation for sustainable development of agriculture in Slovakia
  • Distribution of LEADER support designed to local agricultural products in Poland
  • A review of the application of the high nature value concept in Estonia within the context of the European Union
  • The integrated approach to sustainable development of rural areas: the case for the agricultural sector in the Kaliningrad region of the Russian Federation
  • Community-based approach to local development as a basis for sustainable agriculture: experience from Ukraine
  • The approach of Swedish municipalities to the preservation of agricultural land in a planning context

6 November 2015

Special issue published: "Awareness in Sensor Networks"

International Journal of Sensor Networks 19(3/4) 2015
  • On human mobility assisted data collection in wireless sensor networks
  • An energy-balanced self-deployment algorithm based on virtual force for mobile sensor networks
  • A square-based coverage and connectivity probability model for WSNs
  • Biquaternion Capon beamformer using four-component vector-sensor arrays
  • A 3D localisation method for searching survivors/corpses based on WSN and Kalman filter
  • Particle filter based device free localisation and tracking for large scale wireless sensor networks
  • An indoor location system based on neural network and genetic algorithm
  • OTSP: an optimised time synchronisation protocol for wireless sensor networks
Additional papers
  • A realistic and real-time watercolour painting engine using domain decomposition scheme
  • Distributed clustering protocol for wireless sensor network
  • Modular remote reprogramming of sensor nodes

5 November 2015

Int. J. of Telemedicine and Clinical Practices to publish expanded papers from Int. Conference on Medical Informatics

Extended versions of papers presented at the International Conference on Medical Informatics 2016 (26-28 February 2016, Bhubaneswar, India) will be published by the International Journal of Telemedicine and Clinical Practices.

Int. J. of Business and Globalisation to publish expanded papers from Int. Conference on Research and Entrepreneurship

Extended versions of papers presented at the International Conference on Research and Entrepreneurship (5-6 January, 2016, Gujarat, India) will be published by the International Journal of Business and Globalisation.

Automated detection of early schizophrenia

The opinion of a qualified professional is unlikely to be replaced by a computer algorithm for the diagnosis of schizophrenia. However, additional medical evidence based on such an algorithm might be useful in early diagnosis, according to work published in the International Journal of Intelligent Systems Technologies and Applications.

Pawan Kumar Singh and Ram Sarkar of the Department of Computer Science and Engineering, at Jadavpur University, in West Bengal, India, explain how expert systems, usually reserved for problem solving, might also be useful in medical diagnostics, particularly in psychiatry. They explain how schizophrenia is such a complex and debilitating mental disorder with a wide spectrum of symptoms, reflecting cognitive, emotional, perceptual disturbances as well as problems with motor processes.

As such, it is usually a complete psychiatric examination that is used in diagnosis. However, an expert system that could spot the early onset of disparate symptoms might lead to a more timely referral for a patient and allow treatment to be offered sooner rather than later to the benefit of the patient and any carers involved in their welfare.

The team explains that AI (artificial intelligence) computer programs that achieve expert-level competence in solving problems by bringing to bear a body of knowledge about specific tasks are called knowledge-based or expert systems (ES). An ES comprises two main components: a knowledge base containing facts from a particular field and a reasoning, or inference, engine that uses logical relations to process inputs by working with the information in the knowledge base. The initial studies help process reported and identified symptoms, such as delusion, hallucinations, compulsions, poverty of speech, catatonia, inability to cope with minor problems and many more.

“Treatment of schizophrenia depends largely on medications and on psychosocial interventions,” the team emphasizes. “No single approach is widely considered effective for all patients,” they add. An expectation of recovery from schizophrenia is a concept that has evolved to a remarkable degree during the past century or so but the earlier the diagnosis the better.


Singh, P.K. and Sarkar, R. (2015) ‘A simple and effective expert system for schizophrenia detection‘, Int. J. Intelligent Systems Technologies and Applications, Vol. 14, No. 1, pp.27-49.

Original article: Automated detection of early schizophrenia.
via Science Spot » Inderscience http://ift.tt/1MkbCHg

4 November 2015

Inderscience journals to publish expanded papers from International Symposium on Big Data and Cloud Computing Challenges

Extended versions of papers presented at the the 3rd International Symposium on Big Data and Cloud Computing Challenges (10-11 March 2016, Chennai, India will be published by the following journals:

Call for papers: "Big Data-oriented Science, Technologies and Applications"

For a special issue of the International Journal of Computational Science and Engineering.

With recent advances in information and communication technologies, it is critical to improve the efficiency and accuracy of modern data processing techniques for information analysis and information services. The past decade has witnessed the tremendous technical advances in sensor networks, Internet/Web of Things, cloud computing, mobile computing, spatial/temporal data processing that have led to the coming of big data era.

Big data is an emerging paradigm applied to datasets whose size is beyond the ability of commonly used software tools to capture, manage and process the data within a tolerable elapsed time. The datasets of big data are often from various, heterogeneous and unstructured sources such as social media, sensors, scientific applications, surveillance, video and image archives, Internet texts and documents, medical records, business transactions and web logs. Furthermore, big data is of high value to and establishes trust for business decision-making.

Big data has presented new challenges for data processing techniques. Various technologies are being explored to support the handling of big data, such as massively parallel processing databases, scalable storage systems, cloud computing platforms and MapReduce. Big data is more than simply a matter of size; and it is an opportunity to find insights in new and emerging types of data and content, to make business more agile, to acquire intelligence and to realise more intelligent applications.

This special issue will present the emerging issues in the research of big data management and analysis for intelligent applications. Original and research articles are solicited in all aspects including theoretical studies, practical applications and experimental prototypes.

The issue will carry revised and substantially extended versions of selected papers presented at IIKI2015and COINFO2015, but we also strongly encourage researchers unable to participate in the conferences to submit articles for this call

Suitable topics include, but are not limited to, the following:
  • Big data management and frameworks
    • Database and web applications
    • Federated database systems
    • Distributed database systems
    • Distributed file systems
    • Distributed storage systems
    • Knowledge management and engineering
    • Massively parallel processing (MPP) databases
    • Novel data models
    • Data preservation and provenance
    • Data protection methods
    • Data integrity and privacy standards and policies
    • Novel data management methods
    • Crowdsourcing
    • Stream data management
    • Scientific data management
  • Models and fundamentals of big data
    • Novel computational methodologies
    • Algorithms for enhancing data quality
    • Models and frameworks for big data
    • Graph algorithms and big data
    • Computational science
    • Computational intelligence
    • Conversion of data to information
    • Conversion of data to knowledge
    • Data mining
    • Information mining
    • Predictive analytics
    • Knowledge discovery
    • Cloud computing
    • Databases and information integration
    • Signal processing
    • Natural language processing
    • Information retrieval methods
    • Information visualisation
  • Big data analysis and algorithms
    • Data and information fusion
    • Algorithms
    • Simulation and modelling
    • Data-intensive computing
    • Parallel algorithms
    • Testing methods
    • Multidimensional big data
    • Multi-linear subspace learning
    • Sampling methodologies
    • Streaming
  • Infrastructures for big data
    • Cloud-based infrastructures (applications, storage and computing resources)
    • Grid and stream computing for big data
    • High-performance computing, including parallel and distributed processing
    • Autonomic computing
    • Cyber-infrastructures and system architectures
    • Programming models and environments to support big data
    • Software and tools for big data
    • Big data open platforms
    • Emerging architectural frameworks for big data
    • Paradigms and models for big data beyond Hadoop/MapReduce
  • Big data applications
    • Multimedia and big data
    • Social networks
    • Web search and information extraction
    • Scalable search architectures
    • Cleaning big data (noise reduction), acquisition and integration
    • Visualisation methods for search
    • Time series analysis
    • Recommendation systems
    • Graph-based search and similar technologies
    • Big data as a service
    • Big data analytics in e-government and society
    • Applications in science, engineering, healthcare, visualisation, business, education, security, humanities, bioinformatics, health informatics, medicine, finance, law, transportation, retailing and telecommunication
    • Search-based applications
  • Security and privacy of big data
    • Cryptography
    • Threat detection using big data analytics
    • Privacy threats of big data
    • Privacy-preserving big data collection
    • Intrusion detection
    • Socio-economical aspect of big data in the context of privacy and security

Important Dates
Submission of manuscripts: 15 April, 2016
Notification to authors: 31 May, 2016
Final versions due: 31 July, 2016

3 November 2015

Scientists defrauded by hijacked journals

Scientific progress is being hindered by the emergence of a relatively new kind of fraud – the hijacked scientific journal, according to researchers from Iran and Poland. They describe the problem and its detrimental effects on science in the International Journal of Technology Enhanced Learning.

Mehdi Dadkhah of the Foulad Institute of Technology, in Isfahan and Tomasz Maliszewski of the Pomeranian University in Slupsk explain that hijacked journals are launched by fraudsters purely for financial gain. These journals deceptively steal the names and numbers of reputable, but perhaps less well known journals and charge authors publication charges under the pretext of being an open access publisher, but they are not authentic.

The issue has been raised by researchers before, with the first hijacked journal detected in 2012. However, say Dadkhah and Maliszewski, has not been widely recognised as a serious problem until now as the numbers of authors being duped by hijacked journals climbs. In one sense, the propositions to authors that come from these fraudulent journals is akin to the “phishing” attacks most of us receive in malicious emails that claim to be from our bank, retailers or other online organisations. Despite their being lists of exposed journals new ones appear on a daily basis ready to dupe the unwitting scientist keen to publish in what they assume is a legitimate journal.

One of the major knock-on effects of these journals is not only that the careers of individual scientists can be affected negatively, but the international scientific ranking of a whole nation could be downgraded as more hijacked journals are exposed. The team emphasises that many scientists are now aware of so-called predatory journals. They point out that, “There is a significant difference between them…hijacked journals are not academic journals at all, they use fake websites to make their fake journals appear authentic.” These journals are a sham and not to be confused with those that are simply aggressive in their commissioning of paying authors having piggybacked on the current publicity surrounding open access journals.

With increasing pressure on academics to perform well in the scientific literature it is obvious that the inexperienced or naive might be tempted by a flattering email from what they see as a genuine journal only to discover later that they were duped and their hard-earned grant money is lost. Given that there are 170 countries ranked in Group E in terms of scientific performance based on their publication record. The existence of hijacked journals can only exacerbate this problem. The message needs to be spread widely to the academic community and beyond.


Dadkhah, M. and Maliszewski, T. (2015) ‘Hijacked journals – threats and challenges to countries’ scientific ranking’, Int. J. Technology Enhanced Learning, Vol. 7, No. 3, pp.281–288.

Original article: Scientists defrauded by hijacked journals.
via Science Spot » Inderscience http://ift.tt/1Q8ChIE

2 November 2015

Inderscience is media partner for Inheriting the City: Advancing Understandings of Urban Heritage

Inderscience is a media partner for Inheriting the City: Advancing Understandings of Urban Heritage (31 March - 4 April 2016, Taipei City, Taiwan).

The journals involved are:

Call for papers: "Innovative Mobile Technology"

For a special issue of the International Journal of Image Mining.

This special issue aims to address mobile computing, and will mainly target mobile developers, professionals, industrial experts, students and professors. Mobile computing is currently one of the most cutting edge technologies. A person without a mobile device is unimaginable today.

The major challenges in the area of mobile computing relate to its operability in wireless mediums. This special issue will serve as a highly selective, premier international forum addressing networks, systems, algorithms and applications that support mobile computers and wireless networks.

The issue will carry revised and substantially extended versions of selected papers presented at the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC 2016), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

Suitable topics include, but are not limited to, the following:
  • Mobile internet and broadband networks
  • Mobile VAS, mobile Commerce and OTT content services
  • Mobile data security
  • Migration, integration and convergence towards 5G Wi-Fi, LTE, 3GPP, heterogeneous networks
  • Personal wireless communications beyond 5G
  • Mobile/ad hoc wireless networks, mobicast, sensor placement, target tracking
  • MAC for mobile ad hoc networks
  • MAC in 4G and future mobile networks
  • Multiple access techniques
  • Wireless broadcasting, multicasting, geo-casting, streaming and routing
  • Wireless network security and privacy
  • Cognitive radio applications and algorithms for 5G mobile networks
  • Green computing in networking and mobile computing and clouds
  • Mobile big data computing models
  • Mobile cloud security architectures, security policy enforcement, service models (e.g. BYOD, secure offloading, access control, trust platform, and e-commerce models, etc.)
  • Mobile big data computing models
  • Mobile cloud infrastructure and service models
  • Enabling technologies
  • Hybrid versus native applications
  • Application and system security
  • The mobile role in the context of the Internet of Things
  • Mobile apps connected to wearable devices
  • Innovative mobile, mobile sensing, and mobile crowd sourcing apps
  • Tools for building and measuring mobile systems
  • Innovative wearable or mobile devices
  • Data management for mobile applications
  • Infrastructure support for node mobility
  • Operating systems for mobile devices
  • Support for mobile social networking and mobile web
  • Security and privacy in mobile systems
  • Systems for location and context sensing and awareness
  • Mobile computing support for pervasive computing
  • Cyber foraging and resource discovery for mobile systems
  • Algorithms and modelling for tracking and locating mobile users
  • OS and middleware support for mobile computing and networking
  • Architectures, protocols and algorithms to cope with mobile and wireless networks
  • Resource management in mobile, wireless and ad-hoc networks
  • Cryptography, security and privacy of mobile and wireless networks
  • Data management in mobile and wireless computing
  • Distributed algorithms of mobile computing
  • Service creation and management environments for mobile/wireless systems
  • Energy-saving protocols for ad hoc and sensor networks
  • Synchronisation and scheduling issues in mobile and ad hoc networks
  • Information access in wireless networks
  • Wireless and mobile issues related to OS
  • Mobile ad hoc and sensor networks
  • Wireless multimedia systems
  • Mobile applications, location-dependent and sensitive applications

Important Dates
Submission of manuscripts: 12 June, 2016
Notification to authors: 25 July, 2016
Final versions due: 1 August, 2016

Research Picks – November 2015

Who clicks ads?
As ad-blocking plugins become more and more popular among web users, whether on their desktops or tablets and phones, the advertising industry and the commercial world it serves is increasingly concerned for a future of lost revenue and lost sales. As such understanding what makes users (who aren’t using ad-blocking software) click particular advertisements is increasingly important. US researchers have now taken a new approach to understanding click-through of online banner ads as rates continue to decline. The team’s models offers new insights for the practical design and implementation of more enticing banner ads that will be increasingly important to websites, and app designers.
Idemudia, E.C. and Jones, D.R. (2015) ‘An empirical investigation of online banner ads in online market places: the cognitive factors that influence intention to click’, Int. J. Information Systems and Management, Vol. 1, No. 3, pp.264–293.

Safer mobiles
Among the most popular and well-known operating systems on mobile devices, such as smart phones and tablet computers, is Android. Android is currently developed by Google and at its core is based on the Linux operating system. All operating systems face security issues such as the possibility of being “infected” with computer viruses. There are many “antivirus” programs a user might run on their device, but while this may protect the device from some problems it comes at a cost in terms of usability of the device as the antivirus software must use the device’s resources to run, which ultimately means reduced battery life and less computer power available for other applications. Researchers in China have now devised a new approach to detecting malware based on “permission” requests made to the Android operating system by a newly installed application that reduces amount of computing power the antivirus software would need as well as cutting the number of false positives significantly.
Liu, Z., Lai, Y. and Chen, Y. (2015) ‘Android malware detection based on permission combinations’, Int. J. Simulation and Process Modelling, Vol. 10, No. 4, pp.315–326.

A flight of fancy
Airport connectivity can be better understood in terms of two newly introduced metrics – average shortest travel time and average highest path velocity – according to German researchers. Their approach to assessing connectivity on the global scale is an important factor for passenger transport and air freight logistics. These two new indicators sidestep some of the limitations of earlier metrics and should provide public institutions and airport operators with information on the connectivity of airports and regions. Conversely, airlines may use the indicators to highlight their individual contribution to the connectivity of an airport or city by their presence. The research could help inform companies, planners and policymakers. Moreover the same approach might be equally application to other logistical chains and transport systems.
NieƟe, H. and Grimme, W. (2015) ‘How to measure airport connectivity? – average shortest travel time and average highest path velocity as indicators’, Int. J. Aviation Management, Vol. 2, Nos. 3/4, pp.226–240.

A nose for a smell
The artificial nose that could be used in the food and drinks industry, in perfumery, even in the detection of explosives and illicit drugs has been the focus of analytical science for many years. Now, a team in India has developed a pattern recognition system that handles the outputs from an array of gas detectors – tin oxide semiconductor devices – to mimic the way the human olfactory system works and so identify different odours effectively. Proof of principle has been successfully carried out with some well-known and common chemical compounds – benzene, acetone and ethanol at different low levels of concentration.
Sharma, V. and Panchariya, P.C. (2015) ‘Experimental use of electronic nose for odour detection’, Int. J. Engineering Systems Modelling and Simulation, Vol. 7, No. 4, pp.238–243.

Original article: Research Picks – November 2015.
via Science Spot » Inderscience http://ift.tt/20m9fd3