This special issue aims to highlight the application of revenue management practices to analysing consumption and investment behaviour. Today there are tremendous opportunities to explore the rationale behind consumption and investment behaviour in the discipline of revenue management.
Since the application of revenue management practices to predicting consumer behaviour and to explaining consumer investment behaviour in equity and real estate markets in an Asian context are recent research trends, this issue seeks to publish high-quality papers that help promote revenue management practices with a focus on Asian consumer and family behaviour. Papers that are the joint work of practitioners and academicians are particularly welcome.
Machine learning through computer systems, which propagates from network to network, is at the heart of computer intelligence. Machine learning is the key to simplifying the definition of a problem-solving platform. Basically, it is a mechanism for pattern search and building intelligence into a computer (e.g. machine) to be able to learn, implying that it will be able to do better in the future from its own experience.
This special issue aims to present machine learning research pertaining to the Internet of Things (IoT). Machines learning from IoT devices, networks and data, in particular to detect and unveil possible hidden structures and regularity patterns associated with their generation mechanism, is important. This issue will promote analysis and understanding of the nature of the machine learning data, which can be used to make predictions for future decisions and actions for computer processing. Its objective is to develop and publish efficient algorithms for designing models and analysis for machine learning prediction and to present research on how to analyse data for such applications in a way that meets demands for algorithms to be computationally efficient and at the same time robust in their performance.
Today, medical imaging becomes a crucial part of the medical management of diseases. Biomedical imaging has undergone rapid technological advancements over the last several decades and has seen the development of many new applications. New techniques have been gaining recognition in areas ranging from basic research to clinical applications, and from the cellular level to the whole-organ level. It is an interdisciplinary field that requires teamwork among biologists, medical physicists, computer scientists, biomedical engineers and clinicians of all specialities.
At the same time, issues like radiation during diagnostics seriously affect the human body. The higher the dose of radiation delivered at any one time, however, the greater the risk of long-term damage. If a patient receives repeated doses, harm can also occur from the cumulative effect of those multiple doses over time. Conversely, using insufficient radiation may increase the risk of misdiagnosis, delayed treatment, or, if the initial test is inadequate, repeat testing with the patient exposed to even more radiation.
The purpose of this special issue is to publish original, high-quality papers on innovative research and development in the analysis of medical imaging and issues in medical imaging.
Numerous technologies (e.g., clouding computing, big data, deep learning, Internet of Things, social media, multicore, and mobility) and their applications are changing our daily life. For these technologies, computer science constructs a solid foundation. It is also one of the most important driving forces behind these technologies. With the rapid growth of computer science related technologies, this change is continuously moving forward.
This special issues aims to explore future trends and applications in computer technologies.
The issue will carry revised and substantially extended versions of selected papers presented at The International Computer Symposium 2016, but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.
Suitable topics include, but are not limited to, the following:
Algorithms, bioinformatics, and computation theory
Artificial intelligence and machine learning
Computer architecture, embedded systems, VLSI/EDA, and applications
Computer networks, web service technologies, and software defined networking
Cryptography and information security
Database, data mining, big data, and information retrieval
Image processing, computer graphics, and multimedia
Information literacy and social media
mobile computing and wireless communications
High-performance computing, parallel processing, and cloud computing
Cyber-physical system and Internet of Things
Wearable computing for smart services
Green systems and applications over next generation network
Submission of manuscripts: 28 February, 2017
Notification to authors: 1 June, 2017
Final versions due: 31 July,, 2017
The performance of vehicle noise, vibration and harshness (NVH) has become an important evaluation index of the product research and development for automobile enterprises, and also a core concern for consumers. Vehicle noise and vibration problems are unfriendly to the environment and would degrade ride and comfort of the occupant dramatically, moreover statistical results show that about one third of vehicle component faults are related to vehicle NVH problems.
The research about vehicle NVH always combines simulation method and test technology. The theories and methods of modelling include the lumped parameters, multi-body dynamics, finite element, mode synthesis, boundary element, statistical energy analysis method etc. By these methods, mechanisms of NVH problem and its suppressing measures can be analysed systematically, while test technologies have been developed and generally used to verify simulation results and the validity of those measures.
This special issue aims at providing a platform intended to present emerging ideas of accurate and rational modelling method, mechanism analysis, suppressing method and subjective-objective evaluation method of vehicle NVH problems.
Suitable topics include, but are not limited to, the following:
Air noise, electromagnetic noise
Mechanical noise (gear noise, tyre noise, brake noise, etc.)
Sound quality and its quantitatively objective evaluation
The advanced methods of test, data acquisition and processing
Suppressing measures of noise and vibration: vibration isolation or elimination components/optimisation/control/prediction
Prof. Xun Chen from Liverpool John Moores University in the UK has been appointed to take over from Prof. Jun Wang as Editor in Chief of the International Journal of Abrasive Technology. Prof. Wang will remain with the journal as Honorary Chief Editor.
German researchers have developed a paper identification system that could be used to sort recycling materials into different types and grades of paper one of the most pressing issues facing modern recycling facilities. The system could use 26 different characteristics of a paper sample, including, weight, colour, texture, the presence of optical brighteners to classify papers. However, the team found that analysing just six of ten classifiers was sufficient to achieve 94 to 100% accuracy in automatically distinguishing between newspapers, magazines, advertisement, white office papers, grey office papers, and brown corrugated board. There is still room for improvement for other categories and the team is working towards that.
Gottschling, A. and Schabel, S. (2016) ‘Pattern classification system for the automatic analysis of paper for recycling’, Int. J. Applied Pattern Recognition, Vol. 3, No. 1, pp.38–58.
A low-cost and non-proprietary approach to authenticating and validating a VoIP (voice over Internet Protocol) communication has been developed by Italian researchers. The system ensures that both correspondents in a conversation can be sure of each other’s identity and neither can erroneously or fraudulently interfere with the ongoing transaction or alter the communication afterwards without the other knowing. The system would be inexpensive to implement and is built on existing open and standard technologies. The non-repudiation of this form of communication now makes the use of VoIP suitable for business and sensitive transactions that might not have previously lent themselves to this technology, opening up connections where conventional telephonic infrastructure was too expensive, unreliable or unavailable but where the internet can be accessed.
Cattaneo, G., Catuogno, L., Petagna, F. and Roscigno, G. (2016) ‘Ensuring non-repudiation in human conversations over VoIP communications’, Int. J. Communication Networks and Distributed Systems, Vol. 16, No. 4, pp.315–334.
Drunk in charge
New research from China confirms that the gradual increase in alcohol (ethanol) concentration in the bloodstream has distinct phases of adverse effect on driving capacity. Zero alcohol intake is a baseline, medium consumption leads to a state in which drivers are more timid but high consumption leads to generally more aggressive driving, less consistent lane discipline and abrupt manoeuvres not seen in the control group, according to the team. This study clarifies the levels at which certain quantities of alcohol per kilogram of body weight begin to cause drivers to behave dangerously. “The study on driver behaviour plays an important role on constructing the early warning model, so as to put forward the corresponding intervention measures of unsafe driving behaviour and improve vehicle safety in reducing accidents due to drinking and/or drunk driving on public roads”, the team concludes.
Chen, H., Zhang, G., Chen, R., Chen, L. and Feng, X. (2016) ‘Comparison of driving performance during the blood alcohol concentration ascending period and descending period under alcohol influence in a driving simulator’, Int. J. Vehicle Safety, Vol. 9, No. 1, pp.72–84.
A ton of feathers and a ton of soil
Feathers are mostly composed of the fibrous protein keratin, the same substance that makes up animal hair, nails, hooves, and scales. Its strength and resilience make feathers a difficult by-product of the poultry industry to deal with. Now, researchers in India have collected soil samples from sites where feathers have been dumped in the hope of finding bacteria that can degrade this waste or perhaps convert it into a biomaterial that might be more useful than plucked feathers. Of various strains tested, one emerged that uses the enzyme keratinase to hydrolyse keratin, Bacillus cereus. This microbe could completely degrade feathers within three days and so might be useful as a biological agent for waste remediation from this industry.
Rajesh, T.P., Rajasekar, S., Karthick Hari Mathan, R. and Anandaraj, B. (2016). ‘Isolation and identification of feather degrading bacteria from feather-dumped soil’, Int. J. Environment and Sustainable Development, Vol. 15, No. 3, pp.293–299.
via Inderscience – Science Spot http://ift.tt/29SzfKM
The inaugural issue of the International Journal of Export Marketing was presented this year at theAcademy of Marketing Conference 2016 at the Newcastle Business School of Northumbria University in the UK. This is the main annual event for the Academy of Marketing and 290 articles were presented. There were 25 different tracks in the marketing field and more than 400 participants. The event is generally considered as the major conference in marketing science. The journal's inaugural issue was presented in the special session 'Meet the Editors', and a stand displayed copies of the inaugural issue and the journal's webpage.
The global liner shipping industry has been built on a sophisticated network of containerised cargo traffic with scheduled services around the world. In comparison to other shipping segments and to other modes of transport, the liner sector has been growing rapidly and has shown a significant degree of innovation in new systems and equipment to reduce costs and externalities (e.g. carbon footprint, noise). The growth of the industry has been characterised by a gradual increase in the size of ocean-going containerships, mostly as a consequence of scale economies and the impact of megacarriers on the global transport systems and has been the subject of extensive academic and industry debates. The sector has also traditionally been characterised by an unusual competition regime that has evolved in the last decade to rely on alliances and new institutional players. The changes in the sector organisation, combined with the introduction of new technologies, are likely to have considerable impact on developing countries and new markets, the geography of transport and on the development in other transport modes, among others. While the traditional bulk shipping business can be said to have reached maturity to some degree, liner shipping is still developing, innovating and redesigning itself.
The development of the liner-shipping sector is strongly connected to the hinterland side of container transport, including container terminals, freight forwarding business and supply-chain management in general. Major carriers have also expanded in the logistics and terminal operation businesses to optimise the entire cargo flow and gain cost-leadership and strengthen their market position. In addition to its traditional business and customer profile, liner shipping spills over the general cargo market and attracts new customers with its low-cost, unitised and speed service advantages.
Shoulder surfing can be a serious security and privacy concern for the naive internet user, logging in at a cybercafé, airport or even their place of work, where a glance at their computer screen, tablet or other mobile device could reveal to a third party the sites they are visiting, the subjects they are searching for or even their login details. New research published in the International Journal of Trust Management in Computing and Communications, offers “HoneyString” an alternative to a honey trap to protect unwary users.
Nilesh Chakraborty and Samrat Mondal Department of Computer Science and Engineering, Indian Institute of Technology Patna, explain that there are screen protectors, browser plugins and other approaches that can be used to protect users from shoulder surfers. The physical systems reduce the viewable angle of an LCD or LED screen, while plugins attempt to camouflage what is being displayed but require the user to have a pair of spectacles with red lenses, for instance.
With HoneyString, the team hopes to reduce the need for user intervention in protecting themselves. Where a username and password or PIN are to be entered on a devices, the HoneyString approach asks the user for input, such as 3rd letter, number or other character of the password, 1st, 5th, then another until a sufficient portion of the password or PIN is completed. This way the casual crowd surfer, not knowing the password in advance, obviously, would not be able to easily see what is being entered at a specific point in the process nor what the prompt was. The HoneyString approach overcomes earlier protection methods known as tag digit-based schemes. In addition to requesting characters from the actual password be entered sequentially at a given prompt, interspersed among those characters are prompts for banal letters from string of characters unrelated to the password, the HoneyString.
For example, if the password is “(pUrput4” and the HoneyString is “bAcb7*”, the HoneyString prompt might ask the use to enter the second character from the password – U – then the third character from the honeytrap word – c – and so on until the password is sufficiently complete. The protection only needs to obfuscate the real password from someone attempting to view the user’s screen from over their shoulder, as it were. The system would suit ATM, automated teller machine, security as well as PIN entry for mobile and other devices.
If the shoulder-surfing attacker has noted the responses they will not be able to login elsewhere at their leisure because they will have some characters from the password but not necessarily in the correct order interspersed with HoneyString characters too. The new HoneyString prompts will be different in all subsequent sessions and because the attacker never actually gained access to the complete password in the first place, they will fail to complete the login successfully.
The team points out that the HoneyString system is simple to use and does not extend login time too much, but prevents third-party and malicious access to the account into which the user is logging in.
Critical infrastructures are vital assets for public safety, economic welfare and the national security of countries. Vulnerability of critical infrastructures have increased with widespread use of information technologies.
Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, cyber security of critical infrastructures have become an agenda item for the academics, practitioners and policy makers. Hitherto cyber security studies showed that a holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively
In this special issue, both research and practical aspects of cyber security considerations in critical infrastructures are of interest. Aligned with the interdisciplinary nature of the cyber security, authors from academia, government, and industry are welcome to contribute.
Suitable topics include, but are not limited, to the following:
Cyber security for critical infrastructures including health and banking systems
Security of the smart grid
Security of supervisory control and data acquisition (SCADA) systems
Cyber security of complex and distributed critical infrastructures
Cyber security of industrial control systems
Cyber security modelling and simulation
Cyber threat modelling and analysis
Visual analytics and risk management techniques for cyber security
Cyber security test beds, tools, and methodologies.
Cyber security engineering
Human awareness and training
Network security and protocols
Security, privacy and legal issues of big data and the internet of things
Cyber threat intelligence
Attack modelling, prevention, mitigation, and defence
Cyber-physical systems security approaches and algorithms
Critical infrastructure security policies, standards and regulations
Vulnerability and risk assessment methodologies for distributed critical infrastructures
Simulation and test beds for the security evaluation of critical infrastructures
The possibility that firms can develop a competitive edge over rivals by investing in social initiatives has been made increasingly likely over recent years by changes in consumer behaviour and policy choices towards society. The International Journal of Corporate Strategy and Social Responsibility fosters discussion on unresolved theoretical and empirical issues relating to the strategic implications of CSR and acknowledges that analysis of these implications can be hampered by cross-cultural differences. This perspective recognises the role of a firm's value chain in attaining competitive advantage through CSR.
The integration of artificial intelligence and robotic technologies has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide. It is foreseeable that artificial intelligence will be the main approach of the next generation of robotic research. The explosive number of artificial intelligence algorithms and the increasing computational power of computers has significantly extended the number of potential applications for robotic technologies. It has also brought new challenges to the artificial intelligence community. The aim of this special issue is to provide a platform to share up-to-date scientific achievements in this field.
Modern systems are becoming more sophisticated but traditional analytic- and numeric-based methods have sufficed until now, frequently simplifying problems to allow analytical tractability. To deal comprehensively with the new systems, a wide range of intelligent methodologies and techniques (including intelligent algorithms of computation, optimisation, control and system theory) are increasingly required. The International Journal of Computational Complexity and Intelligent Algorithms aims to become a leader in the exciting field of computational intelligence theory and its applications, with the emphasis on analysis and measurement of computational complexity.
Adolescent online social relationships
Social relationships on the internet have a lot in common with adolescent social relationships, researchers from Spain report, adding that such relationships are fluid, indefinite, confused, always under construction, not anchored, fixed or lasting; they are power struggles but without domination. Moreover, the relationships may even be perceived as a game, albeit often a serious one. Unlike a story, online activity is ongoing and discontinuous, interminable dialogue. The team’s study of Spanish adolescents shifts the sociological interest from understanding what adolescents do in this online space and its consequences to the problem of what this artefact formally imposes on communication and on their relationship interests.
Callejo, J. and Gutiérrez, J. (2016) ‘Social networks: dialogic artefacts’, Int. J. Society Systems Science, Vol. 8, No. 2, pp.99–113. Facial recognition by ear
Given that our facial expressions change, face recognition software must have the ability to cope with the movements of our eyebrows and mouths for instance. Now, researchers in Poland have added ears to the biometric mix in order to improve accuracy and efficiency of 3D facial recognition when different facial expressions are being presented to the system. When strong facial expressions are being presented, the addition of characteristics of a person’s ears can boost efficacy reducing the equal error rate so that it does not exceed 6.25% percent. Particularly effective, the team says is to combine powerful conventional 3D face recognition with analysis that includes their ear recognition algorithm.
Krotewicz, P. (2016) ‘Novel ear-assisted 3D face recognition under expression variations’, Int. J. Biometrics, Vol. 8, No. 1, pp.65–81. Whistle while you work…or not
People stay “on task” and work more effectively if they listen to pleasant music relative to control groups working with no music. However, if unpleasant music is played while they work, heart rate and other cardiovascular measures rise and they make errors in the task. Heart and breathing rate are found to be lower in those working while listening to pleasant music. Other biometrics that were recorded in the experiments were blood oxygen saturation and arterial pressure. Of course, the difficulty in applying such research to the workplace is that people have different tastes in music.
Geethanjali, B., Adalarasu, K., Jagannath, M. and Rajasekaran, R. (2016) ‘Influence of pleasant and unpleasant music on cardiovascular measures and task performance’, Int. J. Biomedical Engineering and Technology, Vol. 21, No. 2, pp.128–144. Going viral
Marketers would really like to know what factors makes an online update, graphic, video or other digital entity “go viral”, what factors lead to the mass sharing of such an entity that can lead to huge numbers of potential customers or clients seeing the clip or information and perhaps even buying or signing up for a product or service with which it is associated. Unfortunately, despite many years of searching for a formula that would contrive to make an update go viral, nothing has yet been found that works reliably and repeatedly. However, researchers in Germany have now delineated the psychological principles and find seven specific concepts that might work together to make the chances of a given digital entity being a viral hit.
Wolter, J., Barth, V., Barthel, E-M., Gröbel, J., Linden, E., Wolf, Y. and Walther, E. (2016) ‘Inside the host’s mind: psychological principles of viral marketing’, Int. J. Internet Marketing and Advertising, Vol. 10. Nos. 1/2, pp.54–89.
via Inderscience – Science Spot http://ift.tt/29afZpR