22 May 2019

Mowing the astroturfers

A grassroots movement is one that emerges and evolves naturally, growing new support as it does so. “Astroturfing” is the opposite of that. It is a movement support for which is bought and paid for. It has the look of a grassroots movement, but a closer inspection reveals it to be fake. Now, writing in the International Journal of Web and Grid Services, Australian computer scientists have surveyed the techniques available to detect astroturfing on the internet. The term derives from the synthetic green grass – AstroTurf – often used in sports arenas and public areas as an alternative to living turf.

Syed Mahbub and colleagues at La Trobe University, in Melbourne, explain that astroturfing represents a significant threat in the business world, in politics, public health, and many other realms. Fake support for a controversial system, product, or service can persuade unwitting observers and stakeholders of merit, where no merit is due. This can have dire consequences for genuine political candidates in an election, for instance, or for sales of better rival products, and adoption of systems and services that are in reality better than the astroturfed ones. Political blogs, news portals, and review websites are carpeted with Astroturf to the detriment of everyone but the astroturfers and their associates.

At its most mundane, astroturfing might lead to someone buying a, perhaps inferior, green widget from company A in preference to the better blue widget from Company B. At the other extreme, one might see a politician achieve election success where support has been entirely faked and the electorate duped into disregarding the genuine candidate.

Researchers in social media, e-commerce, and politics, are looking to find detection methods for spotting astroturfing. Mahbub and colleagues point out that there are content analysis techniques, individual and group identification techniques, linguistic feature analysis, authorship attribution techniques, and machine learning all being used with varying degrees of success to detect astroturfing.

“Astroturfing, in the present world, is a global phenomenon,” the team writes. “The magnitude of its effect is significantly threatening the integrity and consistency of information we receive from the internet. Thus, the prevention and detection of astroturfing demand more attention from the research community.” Their research paper offers researchers a taxonomy of those detection techniques that might help in the development of better approaches to the detection of this insidious problem.

Mahbub, S., Pardede, E., Kayes, A.S.M. and Rahayu, W. (2019) ‘Controlling astroturfing on the internet: a survey on detection techniques and research challenges’, Int. J. Web and Grid Services, Vol. 15, No. 2, pp.139–158.

21 May 2019

Special issue published: "Advancements in High-Level Parallel Programming Models for Edge/Fog/in-Situ Computing"

International Journal of Grid and Utility Computing 10(3) 2019

  • HPSM: a programming framework to exploit multi-CPU and multi-GPU systems simultaneously
  • An efficient pathfinding system in FPGA for edge/fog computing
  • A network coding protocol for wireless sensor fog computing
  • A dataflow runtime environment and static scheduler for edge, fog and in-situ computing
  • An optimised dataflow engine for GPGPU stream processing
Additional papers
  • Enriching folksonomy for online videos
  • A web platform for oral exam of programming class
  • Involving users in energy conservation: a case study in scientific clouds
  • Distributed and multi-core version of k-means algorithm

Free sample articles newly available from International Journal of Migration and Border Studies

The following sample articles from the International Journal of Migration and Border Studies are now available here for free:
  • Borderzones and the politics of irregularisation: the Interim Federal Health Program and Toronto's everyday places of healthcare
  • Capital is key: a case for migrants' cultural capital
  • Proliferating borders and precarious queers: migrant justice organising beyond LGBT inclusion
  • Immigrants or children? The expulsion of unaccompanied minors from two California towns
  • A visible geography of invisible journeys: Central American migration and the politics of survival
  • The ambiguous architecture of precarity: temporary protection, everyday living and migrant journeys of Syrian refugees
  • The Mexico-Canada border: extraterritorial border control and the production of 'economic refugees'
  • Luxury limbo: temporal techniques of border control and the humanitarianisation of waiting

New Editor for International Journal of Microstructure and Materials Properties

Prof. ZhengMing Sun from Southeast University in China has been appointed to take over editorship of the International Journal of Microstructure and Materials Properties.

Press release: "Switching on electric vehicles has health benefits"

Could the health benefits and reduced costs to healthcare systems be enough to justify subsidizing charging infrastructure to allow society to switch from the internal combustion engine to electric vehicles faster than current trends predict?

Writing in the International Journal of Electric and Hybrid Vehicles, Mitchell House and David Wright of the University of Ottawa, Canada, suggest that the migration from polluting vehicles that burn fossil fuels to electric vehicles, ideally using electricity generated sustainably could significantly reduce the incidence of cardiopulmonary illness due to air pollution. This would lead not only to less employee absence from work through illness but also lead to broad improvements in quality and length of life.

The team’s paper compares the financial costs of building electric vehicle charging infrastructure using empirical data with health costs to see if there is a net benefit. They have found that in the majority of plausible scenarios of balanced growth, when the number of vehicles rises and so does the number of charging stations, there is a positive net benefit to society.

“Since health benefits accrue to governments, businesses, and individuals, these results justify the use of government incentives for charging station deployment and this paper quantifies the impact of different levels of incentive,” the team concludes.

The team explains that the Electric Vehicles Initiative (EVI) (an organization supported by 16 governments) has a target of 20 million electric vehicles by the year 2020. This was based on a notional growth rate of 75% per year defined in 2016. At that time, EV sales amounted to more than half a million (550000) worldwide in 2015, which represented growth of 70% on 2014. Electric vehicle sales have continued to grow, with 2017 and 2018 experiencing 61% and 64% year-over-year growth respectively.

Their results suggest that a 75% growth rate for electric vehicle uptake is not unrealistic. Moreover, in the face of anthropogenic climate change and the detrimental effects of health on pollution, some observers see the transition to electric vehicles as being a matter of serious urgency. This has to take into consideration the electricity generating mix from which the vehicles derive their power. If electricity is mostly supplied from power stations generating electricity by burning fossil fuels, including coal, gas, and oil, then many of the benefits are lost. This is particularly true in terms of climate impact at the global level but also in terms of sulfur oxide, nitrogen oxide, and particulate pollution. This has been witnessed in China, India, and Russia, as electricity demand has risen rapidly.

This latest study points out that governments have not been keen to support charging infrastructure due to a variety of industry players being involved and their responsibility to carry some of the cost. This would include electric utility companies who would profit directly from charging vehicles, out-of-town shopping centers that could attract more customers with charging points in their car parks, the manufacturers of vehicles and a new generation of “gas station” operators.

“The savings that can be achieved by 2021 are higher than the cost of installing charging station infrastructure over a wide range of scenarios,” the team writes. “These net benefits apply both to balanced growth in charging stations (in which the number of charging stations is proportional to the number of EVs) and also to rapid build out (in which charging stations are built over 2-4 years in order to achieve government EV targets for 2020 and 2025).” Ultimately, it is the reduced financial burden of a healthier populace that offsets the costs.

House, M.L. and Wright, D.J. (2019) ‘Using the health benefits of electric vehicles to justify charging infrastructure incentives’, Int. J. Electric and Hybrid Vehicles, Vol. 11, No. 2, pp.85-105.

17 May 2019

Research pick: Counting the crowd - "Crowd detection and counting using a static and dynamic platform: state of the art"

Visual surveillance of crowds is an important part of event management as well as policing. Now, a team from Malaysia and Saudi Arabia have looked at the various tools that have become available in recent years for automatically assessing the number of people in a crowd and determining the dynamics and movement of that crowd. Writing in the International Journal of Computational Vision and Robotics, the team finds several gaps in the current state-of-the-art technology and points developers to how those gaps might be filled.

Huma Chaudhry and Mohd Shafry Mohd Rahim of Universiti Teknologi Malaysia, Tanzila Saba of Prince Sultan University, Riyadh, and Amjad Rehman of Al Yamamah University, also in Riyadh, point out that computer vision research has moved towards crowd control and management in recent years with a view to addressing issues of security and safety when large numbers of people are gathered in one place. The fundamental problem that has to be addressed is how to manage multiple data streams from closed-circuit television (CCTV) and other sources that monitor crowd dynamics at events, in busy towns and cities and elsewhere. There a limit to how visual assessment of CCTV and so automated, computerised solutions are needed.

The team highlights some major events where there have been numerous casualties. Sometimes casualties at some events might be fewer than 100 people, but larger events might see thousands of casualties over a prolonged period. Automated crowd assessment could open up new ways t understand crowd dynamics and reduce those numbers. Some of the same insights from aerial crowd surveillance and other methods might also help in disaster relief activities where large numbers of people might be present in a given location.

Chaudhry, H., Rahim, M.S.M., Saba, T. and Rehman, A. (2019) ‘Crowd detection and counting using a static and dynamic platform: state of the art’, Int. J. Computational Vision and Robotics, Vol. 9, No. 3, pp.228–259.

16 May 2019

Research pick: "Have you got the right personality for Facebook?"

How do personality traits affect one’s use of the online social networking site, Facebook? That is the question researchers from Greece hope to answer in a paper in the International Journal of Internet Marketing and Advertising. The team surveyed 367 university students and analysed their answers concerning Facebook with the backdrop of different personality traits: extraversion, neuroticism, agreeableness, openness, and conscientiousness.

The team report that “agreeable individuals use Facebook to express their orientation to other people rather than to themselves,” whereas “extroverts use Facebook as a relationship building mechanism”. They add that neurotic people strive to bring out the best of themselves. Oddly, the personality traits of openness and conscientiousness do not seem to affect significantly Facebook use.

The bottom line is that extraversion is the main driver for Facebook use. Extroverts are heavy users and have more friends and interact with them and others at a higher rate. But, neurotic people also use it heavily to create a comprehensive and detailed profile of themselves to present to the public. There are limitations to the research in that those surveyed were students and some of them may well be aware of research into personality types and their use of social media, whereas the lay public would perhaps be less aware of such research. The obvious next step is to survey a wider group of people to reduce any inherent bias in the results.

Hatzithomas, L., Misirlis, N., Boutsouki, C. and Vlachopoulou, M. (2019) ‘Understanding the role of personality traits on Facebook intensity’, Int. J. Internet Marketing and Advertising, Vol. 13, No. 2, pp.99–119.

15 May 2019

Special issue published: "People Create Your Innovative Technology – How Do You Manage Them"

International Journal of Technology Management 79(3/4) 2019

  • Walking the innovation tightrope: maintaining balance with an ambidextrous organisation
  • Integrative leadership for technology innovation
  • How individuals perform customer knowledge absorption practices - a contextual approach to open innovation
  • Crafting better team climate: the benefits of using creative methods during team initiation
  • Organisational justice, emotional exhaustion, and turnover intention among Korean IT professionals: moderating roles of job characteristics and social support
  • Freedom-form organisations, innovation and quality of work life: towards a new model of interaction

First issue: International Journal of Agriculture Innovation, Technology and Globalisation (free sample issue available)

The International Journal of Agriculture Innovation, Technology and Globalisation provides a dynamic forum through which researchers can share agricultural research and thus aid innovation in education, business, community, environment and government. IJAITG proactively promotes the utilisation of technology in combination with business models to facilitate agriculture innovation in line with community entrepreneurship, which further helps accelerate agricultural development alongside industrial upgrading.

There is a free download of the papers from this first issue.

Newly announced journal: International Journal of Knowledge Science and Engineering

Knowledge has become an increasingly crucial resource that needs to be effectively managed and applied. Knowledge science and engineering is a rapidly growing multi- and interdisciplinary field that uses advanced computing to intelligently understand and solve complex problems in various emerging applications. The International Journal of Knowledge Science and Engineering promotes and stimulates research in this field, and explores the state of the art in all aspects of knowledge science and engineering, highlighting theories, techniques and methods of knowledge computing for various intelligent systems.

Research pick: Mortality and climate - "Exploring the link between climate variability and mortality in Sub-Saharan Africa"

Climate variability, which might arise through global warming or other factors has been shown to have an impact on mortality rates in sub-Saharan Africa, according to research published in the International Journal of Environment and Sustainable Development.

Baishali Bakshi of the Minnesota Pollution Control Agency, in St Paul, Minnesota, USA, Raphael Nawrotzki of Deutsche Evaluierungsinstitut der Entwicklungszusammenarbeit (DEval) in Bonn, Germany, Joshua Donato of Houston Engineering, Inc. In Maple Grove, Minnesota, and Luisa Silva Lelis of Universidade de Sao Paulo, Piracicaba, Brazil, explain how the persistence of high mortality rates in this region are stifling development and sustainable development in particular.

They have look at climate variables over the last half a century and more to see if climate patterns correlated with mortality rates. Any insights in this regard might then be returned to policymakers, healthcare, and education to find ways to ameliorate the effects and perhaps lower mortality rates and thence allow sustainable development to proceed without this intrinsic hindrance.

The team looked at elevated mortality in rural Kenya, Mali, and Malawi during the period 2008 to 2009 and then analysed this against climate variability at this time against a long-term climate normal period, 1961-1990. The results were quite enlightening: Cold snaps led to increased mortality in Kenya but reduced mortality in Mali and Malawi, the team reports. Too much rain, as well as droughts, was also associated with increased mortality in Kenya and Malawi. Moreover, adverse climatic conditions increased mortality where HIV/AIDS was prevalence but led to lower mortality in malaria-stricken areas.

“Programs for reducing climate-related mortality through early warning systems, agricultural extension services, and improved access to health infrastructure will help more fully realise sustainable development goals of mortality reduction for sub-Saharan Africa,” the team concludes.

Bakshi, B., Nawrotzki, R.J., Donato, J.R. and Lelis, L.S. (2019) ‘Exploring the link between climate variability and mortality in Sub-Saharan Africa‘, Int. J. Environment and Sustainable Development, Vol. 18, No. 2, pp.206-237.

14 May 2019

Inderscience journals to invite expanded papers from International Conference On Enhancement and Innovations in Exploring Engineering 2019 for potential publication

Extended versions of papers presented at the International Conference On Enhancement and Innovations in Exploring Engineering (ICEIEE-2019) (12 July 2019, Kuala Lumpur, Malaysia) will be invited for review and potential publication by the following journals:

Free sample articles newly available from International Journal of Sustainable Manufacturing

The following sample articles from the International Journal of Sustainable Manufacturing are now available here for free:
  • Role of the behavioural analysis in the product repair and replacement process: the preliminaries
  • CDMF-RELSUS concept: reliable products are sustainable products - influences on product design, manufacturing and use phase
  • A disassembly process model for end-of-life activities of manufactured products
  • Sustainability analysis of rapid prototyping: material/resource and process perspectives
  • A case study on a sustainable alternative to the landfill disposal of spent foundry sand

Research pick: Pay-what-you-want restaurants - "A pay-what-you-want pricing model for restaurants"

Haggling will be familiar to anyone who has visited a market during the last few thousand years! If a deal is to be done between hawker and customer, then the price has to be right. A modern twist on this is that the seller has no input and the customer simply pays what they want for the goods; although there has always been free access to some things where a donation is welcomed. It is rare that this approach becomes the predominant pricing model although there have been numerous experiments, such as pay-what-you-want for digital goods online, including music from famous artists.

Now, Vinaysingh Chawan of the Indian Institute of Management Indore, writing in the International Journal of Services and Operations Management explains that the pay-what-you-want pricing model whether for digital goods, services, or entrance to a museum or exhibition is perhaps counterintuitive. This is especially so given that the buyer may opt to pay nothing and so the seller makes no financial gain from the transaction. However, as counterintuitive as it may seem, the PWYW model does have its supporters and many companies give their customers the option.

It turns out that the vast majority of people will take the view that this “honesty box” type approach deserves to be rewarded and will pay what they perceive as a fair price. Few pay nothing at all. Some people might even pay more than the price the seller hoped for and this can offset the loss due to those who pay nothing. The seller has to assume a majority of fair-minded customers and few freeloaders.

Chawan has investigated with PWYW works for the restaurant industry. If the menu gives a fair suggested price rather than an obligatory price, then it seems customers will pay a fair price. There is always the option of setting an absolute minimum which precludes freeloading and allows the restaurateur to at least cover costs, perhaps with a small profit margin. Indeed, when a minimum is set and a guide price is given, profits commonly end up being higher than when the restaurateur sets absolute pricing. There is much research to be done before this paradigm becomes widespread if not universal.

Chawan, V. (2019) ‘A pay-what-you-want pricing model for restaurants‘, Int. J. Services and Operations Management, Vol. 32, No. 4, pp.431-449.

10 May 2019

Free open access article available: "Metaphors and analogies through smart materials to mitigate age-related differences in the understanding of technology"

The following paper, "Metaphors and analogies through smart materials to mitigate age-related differences in the understanding of technology" (International Journal of Journal of Design Research 16(3/4) 2018) is freely available for download as an open access article.

It can be downloaded via the full-text link available here.

Research pick: Finding fake reviews - "Detecting fake reviews via dynamic multimode network"

Many online shoppers will take a look at the reviews for the product or service they’re about to purchase. The majority will presumably trust that the e-commerce site will only be posting genuine reviews of any given product, posted by other customers. However, as several recent high-profile cases have shown this is not always the case. Unfortunately, e-commerce sites are littered with fake reviews. These can persuade innocent shoppers to make a purchase and anticipate a certain level of quality to which the product or service they receive ultimately does not reach.

Even the most respected of sites can succumb to fake reviews because it is very difficult to automate detection despite the many protections that some operators of such sites have implemented to do so. Now, writing in the International Journal of High Performance Computing and Networking, a team from China has demonstrated how a dynamic multimode network might be employed to efficiently detect fake reviews.

There are four fundamental concepts that might be examined to detect fake reviews, explain Jun Zhao and Hong Wang of the School of Information Science and Engineering, at Shandong Normal University, China. These are the quality of the merchandise, the honesty of the review, the trustworthiness of the reviewer, and the reliability of the e-commerce site. However, even taken together these cannot discern whether an unscrupulous merchant has employed third parties to post favourable but fake reviews of their products and services. In order to more subtly detect fake reviews, the team’s dynamic approach utilizes three algorithms to uncover the nuances common to fake reviews.

Zhao, J. and Wang, H. (2019) ‘Detecting fake reviews via dynamic multimode network‘, Int. J. High Performance Computing and Networking, Vol. 13, No. 4, pp.408-416.

9 May 2019

Inderscience journals to invite expanded papers from International Conference on Knowledge and Policy for Sustainable Development: Global Lessons and Local Challenges for potential publication

Extended versions of papers presented at the International Conference on Knowledge and Policy for Sustainable Development: Global Lessons and Local Challenges (25-27 September 2019, Guru Gobind Singh Indraprastha University, New Delhi, India) will be invited for review and potential publication by the following journals:

Free open access article available: "Objects with symbolic meaning: 16 directions to inspire design for well-being"

The following paper, "Objects with symbolic meaning: 16 directions to inspire design for well-being" (Journal of Design Research 16(3/4) 2018) is freely available for download as an open access article.

It can be downloaded via the full-text link available here.

International Journal of Islamic Marketing and Branding to invite expanded papers from International Language and Tourism Conference 2019 for potential publication

Extended versions of papers presented at the International Language and Tourism Conference 2019 (ILTC 2019) (18-19 October 2019, International Islamic University Malaysia (IIUM), Malaysia) will be invited for review and potential publication by the International Journal of Islamic Marketing and Branding.

Research pick: Honeypots could attract the lawyers too - "What’s in your honeypot: a privacy compliance perspective"

In the context of information technology, IT, a “honeypot” is an attractive online destination usually established to attract malicious third parties who then, assuming they have reached a valuable resource unwittingly reveal details about themselves in order to access what they perceive is within the honeypot. A honeypot might also be referred to as a honeytrap.

However, writing in the International Journal of Information and Computer Security, US researchers caution that the use of a honeypot to gather personal or private data albeit of a malicious third party, or hacker, may well be in breach of local and perhaps even federal laws in some situations. Use of a honeypot may also leave the operator open to issues of legal liability because of the deception that is the honeypot by definition.

Also, by opening a honeypot on a system it might attract hackers who then find a way to access the genuine parts of the network or other system and so compromise that legitimate content in some way, exposing the honeypot operator to liability for damages caused.

Having recognized the putative legal implications of operating a honeypot, the team offers recommendations for how to detect and deceive malicious third parties who may be attempting to fraudulently access the actual online resource without compromising the operator. Moreover, by taking a properly legally compliant approach to a honeypot, the evidence accrued from third parties might then ultimately become useful and admissible in the prosecution of that third party.

Brown, A.J. and Andel, T.R. (2019) ‘What’s in your honeypot: a privacy compliance perspective’, Int. J. Information and Computer Security, Vol. 11, No. 3, pp.289–309.

8 May 2019

Special issue published: "New Approaches for Innovative Business in the Era of Internet Marketing and Advertising"

International Journal of Internet Marketing and Advertising 13(2) 2019

  • Understanding the role of personality traits on Facebook intensity
  • The role of cloud computing and citizens relationship management in digital government transformation
  • Attitudes of college students towards online advertisement in social networking sites: a structural equation modelling approach
  • E-marketing and BPA coordination on business strategy
  • Tracking content marketing performance using web analytics: tools, metrics, and data privacy implications
  • The effect of online video advertising design on online shopping goals: an experiment based on gender (case study: DigiKala Company)

International Journal of Modelling in Operations Management to invite expanded papers from International Conference on Computing Communication & Informatics for potential publication

Extended versions of papers presented at the International Conference on Computing Communication & Informatics (ICCCI-2019) (13-15 September 2019, Kuala Lumpur, Malaysia) will be invited for review and potential publication by the International Journal of Modelling in Operations Management.

Special issue published: "Smart Manufacturing Systems: Theories, Advances and Applications"

International Journal of Service and Computing Oriented Manufacturing 3(4) 2018

  • Multiple-model description and generalised algorithm of ship-building wharf scheduling
  • Agent-based modelling of urban land-use development: modelling and simulating households and economic activities location choice
  • Risk management and design of mitigation plans through discrete events simulation and genetic algorithms in offshore wind processes
  • Numerical and experimental comparisons of pressed blades for large Francis turbine runners manufactured with a reconfigurable pressing setup and a conventional setup
  • An operating simulation tool for modelling and managing a job shop system

Research pick: Finding the freelance cheats - "The emergence of academic ghost writers from India in the international contract cheating industry"

“The modern contract cheating industry allows students and ghostwriters to connect to each other over the internet, often using through an essay mill, agency website or other third-party service,” explains Thomas Lancaster Department of Computing, Imperial College London, UK, in the International Journal of Indian Culture and Business Management.

He adds that such contract cheating sees students recruiting a third party to create original work on their behalf and then submitting that work, an essay or another assignment, in order to gain the requisite academic credit. This is an ethically questionable practice that compromises the validity of any course from the lower to the upper echelons of education and makes a mockery of the value of work carried out honestly by other students.

Little research has been done so far to learn more about the ghostwriters, where they are, and how they operate. Lancaster has now investigated the ghostwriters working in this cheating industry and specifically those working in India. His study is based on openly available data from freelancing websites that operate as so-called “essay mills”. The information that can be gleaned from these sites reveals details of the projects ghostwriters have completed and the marketing techniques the ghostwriters themselves use to garner new customers for their services. Lancaster found that there are many prolific writers on one major freelancing website. These writers turn around one or more essays each day. Much of this work is entirely original and of reasonably high quality. By contrast, some of the ghostwriters provide low-quality essays with much of the content plagiarized from other sources.

“It is hoped that understanding the ghostwriters will aid instructors in taking preventative measures against contract cheating,” Lancaster explains. Indeed, he suggests that preventative approaches to avoid validating students that have used ghostwriters would be to monitor ongoing engagement with the course and other assignments and assessments. It would be relatively trivial to examine different pieces of work side by side to see whether writing style differed significantly to show that a third party may have completed an assignment. Moreover, for the lower-quality essays, there are many tools to detect plagiarized text.

Lancaster, T. (2019) ‘The emergence of academic ghost writers from India in the international contract cheating industry’, Int. J. Indian Culture and Business Management, Vol. 18, No. 3, pp.349–367.

7 May 2019

Special issue published: "Research in Virtual Reality"

International Journal of Computational Vision and Robotics 9(3) 2019

  • Crowd detection and counting using a static and dynamic platform: state of the art
  • Real time vision-based hand gesture recognition using depth sensor and a stochastic context free grammar
  • Adaptive multi-threshold based de-noising filter for medical image applications
  • 3D image reconstruction from different image formats using marching cubes technique
  • Effective scene change detection in complex environments

Special issue on: "Pervasive Computing for Smart Life"

International Journal of Embedded Systems 11(3) 2019

  • An improved human physiological simulation model for healthcare applications
  • A novel chain-based routing protocol, BranChain, in wireless sensor networks
  • An improved incomplete AP clustering algorithm based on K nearest neighbours
  • A PID-FEC mechanism using cross-layer approach for video transmission over multi-hop wireless networks
  • An iterative shrinkage threshold method for radar angular super-resolution
  • The power big data-based energy analysis for intelligent community in smart grid
  • The attack efficiency of PageRank and HITS algorithms on complex networks
  • Comprehensive vulnerability assessment and optimisation method of power communication network
Additional papers
  • Can finger knuckle patterns help strengthen the e-banking security?
  • Interactive map matching and its visualisation: techniques and system
  • IBBO-LSSVM-based network anomaly intrusion detection
  • Efficient authentication scheme for vehicular ad-hoc networks with batch verification using bilinear pairings
  • A new efficient privacy-preserving data publish-subscribe scheme
  • Lattice-based identity-based ring signature without trapdoors

Research pick: Bypassing popular passwords - "CSPS: catchy short passwords making offline and online attacks impossible"

Every year computer security companies share their findings regarding passwords and data breaches. Again and again, they warn computer users to use complex passwords and not to use the same passwords for different accounts. And, yet, data breaches and other sources show that too many people use the same simple passwords repeatedly and that some of those passwords are ludicrously simple, the word “password” or the number “123456” really isn’t a password at all given even the least-sophisticated hacking and cracking software available to malicious third parties these days.

Inertia is one important problem: it is difficult to get users, set in their ways, to change their old, easily remembered passwords to complex, difficult to remember codes. It is even harder to get such users to use password managers or multifactor authentication, which would add another layer of security to their logins.

Now, writing in the International Journal of Information and Computer Security, Jaryn Shen and Qingkai Zeng of the State Key Laboratory for Novel Software Technology, and Department of Computer Science and Technology, at Nanjing University, China, have proposed a new paradigm for password protection. Their approach addresses online and offline attacks to passwords without increasing the effort required of a user to choose and memorise their passwords.

“Passwords are the first security barrier for online web services. As long as attackers steal and crack users’ passwords, they gain and control users’ personal information. It is not just an invasion of privacy. It can also lead to more serious consequences such as data damages, economic loss and criminal activities,” the team writes.

Their approach involves having a login system based on two servers instead of one. The user has a short, memorable password to access their longer, computer-generated “hashed” passwords on another server, the key to “de-hashing” those longer passwords are stored on the second server, but the actual password is stored on the user’s device too and so the memorable password acts as a token for two-factor authentication. The approach means that attackers with even the most sophisticated hacking tools cannot apply an offline dictionary and brute-force attacks effectively.

Shen, J. and Zeng, Q. (2019) ‘CSPS: catchy short passwords making offline and online attacks impossible’, Int. J. Information and Computer Security, Vol. 11, No. 3, pp.255–274

3 May 2019

Research pick: Internet of Power - "An intelligent system to connect or disconnect home appliances and monitoring energy levels using IoT"

Researchers in India are developing an “intelligent” system that can monitor energy usage of Internet of Things devices in the home and connect or disconnect them appropriately as needed. The system uses a Hall effect sensor to monitor the current flowing to a device.

In work described in the International Journal of Technology Intelligence and Planning, the team presents a new approach to IoT control with software and hardware. An IoT device can monitor energy levels while the intelligent system is connected via Wi-Fi to allow control from a remote site, specifically using an internet-connected smartphone. Such a system would be a boon to those with various forms of disability who might thus take back control of their home and its appliances, such as lights, fans, heaters, and other enabled devices, where before many gadgets were wholly inaccessible or required another person to be present to help.

Experiments with the prototype circuit board offer a proof of principle where two connected devices, a standalone PC fan as a surrogate for a domestic fan and an LED as a substitute for a houselight were used in the tests.

Nalajala, P., Godavarthi, B. and Prabhakar Reddy, G. (2019) ‘An intelligent system to connect or disconnect home appliances and monitoring energy levels using IoT’, Int. J. Technology Intelligence and Planning, Vol. 12, No. 3, pp.209–222.

2 May 2019

Special issue published: "Triple Helix Dynamics for Innovation and Regional Growth"

Global Business and Economics Review 21(3/4) 2019

  • Towards combining the triple helix concept with competence-based approach of educational management theory
  • Analysis of the researcher's motivators to collaborate with firms as drivers of the triple helix dynamics
  • Innovation centres as anchor spaces of the 'knowledge city'
  • National, regional or industrial explanation for firms' deaths in the European Union since 2010 until 2014 - a shift-share application
  • University spin-offs and triple helix dynamics in regional innovation ecosystems: a comparison of technology intensive start-ups in Sweden
  • The new triple-helix policy of Lombardy region: evidence from nine innovation clusters
  • Effectiveness of regional biotechnology clusters to support innovation activities: case of biotech cluster in Russia
  • Supporting the regional development in the knowledge economy: the adoption of a system dynamic approach in Ghana
  • Role of the triple helix in the ecosystems for tech start-ups in India: a gap analysis
  • New and growing firms' entrepreneurs' perceptions and their discriminant power in EDL countries
  • Agricultural entrepreneurship and the financial crisis
  • Strategies and obstacles for marketing innovation activities

Best Reviewer Awards announced by International Journal of Hydrology Science and Technology

Prof. Saeid Eslamian, Editor in Chief of the International Journal of Hydrology Science and Technology, is pleased to announce the winners of the following Best Reviewer Awards:

2018
Prof. Bachir Achour
University of Biskra
Research Laboratory in Subterranean and Surface Hydraulics (LARHYSS)
Hydraulic and Civil Engineering Department
Algeria

2011-2017

Assistant Prof. Mohammad Javad Zareian
Ministry of Energy
Department of Water Resources Research
Tehran

New Editor for International Journal of International Journal of Virtual Technology and Multimedia

Prof. Charles Xiaoxue Wang from Florida Gulf Coast University in the USA has been appointed to take over editorship of the International Journal of Virtual Technology and Multimedia.

Research pick: Predator and prey in cyber stasis - "Legitimate firms or hackers – who is winning the global cyber war?"

In the world of cybersecurity, just as in nature, there are predators and there is prey. The predators are the hunters, the ones that seek out the weak and the vulnerable on which to prey, that applies whether we are talking cat and mouse or hacker and computer system.

Writing in the International Journal of Technology Intelligence and Planning, a team from the USA suggests that the waxing and waning, the ebb and flow of cyber attack on the Internet of Things and other systems reflects the natural rise and fall of predator and prey numbers. When predators attack more frequently and with more sophisticated weaponry, the prey ultimately adapts to cope and so the predator must also evolve to have sharper teeth and longer claws to persist in the next round of attack and so on.

If predator becomes too sophisticated, then all prey will be devoured and there will be nothing left on which the predators might feast. Conversely, if prey somehow evolved the ultimate defenses, then the predators would ultimately die out. Given then for the whole of natural and computer history predators and prey have existed in a bitter harmony, it is suggested that either route is likely to be taken. Predator and prey might outwit each other in cycles, but ultimately they will both persist in what is essentially stasis.

In a world where there are always malicious people, the predators, prey must be perpetually vigilant, which means companies and individuals using information and computing technology must constantly be on the lookout for predator attack and take defensive action as soon as they can to preclude their demise.

Gary, R.F., Marinakis, Y., Majadillas, M.A., White, R. and Walsh, S.T. (2019) ‘Legitimate firms or hackers – who is winning the global cyber war?’, Int. J. Technology Intelligence and Planning, Vol. 12, No. 3, pp.297–314.

1 May 2019

Research pick: “The Smoke” – Assessing air-quality forecasting for London

An assessment of local and regional air-quality forecasts for London, UK is reported in the International Journal of Environment and Pollution. In their evaluation, Amy Stidworthy, Mark Jackson, Kate Johnson, David Carruthers, and Jenny Stocker, of Cambridge Environmental Research Consultants Ltd., explain how levels of nitrogen oxides, ozone, and sooty particulates (PM2.5 and PM10), can be predicted quite accurately but the origin and how the various pollutants are dispersed must be taken into account in forecasts to ensure accuracy.

Atmospheric dispersions models are critical to accurate, long-range predictions of air quality. Such forecasts inform the public and others of how pollution levels are shifting over the coming days and can be used to advise people with reduced lung function and other medical conditions sensitive to high pollution levels on whether or not to avoid certain areas at certain times or even to stay indoors entirely.

The researchers add that “Forecasting systems must account for long-range transport of pollutants in addition to local emissions, chemical processes and urban morphology; thus it is common practice to couple local air dispersion models with regional models to account for pollutant emissions, transport and chemistry at a range of scales.” As such, their evaluation of the commonly used system of London’s airTEXT, which uses CAMS regional ensemble air quality forecast data, and the ADMS-Urban dispersal model to make accurate predictions is important both for ensuring that guidance is appropriate.

The team showed that this system performs better than the regional-scale CAMS forecasts for all pollutants considered, with the exception of PM2.5. However, there were no major air-quality incidents during the study period so the absolute predictive power could not be determined. Prediction of atmospheric nitrogen dioxide levels was much better in urban areas with this system as one might expect given that the main source is road traffic. Ozone levels are a secondary pollutant and so levels depend heavily on dispersal.

The team adds that “conservative” and “cautious” alerts should be considered and data points on the threshold might be removed to avoid bias and so improve accuracy still further, although this would only be sensible with very long data sets covering a significant time period.

Stidworthy, A., Jackson, M., Johnson, K., Carruthers, D. and Stocker, J. (2018) ‘Evaluation of local and regional air quality forecasts for London’, Int. J. Environment and Pollution, Vol. 64, Nos. 1/2/3, pp.178–191.

30 April 2019

Special issue published: "Technological Innovation for Sustainable Development"

Progress in Industrial Ecology, An International Journal 13(2) 2019

  • Energetic transition within thermal machines and co-generation: effect of mass flux on critical heat flux
  • Hybrid control strategy for wind turbine system driven permanent magnet synchronous generator
  • Effects of different charging and discharging strategies of electric vehicles under various pricing policies in a smart microgrid
  • The effects of copper additives on the glass transition temperature and hardness for epoxy resin
  • Effect of V, In and Cu doping on properties of p-type ZnSe/Si heterojunction solar cell
  • Evaluation, comparison and selection of photovoltaic systems

Free sample articles newly available from International Journal of Knowledge and Learning

The following sample articles from the International Journal of Knowledge and Learning are now available here for free:
  • Impact of organisational practices on knowledge sharing: an empirical study 
  • Improving knowledge sharing, creation, and innovation performance in nanotechnology firms: an application of the hybrid model of Kano and QFD 
  • Using board games to improve mathematical creativity 
  • An ontology-driven software product line architecture for developing gamified intelligent tutoring systems 
  • Text-based sentiment analysis: review

New Editor for International Journal of Applied Nonlinear Science

Prof. Davide La Torre from the University of Dubai in the UAE has been appointed to take over editorship of the International Journal of Applied Nonlinear Science. The previous Editor in Chief, Prof. Franklin Mendivil, will remain with the journal as Editor.

Research pick: A genuine air guitar - "Virtual guitar: using real-time finger tracking for musical instruments"

Almost ten years ago computer and software giant Microsoft introduced a movement-detecting controller for its gaming platforms known as Kinect. Aside from being able to play games, there was much excitement among musicians, scientists, and even healthcare professionals who saw its potential as a virtualised control for their particular areas.

A user could play a computer-based musical instrument through gestures and movements picked up by the 3D sensing device. However, the system required large movements, of arms and legs for instance, which perhaps limited the nuances of the music one might play with such an “instrument”. Now, writing in the International Journal of Computational Science and Engineering, a team from Taiwan describes their algorithm for real-time finger movement tracking using a Kinect device that would allow a performer to simulate playing the guitar and the software to generate appropriate sound.

One might envisage the wannabe rock guitarist playing “air guitar” and generating guitar or other sounds synchronised to their finger movements with the melody, chords, and sounds pre-programmed. But, more seriously, the system could be used to genuinely play music through finger movements alone without the need for an actual guitar.

The team’s experiments with the system show that the proposed method can be used to play music of different genres with acceptable quality. They add that the application might a novice who has no or little experience of playing real musical instruments as well as experimental musicians seeking an alternative paradigm to the conventional instruments available to them.

Hakim, N.L., Sun, S-W., Hsu, M-H., Shih, T.K. and Wu, S-J. (2019) ‘Virtual guitar: using real-time finger tracking for musical instruments‘, Int. J. Computational Science and Engineering, Vol. 18, No. 4, pp.438-450.

29 April 2019

Free sample articles newly available from International Journal of Masonry Research and Innovation

The following sample articles from the International Journal of Masonry Research and Innovation are now available here for free:
  • Rigid block models for masonry structures
  • From 2D digital imaging to finite element analysis using the ENEAGRID high performance computing infrastructure for the preservation of historical masonry structures
  • Effect of concrete block height variation to the shear bond strength of thin layer mortared masonry
  • Approaches to strongly local phenomena in dry masonry structures
  • Creep failure of two historical masonry towers: analysis from material to structure
  • Investigation of the structural behaviour of a masonry castle by considering the actual damage

Special issue published: "Recent Developments in Global Financial Markets"

International Journal of Banking, Accounting and Finance 10(1) 2019

  • The WTI/Brent oil futures price differential and the globalisation-regionalisation hypothesis
  • Reaction of EU stock markets to ECB policy interventions
  • Forecasting the daily dynamic hedge ratios in emerging European stock futures markets: evidence from GARCH models
  • Pricing 'partial-average' Asian options with the binomial method

Free sample articles newly available from International Journal of Banking, Accounting and Finance

The following sample articles from the International Journal of Banking, Accounting and Finance are now available here for free:
  • Intraday realised volatility forecasting and announcements
  • Volume weighted volatility: empirical evidence for a new realised volatility measure
  • Branch manager characteristics and efficiency during capital controls
  • Working capital management, cash flow and SMEs' performance
  • A contingent claims approach to the determinants of the stock-bond return relationship

26 April 2019

Special Issue on: "Maritime Transportation: Innovative Models and Algorithms"

International Journal of Shipping and Transport Logistics 11(2/3) 2019

  • Impact analysis of the traffic convoy system and toll pricing policy of the Suez Canal on the operations of a liner containership over a long-haul voyage
  • A method for estimating liner shipping time under uncertainty
  • A multi-objective approach to analyse the effect of fuel consumption on ship routing and scheduling problem
  • Collaborative stowage planning problem for a liner ship
  • Optimisation for quay crane scheduling problem under uncertainty using PSO and OCBA
  • Berth allocation and quay crane-yard truck assignment considering carbon emissions in port area
  • Assess economic and environmental trade-off for inland port location
  • Integrating route optimisation with vehicle and unloading dock scheduling in LCL cargo collection

2018 Best Paper Award announced by International Journal of Masonry Research and Innovation

The International Journal of Masonry Research and Innovation has established an annual award for the best paper published in each respective year.

The best paper has been selected using a new formula for the 2018 competition, with the aim of increasing the involvement of the editorial board members in the procedure. An online voting system was set up, allowing each board member to express his/her vote for one paper published by IJMRI in 2018. Associate Editors and the Editor in Chief were allowed to express two and three votes respectively (or multiple votes for the same paper). The best paper was then awarded by the Editor in Chief according to the results of this online voting system. In order to avoid bias, each paper was labelled with the following alphanumeric string: 3_N_ppp, where "3" represents the volume, "N" the issue and "ppp" the page number of the first page of the paper.

For 2018, twenty papers were eligible for competing, and 32 votes (including the multiple choices of Associate Editors and the Editor in Chief) were received. The first three places were as follows:
The editors and board congratulate the authors for their significant contributions to state-of-the-art research on masonry. They should be very proud of their achievements in a very competitive pool.

The 1st place winners will receive an online subscription to IJMRI's 2018 volume and a certificate.

A sample issue collecting the papers ranked in the top three plus the following papers selected by the Editor (based also on the final ranking) is now available for the readers free of charge:
This sample issue showcases the range and quality of the content provided by the International Journal of Masonry Research and Innovation.

Research pic: Blogs must adapt or die - "Blogs: are they headed downwards in social networking? An empirical analysis"

Blogs, or as they were originally known, weblogs, first hit the World Wide Web back in 1997. The term “weblog” was coined in December that year and almost immediately abbreviated to “blog”. The subsequent two decades saw the rise and rise of millions of blogs, they rode the wave of Web 2.0, became multi-author publication tools, and many matured into fully-fledged information and news services.

Now, writing in the in International Journal of Electronic Business, Parag Uma Kosalge, Suzanne Crampton, and Ashok Kumar of the Department of Management, at Seidman College of Business, at Grand Valley State University, in Grand Rapids, Michigan, USA, ask whether blogs have had their day given the rise of social media and social networking sites and systems, such as Twitter, Instagram, Snapchat, and Facebook, which are outpacing blogs in so many ways today.

Their study of over four hundred internet users found statistically significant evidence for reduced user awareness and consideration of blogging in recent years. However, their study also identified four business areas that users still find important for blogs, such as employee networking and online sales. As with many aspects of technology and in particular information and communications technology, the services on which users rely and use the most are constantly shifting. The services must, in the parlance of natural selection, adapt or die. Blogs may not have had their day, but it is critical that bloggers recognize the opposition they face from other non-blogging services online and in order to be sustainable must find ways to ride whichever wave comes along.

Kosalge, P.U., Crampton, S. and Kumar, A. (2019) ‘Blogs: are they headed downwards in social networking? An empirical analysis’, Int. J. Electronic Business, Vol. 15, No. 1, pp.72–91.

25 April 2019

Free sample articles newly available from International Journal of Data Mining and Bioinformatics

The following sample articles from the International Journal of Data Mining and Bioinformatics are now available here for free:
  • Risk prediction of type 2 diabetes using common and rare variants
  • A mutational co-occurrence network in gastric cancer based on an association index
  • Symbolic approach to reduced bio-basis
  • Determining sample size for cross-over designs with multiple groups
  • A pipeline for identifying endogenous neuropeptides from spectral archives
  • Gene-gene interaction analysis for quantitative trait using cluster-based multifactor dimensionality reduction method

Special issue published: "Sustainable Approaches with MCDA Methods in Agri-Environment Policies"

International Journal of Sustainable Agricultural Management and Informatics 4(3/4) 2018

  • Mapping soil erosion potential zones with a geo-spatial application of multi-criteria evaluation technique model in highlands of Ethiopia
  • Decision making under the scope of forest policy: sustainable agroforestry systems in less favoured areas
  • Towards a computer-based decision support system for aquaculture stakeholders in Greece in the context of climate change
  • Building theory of agri-food supply chain resilience using total interpretive structural modelling and MICMAC analysis
  • An open source approach of building web apps to support decision making with exploratory techniques. Case study: the multiple correspondence analysis on real data from agritourism
  • Identifying knowledge brokers, artefacts and channels for waste reduction in agri-food supply chains
  • Ranking the EU countries according to the environmental performance index using PROMETHEE
Additional papers
  • Remote sensing in water balance modelling for evapotranspiration at a rural watershed in Central Greece
  • Resident's concerns and attitudes towards policies and strategies of solid waste management facilities
  • A hybrid framework for detection of diseases in apple and tomato crops with deep feed forward neural network

Free sample articles newly available from International Journal of Continuing Engineering Education and Life-Long Learning

The following sample articles from the International Journal of Continuing Engineering Education and Life-Long Learning are now available here for free:
  • Digital training in intercultural education for teacher training: analysis of an innovative experience
  • Student perception on achieved graduate attributes and learning experiences: a study on undergraduate engineering students of India
  • An analysis of competency, needs, and gap on Thai engineering capabilities within ASEAN
  • The application of ADAMS/CAR in vehicle engineering teaching
  • Implementation of quality tools in higher education process
  • Case study on means of information and communication technologies in teaching mathematics to distance and extramural university students

Research pick: "Video game violence and family resilience"

There is much debate about whether or not violent video games give rise to violent tendencies in those who play them. Some research shows this to be the case while other studies demonstrate the opposite. However, a third factor may be critical to understanding what role, if any, such games play in society and that is “family resilience.” Writing in the International Journal of Innovation and Learning, Mirjana Radetić-Paić of the Faculty of Educational Sciences, at Juraj Dobrila University of Pula, in Croatia, has investigated the influence of violent video games on player aggression and violent tendencies in the context of this third factor.

She has found that in general, emotional maturity, responsibility, and an ability to keep promises within the family is linked to playing video games with non-violent content. “The results are especially important for future teachers, since they need to be able to develop appropriate strategies which prevent adverse impacts on learning abilities such as social and communication skills,” Radetić-Paić explains.

“Although special attention has to be paid to reaching conclusions and looking for a direct correlation among violence, video games with violent contents and family resilience factors, it can be deduced that this occurrence has many causes, which means that a larger number of variables has been used in the interpretation,” she adds.

Radetić-Paić, M. (2019) ‘Video games with violent contents and family resilience factors’, Int. J. Innovation and Learning, Vol. 25, No. 3, pp.223–236.

24 April 2019

Special issue published: "Applications of Information Management and System Engineering"

International Journal of Product Development 23(2/3) 2019

  • A smart system of 3D liver tumour segmentation
  • An empirical study on the cellular subscribers churn, selection factors and satisfaction with the services
  • A cloud based architecture for competence management and discovery
  • Layered approach of analysing OSS and risk management
  • Manufacturing simulation of alternate additive manufacturing method using cubes with CATIA macro programming
  • Development of marker-based augmented reality system for object detection in an optimum latency time
  • A hybrid classification-based model for automatic text summarisation using machine learning approaches: CBS-ID3MV
Additional paper
  • Consumer preference for eco-friendly appliances in trade-off: a conjoint analysis approach

Free sample articles newly available from International Journal of Emergency Management

The following sample articles from the International Journal of Emergency Management are now available here for free:
  • Seismic risk assessment and design of tourism buildings using probability analysis
  • Decomposing issue patterns in crisis communication: the case of the lost airliner
  • A closer examination of command and control practices by incident commanders during realistic operational exercises in the Netherlands
  • Terrorist attacks with explosive weapons: pattern of injuries and health constraints
  • Understanding emergency response: lessons learned from the helping literature
  • Sector prioritisation in Rabat region for emergency management

Special issue published: "Artificial Intelligence in Education"

International Journal of Continuing Engineering Education and Life-Long Learning 29(1/2) 2019

  • Big data processing with Apache Spark in university institutions: spark streaming and machine learning algorithm
  • Quantitative analysis of the influence of learning resource scheduling in MOOC mode on traditional education and teaching
  • College English teaching mode based on intelligent robot
  • Analysis of the influence of multimedia network hybrid teaching on college students English learning ability
  • The promotion role of mobile online education platform in students' self-learning
  • Research on the cultivation of students' autonomous learning ability based on MOOC-based network interactive teaching
  • Robot-based motion detection method and its application in PE practice teaching
  • Analysis of the influence of multimedia network hybrid teaching method on college students' learning ability in physical education
  • Analysing learning behaviours of advanced mathematics in MOOCs
Additional paper
  • Critical thinking and critical reading: a sound pedagogical paring

Research pick: Big money goes around the world - "Drivers and deterrents of music streaming services purchase intention"

Music is big business. It has been since the advent of the sheet music industry in the 19th Century and the ensuing piracy scandals, right through the invention of radio, recorded music, and the usurping of the family piano for devices that could replicate the songs we loved without anyone having to be able to sight-read, play or sing. Into the 21st Century, the industry is still playing catchup with the pirates who found technological ways in which to replicate and share the music they love without spending a penny of their own money.

Writing in the International Journal of Electronic Business, Teresa Fernandes and João Guerra of the Faculty of Economics, at the University of Porto, in Porto, Portugal discuss the advent of music streaming services. Streaming services emerged as an alternative business model to the failing CD-buying model in the wake of file sharing and the mp3. It was obvious to the technology, as opposed to the record companies, that are a new model was needed if money was to be made and an industry soaked in the copyright and intellectual property laws founded in the 19th Century if not before was to survive in some form into the 21st Century.

The problem remains, however, whereas video streaming services are adding millions of users each month as on-demand alternatives to cable and satellite TV, music lovers are not adopting music streaming at quite the rate its purveyors would like to reach a solid bottom line in their business model. Whereas ten dollars a month for almost unlimited TV show and movie streaming on-demand seems like a bargain, the same fee for music does not compute when it is so easy for listeners to quickly download the latest hits and even the golden oldies without it costing them anything even at the risk of legal action being taken against them under copyright laws.

The team’s analysis suggests that there is no simple solution, no magic button that the music (streaming) industry might press to persuade people to sign up for its offerings. They must instead now consider how to generate revenue through balancing free and premium components as well as adjusting their strategies for different market segments based on age, gender, for instance. There may well always be consumers willing to pay as long as they are targeted correctly, but one might suggest that the billion-dollar music industry of the 20th Century is probably long gone and a new paradigm is needed. Perhaps we could all go back to making our own music…

Fernandes, T. and Guerra, J. (2019) ‘Drivers and deterrents of music streaming services purchase intention’, Int. J. Electronic Business, Vol. 15, No. 1, pp.21–42.

23 April 2019

Special issue published: "Nanotechnology and High-Speed Electronic Systems"

International Journal of Nanoparticles 11(2) 2019

  • Optimisation of fully depleted SiGe channel with raised source/drain buried oxide nMOSFET
  • Reduced ordered binary decision diagram-based combinational circuit synthesis for optimising area, power and temperature
  • Nanoscale T-shaped AlGaN/GaN HEMT with improved DC and RF performance
  • Electrical parameter analysis of gate-extension on source of germanium tri-gate FinFET
  • Impact of structural parameters on DC performance of recessed channel SOI-MOSFET
  • Electro-thermal assessment of heterojunction tunnel-FET for low-power digital circuits
  • Analysis and circuit sizing performance of a differential amplifier using HPSO algorithm

Research pick: Can a Wi-Fi network ever be completely secure? - "Survey on WiFi infrastructure attacks"

There are many ways in which hackers and crackers can break into a Wi-Fi network. It is trivial if the network uses out of date security protocols or weak passwords. But even if the system is setup with the latest security measures, strong passwords, and firewall and malware protection, there are still ways and means that a malicious third party might access such a network. Writing in the International Journal of Wireless and Mobile Computing, researchers from China review the various hacking techniques that might be used and show what defensive measures might best be taken to preclude system compromise.

Rui Guo of the Department of Internet Crime Investigation, at the National Police University of China, in Liaoning Province, China, explains that there is a fundamental security flaw in all Wi-Fi systems. Because of the way Wi-Fi works, the access-point, must listen passively for a signal, a beacon, from devices that may wish to connect whether legitimately or illicitly. This beacon is wholly unencrypted, it has to be because until a connection is made no data can be exchanged to encrypt subsequent communication between the access-point and device.

” This makes Wi-Fi easy to use because you can see networks and their names around you without exchanging some key or password first, but it also makes Wi-Fi networks prone to many kinds of attacks,” explains Guo. He has now looked at the top three exploit kits used to break into Wi-Fi: Rogue AP, ARP spoofing, and Wi-Fi MITM. The first point of concern is that none of these kits need physical access to the network, by virtue of its wireless nature, Wi-Fi is vulnerable to man-in-the-middle attacks, whereas a wired network would require the hacker to have a plug-and-socket connection to the network to be able to breach its security.

These “automated cyber weapons” can cause havoc by penetrating and bypassing protections, they can also forge disassociations and deauthorise packets, compromising legitimate communications. Guo describes the protection tools that are available but none of them is perfect and there almost always ways in which a hacker can breach a Wi-Fi network.

Guo, R. (2019) ‘Survey on WiFi infrastructure attacks’, Int. J. Wireless and Mobile Computing, Vol. 16, No. 2, pp.97–101

20 April 2019

Free sample articles newly available from International Journal of Diplomacy and Economy

The following sample articles from the International Journal of Diplomacy and Economy are now available here for free:
  • Mineral resources endowment and economic growth in Southern African countries
  • Soft power and place branding in the United Arab Emirates: examples of the tourism and film industries
  • Organising Greek commercial diplomacy: oscillating between integrated and fragmented models of organisation
  • Greater legitimacy of small island developing states: a statistical perspective on its definition

International Journal of Environment and Health to invite expanded papers from IV Congreso Nacional de Ciencia y Tecnología Ambiental. Argentina y Ambiente 2019 for potential publication

Extended versions of papers presented at the IV Congreso Nacional de Ciencia y Tecnología Ambiental. Argentina y Ambiente 2019 (AA2019) (2-5 December 2019, Florencio Varela, Buenos Aires, Argentina) will be invited for review and potential publication by the International Journal of Environment and Health.

Special issue published: "Perspectives on International Business and Export Marketing"

International Journal of Export Marketing 2(4) 2019

  • Measuring market destination effect on export product innovation
  • Analysis of the export performance of state-owned enterprises from Latin American and Caribbean, reviewing corruption and informal economy
  • Internationalisation of firms' research and development activities: the experience from European Union framework programs
  • Uncovering new value frontiers: the role of the entrepreneurial ecosystem in nurturing born globals

World Review of Science, Technology and Sustainable Development to invite expanded papers from ICGLOW 2019: "Environmental Law and Technology to Achieve Sustainable Development Goals in Industrial Revolution 4.0 Era" for potential publication

Extended versions of papers presented at ICGLOW 2019: "Environmental Law and Technology to Achieve Sustainable Development Goals in Industrial Revolution 4.0 Era" (7-8 September 2019, Surakarta, Indonesia) will be invited for review and potential publication by the World Review of Science, Technology and Sustainable Development.

18 April 2019

Free sample articles newly available from International Journal of Vehicle Information and Communication Systems

The following sample articles from the International Journal of Vehicle Information and Communication Systems are now available here for free:
  • The next generation GPS memory management
  • The offline scheduler for embedded vehicular systems
  • A strategy for optimisation of cooperative platoon formation
  • Authentication schemes for VANETs: a survey

Special issue published: "Harmonisation Within Atmospheric Dispersion Modelling for Regulatory Purposes – Part I"

International Journal of Environment and Pollution 64(1/2/3) 2018

  • Evaluation of parametric laws for computing the wind speed profile in the urban boundary layer: comparison to two-dimensional building water channel data
  • Validation of numerically forecast vertical temperature profile with measurements for dispersion modelling
  • Computer simulations of the impact of air pollution on the quality of life and health risks in Bulgaria
  • Contribution of different emission sources to the atmospheric composition formation in the city of Sofia
  • Validation of dispersion models using Cabauw field experiments and numerical weather re-analysis
  • A hybrid CFD RANS/Lagrangian approach to model atmospheric dispersion of pollutants in complex urban geometries
  • Data assimilation at local scale to improve CFD simulations of atmospheric dispersion: application to 1D shallow-water equations and method comparisons
  • QualeAria: European and national scale air quality forecast system performance evaluation
  • Large-eddy simulation studies for predicting plume concentrations around nuclear facilities using an overlapping technique
  • Downwind chlorine hazard estimates for the 2015-2016 Jack Rabbit II campaign
  • Preliminary evaluation of CMAQ modelled wet deposition of sulphur and nitrogen over Bulgaria
  • Evaluation of local and regional air quality forecasts for London
  • Effect of surface roughness on turbulence, ventilation and pollutant dispersion over hypothetical urban area
  • Source term estimation using an adjoint model: a comparison of two different algorithms
  • Modelling nitrogen deposition: dry deposition velocities on various land-use types in Switzerland
  • A hybrid Eulerian-Lagrangian-statistical approach to evaluate air quality in a mixed residential-industrial environment
  • Effects of traffic emission reduction on urban air quality episode using WRF/Chem

Free sample articles newly available from International Journal of Sustainable Strategic Management

The following sample articles from the International Journal of Sustainable Strategic Management are now available here for free:
  • Extent of corporate social responsibility reporting: India's transition from voluntary to mandatory regime
  • Sustainability as a strategy incorporated in decision-making at supply chain management case study of General Motors
  • 'Keeper of the fire': human resource management's role in the organisational development of an employee sustainability mindset
  • Panoramic difference of academicians in promoting sustainable change
  • Consolidation in the Indian banking sector: evaluation of sustainable development readiness of the public sector banks in India

Research pick: Musical tourism in Croatia - "Audio management in the development and branding of Krk Island"

Music is an essential element of both the tourism offering and promotion in branding a holiday destination, according to researchers writing in the International Journal of Tourism Policy. Indeed, music can make a tourist destination unique and distinctive. Christian Stipanovi, and Diana Grguri of the University of Rijeka, working with Nataša Jurina of the City of Krk Tourist Board, Krk, Croatia, discuss the details.

Krk is the most populous islands of the Adriatic Sea, lying towards the north near Rijeka on the Dalmatian Coast in the Bay of Kvarner. It covers more than 400 square kilometres as does the neighbouring island of Cres, although Cres has a population of three thousand or so compared with Krk’s approximately 20000 inhabitants. It is a popular tourist destination being connected to the mainland by a concrete bridge and in relatively close proximity to Slovenia, Hungary, Southern Germany, Austria, and Northern Italy.

The team reports that the traditional music of Krk, whether performed live or recorded music at various venues and locations across the island is an important part of the authenticity, culture, and heritage of the island. “Recently the destination has sought to innovate its music offering to reflect the island’s sustainable development strategy and, by implementing its own development concept model,” the team writes.

The team’s study shows that audio management represents a crucial dimension of an integrated tourism product based on sustainable development and indigenous values. They add that it can improve the destination’s tourist offering and the overall experience for visitors but only if there is planning for music, noise control, and acoustic design, in venues for instance.

Stipanovi?, C., Grguri?, D. and Jurina, N. (2018) ‘Audio management in the development and branding of Krk Island’, Int. J. Tourism Policy, Vol. 8, No. 4, pp.319-336.

17 April 2019

Special issue published: "Advances in Intelligent Big Data Analytics"

International Journal of Intelligent Engineering Informatics 7(2/3) 2019

  • An ensemble clustering method for intrusion detection
  • Empirical investigation of dimension hierarchy sharing-based metrics for multidimensional schema understandability
  • Detecting concept drift using HEDDM in data stream
  • Dynamic social network analysis and performance evaluation
  • Measuring harmfulness of class imbalance by data complexity measures in oversampling methods
  • Threshold-based empirical validation of object-oriented metrics on different severity levels
Additional papers
  • Mamdani fuzzy-based vehicular grouping at the intersection of roads for smart transportation system
  • The Kushner-Stratonovich stochastic method for a master robot of a tele-robotic system: beyond extended Kalman filtering

Free sample articles newly available from International Journal of Public Policy

The following sample articles from the International Journal of Public Policy are now available here for free:
  • European fiscal solidarity: an EU-wide optimal income tax approach
  • Portfolio optimisation of power futures market: evidence from France and Germany
  • Bridging the energy access divide for sustainable development in South Asia: policies and prospects in Nepal
  • Assessment of low carbon transport for sustainable development in Bhutan: a general equilibrium approach
  • Determinants of energy intensity in Russia
  • Cross-border power trade with Myanmar: barriers and their removal from the Thai's perspective
  • Development of variable renewable energy policy in developing countries: a case study of Sri Lanka

Special issue published: "Smart House Oriented Community"

International Journal of Sustainable Society 10(4) 2018

  • Recent development of Smart City in Japan
  • A new perspective of environmental behaviour study: a brief introduction of Wi-Fi indoor positioning system
  • Consistent context aware behaviour in smart home environment
  • Building form regulation visualisation in Japan: automatic building volume legality verification via procedural modelling

Research pick: Predicting electricity demands - "Neural network with genetic algorithm for forecasting short-term electricity load demand"

Research published in the International Journal of Energy Technology and Policy shows how a neural network can be trained with a genetic algorithm to forecasting short-term demands on electricity load. Chawalit Jeenanunta and Darshana Abeyrathna of Thammasat University, in Thani, Thailand, explain that it is critical for electricity producers to be able to estimate how much demand there will be on their systems in the next 48 hours. Without such predictions, there will inevitably be shortfalls in power generation when demand is higher than estimated or energy and resources wasted if demand is lower than expected.

The team has used data from the electricity generating authority of Thailand (EGAT) to train a neural network via a genetic algorithm. The results are compared with the more conventional back-propagation approach to prediction and show that the system is much better and predict the rise and falls in electricity demand. The genetic algorithm neural network (GANN) approach takes about 30 minutes to train for prediction compared with 1 minute for back-propagation training of a neural network. However, the added value of much more accurate predictions far outweighs this additional time and effort.

Jeenanunta, C. and Darshana Abeyrathna, K. (2019) ‘Neural network with genetic algorithm for forecasting short-term electricity load demand’, Int. J. Energy Technology and Policy, Vol. 15, Nos. 2/3, pp.337–350.

16 April 2019

Free sample articles newly available from International Journal of Electronic Business

The following sample articles from the International Journal of Electronic Business are now available here for free:
  • The impact of eGovernment program progress on the level of achievement of public e-services: a field study in the Jordanian public sector
  • Industrial migration and its impact on an 'Internet+' economy: evidence from core cities in the Diamond Economic Circle
  • The effects of sellers' entrepreneurial self-efficacy and remote work self-efficacy in online marketplaces: an empirical investigation
  • Antecedents and consequences of the process of customer engagement through social media: an integrated conceptual framework

Special issue published: "Sustainability Practices Among Firms in Developing Countries: Current Issues and Practices"

International Journal of Sustainable Strategic Management 7(1/2) 2019

  • Firms' sustainable practice research in developing countries: mapping the cited literature by bibliometric analysis approach
  • Managing stakeholders' demand through environmental management accounting: the case of seaports
  • Antecedents and outcomes of climate change performance: an investigation of Malaysian businesses
  • The theory of planned behaviour and transformational leadership: an examination of corporate philanthropy among SMEs in Malaysia
  • Green supply chain management: impact on environmental performance and firm competitiveness
  • How green marketing mix strategies affects the firm's performance: a Malaysian perspective
  • The roles of uncertainty avoidance and strategic agility in cloud storage adoption among multinational manufacturing companies in Malaysia
  • Is a risk management committee essential in moderating the relationship between corporate governance and sustainability disclosure?
  • Corporate board diversity, corporate social responsibility and financial performance: the case of Malaysian public listed companies
  • Transformational leadership style and social responsibility of employees in economic corporations: a study on Sarmayeh Bank of Iran

New Editor for International Journal of Earthquake and Impact Engineering

Dr. Ehsan Noroozinejad from the Graduate University of Advanced Technology in Iran has been appointed to take over editorship of the International Journal of Earthquake and Impact Engineering.

Research pick: Egocentric analysis - "Friend circle identification in ego network based on hybrid method"

An ego network is one perspective on social network analysis, it looks at the individual and their circle of friends and the connections that fan out from that person. Writing in the International Journal of Ad Hoc and Ubiquitous Computing, Tinghuai Ma of Nanjing University of Information Science and Technology, Nanjing, China, and colleagues describe a way to look at an ego network and to automatically and accurately glean information about the community surrounding the person at its centre. Obviously, by applying such an analysis to different individuals it should be possible to build up a picture of the wider community. The approach developed by the team could be useful users themselves, allowing them to take control of their contacts in an automated manner.

The team can build up circles of friends from their analysis. In a three-step process that looks for the similarities between user attributes, features of network structure, and the contact frequency between the central user, the ego, and their friends. “We compare the similarity among attributes of users first, the team reports, they can then “divide all friends by the similarity of properties between any friend and the central user.”

Xing, F., Ma, T., Tang, M. and Guan, D. (2019) ‘Friend circle identification in ego network based on hybrid method’, Int. J. Ad Hoc and Ubiquitous Computing, Vol. 30, No. 4, pp.224–234.

15 April 2019

Special issue published: "Rethinking Public Ownership for the 21st Century"

International Journal of Public Policy 15(1/2) 2019

  • A tale of two nationalisations: experiences of post 1945 public ownership in the UK and France compared
  • James Meade, public ownership, and the idea of a citizens' trust
  • Socialising capital: looking back on the Meidner plan
  • Models of fair public ownership: lessons from Singapore and Hong Kong
  • The Greek experience of privatisation through the Hellenic Republic Asset Development Fund
  • Democratic ownership in the USA: a quiet revolution
  • The potential of state commercial property: mapping and managing non-financial public assets
  • The ownership and funding of natural capital: the case for trusts and a public natural capital fund
  • The case for citizens' wealth funds
  • Public state ownership within varieties of capitalism: regulatory foundations for welfare and freedom

Free sample articles newly available from International Journal of Business Forecasting and Marketing Intelligence

The following sample articles from the International Journal of Business Forecasting and Marketing Intelligence are now available here for free:
  • Capturing marketing information and marketing intelligence: ethical issues and concerns
  • An empirical analysis to study the impact of marketing mix elements on overall quality of water purifiers: evidence from India
  • Exploring the role of technological developments and open innovation in the survival of SMEs: an empirical study of Pakistan
  • An examination of the interplay between country-of-origin, brand equity, brand preference and purchase intention toward global fashion brands
  • Brand passion and its implication on consumer behaviour
  • Perception and switch intention of rural customers towards organised retail
  • Time taken to complete a meal: a distinctive study of full-service restaurants in India

Special issue published: "Collaborative Innovation Networks"

International Journal of Entrepreneurship and Small Business 36(4) 2019

  • Exploring the effect of venture capital development on innovation performance of knowledge-based companies
  • Look inside. Predicting stock prices by analysing an enterprise intranet social network and using word co-occurrence networks
  • How gender affects collaborative innovation networks performance: the case of the Dutch fashion industry
  • Dynamic resolve model: an interpersonal resilience construct
  • Network processes for collaborative innovation
  • A network-based dashboard for cultural heritage promotion in digital environments
  • Web data geostatistics and analytics to evaluate the impact of a cultural event
  • A pattern language for designing innovative projects: project design patterns

12 April 2019

Free sample articles newly available from International Journal of Electronic Customer Relationship Management

The following sample articles from the International Journal of Electronic Customer Relationship Management are now available here for free:
  • The influence of the personality traits of webcasters on online games
  • Exploring the hidden potential of product design to mitigate supply chain risk
  • New determinants of ease of use and perceived usefulness for mobile banking adoption
  • Understanding the impact of service convenience on customer satisfaction in home delivery: evidence from Pakistan
  • The influence of hedonic motivation, self-efficacy, trust and habit on adoption of internet banking: a case of developing country

Research pick: Listen up! Workshopping the urban soundscape - "Experiencing the soundscape with mobile mixing tools and participatory methods"

A soundscape workshop offered young people an opportunity to participate in the conversation surrounding the urban sonic environment, changes in it, and its future. The outcomes are discussed in the International Journal of Electronic Governance in the context of a large, creative Europe project known as “The People’s Smart Sculpture”.

Aura Neuvonen of the Department of Film and Television at Helsinki Metropolia University of Applied Sciences, in Helsinki, Finland, examined the issues of creating and experiencing soundscapes in the mobile soundscape workshop. “The soundscape platform and the workshop method was created to experiment with mobile and participatory methods with sound and sonic experiences,” she explains. The sub-project entitled “Neighbourhood as a living room” was focused on finding new ways to make exhibitions at the Helsinki Museum of Technology more interesting especially to young people. The findings could have wider implications for other museums, galleries outdoor installations, and events.

During the workshops, participants generated soundscapes using a mobile tool known as “Soundspace” and an Audio Digital Asset Management System developed at Metropolia. Having created their soundscapes, they listened to each other’s and discussed their experiences and opinions. “The participants’ focus on hearing, listening and observing their surrounding sonic environment increased when emotional engagement and personal experiences were acknowledged during the workshop,” Neuvonen explains, an important point in the wider context of taking part in the discussion about our aural environment.

Neuvonen, A. (2019) ‘Experiencing the soundscape with mobile mixing tools and participatory methods’, Int. J. Electronic Governance, Vol. 11, No. 1, pp.44–61.

11 April 2019

Free sample articles newly available from International Journal of Security and Networks

The following sample articles from the International Journal of Security and Networks are now available here for free:
  • Privacy-aware transmission scheme based on homomorphic proxy re-encryption for NDN
  • An android malware static detection scheme based on cloud security structure
  • An ID-based authentication scheme to achieve the security of smart card
  • Evaluation of anonymous digital signatures for privacy-enhancing mobile applications
  • A secure electronic voting protocol with a simple ballot's encryption function
  • CRT based multi-secret sharing schemes: revisited

Special issue published: "Intellectual Energy Technologies: Prospects and International Experience"

International Journal of Energy Technology and Policy 15(2/3) 2019

  • Career shifting algorithm creating virtual frequency upsurge to reduce switching losses in multi-inverter fed induction motor drives
  • A novel operating strategy for unscheduled interchange price-based automatic generation control
  • Optimal sizing and placement of dynamic voltage restorer in the distribution system using firefly algorithm
  • Technical objects diagnostics systems organising
  • Energy-saving efficiency and potential in educational establishments of Neryungrinsky Region
  • The basic principles of increasing in efficiency of data compressing in information-measuring systems
  • System for automatic soil sampling by AUV equipped with multilink manipulator
  • A method to minimise the energy consumption of an industrial robot
  • Specifics of assessing energy security of isolated energy service areas in territories with harsh climatic conditions
  • Energy and performance improvement using real-time DVFS for graph traversal on GPU
  • Optimal design of stand-alone hybrid power system using wind and solar energy sources
  • Do time phase and income influence the convergence in energy intensity? A cross-country analysis
  • Carbon emissions, energy consumption and economic growth: a causality evidence
  • Neural network with genetic algorithm for forecasting short-term electricity load demand



Free sample articles newly available from International Journal of Services, Economics and Management

The following sample articles from the International Journal of Services, Economics and Management are now available here for free:
  • Effect of conflict and emotions on perceptions of social loafing in groups
  • Role of information of service quality in formation of behavioural intention among students: empirical analysis in university settings
  • Antecedents and outcomes of telecom reputation in Ghana
  • Outsourcing in-house food operation in a hotel organisation in Hong Kong
  • Is the complementarity between remittances and human capital development a panacea for income inequality reduction?

Research pick: Online social security - "Social media security and privacy protection concerning youths. ‘How to be safe, secure and social"

How might we ensure that our young people are safe and secure while being sociable online? That is the question addressed by a team in the International Journal of Business Innovation and Research.

In the age of online social networks and social media, countless millions of us are connected to internet services other individuals and corporations almost constantly. We rely heavily on social media to obtain and share information, news, and multimedia content. Moreover, we share much of this information with relatives, friends, and other online users. What is not always obvious to many users is just how much of our personal and private information is being shared across these networks and with the corporations that offer the services, often at no obvious financial cost to us, but ultimately at some cost to our privacy and perhaps our security.

Ajith Sundaram of Anna University, in Chennai and P. Radha of the SNT Global Academy of Management Studies and Technology, in Coimbatore, India, have investigated the impact of phishing, profile squatting, image tagging, spamming, cross profiling, and other activities on youth security and safety online. Their modelling of social media activity does show that security and privacy concerns have a moderating effect of perceived privacy on trust. The pair offers practical and theoretical implications that could be applied irrespective of whether an individual or an organization is being discussed. The researchers highlight best practice that might be employed to protect online privacy.

Sundaram, A. and Radha, P. (2019) ‘Social media security and privacy protection concerning youths. ‘How to be safe, secure and social”, Int. J. Business Innovation and Research, Vol. 18, No. 4, pp.453-471.