- A study of consumer buying behaviour towards E-pharmacies in Delhi NCR
- A case study on combined economic emission and load dispatch using biogeography based optimisation technique
- Study on swarm intelligence algorithms in different computing techniques for cyber security
- Performance analysis of a wind farm on transmission network using DIgSILENT power factory
- Tone detection for Indian classical polyphonic instrumental audio using DNN model
- Digital marketing: changing consumer behaviour
- Digital innovation: changing the face of business
18 May 2021
- Experiences of the Ebola victims in the West African nations: a human rights imperative
- A visible theme in the history of international law: international or global?
- Immunity or exemption: what are the consequences for sovereign wealth funds with respect to sovereign immunity vis-à-vis tax exemptions?
- Digital privacy in a media orientated world
- Filling the legal vacuum in combatting maritime crimes: a law reform strategy for Malaysia
Inderscience Publishers are pleased to announce that the International Journal of Knowledge Management Studies has been indexed by the Clarivate Analytics' Emerging Sources Citation Index.
Prof. Jin Chen, Editor in Chief of the journal, says, "This is really good news. Being indexed in ESCI marks another major milestone for our journal. As the Editor in Chief, I would like to take this opportunity to express my great thanks to our authors, reviewers, global community of readers and editorial board members who have worked for IJKMS as volunteers for the past few years. We will continue to uphold the principle of high-quality publishing and provide more in-depth and wide-breadth coverage of cutting-edge research results for researchers and practitioners in the field of knowledge management."
How can international law be used to control the spread of emergent diseases that lead to mass outbreaks and global pandemics, such as the coronavirus, SARS-CoV-2 that has plunged the world into the COVID-19 pandemic? That question is addressed by research published in the International Journal of Public Law and Policy.
Rajat Banerjee of the School of Law and Justice at Adamas University in Kolkata, West Bengal and Abhinav Kumar of the School of Law at GD Goenka University in Haryana, India, explain that epidemics and pandemics destabilise existing global health infrastructure and present nation-states with an alarming set of circumstances in which they must attempt to protect their citizens and maintain, the rule of law, economic stability, and infrastructure.
The team suggests that international law may well have a role to play in providing legal safeguards that address many of the issues that arise when a new disease emerges. It can do so by punishing those at the nation-state and citizen level who are to blame if they are found to be directly and substantially responsible for such outbreaks, for instance. Such a deterrent could substantially lower the risk of a newly emerged pathogen emerging into the world arena if those who allow it to happen through negligence or ignorance know that they might be punished for their actions or inaction. An analysis of the current literature in the realm of international law leads the authors to the conclusion that a “one-size-fits-all” is needed for this legal approach at the international legal.
A Pandemic Convention is needed, the team writes. All nation-states would be obliged to adhere to its rules and laws so that the failures of nation-states and citizens we have seen in facing past disease outbreaks would not be repeated and we might prevent the next emergent pathogen from wreaking a global pandemic that might be even worse than the current coronavirus pandemic in which the world is currently entangled.
Banerjee, R. and Kumar, A. (2021) ‘The role of international law in controlling disease outbreaks’, Int. J. Public Law and Policy, Vol. 7, No. 1, pp.74–96.
Free sample articles newly available from International Journal of Engineering Systems Modelling and Simulation
- Performance improvement of distributed system through load balancing and task scheduling using fuzzy logic
- Experimental study and numerical analysis on the vertical bracket of the plate buckle
- Radial rasis function for non-matching mesh interpolation in parallel solving FSI problem
- Three-dimensional visual modelling of geological information of hydraulic engineering based on surface constraint reconstruction
- Research on lifetime distribution and reliability of IGBT module based on accelerated life test and K-S test
17 May 2021
Free sample articles newly available from International Journal of Technological Learning, Innovation and Development
- A comparative approach to national innovative capacity in the long-run: Spain between Europe and Latin America
- Response to disruptive innovation with hybrid products: transition of Oracle's business applications to cloud computing
- Innovation competencies of individuals as a driving skill sets of future works and impact of their personality traits
- The diffusion of nationwide ICT innovation and socio-economic context: case of the internet
- Work stress and work life balance: a study of working professionals of the IT sector
- Determinants of foreign institutional investments in India (2000-2017): a panel data approach
- Modelling the effects of sustainability marketing on consumers' buying intentions: an application of SEM
- Effects of extrinsic cues on customer attitude and satisfaction towards private labels
- Mega projects effect on destination Ethiopia: using destination image dimensions as a mediator
- Interaction between brand trust and customer brand engagement as a determinant of brand equity
- Mobile shopping adoption by Indian consumers: an examination of extended technology acceptance model
- Envisioning a mutually inclusive growth story: a case study of Microsign Products
- Simple tuning of modified Smith predictor for unstable FOPTD processes
- Performance enhancement of double-gate tunnel FETs using dual-metal and graded-channel configuration
- Development of a highway driving events identification and classification using smartphone
- A simple method for study of effect of Kerr nonlinearity on effective core area, index of refraction and fractional modal power through the core of monomode graded index fibre
- A comparative study on the effects of technology nodes and logic styles for low power high speed VLSI applications
- A comparative analysis of the short-channel effects of double-gate, tri-gate and gate-all-around MOSFETs
- Optoelectronic properties of multiple quantum barriers nano-scale avalanche photo diodes
- Development of a visible light communication system for reducing flicker in low data rate requirement
- Comparative performance analysis of FPGA-based MAC unit using non-conventional number system in TVL domain for signal processing algorithm
- Hardware realisation of an intelligent medical image watermarking
- Modulation of millimetre-wave and THz properties of IMPATT sources via external magnetic field
- Systematic design strategy for DPL-based ternary logic circuit
14 May 2021
- Mechanical behaviour and failure characteristics of cemented paste backfill under lateral unloading condition
- CFD simulations of DPM flow patterns generated by vehicles in underground mines for different air flow and exhaust pipe directions
- Impact of hydraulic fracturing and borehole spacing on gas drainage along a coal seam
- Effect of aggloflotation of coal slimes by use Flomin C9606 as a collector
- Implementation of Industry 4.0 technologies in the mining industry - a case study
Free open access article available: "Learning from global suppliers: the diffusion of small wind in low- and middle-income countries"
The following paper, "Learning from global suppliers: the diffusion of small wind in low- and middle-income countries" (International Journal of Technological Learning, Innovation and Development 13(1) 2021), is freely available for download as an open access article.
It can be downloaded via the full-text link available here.
Research pick: Detecting glaucoma early - "A novel hybrid approach to blaze out a new path for glaucoma detection, monitoring and sustainable results in fundus images"
Glaucoma is a group of eye diseases wherein increased pressure within the eye can, if left untreated, lead to damage to the optic nerve and vision loss. Its detection relies on measuring intraocular pressure, visual examination of the interior of the eye, and testing of the entire field of vision with specialist instrumentation.
Glaucoma develops slowly over time and causes no pain. However, as the pressure from the eye and its blood vessels insidiously damages the optic nerve, peripheral vision suffers initially and then central vision. If left untreated complete blindness ensues. Glaucoma is the most common cause of irreversible blindness with around 80 million people having the condition and more than 10 million of those going on to suffer complete vision loss.
The vast majority of those who have the worst possible outcome live in the developing world where the majority of sufferers will be wholly unaware of their condition until it is too late. Thus inexpensive and efficient approaches that reduce the workload on ophthalmologists would be a boon in those parts of the world.
New work published in the World Review of Science, Technology and Sustainable Development takes a novel approach to the detection of glaucoma. S. Ajitha and M.V. Judy of the Department of Computer Applications at Cochin University of Science and Technology, in Kerala, India, explain how glaucoma is a “gruesome thief” that might be routed out if detected early. The team has now developed an algorithmic detective that can identify characteristics of glaucoma present in images of a patient’s “fundus”. The fundus is the interior surface of the eyeball opposite the lens, which lies behind the cornea at the front of the eye.
The algorithm is trained with fundal images from patients known to have early-stage glaucoma. Subtle characteristics of early-stage glaucoma that would be invisible even to the trained ophthalmologist will be made obvious when the algorithm is presented with an image from a patient. The team has demonstrated sensitivity, specificity, and accuracy beyond that seen with other algorithmic approaches and suggests that the approach can offer 100 percent accuracy in automatically detecting glaucoma early and so allow the ophthalmologist to offer treatment before any damage is done to the optic nerves.
Ajitha, S. and Judy, M.V. (2021) ‘A novel hybrid approach to blaze out a new path for glaucoma detection, monitoring and sustainable results in fundus images’, World Review of Science, Technology and Sustainable Development, Vol. 17, Nos. 2/3, pp.220–235.
13 May 2021
- Developing happiness quotient among students to support their cognitive learning and academic performance
- A design rationale to support data use in successful teacher practice: some considerations for educational technology design
- Connections between participation in mini-companies and intrinsic motivation and effort at upper secondary school
- Examining the relationships of factors influencing student mathematics achievement
- Mining MySQL error logs to map student learning
Research pick: Human rights in the post-pandemic world - "The idea of a human rights-based economic recovery after COVID-19"
Can we embed human rights in our economic recovery after the COVID-19 pandemic? That is the hope discussed in a paper published in the International Journal of Public Law and Policy. Katharine Young of Boston College Law School in Newton, Massachusetts, USA, explains how COVID-19 pandemic has plunged the world into an unprecedented health and economic crisis and will require an unprecedented approach to recovery.
“As economists and policymakers turn to the task of recovery, protecting human rights remains intrinsically important, both morally and legally. It is also instrumental to the ends of public health and economic resilience,” Young writes. She argues that that the human rights to life, health, education, social security, housing, food, water and sanitation, are as essential as civil and political protections.
The COVID-19 pandemic has wrought inevitable indignities and material deprivations, the recovery should ensure that those deprivations are not simply propagated in the post-pandemic world. Economic and social rights must be respected in the aftermath of the pandemic. Moreover, our recovery must build on our history and understanding of past social and economic crises and go beyond those lessons to renew our commitment to ending inequality in all its forms.
“…a human rights approach does not offer a singular, uniform policy prescription,” Young adds. “Instead, it offers the parameters of accountability and participation that have been a known feature (or at a least goal) of the United Nations human rights regime since the Universal Declaration of Human Rights.”
Young, K.G. (2020) ‘The idea of a human rights-based economic recovery after COVID-19’, Int. J. Public Law and Policy, Vol. 6, No. 4, pp.390–415.
12 May 2021
Free sample articles newly available from International Journal of Human Resources Development and Management
- Resources for development: the relationship of HRM practices and continuous learning culture with training success
- New hires' job satisfaction time trajectory
- Turnover intentions of employees of information technology outsourcing suppliers in Vietnam
- Training and the competitiveness of the Québec multimedia-IT sector
- Job satisfaction of returnees to Japan
Free open access article available: "Treaty framing and climate science: challenges in managing the risk of global warming"
It can be downloaded via the full-text link available here.
- A maturity model for DevOps
- A framework to promote social sustainability in industry 4.0
- Multidisciplinary design automation – a conceptual framework for working with product model extensions
- A proposal of integrated worker-monitoring system towards ergonomic manufacturing environment
- Conceptual model for pair design and pair testing based on the characteristics of pair programming
- Industry 4.0 in New Zealand dairy industry
- Transdisciplinary systems engineering: implications, challenges and research agenda
- Application of response surface methodology in evaluating the performance of conventional, wiper, cryogenically treated and coated (TiN, TiAlN and TiCN) carbide inserts in turning of AISI 52100 steel
Research pick: Rebalancing work and life - "Work stress and work life balance: a study of working professionals of the IT sector"
Juggling one’s job and one’s personal life, the so-called work-life balance, is high on the agenda for the modern worker especially as we begin to realise how imbalance can lead to mental health problems and even physical issues. New work published in the International Journal of Technology Transfer and Commercialisation, has looked at how improved work-life balance among company employees not only benefits them as individuals but also has a marked effect on productivity and thus profits.
Poonam Kaushal Balaji of the Institute of Modern Management at the Sri Balaji Society in Pune, India, points out that a lot of stress in a person’s life is focused on their job. She has surveyed hundreds of IT workers in the three Indian cities of Chandigarh, Bangalore, and Pune with the aim of identifying workplace factors that cause stress and affect the elusive perfect work life balance in this profession. Statistical analysis of the results showed significant correlations between workplace stress factors and a detrimental effect on work-life balance.
Organisations compete for talented employees who perform well and are highly competent, but the converse is that this expectation comes with pressure on the employee to always be delivering on their promise and this can bring with it unwarranted stress for some. Pressure on time and targets means that along with the stress, pressure is applied that tips the work-life balance ever in favour of work rather than rest and relaxation. Kaushal goes so far as to describe workplace stress as the “exterminator of the work-life balance”.
She suggests that there is a pressing need to address this problem with new rules for employers and employees alike that can provide new balance and reduce the risk to mental and physical health in the high-pressure IT industry.
Kaushal, P. (2021) ‘Work stress and work life balance: a study of working professionals of the IT sector’, Int. J. Technology Transfer and Commercialisation, Vol. 18, No. 1, pp.4–15.
11 May 2021
- Spatial and temporal variations of water quality in Pallikaranai wetland, Chennai, India
- Potential health risks of polycyclic aromatic hydrocarbons associated with sediment and seafood from a Ramsar site
- Economic evaluation of massive restoration in Brazil: how to achieve the iNDC-Brazil target
- Saving old cities: land use regression model for traffic emissions in the Historical Peninsula of Istanbul
- Evaluation of sediment yield (Qs) in Bishezard watershed located southwest of Iran, using PSIAC and MPSIAC models
Free sample articles newly available from International Journal of Technology Transfer and Commercialisation
- Hindsight-insight-foresight: a strategic combination for enterprises in a VUCA world?
- Taxonomy of VUCA in Indian start-ups: the future of entrepreneurship
- Predictive modelling to illustrate factors influencing students at risk
- Employability through networking: a way forward
- A practical approach to critical thinking among EFL learners
- Information technology adoption model in Indonesian creative industry clusters: toward strengthening competitive advantages
- Difference in activities of four levels of gross license income in university TLOs
Special issue published: "Green Economy: Energy, Industry and Agricultural Aspects" (includes free open access article)
- Irrigated agriculture: a tool for green revolution in Ghana?
- State support policy for renewable energy development in emerging economies: the case of Ukraine
- Service learning as an educational outreach project for community's sustainable development and social responsibility support
- The system of indicators for alternative energy development in the context of the green economy
- World trends in bioethanol and biodiesel production in the context of sustainable energy development
- Environmental and economic regulation of sustainable spatial agroforestry
- Compensation mechanism for damage from ecosystem services deterioration: constitutive characteristic
- Econometric analysis of the national economy sustainable development based on environmental Kuznets curve
- Food security and green economy: impact of institutional drivers
- The evaluation of economic, environmental and energy security: composite approach
- From shadow economy to lower carbon intensity: theory and evidence
- Greening economy vs. greening business: performance indicators, driving factors and trends
- Human capital development as a factor in achieving sustainable development and enterprise competitiveness
- A dynamic approach to the study of institutions in a green economy: macroeconomics, regions and industries
- Persistent water pollutants: case of ethylenediaminetetraacetic acid in the Czech Republic
- Treaty framing and climate science: challenges in managing the risk of global warming [FREE OPEN ACCESS ARTICLE]
Research pick: Secret handwriting - "A handwriting document encryption scheme based on segmentation and chaotic logarithmic map"
Schoolchildren the world over know the way to write secret messages on paper using lemon juice or wax or other household substances. The invisible message is written with the appropriate material and is only revealed when the recipient “decodes” it using heat or some other way to develop the hidden substance.
A more sophisticated approach to secret messages is needed in the adult world, of course, and there are many different tools that allow sensitive documents to be encrypted beyond brute-force attack so that only the legitimate recipient can read them. Such technology works optimally with the digital output of word-processing and related software where the bits and bytes of the document can quickly and efficiently be scrambled using a password or key. The reverse process is then only available to the holder of the key.
However, there is a problem when it comes to handwritten documents. A scanned image of such a document is not composed of bytes representing the letters and words of the document, rather it is a map of all of the pixels making up the document. As such, a handwritten document might be encrypted by applying an appropriate tool for image encryption providing the scanned document is of sufficiently high resolution. Either way, there will be a lot of redundancy in the encrypted image file. This means greater processing power is needed for the initial encryption, the encrypted document file size will be larger than necessary, and the decryption process itself will use excessive processing power to retrieve the original document.
Such matters are perhaps of little consequence when considering a short segment of handwriting, but a handwritten report running to many pages would best be encrypted with a more efficient technology aimed specifically at the written word.
Writing in the International Journal of Information and Computer Security, a team from the Higher Colleges of Technology in Abu Dhabi, United Arab Emirates, have demonstrated such a technology in the form of a handwriting document encryption scheme based on segmentation and chaotic one-dimensional logarithmic map. The approach takes the scanned document and breaks it up the words digitally into their component parts, grapheme. The pixel locations of each part of the grapheme rather than the whole scanned area of the document are then scrambled with the encryption key. The team has offered proof of principle with standardized test documents and demonstrates how efficient their process is.
The team explains that there are 2 to the power of 180 (2180) possible encryption keys for their approach, which makes it immune to brute-force attacks with current computers. Moreover, their statistical analysis indicates superior permutation and substitution properties for their proposed encryption scheme compared with conventional image encryption schemes applied to the same test documents. The process is relatively slow but the team is now optimizing performance for real-world applications. One additional benefit is that the same technology might also be adapted to different alphabets and perhaps even character-based languages without compromising the performance and efficacy.
Abu-Amara, F. and Bensefia, A. (2021) ‘A handwriting document encryption scheme based on segmentation and chaotic logarithmic map’, Int. J. Information and Computer Security, Vol. 14, Nos. 3/4, pp.327–343.
Free sample articles newly available from International Journal of Supply Chain and Inventory Management
- Performance evaluation of vendor managed inventory variables in hospitals using ANOVA technique
- Economic order quantity - a tool for inventory management - a case study
- Product acquisition management in a high-end server remanufacturing environment
- Development of Inventory model for inventory induced demand and time-dependent holding cost for deteriorating items under inflation
- Measuring supply chain performance of tyre manufacturers in India: an empirical investigation
10 May 2021
- A parallelistic approach toward ontology design to overcome system's nuance in decision governance
- Developing a systematic methodology to build a systems dynamics model for assessment of non-technical risks in power plants
- Mission planning and scheduling for Earth observation space system
- On extending transitions logic in hybrid dynamic systems based on bond graph and Petri nets combination
- The handling of people smuggling involving foreign nationals as efforts to safeguard Indonesian territories
- Economic diplomacy in small countries: a four-action plan for the Cayman Islands
- What can be learned from Israel by the European Union in the field of innovation?
- Evaluation of Save-ideas intellectual property protection concept
- Improving competitiveness between EU rural regions through access to tertiary education and sources of innovation
- Analysis of a Blockchain-based website using the technology acceptance model: the case of Save Ideas
- Connecting and protecting knowledge from different disciplines into sensible toolbox approaches in medium-sized cities: the case of liminal city Cadasters
Special issue published: "Novel Approaches to the Management and Protection of Emerging Distributed Computing Systems"
- Benchmarking management techniques for massive IIoT time series in a fog architecture
- DIOXIN: runtime security policy enforcement of fog applications
- Black-box load testing to support auto-scaling web applications in the cloud
- LISA: a lean information service architecture for SLA management in multi-cloud environments
- Evaluation of innovative solutions for e-mobility
- Usage of DTNs for low-cost IoT application in smart cities: performance evaluation of spray and wait routing protocol and its enhanced versions
- FOGSYS: a system for the implementation of StaaS service in a fog computing using embedded platforms
- Crowdsensing campaigns management in smart cities
- A knowledge and intelligent-based strategy for resource discovery on IaaS cloud systems
- Dynamic quality of service for different flow types in SDN networks
- Optimising fracture in automotive tail cap by firefly algorithm
- Multi objective ant colony algorithm for electrical wire routing
- A self-tuning algorithm to approximate roots of systems of nonlinear equations based on the firefly algorithm
- Accelerated grey wolf optimiser for continuous optimisation problems
- Improving the cooperation of fuzzy simplified memory A* search and particle swarm optimisation for path planning
7 May 2021
Free sample articles newly available from International Journal of Project Organisation and Management
- Leadership in project management: a scoping review
- Emotional intelligence and success of project management: the mediating effect of interpersonal skills
- Ethical challenges during construction project handovers
- Critical factors for benefits realisation in collaborative university-industry R&D programs
- Social protection floors as an investment in the future
- EU economic governance and the COVID-19 crisis: between path-dependency and paradigmatic shift
- 'Building back better': social justice in the green economy
- How Covid-19 post-recovery plans can tackle poverty and address economic inequality in the USA
- The idea of a human rights-based economic recovery after COVID-19
Free sample articles newly available from International Journal of Manufacturing Technology and Management
- Optimal design of flux for submerged arc weld properties based on RSM coupled with GRA and PCA
- Investigation on turning parameters on machining time and vibration of carbon fibre reinforced laminates
- Cellular layout formation by using weighted similarity-based modified flow matrix with process sequence data
- Active acquisition system of LBS-based logistics freight source information
- One size does not even fit one: supply chain strategies in the decline phase
- Investigation of HFRC beams retrofitted using GFRP for enhancement in flexural capacity
6 May 2021
Special issue published: "Artificial Intelligence and Technology Diffusion – Multinational Marketing Management Strategies"
- The role of multinational technology companies in facilitating emerging enabling technologies for industry transformation: the case of artificial intelligence in intelligent manufacturing in Taiwan
- Media richness and adoption intention of voice assistants: a cross-cultural study
- Factors influencing foreign consumers to adopt mobile payment extensions offered by multinational mobile messaging applications
- Multinational enterprises' subsidiary initiative-taking: a model for implementing corporate social responsibility
Free sample articles newly available from International Journal of Information and Operations Management Education
- Decomposing bills of materials using the Gozinto-list-method
- Benefits of self-selected projects from students' workplace as a pedagogical tool in graduate operations management classes
- Information systems freshmen teaching: case experience from day one
- Using transactional distances to explore student satisfaction with group collaboration in the flipped classroom
- Teaching data envelopment analysis in production operations management through an undergraduate research project based on real-world data
- Sales and operations planning spreadsheet homework
Free open access article available: "Is benzoyl peroxide detectable under physiological conditions in orthopaedic cement?"
The following paper, "Is benzoyl peroxide detectable under physiological conditions in orthopaedic cement?" (International Journal of Nano and Biomaterials 10(1) 2021), is freely available for download as an open access article.
It can be downloaded via the full-text link available here.
Research pick: Blurred lines in face recognition - "Face spoofing detection using improved SegNet architecture with a blur estimation technique"
Face recognition has come on apace from a cliched trope of science fiction to a reality of the modern world with widespread use in photography databases, social media, and the security world. However, as with any tool, there are those who would abuse it for nefarious ends. New research published in the International Journal of Biometrics investigates one such aspect of face recognition where a third party might “spoof” the face of a legitimate user to gain access to systems and services to which they are not entitled and offers a suggestion as to how such spoofing might be detected.
Sandeep Kumar, Sukhwinder Singh, and Jagdish Kumar of the Punjab Engineering College in Chandigarh, India, explain how biometrics, including face recognition, has come to the forefront of security in all sorts of realms from the simple accessing of a person’s smartphone to securing sensitive premises. The key to precluding face recognition spoofing lies in the determination of whether the face being presented to the security camera or device is “live” or a static photograph or video rather than the actual person.
The team has turned to an improved SegNet-based architecture that can measure “blur” on the basis of local minimum and maximum left and right edges and calculate blur of horizontal and vertical edges. A flat image such as a photograph or video display presented to a security camera or device would be wholly in focus whereas “depth-of-field” comes into play. With a three-dimensional object, such as a real face, presented to the camera, the eyes would be sharply in focus assuming the camera focused on that part of the face, but the curved sides of the head would be slightly out of focus because they are not in the same plane relative to the camera lens as the eyes. Regardless, it is technically impossible for the whole of a three-dimensional object presented to a camera to be in focus, detecting the blur of parts of the object in front of or behind the focal plane is key to discerning whether a real face is in front of the camera or a flat image.
The team’s proof of principle offers up to 97 percent accuracy, which is an improvement on earlier algorithms when tested against standard benchmarks. Moreover, it can determine the “liveness” of a presented face within about one second. The researchers are now working on improving their system’s speculation abilities by looking at shading, another characteristic of a real face that is is obvious to a person looking at a face but difficult for a computer to detect via a camera.
Kumar, S., Singh, S. and Kumar, J. (2021) ‘Face spoofing detection using improved SegNet architecture with a blur estimation technique’, Int. J. Biometrics, Vol. 13, Nos. 2/3, pp.131–149.
5 May 2021
- Efficient data clustering algorithm designed using a heuristic approach
- Bayesian consensus clustering with LIME for security in big data
- Semantic integration of traditional and heterogeneous data sources (UML, XML and RDB) in OWL2 triplestore
- Sentiment classification of review data using sentence significance score optimisation
- Evaluating information criteria in latent class analysis: application to identify classes of breast cancer dataset
- Improving social media engagements on paid and non-paid advertisements: a data mining approach
- Towards knowledge warehousing: application to smart housing
- Road signs recognition: state-of-the-art and perspectives
- Combining planning and learning for context aware service composition
Free sample articles newly available from International Journal of Business Performance and Supply Chain Modelling
- The influence of greening the suppliers on environmental and economic performance
- Hybrid SEM-neural networks for predicting electronics logistics information system adoption in Thailand healthcare supply chain
- Production and distribution scheduling optimisation in a three-stage integrated supply chain using genetic algorithm
- Green supply chain management: learning from Indian chemical sector
- Performance analysis of a PCM integrated domestic solar water heater by numerical simulations
- A review on performance, heat transfer and exergy analysis of solar flat plate collectors
- One step low temperature synthesis of poly vinyl alcohol stabilised α-Ni (OH)2 nanoparticles - structural, morphological and optical studies
- The review and investigation of sustainable 13-level multilevel inverter control strategies
- Composites materials for sustainable space industry: a review of recent developments
- Investigation on metallurgy and material strength enhancement of 20MnCr5 forged link chain in cement mill
- Prediction of solids outlet moisture content in a continuous wall heated fluidised bed dryer for uniform and binary solid mixtures
- A novel hybrid approach to blaze out a new path for glaucoma detection, monitoring and sustainable results in fundus images
- Sustainable analysis of liver tumour detection using various segmentation techniques
- Experimental studies on treatment of wastewater using Cladophora sp. and advanced oxidation
- Structural and compositional evaluation of waste cooking oil-algal oil biodiesel using FTIR and GC-FID for improved fuel properties
- A comprehensive literature survey for deep learning approaches to agricultural applications
Research pick: Using “ant colonies” to find fake news - "An ant colony optimisation-based framework for the detection of suspicious content and profile from text corpus"
Although it might be said that there has been malicious writing since our ancestors daubed cave walls with ochre symbols or the very first scribes notched letters into ancient stone tablets, fake news, spam, malicious and threatening words have come to the fore with the advent of our ubiquitous and always-connected digital devices. We might refer to this as “suspicious content”.
New work published in the International Journal of Intelligent Systems Technologies and Applications, developed an optimisation framework for detecting suspicious content in a body of text. The algorithm is built on a biological paradigm – the behaviour of an ant colony.
The individual members of an ant colony carry out tasks and use pheromones to communicate with other members of the colony. They can solve rather complex problems together even though the individual ants lack the cognitive skills to do so. In computer science, the way in which individual ants behave, each acting as an agent in a problem “space”, can be modelled in an ant colony optimization algorithm (ACO). This probabilistic technique simulates the way in which the colony finds solutions to problems such as finding and transporting food via the shortest and safest route from food source to the colony’s food store and many other colony activities. Previously, vehicle and internet routing problems have been solved using ACO, but the same approach can be applied to finding solutions to other problems such as detecting patterns of words in a large text corpus, for instance.
Asha Kumari and Balkishan of the Department of Computer Science and Applications at Maharshi Dayanand University in Rohtak, India, have focused on mobile phone text message content (short messaging service, SMS) and updates on the well-known microblogging social media platform Twitter. Given the ubiquity of these services in everything from entertainment, internet banking, navigation, trading, and other services requiring short messages, it is important to have tools to hand to quickly and accurately detect suspicious content.
Kumari, A. and Balkishan (2021) ‘An ant colony optimisation-based framework for the detection of suspicious content and profile from text corpus’, Int. J. Intelligent Systems Technologies and Applications, Vol. 20, No. 1, pp.1–24.
- Investigation on microstructures and phases of Fe-Ga alloy films deposited by magnetron sputtering
- Polysaccharide capped antibacterial silver nanoparticles synthesis using green chemistry
- All optical four bit two's complement generator and single bit comparator using reflective semiconductor optical amplifier
- Controlled hardware architecture for fractal image compression
- Strain engineering in AlGaN/GaN HEMTs for performance enhancement
- Role of stress/strain mapping and random dopant fluctuation in advanced CMOS process technology nodes
- Extended nucleic acid memory as the future of data storage technology
Research pick: Where’s the app for that? - "Leveraging app features to improve mobile app retrieval"
There’s an app for that…but which one to choose?
The growth of software – colloquially known as apps, meaning applications – for mobile devices such as smart phones and tablet computers has been enormous. Well-known apps are easy to find or users learn of them through word-of-mouth. However, searching for a previously unknown app that perfectly fits one’s needs is not always straightforward.
Now, writing in the International Journal of Intelligent Information and Database Systems, a team from Algeria and France have developed a new approach to searching for apps that homes in on the functionality the user needs by mining not only the app’s description but also the reviews left by users. The team’s approach then scores the results offering the user the most relevant app to match their needs. The team describes their proof of principle as effective and able to perform better than the state-of-the-art retrieval models for app retrieval.
Messaoud Chaa of the University of Bejaia and the Research Center on Scientific and Technical Information, CERIST, colleague CERIST colleague Omar Nouali, Algeria and Patrice Bellot of Aix Marseille University, France, explain that there were around 30 billion app downloads in 2019 and this number is growing with growing smartphone and tablet adoption around the world. In the Google Play Store alone there are almost 3 million apps, while the Apple App Store carries more than 2 million. “An efficient app search system is essential”, the team writes and at the present time, there is no perfect tool for searching for the app you need that you don’t know exists.
The team’s approach using natural language processing (NLP) allows them to obtain a score for each app and its functions that can be searched by the prospective user and matched more precisely to their needs than a simple app name search might offer.
Chaa, M., Nouali, O. and Bellot, P. (2021) ‘Leveraging app features to improve mobile app retrieval’, Int. J. Intelligent Information and Database Systems, Vol. 14, No. 2, pp.177–197.
A new video equivalent of optical character recognition (OCR) but for sign language is described by researchers from China in the International Journal of Systems, Control and Communications.
Kai Zhao, Daotong Wang, and Jianbo Su of Shanghai Jiao Tong University and Kejun Zhang and Yu Zhai of the Shanghai Lingzhi High-Tech Corporation discuss a system that can recognise Chinese sign language in a video stream and convert the language in real-time into text. Such a system could be used to automate the generation of subtitles for people sharing the video stream who are not familiar with Chinese sign language. The system was built with a database of half a million video segments and uses a three-dimensional convolutional neural network to extract the relevant frames for conversion.
This is, the team writes, “a complete real-time sign language recognition system” for Chinese sign language. It is composed of a human interaction interface, a motion detection module, a hand and head detection module, and a video acquisition mechanism. The researchers have now demonstrated 92.6% recognition accuracy on a dataset containing 1,000 vocabularies. The system would not only be useful in adding captions to video of a signer but could be used in public areas such as hospitals, banks, and train stations where a person signing could talk to a member of staff who is a non-signer for instance.
The team adds that improvements to the accuracy of the system might be made by incorporating skin detection to extract greater subtleties from the movements of the person signing. Likewise, the addition of detection of the signers underlying skeleton would also add to the sophistication of the recognition system and so improve accuracy.
Zhao, K., Zhang, K., Zhai, Y., Wang, D. and Su, J. (2021) ‘Real-time sign language recognition based on video stream’, Int. J. Systems, Control and Communications, Vol. 12, No. 2, pp.158–174.
4 May 2021
Free sample articles newly available from International Journal of Data Analysis Techniques and Strategies
- Hybrid fuzzy logic and gravitational search algorithm-based multiple filters for image restoration
- Bayesian feature construction for the improvement of classification performance
- A novel ensemble classifier by combining sampling and genetic algorithm to combat multiclass imbalanced problems
- Dynamics of the network economy: a content analysis of the search engine trends and correlate results using word clusters
- Face spoofing detection using improved SegNet architecture with a blur estimation technique
- Image recognition method for fault service action of tennis based on feature matching
- A gait recognition method for a moving target image in sports based on a decision tree
- Target tracking and recognition of a moving video image based on convolution feature selection
- Feature extraction method of face image texture spectrum based on a deep learning algorithm
- An analysis of Mandarin emotional tendency recognition based on expression spatiotemporal feature recognition
- Research on emotion recognition method of weightlifters based on a non-negative matrix decomposition algorithm
- The method of table tennis players' posture recognition based on a genetic algorithm
- Improvement of a face recognition method for high jumper with a single sample based on Lucas-Kanade algorithm
- Feature similarity measurement of cross-age face images based on a deep learning algorithm
- Multi-view face pose recognition model construction based on a typical correlation analysis algorithm
- Recognition algorithm of athletes' partially occluded face based on a deep learning algorithm
- Multi-scale neighbourhood based-tree binary pattern: a new feature descriptor for face recognition
- Proposition of new secure data communication technique based on Huffman coding, chaos and LSB
Free sample articles newly available from International Journal of Service and Computing Oriented Manufacturing
- A big data services platform framework towards cloud manufacturing system
- Multi-objective machining parameter optimisation for residual stress based on quantum cat swarm
- Smart factory and education: an integrated automation concept
- Advanced planning and scheduling system with application in the tobacco industry
- A protégé semantic modelling approach for combination correlation of manufacturing service
- MIMO wireless power transfer based on magnetic beamforming
30 April 2021
Special issue published: "Advances in Machine Learning and Intelligent Systems – Challenges and Solutions"
- Demographical gender prediction of Twitter users using big data analytics: an application of decision marketing
- Energy efficient task scheduling using adaptive PSO for cloud computing
- Deep learning-based detection and prediction of trending topics from streaming data
- NITCO: an intelligent agent technique for optimising of resource utilisation in cloud
- A novel approach for dynamic information integration
- Utilising predictive analytics for decision-making and improving healthcare services in public maternal healthcare database
- Computing semantic relatedness using latent semantic analysis and fuzzy formal concept analysis
- Adaptive edge-based bi-cubic image interpolation
- Deep convolutional neural network-based diabetic eye disease detection and classification using thermal images
Free sample articles newly available from International Journal of Intelligent Systems Technologies and Applications
- A novel and improved developer rank algorithm for bug assignment
- Meta-heuristic techniques for path planning: recent trends and advancements
- Design of generalised predictive controller for dynamic positioning system of surface ships
- Detection of glaucoma based on cup-to-disc ratio using fundus images
- Machine transliteration using SVM and HMM
- SPIDER-based out-of-order execution scheme for Ht-MPSOC
- An efficient pattern matching approach using double measures of correlation and rank reduction
- Modified FPred-Apriori: improving function prediction of target proteins from essential neighbours by finding their association with relevant functional groups using Apriori algorithm
- A new image binarisation technique for segmentation of text from digital images
- Metaheuristics-based routing optimisation, balanced workload distribution and security strategy in IoT environment
Research pick: Stockmarkets in the time of covid - "Examining the impact of coronavirus on stock markets: investigating the cointegration and transmission of shocks between China and the world’s largest stock markets"
A new study in the International Journal of Business and Emerging Markets looks at how the beginning of the COVID-19 pandemic affect stockmarkets in China and how the “shocks” experienced there were transmitted to the world’s largest stockmarkets.
Naveed Ul Haq and Abid Shirwani of the University of Management and Technology in Lahore, Pakistan, used a wide range of analytical tools to examine the ebb and flow of value in the long-run and short-term over the period January 2012 to March 2020, which culminated in the announcement of a global pandemic. The tools included unit root test, Johansen cointegration test, vector error correction model, Granger causality test, variance decomposition, and impulse response function test.
The team observed long-run relationships between stock markets and could clearly see short-run results showing that the previous day’s stock prices in Hong Kong and the US had a positive relationship with the Chinese stockmarket. The Granger causality results, however, showed something different – a unidirectional long-run causality from the UK, Hong Kong and Japan to China. In the short-run causality results the effects are bidirectional between China and the world’s major stockmarkets.
The team explains how their findings support the well-known prospect theory or loss-aversion theory, whereby investors are generally more afraid of loss then they are encouraged by a gain. This means that given a choice of two different prospects, investors will generally choose the one that has less chance of ending in a loss rather than the one that offers more gains. In terms of the COVID-19 crisis, the study suggests that it was not the socioeconomic circumstances prior to the pandemic that influenced stockmarket reactions but rather the health policies implemented during the crisis that had the most impact.
Ul Haq, N. and Shirwani, A.H.K. (2021) ‘Examining the impact of coronavirus on stock markets: investigating the cointegration and transmission of shocks between China and the world’s largest stock markets’, Int. J. Business and Emerging Markets, Vol. 13, No. 2, pp.206–232.
29 April 2021
- T-S fuzzy observers design and actuator fault tolerant control applied to vehicle lateral dynamics
- Solar integrated combined cooling-power generation systems for waste heat recovery using different energy efficient materials
- Robust integral sliding mode controller design of a bidirectional DC charger in PV-EV charging station
- A summary study on handwritten documents' word spotting
- Numerical approach for parameter extraction of a photovoltaic module based on datasheet and five parameters model
- Fault detection and isolation using sliding mode observers with sensor fault in robot manipulator
- Testing and simulation of a solar PV/battery storage system with and without PWM charge control
- Effect of some operational conditions on bioelectricity production in algal fuel cell Free access
- Enhancing the performance of a building integrated compound parabolic photovoltaic concentrator using a hybrid photovoltaic cell
- Contribution to the reliability study of photovoltaic systems using static and dynamic analysis methods
- Renewable energy investment prospects in Turkey's power generation sector
International Journal of Powertrains to invite expanded papers from International Conference on Advanced Vehicle Powertrains (ICAVP2021) for potential publication
Research pick: Women entrepreneurs in STEM - "STEM educated women entrepreneurs in Denmark, Latvia and Turkey: a context-based explorative study"
A new study from researchers in Denmark and Germany suggests that despite the growing number of women entrepreneurs, numbers in the STEM (science, technology, engineering, and mathematics) are now adequately represented in this trend. Details of an exploratory study across Denmark, Latvia, and Turkey, are reported in the International Journal of Entrepreneurial Venturing, and hope to explain this underrepresentation in STEM.
Sanita Ármane, Seda İrem Gärtig, and Silke Tegtmeier of the University of Southern Denmark, in Sønderborg and Alexander Brem of the University of Stuttgart, carried out interviews with a number of women entrepreneurs educated in STEM subjects. They uncovered the women’s main motivations, the challenges they face, and the support sources on which they rely to glean important advice for future women entrepreneurs as well as for policymakers to increase the number of STEM-educated women entrepreneurs at the national level.
A recent survey across Europe revealed that only about a third of all the millions of entrepreneurs in the business world are women. This reinforced the long-standing notion that entrepreneurship is a male-dominated field. Moreover, the underrepresentation of women from a STEM background is also rather worrying with most companies run by women not being involved in those areas. Reinforcing a second notion that businesses founded in STEM areas tend to be male-dominated too.
Many observers have argued that encouraging more women entrepreneurs in STEM-related fields is of great importance in terms of economic growth and an enhancing social status. Moreover, gender diversity at the top of any corporate hierarchy is key to ensuring the diversity of employees, again all to the positive in terms of socioeconomic benefits.
This new study points to possible reasons for the shortfall in the number of women entrepreneurs from a STEM background and running businesses that work in the areas covered by STEM. The work shows the apparent differences across three nations and offers new advice on how women from a STEM background might be encouraged to seek out and exploit new opportunities as entrepreneurs.
Ármane, S., Gärtig, S.I., Tegtmeier, S. and Brem, A. (2021) ‘STEM educated women entrepreneurs in Denmark, Latvia and Turkey: a context-based explorative study’, Int. J. Entrepreneurial Venturing, Vol. 13, No. 2, pp.186–216.
28 April 2021
Special issue published: "Machine Learning, Artificial Intelligence and Big Data: Methods and New Perspectives for Research and Society"
- Depth-based support vector classifiers to detect data nests of rare events
- Automated detection of entry and exit nodes in traffic networks of irregular shape
- Does time-frequency scale analysis predict inflation? Evidence from Tunisia
- A SAS macro for examining stationarity under the presence of endogenous structural breaks
Free sample articles newly available from International Journal of Internet Manufacturing and Services
The following sample articles from the International Journal of Internet Manufacturing and Services are now available here for free:
- Factors affecting users' stickiness in online car-hailing platforms: an empirical study
- Analysis of scientific and technological innovation influence factors affect enterprise performance
- Research and analysis on sensitive data encryption method in accounting information processing system
- Multi-source remote sensing image big data classification system design in cloud computing environment
- Reliability in IoUT enabled underwater sensor networks using dynamic adaptive routing protocol
- Trust-based fruit fly optimisation algorithm for task scheduling in a cloud environment
- Outlier data mining of multivariate time series based on association rule mapping
- Research on virus diffusion prevention method for computer singularity in complex sensor networks
- Research on algorithm of information transmission path planning in big data environment
- The information security scheduling method of vehicle self-organising system for wireless sensor
- Mobile self-organising network positioning algorithm based on node clustering
- Design of candidate schedules for applying iterative ordinal optimisation for scheduling technique on cloud computing platform
- PPHE-automatic detection of sensitive attributes in a privacy preserved Hadoop environment using data mining techniques
- SIBLAR: a secured identity-based location aware routing protocol for MANETs
- Divide-by-16/17 dual modulus prescaler design with enhanced speed in a 180nm CMOS technology
- IoT-enabled traffic sign recognition for safe driving
- A hybrid SATS algorithm-based optimal power flow for security enhancement using SSSC
- HUPM-MUO: high utility pattern mining under multiple utility objectives
- A hybrid approach to diagnosis mammogram breast cancer using an optimally pruned hybrid wavelet kernel-based extreme learning machine with dragonfly optimisation
- Hardware implementation of a modified SSD LDPC decoder
- Spur gear safety prediction through the analysis of stress intensity factor
In this Research Pick, we are highlighting three papers from the International Journal of Web Based Communities that focus on how social media has responded to the COVID-19 pandemic in this time of worldwide crisis.
The first paper discusses how social media and web-based communities in general have responded to the pandemic whereby small groups of worshippers almost overnight converted their usual activities to the online world without much need for intervention from the hierarchy above, as it were. The second offers a personal perspective on the pros and cons, the benefits and challenges of social networking during the pandemic. Finally, the third paper looks at how faith communities have moved online to allow their congregations to continue with their religious endeavours.
The emergence of a novel coronavirus, dubbed SARS-CoV-2, in late 2019 and its subsequent spread around the world leading to the declaration of the disease it causes, COVID-19, as a pandemic led to many changes in the daily lives of billions of people. Of course, there is the ongoing tragedy of those who suffer serious symptoms and in many cases death, and there is also the ongoing problem of so-called Long-covid, symptoms that seem to persist long after the person has stopped being infectious, such as severe fatigue and significant disruption or loss of one’s sense of smell.
The socioeconomic symptoms of this pandemic have seen enormous changes in working practices, closure of many areas of normal life such as entertainment and hospitality, the disruption of sporting events, and more significantly the failure of many companies and enterprises and lost jobs for those affected.
We are yet to fully understand what detrimental impact this disease will have on humanity and at the time of writing, new waves of infections underpinned by new, lethal variants of the disease, are overwhelming healthcare systems in Brazil, India, and elsewhere. Many parts of the world remain in lockdown while others that have escaped the worst ravages so far are keeping a weather eye on their borders in the hope of precluding the spread of a new variant in their country.
The role of social media for the spread of information about COVID-19, vaccination programs, and public awareness of lockdown rules may well have helped reduce the total number of infections and deaths from the earliest and potentially devastating predictions. Moreover, social media and its attendant applications, including video conferencing, have allowed many people to continue their work and maintain family and social connections online in a way that would not be possible without this technology.
There has been a downside to the so-called “new normal” for many, especially those on the wrong side of the digital divide that have no reliable access to the requisite devices and high-speed internet connections needed to make the most of social media and video conferencing and the like. Even for those with access to the necessary tech, the downside of living one’s working life and social life almost exclusively online has exacted a toll on mental health for many people trapped behind a screen and unable to fulfil their old-normal roles in life.
All three papers cited below will appear in IJWBC soon.
Isaias, P., Miranda, P. and Pifano, S. (2021) ‘Framing social media and web-based communities within the COVID-19 pandemic: enduring social isolation and subsequent deconfinement’, Int. J. Web Based Communities, Vol. 17, No. 2, pp.120–134.
Issa, T., Al Jaafari, M., Alqahtani, A.S., Alqahtani, S., Issa, T., Maketo, L. and Pervaiz, S. (2021) ‘Benefits and challenges of social networking during COVID-19: personal perspective’, Int. J. Web Based Communities, Vol. 17, No. 2, pp.135–148.
Cooper, A-P., Jormanainen, I., Shipepe, A. and Sutinen, E. (2021) ‘Faith communities online: Christian churches’ reactions to the COVID-19 outbreak’, Int. J. Web Based Communities, Vol. 17, No. 2, pp.99–119.
27 April 2021
- Exploring learning behaviour under an integrated mobile and web-based learning environment
- Learning curriculum vocabulary through mobile learning: impact on vocabulary gains and automaticity
- A literature review of augmented reality, virtual reality, and mixed reality in language learning
- Shepherds for modern times: designing a blended learning course for communication theology
- The role of organisational performance in moderating human resource management and outstanding outcomes in open distance learning context
- An incremental approach for hierarchical community mining in evolving social graphs
- Object categorisation and flame apprehension
- Efficient wideband filter using closed loop resonator with coupling lines
- An analysis of commitment among college teachers
- LiFi-based smart systems for industrial monitoring
- Product recommendation system using optimal switching hybrid algorithm
- Comparison of automated leaf recognition techniques
- A detailed study on context-aware architectures in internet of things
- Enhancing security by two-way decryption of message passing of EMR in public cloud
- Change detection in Landsat 8 imagery using object-based image analysis with particle swarm optimisation
- An analytical hierarchical process-based weighted assessment of factors contributing precipitation
- A hybrid medical image coding based on block truncation coding and residual vector quantisation
- Near-zero computing using NCFET for IoT applications
- A key-escrow free identity-based signature scheme without requirement of a secure channel in the private key issuance phase
- The role of intangible factors in the intention of repeating a tourist destination
- Addressing tourism in county-level planning documents: a pilot application of the community capitals framework
- Web information, accessibility and museum ownership
- Role of social media in outbound leisure travel: an interpretive analysis of Indian travellers
- Factors influencing e-word-of-mouth adoption among consumers availing travel services
- The impact of Airbnb on hidden and sustainable tourism: the case of Italy
- Stakeholders' motivation to adopt corporate social responsibility practices in the lodging industry in an island destination: Balearic Islands case study
- An empirical multidimensional analysis on sustainable tourism: the dynamics of carrying capacity
- Tourism and energy use in lodges and camps in the Okavango Delta, Botswana
Research pick: African spaceports cut rocket fuel costs - "Prospects of siting a spaceport in Africa"
Space is big business once again, Mars rovers and putative moon landings aside, there is an enormous need for geostationary satellites. With increasing traffic there is also a need for new sites for spaceports that might offer reduced energy costs and simpler launching of new satellites. Writing in the International Journal of Aerospace System Science and Engineering, a team from the Obasanjo Space Centre in Abuja, Nigeria, suggest that African spaceports offer a scientifically and economically viable option.
Rocket propellant is the main constituent of launch weight largely irrespective of payload. Indeed fuel accounts for 90 percent of the launch cost. As such, any measures that might be put in place to reduce fuel requirements can offer substantial savings. A launch site close to The Equator would offer several benefits in terms of reducing fuel costs. Obviously, a stationary object on the equator is moving at almost 1700 kilometres per hour relative to a “fixed” reference in space because of the rotation of the earth. If you launch from north or south of the equator, this boost is lower. Halfway to the pole and the speed boost is only 1200 km/h. Launch from the poles and the boost is negligible, it’s also very cold, which is problematic for many other reasons.
Sesugh Nongo, Ngunan Ikpaya, and Ikpaya Ikpaya of the National Space Research and Development Agency explain that the global space launch services market is projected to reach more than 30 billion dollars by 2025 with a 15% compounding annual growth rate. The demand comes from governments, scientists, as well as commercial concerns looking to launch small satellites and “constellations”. Africa has several spaceports that could be revived to meet this growing launch demand.
The team points out how spaceports, specialised ground-based facilities built to launch and receive launch vehicles, were largely the preserve of the major industrialised nations until the early 2000s . At that time many developing nations such as Nigeria, India, and South Africa saw the cosmic potential of launching satellites for security and economic development. With the advent of miniaturisation in electronics and engineering, the cost of building the devices to be launched fell considerably, there does, however, remain a need to reduce launch costs. An equatorial spaceport could be part of the solution.
Nongo, S., Ikpaya, N.M. and Ikpaya, I. (2021) ‘Prospects of siting a spaceport in Africa’, Int. J. Aerospace System Science and Engineering, Vol. 1, No. 1, pp.35–54.
- Factors affecting Macau undergraduate students' acceptance of hospitality English app: applicability of UTAUT model
- K12 teacher-student interaction patterns in the smart classrooms
- Learning engagement through content creation: a case study
- An evidence-based model of adaptive blended learning for health education serving families with a parent or child who has a medical problem
- Latest advances in STEAM education research and practice: a review of the literature
- Humanism and didactic theorems from the early modern era in the knowledge society
- Teaching approach and student performance in e-learning
- Determinants of purchasing decisions of innovative aesthetic medicine services in Poland
23 April 2021
- Exploring workplace expectations: an empirical study on Millennials of India
- Investigating the role of reinforcement and environmental factors in balancing the state of apprehension: evidence from India
- From verbal abuse to intention to leave: role of engagement and emotional exhaustion
- Impact of HRM practices on organisational commitment: evidence from school educators' in Indian context
- The effect of ethical climate on corporate reputation for sustainability of Indian banking
- Employee happiness, engagement and organisational commitment: a literature review
- Role of the service value network in social transformation
- Role of government in sustainable growth and eco-development of economy
- Impact of SHGs on social, economic and political women empowerment: a case study of Ghaziabad District, India
- Innovation and employee turnover in biotechnology companies: rethinking the role of strategic human resource management
- Performance evaluation of public and private sector banks
- Enquiring the dental practitioners' perceptions about dental tourism: a phenomenological viewpoint
- A hybrid ensemble machine learning model to predict success of Bollywood movies
- Entrepreneurship boost: predicated factors based study in digital era
- The role of leadership in organisational climate, job satisfaction and turnover intention among middle level employees in Indian telecom industry
- Effects of T&D practices on job satisfaction: a study of foreign collaborates operating in India
- A comparative analysis of metaheuristic-based clustering schemes for improving the network lifetime in flying ad hoc networks
- Design of high speed multistream free space optics link under clear weather conditions
- Performance analysis of a 10 Gbps-60 GHz high speed RoF transmission system
- Service priority queuing model-based internet of things middleware for load balancing among fog computing centres
- Load balancing of fog computing centre and its security using elliptic curve cryptography
- Content-based retrieval system for surgery videos
- An approach towards hybrid feature selection for detection of DDoS attack
- AIR-IA: an analogous image removal approach using the intelligent archive
Research pick: Fame and fashion - "Fame and Envy 2.0’ in luxury fashion influencer marketing on Instagram: comparison between mega-celebrities and micro-celebrities"
This week, Inderscience Research Picks are focusing on a special issue of the International Journal of Internet Marketing and Advertising dedicated to social media influencers.
The effects of perception of luxury and consumer envy seem to drive the influencing effect of social media micro-celebrities, whereas consumer purchase intention is not so sharply affected by the online activities, endorsements, and sponsorship deals of mainstream celebrities. This is the basic conclusion of a study from researchers in Qatar and the USA looking at luxury fashion goods.
Venus Jin of the NU-Q Communication Department at Northwestern University in Doha, Qatar and Aziz Muqaddam of the Department of Communication Studies at the University of San Diego, California, USA have looked at the effects of fame and envy in influencing consumers on the photo and video social media platform Instagram.
Instagram has given celebrities yet another platform through which they can enhance their fame and perhaps their fortune. Conversely, by sharing aesthetically pleasing content, such as attractive “selfies” or presenting glamorous, flawless body images, happy and luxurious lifestyles, a significant number of users have gained some celebrity of their own. “The exponential growth of Instagram and the increase of Instagram stars can be ascribed to social media users’ quest for fame and recognition as well as an obsession with idealised self-presentation,” the team writes. This new micro-celebrity status provides some degree of power that an everyday user of a website might well never have gained before the advent of social media.
The new findings could offer scholars of business and marketing with relevant theoretical explanations for certain aspects of consumer psychology in this area. Moreover, there are specific implications for marketing and management on how brand managers and advertising practitioners might utilize the influence of micro-celebrity to good effect in selling more of their product.
Jin, S.V. and Muqaddam, A. (2021) ‘‘Fame and Envy 2.0’ in luxury fashion influencer marketing on Instagram: comparison between mega-celebrities and micro-celebrities’, Int. J. Internet Marketing and Advertising, Vol. 15, No. 2, pp.176–200
22 April 2021
- Integrated application of network traffic and intelligent driver models in the test laboratory analysis of autonomous vehicles and electric vehicles
- Dynamic modelling of a railway wheelset based on Kane's method
- Influence of shock absorber damping rates on the fatigue of anti-roll bars of a commercial vehicle
- A high strength and wear resisting AA5083 alloy for armoured vehicle applications: structure property correlation
- RMF based target position estimation and collision probability forecasting technique in freeway junctions
- Study on vehicle driving state and parameters estimation based on triple cubature Kalman filter
- Response surface methodology based on polyamide incorporated with biolubricant for optimisation of operating parameters in heavy vehicles
- Research on application of artificial intelligence model in automobile machinery control system
- Test research on the adhesive and tractive performance of a wheeled tractor
- Design and implementation of 31 level asymmetrical cascaded MLI with DC-DC flyback converter for photovoltaic system using P&O technique for electric traction application
- Automotive industry application of aluminium-based hybrid metal matrix composite
- Failure analysis of leaf spring suspension system for heavy load truck vehicle
- Research on English teaching information pushing method based on intelligent adaptive learning platform
- Research on classification method of answering questions in network classroom based on natural language processing technology
- A model of foreign language listening ability assessment assisted by mobile devices based on neural network
- Modelling and analysis of the impact of smart mobile devices on learning effect based on partial least square regression
- Research on centralised matching method of teaching knowledge categories based on intelligent language recognition
- An evaluation model of English teaching effectiveness based on online education
- Multi-channel interactive interface model for mobile learning terminal by considering user's requirements
- Research on the impact of mobile terminal on fragmented learning efficiency based on DEA
- Research on timeliness evaluation model of online teaching based on intelligent learning
- A case study of Elphinstone Road foot-over-bridge stampede in Mumbai
- Developing community disaster resilience through preparedness
- Risk assessment of commonly transported chemicals in the Port of Houston
- Risk analysis and allocation in public-private partnership power transmission line projects
- An integrated system approach to characterise a drinking water infrastructure system
This week, Inderscience Research Picks are focusing on a special issue of the International Journal of Internet Marketing and Advertising dedicated to social media influencers.
Digitisation and globalisation mean that today, a large proportion of the world can access content and opinion in an instant and conversely share their own content and opinions just as quickly. The search engines and the social media apps, are the tools with which real news and fake news can spread quickly often in a viral manner. This ubiquitous and always-on stream of information and disinformation has led to the rise of so-called influencers, people who by wit or wisdom have found themselves to be hubs within the network. Nodes that have many, many inbound connections from the world at large over any of whom they might offer a guiding word, for good or bad.
Álvaro Lopes Dias of the Universidade Lusófona in Lisbon, Portugal, and colleagues have looked at one area of influence that can have a direct impact on the health and wealth of those being influenced – diet trends. Nutritional advice and the various guidelines we are spoon-fed by governments and food companies may or may not be valid scientifically, it is almost impossible to discern for any given individual, we can only generalize through statistical data. Nevertheless, influencers with an agenda, or worse, with a sponsorship deal may well push certain advice in the name of selling a particular product, whether that’s a new supplement or superfood. Any specific piece of advice or finding will not apply to everyone but only to the average and may well be harmful to some individuals in the long rung if adhered to without professional medical guidance.
One might hope that the influencers would be promoting the healthy option, whatever that might be, but Lopes Dias and colleagues suggest that this is not the case. Moreover, the team suggests that regulations should be put in place to control the spread of fake food news, pointless diets and supplements, and to allow only qualified nutritional scientists to have any real influence on dietary guidance, rather than the latest micro-celebrity or health “guru” to gobble up a large following on social media.
Vasconcelos, C., da Costa, R.L., Dias, Á.L., Pereira, L. and Santos, J.P. (2021) ‘Online influencers: healthy food or fake news’, Int. J. Internet Marketing and Advertising, Vol. 15, No. 2, pp.149–175.
Free open access article available: "Comparison of affective perception by country for emerging IT products and services"
The following paper, "Comparison of affective perception by country for emerging IT products and services" (International Journal of Mobile Communications 19(3) 2021), is freely available for download as an open access article.
It can be downloaded via the full-text link available here.
21 April 2021
- Employee retention during Cooperative banks' mergers and acquisitions
- Barriers to change implementation process by public and private organisations in Saudi Arabia
- A model of duopolistic patent contest with private provisions of industry collective goods
- Website words matter: an analysis of business schools' online brand personalities
- Examining the role of internal communication and employee engagement in Cyprus-based medium-sized organisations in times of challenging strategic changes
- Assessing the implementation of serialisation in pharmaceutical industry in Greece: a qualitative approach
- Credibility of digital influencers on YouTube and Instagram
- Online influencers: healthy food or fake news
- 'Fame and Envy 2.0' in luxury fashion influencer marketing on Instagram: comparison between mega-celebrities and micro-celebrities
- The influence of 'influencer marketing' on YouTube influencers
- Impact of social media influencers on customer engagement and brand perception
The spring edition of Inderscience's Highlights newsletter is now available, and includes the latest news on newly published journals, awards and editorial appointments. It also lists the open access and sample issue articles that have been made available for free since the previous newsletter.
You can subscribe to Highlights here.
Research pick: Beauty is in the eye of the influencer - "Credibility of digital influencers on YouTube and Instagram"
This week, Inderscience Research Picks are focusing on a special issue of the International Journal of Internet Marketing and Advertising dedicated to social media influencers.
The credibility of digital influencers on YouTube and Instagram is discussed in a paper from Elmira Djafarova of the Faculty of Business and Law at Northumbria University, Newcastle upon Tyne, UK, and Natasha Matson of the Newcastle Business School there. The team has specifically looked at those people who are commonly referred to as micro-celebrities in the realm of beauty on these platforms.
The team found that for “beauty gurus” trustworthiness is the most important factor determining credibility but the quality of the video and images shared and the “professionalism” of the person’s profile is also an important part of the public’s perception of a given influencer. In addition, the team found that those influencers using YouTube had the most effect on viewers aged between 18 and 21 years old and was less potent in the older target group, 22-29 year olds. This, they suggest, implies that beauty reference group influence decreases with audience age.
It has previously been demonstrated that beauty gurus are responsible for all (97.4%) of the conversation and “buzz” surrounding new beauty products. But, there remains a need to understand the credibility and trustworthiness of such people, specifically from the perspective of a company recruiting a beauty guru to assist with a marketing campaign, for instance.
This latest study offers a cautionary tale for those marketing executives hoping to benefit from the micro-celebrity status of social media influencers:
Marketers within the beauty industry can take advantage of micro-celebrity influence, but do so carefully to remain credible, especially given the fickle nature of social media in general. They add that beauty brands should not push sponsored content and should instead focus on persuading micro-celebrities to offer endorsements seamlessly through their profiles rather than their content. This, one might suggest, is akin to the classic celebrity endorsement approach. Such endorsements are less questionable to consumers and more likely to be interpreted as credible electronic word-of-mouth whereas a sponsored review or product placement might be perceived as less trustworthy.
Djafarova, E. and Matson, N. (2021) ‘Credibility of digital influencers on YouTube and Instagram’, Int. J. Internet Marketing and Advertising, Vol. 15, No. 2, pp.131–148.
20 April 2021
Free sample articles newly available from International Journal of Technology, Policy and Management
- Digitalisation of industries: a comparative analysis from Australia and Finland
- The use of mobile phone data in transport planning
- Transitional challenges cycle of service offshoring delivery centres in Central and Eastern Europe
- An efficiency analysis of Turkish railways using data envelopment analysis: comparison study
- Diffusion of innovative technology in US oil and gas industry: an empirical study
Special issue published: “The Security and Privacy Challenge and Application of Edge Computing in Advanced Communications Systems”
- An attribute-based cross-domain trustworthy model for internet of vehicles
- The cross-layer oriented security performance to wireless network fibre communication router: the optimisation perspective
- SIP network secure communication model based on improved SIP protocol
- A security protocol of RFID communication system based on password authenticated with provable security
- Security model and design of network communication system based on data encryption algorithm
- Connection-oriented computer network secure communication and encryption algorithm
- A hybrid chemical reaction optimisation algorithm for solving 3D packing problem
- A channel estimation algorithm for large-scale MIMO system using block sparsity adaptive matching pursuit
- Identifying natural images and computer-generated graphics based on convolutional neural network
- A HDFS dynamic load balancing strategy using improved niche PSO algorithm in cloud storage
- End-to-end encrypted communication security technology for mobile terminals
- A new signcryption algorithm for secure communication in ad hoc networks
- Research on the application of data encryption technology in communication security