- Determinants of entrepreneurial intentions among the immigrants: Canadian perspective
- Trade competitiveness analysis of the Chinese medical device industry
- The variance premiums' responses to the ECB monetary announcements
- Revealed comparative advantages and trade balance indicators of trade structure of V4 countries
- Cultural diversity as a source of regional innovation: evidence from Poland
29 February 2024
Free sample articles newly available from International Journal of Trade and Global Markets
Free open access article available: "Demerged multinational enterprises: a study of post-demerger international strategies"
The following paper, "Demerged multinational enterprises: a study of post-demerger international strategies" (European Journal of International Management 14(1) 2020), is freely available for download as an open access article.
It can be downloaded via the full-text link available here.
Free sample articles newly available from International Journal of Structural Engineering
- A generous review of fly ash engineering characteristics on concrete in trait of compressive strength
- Finite element analysis of thermoelastic free vibration behaviour of hardcore higher-order doubly curved sandwich shell panel
- A study on flexural behaviour of ferrocement slabs using foamed concrete
- A review on fabrication and dynamic characterisation of composite beam structure
- Seismic response control of base-isolated structures with fluid inerter damper
Research pick: Industrial integration of artificial intelligence - "Impact of artificial intelligence in manufacturing and logistics: an exploratory study"
Artificial Intelligence (AI) has very quickly transitioned from science fiction to practical applications, particularly in industrial sectors like manufacturing, logistics, and retail. A study in the International Journal of Technology Transfer and Commercialisation looks at the AI landscape and sheds light on its evolution, implications, and integration challenges across industries.
In his study, Ibrahim Saleem Alotaibi of the College of Administrative and Financial Sciences at the Saudi Electronic University in Riyadh, Kingdom of Saudi Arabia, highlights a significant shift driven by AI technologies such as machine learning and deep learning. Industries are increasingly adopting AI-driven automation to meet market demands and improve operational efficiency. However, he also demonstrates that this transition from conventional approaches presents various challenges at different levels.
One key challenge is the need for substantial investment and skilled technicians to implement AI-driven processes effectively. Moreover, there are concerns about software failures, cybersecurity risks, and data privacy that add enormously to the complexity of the integration process. In addition, to such technical issues, as the legal and regulatory frameworks mature, there will be issues of how companies must comply with laws around AI and its implementation. This too will require much consideration by the companies, particularly in regions where laws associated with AI use are present in parallel with stringent data protection laws.
In his study, Alotaibi underscores the leading role played by China in the adoption of AI tools, particularly in manufacturing and logistics. Despite its rapid embracing of AI technologies, there remain many questions about sustainability given the computing resources that are needed to train and run the most powerful AI tools. Of course, this issue will ultimately present itself to all regions utilising high-level AI across all industries.
As businesses navigate the complexities of AI integration, responsible deployment becomes crucial. Those involved in developing, implementing, and using AI tools must prioritize risk assessment, ethical frameworks, and collaborative approaches to address the technical, societal, and regulatory challenges that the increasingly widespread adoption of AI will bring.
Even precluding the hyperbole, AI offers many incredible opportunities for innovation and efficiency across industries. Its wider integration nevertheless requires careful consideration of the implications and the challenges presented. Alotaibi’s research emphasizes the importance of taking a considered and inclusive approach to realizing the full potential of AI to mitigate the risks associated with its use.
Alotaibi, I.S. (2023) ‘Impact of artificial intelligence in manufacturing and logistics: an exploratory study’, Int. J. Technology Transfer and Commercialisation, Vol. 20, No. 4, pp.355–386.
28 February 2024
Free sample articles newly available from International Journal of Mathematics in Operational Research
- Simulation of batch service lateness queues with multiple vacations and two Bernoulli catastrophes using the developed 'goLHS' generator
- An EOQ model for deteriorating item with continuous linear time dependent demand with trade of credit and replenishment time being demand dependent
- Optimisation on a constrained integrated supply chain for multiple steel products with investment and freight cost discount
- An imperfect production-inventory model for reworked items with advertisement, time and price dependent demand for non-instantaneous deteriorating item using genetic algorithm
- Reliability and performance analysis of a series-parallel photovoltaic system with human operators using Gumbel-Hougaard family copula
- Hesitant fuzzy sets with non-uniform linguistic terms: an application in multi-attribute decision making
Associate Prof. Marco Valeri appointed as new Editor in Chief of International Journal of Complexity in Leadership and Management
Free sample articles newly available from International Journal of Services and Operations Management
- The execution of worker layoff disputes verdicts at the industrial relationship courts in Indonesia
- Role of artificial intelligence in the enabling sustainable supply chain management during COVID-19
- Managing a green supply chain: role of communication, collaboration, learning and trust
- Evaluation of key enablers of green supply chain management in Indian manufacturing industries: a fuzzy approach
- A strategic assessment and evaluation of the major factors behind the high failure rate of many restaurants in the city of Beirut-Lebanon
- Railway construction project risk assessment techniques: systematic literature review
- Relationship between downsizing and organisational performance: serial mediation effect of employee morale and tolerance to ambiguity
Research pick: Cultural factors and consumer attitudes - "The curious case of global branding: investigating the link between ethnic identity and consumer attitudes towards global brands"
A study in the International Journal of Indian Culture and Business Management has provided new insights into the influence of cultural values and ethnic identity on consumer attitudes towards global brands in India. Harsandaldeep Kaur and Pranay Moktan of the University School of Financial Studies at Guru Nanak Dev University in Amritsar, Punjab, hoped to fill the gaps in our understanding of these factors by developing a comprehensive framework for investigation.
The team surveyed 456 respondents and used structural equation modelling to analyze the relationships between ethnic identity, masculinity, collectivism, and consumer attitudes towards global brands. The results showed significant associations among the various factors. For instance, ethnic identity was found to influence both masculinity and collectivism, which in turn affected consumer attitudes towards global brands. Additionally, collectivism and masculinity were found to mediate to some extent the relationship between ethnic identity and consumer attitudes.
In the context of this work, “masculinity” refers to a cultural dimension that influences consumer attitudes towards global brands and relates to traditional gender roles, behaviours, and characteristics associated with masculinity. The term “collectivism” refers to a cultural orientation or value system that emphasizes the importance of group harmony, interdependence, and cooperation within a society.
The implications of the research extend particularly to global brand managers operating in diverse markets. The findings thus underscore the importance of considering cultural values and ethnic identity in brand strategies, as they significantly shape consumer perceptions. Brands that align with cultural values and traditions are likely to resonate more often with consumers. This suggests that companies need to take a much more nuanced and tailored approach to their marketing and commercial strategies.
It is worth noting, that the study highlights the aspirational nature of global brands in developing countries, where consumers often aspire to lifestyles associated with other regions considered to be more advanced economically. This aspirational mindset underscores the universal appeal of global brands, particularly in regions characterized by cultural diversity, the research suggests.
The researchers suggest that by recognizing and incorporating the various highlighted factors into their strategies, managers and marketers can enhance brand appeal and connect more effectively with their target consumers in diverse markets, like that found in India.
Kaur, H. and Moktan, P. (2024) ‘The curious case of global branding: investigating the link between ethnic identity and consumer attitudes towards global brands’, Int. J. Indian Culture and Business Management, Vol. 31, No. 2, pp.123–144.
27 February 2024
Free sample articles newly available from International Journal of Materials and Product Technology
- Pyroelectric and hygrothermal couplings effects on dynamic active control analysis of coupled thermopiezoelastic composite plate
- Synergy of wood ash on mechanical and sliding wear properties of banana/walnut-based epoxy composites and optimisation with grey relational analysis
- Residual life prediction of thermal insulation material for cold chain logistics transportation vehicle
- Performance analysis of automotive braking friction materials based on surface roughness
- Leakage current detection method of electrical insulation materials based on windowed-added Fourier transform
- Study on damage fatigue test method of metal materials for rotating machinery
- Synthesis and mechanical characterisation of self-lubricating Al7075/MoS2/ZrB2 hybrid composite
Free sample articles newly available from International Journal of Power and Energy Conversion
- Evaluation of radiation protection properties of novel concrete mixture against photon energy in nuclear applications: simulation and experimental findings
- A multivariate regression model of solar photovoltaic and its validation through ANN
- Renewable compensatory measures to mitigate the grid stress after different penetration shares of electric mobility in urban environment
- Establishment of X-ray narrow spectrum beam energy according to the requirements of the new version of ISO 4037-2019 comparison with the previous version 1996
- A review on reactive power measurement in harmonic environment
Special issue published: "Human Centric Computational Intelligence Theory and Application"
International Journal of Ad Hoc and Ubiquitous Computing 45(2) 2024
- Consumer IoT device deployment optimisation through deep learning: a CNN-LSTM solution for traffic classification and service identification
- Lightweight and personalised e-commerce recommendation based on collaborative filtering and LSH
- Performance evaluation of strapdown inertial navigation and Beidou satellite navigation system based on intelligent image processing technology
- Cryptographic analysis and construction of complete permutations using a recursive approach
- Detection of image recognition forgery technology under machine vision
- Detection of deepfake technology in images and videos
Research pick: Detecting deepfakes - "Detection of deepfake technology in images and videos"
Research in the International Journal of Ad Hoc and Ubiquitous Computing introduces a new approach to tackling the challenges posed by deepfake technology, which generates manipulated media content that closely resembles authentic footage. The novel method combines the miniXception and long short-term memory (LSTM) models to analyse suspicious content more effectively and identify deepfake images with greater than 99 percent accuracy.
While fake and fraudulent videos and images have been with us for many years, the term “deepfake” more commonly refers to manipulated videos or images that have been created using artificial intelligence and deep learning techniques. These technologies allow users to superimpose or replace, the original contents of an image or video with other content. Commonly a person’s face and voice might be faked in a video. Such deepfakes might be used for entertainment purposes as is the case with many apps that allow everyday users to create “amusing” content featuring their friends and family or indeed celebrities.
However, the more insidious use of deepfakes has gained popular attention because of the potential to deceive viewers, often leading to concerns about misinformation, privacy infringement, and the manipulation of public and political discourse. Such videos represent a significant threat to democracy where voters and consumers alike might be exposed to seemingly legitimate political content that is faked propaganda with malicious intent. Identifying deepfake content is more important than ever at a time of heightened political tensions and fragility. There is an urgent need for powerful detection methods and awareness about their existence and potential consequences.
Until now, deepfake detection has been hindered by low accuracy rates and difficulties in generalizing across different datasets. Yong Liu, Xu Zhao, and Ruosi Cheng of the PLA Strategic Support Force Information Engineering University in Henan, Tianning Sun of the Zhejiang Lab, Zonghui Wang of Zhejiang University, China, and Baolan Shi of the University of Colorado Boulder in Boulder, Colorado, USA, have proposed a model that improves on the accuracy of earlier approaches.
The team conducted cross-dataset training and testing, employing transfer learning methods to improve the model’s ability to generalize across various datasets. They used focal loss during training to balance samples and enhance generalization still further. Their tests demonstrate the promise of this approach, showing a detection accuracy of 99.05% on the FaceSwap dataset. This is better than previous methods, such as CNN-GRU, and requires fewer parameters to achieve this level of success.
Liu, Y., Sun, T., Wang, Z., Zhao, X., Cheng, R. and Shi, B. (2024) ‘Detection of deepfake technology in images and videos’, Int. J. Ad Hoc and Ubiquitous Computing, Vol. 45, No. 2, pp.135–148.
Free sample articles newly available from International Journal of Computing Science and Mathematics
- COVID-19: machine learning methods applied for twitter sentiment analysis of Indians before, during and after lockdown
- An enhanced multi-objective particle swarm optimisation with Levy flight
- Pricing American put options model with application to oil options
- IRPSM-net: Information retention pyramid stereo matching network
- A mathematical model and optimal control for Listeriosis disease from ready-to-eat food products
- A method of designing swinging-leg walking trajectory for biped robot on plat ground
- Solving capacitated vehicle routing problem with route optimisation based on equilibrium optimiser algorithm
- Improved rough K-means clustering algorithm based on firefly algorithm
26 February 2024
Free sample articles newly available from International Journal of Advanced Intelligence Paradigms
- Email spam detection using bagging and boosting of machine learning classifiers
- Effective hybrid feature subset selection for multilevel datasets using decision tree classifiers
- Investigation of binding update schemes in next generation internet protocol mobility
- A supervised multinomial classification framework for emotion recognition in textual social data
- Nonlinear tensor diffusion filter for the denoising of CT/MR images
- Redundancy recognition in heavy weight structure with different parameters
- Satellite image matching and registration using affine transformation and hybrid feature descriptors
- Reduction of jitter in 3D video by transmitting over multiple network paths
- Image denoising using fast non-local means filter and multi-thresholding with harmony search algorithm for WSN
- Dynamic service oriented resource allocation system for interworking broadband networks
- A novel statistical approach to an event management - a study and analysis of a Techfest with suggestions for improvements
- Domination number of complete restrained fuzzy graphs
- Impact of multimedia in learning profiles
- Cayley bipolar fuzzy graphs associated with bipolar fuzzy groups
Special issue published: "AI-Enabled Data Analysis in Emerging of Internet of Things Based Applications"
International Journal of Grid and Utility Computing 15(1) 2024
- A deep learning-inspired IoT-enabled hybrid model for predicting structural changes in CNC machines based on thermal behaviour
- Performance evaluation using throughput and latency of a blockchain-enabled patient centric secure and privacy preserve EHR based on IPFS
- Target imaging technology of wireless orbital communication radar
- Developing software predictive model for examining the software bugs using machine learning
- Optimisation of the hybrid grey wolf method in cluster-based wireless sensor network using edge computing
- Detection of crop disorder using deep learning
- A page weight-based replacement algorithm to enhance the performance of buffer management in flash memory
- Performance comparison of various machine learning classifiers using fusion of LBP, intensity and GLCM feature extraction techniques for thyroid nodules classification
- Complex networks applied to the analysis of the dynamics of social systems
Research pick: The end of the line for factory rejects - "Eliminating end-of-line rejections – a quality filter mapping approach"
A study in the International Journal of Services and Operations Management introduces a practical approach to quality control that could help reshape manufacturing and reduce the number of end-of-line rejects in production as well as the need to rework components and products. Such additional, and often costly, processes are undertaken in what can be referred to as the hidden factory.
P. Raghuram, Ashwin Srikanth, and P. Rithan Mandesh of the Department of Mechanical Engineering at Amrita School of Engineering in Coimbatore, India, have developed a Quality Filter Mapping (QFM), an approach to manufacturing methodology that addresses one of the big problems facing companies with high production volumes, stringent quality standards all hoping to improve their profit margins and their sustainability credentials.
Conventionally, quality control is a reactive process in manufacturing. Components are made, assemblies undertaken and at any stage where tolerances are not met, a component or assembly will be rejected. At this point, depending on the nature of the product, the reject may be fed to a parallel process to be reworked in some way so that it reaches the necessary standard. This approach is costly and wasteful.
QFM represents a shift towards a proactive quality control strategy, the research suggests. The team uses Pareto analysis in their new approach. The Pareto Principle, also known as the 80/20 rule, is named for Italian economist Vilfredo Pareto, He observed that approximately 80% of effects come from 20% of causes. In the context of quality control, Pareto analysis involves identifying the most significant factors contributing to a problem or outcome. By focusing efforts on addressing these critical factors, organizations can achieve substantial improvements in efficiency and effectiveness.
Through this analysis, major defects can be identified and their root causes traced using cause-and-effect diagrams. The underlying causes can then be mapped along the material flow in the assembly plant. This, the team suggests, seamlessly integrates quality control into the production process itself.
QFM offers significant cost savings by preventing the flow of defective components at an early stage in the manufacturing process rather than identifying them at the end of the line. This reduces the need for extensive end-of-line inspections and reworking in the hidden factory and so can reduce waste and improve efficiency throughout the whole manufacturing process. The team has taken an engine assembly line as a case study to demonstrate the effectiveness of the QFM approach.
QFM also promotes a culture of continual improvement and root cause analysis within organizations, contributing to heightened standards and customer satisfaction. The approach might also help companies address the broader challenges of evolving customer demand and fluctuating order volumes.
Raghuram, P., Srikanth, A. and Mandesh, P.R. (2024) ‘Eliminating end-of-line rejections – a quality filter mapping approach’, Int. J. Services and Operations Management, Vol. 47, No. 1, pp.123–140.
25 February 2024
Free sample articles newly available from International Journal of Vehicle Systems Modelling and Testing
- Design and optimisation of double wishbone suspension for high performance vehicles
- Analytical model to predict electro-mechanical steering gear performance based on gears mesh quality
- Analysis of low frequency response characteristics of multi-inertia channel hydraulic mounts
- Improved models of vehicle differential mechanisms using various approaches
- Comparison of methods for winter road friction estimation using systems implemented for floating car data
Special issue published: "Design, Control and Evaluation of Advanced Engineered Materials"
International Journal of Materials and Product Technology 68(1/2) 2024
- Calculation method for ultimate bearing capacity of reinforced concrete beams based on unified strength theory
- Study on detection of dent defects of polariser based on deep convolutional generative adversarial network
- Image recognition method of surface defects of prefabricated concrete members in prefabricated building
- Stiffness analysis of automobile aluminium alloy frame based on finite element model
- Structural optimisation method of six degrees of freedom manipulator based on finite element analysis
- Fatigue life estimation of metal materials based on finite element analysis
- Effect of process parameters on impact strength and hardness of FDM printed ABS parts
- Effectiveness of green manufacturing in resolving environmental issues: a review
- Analysis of factors affecting core functional competencies in manufacturing industries using fuzzy AHP
- Improving CNTs properties using computational intelligence algorithms
24 February 2024
Free sample articles newly available from International Journal of Networking and Virtual Organisations
- Exploration of cognitive radio network with the integrated optimisation of channel allocation and power control by hybrid algorithm
- Value co-creation in virtual game communities: a perspective on social influence theory
- Health 2050: faster cure via bioinformatics and quantified self; a design analysis
- Evaluating the influence of service quality factors in the digital hospitality industry during the COVID-19 pandemic
- The influences of the characteristics of opinion leaders on consumer purchase intention in a mobile e-commerce webcast context
Special issue published: "Defining the Frontiers of Global Business Research in Organisational Performance"
Journal for International Business and Entrepreneurship Development 15(3) 2023
- Influences on selecting executives: the case of gender and race in managerial decisions in Taiwan
- Cybersecurity and data protection in the European Union, the USA, and China: does ChatGPT really make a difference?
- Does management experience matter? An empirical investigation on the effects of management experience on SME firm growth in transition economies
- Global expatriate entrepreneurs and corporate social responsibility in developing economies: an examination of the relationship between the individual difference variables of sex, age, and personality
- Green innovation dynamics: the mediating role of green intellectual capital and open innovation of SMEs in Vietnam
- Internationalisation barriers in low-tech South Asian exporting firms
Free sample articles newly available from International Journal of Internet Manufacturing and Services
- Information technology governance in supply chain: integration mechanisms under uncertain environment
- Industry 4.0 in Portugal - the state of the art
- A data encryption technology for serial communication of multi degree of freedom manipulator based on chaotic sequence
- A real-time data acquisition method of industrial production line based on OPC technology
- Cloud manufacturing developments: a review
Free open access article available: "Study on the effect of self-heating effect of bulk acoustic wave filter on the interpolation loss in the band"
The following paper, "Study on the effect of self-heating effect of bulk acoustic wave filter on the interpolation loss in the band" (International Journal of Nanomanufacturing 18(3/4) 2023), is freely available for download as an open access article.
It can be downloaded via the full-text link available here.
23 February 2024
Free sample articles newly available from International Journal of Grid and Utility Computing
- A vision about lifelong learning and its barriers
- An effort to characterise enhancements I/O of storage environments
- A survey on auto-scaling: how to exploit cloud elasticity
- An evaluation environment for high-performance computing combining supercomputing and cloud
- Towards a cloud model choice evaluation: comparison between cost/features and ontology-based analysis
- Quality of service prediction model in cloud computing using adaptive dynamic programming parameter tuner
Special issue published: "Foreseeing and Designing Intercultural Dialogic Sustainability Policies"
International Journal of Foresight and Innovation Policy 16(2/3/4) 2023
- Individual and societal learning allow globally financed developmental cooperation
- Citizenship education in world risk society: an evolutionary perspective
- The hegemony in artificial intelligence technology: a depiction through patent analysis
- Actual strategic directions for the development of Russian fuel and energy companies to ensure the country's economic security
- Dedicated energy crops: support policies in Europe and in post-war Ukraine
- Low carbon transformation of energy, transport, industry, and agriculture companies in Ukraine
- Size does matter: South Africa's automotive industry during and post the COVID-19 pandemic
- Health foresight: the positive effects of strength training
- Shaping decentralised energy policies while thinking openly about future technologies
- True empathy, part 5: case studies
- Futures of science, technology, engineering and mathematics including computer science education: what will the crossroad with liberal arts look like?
- Strategic foresight for competitive advantage: a future-oriented business and competitive analysis techniques selection model
- Complexity and uncertainty in a world of emergence part 1
Free sample articles newly available from International Journal of Information and Computer Security
- User anonymity-based secure authentication protocol for telemedical server systems
- Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications
- Data hiding in the optimal keyframes using circular shifting and mutation operations for improvement in imperceptibility
- Malware detection approach based on deep convolutional neural networks
- Collaborative filtering-based recommendations against shilling attacks with particle swarm optimiser and entropy-based mean clustering
- Data privacy with heuristic anonymisation
- A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm
- Attack resistant chaos-based cryptosystem by modified baker map and logistic map
- Emerging DNA cryptography-based encryption schemes: a review
- Searching the space of tower field implementations of the đť”˝28 inverter - with applications to AES, Camellia and SM4
Research pick: Online brand advocacy and Gen Z consumer behaviour - "What drives Generation Z to advocate for a brand online?"
Understanding the dynamics of online brand advocacy is increasingly important in today’s digital landscape, particularly for businesses targeting Generation Z (Gen Z) consumers. A study in the International Journal of Internet Marketing and Advertising surveyed 221 students intending to explore the factors influencing online brand advocacy behaviour and its impact on purchase intentions and also examining the involvement of social media.
Generation Z usually refers to the demographic cohort succeeding the so-called Millennials and preceding Generation Alpha. While there is no specific definition of Gen Z, it usually refers to individuals born between the mid-to-late 1990s and the early 2010s, often stated as 1997 to 2012.
It is worth noting that the Millennials (born from 1981 to 1996) are often thought of as the original “digital natives” having been born after the invention of the World Wide Web and the emergence of ubiquitous computer technology. However, all subsequent generations have also grown up in an era characterized by rapid technological advancement, ubiquitous internet access, and widespread social media usage. Gen Z exhibits distinctive characteristics and behaviour shaped by what we might refer to as their digital upbringing. This technological environment influences their worldview, their approach to communication, and their preferences as consumers.
The work of Vivek Mishra of IIIT Bhubaneswar and Biswajit Das of the KIIT School of Management, also in Bhubaneswar, India offers several insights. First, it shows that brand-related factors such as brand social benefits, distinctiveness, prestige, and warmth significantly influence behaviour among Gen Z individuals. Additionally, online brand advocacy correlates positively with purchase intent, indicating its role in driving actual purchasing decisions, with social media involvement having a moderating effect.
The findings highlight the evolving nature of consumer behaviour showing how there has been a shift from traditional loyalty to advocacy. Moreover, they reveal how the latter represents an invaluable tool for companies to build trust and loyalty in a competitive market environment. Understanding and utilizing advocacy could improve the chances of long-term success for a brand.
Mishra, V. and Das, B. (2024) ‘What drives Generation Z to advocate for a brand online?’, Int. J. Internet Marketing and Advertising, Vol. 20, No. 1, pp.1–25.
22 February 2024
Free sample articles newly available from International Journal of Abrasive Technology
- Verification of deformation of thin mirror by polishing pressure using additive manufacturing
- Tangential dressing of diamond grinding wheel by femto-second pulsed laser with Bessel beam
- An investigation on tool wear rate in the electrical discharge face grinding process for the machining of Monel 400
- Effects of scale differences of microscopic texture of fine particle peened surface on adhesion behaviour of powders
- Study on cutting forces in zero-cutting after complete stop of feed motion when face milling of alloy 718
Special issue published: "Social Network Analysis: Opportunities and Challenges"
International Journal of Networking and Virtual Organisations 30(1) 2024
- Evaluation of teaching effectiveness in higher education based on social networks
- Research on online free marketing mode based on social network analysis
- Dynamic grouping method for online learning behaviour based on social network analysis
- A knowledge set recommendation method for online education in universities based on DV-TransE model and social networks
- Refined push method of marketing data based on social trust network
- Multimodal interactive classroom teaching strategies based on social network analysis
- Consumer preference mining method of online marketing platform based on social network analysis
- Risk assessment method for cross-border e-commerce products based on social network analysis
Free sample articles newly available from International Journal of Web Based Communities
- A rough set-based consumer buying behaviour prediction method in online marketing system
- Cluster analysis-based big data mining method of e-commerce consumer behaviour
- Predictive model of consumer online purchase behaviour based on data mining
- Research on the fuzzy comprehensive evaluation of consumer satisfaction with mobile e-commerce platforms
- Cluster analysis of perceptual demands of users' internet consumption behaviours based on improved RFM model
- A deep mining method for consumer behaviour data of e-commerce users based on clustering and deep learning
Research pick: Evaluating higher education in China - "Evaluation of teaching effectiveness in higher education based on social networks"
A new approach to the evaluation of teaching effectiveness in universities has been introduced in the International Journal of Networking and Virtual Organisations. In response to the various reforms and economic advancements in China, higher education has experienced some profound transformations in recent years. It is growing rapidly and university enrolment, once accessible only to the elite is transitioning towards mass education. Thus evaluation tools are increasingly important so that society can rely on good, solid education.
The new technique uses a social network to obtain a more comprehensive assessment than was previously possible. According to the researchers, Xiyang Li of Hunan City University Hunan and Quanzhong Yang of Luoyang Polytechnic, China, their method could provide universities with a systematic tool for evaluating instructional practices and so potentially improving educational quality.
The team first looked at the ways in which teaching effectiveness is currently judged with the aim of understanding what factors are used in evaluation. From this starting point, the researchers have established a set of principles to guide the creation of a new evaluation system.
To help in this process, they have used various computational techniques, including calculating something called “entropy matching degree.” This measurement helps gauge how well different factors align or correspond. Additionally, they utilize the Support Vector Machine (SVM) algorithm, a computer program designed to develop a solid evaluation framework. This helps in organizing and analyzing data to accurately assess the quality of teaching. Then, by building a social network, they can look at how the different factors are perceived by different groups of people within education.
This network-driven approach generates evaluation results with a confidence level of 99%, says the team, and with minimal entropy matching errors, which suggests it could be a practical approach to educational evaluation.
Li, X. and Yang, Q. (2024) ‘Evaluation of teaching effectiveness in higher education based on social networks’, Int. J. Networking and Virtual Organisations, Vol. 30, No. 1, pp.1–14.
21 February 2024
Free sample articles newly available from International Journal of Tourism Policy
- Tourism 4.0 in Portuguese tourism businesses
- Pursuing the Agenda 2030? A critical discourse analysis of decent work and economic growth in Ecuador's tourism policy
- Aspect-based sentiment analysis: Jamie's Italian restaurant case study
- Determining the competitiveness attributes of conference tourism: a South African industry perspective
- Buddhism, tourism, and development in the trans-Himalayan Buddhist region: three decades after Ancient Futures (Norberg-Hodge, 1991)
- Much more than voluntourism: the altruistic volunteer tourism motivation and experience in Israel
Special issue published: "Automatic Disinformation Detection on Social Media Platforms"
International Journal of Web Based Communities 20(1/2) 2024
- Study on mining repeated purchase behaviour intention of online consumers based on big data clustering
- A feature extraction method of network social media data based on fuzzy mathematical model
- Study on news recommendation of social media platform based on improved collaborative filtering
- Anomaly detection method of social media user information based on data mining
- A semantic retrieval model of social media data based on statistical theory
- Research and judgement method of social network hot news public opinion based on knowledge graph
- Data mining method of mobile e-commerce consumer purchase behaviour
- Cross-modal retrieval of large-scale images in social media based on spatial distribution entropy
- Prediction method of e-commerce consumers' purchase behaviour based on social network data mining
- An encryption of social network user browsing trajectory data based on adversarial neural network
- Social media user information security encryption method based on chaotic algorithm
- An evolution trend evaluation of social media network public opinion based on unsupervised learning
- Data mining method of social media hot topics based on time series clustering
- Factors affecting attachment behaviours, cognitive and emotional evaluations on Facebook live streams
- YouTube and the production of online video cultures in Rural South India
Free sample articles newly available from International Journal of Surface Science and Engineering
- Assessment of friction and wear as a function of the pressure applied to the CNT-filled silicone rubber nanocomposite pins
- Investigation of solid particle erosion behaviour of Fe-Cr alloy coating
- Influence of temperature on the metallic surface cleanliness in ICF facility: a combined experimental and molecular simulation study
- High temperature friction and wear experimental studies on 3D printed nickel iron base superalloy
- A novel magnetorheological finishing process based on three revolving flat tip tools for external cylindrical surfaces
Research pick: What’s the chat about global cybersecurity? - "Cybersecurity and data protection in the European Union, the USA, and China: does ChatGPT really make a difference?"
An analysis in the Journal for International Business and Entrepreneurship Development has looked at the various approaches to cybersecurity and data protection taken by key global players, namely the European Union (EU), the United States of America (USA), and China. As nations address historical data concerns and evolving cyber threats, the practical implications for businesses and individuals are significant. In this context, they consider the impact of the emergence of large language models (LLMs), such as ChatGPT, often, and perhaps erroneously, referred to as artificial intelligence (AI) tools.
Cybersecurity and data privacy have become central concerns, affecting business operations and user safety worldwide. The EU’s General Data Protection Regulation (GDPR) stands out as one of the more well-known and effective cyber strategies that have nudged businesses to strengthen cybersecurity measures and improve data management practices for compliance and consumer trust.
In contrast, the USA currently lacks a unified legislative framework for cybersecurity, relying instead on various regulations many of which are rather outdated in the digital landscape as it stands. Nevertheless, the USA does maintain high levels of preparedness against cyberattacks through legal, technical, and organizational measures.
China, on the other hand, has taken a stringent and strident position on cybersecurity and data protection, balancing the safeguarding of its citizens with strict regulations. These, of course, have raised concerns in many quarters about individual rights.
In their paper, Teddy Lynn Ladd of Wipro Enterprise Futuring in Plano, Texas, Shawn M. Carraher of KFUPM in Dhahran, KSA, Sherry E. Sullivan of BGSU, Bowling Green, Ohio, and Shawn M. Carraher Jr. of TAMU in Commerce, Texas, USA, suggest that LLMs have an important role to play.
These tools offer a new way to understand and navigate the complex current regulations and future legislation, which could help organizations in their compliance efforts as well as improve cybersecurity for those organizations, governments, and individuals. LLMs might be prompted to help in the interpretation of regulations and provide assistance in developing proactive rather than reactive strategies to address the challenges involved in compliance and cybersecurity. They might even be useful in allowing organisations to surmount the financial burdens and resource constraints, particularly for multinational corporations, that are necessitated by the need for cybersecurity and regulatory compliance.
Ladd, T.L., Carraher, S.M., Sullivan, S.E. and Carraher Jr., S.M. (2023) ‘Cybersecurity and data protection in the European Union, the USA, and China: does ChatGPT really make a difference?’, J. International Business and Entrepreneurship Development, Vol. 15, No. 3, pp.355–390.
20 February 2024
Free sample articles newly available from International Journal of Corporate Governance
- Impact of CEO duality and business education on the cost of debt
- Impact of environmental, social and governance engagements on financial distress under competition: evidence from non-financial firms listed in India
- Gender equality in the workplace and market performance: a preliminary analysis from France
- The moderating role of ESG disclosure scores in determining the impact of firm performance on CEO pay: a dynamic panel approach
- Corporate governance, product market competition, and corporate social responsibility performance in the US energy industry
Special issue published: "Risk, Resilience and Reliability Analysis for Sustainable Management"
International Journal of Sustainable Development 27(1/2) 2024
- An identification method of digital economy security risk dimension based on Bayesian network
- Internal control system of enterprise financial risk under the condition of diversified operation
- Study on innovation and sustainable development of digital education in universities under the background of the new era
- Evaluation method for adaptability of expressway toll stations based on fuzzy logic
- Opportunities and challenges faced by employment management from the perspective of sustainable development
- Research on evaluation of legal risk prevention education quality based on dynamic variable weight analytic hierarchy process
- Empirical analysis of regional technological innovation efficiency under the background of talent sharing based on SAF model
- Evaluation of the sustainable development of college students' English autonomous learning ability in a mobile learning environment
- Research on the construction and application of mobile e-commerce enterprise development potential evaluation indicator system
- Performance evaluation method of legal aid system reform based on grey correlation analysis
- Evaluation method of supply chain operation risk of logistics enterprises based on Monte Carlo algorithm
- Investment risk early warning method of listed companies based on EMD-RF-LSTM
- Risk assessment method of construction project based on grey correlation analysis
- Real estate price prediction method for small and medium-sized cities based on data mining
- Sustainable development and human capital
Free sample articles newly available from International Journal of Work Organisation and Emotion
- Examining the relationship of paternalistic leadership, extent of centralisation and employee's voice behaviour
- A review on impact on human emotion while listening and reciting Quran
- Employees' insecure attachment styles and time theft: a moderated mediated model
- Perceived organisational support, job satisfaction and turnover intention in the developing context: moderating role of emotional intelligence
- Emotional regulation strategies, eustress, and personal initiative-taking: evidence from frontline journalists
- Role of emotional labour in driving sabotage behaviours among frontline healthcare workers
Research pick: AI catches phish on day zero - "AI-driven approach for robust real-time detection of zero-day phishing websites"
A recent study in the International Journal of Information and Computer Security has introduced an innovative approach to addressing the persistent challenge of zero-day phishing attacks in cybersecurity. Zero-day threats represent a significant challenge for computer security systems. Such threats can be used to exploit previously unidentified vulnerabilities in software, networks, and computer systems before those security systems can be patched or updated to address the new exploit. Although they have only a brief window to circumvent conventional malware detection, antivirus software, and firewalls this can be sufficient to allow a data breach or other malicious process to be undertaken.
Thomas Nagunwa of the Department of Computer Science at the Institute of Finance Management in Dar Es Salaam, Tanzania, has proposed a machine learning (ML) model that is designed to detect these emerging and ever-evolving threats in real time. It could offer a much-needed and pragmatic solution to enhancing computer security in a range of environments.
One of the biggest threats to computer security often exploits social engineering wherein the user’s gullibility or lack of understanding is used to breach the first line of defence. In the case of a “phishing” attack, for instance, an unwary user is persuaded or coerced into unwittingly clicking a malicious link in an email or on a website. Often such phishing attacks will use zero-day tactics, approaches that have not been widely recognised at the point or time of implementation. Commonly, such exploits evade detection because their characteristics and format have not been added to the conventional blacklists used by security systems to otherwise block them.
The newly developed model aims to overcome these limitations by using a diverse set of features extracted from the structural characteristics of phishing websites. Those features are categorized into five groups, including web page structure, URL characteristics, WHOIS records, TLS certificates, and web page reputation. Notably, features derived from third-party services and web page reputation proved particularly influential in predicting phishing attacks, highlighting the significance of external sources and reputation-based indicators in enhancing detection capabilities.
Nagunwa evaluated the performance of his model against both traditional machine learning and deep learning algorithms, with promising results. Accuracy above 99% with minimal false positives and false negatives was achievable. Critically, working in a browser in real-time did not slow the loading of websites to the point at which they would compromise the user browsing experience.
Nagunwa, T. (2024) ‘AI-driven approach for robust real-time detection of zero-day phishing websites’, Int. J. Information and Computer Security, Vol. 23, No. 1, pp.79–118.
Free open access article available: "Nirvana rebirth, the impact of dynamic absorptive capacity and resource bricolage on dual innovation, and on the interference of improvisation"
The following paper, "Nirvana rebirth, the impact of dynamic absorptive capacity and resource bricolage on dual innovation, and on the interference of improvisation" (International Journal of Economics and Business Research 27(2) 2024), is freely available for download as an open access article.
It can be downloaded via the full-text link available here.
Free sample articles newly available from International Journal of Sustainable Development
- Effects of democracy and natural resources on foreign direct investment in African natural resource-rich countries
- The continuum of pro-environmental behaviour in the context of the value-belief-norm theory of environmentalism: implications towards sustainable development
- Valuing ecosystem services within the territorial development approach: the ecosystem services basket in the Karaburun Peninsula (Turkey)
19 February 2024
Free sample articles newly available from International Journal of Indian Culture and Business Management
- Financial knowledge, attitude and behaviour components of financial literacy: a study of Indian higher education students
- Behavioural intention of HR professionals to use HR analytics in the Indian context: an analysis using the UTAUT model
- An analytical study of HDI among India and its adjoining nations with reference to the relationship of literacy rate
- Choice of international diversification strategies: evidence from Indian industries
- Analysing the influence of websites quality and content on leisure travellers star category hotel selection in the state of Uttar Pradesh
- Entrepreneurial storytelling: using a consistent story to create and sustain a business: case studies of two migrant entrepreneurs
Special issue published: "Nano-Evolution: From Science To Technologies"
International Journal of Nanotechnology 21(1/2) 2024
- Synthesis of nanopowders Nd2Fe14B by chemical method
- The second quantum revolution: the development of quantum subatomic nanotechnologies
- Planar nanostructures element analysis using the X-ray radiation emission induced by high energy excitation
- Al2O3 nanoparticles synthesis, and a study of its influence on the fire behaviour of nanocomposite materials based on unsaturated polyester resin
- Properties of the nanoemulsions with seed oils
- The effect of the moisture state of samples on the change in the elastic-strength parameters of epoxy polymers during natural climatic ageing
- Behavioural programs can function as biological genes participating in the social evolution
- Computer simulation of the neutralisation of superoxide radicals by the fullerenol-24 nanomolecular system
- Composite materials in a binary CuBr - SbBr3 system
- Synthesis and perspectives of Ag/In2O3 inverse opal
- Predictive protein module based on PPI network and double clustering algorithm
Research pick: Driving advanced security for the Internet of Vehicles - "Security of internet of vehicles in smart cities: authentication and confidentiality aspects"
The Internet of Things (IoT) is a relatively familiar concept. It refers to the network of interconnected devices embedded with sensors, software, and other technologies that enable them to collect and exchange data over the Internet. These devices can range from everyday objects such as household appliances, wearable devices, and industrial machines to vehicles and infrastructure components like traffic lights and smart meters.
The underlying concept of the IoT is the creation of a seamless network in which physical objects can communicate and interact with each other without requiring human intervention. This connectivity enables IoT devices to gather real-time data, analyze it, and respond accordingly, leading to increased efficiency, automation, and convenience in various aspects of life and industry.
The IoT represents a move away from the conventional way in which we perceive and interact with the world around us, as it integrates the physical and digital realms to create networked systems that can enhance productivity, improve decision-making, and drive innovation across numerous sectors.
When we talk specifically of the IoT of vehicles, that represents its own digital ecosystem, which we might call the IoV, the Internet of Vehicles. Work in the International Journal of Internet Technology and Secured Transactions introduces innovative security schemes to tackle the growing security challenges facing the Internet of Vehicles (IoV). The aim is to enhance the integrity and resilience of connected vehicles in the face of evolving smart technologies where vehicles have increasing autonomy and connectivity. Given that any connectivity has associated security risks, such as authentication breaches, data confidentiality breaches, and routing attacks, it is important that the IoV can be made secure.
Roumissa Sahbi and Salim Ghanemi of Badji Mokhtar Annaba University, in Annaba and Mohamed Amine Ferrag of Guelma University, in Guelma, Algeria, have proposed security solutions that use Software Defined Networking (SDN) and Elliptic Curve Cryptography (ECC). This allows them to identify and block potential attacks within the IoV system and so boost security.
With the Internet of Things (IoT) linking smart devices across different domains, the need for strong security measures is critical. The proposed security schemes offer a way to protect the IoV network against different kinds of threats. The team has used formal and informal security analyses with tools like AVISPA and BAN logic to verify the effectiveness of their protocols in mitigating attacks.
Sahbi, R., Ghanemi, S. and Ferrag, M.A. (2024) ‘Security of internet of vehicles in smart cities: authentication and confidentiality aspects’, Int. J. Internet Technology and Secured Transactions, Vol. 13, No. 3, pp.232–269.
16 February 2024
Research pick: Hybrid security in the cloud - "Improving cloud security model for web applications using hybrid encryption techniques"
Research in the International Journal of Internet Technology and Secured Transactions, uses a hybrid approach to boosting the security of online applications, particularly within the realm of cloud computing. By merging two distinct techniques – homomorphic encryption and the squirrel search algorithm (SSA) – the study demonstrates a significant enhancement in the security of cloud computing models.
Homomorphic encryption is a form of encryption that allows mathematical operations to be performed on encrypted data without first having to decrypt data. This means that computations can be carried out on encrypted text, to yield useful results that, when decrypted, match the results of the same operations as if they had been performed on the plain text.
The SSA is a nature-inspired optimization algorithm that mimics the dynamic foraging behaviour of flying squirrels. It’s classified as a metaheuristic algorithm, meaning it solves problems iteratively using randomness and guided search instead of using a conventional approach.
R.S. Kanakasabapathi and J.E. Judith of the Department of Computer Applications at the Noorul Islam Centre for Higher Education in Kumarcoil, India, hoped to boost cloud data storage systems using an advanced encryption technique. Encryption obviously plays a key role in safeguarding data from unauthorized access or breaches. The team has assessed the effectiveness of their approach, measuring upload and download time and encryption and decryption time. They demonstrated that the hybrid approach outperforms the Rivest-Shamir-Adleman (RSA) and ECC-based cryptography.
Ultimately, minimizing encryption and decryption times while maximizing data protection and so ensuring the integrity and confidentiality of cloud-stored information is critical. Given that there are ongoing concerns surrounding the security of cloud computing, ever-expanding volumes of data being stored and processed in the cloud, innovative approaches are needed to safeguard that data as each wave of malicious actors comes to the fore who might compromise or illicitly access that data.
Kanakasabapathi, R.S. and Judith, J.E. (2024) ‘Improving cloud security model for web applications using hybrid encryption techniques’, Int. J. Internet Technology and Secured Transactions, Vol. 13, No. 3, pp.291–308.
15 February 2024
Research pick: An end to single-use plastic bags? - "Effects of external and internal influences on intentions to avoid single-use plastic bags"
Single-use plastics cause pollution, harm wildlife, deplete resources, pose health risks, and create waste management challenges, necessitating urgent action for reduction and better management. A study in the Global Business and Economics Review has identified drivers for the consumer shift away from single-use plastics.
The work conducted by Rajendran Geetha and Chandrasekaran Padmavathy of the Vellore Institute of Technology in Vellore, India, improves our understanding of the factors influencing consumers’ decisions to avoid single-use plastic (SUP) bags. The team used Stimulus-Organism-Response (S-O-R) theory to analyse the various external influences and internal motivations.
External factors such as green advertisements, retailer incentives, and government policies were found to play significant roles. Green advertisements were effective in motivating individuals to choose what are commonly referred to as eco-friendly alternatives, while incentives such as discounts and rewards from retailers also encouraged them to avoid SUP bags and opt for reusable cloth and reinforced, “bag-for-life” type bags. Additionally, government policies such as bans and taxes on SUP bags have had a significant impact on consumer choice, emphasizing the importance of regulatory interventions in promoting sustainability and nudging consumers to use alternatives.
The findings provide insights for policymakers, advertisers, retailers, and communities on the importance of environmental messaging and individual perceptions in promoting sustainable behaviour. Millions if not billions of SUP bags are manufactured every year the world over. Most, as the name would suggest, are used once, and then discarded. Ultimately, they add a heavy burden to the waste stream and many of those that don’t end up in landfill or being incinerated with other waste will reach environmental niches or the seas where they cause immense problems to different kinds of ecosystems and living things.
Implications drawn from the study suggest a need for a comprehensive approach. Advertisers can use environmental appeals, while retailers can incentivize behavioural change through discounts and rewards. Government and policymakers are urged to implement regulations and awareness campaigns to address plastic pollution effectively.
The study underscores the urgency of addressing environmental challenges and calls for collective efforts to build a sustainable ecosystem. Understanding and acting upon these findings are essential steps toward a greener future.
Geetha, R. and Padmavathy, C. (2024) ‘Effects of external and internal influences on intentions to avoid single-use plastic bags’, Global Business and Economics Review, Vol. 30, No. 2, pp.176–188.
14 February 2024
Free sample articles newly available from International Journal of Healthcare Technology and Management
- An empirical study of healthcare professionals' willingness to utilise telehealth services based on protection motivation theory
- Resource management for full paying patient service in Malaysia: issues and challenges
- Sustainable healthcare information exchanges network design: a scenario-based planning approach
- The stent for life initiative in Portugal: a critical realist perspective
- Patient centricity as strategy to improve quality of service in healthcare management
Research pick: Challenging entrepreneurship in higher education - "Engagement through boundary spanning: insights from US entrepreneurship educators"
A study published in the International Journal of Entrepreneurship and Small Business has investigated entrepreneurship education within higher education institutions. The results shed light on the critical role of such educators in engaging with students and communities while navigating various institutional perspectives.
Ethné Swartz of Montclair State University, New Jersey, Dianne H.B. Welsh of the University of North Carolina (Greensboro), Steven Tello of the University of Massachusetts Lowell, Lowell, USA, and Norris Krueger of Kyushu University, Fukuoka, Japan, collected and analysed survey data to understand the dynamics of entrepreneurship education.
The team found a correlation between institutional roles and the level of engagement in boundary-spanning activities. Boundary spanning refers to connections between disparate groups, departments, or organizations within a larger system. It involves individuals or units that operate at the interface between different domains, facilitating communication, collaboration, and information exchange across various boundaries. In the context of entrepreneurship education, boundary spanning often entails interactions between educators, students, academic departments, industry partners, and community organizations to promote learning, innovation, and engagement.
Intriguingly, faculty members, despite their active involvement, showed lower levels of engagement compared to other stakeholders. This raises concerns about the factors influencing faculty commitment, with tenure requirements being identified as a potential deterrent due to their heavy emphasis on research outcomes.
The study underscores the need for further investigation into the motivations and challenges within entrepreneurship education. It highlights the evolving nature of the educator’s role and emphasizes the importance of aligning roles with core values, whether focusing on teaching, networking, or student-centred activities.
The work also draws attention to the increasing complexity of the institutional environment in which entrepreneurship education operates. It points to the growing significance of governing boards in navigating such complexities. In essence, the study provides insights into the challenges faced by entrepreneurship educators and the changing institutional context shaping their roles.
These findings have broader implications beyond academia for society and he wider economy. Understanding and supporting entrepreneurship educators are therefore important in fostering innovation and community engagement.
Swartz, E., Welsh, D.H.B., Krueger, N. and Tello, S. (2024) ‘Engagement through boundary spanning: insights from US entrepreneurship educators‘, Int. J. Entrepreneurship and Small Business, Vol. 51, No. 3, pp.281-300.
Free open access article available: "Nirvana rebirth, the impact of dynamic absorptive capacity and resource bricolage on dual innovation, and on the interference of improvisation"
The following paper, "Nirvana rebirth, the impact of dynamic absorptive capacity and resource bricolage on dual innovation, and on the interference of improvisation" (International Journal of Economics and Business Research 27(2) 2024), is freely available for download as an open access article.
It can be downloaded via the full-text link available here.
13 February 2024
Free sample articles newly available from International Journal of Wireless and Mobile Computing
- Zero-bias error compensation method of laser gyro based on neural network
- HetNet security solution using femtocell network architecture and UMTS technology in the millimetre range
- Research on the construction of enterprise human resource allocation model based on multi-objective particle swarm optimisation algorithm
- Application of BIM application benefit evaluation model based on fuzzy AHP in the whole life cycle of tunnel engineering
- Construction of mental health monitoring system based on model transfer learning algorithm
- Intelligent layout design of building damping structure based on ramp model
- Sensor cloud virtualisation systems for improving performance of IoT-based WSN
- Research on distortion quality evaluation of computer network shared image based on visual sensitivity
- Research on power distribution control of parallel microgrid based on adaptive capacitor algorithm
- Robust min-norm algorithms for coherent sources DOA estimation based on Toeplitz matrix reconstruction methods
- Performance evaluation of FBMC versus OFDM in tapped delay line doubly selective channels
Research pick: Algorithms don’t understand sarcasm. Yeah, right! - "Metaheuristic-assisted deep ensemble technique for identifying sarcasm from social media data"
Sarcasm, a complex linguistic phenomenon often found in online communication, often serves as a means to express deep-seated opinions or emotions in a particular manner that can be in some sense witty, passive-aggressive, or more often than not demeaning or ridiculing to the person being addressed. Recognizing sarcasm in the written word is crucial for understanding the true intent behind a given statement, particularly when we are considering social media or online customer reviews.
While spotting that someone is being sarcastic in the offline world is usually fairly easy given facial expression, body language and other indicators, it is harder to decipher sarcasm in online text. Work in the International Journal of Wireless and Mobile Computing hopes to meet this challenge. Geeta Abakash Sahu and Manoj Hudnurkar of the Symbiosis International University in Pune, India, have developed an advanced sarcasm detection model aimed at accurately identifying sarcastic remarks in digital conversations, a task crucial for understanding the true intent behind online statements.
The team’s model comprises four main phases. It begins with text pre-processing, which involves filtering out common, or “noise”, words like “the”, “it”, and “and”. It then breaks down the text into smaller units. To address the challenge of dealing with a large number of features, the team used optimal feature selection techniques to ensure the model’s efficiency by prioritizing only the most relevant features. Features indicative of sarcasm, such as ‘information gain,’ ‘chi-square,’ ‘mutual information,’ and ‘symmetrical uncertainty,’ are then extracted from this pre-processed data by the algorithm.
For sarcasm detection, the team used an ensemble classifier comprising various algorithms including Neural Networks (NN), Random Forests (RF), Support Vector Machines (SVM), and a Deep Convolutional Neural Network (DCNN). The performance of the latter was optimized using a newly proposed optimization algorithm called Clan Updated Grey Wolf Optimization (CU-GWO).
The team found that their approach could outperform existing methods across various performance measures. Specifically, it improves on specificity, reduces false negative rates, and has superior correlation values when compared with standard approaches.
Beyond its immediate implications for natural language processing and sentiment analysis, the research holds promise for enhancing sentiment analysis algorithms, social media monitoring tools, and automated customer service systems.
Sahu, G.A. and Hudnurkar, M. (2024) ‘Metaheuristic-assisted deep ensemble technique for identifying sarcasm from social media data’, Int. J. Wireless and Mobile Computing, Vol. 26, No. 1, pp.25–38.
Special issue published: "Biomass Reusing and Recycling of Materials"
International Journal of Materials and Product Technology 67(3/4) 2023
- Application of environmental protection decoration materials in interior decoration engineering
- Effect of repairing sports meniscus damage based on functional nano materials
- Microstructure observation and viscoelastic relationship of surface modified rubber composites
- Monitoring performance analysis of composite chemical rubber materials under environmental pollution conditions based on nanomaterials chemical sensors
- Multi-project management of key chain of carbon fibre and composite materials based on chaos particle swarm optimisation
- Application of high performance carbon nanotube cement-based composites in optimisation design of civil building structures
- Properties of nano composite modified phenolic foam and its application in architectural design
- Research on the method of engineering construction recycling material project management based on BIM technology
- Energy conservation and recycling transformation of clean energy heating based on artificial intelligence
- MCDM-based analysis of factors affecting core functional competencies in Indian manufacturing industry
- Optimisation of FSP parameters in cast magnesium alloy using hybrid GRA methodology
- Study on the machinability of high-silicon high-carbon graphite-based free-cutting steel in contour turning
- Impact of core functional competencies on success of manufacturing sector: literature review
12 February 2024
Research pick: Cross-cultural TikTok study - "Understanding gratifications for engaging with short-video: a comparison of TikTok use in the USA and China"
TikTok is a popular social media platform where users can create and share short videos, often featuring music, dance, comedy, and other creative content.
Research in the International Journal of Mobile Communications has compared TikTok usage between China and the United States of America and offers invaluable insights into user behaviour and motivations on the social media platform and how they differ between these two regions. The study involved surveying around 150 each Chinese and US users and introduced the Comprehensive Gratifications Engagement Model to reveal how users interact with TikTok content.
Jian Shi, Mohammad Ali, and Fiona Chew of Syracuse University, New York, USA make several points based on their study. First, TikTok users engage more in self-promotion and with the platform’s video content compared with other short-video apps such as Snapchat. This would suggest that part of TikTok’s unique appeal is its potential for working as a goal-oriented activity.
Secondly, differences in user engagement between TikTok users in China and the USA were apparent, particularly when it comes to the degree of gratification people hope for in using the app, users in the USA seek a greater degree of gratification than those in China, the team reports. Understanding such cultural differences is essential for companies hoping to tailor marketing strategies on social media in different countries.
Fundamentally, TikTok is widely used as a pastime to help someone escape their everyday life, to relax, to learn, but also as a tool for procrastination and as a status-seeking tool and to impress others. Thankfully, it’s not all about self-aggrandisement, people also want to meet and discover interesting people on the app and to make connections and thus to feel like they belong to an interesting community. There remains an element of social in this form of social media. The specifics as detailed in the paper showed the nuanced differences between users in China and the USA.
Shi, J., Ali, M. and Chew, F. (2024) ‘Understanding gratifications for engaging with short-video: a comparison of TikTok use in the USA and China’, Int. J. Mobile Communications, Vol. 23, No. 2, pp.175–200.
Special issue published: "From Oil to Electricity, are HV Batteries Changing the Game for the Automotive Industry?"
International Journal of Automotive Technology and Management 23(4) 2023
- When regulations shape the future of an industry: the case of the high-voltage battery
- Electric batteries and critical materials dependency: a geopolitical analysis of the USA and the European Union
- Dynamics induced by the diffusion of high-voltage batteries in electric vehicles. A system mapping analysis
- Work and employment in the lithium-ion battery industry for electric vehicles: a preliminary overview
- From ICE to BEVs: what changes of downstream business ecosystems to wait?
Free sample articles newly available from International Journal of Manufacturing Research
- A hybrid GA-PSO algorithm for seru scheduling problem with dynamic resource allocation
- Analysis of the synergistic integration of DFMT with CAPP and MP in metal parts manufacturing based on cost analysis and systematic algorithm
- Improvement of lean manufacturing approach based on MCDM techniques for sustainable manufacturing
- Virtual reality platform for design and evaluation of human-robot collaboration in assembly manufacturing
- A review: finishing technologies of parts made by metal powder-bed additive manufacturing
10 February 2024
Free open access article available: "Boosted by failure? Entrepreneurial internationalisation as a cyclical learning process"
The following paper, "Boosted by failure? Entrepreneurial internationalisation as a cyclical learning process" (European Journal of International Management 22(3) 2024), is freely available for download as an open access article.
It can be downloaded via the full-text link available here.
9 February 2024
Free sample articles newly available from International Journal of Sustainable Aviation
- Performing trajectory tracking control of an unmanned ground vehicle using fractional order terminal sliding mode controller
- Challenges with the electrification of aircraft for a sustainable and greener aviation
- Effects of battery degradation on a hybrid electric propulsive system management
- The effect of digitalisation on sustainability and smart airport
- ADS-B data usage for aircraft noise and air quality modelling and measurement during specific stages of LTO cycle
Special issue published: "Data Driven Approach for Bio Medical and Healthcare"
International Journal of Business Intelligence and Data Mining 24(2) 2024
- Brain haemorrhage classification from CT scan images using fine-tuned transfer learning deep features
- Fuzzy twin kernel ridge regression classifiers for liver disorder detection
- Temporal autoencoder architectures with attention for ECG anomaly detection
- Challenges and issues in facial emotion recognition techniques
- Biomedical signal to image conversion and classification using flexible deep learning techniques
- Data augmentation and denoising of computed tomography scan images in training deep learning models for rapid COVID-19 detection
Free sample articles newly available from International Journal of Nanotechnology
- COVID-19 detection and tracking using smart applications with artificial intelligence
- Unsupervised voice activity detection with improved signal-to-noise ratio in noisy environment
- Research on intelligent city traffic management system based on WEBGIS
- A low power transistor level FIR filter implementation using CMOS 45 nm technology
- Dimension adaptive hybrid recovery with collaborative group sparse representation based compressive sensing for colour images
- Remote IoT correspondence for coordinating end-devices over MANET via energy-efficient LPWAN V
- The combined study of improved fuzzy optimisation techniques with the analysis of the upgraded facility location centre for the Covid-19 vaccine by fuzzy clustering algorithms
- Research progress of adoption of hyperbranched polymer nano materials in textile industry
- Groundwater quality index and human health risk assessment of heavy metals in and around Asansol industrial area, West Bengal, India
- Low area FPGA implementation of modified histogram estimation architecture with CSAC-DPROM-OBC for medical image enhancement application
- An improved model for unsupervised voice activity detection
- Image feature extraction algorithm based on parameter adaptive initialisation of CNN and LSTM
- Wearable IoT enabled smart heart disease monitoring on WSN
- Diagnosing cardiovascular disease via intelligence in healthcare multimedia: a novel approach
- A novel and intelligent decision-making system for real-time healthcare tracking using commercial wearable data
- Improved generalised fuzzy peer group with modified trilateral filter to remove mixed impulse and adaptive white Gaussian noise from colour images
- Analysis of high dimensional data using feature selection models
- Small cell lung tumour differentiation using F-18 (Fluorine-18) PET and smoothing using Gaussian 3D convolution operator
- A dynamic programming approach for accurate content-based retrieval of ordinary and nano-scale medical images
- Bioanalytical method development and validation of a novel antiseizure agent Cenobamate using LC-MS/MS
- Smart approach in impact of cumin powder on obesity among adults in urban area of Puducherry, India
- Fishier mantis optimiser: a swarm intelligence algorithm for clustering images of COVID-19 pandemic
- Deep learning-based feature extraction coupled with multi class SVM for COVID-19 detection in the IoT era
8 February 2024
Free sample articles newly available from International Journal of Intelligent Systems Technologies and Applications
- Deep learning model for plant-leaf disease detection in precision agriculture
- Gesture-based mouse control system based on MPU6050 and Kalman filter technique
- Daily activity monitoring system designed for elderly people using hidden Markov models based on real world datasets
- Access selection in heterogeneous wireless networks based on user preferences
- Integration of deep learning techniques for sentiment and emotion analysis of social media data
Research pick: Communication breakdown when the heat is on - "Study on the effect of self-heating effect of bulk acoustic wave filter on the interpolation loss in the band"
Bulk acoustic wave (BAW) filters are used in various electronic devices, including smartphones, tablets, Wi-Fi routers, and communication systems to help produce smooth and reliable high-frequency radio signals for 5G communications. They are thus important in ensuring efficient communication and data transmission. BAW filters are widely used in the radio frequency front ends of diverse devices, such as magnetoelectric transducer antennae for wireless communication. BAW filters are also used in physical sensors, actuators, and biochemical sensors.
In high-power applications an issue known as the self-heating effect can arise in BAW filters. Self-heating BAW filters when they are powered leads to a degradation in performance known as insertion loss, a fall in signal power. Research in the International Journal of Nanomanufacturing has investigated this phenomenon. Mitigating the detrimental effects of self-heating could improve the overall efficiency of a component or device as well as improving durability.
Bin Ruan and Tingting Liu of Southwest University of Science and Technology, in Mianyang, Shaohua Yang, Qinwen, and Weiheng Shao of the China Electronic Product Reliability, and Environmental Testing Research Institute in Guangzhou, and Ming Wu of Pandhus Microsystem Co., Ltd also in Mianyang, China, have investigated self-heating at high-frequency power levels. The team built a dedicated test system to measure the maximum surface temperature and the insertion loss of BAW filters at different power levels.
The relatively simple but important finding from their tests is that as power levels increased, so did heating, and thus, insertion loss. The correlation between higher power and greater insertion loss represents a fundamental trade-off in filter design. As power levels increase, the filter’s components may experience greater stress, leading to increased losses.
Armed with this knowledge, it might be possible to use various approaches to mitigate insertion loss while maintaining adequate power handling capabilities. For instance, choosing alternative materials, refining fabrication techniques, and implementing innovative filter configurations might all be used to reduce self-heating and so reduce insertion loss. For instance, incorporating advanced materials with improved thermal properties or refining the geometry of the filter structure might help dissipate heat more effectively, reducing losses at higher power levels.
Ruan, B., Liu, T., Yang, S., Huang, Q., Wu, M. and Shao, W. (2023) ‘Study on the effect of self-heating effect of bulk acoustic wave filter on the interpolation loss in the band’, Int. J. Nanomanufacturing, Vol. 18, Nos. 3/4, pp.178–188.
7 February 2024
Research pick: The wetland model of urban sustainability - "Analysis of the role of wetland parks in urban sustainability: a case study of Suzhou, China"
Writing in the International Journal of Global Environmental Issues, a team from Japan explains that “Wetlands play an important role in a sustainable urban future.” They add these these environmental regions provide what might be called ecological services to the cities in which they are sited as well as sustaining wildlife and even allowing the transmission and development of indigenous culture.
In this context the wetland parks of Suzhou, China, have emerged as exemplars of urban sustainability, offering crucial ecological services and preserving cultural heritage. Lihui Zhou and John Joseph Puthenkalam of Sophia University, Japan in their study shed light on the significance both locally and globally of such wetlands.
Suzhou is located in the Jiangsu Province of eastern China and boasts a rich tapestry of wetlands. These wetlands, which include a network of rivers, lakes, and marshes, have played a vital role in the region’s ecology and culture for centuries. They serve as crucial habitats for a variety of plant and animal species, providing breeding grounds for migratory birds and supporting diverse aquatic life. They also play an important role in flood control, water purification, and sediment retention. In addition to this environmental and ecological significance, Suzhou’s wetlands hold immense cultural value with the city’s ancient and renowned classical gardens, many of which are UNESCO World Heritage Sites, intricately connected with the wetlands.
Despite facing threats from urbanization and industrialization, Suzhou has made efforts to preserve and restore its wetlands in recent years. Wetland restoration projects, ecological conservation programs, and sustainable development planning have allowed the city to balance economic growth and environmental protection.
The research explores how tailored restoration efforts have boosted the ecological and cultural impact as sustainable urban development takes place. The Suzhou model thus demonstrates how local conditions can help with restoration strategies, ultimately enhancing the ecological resilience and cultural relevance of such sites.
By prioritizing wetland conservation, Suzhou has been able to safeguard its local ecosystems, nurture cultural heritage, and promote environmental education. Such initiatives might even resonate beyond Suzhou, emphasizing the broader implications of wetland park development for urban sustainability worldwide.
Zhou, L. and Puthenkalam, J.J. (2023) ‘Analysis of the role of wetland parks in urban sustainability: a case study of Suzhou, China’, Int. J. Global Environmental Issues, Vol. 22, No. 4, pp.375–392.
6 February 2024
Free sample articles newly available from International Journal of Mobile Network Design and Innovation
- Analysis of unsupervised primary-secondary user recognition using DTW and DFW in cognitive radio networks
- Interference in dynamic TDD: effect of MIMO rank on DoF and transceiver design
- Leveraging Bluetooth 5.1 location services for improved multilateration: a preliminary study on indoor asset tracking
- The novel approach to spectral efficiency enhancement using massive MIMO in LoS
- Enhanced network lifetime in WBAN using hybrid meta-heuristic-enabled mobile and multiple sink nodes-connected routing
- Effective anomaly detection in hybrid wireless IoT environment through machine learning model: a survey
Special issue published: "The Role of Technological Innovation for Pandemic Fighting: The Case of COVID-19"
International Journal of Technology Management 94(3/4) 2024
- Does technological proximity accelerate innovation speed in R&D collaboration? The evidence of rapid vaccine R&D for fighting the COVID-19 pandemic
- The preventive value effect of firm innovation: the impact of COVID-19
- Looking at smart cities through the lens of a pandemic era: a systematic literature review
- Firm and non-firm actor collaborations as a determinant of countries' readiness, progress and success for developing COVID-19 vaccines
- The impact of new media technologies on persuasive communication in the time of global crisis
- How influencing factors of intention to use smart watches changed in pandemic times in Germany - a comparison
Research pick: Persuasive communication in a pandemic - "The impact of new media technologies on persuasive communication in the time of global crisis"
Effective communication played a pivotal role in guiding public behaviour and health protocols during the COVID-19 pandemic and will do so again during any future global health crisis. A paper in the International Journal of Technology Management has explored the significance of strategies driven by technological understanding in persuading individuals to adopt new behaviour and adhere to health guidelines. The work could offer insights that might allow us to shape a more effective global response to a future pandemic.
The phrase “the new normal” became common parlance in the early days of the COVID-19 pandemic. New norms and practices were urgently required to help us reduce the risk of contracting the virus and passing it on to others. Different countries took different approaches, some with more success than others, the virus continued to spread and mutate into novel variants. How bad the health costs might have been if the new normal in different regions had been managed differently is open to debate. Indeed, the new normal seems a thing of the past despite the ongoing presence of the virus in society.
Talayeh Ghofrani of the Eastern Mediterranean University in Famagusta, Cyprus emphasizes the importance of persuasive messaging. She has focused on the intersection of technology and communication strategies in light of the rapid advancement and development of digital platforms and the increasing and more widespread social media use as the coronavirus spread across the globe.
The work identifies four important factors associated with successful and persuasive communication: the targeted audience, presentation model, message content and context, and the type of technologies employed. Ultimately, whether the message was received and understood by individuals at critical times depended on the complex relationship between these different factors. The subtleties perhaps explain why messages were often misinterpreted or even deliberately obfuscated when a political agenda stood in the way of healthcare in many places.
Ghofrani’s work suggests that digital platforms are a powerful tool for tailoring persuasive messages during times of crisis to allow us to mobilize the public response appropriately. An improved strategy given a sensible and non-corrupt government response would ultimately improve the ability of health organizations to engage more effectively with diverse populations and promote adherence to recommended health measures. It might even be able to defeat the misinformation, the spread of rumours, and so-called “fake news” all of which worsened the challenges during the COVID-19 pandemic and could do so again in a future crisis.
Ghofrani, T. (2024) ‘The impact of new media technologies on persuasive communication in the time of global crisis‘, Int. J. Technology Management, Vol. 94, Nos. 3/4, pp.419-435.