{"title":"Artificial neural network based image encryption technique","authors":"Shaimaa Abbas Fahdel Al Abaidy","doi":"10.1504/ijsoi.2020.10031162","DOIUrl":"https://doi.org/10.1504/ijsoi.2020.10031162","url":null,"abstract":"","PeriodicalId":35046,"journal":{"name":"International Journal of Services Operations and Informatics","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66744314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shilpy Tayal, Neha Punetha, Nidhi Handa, S. Pundir
{"title":"A trade credit policy in an EOQ model with stock sensitive demand and shortages for deteriorating items","authors":"Shilpy Tayal, Neha Punetha, Nidhi Handa, S. Pundir","doi":"10.1504/ijsoi.2020.10032706","DOIUrl":"https://doi.org/10.1504/ijsoi.2020.10032706","url":null,"abstract":"","PeriodicalId":35046,"journal":{"name":"International Journal of Services Operations and Informatics","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66743912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal distributed intelligent traffic system for road safety, emergency vehicle clearance using hybrid optimisation algorithm","authors":"Bhavani Sundar Raj, Srimathi Chandrasekaran","doi":"10.1504/ijsoi.2019.10025089","DOIUrl":"https://doi.org/10.1504/ijsoi.2019.10025089","url":null,"abstract":"Nowadays, the population growth and their choice raise the number of vehicles, which raises traffic congestion in critical condition across the developing Nations like India. In consequence, emergency vehicles are stuck in traffic and waste their valuable time. Many authors focus on traffic problems in terms of intelligent traffic system without the consideration of emergency cases. In this paper, we propose an optimal distributed intelligent traffic system (ODITS) using hybrid optimisation algorithm. The proposed system designed by two phases are collision gathering and decision making. The clustered Jaya algorithm is used to gather the vehicle traffic information, which also differentiate emergency from normal vehicles. Then the modified multiobjective evolutionary based decision-making algorithm is used to compute the best route under the critical conditions. The simulation results shows that the proposed system reduces congestion in traffic, and waiting time of emergency vehicles without compromising normal vehicle speed, waiting time, and number of stopped vehicles.","PeriodicalId":35046,"journal":{"name":"International Journal of Services Operations and Informatics","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41626144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yunsu Lee, B. Kulvatunyou, Minchul Lee, Yun Peng, N. Ivezic
{"title":"A graph-based automatic services composition based on cost estimation heuristic","authors":"Yunsu Lee, B. Kulvatunyou, Minchul Lee, Yun Peng, N. Ivezic","doi":"10.1504/IJSOI.2019.10025090","DOIUrl":"https://doi.org/10.1504/IJSOI.2019.10025090","url":null,"abstract":"Currently, both software and hardware are being virtualised and offered as services on the internet. Companies have an opportunity to improve their workflows by composing services that best suit their quality and cost requirements. However, as more services become available, computer-aided services discovery and composition become essential. Traditional service representation and planning algorithms do not adequately address non-functional characteristics, large numbers of similar operators (i.e., services), and limited numbers of objects (i.e., inputs and outputs per service). This paper analyses existing work in automatic services composition, service representation and planning algorithms and proposes a new framework to address those needs. It proves that the proposed framework provides an admissible heuristic based on cost estimations that guarantee a minimum cost solution, if one exists.","PeriodicalId":35046,"journal":{"name":"International Journal of Services Operations and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46257481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Security in Multi Trading Activities of Wireless Sensor Networks associated with Big Data IoT","authors":"Mustafa Ali Hasan, Salwa Mahmood, Ahmed K. Al-Ani","doi":"10.1504/IJSOI.2019.10023003","DOIUrl":"https://doi.org/10.1504/IJSOI.2019.10023003","url":null,"abstract":"Big data analytics are playing predominant role in the multi-trading activities to take appropriate decisions. Big data analytics are conducted with the help of low-control processors, smart remote systems, and low-control sensors to transform into an impacting excitement for the industrial internet of things (IIoT). A wireless sensor network (WSN) is used to work with lowcontrol use bringing about low register and capacity limit. WSNs are widely used by organisations in the operations of IoT associated with big data analytics. In this connection WSN is transmitting enormous data through the network. These huge data transmissions have attracted the cyber criminals to eavesdrop the data with their techniques. The security challenges against the data transmissions in WSN while the multi-trade activities are performed needs a suitable admeasures. In this paper the security features have been implemented for gateways access in WSNs used for multi-trading activities of big data.","PeriodicalId":35046,"journal":{"name":"International Journal of Services Operations and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46144032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adrien Lecossier, M. Pallot, P. Crubleau, S. Richir
{"title":"Construction of an instrument to evaluate the user eXperience of a group of co-creators in the upstream innovation process","authors":"Adrien Lecossier, M. Pallot, P. Crubleau, S. Richir","doi":"10.1504/IJSOI.2019.100615","DOIUrl":"https://doi.org/10.1504/IJSOI.2019.100615","url":null,"abstract":"The first part of this paper presents a theoretical model, named UX-FFE, which combines a user eXperience (UX) approach with an upstream innovation process. The main interest of this UX-FFE model is that it allows to evaluate the social aspect of the upstream innovation process, which may be detrimental to the success of radical innovation projects in mature companies. \u0000The second part presents the outcomes of the experiment of the model application for the ideation stage of the upstream innovation. The objective of this experiment is to evaluate how much the designed bipolar mixed-method instrument and construct are reliable enough. Finally, the results permit, from the original structure of the UX-FFE model, to construct an instrument UXi dedicated to evaluate the user eXperience of co-creators in ideation stage.","PeriodicalId":35046,"journal":{"name":"International Journal of Services Operations and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJSOI.2019.100615","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46631491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantifying value co-creation: examining the relationship between realised value facets and customer experience in a B2B context","authors":"M. Zeeshan, Yasir Rashid, Umer Ayub, A. Waseem","doi":"10.1504/IJSOI.2019.10022423","DOIUrl":"https://doi.org/10.1504/IJSOI.2019.10022423","url":null,"abstract":"Value co-creation has become central and one of the most researched topics among marketing scholars worldwide. This study discusses the relationship between value realisation facets and customer experience that emerges from a value co-creation process. With assumptions of a positivist paradigm, this study is responding to the call for quantification of value co-creation concept by developing a multidimensional scale to measure value co-creation in the context of information and communication technology (ICT) industry. Multivariate data analysis techniques like exploratory factor analysis (EFA), Cronbach's alpha and multiple regressions were used to check the reliability and validity of scale and test the hypothesis. The study finds that experience value (EV) is significantly and positively influenced by monetary value (MV), relationship value (RV) and functional value (FV). Moreover, it was also found that customer is more inclined towards RV and FV than that of MV to evaluate EV.","PeriodicalId":35046,"journal":{"name":"International Journal of Services Operations and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46036371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review paper on neighbour discovery protocol in IPv6 link-local network","authors":"Emir Mahmood, Ayad Hasan Adhab, Ahmed K. Al-Ani","doi":"10.1504/IJSOI.2019.10022427","DOIUrl":"https://doi.org/10.1504/IJSOI.2019.10022427","url":null,"abstract":"Internet Protocol version 6 (IPv6) signifies the latest version of IP, the Internet Protocol. The communication protocol allocates an identification, as well as a location system of computers on the network. One of the key protocols in IPv6 is the neighbour discovery protocol (NDP). The NDP covers many functions including the discovery of nodes on a similar link, the detection of addresses that are duplicate, and the detection of routers. Due to the importance of NDP, it makes it susceptible to several attacks including denial of service (DoS); Denial of Service attack. Many mechanisms proposed to secure NDP. However, these mechanisms are still vulnerable. This paper reviews the significance of NDP and presents the advantage and disadvantage of each proposed mechanisms. Moreover, the SeND mechanism was implemented and the results were compared with the original NDP. This paper discusses the requirements of features of the proposed mechanism in securing the IPv6 NDP processes.","PeriodicalId":35046,"journal":{"name":"International Journal of Services Operations and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48441236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joaquín González García, J. González, Pablo E. Zegarra Saldaña
{"title":"The sovereign debt crisis and national centripetal vs. regional centrifugal forces in political economy: empirical lessons from Spain","authors":"Joaquín González García, J. González, Pablo E. Zegarra Saldaña","doi":"10.1504/ijsoi.2019.10022418","DOIUrl":"https://doi.org/10.1504/ijsoi.2019.10022418","url":null,"abstract":"Existing analytical frameworks are unable to establish what should be the right balance between national centripetal and regional centrifugal economic and political forces that allow for the creation of a stable and prosperous nation so this paper contributes to the body of scholarly works in political economy by concentrating on reviewing empirical evidences that the Spanish highly decentralised political system is failing to strike the right balance, especially during difficult economic times, since the regional centrifugal economic and political forces are overpowering the national centripetal ones and may signal a dangerous disassembling of the nation with the emergence of regional autarkical independence. The political balance of these forces will inevitably have a reflection on the economic variables, thus a causal relationship can be inferred by analysing the evolution of the variables sovereign debt at national and regional levels and the behaviour of the variables risk premium and the public securities credit rating.","PeriodicalId":35046,"journal":{"name":"International Journal of Services Operations and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48326933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social media analytics: a tool for the success of online retail industry","authors":"Ogunmola Gabriel Ayodeji, Vikas Kumar","doi":"10.1504/IJSOI.2019.10022075","DOIUrl":"https://doi.org/10.1504/IJSOI.2019.10022075","url":null,"abstract":"Social media has become a part of life for a larger segment of the people globally. Businesses are also taking advantage of it, to instantly and easily create and share information with the customers and get benefited from this seamless communication. As a result of the increase in both social media platforms and users, the need to monitor, extract, analyse and report the data being created on these platforms has also increased for the Businesses. Present work identifies the social media analytics (SMA) process and online retail application; it identifies the different phases of the SMA process with their integration to the online retail strategy, challenges, and opportunities. SMA metrics for customer life-cycle (acquisition to enhancement) are discussed. A comparative analysis has been presented for different SMA tools to identify their utility to the online retail.","PeriodicalId":35046,"journal":{"name":"International Journal of Services Operations and Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47402661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}