Fake Journals in Computer Science | Low Quality ...

2 downloads 1207 Views 557KB Size Report
Dec 16, 2013 - fakejournalss.wordpress.com/2011 ..... is chosen for adding emotions to natural recorded speech as it has very low .... The NotesIL Theme.
Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

1 of 17

http://fakejournalss.wordpress.com/

Low Quality Journals – To Avoid At All Cost

Pages About Fake Journals

www.ijorcs.org – White Globe Publications is BLACKLISTED BY MOST Universities WORLDWIDE

List of Fake and Low-Quality Journals

Know the names of low-quality journals Enter your email address to subscribe to this blog and receive notifications about journals that you need to avoid so as to prevent from damaging your academic career! Join 98 other followers

FakeJournals Tweets ijorcs.org – White Globe Publications is BLACKLISTED BY MOST Universities WORLDWIDE fakejournalss.wordpress.com/2011 /12/27/www… 1 year ago List of Low Quality Journals to Avoid At All Cost..more to come: fakejournalss.wordpress.com/listof-fake-c… 1 year ago Fake Journals in Computer Science: Science Academy Publisher – A curse for academicsh... fake-journals.blogspot.com/2011 /07/scienc… 2 years ago Fake Journals in Computer Science: LIST OF UNREFEREED PAPERS, NO REVIEW, WASTE PUBLIC... fake-journals.blogspot.com/2011 /07/list-o… 2 years ago We have been busy with the bad guys. Here are some fresh news: fakejournalss.wordpress.com/2011 /07/20/lis… 2 years ago

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

2 of 17

http://fakejournalss.wordpress.com/

Follow @fakejournals

Archives December 2011 (1) September 2011 (2) July 2011 (2) July 2010 (1) May 2010 (1)

Author: Geetanjali Wasson

Published Date: 2011-09-29

In image and signal processing applications floating-point multiplication is major concern in calculations. Performing multiplication on floating point data is a long course of action and requires huge quantity of processing time. By improving the speed of multiplication task overall speed of the system can be enhanced. The Bottleneck in the floating point multiplication process is the multiplication of mantissas which needs 53*53 bit integer multiplier for double precision floating point numbers. By improving the speed of multiplication task the overall speed of the system can be improved. In this paper a comparison on the existing trends in mantissa multiplication is made. Vedic and Canonic Signed digit algorithms were compared on parameters like speed, complexity of routing, pipelining, resource required on FPGA. The comparison showed that Canonic Signed Digit Algorithm is

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

3 of 17

http://fakejournalss.wordpress.com/

better than Vedic algorithm in terms of speed and resources required on spartan3 FPGA.

Author: Yasa Ramya, Bhagyalaxmi

Published Date: 2011-09-29

Peer-to-Peer streaming has been widely used over the internet, where a streaming system usually has multiple channels and peers may form multiple groups for content distribution. In this paper, we propose a distributed overlay framework called SMesh (subset-mesh) for dynamic groups where users may frequently hop from one group to another. SMesh first builds a relatively stable mesh consisting of all hosts for control messaging. The mesh supports dynamic host joining and leaving, and construction of delivery trees. Using the Delaunay Triangulation protocol as an example, we show how to construct an efficient mesh with low maintenance cost. We also study about various tree constructions based on the mesh, including embedded, bypass, and intermediate trees.

Author: Gurdeep Singh, Tanvir Singh

Published Date: 2011-09-29

The Free space optical communication technology tries to fulfill rising need for high bandwidth transmission capability link along with security and ease in installation. Due to their high carrier frequency in the range of 300 THz, it provides highest data rates of 2.5 Gbps which can be increased to 10 Gbps using Wavelength Division Multiplexing (WDM). FSO link is license free, secure, and easily deployable and offers low bit error rate link. These features motivate to use FSO as a solution to last mile access. Along with these attractive features of FSO, a well-known disadvantage of (FSO) is its sensitivity on local weather conditions which results in loss of optical signal power. In this paper we will discuss performance analysis of FSO in different weather conditions.

Author: Pooja Sharma

Published Date: 2011-09-29

Computer has been widely deployed to our daily lives, but human computer interaction still lacks intuition. Researchers intend to resolve these shortcomings by augmenting traditional systems with human like interaction mechanism. Today, dedicated hardware often infers the emotional state from human body measures. These have been a considerable amount of research done into the detection and

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

4 of 17

http://fakejournalss.wordpress.com/

implicit communication channels, including facial expressions. Most studies have extracted facial features for some specific emotions in specific situations. In this paper we uses a feature point tracking technique applied to five facial image regions to capture basic emotions. The used database contains 219 images, 10 Japanese female, six expressions and one neutral. We use grayscale images which are ethically not diverse. We use optical flow based analysis to detect emotions from human facial image data. Our proof of data demonstrates the feasibility of our approach and shows promising for integration into various applications.

Author: Vikas Wasson

Published Date: 2011-09-29

Prostate Cancer & diseases is quite common in elderly men. Early detection of prostate cancer is very essential for the success of treatment. In the diagnosis & treatment of prostate diseases, prostate boundary detection from sonography images plays a key role. However, because of the poor image quality of ultra sonograms, prostate boundary detection is still difficult & challenging task & no efficient & consistent solution has yet been found. For improving the efficiency, they need is to automate the boundary detection process for which number of methods has been proposed. In this paper, a new method based on Ant Colony Optimization is proposed, which will increase efficiency & minimize user involvement in prostate boundary detection from ultrasound images.

Author: Sarabjeet Singh

Published Date: 2011-09-29

Digital Watermarking is the technique used by researchers to hide user defined information along with important information that may be visible or invisible depending upon the requirements of the user. Now Digital Watermarking is concerned with the ownership of the information. Absence of Digital Watermark in the information results in loss of revenue. The Digital Watermark packed with the information should be inseparable. This paper will present here the different tr ends that are followed in the digital watermarking.

Author: B. Shwetha Bindu

Published Date: 2011-09-29

Cloud computing has gained a lot of hype in the current world of I.T. Cloud computing is said to be the next big thing in the computer world after the internet. Cloud computing is the use of the Internet for the tasks performed on the computer and it is visualized as the next- generation architecture of IT Enterprise. The ‘Cloud’ represents the internet. Cloud computing is related to several technologies and the convergence of various technologies has emerged to be called cloud computing. In comparison to conventional ways Cloud Computing moves

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

5 of 17

http://fakejournalss.wordpress.com/

application software and databases to the large data centers, where the data and services will not be fully trustworthy. In this article, I focus on secure data storage in cloud; it is an important aspect of Quality of Service. To ensure the correctness of users’ data in the cloud, I propose an effectual and adaptable scheme with salient qualities. This scheme achieves the data storage correctness, allow the authenticated user to access the data and data error localization, i.e., the identification of misbehaving servers.

Author: T.K Rajesh

Published Date: 2011-09-29

Internet takes vital role in our communications infrastructure, due to slow convergence of routing protocols after network failure become a budding problem. To assure fast recovery scheme from link and node failure in networks, we present a new recovery scheme called Multiple Routing Configuration (MRC). Our anticipated scheme guarantees recovery in all single failure scenarios, using a mechanism to handle both link and node failures, and without knowing the root cause of the failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop forwarding. MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. In this paper we present MRC, and analyze its performance with respect to load distribution after a failure. We also show how an estimate of the traffic demands in the network can be used to improve the distribution of the recovered traffic, and thus reduce the chances of congestion when MRC is used.

December 27, 2011 – 8:56 am Categories: Uncategorized | Post a comment Tagged computer science, [email protected], fake journal, journal, [email protected], scam, www.ijorcs.org |

UPDATE: Science Academy Publisher – A curse for academics http://sciacademypublisher.com Following our recent coverage of Science Academy Publisher (1st coverage), we were flooded with emails, both for and against. We conducted further investigation and came up with the following. At this point, the following should be cleared for any one interested about this publisher: 1. The domain name, sciacademypublisher.com, was bought on 17th January 2011. 2. Science Academy Publisher was registered as a company in the UK on 18th January 2011. 3. Being registered as a company and having a domain name does not in any way differentiate from being a good journal and low-quality journal.

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

6 of 17

http://fakejournalss.wordpress.com/

4. The commercial publisher Science Academy Publisher deadline to submit a paper is on, for example, 22nd September and authors get notifications on 30th September (for example, visit the International Journal of Research and Reviews in Computer Science (IJRRCS), http://www.sciacademypublisher.com/journals.html). Just in case they change the information after reading this post, we took a snapshot below.

. 5. Reviewing journal articles in simply 8 days and sometimes less (as reported by several people who send us emails) is clearly an indication of the level of the journal. Quality has been TOTALLY ignored. 6. If you are asking yourself, can I publish my hard written paper and associate my research findings in their repository? The short answer is NO. It would be absolutely silly, childish, out-of-sense to publish your papers in any of their journals for a few bucks. If you are off for your PhD defence, promotion to associate or professor level, competing for a research grant, applying to a higher prestigious university, then believe it of not, evaluators/reviewers will definitely verify all your existing works and where they got published. We would suggest you to better re-work your paper, make it better and publish it in a respected venue. We are not here to do any favor for any journal in the area of computer science, so it’s up to you to decide where to publish. 7. As we said it before, we are not here to do any favor for any journal, we list and cover only craps with facts.

September 17, 2011 – 7:19 pm Categories: Uncategorized | Post a comment Tagged fake, fake journal, http://sciacademypublisher.com, international journal, low-quality, scam, Science Academy Publisher, [email protected], unrefereed papers |

As if we had not enough with existing unrefereed journals – ijart.org – A new UNREFEREED journal – BEWARE!!

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

7 of 17

http://fakejournalss.wordpress.com/

A new low-quality journal created on the fly by “C. Sureshkumar, Vice Principal & Head – CSE, JKKN College of Engineering & Technology, Komarapalayam -638 183. Namakkal Dt,Tamilnadu, India. Phone No : +91 98424 40479” but in all his spam emails and post on the Internet, he is using a pseudoname “Dr.Totok R Biyanto“. Let’s give a warm welcome to the International Journal of Advanced Research In Technology (IJART) (http://ijart.org) The funny thing he wrote down here is you sent your paper on 25th September 2011 and you will get notification on 27th September 2011. Wow!! :O

e-ISSN: 6602-3127 (Online Version) p-ISSN: 6310-4316

ISSN: 6602-3127 Vol. 1, No.1 Article Article Title & Authors (Volume1 Number 1 ) # 1.

2.

3.

4.

5.

6.

7.

Page

Clustering and Cluster-Based Routing Protocol for Delay Tolerant Mobile NetworksT.Harikrishna, A.Subramanyam Abstract | PDFIconPDF

5

Comparative Approach for Speckle Reduction In Medical Ultrasound ImagesM.Sindhana Devi, V.Radhika Abstract | PDFIconPDF

5

Optimization in Heterogeneous Wireless Sensor NetworksK.Sheela Sobana Rani, P.Gnana Sundari Abstract | PDFIconPDF

4

Data Storage Virtualization in Cloud ComputingK .Vasantha Kokilam, Samson Dinakaran Abstract | PDFIconPDF

6

Comparative Analysis on Cloud Computing and Service Oriented ArchitectureK.Ramana, T.Hari Krishna, C.V.Lakshmi Narayana, M.Sankara Prasanna Kumar Abstract | PDFIconPDF

7

A Novel Third Party Auditability And Dynamic Based Security In Cloud ComputingB.Dhiyanesh, A.Thiyagarajan Abstract | PDFIconPDF

5

Performance Analysis of Load Balancing Techniques for Web Server SystemsK.Ramana, M.Subba Rao, K.Suresh, O.Obulesu Abstract | PDFIconPDF

5

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

8 of 17

8.

http://fakejournalss.wordpress.com/

An Intelligent Approach to Improve the Query Performance using Disjoint Set TheoryRanjith Reddy, Malavathulava Narasimhulu, Ashok Murugesan Abstract | PDFIconPDF

9.

10.

11.

12.

13.

14.

15.

16.

17.

3

Survey Of L1 Graph AlgorithmsJ.Dhamayandhi, Mrs.K.S.Jeen Marseline Abstract | PDFIconPDF

3

Evaluation and Power Saving Protocols for Wireless 802.11 LAN NetworkR.K.Sowmiya, A.Vijaya Abstract | PDFIconPDF

6

Multi-Objective Optimization Based On Genetic Algorithm In Grid SchedulingS. Prabhu, V.Naveen Kumar Abstract | PDFIconPDF

4

Digital Fragile Blind Watermarking using Discrete Wavelet TransformationV. Kavitha, C. Palanisamy, Amitabh Wahi Abstract | PDFIconPDF

5

A Study Of Plagiarism Detection Tools And TechnologiesSindhu.L, Bindu Baby Thomas, Sumam Mary Idicula Abstract | PDFIconPDF

7

Enhancement Study of Power-Aware Routing Protocols in Ad hoc NetworksJhade Srinivas, Dr.P.Chenna Reddy Abstract | PDFIconPDF

5

Identifying the Rice diseases using Classification and Biosensor techniquesA.Nithya, V.Sundaram Abstract | PDFIconPDF

7

Feature Extraction and Author Profile Creation from Documents in MalayalamBindu Baby Thomas, Sindhu L, Dr Sumam M Idicula Abstract | PDFIconPDF Handwritten South Indian Language Recogntion Using Artificial Neural NetworkDr.N.Sengottaiyan, Dr.C.Sureshkumar Abstract | PDFIconPDF

4

81 – 83

September 15, 2011 – 1:41 pm Categories: Uncategorized | Comments (3) Tagged C. Sureshkumar, call for papers, Dr.Totok R Biyanto, fake journal, ijart.org, unrefereed papers |

Science Academy Publisher – A curse for academics

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

9 of 17

http://fakejournalss.wordpress.com/

We recently came across a “publisher”, or better we would say a “one-man show“, here are the list of journals this person proposed to the community. Most of the papers published appears legit and most of them appears to be low quality articles. As expected, NO REVIEW is done AT ALL. Not sure? Try it by yourself. Send them any paper and wait a few days to receive an email asking you that your paper has been accepted and to pay. Below are the list of journals that have already been BLACKLISTED in several universities. Publication in these journals have NO VALUE!!!! Email: [email protected]

International Journal of Research and Reviews in Computer Science (IJRRCS)

2079-2557 2011

International Journal of Research and Reviews in Wireless Communications (IJRRWC)

2046-6447 2011

International Journal of Research and Reviews in Information Sciences (IJRRIS)

2046-6439 2011

International Journal of Research and Reviews in Software Engineering (IJRRSE)

2046-6188 2011

International Journal of Research and Reviews in Artificial intelligence (IJRRAI)

2046-5122 2011

International Journal of Research and Reviews in Computing Engineering (IJRRCE)

2046-5130 2011

International Journal of Research and Reviews in Next Generation Networks (IJRRNGN)

2046-6897 2011

International Journal of Research and Reviews in Wireless Sensor Networks (IJRRWSN)

2047-0037 2011

International Journal of Research and Reviews in Ad hoc Networks (IJRRAN)

2046-5106 2011

International Journal of Research and Reviews in Information Security and Privacy (IJRRISP)

2046-5718 2011

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

10 of 17

http://fakejournalss.wordpress.com/

International Journal of Research and Reviews in Information Technology (IJRRIT)

2046-6501 2011

International Journal of Research and Reviews in Soft 2046-6412 2011 and Intelligent Computing (IJRRSIC)

International Journal of Research and Reviews in Electrical and Computer Engineering (IJRRECE)

2046-5149 2011

International Journal of Research and Reviews in Mechatronic Design and Simulation (IJRRMDS)

2046-6234 2011

International Journal of Research and Reviews in Signal Acquisition and Processing (IJRRSAP)

2046-617X 2011

Science Academy Transactions on Computer and Communication Network (SATCCN)

2046-5157 2011

Science Academy Transactions on Renewable Energy Systems Engineering and Technology (SATRESET)

2046-6404 2011

July 24, 2011 – 1:11 am Categories: Uncategorized | Post a comment Tagged fake, fake journal, http://sciacademypublisher.com, international journal, scam, Science Academy Publisher, [email protected], unrefereed papers |

LIST OF UNREFEREED PAPERS, NO REVIEW, WASTE PUBLICATIONS – Journal of Computer Science and Engineering

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

11 of 17

http://fakejournalss.wordpress.com/

LIST OF UNREFEREED PAPERS, NO REVIEW, WASTE PUBLICATIONS https://sites.google.com/site/jcseuk/volume-7-issue-2-june-2011 An Efficient Sampling Algorithm on Data Streams to Improve Closed Frequent Itemsets Mining Algorithms Results [Full Text] Mohammad Saniee Abadeh and Mansour Tarafdar Sampling is one of the effective methods in data reduction especially as a preprocessing task for data streams. Regard to the features of data streams, it is essential to introduce a lossless-information sampling algorithm. Despite on several Closed Frequent Itemset mining algorithms presented since now for non-redundant itemsets discovery over transactional data streams, we can improve performance of these algorithms using sampling task.In this paper, we introduce a Closed Frequent Itemset mining based on reservoir sampling algorithm called CFISDS1 in landmark window model of transactional data stream. This algorithm initiate a concept lattice then, processes the transactions arriving in the stream and updates the concept lattice appropriately in batch form. This incremental update preserve more relevant transaction to closed frequent itemset mining task in reservoir space and extract this sample on demand of user. Experimental evaluations over synthetic datasets and real life datasets demonstrate the scalability of the algorithm. In addition, presented measure shows the efficiency of CFISDS compare to the other transactional data stream sampling algorithms. ————————————————————————————————————— Facing the Duplicates in a Greek Hospital Information System [Full Text] E. Mourtou Medical informatics has been growing rapidly over the past decades. Due to the advances in new applications in health and wel-fare, vast amounts of patient data are generated every day, and thus critical medical information such as patient records, need to be effec-tively organized and analyzed. Duplicates patient data in Hospital Information Systems (HIS), implies a problematic management of clinical information and prevent the patient data sharing even among healthcare professionals of the same hospital. This paper explores the reasons for duplicates within the HIS and aims to identify them through both deterministic and probabilistic search methods. Certainty levels for matching criteria are specified according to matching weights that are based on several studies that have investigated the matching algo-rithms and on empirical inspection. Query design algorithms are analyzed for both methods and finally a partial linking of patient data has been achieved, through clerical reviews in order to examine whether the possible matches are true. Our research is still in evolution and there is much work to be done to completely and correctly consolidate patient data. ————————————————————————————————————— Implementation of Approximate Reasoning Techniques using Vague Logic [Full Text] Supriya Raheja, Reena Dadhich and Smita Rajpal

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

12 of 17

http://fakejournalss.wordpress.com/

Approximate Reasoning using fuzzy logic provides a realistic framework for human reasoning. The concept of vague logic introduced by Gau & Buehrer is the higher order fuzzy logic. Our present work is based on the concept of vague Logic. In this paper we are defining the approximate reasoning implication rules Generalized Modus Ponens (GMP) and Generalized Modus Tollens (GMT) using vague logic. As a special case we are also reducing the concept of GMT and GMP using fuzzy logic with the help of example. ————————————————————————————————————— A Hybrid of Simulated Annealing and Fuzzy Data Mining Approach for Concept Extraction from Databases [Full Text] Ayoub Bagheri, Maryam Zekri and Mohammad-A. Rigi In the recent decades huge amounts of data have been collected and stored, due to the fact that a lot of useful information is hidden in the data, the companies need tools to find out patterns and regularities. As many of the databases are very large containing a huge number of tuples and attributes, efficient automated tools are necessary for acquiring useful information. In this paper an approach is proposed for extracting useful information from a database using a hybrid of simulated annealing and Fuzzy data mining algorithm. The simulated annealing algorithm is employed to find a set of useful fuzzy concepts with a good fuzzy support for the output of fuzzy data mining process. Some experiments have demonstrated that our method generates rules of better performance than the common fuzzy grid-based data mining approach. ————————————————————————————————————— Spoofing – A threat to Biometric Systems [Full Text] Kezia R Badhiti and Prof.Sudha Thatimakula Biometrics is a life measurement mainly used for authentication of the people by identifying and verifying their physiological and behavioral characteristics. False Match Rate (FMR) and False Non-match rate (FNMR) are the two accuracy measures of Biometric Systems. A Biometric solution False Match Rate is the probability that users template will be incorrectly judge to be a match for a different user’s template. A Biometric solution False Non-match Rate is the probability that users template will be incorrectly judge to not match his or her enrollement template. Human Biometric Credentials like Face, Recognition, Iris Recognition, Voice and Finger cannot be kept secret. With the advancement of technology there is every possibility for the intruders to steal the Biometric credentials and thus create fake and introduce them as real in the Biometric Database, which is a threat to Biometric Systems. This paper gives information on various spoofing attacks and explains the importance of liveness detection of human Biometric traits. ————————————————————————————————————— Design and Analysis of Using a Programmable Network Interface for High Speed Networks beyond the 10 Gbps [Full Text] Mohamed Elbeshti1 , Michael Dixon and Terry Koziniec The networks speed has been advancing rapidly in providing higher transmission rate 10 Gbps and over. These improvements based on the demand of enhancing the network services, improving their bandwidth and integrating advanced technology. As the speed of networks exceeds 10 Gbps, the design and implementation of high-performance Network Interfaces (NI) for the current and the

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

13 of 17

http://fakejournalss.wordpress.com/

Next Generation Network (NGN) server applications that employ TCP/IP and UDP/IP as the communication protocol of choice is becoming very challenging. Using the General Purpose Processor (GPP) as a main core processor in the NI to offload the TCP/IP or UDP/IP functions, can deliver some important features to NI such as scalability and short developing time. However, it is not clear that using GPP can support the new speed line over the 10 Gbps. Furthermore, it is necessary to find out the clock rate Hz limit of these GPP in supporting the processing of NIs. In this research, we have proposed a new programmable Ethernet NI (ENI) model design to support the high speed transmission. This model supports the Large Segment Offload (LSO) for sending side and a novel algorithm for receiving side called Receiving Side Amalgamating Algorithm (RSAA). As a result, a 240 MHz RISC core can be used in this Ethernet NI card for a wide range of the transmission line speeds up to 100 Gbps when a jumbo packet assigned as a default size for a network. ————————————————————————————————————— Design and Implementation of Extendable Media Streaming Application: Case Study of Windows 2003 Voice Recorder [Full Text] Ezekiel U. Okike and Ayorinde Afolayan Any data that changes meaningfully with respect to time can be characterized as time-based media. Such media data can be obtained from a variety of sources, such as local or network files, cameras, microphones, and live broadcasts. A key characteristic of timebased media is that it requires timely delivery and processing such that once the flow of media data begins, there are strict timing deadlines that must be met both in terms of receiving and presenting the data. For this reason, time-based media is often referred to as streaming media and is delivered in a steady stream that must be received and processed within a particular timeframe to produce acceptable results. This study evaluates a streaming medium, the Window’s sound recorder application, investigates the problem of limited recording period of 60 seconds, and implements a Unified Modeling language (UML) based design framework for an extendable media recorder application which overcomes the 60 seconds recording limitation of the system. ————————————————————————————————————— Development and Deployment of Fixed Wireless Access in South West Nigeria: Performance and Evaluation [Full Text] Oluwaranti Adeniran and Achimugu Philip Fixed Wireless Access (FWA) involves the use of wireless technology to replace copper to connect subscribers to the telephone network. It is a variant of wireless broadband which provides an alternative in the so-called ‘last mile’ connectivity between the subscriber and the fixed telecommunications network. FWA could either be narrowband or broadband and it is predominantly deployed using the Code Division Multiple Access (CDMA) technology. In assessing the extent of development and deployment of FWA, the perspective of the operators and users was elicited primarily through the use of questionnaires. Issues like setup cost, tax, Government incentive, availability of infrastructure and manpower applied to the operators while on the users’ part factors like quality of service, signal strength as well as call rate were considered. The South western zone of Nigeria is regarded as one of the most urbanized regions in the south of Sahara, this is not out of place considering the fact that Lagos which is the nation’s commercial nerve centre and a mega-city is located within this region. The scope of this research covered this very lively part of the country. The relationship between the parameters or variables considered was established using an appropriate statistical method: The

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

14 of 17

http://fakejournalss.wordpress.com/

Regression analysis. In terms of users’ preference, Global System of Mobile communication (GSM) was compared with FWA. Results were interpreted and suitable conclusions were drawn to wrap up a quite revealing work. ————————————————————————————————————— TD-PSOLA Based Emotional Speech Generation [Full Text] A. Manpreet Kaur and B. Parminder Singh This paper describes a speech generator system that is able to generate synthetic speech from a natural recorded speech using TD-PSOLA. Generating emotions in speech is an imperative issue of research giving the requirement of modern human-machine interaction systems to produce an emotional speech. This system implements TD-PSOLA (Time Domain Pitch synchronized Overlap-add) algorithm which is a well known technique for high quality pitch and time scale modifications of speech. An important part of this algorithm is pitch marking and prosodic modifications which is used for embedding emotions in speech signals. TD-PSOLA is chosen for adding emotions to natural recorded speech as it has very low complexity and computational cost. ————————————————————————————————————— The Impact of Information Technology in Nigeria’s Banking Industry [Full Text] Oluwagbemi Oluwatolani, Abah Joshua and Achimugu Philip Today, information technology (IT) has become a key element in economic development and a backbone of knowledge-based economies in terms of operations, quality delivery of services and productivity of services. Therefore, taking advantage of information technologies (IT) is an increasing challenge for developing countries. There is now growing evidence that Knowledge-driven innovation is a decisive factor in the competitiveness of nations, industries, organizations and firms. Organizations like the banking sector have benefited substantially from e-banking, which is one among the IT applications for strengthening the competitiveness. This paper presents the current trend in the application of IT in the banking industries in Nigeria and gives an insight into how quality banking has been enhanced via IT. The paper further reveals that the deployment of IT facilities in the Nigerian Banking industry has brought about fundamental changes in the content and quality of banking business in the country. This analysis and clarification of how Nigerian Banks have used IT to reengineer their operations is detailed through literature review and observation. Three categories of variables that relate to the use and implementation of information technology devices were considered in this paper. These include the nature and degree of adoption of innovative technologies; degree of utilization of the identified technologies; and the impact of the adoption of IT devices on the bank operations. ————————————————————————————————————— Development of a Window Based Security System for Electronic Data Interchange [Full Text] Achimugu Philip, Oluwagbemi Oluwatolani and Abah Joshua The Electronic Data Interchange (EDI) is the exchange of standardized documents between computer systems for business use. The objective of this study is to make Electronic Data Interchange secure to use and to eliminate human intervention in the transfer of data between business partners so that productivity and efficiency can be improved and also promote its usage between two or more trading organizations. This paper provides an overview of EDI by describing the traditional

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

15 of 17

http://fakejournalss.wordpress.com/

problems of exchanging information in business environments and how the EDI solves those problems and gives benefits to the company that makes use of EDI. This paper also introduces the common EDI Standards and explains how it works, how it is used over the internet and the security measures implemented. The system was executed on both local area network and wide area network after a critical study of the existing EDI methods and also implemented using VB.Net programming language. Finally, an interactive program was developed that handles the transfer of files, with special attention to the security of the items that are being transferred from one computer workstation to another.

July 20, 2011 – 11:01 pm Categories: Uncategorized | Comments (1) Tagged [email protected], fake, https://sites.google.com/site/jcseuk, Journal of Computer Science and Engineering, scam, unrefereed papers |

A Scigen Paper accepted by Journal of Telecommunications This is REAL!!! The journal we have been tracking down (Journal of Telecommunications, ISSN 2042-8839, http://sites.google.com /site/journaloftelecommunications/ ) some weeks back since many authors contacted us and inform us that it appears that no review was taking place! All they receive is a registration form some days after they submitted their paper asking them to pay 100 UK Pounds. The journal starts publishing in February 2010. One of our investigator send them a scigen paper entitled “Towards the Development of Interrupts” and receive after 3 weeks an acceptance email from the journal editor [email protected] informing him that the paper has been accepted for publication in July 2010. Below is the email received from the journal: Dear Sir, We are please to inform you that your paper has been accepted for publication. Paper title: Towards the Development of Interrupts But note that you will have to format your paper according to the paper template found on the journal website under the page Authors guidelines: http://sites.google.com/site/journaloftelecommunications/authorsguidelines Please find attached the Paper registration form. You are requested to print this form, fill in the required information, and send a scan copy of it together with a scan copy of the bank transfer transaction to [email protected] as proof of payment. The last date of registration is on Wednesday, 14th July 2010 by 18:00 GMT Please note that you will have to send the copyright agreement form, find a template on the journal website: http://sites.google.com /site/journaloftelecommunications/authorsguidelines Thanks and Regards,

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

16 of 17

http://fakejournalss.wordpress.com/

Journal of Telecommunications.

July 12, 2010 – 8:39 am Categories: Uncategorized | Comments (9) Tagged [email protected], fake journal, http://sites.google.com /site/journaloftelecommunications/, ISSN 2042-8839, journal of telecommunications, registration form, scam |

Journal of Telecommunications – FAKE JOURNAL and BIG SCAM!!! In this issue, we would like to inform you (following a deep investigation) about a fake journal in the field computer science. We are extremely SAD for academics who already send them their money!!

It is SAD to see lots of fake and abusive journals cropping up everyday!! No paper is ever reviewed; all they want is your MONEY!! BEWARE!!! Spread the NEWS!!! Journal of Telecommunications is a fake computer science journal. Already blacklisted in several universities and by several academics!!! Publications in Journal of Telecommunications have NO VALUE!!! Also, it is a shame and lost of academic prestige to have a CV listing a publication in a FAKE Journal!!! http://sites.google.com/site/journaloftelecommunications/ Managing Editor Journal Of Telecommunications Maxwell Building 96-98, Uxbridge Road Ealing London W5 5TH Uk Tel: +442088414479 +447833581168 Email: [email protected] Website: http://sites.google.com/site/journaloftelecommunications/

16-Dec-13 9:07 PM

Fake Journals in Computer Science | Low Quality Journals – To Avoid A...

17 of 17

http://fakejournalss.wordpress.com/

May 4, 2010 – 4:47 pm Categories: Fake Journals | Post a comment Tagged call for papers, [email protected], fake journal, http://sites.google.com/site/journaloftelecommunications/, international journal, ISSN 2042-8839, journal of telecommunications, Maxwell Building 96-98, scam journal, [email protected], Uxbridge Road Ealing London W5 5TH Uk |

Blog at WordPress.com. | The NotesIL Theme.

16-Dec-13 9:07 PM

Suggest Documents