Forthcoming articles

 


Electronic Government, an International Journal

 

These articles have been peer-reviewed and accepted for publication in EG, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of EG are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

Electronic Government, an International Journal (13 papers in press)

 

Regular Issues

 

  • Digital Open Government in Africa: A Strategy for Bridging Citizens   Order a copy of this article
    by Emeka A. Ndaguba, Edwin Ijeoma 
    Abstract: This paper extends the scope of open and digital government to include relationships bridging and development. It argues that open and digital government that encourages citizens engagement in Africa is capable of restoring trust lost. The study used thematic review and analysis, quasiquantitative research method. The paper revealed those years of long suffering, slavery, authoritarian, totalitarian, oppressive government, colonialism, and apartheid has made the frontrunners to assume the place of a hunter and the citizens as its prey.
    Keywords: open government; digital government; citizens' engagement; transparency; openness; accountability; colonialism; trust; Nigeria; and South Africa.
    DOI: 10.1504/EG.2018.10007847
     
  • A Comparison of Perspectives of Kuwaiti and Indonesian Residents Towards E-Government   Order a copy of this article
    by Dinesh A. Mirchandani, Yunus A. Kathawala, Julius H. Johnson Jr, John P. Hayes, Sudhir Chawla 
    Abstract: Kuwait and Indonesia are two Asian countries with similar literacy rates and median ages of residents. An understanding of their residents' perspectives can help the governments of these countries better plan their e-government services and provide useful information to other countries. The current study used a survey to assess the importance of e-government services and website features from the perspective of Kuwaiti and Indonesian residents. Multigroup analysis was used to validate the instrument and research model. Four relationships were found to correspond across datasets, but only one relationship was found to be significantly different between the two datasets, i.e., the relationship of resident feedback services to the websites savings and control feature was significantly stronger (p < 0.01) in the Indonesian dataset as compared to the Kuwaiti dataset. The multigroup analysis demonstrated that residents in both countries interpreted the survey instrument similarly and had comparable expectations for e-government services and website features.
    Keywords: e-services; website features; multigroup analysis; e-government; Kuwait; Indonesia.
    DOI: 10.1504/EG.2018.10008393
     

Special Issue on: New Developments in Electronics Cloud and IoT

  • Performance analysis of a 5G Non-Orthogonal waveform-filter bank Multi-Carrier   Order a copy of this article
    by Ravi Sekhar Yarrabothu, Sadhana ,. Kandukuri, Usha Rani Nelakuditi, M. Krishna Chennakesava Rao 
    Abstract: As the world, is looking for more data speeds along with support for M2M communication in the next generation (5G), the current orthogonal frequency division multiplexing (OFDM) has limitations such as high PAPR, spectrum wastage due to cyclic prefix (CP), out of band (OOB) emissions. To overcome these limitations, 5G researchers is looking for different wave forms and filter bank multi carrier (FBMC) waveform is one of the prime contenders. In this paper, it has been implemented, the poly-phase network filter bank multi carrier (PPN-FBMC), which reduces the high complexity and computations. A prototype filter for the PPN FBMC with high overlapping factors (K = 6 and 8) are implemented. It also simulates FBMC system using Matlab Software, to characterise and analyse the 5G candidate waveform FBMC and compare with OFDM, in terms of error vector magnitude (EVM), peak to average power ratio (PAR), and power spectral density (PSD) performance. The simulated results prove that FBMC outperforms the OFDM systems in all the above mentioned aspects, even under noisy conditions.
    Keywords: OFDM; orthogonal frequency division multiplexing; PPN-FBMC; poly-phase network filter bank multi carrier; CP; cyclic prefix; OQAM; offset quadrature amplitude modulation; prototype filter; 4G and 5G.
    DOI: 10.1504/EG.2017.10005968
     
  • Bit error rate performance analysis of Cholesky decomposition based quasi ML receiver for large scale MIMO system   Order a copy of this article
    by Kasiselvanathan M, N. Sathish Kumar 
    Abstract: Large Scale Multiple Input Multiple Output (LS-MIMO) system is an emerging technology that has large antennas at both transmitter and receiver. In this paper, a novel approach is proposed namely Cholesky Decomposition based Quasi Maximum likelihood (ML) detector followed by List Sequential (LISS) decoder (Quasi ML-LISS) receiver for LS-MIMO system. The Refined Empirical Log-Likelihood Ratio (RELLR) generated by ML soft detector is decoded by using LISS decoder. The performance of the receiver is enhanced for turbo coded MIMO system by generating the RELLR at the detector output for higher order modulation. Simulation results show that Bit Error Rate (BER) performance of proposed receiver is closer to the ML performance and superior to the Multiple Stage (MS) receiver.
    Keywords: BER; bit error rate; QAM; quadrature amplitude modulation;maximum likelihood; MIMO; multiple input multiple output; signal detection.
    DOI: 10.1504/EG.2017.10007425
     
  • Comparitive Analysis of Applications of Identity-Based Crptosystem in IoT   Order a copy of this article
    by C. Ramesh, K. Venu Gopal Rao, D. Vasumathi 
    Abstract: The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect us from intrusions and interference that could compromise personal privacy. Security is paramount for the safe and reliable operation of IoT connected devices. In this aspect Identity-Based Cryptography(IBC) plays a promising role in Internet of Things (IoT) due to its benefits, such as facilitating public key management. This paper gives a detailed feasibility study of applicability of IBC in IoT.
    Keywords: IBC; identity-based cryptography; Tate pair; elliptic curves; IoT and digital certificates.
    DOI: 10.1504/EG.2017.10007615
     
  • A Survey on Integrity Verification and Data Auditing Schemes for Data Verification in Remote Cloud Servers   Order a copy of this article
    by R. Muthuram, G. Kousalya 
    Abstract: Cloud computing is the opportunistic model that provides a lot of services to the business organisations to concentrate more on their own business services instead of spending more cost on maintenance. The service providers provide an unlimited storage capability to the clients with characteristics like scalability, reliability, on-demand self-service etc. Clients host their data on cloud servers and pay the cost based on their usage. The data consumers can access the data from the cloud servers. Because of lack of access control and data may tamper by malicious users, business organisations hesitating to use the cloud computing. Ensuring the data storage correctness and integrity is one of the major issues in the cloud computing. In this paper, we discussed the various integrity system models that are available and the procedure for the various existing integrity verification schemes proposed.
    Keywords: data storage auditing; cloud computing; integrity; privacy preserving; dynamic auditing.
    DOI: 10.1504/EG.2017.10008459
     

Special Issue on: New Developments in Electronics, Cloud and IoT

  • Improving the Accuracy of Item Recommendation in Collaborative Filtering Using Time-Variant System   Order a copy of this article
    by Desabandhu Parasuraman, Sathiyamoorthy Elumalai 
    Abstract: Nowadays, the real challenge is to manage the dynamic web content in order to provide a prolific resource to the user. Web personalisation is an outcome of the challenge by which the web is a tailor made to a user. Recommendation systems access the user profile using collaborative filtering and content based filtering to provide better personalisation. This paper focuses on improving the accuracy of item recommendations, based on the dynamicitem-based collaborative filtering by utilising time variant system which is implied on user ratings. Similarity between the items is found by using vector similarity and weight is calculated by Pearson correlation coefficient. Comparison of the results of traditional item-based collaborative filtering with dynamic item-based collaborative filtering is also discussed. Finally, it is observed that the users dynamic voting average improves the accuracy of recommendations comparing to the normal voting average on items.
    Keywords: recommendation systems (RS); user profiles; collaborative filtering (CF); time variant system; vector similarity.
    DOI: 10.1504/EG.2017.10004520
     
  • Middling Role of Social Support on Work Family Conflict and Role Salience among Working Women in IT Sector   Order a copy of this article
    by S. Sakthivelrani, K. Ragles Devi* 
    Abstract: In todays era, the business success relies on the worker skills and capabilities. Now a day workfamily conflicts is turning into expanded consideration due to work pressure and family responsibilities. The primary objective of the study is to find out the influence of workfamily strife and social support on job satisfaction among the employees. This study examines the extent of workfamily conflict among respondents on the premise of occupation and marital status. This study additionally verifies the impact of work-family conflict and social support on job satisfaction. Questionnaire technique was accustomed to collect the data and every data were analysed using SPSS t-test, one way analysis of variance, correlation and structural equation modelling (SEM) was utilised in this study. The result shows that the amount of work-family conflict is high among the married women comparing to the unmarried respondents. Job satisfaction among the employees is based on the organisational support providing to them.
    Keywords: role salience; work- family conflict; job satisfaction; social support and work family enrichment.
    DOI: 10.1504/EG.2017.10005164
     
  • Tunnel Transistor Based Energy Efficient and Reliable Computing Architectures at Low VDD   Order a copy of this article
    by Sadulla Shaik, K. Sri Rama Krishna 
    Abstract: Tunnel field-effect transistors (TFETs) have emerged as one of the most promising post-CMOS transistor technologies. This paper presents design analysis and benchmarking of TFET based three different 1-bit full adders (8T-XOR Logic, 6T-XOR Logic and MUX Based) are used for designing 4-bit adders in two different topologies targeting a VDD below 500 mV. These topologies are 22T/18T 1-bit full adder based 4-bit carry propagate adder (22T/18TCPA) and multiplexer logic 1-bit full adder based 4-bit carry propagate adder (MCPA). The performance of TFET based 4-bit adder topologies has been benchmarked with 20 nm double gate Si FinFET technology. Tunnel FETs are desirable candidates for building energy efficient and reliable arithmetic blocks with supply voltage scaling. We demonstrate that TFETs steep slope characteristics enable the 22TCPA design to be energy efficient option along with improved reliability and 18TCPA design is the best in terms of energy efficiency and reliability amongst all designs at low supply voltages.
    Keywords: double gate FinFETs; energy efficient computing; high speed 1-bit and 4-bit adders; reliability; steep slope devices; tunnel FETs; ultra low power; XOR gates.
    DOI: 10.1504/EG.2017.10006158
     
  • Behavior State Analysis through Brain Computer Interface using Wearable EEG Devices: A Review   Order a copy of this article
    by Sravanth Kumar Ramakuri, Sanchita Ghosh, Bharat Gupta 
    Abstract: In recent years, a vast research is concentrated towards the development of EEG based human computer interface in order to enhancing the quality of life for medically as well as non-medical applications. Industry and community of research have been attracted by wireless EEG reading devices and they are easily available in the market. Such technology can be incorporated into psychology, anesthesiology, and for real-time patients monitoring. A brain-computer interface (BCI) is a direct communication channel between the human brain and the digital computer.. In this paper, we present a review on characteristics and specification of EEG based human computer interfaces for real-time applications using wearable or wireless EEG devices.
    Keywords: Behavior State Analysis; Brain Computer Interface; Medical Healthcare; heart Attack; Brain Injuries; User State Monitoring; Wearable EEG Devices.
    DOI: 10.1504/EG.2017.10006979
     
  • Impact of Deflection History based Priority on Adaptive Deflection Router for Mesh NoCs   Order a copy of this article
    by Elizabeth Isaac, M. Rajasekhara Babu 
    Abstract: Assimilation of several cores insist scalable and scattered communication configuration. On chip supports bus as a medium, but it has multiple cores. Network on Chip (NoC) is proffered over bus. Traditional designs employ input buffered routers which form the backbone of NoC. NoCs with buffer-less routers gain popularity due to its router design, low power and less chip area. The most innovative and inventive step in deflection router is to employ side buffers instead of input port buffers. Here proposea deflection history as a priority metrics for flit selection and modified the primitive DeBAR design, and propose Priority Based Deflection Based Adaptive Router (PBDeBAR) that utilizes a cost effective priority scheme to choose a flit that has to be shifted to side buffer. Experimental outcome shows that PBDeBAR reduces latency, deflection rate, buffer occupancy and link usage with respect to the existing minimally buffered deflection routers.
    Keywords: buffer-less routing; buffer occupancy; congestion; deflection; link activity; minimally buffered; penalization; router pipeline; efficiency; side buffer.
    DOI: 10.1504/EG.2017.10007068
     

Special Issue on: Secure data communication and intelligent data processing for Electronic Governance

  • Shortest Path Establishment Approaches for Static and Dynamic Mobile Nodes with Quality of Service   Order a copy of this article
    by S. Sundar, Aritra Basu, Arunava Kar, R. Kumar 
    Abstract: An ideal routing algorithm is one which finds the best/shortest path(s) for transmitting the data between source and destination in a short time. In this study, we have proposed two approaches; one is based on Minimum Spanning Tree (MST) and the other one is based on Distance Vector Method (DVM).For MST, Genetic Algorithm is used. The chromosomes used are of variable length and their genes are used for encoding. The cross over and mutation operations are used for genetic diversity and improving the convergence rate. The second method is based on DVM to cover the limitations of the first approach as well the traditional DVM. The developed algorithm finds the shortest path for static mesh connected mobile nodes. It is then tested for dynamicity by varying the positions of a few nodes. Extensive simulations are carried out on both the approaches and the results are compared with other popular algorithms.
    Keywords: e-governance; shortest path; MST; minimum spanning tree; DVMs; distance vector methods; genetic algorithm; MANETs; mobile ad hoc networks; Dijikstra algorithm; Bellman-Ford algorithm; QoS; quality of service.
    DOI: 10.1504/EG.2018.10005870
     
  • Efficient Routing Based on Core Relay Intermediate Nodes in MANET   Order a copy of this article
    by P. JAYALAKSHMI, R. Saravanan 
    Abstract: Efficient routing in MANETs is necessary for effective data communication among nodes. Routing can be done either single-hop or multihop. If source and destination are within the transmission range then single-hop routing is established, else multi-hop routing is required to route the data packets to reach the destination. Selection of next hop based on the speed of movement of nodes and transmission range: reduces overall energy consumption, link failures and delay constraints. The weights of the link quality between the nodes present in the network can be estimated by using cost metrics such as distance and travelling speed of the node since the efficient routing is done with better link quality nodes. To minimize the hop counts and to reduce the packet loss in the network, an efficient route should be established between source and destination. The success of the data transmission via Core Relay Intermediate Nodes (CRIN) can be analysed using NS-2 tool. The efficiency of 0.4% is improved by using the proposed scheme. Network performance can be enhanced through shortest path so that messages may be delivered in a timely manner.
    Keywords: Link Quality; Link weight; Node Speed; MANET; Routing.
    DOI: 10.1504/EG.2018.10006136