Forthcoming and Online First Articles

International Journal of Information Technology, Communications and Convergence

International Journal of Information Technology, Communications and Convergence (IJITCC)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Information Technology, Communications and Convergence (6 papers in press)

Regular Issues

  •   Free full-text access Open AccessArchitecture and Framework for Data Acquisition in Cloud Robotics
    ( Free Full-text Access ) CC-BY-NC-ND
    by Yutaka Watanobe, Yuichi Yaguchi, Keita Nakamura, Toshimune Miyaji, Ryuhei Yamada, Keitaro Naruse 
    Abstract: This study explores a data acquisition architecture and framework in cloud robotics. In cloud robotics environments, software components play important roles by acquiring data from heterogeneous devices and then performing context-aware computing with the help of knowledge bases organized by the data. However, there are numerous tasks that must be performed to create such components, and their corresponding database schemas, services, and repositories, and these tasks can be burdensome for developers. In this paper, an architecture and framework for constructing a data acquisition system are presented as a theory and a concrete implementation, respectively. Our proposed architecture enables developers to construct a robot environment with data acquisition functionalities by defining scenarios in an ontology language, as well as by defining objects and services in modern programming languages. The framework is realized in a way that allows it to automatically generate the required software components and their corresponding repositories, which are deployed on the cloud. Case studies showcasing the proposed framework are also presented.
    Keywords: Cloud Robotics; Architecture; Data Acquisition; Robotics Technology Components.

  • Performance Analysis of IOT-WBAN Based Health Monitoring System   Order a copy of this article
    by Sonal , S.R.N. Reddy, Dinesh Kumar 
    Abstract: Demands of smart health monitoring have been made possible in today's life through the integration of various emerging technologies. Integration of IoT (Internet of Things)-WBAN (Wireless Body Area Network) has raised the concept of smart health monitoring to a new step aimed at removing all the existing barriers. This paper introduces the idea of remote smart health monitoring utilizing three-tiered network architecture focused on IoT-WBAN, coupled with the scenario of real-time implementation. The Tier-I encompasses multiple physiological parameters sensing in a network by several sensor nodes (end-devices), together with its timely transmission to the coordinator node. Tier II incorporates the base station concept, and Tier III incorporates cloud connectivity to include remote smart health monitoring and consultancy framework. Developed network sensor nodes have been deployed in remote healthcare centers to measure patients' physiological parameters and the measured parameters can be accessed in primary healthcare centers. The repository of data and remote feedback from specialists sitting in distant areas facilitates global system acceptance. The system also has included user as well as professional authentication which blocks the unauthorized user from accessing any sort of information. Apart from these, different issues are resolved during packet transmission to attain maximum efficiency and secure data communication.
    Keywords: IoT-WBAN based network architecture; Network Deployment; Performance Analysis.

  • E-LEARNING PLATFORMS AND SECURITY MECHANISMS USED BY EDUCATIONAL INSTITUTIONS IN KAMPALA, UGANDA   Order a copy of this article
    by Hilda Mpirirwe, Drake Mirembe, Jude Lubega, Joab Agaba 
    Abstract: COVID 19 pandemic accelerated consumptions of e-services in the Ugandan education sector. This study aims at establishing the type of e-learning platforms adopted by educational institutions in Kampala and evaluate the appropriateness of their security mechanisms for online academic progression assessments. The researchers adopted a mixed methods research approach for data collection and analysis. Respondents were identified using purposive stratified random sampling technique from educational institutions accredited by the Ugandan Ministry of Education and Sports to run Open Distance e-learning. A total of 400 responded including; e-learning experts, teachers and lecturers, and students. The results show that the most popular e-learning platforms were; Zoom (87.5%) at Primary; Google meet (84.1%) at Secondary; WhatsApp (79.7) at Secondary and MOODLE (98.7%) at University. The e-learning platforms were mainly used for posting learning materials and facilitating teacher-student interactions (97.9%), but less on managing assessment for academic progression (Universities (73.9%), Secondary (50.7%) and primary (41.7%).
    Keywords: Keywords: E-learning; E-assessment; COVID-19 pandemic; authentication; integrity; impersonation.

  • Lexicon based sentiment analysis on movie review in the Gujarati Language.   Order a copy of this article
    by Parita Shah, Priya Swaminarayan 
    Abstract: Film assessment helps watchers with choosing if the film merits their time. A rundown of all surveys for a film can helps watchers to make a suitable selection without the wastage of users' time by considering all checks. For the assistant of viewers, cinema review pages are available with film critics offered by various cinema experts. Sentiment examination can decide the mentality of experts relying upon their audits. The process of film review categorization into positive and negative grades is called movie review sentiment analysis. Therefore, this paper presents our exploratory work on execution assessment of the SentiWordNet approach for record level estimation characterization of Movie surveys available in the Gujarati language. The paper additionally presents an evaluative record of the execution of the Resource-based film sentiment classification using the GujaratiSentiWordNet (BagofWords) technique for the movie review dataset created in the Gujarati language.
    Keywords: Gujarati SentimentWordNet; Hindi SentiWordNet; IndowordNet; Gujarati Dataset; Sentiment Analysis; Natural Language Processing; Lexicon Based.

  • EVOLUTION OF MOBILE PAYMENT SYSTEMS AND LEVEL OF SECURITY AWARENESS AMONG MOBILE MONEY USERS IN UGANDA   Order a copy of this article
    by Job Matovu, Drake Patrick Mirembe, Stephen Odongo Eyobu 
    Abstract: Despite the rapid adoption of Mobile Money (MM) in most African countries like Uganda, there is limited information on how mobile money user demographics impact on security of mobile money transactions. In addition, there is limited literature on the contextual evolution of money payment systems in African financial ecosystems, to enhance appreciation of the inherent security concerns of mobile payment systems. Thus, this study investigates the evolution of mobile payment systems, describes the desired security requirements and discusses the level of security awareness and practices among mobile money users in Uganda. The study adopted a mix-research approach involving both qualitative and quantitative data collection and analysis methods. A total of 465 participants responded to the study, (460 mobile money users and 5 cyber security experts). Out of 460 users, 259 were male (composed of 222 customers and 46 mobile money agents) and 201 were female (composed of 158 mobile money customers and 54 mobile money agents). The study findings show that; mobile payment systems evolved from the need to transfer money from mainly urban centers to villages which were under served by formal financial institutions like Banks using Short Messaging Services (SMS) technology. The mobile money business is built on commission-agent business model, making it very easy to scale up. The study results show that, given the nature of mobile money business processes and technologies, a number of security concerns exist key among them include: data theft; transaction fabrication; weak authentication on funds withdraw; and lack of transaction confidentiality as the system relies on SMS technology among others. The study revealed that: (1) About 45% of mobile money end customers share Personal Identification Number (PIN) compared to 29% of the agents; (2) Majority of mobile money users do not have formal training in cyber security to equip them with necessary knowledge and skills to protect their information and transactions; (3) The level of education of mobile money users directly proportional to improved security practices and behaviors. The study found that, the authentication protocol on withdraw transaction is very weak as it depends only on customer PIN, which is susceptible to impersonation. The study proposes a role-based security enhancement framework for various users of the mobile money system to mitigate some of the security concerns.
    Keywords: Mobile Payment Systems; Transaction Fabrication Attacks; Mobile Security.

  • Lecturers Perceptions on Usage and Security of Examination modes of Assessment used in Universities. A case study of Mbarara and Bishop Stuart Universities in Uganda   Order a copy of this article
    by Deborah Natumanya, Evarist Nabaasa 
    Abstract: Assessment is core to teaching institutions; students are subjected to formal assessments to determine the skills and knowledge acquired from a subject. Modes of assessment used include paper-based, electronic and oral, which are either used for continuous or final examinations. A quantitative study was carried out to understand the usage and security of these modes of assessment so as to determine that which is more secure and acceptable by lecturers. Results obtained from the study show that much as paper based is the commonly used mode of assessment, it still faces challenges which can be eliminated with electronic assessment once the free e-hand marking, ability to examine essay questions and e-submission of answer scripts components are incorporated in e-assessment. From the study, 93% of lecturers prefer e-examinations because of their advantages while 7% insist that paper based and oral examinations are easier to use due to technological hardships of e-examinations.
    Keywords: University Examinations; Modes of Examinations; E-Examinations; Usage and Security.