Forthcoming articles

International Journal of Services Operations and Informatics

International Journal of Services Operations and Informatics (IJSOI)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Services Operations and Informatics (7 papers in press)

Regular Issues

  • Hybrid Resource Allocation and Task Scheduling Scheme in Cloud Computing Using Optimal Clustering Techniques   Order a copy of this article
    by Manikandan N., Pravin A. 
    Abstract: In diverse parallel and distributed computing systems, resource allocation is the progression of distributing consumer tasks for processing elements during execution in which some performance intentions are optimized. This document can be explain about the innovative resource allocation algorithm for the computing grid environment. In the scheduling problem of independent task in cloud computing, summarize other scheduling algorithms introduce a modified fuzzy c-means clustering algorithm (MFCM) Our algorithm abstract resource into a model to analyze these characteristics of resources with the MFCM algorithm. From that our proposed technique could decrease a execution time and memory space allocation of the system. For the optimal selection of virtual machines hybrid whale genetic (HWGA) optimization algorithm is used. Since the virtual machines are optimally selected on the basis of feature values, our proposed method provides reduced load balancing as well as improved parallel execution of tasks
    Keywords: Resource Allocation; Scheduling; Fuzzy C-Means Clustering; Whale Optimization; Virtual Machine; Parallel Execution.

  • Optimal distributed intelligent traffic system for road safety, emergency vehicle clearance using hybrid optimization algorithm   Order a copy of this article
    by Bhavani Sundar Raj, Srimathi Chandrasekaran 
    Abstract: Nowadays, the population growth and their choice raise the number of vehicles, which raises traffic congestion in critical condition across the developing Nations like India. In consequence, emergency vehicles are stuck in traffic and waste their valuable time. Many authors focus on traffic problems in terms of intelligent traffic system without the consideration of emergency cases. In this paper, we propose an optimal distributed intelligent traffic system (ODITS) using hybrid optimization algorithm. The proposed system designed by two phases are collision gathering and decision making. The clustered Jaya algorithm is used to gather the vehicle traffic information, which also differentiate emergency from normal vehicles. Then the modified multi-objective evolutionary based decision-making algorithm is used to compute the best route under the critical conditions. The simulation results shows that the proposed system reduces congestion in traffic, and waiting time of emergency vehicles without compromising normal vehicle speed, waiting time, and number of stopped vehicles.
    Keywords: ODITS; hybrid optimization; collision gathering; decision making; emergency vehicle clearance.

  • Implementation of Security in Multi Trading Activities of Wireless Sensor Networks associated with Big Data IoT   Order a copy of this article
    by Ahmed K. Al-Ani, Ahmed K. Al-Ani, Mustafa Hassan, Mustafa Hassan, Salwa Mahmood, Salwa Mahmood 
    Abstract: Big data analytics are playing predominant role in the multi-trading activities to take appropriate decisions. Big data analytics are conducted with the help of low-control processors, smart remote systems, and low-control sensors to transform into an impacting excitement for the industrial internet of things (IIoT). A wireless sensor network (WSN) is used to work with lowcontrol use bringing about low register and capacity limit. WSNs are widely used by organisations in the operations of IoT associated with big data analytics. In this connection WSN is transmitting enormous data through the network. These huge data transmissions have attracted the cyber criminals to eavesdrop the data with their techniques. The security challenges against the data transmissions in WSN while the multi-trade activities are performed needs a suitable admeasures. In this paper the security features have been implemented for gateways access in WSNs used for multi-trading activities of big data.
    Keywords: Big Data; Internet of Things; Wireless Sensor Network; time sensor data; service-oriented computing.
    DOI: 10.1504/IJSOI.2019.10023003
  • A Graph-based Automatic Services Composition based on Cost Estimation Heuristic   Order a copy of this article
    by Yunsu Lee, Boonserm Kulvatunyou, Minchul Lee, Yun Peng, Nenad Ivezic 
    Abstract: Currently, software and hardware are being virtualized and offered as services on the internet. Companies have an opportunity to improve their workflow by composing these services that best suitable their requirements from both quality and cost objectives. However, as more services become available computer-aided services discovery and composition become essential. Traditional service representation and planning algorithms still have gaps to be filled, particularly related to consideration of non-functional characteristics, large number of similar operators (i.e., services), and limited number of objects (i.e., inputs and outputs per service). This paper analyzes existing works in automatic services composition, service representation and planning algorithm and proposes a new framework to fill those gaps. It proofs that the proposed framework provides an admissible heuristic based on cost estimation that guarantee a minimum cost solution, if one exists.
    Keywords: Currently; both software and hardware are being virtualized and offered as services on the internet. Companies have an opportunity to improve their workflows by composing services that best suit their quality and cost requirements. However; as more services become available; computer-aided services discovery and composition become essential. Traditional service representation and planning algorithms do not adequately address non-functional characteristics; large numbers of similar operators (i.e.; services); and limited numbers of objects (i.e.; inputs and outputs per service). This paper analyzes existing work in automatic services composition; service representation and planning algorithms and proposes a new framework to address those needs. It proves that the proposed framework provides an admissible heuristic based on cost estimations that guarantee a minimum cost solution; if one exists.

  • Artificial neural network based image encryption technique   Order a copy of this article
    by Shaimaa Fahdel 
    Abstract: Cryptography is one of the techniques of transformation of the information in safety manner. Encryption is best method to convert the data one form to another form. This converted data is in the form of cipher data which cannot be understand by a third person. The various types of encryption schemes are already available. In this review, we focus on the various encryptions, decryption techniques. This encryption and decryption scheme proposed using a chaotic neural network. The objective of this paper is that how to use artificial neural network with chaotic Cryptography. With the help of chaotic sequence we found the weights of neural network. A weights of artificial neural network are continuously updated on the basis of the generation of the key in the encryption algorithm. The MATLAB tool/software to implement the encryption algorithm were used.
    Keywords: Artificial neural network- ANN; Image processing; cryptography; Image encryption; Chaotic maps; Chaotic cryptosystems; Cipher text; Plain text.

    by S.P. Srinivasan, Deenadayalan G 
    Abstract: Abstract :Oil from Jatropha and Pongamia seeds are more appropriate in the production of bio-diesel. This bio energy replaces petro-diesel and deserves specific attention. However the warehousing and distribution of oil seeds is highly a dense task. This issue is being addressed by many supply chain models using different algorithms namely, Markov chain process, Integer Programming, Benders decomposition, etc., The above mentioned algorithms give variety of solutions in the respective systems. The proposed model recommends the method of finding the optimal distribution center(s) of Jatropha seed through optimized unilateral graphical approach with possible and necessary constraints. (Whichever applicable, and wherever needed).The supply chain process consists of four different levels of modules. This paper is focused on the initial level of process to identify the appropriate solution of distribution method using graphical approach algorithmically. The resultant solution obtained may go ahead to the next level of the module in the supply chain with network.
    Keywords: Jatropha; Graph theory; Decision support system; Supply chain; Distribution.

  • A Study on the CAPM and its Extensions in Perceptive of Pakistani Asset Management Organizations   Order a copy of this article
    by Saleha Ashfaq 
    Abstract: This paper explains about the Capital Asset Pricing Model (CAPM), its capability and its implication in the real-world data. To crave this thirst, we form this study by using the earlier CAPM approaches (Lintner, 1965 and Sharpe, 1964) that are also employed by many latest researches. Though there is a lot of literature available on the extensions of the CAPM, still there is no consensus in the literature with respect to what a reasonable proportion of risk is, and therefore, regarding what is an appropriate measure for assessing risk-adjusted performance. Along these lines, the mission for robust asset pricing models proceeds. Owed to this, we chose 5 asset managing organizations for the Pakistani stock market KSE 100 Index for the time period of 2012 to 2015. We also employed descriptive test and robust test ratio on our selected data. The finding of the research shows a significant result and suggested the good performance of assets management organizations.
    Keywords: CAPM; asset management; pakistan.