Forthcoming articles

International Journal of Space-Based and Situated Computing

International Journal of Space-Based and Situated Computing (IJSSC)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Space-Based and Situated Computing (8 papers in press)

Regular Issues

  • Design and Implementation of Hiding Method for File Manipulation of Essential Services by System Call Proxy using Virtual Machine Monitor   Order a copy of this article
    by Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi 
    Abstract: Security or system management software is essential for keeping systems secure. If these essential services are stopped or disabled by attackers, damages to the system increase. Therefore, protecting essential services is crucial for preventing and mitigating attacks. To deter attacks on essential services, hiding information related to essential services is helpful. This paper describes design and implementation of a method to make files invisible to all services except their corresponding essential services and provides access methods to those files in a virtual machine (VM) environment. The proposed method consists of interposition and proxy execution of the system call function. In the proposed method, the virtual machine monitor (VMM) monitors system calls invoked in a protection target VM. If an essential process invokes system calls related to file manipulation, the VMM interposes the system call and collects information from the protection target VM. If the file is an essential file, the VMM requests proxy execution to the proxy VM on another VM. After proxy-execution of the system call, the proxy process returns the result to the VMM. Finally, the VMM returns the result and skips the execution of the original system call on the protection target VM. Thus, access to essential files by the essential service is skipped on the protection target VM, but the essential service can access the file content. With this mechanism, it is difficult for attackers to monitor access to essential files. In this paper, we describe the design, implementation, and evaluation of the proposed method.
    Keywords: Virtual Machine Monitor; File Manipulation; System Call Proxy; Essential Services.

  • Scalable Distributed Collaborative Editing for 3D Models using Conflict-Free Data Structure   Order a copy of this article
    by Kengo Imae, Naohiro Hayashibara 
    Abstract: Consistent maintenance in collaborative editing is one of the most important problems in distributed systems. rnSo many papers have proposed various approaches to this issue, but most of them are for documents, and there are a few for 3D models. rnWe propose a data structure, called ChainVoxel, and operations on it for scalable distributed collaborative editing systems for 3D models. It is based on the conflict-free replicated data type (CRDT). ChainVoxel is implemented by a chained hash table for collision resolution while editing by multiple users. It guarantees the eventual consistency for updating a shared 3D model without mutual exclusion. rnWe analyzed our prototype regarding the size of ChainVoxel and the number of operations. rnWe also conducted simulations to compare our prototype with a consensus based implementation. Our prototype shows the scalability regarding the number of messages and steps for executing operations.rn
    Keywords: Collaborative editing; 3D models; Conflict-free data structure; Scalability; Performance comparison;.

  • An analysis method for eye motion and eye blink detection from color images around ocular region   Order a copy of this article
    by Shogo Matsuno, Naoaki Itakura, Tota Mizuno 
    Abstract: This paper examines an analysis and measurement method that to aim to involve incorporating eye motion and eye blink as functions of an eye-based human-computer interface. Proposed method has been achieved by analyzing the visible-light images captured without using special equipment, in order to make the eye-controlled input interface independent of gaze-position measurement. Specifically, we propose two algorithms, one for detecting eye motion using optical flow and the other for classifying voluntary eye blinks using changes of eye aperture areas. In addition, we tried evaluating experiment both detection algorithms simultaneously assuming application to input interface. The two algorithms were examined for applicability in an eye-based input interface. As a result of experiments, real-time detection of each eye motion and eye blink could be performed with an accuracy of about 80% on average.
    Keywords: eye tracking; eye motion detection; eye blink; user interface; gesture input.

  • Mobile Relay Assisted Dynamic Clustering in Wireless Sensor Networks   Order a copy of this article
    by Nishi Gupta, Satbir Jain 
    Abstract: One of the most used networks is the Wireless Sensor Network. Such networks sense the environment and collect data when an event occurs. This data is transmitted to the base station, called the sink for analysis and decision regarding any action required. Sensor nodes sense events and forward data to the sink. This transmission is an energy consuming task and sensor networks are generally energy constraint. Hierarchical approach of using cluster heads has proven to be a good method to deal with this energy crisis and results in better performance of the network in terms of connectivity and communication. Routing algorithm chooses an optimal route from the sensor nodes to the sink for actual data delivery. This paper introduces a mobile relay node in the clustering scheme to enhance the performance of the network by maintaining the clusters and reducing the re-clustering overhead.
    Keywords: Wireless Sensor Networks; Clustering; Overhead; Relay; Connectivity; Lifetime; Energy Efficiency.

  • Study on Effective Practical Training with Multiple Large-scale Display Systems in Elementary and Secondary Education   Order a copy of this article
    by Yasuo Ebara, Hiroshi Hazama 
    Abstract: To promote ICT (Information Communication Technology) utilization in the practical training of industry subjects in elementary and secondary education, we consider that it is important to discuss the effective utilization method of large-scale display systems. In this paper, we studied on effective practical training by utilizing multiple large-scale display systems in conjunction with the interface for screen operation that was developed as part of this study. In this approach, we constructed multiple large-scale display environments using the interface for screen operation in combination with the SAGE2 (Scalable Ampli ed Group Environment). Moreover, to verify the effectiveness of this display environment, we tried the simulated practical training with a teacher using this display environment. As the results, we showed that, by combining the interface for screen operation and multiple display systems, this environment has excellent potential to facilitate effective practical training.
    Keywords: Elementary and Secondary Education; Wearable Interface; Large-scale display; Practical Training.

  • Enhancements of Minimax Access-Point Setup Optimization Approach for IEEE 802.11 WLAN   Order a copy of this article
    by Soe Lwin Kyaw, Nobuo Funabiki, Ismael Munene Kwenga 
    Abstract: As a flexible and cost-efficient Internet access network, the IEEE 802.11 wireless local-area network (WLAN) has been broadly deployed around the world. Previously, to improve the IEEE 802.11n WLAN performance, we proposed the four-step minimax access-point (AP) setup optimization approach: 1) link throughputs between the AP and hosts in the network field are measured manually, 2) the throughput estimation model is tuned using the measurement results, 3) the bottleneck host suffering the least throughput is estimated using this model, and 4) the AP setup is optimized to maximize the throughput of the bottleneck host. Unfortunately, this approach has drawbacks: 1) a lot of manual throughput measurements are necessary to tune the model, 2) the shift of the AP location is not considered, and 3) IEEE 802.11ac devices at 5 GHz are not evaluated, although they can offer faster transmissions. In this paper, we present the three enhancements: 1) the number of measurement points is reduced while keeping the model accuracy, 2) the coordinate of the AP setup is newly adopted as the optimization parameter, and 3) the AP device with IEEE 802.11ac at 5GHz is considered with slight modifications. The effectiveness is confirmed by extensive experiments in three network fields.
    Keywords: Wireless local area network; access point setup; throughput estimationrnmodel; parameter optimization; MIMO.

  • Electronic Word Of Mouth on Social Media Websites: Role of Social Capital Theory, Self-Determination Theory, and Altruism   Order a copy of this article
    by Saqib Mahmood, Muddasar Ghani Khwaja, Ahmad Jusoh 
    Abstract: Purchase decisions in recent times are extensively dependent on social media referrals. The effective utilization of social media has become compulsory for the organizations in order to remain competitive. In the emerging markets like Pakistan, promotions through electronic word of mouth on social media have incepted, but still its quite difficult for the organizations to cope-up with the contemporary electronic word of mouth needs. Nevertheless, the Pakistani social media marketing managers are unfamiliar in motivating social media users to engage in electronic word of mouth. For that reason, the current research aims to understand the social capital theory and self determination theory dimensions and altruism role in engaging customers for sharing products and services associated with word of mouth on social media websites. Structural, cognitive, and relational dimensions of social capital are manifested as tie-strength, shared language and trust respectively. Autonomy, competence, and relatedness of self-determination theory are manifested as voluntary self-disclosures, innovativeness, and trust respectively. In order to affirm literary associations among the constructs, structural equation modelling using MPlus was executed on the responses of 550 Pakistani social media users. The outcomes attained manifestly accepted the established hypotheses. Based on these findings theoretical and practical implications are produced.
    Keywords: Electronic word of mouth; social capital theory; self-determination theory; altruism; social media websites.

  • Implementation of an inbound corresponding smartphone application using markerless image processing augmented reality technology   Order a copy of this article
    by Tomoyuki Ishida, Hayato Sakamoto 
    Abstract: We have developed an inbound corresponding smartphone application based on markerless image-processing augmented reality technology for use by zoo visitors and staff. On this application, we implemented an animal quiz distribution function and an animal character hunting function. We also implemented a web system on which the administrator can update the contents handled by these functions in real time. The proposed application negates the need for newly installing multilingual guide boards for foreign zoo visitors. Moreover, the web system enables the realtime updates of the contents used in smartphone applications. Here we confirmed the operability, relevance, readability, applicability, and effectiveness of the mobile application and content management web system in a questionnaire survey of 57 zoo visitors and 14 zoo staff. The survey results of all five measures revealed an overwhelmingly positive response to our mobile application and content management web application.
    Keywords: augmented reality; markerless image processing; beacon; inbound; zoo navigation.