Forthcoming and Online First Articles

International Journal of System of Systems Engineering

International Journal of System of Systems Engineering (IJSSE)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of System of Systems Engineering (7 papers in press)

Regular Issues

  • Designing of a biometric fingerprint scanner-based, secure and low-cost electronic voting machine for India   Order a copy of this article
    by Shubhranil Chakraborty, Debabrata Bej, Dootam Roy, Sekh Arif Mahammad 
    Abstract: A reliable Electronic Voting Machine (EVM) is proposed and implemented in this study, which is integrated with a biometric fingerprint scanner to ensure a secure election process. This biometric EVM includes features such as an interactive user interface, hack-free design and master lock. The EVM system has the capability of registering user data and storing them in a database through proper authentication. Moreover, the system proposed lowers the requirement for human resources. This paper provides a detailed description of the systematic development of the hardware and software used. The software part includes algorithm development and implementation. A thorough and in-depth understanding of the data and the communication protocols along with the pathways used for storage of data in the devices is provided. Additionally, the cost of the system is 62.82% less than the officially existing EVM machines of India.
    Keywords: Electronic Voting Machine; biometric fingerprint authentication; embedded systems applications; electronic voting technology; user friendly environment; system oriented approach.
    DOI: 10.1504/IJSSE.2022.10047673
     
  • Application for data migration with complete data integrity   Order a copy of this article
    by Sven Blagaić, Marina Bagić Babac 
    Abstract: The process of data migration is used to equalise database content when it starts do differ due to database use for different purposes. It is a process that often takes some time because large quantities of data are usually migrated. However, the time that it takes the user to select migration options and the way that it is done can be reduced and simplified, respectively. This paper shows that the process of selecting migration databases, their corresponding changes, and database management in general, can be user-friendly by using the MigrationTool. Through an intuitive user interface, the MigrationTool allows the user to select the source and target environments and schemas whose content will be migrated, followed by a selection of structured query language (SQL) orders which will be applied to the target database. They are presented in a way that it is easy to see which differences exist and on which tables they could potentially be applied. This application also offers a set of additional functionalities which enable a lot of database and user management to be done directly from the application itself.
    Keywords: data integrity; database; data migration; SQL; structured query language; application.
    DOI: 10.1504/IJSSE.2022.10049781
     
  • On the Interrelationship between IoT and SoS   Order a copy of this article
    by Parisa Mahya, Hooman Tahayori, Mehrdad Tirandazian 
    Abstract: The rise and evolution of Internet on one hand and complex systems on the other hand has led to the dense and distributed network of complex systems. Emergence of new technologies like Internet of Things (IoT) and System of Systems (SoS) is the result of such widespread growth of internet and complex systems structures. The distributed network of complex systems and their interactions are necessary to solve and tackle global problems. However, there are challenges in different aspects of complex systems like security, performance, and decision making which needs further investigation. This paper studies the relationship between IoT and SoS and discusses that IoT can be considered as a subcategory of SoS. Since SoS is established to analyze and solve problems of complex and large systems and facilitates the challenges in related situations, IoT as a subcategory of SoS would benefit SoS toward a systematic growth and efficient problem solving.
    Keywords: System of Systems; Internet of Things; microgrids.
    DOI: 10.1504/IJSSE.2023.10051439
     
  • Hybrid Control Slope Assisted Wheelchair for the person with Lower Limb Disabilities for Hilly Regions   Order a copy of this article
    by Sudipta Chatterjee, Sahadev Roy 
    Abstract: This article presents a hybrid control wheelchair with a slop assistive control, especially for the inclined plane and hilly region. This device uses multiple sensor networks to locate the surrounding environment and terrain to facilitate control movement. A BLDC hub motor is used to provide forward and backward motions. A high torque servo motor is used as the steering wheel. The central control unit can also be controlled by manually, automatically, and through the Internet. The proposed wheelchair overcomes the limitation and drawbacks of uphill and downhill movements in the existing systems. The test was carried out using the prototype with an inclined 10-degree ramp, which proved that the slope assistance has a beneficial and significant impact in comparison with a manual wheelchair. It has been demonstrated that users can perform all required functions with a better control strategy, enhancing the effectiveness of traditional wheelchairs.
    Keywords: Assistive Technology; Hybrid Control Mechanism; Slope Assist Module; Raspberry Pi; Wheelchair.
    DOI: 10.1504/IJSSE.2022.10051802
     
  • Is Refactoring is a solution to resolve code smell   Order a copy of this article
    by Rajni Sehgal, Deepti Mehrotra, Renuka Nagpal 
    Abstract: In the software industry, systems are often enhanced to meet the requirements of the customer. During the evolution process, various flaws in the structure or design of the code, often known as code smells, are introduced, which might reduce the quality of the software system. Code smells can be removed by Refactoring which is one of the most important approaches for increasing the quality of a piece of software. In this study twenty projects have been taken from the public repository Github. Using the Eclipse-based tool Jdeodorant, code smells are recognised, and automated refactoring is applied to eliminate the code smells. An analysis is carried out that Refactoring can remove one code smell, but it can also introduce other code.
    Keywords: Refactoring; code smell; Github; Jdeodorant.
    DOI: 10.1504/IJSSE.2022.10051875
     
  • Web Document Summarization Using Pointwise Mutual Information (PMI) from Web Resources   Order a copy of this article
    by Atul Kumar Srivastava, Dhiraj Pandey, Alok Aggarwal, SUNIL GUPTA 
    Abstract: Nowadays, large amount of data is generated over the internet It is impossible for the humans to summarize such large chunks of bytes Therefore, to deal with such challenges, automatic text summarization systems are deployed Text Summarization is the field of data mining that highlights the relevance of important text in a document In this paper, we proposed a web-based text summarization approach that generates good quality summary based on TPMI scores of the sentences A sample document from DUC dataset is used which is pre-processed for tokenization, stop words removal and stemming operations Based on the extracted words, the TPMI is estimated by calculating the PMI of the occurrences of words on web search engine To provide evidence for the robustness of our proposed system, proposed approach is compared with the well-known text summarization techniques based on sentence length and mean score The results show that our method outperforms
    Keywords: Document Summarization; Text Summarization; Point-Wise Mutual Information (PMI).
    DOI: 10.1504/IJSSE.2022.10052261
     
  • Ten years research mine for security and privacy concerns of health information systems adoption and acceptance: Coherent taxonomy, motivations and open challenges   Order a copy of this article
    by Odai Enaizan, Ashraf Saleh, Bilal Eneizan, Mohammad Almaaitah 
    Abstract: Objectives: this survey provides a taxonomy of the privacy and security factors influencing the acceptance and adoption of Health Information Systems. Methods: We implemented a focused search for each article on (1) health information systems (2) acceptance (3) privacy or security, in six main databases. These databases are considered detailed enough to include both health systems and privacy and security literature. Results: The final set included 65 articles. Most of the articles (50.76%; 33/65) are empirical studies, refers to user perspective about privacy and security of health information systems. The next largest portion of articles (36.92%; 24/65) is reviews and surveys papers which indicate to the literature to explain the existing health information systems for privacy and security to provide a general review. The smallest and the last section of works (12.30%; 8/65) refers to proposals for frameworks or models which present the privacy and security factors.
    Keywords: privacy and security; acceptance and adoption; health information system; Taxonomy.
    DOI: 10.1504/IJSSE.2023.10052449