Forthcoming articles

International Journal of Web and Grid Services

International Journal of Web and Grid Services (IJWGS)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Web and Grid Services (6 papers in press)

Regular Issues

  • Voting Process with Blockchain Technology: Auditable Blockchain Voting System   Order a copy of this article
    by Aneta Poniszewska-Maranda, Micha? Pawlak, Jakub Guziur 
    Abstract: There exist many different electronic voting solutions and each has its own set of advantages and disadvantages. Most of the existing systems suffer from inadequate transparency and auditability. However, recently introduced blockchain technology may provide a solution to these problems. In this paper the Auditable Blockchain Voting System (ABVS) is presented. It combines existing voting approach and combines it with blockchain technology to create a supervised and remote internet voting system, which is transparent and audit capable. The paper describes the systems processes, components, model and results of initial testing.
    Keywords: e-voting; blockchain; e-voting system; audit; verification.

  • Real-time Disease Detection and Analysis System using Social Media Contents   Order a copy of this article
    by Ok-Ran Jeong 
    Abstract: With the growth of social media, research that makes use of social media has become active. In particular, there are many studies that try to use social media as a sensor, because social media can generate information in real time from daily life to social issues such as disasters. Social media is also being used as a sensor for infectious disease surveillance in public health. However, there are challenges like efficient processing of large amounts of social media contents in real time and detecting disease accurately. We have developed a system that collects and processes social media contents in real time, detects and analyzes disease and visualizes the results. We build a workflow that enables real-time processing by efficiently gathering and building a model that can manage data and accurately detect disease. The system also provides intuitive and useful information to people by analyzing their opinions about diseases and visualizing the detected and analyzed information in real time. We have verified the effectiveness of the system.
    Keywords: disease analysis; disease surveillance; real-time detection; social media contents.

  • Implementation and Evaluation of a Web-based Regional Culture Inheritance Support System   Order a copy of this article
    by Tomoyuki Ishida, Hengyi Li 
    Abstract: To disseminate and inherit regional culture, we have implemented a web-based regional culture inheritance support system that uses augmented reality (AR) technology based on location information. The proposed system provides its users with browsing and operating functions for digitized regional cultural content, a presentation function for this content linked with location information via a web-based geographic information system, and a superimposing function for media information using AR technology. This system offers generational inheritance of lost regional culture and information dissemination of regional culture. In addition, we implemented a simple and accessible web-based regional cultural content management system. In this study, to evaluate the effectiveness, operability, and applicability of as well as satisfaction with the proposed system, we administered a questionnaire survey to 52 subjects. High evaluations were confirmed for many items.
    Keywords: augmented reality; Web-GIS; regional culture; cultural properties; mobile application.

  • Optimal planning of RDS considering PV uncertainty with different load models using artificial intelligence techniques   Order a copy of this article
    by Zia Ullah, M.R. Elkadeem, Shaorong Wang, Syed Muhammad Abrar Akber 
    Abstract: This article presents the optimized planning of distribution system and proposes the artificial intelligence technique using hybrid optimization combined with phasor particle swarm optimization and a gravitational algorithm, called PPSO-GA for optimal planning of distribution systems considering renewable energy-based distributed generators, particularly wind and solar power, in distribution networks. The main objective is to maximize the distribution system performance by allocating the RE-DGs optimally. The proposed PPSO-GA is implemented and validated on 94-bus practical distribution system located in Portuguese considering single and multiple scenarios of RE-DGs installation along with various loading conditions. The results reveal that the optimized planning of distribution networks enhance the system reliability in term of a substantial reduction in active power loss and yearly economic loss as well as improving system voltage profile. Moreover, the convergence characteristics, computational efficiency, and applicability of the proposed artificial intelligence technique is evaluated by comparative analysis and comparison with other optimization techniques.
    Keywords: Distribution system; Photovoltaic; Distributed Generators; Distribution System Planning; Artificial Intelligence.

    by Hoang Viet Long, Tong Anh Tuan, David Taniar, Nguyen Son 
    Abstract: Web applications are progressively developing and applied in most aspects of life. However, there exist a variety of dangerous website security vulnerabilities such as SQL Injection and Cross-Site Scripting. This creates the opportunity for hackers to exploit and attack websites for commercial or political purposes or fame. Some research and commercial software have been developed for scanning and detecting those vulnerabilities. In this paper, we present an efficient algorithmic study and tool to detect web security vulnerabilities. Experimental results show that the new method is capable of detecting vulnerabilities with high accuracy. Compared to popular commercial software on the market, our tool has faster performance and can detect a number of less common vulnerabilities such as Shell Injection, or File Inclusion.
    Keywords: Web Security Vulnerabilities; SQL Injection; Cross-Site Scripting; Detection Algorithm.

Special Issue on: Security for Cloud Computing

  • Searchable Symmetric Encryption Based on the Inner Product for Cloud Storage
    by Jun Yang, Shujuan Li, Xiaodan Yan, Baihui Zhang, Baojiang Cui 
    Abstract: Searchable encryption enables the data owner to store their own data after encrypting them in the cloud. Searchable encryption also allows the client to search over the data without leaking any information about it. In this paper, we rst introduce a searchable symmetric encryption scheme based on the inner product: it is more ecient to compute the inner product of two vectors. In our construction, the parties can be Data Owners, Clients or the Cloud Server. The three parties communicate with each other through the inner product to achieve the goal that the client can search the data in the cloud without leaking any information on the data the owner stored in the cloud. We then perform a security analysis and performance evaluation, which show that our algorithm and construction are secure and ecient.
    Keywords: Searchable Encryption; Searchable Symmetric Encryption; Inner Product; the Cloud Server; Security.