Elsevier Reveals More Details About Its Fake Journal Division

from the that-would-be-an-oops dept

Remember how Elsevier and Merck were caught putting out a fake journal that had articles favoring Merck drugs, implying peer reviewed articles that weren’t? Soon afterwards, it came out that Elsevier had a whole division for such things. However, following an internal investigation, it looks like Elsevier is backtracking a bit and saying that, while the group’s practices were problematic, most weren’t as egregious as the “Australasian Journal of Bone and Joint Medicine (AJBJM)” that was created by Merck and Elsevier. Instead, most of the others were sponsored by multiple companies, rather than just one. Still, the company admits that it never should have called the custom publications “journals” and is changing its publication rules — having editors from its real journals create the guidelines for any custom publication offerings. Either way, this whole episode is a serious black mark on Elsevier and the reputation of any of its journals — real or “fake.”

Filed Under: ,
Companies: elsevier, merck

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Elsevier Reveals More Details About Its Fake Journal Division”

Subscribe: RSS Leave a comment
128 Comments
CharlieM (profile) says:

Re: Re:

“They should’ve added the word “advertisement” to the top and bottom of each page, in very small print”

That doesn’t mean anything – While I am not up on all the rules (and it varies by journal and grant), but if you use grant money to pay for publication costs (anywhere from 3,000 – 10,000 (and sometimes more)), you must put a footnote on the bottom and call your submission an “Advertisement” – all because you used grant money to defer pub. costs.

The rules are more complex and cumbersome, but basically, seeing “advertisement” on the bottom really doesn’t mean anything.

My attorney is looking into this says:

Re: Two Fake Journals in Computer Science

There is nothing fake about the journals, on the contrary– the papers are quite high quality and the review process works like how ‘open source’ works for software industry. Stop posting silly claims like this or you will face law suits and/or criminal actions for defamation by posting the names of all these people and their respectable academic institutions here.

Terry says:

Re: Two Fake Journals in Computer Science

Never use a Debt card with Elsevier. If the total is 50.00 dollars they will take out 100.00 dollars and credit you later. There work is leaving the USA and going to India.
The credit department for the every day person, your account is in India along with the check you sent in.
Comments or Questions email David Hamre at D.Hamre@Elsevier.com

Petre Dini (user link) says:

FAKE JOURNAL CROP UP BEWARE -- ijcvms.org

Today I got a wonderful email read as follows:
(All those who are against scams, forward this post to related and relevant websites/blogs/forums.)

————————————————-
Dear Researcher,

We have seen your profile on researchgate.net and we pleased to request you to hold the position of Reviewer in the International Journal of Computer Vision and Multimedia.

The International Journal of Computer Vision and Multimedia is a scholarly peer-reviewed international scientific journal published monthly, focusing on theories, methods, algorithms, and applications in computer vision and multimedia. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on computer vision and multimedia.

More information can be obtained from the official website:
http://ijcvms.org

You can register using this link. Registration is free!
http://ijcvms.org/index.php/cvms/user/register
Reviewers are also requested to send their CV to editor@ijcvms.org.

Researchers holding a PhD can also apply to be part of the editorial team.

We hope to hear from you very soon.

Maria Hollingsworth
Journal Manager
————————————————–

These people are real academic criminals trying to make money out of researchers! They set up a fake journal, populate it with some people’s name and release CFP and ultimately their hands goes down to your pocket when it comes to register your papers!! They downloaded OJS which is an open source easily installed app, 10 mins configuration and they are done!

The funny thing is that this guy happen to send me the email from his gmail ac and just before that I guess he configured his GMail to use the “Send Mail As” option to make it as if the mail comes from the journal domain name host. I simply extracted the header of the mail and got the following:

————————————————–
Delivered-To: {my email add here}
Received: by 10.115.110.15 with SMTP id n15cs31538wam;
Wed, 23 Sep 2009 05:28:13 -0700 (PDT)
Return-Path:
Received-SPF: pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) client-ip=10.90.22.29;
Authentication-Results: mr.google.com; spf=pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) smtp.mail=sameer.pudaruth@gmail.com; dkim=pass header.i=sameer.pudaruth@gmail.com
Received: from mr.google.com ([10.90.22.29])
by 10.90.22.29 with SMTP id 29mr2033275agv.25.1253708891141 (num_hops = 1);
Wed, 23 Sep 2009 05:28:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=gmail.com; s=gamma;
h=domainkey-signature:mime-version:sender:received:date
:x-google-sender-auth:message-id:subject:from:content-type;
bh=kXKqJmT6tjVZwsSeZjyltB5UtzETwbSnWFi/9khmUM0=;
b=OLQZuU4e/Pfs5JBdkmj/po84qevgs6BA3Cb27yEYJfXObxZq7JT2bsp7kBz+LxmPDq
upu20DAW9SpkymLOLYFSyky41LH87YFoCqVGgD6DzbSRzqxRPTLqsLIubiR2D1Om4pOI
kInXjfa/Te6d6VWWXvfyGIFKeVSkDLXuaDcP4=
DomainKey-Signature: a=rsa-sha1; c=nofws;
d=gmail.com; s=gamma;
h=mime-version:sender:date:x-google-sender-auth:message-id:subject
:from:content-type;
b=IZ8JCGqIwAF/cgAF/6O1OFm0wth7Plm3rLxxM5WKks31dpqZyDXDaGsdJrzt/PAxpS
CGQtZvrbcpI7WbowgM4UJkWXEz5dv3+x6xkvJqbmwqzHTfNO7iPE+z9o9sgzRF8C8DWr
Xm5ScwddfBrdZDeijOzvu+9r5JlIt5biMOmSQ=
MIME-Version: 1.0
Sender: sameer.pudaruth@gmail.com
Received: by 10.90.22.29 with SMTP id 29mt2033275agv.25.1253708890810; Wed, 23
Sep 2009 05:28:10 -0700 (PDT)
Date: Wed, 23 Sep 2009 04:28:10 -0800
X-Google-Sender-Auth: 2dd18ebcc2b231bd
Message-ID:
Subject: Request for joining the International Journal of Computer Vision and
Multimedia Services as Reviewer
From: International Journal of Computer Vision and Multimedia Services
Content-Type: multipart/alternative; boundary=0016362835f01b9f1004743dd91c

–0016362835f01b9f1004743dd91c
Content-Type: text/plain; charset=ISO-8859-1
————————————————–

sameer.pudaruth@gmail.com is sending the fake emails and also violating someone else identity (thats identity theft), that of Maria Hollingsworth who claims to be the Journal Manager!

Petre Dini (user link) says:

FAKE JOURNAL CROP UP BEWARE -- ijcvms.org

Today I got a wonderful email read as follows:
(All those who are against scams, forward this post to related and relevant websites/blogs/forums.)

————————————————-
Dear Researcher,

We have seen your profile on researchgate.net and we pleased to request you to hold the position of Reviewer in the International Journal of Computer Vision and Multimedia.

The International Journal of Computer Vision and Multimedia is a scholarly peer-reviewed international scientific journal published monthly, focusing on theories, methods, algorithms, and applications in computer vision and multimedia. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on computer vision and multimedia.

More information can be obtained from the official website:
http://ijcvms.org

You can register using this link. Registration is free!
http://ijcvms.org/index.php/cvms/user/register
Reviewers are also requested to send their CV to editor@ijcvms.org.

Researchers holding a PhD can also apply to be part of the editorial team.

We hope to hear from you very soon.

Maria Hollingsworth
Journal Manager
————————————————–

These people are real academic criminals trying to make money out of researchers! They set up a fake journal, populate it with some people’s name and release CFP and ultimately their hands goes down to your pocket when it comes to register your papers!! They downloaded OJS which is an open source easily installed app, 10 mins configuration and they are done!

The funny thing is that this guy happen to send me the email from his gmail ac and just before that I guess he configured his GMail to use the “Send Mail As” option to make it as if the mail comes from the journal domain name host. I simply extracted the header of the mail and got the following:

————————————————–
Delivered-To: {my email add here}
Received: by 10.115.110.15 with SMTP id n15cs31538wam;
Wed, 23 Sep 2009 05:28:13 -0700 (PDT)
Return-Path:
Received-SPF: pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) client-ip=10.90.22.29;
Authentication-Results: mr.google.com; spf=pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) smtp.mail=sameer.pudaruth@gmail.com; dkim=pass header.i=sameer.pudaruth@gmail.com
Received: from mr.google.com ([10.90.22.29])
by 10.90.22.29 with SMTP id 29mr2033275agv.25.1253708891141 (num_hops = 1);
Wed, 23 Sep 2009 05:28:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=gmail.com; s=gamma;
h=domainkey-signature:mime-version:sender:received:date
:x-google-sender-auth:message-id:subject:from:content-type;
bh=kXKqJmT6tjVZwsSeZjyltB5UtzETwbSnWFi/9khmUM0=;
b=OLQZuU4e/Pfs5JBdkmj/po84qevgs6BA3Cb27yEYJfXObxZq7JT2bsp7kBz+LxmPDq
upu20DAW9SpkymLOLYFSyky41LH87YFoCqVGgD6DzbSRzqxRPTLqsLIubiR2D1Om4pOI
kInXjfa/Te6d6VWWXvfyGIFKeVSkDLXuaDcP4=
DomainKey-Signature: a=rsa-sha1; c=nofws;
d=gmail.com; s=gamma;
h=mime-version:sender:date:x-google-sender-auth:message-id:subject
:from:content-type;
b=IZ8JCGqIwAF/cgAF/6O1OFm0wth7Plm3rLxxM5WKks31dpqZyDXDaGsdJrzt/PAxpS
CGQtZvrbcpI7WbowgM4UJkWXEz5dv3+x6xkvJqbmwqzHTfNO7iPE+z9o9sgzRF8C8DWr
Xm5ScwddfBrdZDeijOzvu+9r5JlIt5biMOmSQ=
MIME-Version: 1.0
Sender: sameer.pudaruth@gmail.com
Received: by 10.90.22.29 with SMTP id 29mt2033275agv.25.1253708890810; Wed, 23
Sep 2009 05:28:10 -0700 (PDT)
Date: Wed, 23 Sep 2009 04:28:10 -0800
X-Google-Sender-Auth: 2dd18ebcc2b231bd
Message-ID:
Subject: Request for joining the International Journal of Computer Vision and
Multimedia Services as Reviewer
From: International Journal of Computer Vision and Multimedia Services
Content-Type: multipart/alternative; boundary=0016362835f01b9f1004743dd91c

–0016362835f01b9f1004743dd91c
Content-Type: text/plain; charset=ISO-8859-1
————————————————–

sameer.pudaruth@gmail.com is sending the fake emails and also violating someone else identity (thats identity theft), that of Maria Hollingsworth who claims to be the Journal Manager!

Anonymous Coward (user link) says:

University of Mauritius - Lecturer Sameer Padaruth

University of Mauritius

I think this lecturer, Sameer Pudaruth sameer.pudaruth@gmail.com is a lame lecturer who does not know much about computer ethics. In fact, he started a good website but the way he promoted it leads to severe criticism.

The sad part is that, all these criticisms will kill his good endeavour and discourage him to invest his time and energy in the website. He wants to host a website for education purposes and perhaps get some money with advertisements.

Anyway, he is a total nerd at dating. Who gets a girl with clichéd love letters? I should definitely teach him the skills behind dating! Duh.

There is another lecturer – Gavin Sathan – who tries to date university girls. Oh! How scornful. He always succeeds to invite to lunch the good-looking, yet stupid and lame, girls. Good for him, but this attitude is not professional. This lecturer lacks personality and integrity. He should learn from the respectable Darren (Dassen?) Sathan , or other lecturers like Pascal Grosset.

I hope this message reaches the concerned parties.

Special Offers:

June 2009 Solutions for Maths, Add Maths, Computer Studies, Chemistry and Principles of Accounts.

$2.00 each.

============================================

Examiners’ Reports available freely for all subjects on:

http://education.mu/forum

Marking Schemes available freely for some subjects on:

http://education.mu/colleges

=============================================

* All Papers and documents will be available till the 24th of September. *

=============================================

Payments can be done through Paypal. Please send your payments to sameer.pudaruth@gmail.com

Petre Dini (user link) says:

Scam: Fake Journal Publications

Beware of more unscrupulous journals with many academics getting scammed and deceit.

IJCSI Official Reviewers
http://www.ijcsi.org
• Mr. Markus Schatten, University of Zagreb, Faculty of Organization and Informatics, Croatia

• Mr. Forrest Sheng Bao, Texas Tech University, USA

• Mr. Vassilis Papataxiarhis, Department of Informatics and Telecommunications, National and Kapodistrian University of Athens, Panepistimiopolis, Ilissia, GR-15784, Athens, Greece, Greece

• Dr Modestos Stavrakis, Univarsity of the Aegean, Greece

• Dr Fadi KHALIL, LAAS — CNRS Laboratory, France

• Dr Dimitar Trajanov, Faculty of Electrical Engineering and Information technologies, ss. Cyril and Methodius Univesity – Skopje, Macedonia

• Dr Jinping Yuan, College of Information System and Management,National Univ. of Defense Tech., China

• Dr Alexis Lazanas, Ministry of Education, Greece

• Dr Stavroula Mougiakakou, University of Bern, ARTORG Center for Biomedical Engineering Research, Switzerland

• Dr DE RUNZ, CReSTIC-SIC, IUT de Reims, University of Reims, France

• Mr. Pramodkumar P. Gupta, Dept of Bioinformatics, Dr D Y Patil University, India

• Dr Alireza Fereidunian, School of ECE, University of Tehran, Iran

• Mr. Fred Viezens, Otto-Von-Guericke-University Magdeburg, Germany

• Mr. J. Caleb Goodwin, University of Texas at Houston: Health Science Center, USA

• Dr. Richard G. Bush, Lawrence Technological University, United States

• Dr. Ola Osunkoya, Information Security Architect, USA

• Mr. Kotsokostas N.Antonios, TEI Piraeus, Hellas

• Prof Steven Totosy de Zepetnek, U of Halle-Wittenberg & Purdue U & National Sun Yat-sen U, Germany, USA, Taiwan

• Mr. M Arif Siddiqui, Najran University, Saudi Arabia

• Ms. Ilknur Icke, The Graduate Center, City University of New York, USA

• Prof Miroslav Baca, Associated Professor/Faculty of Organization and Informatics/University of Zagreb, Croatia

• Dr. Elvia Ruiz Beltrán, Instituto Tecnológico de Aguascalientes, Mexico

• Mr. Moustafa Banbouk, Engineer du Telecom, UAE

• Mr. Kevin P. Monaghan, Wayne State University, Detroit, Michigan, USA

• Ms. Moira Stephens, University of Sydney, Australia

• Ms. Maryam Feily, National Advanced IPv6 Centre of Excellence (NAV6) , Universiti Sains Malaysia (USM), Malaysia

• Dr. Constantine YIALOURIS, Informatics Laboratory Agricultural University of Athens, Greece

• Mrs. Angeles Abella, U. de Montreal, Canada

• Dr. Patrizio Arrigo, CNR ISMAC, italy

• Mr. Anirban Mukhopadhyay, B.P.Poddar Institute of Management & Technology, India

• Mr. Dinesh Kumar, DAV Institute of Engineering & Technology, India

• Mr. Jorge L. Hernandez-Ardieta, INDRA SISTEMAS / University Carlos III of Madrid, Spain

• Mr. AliReza Shahrestani, University of Malaya (UM), National Advanced IPv6 Centre of Excellence (NAv6), Malaysia

• Mr. Blagoj Ristevski, Faculty of Administration and Information Systems Management – Bitola, Republic of Macedonia

• Mr. Mauricio Egidio Cantão, Department of Computer Science / University of São Paulo, Brazil

• Mr. Jules Ruis, Fractal Consultancy, The netherlands

• Mr. Mohammad Iftekhar Husain, University at Buffalo, USA

• Dr. Deepak Laxmi Narasimha, Department of Software Engineering, Faculty of Computer Science and Information Technology, University of Malaya, Malaysia

• Dr. Paola Di Maio, DMEM University of Strathclyde, UK

• Dr. Bhanu Pratap Singh, Institute of Instrumentation Engineering, Kurukshetra University Kurukshetra, India

• Mr. Sana Ullah, Inha University, South Korea

• Mr. Cornelis Pieter Pieters, Condast, The Netherlands

• Dr. Amogh Kavimandan, The MathWorks Inc., USA

• Dr. Zhinan Zhou, Samsung Telecommunications America, USA

• Mr. Alberto de Santos Sierra, Universidad Politécnica de Madrid, Spain

• Dr. Md. Atiqur Rahman Ahad, Department of Applied Physics, Electronics & Communication Engineering (APECE), University of Dhaka, Bangladesh

• Dr. Charalampos Bratsas, Lab of Medical Informatics, Medical Faculty, Aristotle University, Thessaloniki, Greece

• Ms. Alexia Dini Kounoudes, Cyprus University of Technology, Cyprus

• Mr. Anthony Gesase, University of Dar es salaam Computing Centre, Tanzania

• Dr. Jorge A. Ruiz-Vanoye, Universidad Juárez Autónoma de Tabasco, Mexico

• Dr. Alejandro Fuentes Penna, Universidad Popular Autónoma del Estado de Puebla, México

• Dr. Ocotlán Díaz-Parra, Universidad Juárez Autónoma de Tabasco, México

• Mrs. Nantia Iakovidou, Aristotle University of Thessaloniki, Greece

• Mr. Vinay Chopra, DAV Institute of Engineering & Technology, Jalandhar

• Ms. Carmen Lastres, Universidad Politécnica de Madrid – Centre for Smart Environments, Spain

• Dr. Sanja Lazarova-Molnar, United Arab Emirates University, UAE

• Mr. Srikrishna Nudurumati, Imaging & Printing Group R&D Hub, Hewlett-Packard, India

• Dr. Olivier Nocent, CReSTIC/SIC, University of Reims, France

• Mr. Burak Cizmeci, Isik University, Turkey

• Dr. Carlos Jaime Barrios Hernandez, LIG (Laboratory Of Informatics of Grenoble), France

• Mr. Md. Rabiul Islam, Rajshahi university of Engineering & Technology (RUET), Bangladesh

• Dr. LAKHOUA Mohamed Najeh, ISSAT – Laboratory of Analysis and Control of Systems, Tunisia

• Dr. Alessandro Lavacchi, Department of Chemistry – University of Firenze, Italy

• Mr. Mungwe, University of Oldenburg, Germany

• Mr. Somnath Tagore, Dr D Y Patil University, India

• Mr. Nehinbe Joshua, University of Essex, Colchester, Essex, UK

• Ms. Xueqin Wang, ATCS, USA

• Dr. Fondjo Fotou Franklin, Langston University, USA

• Mr. Haytham Mohtasseb, Department of Computing – University of Lincoln, United Kingdom

• Dr. Vishal Goyal, Department of Computer Science, Punjabi University, Patiala, India

• Mr. Thomas J. Clancy, ACM, United States

• Dr. Ahmed Nabih Zaki Rashed, Dr. in Electronic Engineering, Faculty of Electronic Engineering, menouf 32951, Electronics and Electrical Communication Engineering Department, Menoufia university, EGYPT, EGYPT

• Dr. Rushed Kanawati, LIPN, France

• Mr. Koteshwar Rao, K G Reddy College Of ENGG.&TECH,CHILKUR, RR DIST.,AP, India

• Mr. M. Nagesh Kumar, Department of Electronics and Communication, J.S.S. research foundation, Mysore University, Mysore-6, India

• Mr. Saqib Saeed, University of Siegen, Germany

• Dr. Ibrahim Noha, Grenoble Informatics Laboratory, France

• Mr. Muhammad Yasir Qadri, University of Essex, UK

• Mr. Annadurai .P, KMCPGS, Lawspet, Pondicherry, India, (Aff. Pondicherry Univeristy, India

• Mr. E Munivel , CEDTI (Govt. of India), India

• Dr. Chitra Ganesh Desai, University of Pune, India

• Mr. Syed, Analytical Services & Materials, Inc., USA

• Dr. Mashud Kabir, Department of Computer Science, University of Tuebingen, Germany

• Mrs. Payal N. Raj, Veer South Gujarat University, India

• Mrs. Priti Maheshwary, Maulana Azad National Institute of Technology, Bhopal, India

• Mr. Mahesh Goyani, S.P. University, India, India

• Mr. Vinay Verma, Defence Avionics Research Establishment, DRDO, India

• Dr. George A. Papakostas, Democritus University of Thrace, Greece

• Mr. Mohsen Toorani, Iran University of Science and Technology, Iran

• Mr. Abhijit Sanjiv Kulkarni, DARE, DRDO, India

• Mr. Kavi Kumar Khedo, University of Mauritius, Mauritius

• Dr. B. Sivaselvan, Indian Institute of Information Technology, Design & Manufacturing, Kancheepuram, IIT Madras Campus, India

• Dr. Partha Pratim Bhattacharya, Greater Kolkata College of Engineering and Management, West Bengal University of Technology, India

• Mr. Manish Maheshwari, Makhanlal C University of Journalism & Communication, India

• Dr. Siddhartha Kumar Khaitan, Iowa State University, USA

• Dr. Mandhapati Raju, General Motors Inc, USA

• Dr. M.Iqbal Saripan, Universiti Putra Malaysia, Malaysia

• Mr. Ahmad Shukri Mohd Noor, University Malaysia Terengganu, Malaysia

• Mr. Selvakuberan K, TATA Consultancy Services, India

• Dr. Smita Rajpal, Institute of Technology and Management, Gurgaon, India

• Mr. Rakesh Kachroo, Tata Consultancy Services, India

• Mr. Raman Kumar, National Institute of Technology, Jalandhar, Punjab., India

• Mr. Nitesh Sureja, S.P.University, India

• Dr. M. Emre Celebi, Louisiana State University, Shreveport, USA

• Dr. Aung Kyaw Oo, Defence Services Academy, Myanmar

• Mr. Sanjay P. Patel, Sankalchand Patel College of Engineering, Visnagar, Gujarat, India

• Dr. Pascal Fallavollita, Queens University, Canada

• Mr. Jitendra Agrawal, Rajiv Gandhi Technological University, Bhopal, MP, India

• Mr. Ismael Rafael Ponce Medellín, Cenidet (Centro Nacional de Investigación y Desarrollo Tecnológico), Mexico

• Mr. Supheakmungkol SARIN, Waseda University, Japan

• Mr. Shoukat Ullah, Govt. Post Graduate College Bannu, Pakistan

• Dr. Vivian Augustine, Telecom Zimbabwe, Zimbabwe

• Mrs. Mutalli Vatila, Offshore Business Philipines, Philipines

• Dr. Emanuele Goldoni, University of Pavia, Dept. of Electronics, TLC & Networking Lab, Italy

• Mr. Pankaj Kumar, SAMA, India

• Dr. Himanshu Aggarwal, Punjabi University,Patiala, India

• Dr. Vauvert Guillaume, Europages, France

• Prof Yee Ming Chen, Department of Industrial Engineering and Management, Yuan Ze University, Taiwan

• Dr. Constantino Malagón, Nebrija University, Spain

• Prof Kanwalvir Singh Dhindsa, B.B.S.B.Engg.College, Fatehgarh Sahib (Punjab), India

• Mr. Angkoon Phinyomark, Prince of Singkla University, Thailand

• Ms. Nital H. Mistry, Veer Narmad South Gujarat University, Surat, India

• Dr. M.R.Sumalatha, Anna University, India

• Mr. Somesh Kumar Dewangan, Disha Institute of Management and Technology, India

• Mr. Raman Maini, Punjabi University, Patiala(Punjab)-147002, India

• Dr. Abdelkader Outtagarts, Alcatel-Lucent Bell-Labs, France

• Prof Dr. Abdul Wahid, AKG Engg. College, Ghaziabad, India

• Mr. Prabu Mohandas, Anna University/Adhiyamaan College of Engineering, india

• Dr. Manish Kumar Jindal, Panjab University Regional Centre, Muktsar, India

• Prof Mydhili K Nair, M S Ramaiah Institute of Technnology, Bangalore, India

International Journal of Computer Science Issues (IJCSI)
Karan Lane, Mahebourg,
Republic of Mauritius

suma (profile) says:

Re: Scam: Fake Journal Publications

its good that you are mentioning the name of journal which is fake.But it is very ridiculous and shame for you that you are mentioning the name of reviewers of the journal,because the reviewers belongs to very reputed institutions and academic area and you don’t have the right to display their names like this without anyone permissions.

Sameerchand Pudaruth (user link) says:

Re: Scam: Fake Journal Publications

This fake comment about IJCSI has been posted by Mr Sameerchand Pudaruth of the Computer Science and Engineering Department, University of Mauritius, who has previously been reported to be a lame, unprofessional and unethical lecturer!
He can be reached at the following email addresses: sameer.pudaruth@gmail.com, sameerchand.pudaruth@gmail.com, s.pudaruth@uom.ac.mu. Website: http://cse.uom.ac.mu/node/272

Kumar says:

Re: Scam: Fake Journal Publications

It seems to me that TechDirt only moderator articles and not the comments. I have requested them several times to remove the fake comment where the list of reviewers appeared through their contact us page (http://www.techdirt.com/contact.php); however I didn’t receive any response from them!

I am sure if I contact them for advertisement purposes(http://www.techdirt.com/advertise.php) they will reply me in minutes! A real shame!

It’s good that this lame academic (Sameerchand Pudaruth)has been reported in the scientific community for his unethical act!!

Anonymouse says:

Re: Scam: Fake Journal Publications

I just went through the papers published by IJCSI. No bogus/fake paper as such has been published, instead I found some very good quality papers. So what “fake” are you claiming?
The beauty of IJCSI like other good quality open access journals is that there is no payment-barrier in accessing the papers, we don’t have to pay to access knowledge. I like this philosophy!

no-nonsense says:

Re: Scam: Fake Journal Publications

I just saw this post and frankly I was shocked about how could someone do such thing!

I am from the US and yes my name is listed up there and I am a reviewer of IJCSI for the past 3 months. I have reviewed 5 papers until now out of which I recommend 2 to be accepted (with minor revisions) and rejected the rest.

I noticed that the papers that I recommended have been published and the remaining 3 were not, probably the 2nd reviewers feedback were almost same as mine. The journal even mail me back revised versions of the papers to be further check if the minor changes have been respected some days prior to their publications.

Before making such comment, become a reviewer and get involve, and see how things work!

For me definitely, you are a narrow-minded person and an amateur in the scientific publishing community!

susan says:

ridiculous

Its ridiculous and shame that you are giving the name of reputed journal and not only the name of journal but also the name of reputed reviewers who work for the journal.And it is shame for techdirt also that they are allowing such type of nuisance published in their site and they are not taking proper consideration what to be published or not.really they are proving their name that techdirt is a dirt for technology and others too.This type of websites and peoples associated with techdirt has to be closed down and punished for their activities and publishings that they are allowing the anonymous persons to write anything in their blogs.

anonymouse says:

stupid and unethical action

I just went through the papers published by IJCSI. No bogus/fake paper as such has been published, instead I found some very good quality papers. So what “fake” are you claiming?
The beauty of IJCSI like other good quality open access journals is that there is no payment-barrier in accessing the papers, we don’t have to pay to access knowledge. I like this philosophy!

maybe says:

Scam: Fake Journal Publications

I am one of the reviewer in IJCSI (and yes, listed up there too). I was looking for my own name in google and found this forum.

Based on my involvement with IJCSI (so far), they have been following the normal/standard way of publishing papers. The papers are properly reviewed and we can get to reject the papers too. Therefore, I dont quite understand what is the issue here. Of course, the journal is not an impact factor journal, but at least it is a peer reviewed journal, and properly being reviewed, unlike a few bogus journals that I knew.

I think, before making such comments, you should try to involve with them (try to submit papers, or volunteer to become the reviewers), then only you will know if the journal is good or not.

So, I’m thinking either you are an anti-open access journal person, or you are still young in the research world.

no-nonsense says:

no-nonsense

I just saw this post and frankly I was shocked about how could someone do such thing!

I am from the US and yes my name is listed up there and I am a reviewer of IJCSI for the past 3 months. I have reviewed 5 papers until now out of which I recommend 2 to be accepted (with minor revisions) and rejected the rest.

I noticed that the papers that I recommended have been published and the remaining 3 were not, probably the 2nd reviewers feedback were almost same as mine. The journal even mail me back revised versions of the papers to be further check if the minor changes have been respected some days prior to their publications.

Before making such comment, become a reviewer and get involve, and see how things work!

For me definitely, you are a narrow-minded person and an amateur in the scientific publishing community!

Anonymous Coward says:

I don't see anything fake about the journals

I was asked to be a reviewer and I accepted–I have not been asked to review any papers yet, but I did take a look at the papers they published so far, and they do not look fake to me at all. On the contrary, some of the papers look very high quality. I do not appreciate the fact that someone posted my name here as if I was doing ‘fake science’.

Having said that, It seems like the reviewing mechanism works well. I think it might even be beneficial to have a review mechanism like this because I personally think that most of the ‘professional communities’ are so narrow minded that they do not want to accept any work that does not follow their way of thinking even though it might have sound ideas and methodologies.

rita ann says:

its a shameless act

Iam the reviewer of this journal and my name is listed there .It is my request to all the reviewers of this journal to launch a case or report the act so that the moderators of this tech dirt will take a very serious action in future to not publish this type of comments where the name of reputed persons are mentioned.I had written to them so many times to delete this comment from the board but they refuse to do that so I think if we will together take some action then in future no one will do this type of act again.Its a very serious matter to the reputation of all of us because I didn’t find anything fake about this jouranl .I had reviewed 4 papers also.

Dr. Alexis Lazanas says:

Who is in charge in this site?

I was informed that my name is listed in the “fake” IJCSI reviewers list. Please give me the name and the home address of the site’s owner so that I can press charges. This has to end now!
I reviewed 5 papers and rejected the 4 of them, what do you mean by “fake”? What in hell are you people doing here? Tell me the admin’s name. This behavior is against any ethics in science!

Dr. Alexis Lazanas
University of Patras, Greece

Michael Masnick (user link) says:

Admin and Owner of TechDirt

This website (TechDirt) is managed by Floor64 a company based somewhere in the US. They did not give their physical mailing address (http://www.floor64.com).

The owner is Mr Michael Masnick. He provides a telephone number on the contact us page (http://www.techdirt.com/contact.php) which is 1-888-930-9272, but you can call them 1000 times, you will never reach someone on the other end!

joseph says:

its a shameless activity

it is a very shameless thing that techdirt has no proper authenticated person who is ready to take the responsibility and have proper mailing address.if anyone find this, please give it on this site I will take very serious action on them because Iam a LAW person and I know how to handle this kind of activity and how to stop this kind of nuisance activities done in the site where name of reputed personnals are displaying.I think this techdirt personnels don’t know that our laws are not that much week that they will allow anything to be display on the site without any proper moderations.They will definetely face a very big problem on displaying and allowing to dispaly this kind of messages.

Stephen says:

Re: its a shameless activity

Hello Joseph,

Hope the following will help you.

TechDirt is managed by a company known as Floor64…(don’t know whether if it really exist or registered!)

On this link: http://www.floor64.com/team.php you will find all the persons responsible for the company Floor64.

Furthermore, one member of this company, Dennis Yang, got a link to his blog (http://www.dennisyang.com/). His email add is me@dennisyang.com and his FaceBook profile is http://www.facebook.com/profile.php?id=421383.

Michael Masnick (the CEO of Floor64) website: http://www.masnick.com/

Michael Ho (the Executive Director of Floor64) website:
http://www.mikeho.com/

Some links:
http://www.flickr.com/photos/dennis/sets/72157622388688211/
http://www.dennisyang.com/albums/

Journal Editor says:

Good Journals

It’s a shame about the language being used on this website. All these journal are good ones. These people are working hard to earn some money and earn a living, and feed their families. So let them do their work. Thanx

http://sites.google.com/site/ijcitcfp/

http://sites.google.com/site/pennsylvaniajournal/

http://sites.google.com/site/journalofcomputing/

https://sites.google.com/site/ijcsorg/home

http://www.ijcns.org/

http://www.enggjournals.com/ijcse/

http://sites.google.com/site/ijcsijournal/

http://sites.google.com/site/journaloftelecommunic (user link) says:

FAKE JOURNAL and BIG SCAM

FAKE JOURNAL and BIG SCAM!!!

It is sad to see lots of fake and abusive journals cropping up everyday!! No paper is ever reviewed, all they want is your MONEY!! BEWARE!!! Spread the NEWS!!!

Journal of Telecommunications

http://sites.google.com/site/journaloftelecommunications/

Managing Editor
Journal Of Telecommunications
Maxwell Building
96-98, Uxbridge Road
Ealing
London
W5 5TH
Uk

Tel: +442088414479
+447833581168

email: editor.telecommunications@googlemail.com

http://sites.google.com/site/journaloftelecommunications/

http://sites.google.com/site/journaloftelecommunic (user link) says:

SCAM JOURNAL - http://sites.google.com/site/journaloftelecommunications/

They accept ANYTHING you send them!! Want proof, try to send them some scigen paper and wait and watch! Funny!!

Name of Account: Chandramah Appadoo
Bank Name: National Westminster Bank
IBAN: GB90NWBK60193932123191
Swift Code: NWBKGB2L
Sort Code: 60-19-39
Bank Address: Southall Branch, 69 The broadway, Southall, Middlessex, UB1 1LD,UK

Journal of Telecommunications (ISSN 2042-8839)
http://sites.google.com/site/journaloftelecommunications/

Members of Editorial Board

Dr. Francisco Barceló-Arroyo
Associate Professor
Department of Telematic Engineering
Universitat Politecnica de Catalunya (UPC)

Dr. Boris S. Verkhovsky
Professor
Department of Computer Science
New Jersey Institute of Technology

Dr. Jasvir Singh Kang
Dean
Faculty of Engineering & Technology

Professor
Department of Electronics Technology
Guru Nanak Dev University

Dr. Nirmalendu Bikas Sinha
Professor
Department of ECE and EIE
College of Engineering & Management
K.T.P.P Township

Dr. Farid Nait-Abdesselam
Associate Professor
Department of Computer Science – LIFL
University of Lille, France

Dr. Jaime Lloret Mauri
Associate Professor
Department of Communications
Polytechnic University of Valencia, Spain

Dr. Sattar B. Sadkhan
Professor
Deputy Dean of Computer Techniques College
University of Babylon – P.O.Box: Hilla-4: IRAQ
Chairman of IEEE IRAQ Section

Dr. Ali Abbas Ali
Professor
Department of Electrical & Electronic Engineering
University of AI-ISRA, JORDAN

Dr. Kasim Mousa Alwan AL-AUBIDY
Professor
Dean, Faculty of Engineering
Philadelphia University, JORDAN

Mat (user link) says:

Bad products

Never use a debt card with this company. If you are going to buy 25.00 on a debt card Elsevier will take 50.00 dollars. and credit you later.
Most of there work is now in India. Email. David Hamre at D.Hamre@Elsevier.com to get feed back on your questions.
Tech support 800 401 9062 ask for Bob the manager if you can not get the support you need. The International department communication by English and Spanish, this department does not have a Spanish speaking manager who is Phylis Trice. p.trice@Elsevier.com
For your comments.

http://sites.google.com/site/journaloftelecommunic (user link) says:

LIST OF UNREFEREED PAPERS!!! (THERE HAS BEEN NO REVIEW AT ALL!!)

SCAM AND FAKE JOURNAL – JOURNAL OF TELECOMMUNICATIONS
http://sites.google.com/site/journaloftelecommunications/volume-4-issue-2-september-2010-1

ISSN 2042-8839
editor.telecommunications@googlemail.com
secretary.telecommunications@gmail.com

Volume 4, Issue 2, September 2010
Performance Diversity Techniques for Wireless Communication System

Mohammed Aboud Kadhim, School of Electrical and Electronics Engineering, Universiti Sains Malaysia
Dr Widad Ismail, School of Electrical and Electronics Engineering, Universiti Sains Malaysia

————————————————
Wideband Non Linear 3 dB Hybrid Coupler for X-Band Switched Beam Antenna

Y.K. Ningsih, Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia
M. Asvial, Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia
E,T. Rahardjo, Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia

———————————————

Performance Transmit and Receive Diversity Techniques for Different Modulation Signal

Mohammed Aboud Kadhim, School of Electrical and Electronics Engineering, Universiti Sains Malaysia
Dr Widad Ismail, School of Electrical and Electronics Engineering, Universiti Sains Malaysia
———————————————

The Future Aspects of Wireless Electricity Transmission

Md. Imran Hossain, Department of Electronics and Telecommunication Engineering, Daffodil International University, Dhaka, Bangladesh
Mohammad Shahidul Islam, Department of Electronics and Telecommunication Engineering, Daffodil International University, Dhaka, Bangladesh

scam journal of telecommunications says:

Re: Re: Re:

This journal is a scam! The owner of the site is just making money of your pocket. Send him a scigen paper and see! Did you ever receive a review result? What is the quality of the review? There is no review idiot, keep wasting your money 😛
Publication in this journal has NO VALUE, the scientific community is already aware of this scam journal.

http://www.medwelljournals.com/journal.php, Oct 8t says:

FAKE JOURNALS and BIG SCAM

They accept ANYTHING you send them!! Want proof, try to send them some scigen paper and wait and watch! Funny!!

List of Journals (alphabetically)
Agricultural Journal
Asian Journal of Information Technology
Botany Research Journal
Environmental Research Journal
International Business Management
International Journal of Electrical and Power Engineering
International Journal of Molecular Medicine and Advance Sciences
International Journal of Soft Computing
International Journal of Systems Signal Control and Engineering Application
International Journal of Tropical Medicine
Journal of Animal and Veterinary Advances
Journal of Aquaculture Feed Science and Nutrition
Journal of Economics Theory
Journal of Engineering and Applied Sciences
Journal of Fisheries International
Journal of Food Technology
Journal of Mobile Communication
Journal of Modern Mathematics and Statistics
Journal of Molecular Genetics
Online Journal of Earth Sciences
Pakistan Journal of Social Sciences
Plant Sciences Research
Research Journal of Agronomy
Research Journal of Animal Sciences
Research Journal of Applied Sciences
Research Journal of Biological Sciences
Research Journal of Dairy Sciences
Research Journal of Medical Sciences
Research Journal of Pharmacology
Research Journal of Poultry Sciences
Research Journal of Soil and Water Management
Surgery Journal
The Cardiology
The Social Sciences
Veterinary Research

Journal of Telecommunications Fake Journal (user link) says:

They accept ANYTHING you send them!! Want proof, try to send them some scigen paper and wait and watch! Funny!!

Name of Account: Chandramah Appadoo
Bank Name: National Westminster Bank
IBAN: GB90NWBK60193932123191
Swift Code: NWBKGB2L
Sort Code: 60-19-39
Bank Address: Southall Branch, 69 The broadway, Southall, Middlessex, UB1 1LD,UK

Journal of Telecommunications (ISSN 2042-8839)
http://sites.google.com/site/journaloftelecommunications/

Members of Editorial Board

Dr. Francisco Barceló-Arroyo
Associate Professor
Department of Telematic Engineering
Universitat Politecnica de Catalunya (UPC)

Dr. Boris S. Verkhovsky
Professor
Department of Computer Science
New Jersey Institute of Technology

Dr. Jasvir Singh Kang
Dean
Faculty of Engineering & Technology

Professor
Department of Electronics Technology
Guru Nanak Dev University

Dr. Nirmalendu Bikas Sinha
Professor
Department of ECE and EIE
College of Engineering & Management
K.T.P.P Township

Dr. Farid Nait-Abdesselam
Associate Professor
Department of Computer Science – LIFL
University of Lille, France

Dr. Jaime Lloret Mauri
Associate Professor
Department of Communications
Polytechnic University of Valencia, Spain

Dr. Sattar B. Sadkhan
Professor
Deputy Dean of Computer Techniques College
University of Babylon – P.O.Box: Hilla-4: IRAQ
Chairman of IEEE IRAQ Section

Dr. Ali Abbas Ali
Professor
Department of Electrical & Electronic Engineering
University of AI-ISRA, JORDAN

Dr. Kasim Mousa Alwan AL-AUBIDY
Professor
Dean, Faculty of Engineering
Philadelphia University, JORDAN

Journal of Telecommunications (user link) says:

Fake Journal - Please us money and publish your poor quality paper

They accept ANYTHING you send them!! Want proof, try to send them some scigen paper and wait and watch! Funny!!

Name of Account: Chandramah Appadoo
Bank Name: National Westminster Bank
IBAN: GB90NWBK60193932123191
Swift Code: NWBKGB2L
Sort Code: 60-19-39
Bank Address: Southall Branch, 69 The broadway, Southall, Middlessex, UB1 1LD,UK

Journal of Telecommunications (ISSN 2042-8839)
http://sites.google.com/site/journaloftelecommunications/

Members of Editorial Board

Dr. L Milner
Chief Editor – Journal of Telecommunications
United Kingdom

Dr. Francisco Barceló-Arroyo
Associate Professor
Department of Telematic Engineering
Universitat Politecnica de Catalunya (UPC)

Dr. Boris S. Verkhovsky
Professor
Department of Computer Science
New Jersey Institute of Technology

Dr. Jasvir Singh Kang
Dean
Faculty of Engineering & Technology

Professor
Department of Electronics Technology
Guru Nanak Dev University

Dr. Nirmalendu Bikas Sinha
Professor
Department of ECE and EIE
College of Engineering & Management
K.T.P.P Township

Dr. Jaime Lloret Mauri
Associate Professor
Department of Communications
Polytechnic University of Valencia, Spain

Dr. Sattar B. Sadkhan
Professor
Deputy Dean of Computer Techniques College
University of Babylon – P.O.Box: Hilla-4: IRAQ
Chairman of IEEE IRAQ Section

Dr. Ali Abbas Ali
Professor
Department of Electrical & Electronic Engineering
University of AI-ISRA, JORDAN

Dr. Kasim Mousa Alwan AL-AUBIDY
Professor
Dean, Faculty of Engineering
Philadelphia University, JORDAN

Fawwaz Jinan Jibrael Jabri
Department of Electrical and Electronic Engineering
University of Technology, Iraq

Dr. Chakresh Kumar
Assistant Professor
Department of Electronics and Communications Engineering
Manav Rachna Internationa University, Faridabad, India

Journal of Telecommunications (user link) says:

List of unrefereed papers

Performance Diversity Techniques for Wireless Communication System [Full Text]

Mohammed Aboud Kadhim, School of Electrical and Electronics Engineering, Universiti Sains Malaysia
Dr Widad Ismail, School of Electrical and Electronics Engineering, Universiti Sains Malaysia

Abstract—Diversity is an influential communication receiver technique that provides wireless link enhancement at a relatively low cost. Diversity techniques are used in wireless communications systems to principally to develop performance over a fading radio channel. In such a system, the receiver is provided with multiple copies of the same information signal which are transmitted over two or more real or practical communication channels. Thus the basic idea of diversity is repetition or redundancy of information. The demands for greater capacity and lower transmitted power have historically motivated research .in this paper describe the different receive diversity and compare between them in BPSK modulation and Rayleigh fading channel.

———————————————————————————————————————————————————————————————

Wideband Non Linear 3 dB Hybrid Coupler for X-Band Switched Beam Antenna [Full Text]

Y.K. Ningsih, Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia
M. Asvial, Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia
E,T. Rahardjo, Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia

Abstract— This paper presents a new wideband 3 dB hybrid coupler for X-band. The proposed wideband 3 dB hybrid coupler has been designed by using non linear arm with exponential impedance taper to achieve a good performance. The proposed hybrid coupler achieved an impedance bandwidth over 22% with coupling coefficient -3.3 dB, isolation coefficient of below -25 dB and reflection coefficient of below -20 dB. The result shows a good performance. To implement the new hybrid coupler, a switched beam antenna is designed. The propose antenna can produce two radiation patterns that can be changed to different beam for reduce the existing interference. Switched beam antenna using a non linear 3 dB hybrid coupler has been design and realization in a single layer substrate, that it has a wideband characteristic. The simulation and measurement results show that the antenna can generate two beams at 20° and 330° with a beamwidth of around 40° at 9 GHz. The return loss of the switched beam antenna can be achieved below -18 dB over a 20% bandwidth with a center frequency at 9 GHz.

———————————————————————————————————————————————————————————————

Performance Transmit and Receive Diversity Techniques for Different Modulation Signal [Full Text]

Mohammed Aboud Kadhim, School of Electrical and Electronics Engineering, Universiti Sains Malaysia
Dr Widad Ismail, School of Electrical and Electronics Engineering, Universiti Sains Malaysia

Abstract—the use of multiple communication paths or channels to achieve efficiency and error protection. The main types of diversity used in communications system one is transmit diversity and the other is receive diversity to exploit multipath effect. Diversity is usually between two antennas and each antenna has one channel. One antenna is at the base station and the other is at the service station. The base stations keeps record of the transmission and receive signal information with each channel. However, there can be many antennas at the base station and the service station. In this paper we have simulated the system by using Transmit Diversity (Space Time Coding) and Receiver Diversity (Maximum Ratio Combining) techniques. Based on the mathematical calculations for different modulation signals.

———————————————————————————————————————————————————————————————

The Future Aspects of Wireless Electricity Transmission [Full Text]

Md. Imran Hossain, Department of Electronics and Telecommunication Engineering, Daffodil International University, Dhaka, Bangladesh
Mohammad Shahidul Islam, Department of Electronics and Telecommunication Engineering, Daffodil International University, Dhaka, Bangladesh

Abstract- This paper refers to that electricity transmission without using wire. To implement this concept, Medium is very essential because electricity means flow of electron from one place to another. In the case of transmission there are some parameters which have to consider such as transmitter, receiver, medium or channel. So when we will be gone to think about wireless electricity transmission we have to consider these terms. Process of transmission, occurring noise during transmission has discussed in this paper. Actually, Wireless electricity is not available in the world now. If it is implemented, real world will change dynamically, but there are many problems behind it. To develop this think, System will be more costly than wired transmission and also biological impact is a major fact. Why can’t electricity be wireless? Here some reasons are showed. However, if all obstacles are overcome, will the electricity transmission be wireless? Yes, it is possible. We want to show that how it can be implemented? So potentially, it is possible but there are probably many challenges ahead. Today, it is still not viable but we never can tell, technology has always done the impossible.

Journal of Telecommunications (user link) says:

Fake Publications - No Review Done - October 2010

Characteristics of FH Pattern Likelihood Ratio Decision Method against CW Jamming or/and Burst Noise

Shin’ichi Tachikawa Nagaoka, National College of Technology, Nagaoka,Niigata, 940-2188, Japan
Kenji Kobayashi Nagaoka, National College of Technology, Nagaoka, Niigata, 940-2188, Japan

Abstract— This paper proposes an improved method of a lump likelihood ratio calculation in detection of frequency hopping (FH) pattern of multilevel FSK (MFSK). In a conventional lump likelihood ratio calculation, it is calculated by employing probability density function of AWGN and signal gain of each frequency slot. In this paper, a new calculation method employing a probability density function including CW jamming or/and burst noise is proposed. Theoretical analysis of the lump likelihood ratio and estimation methods of CW jamming and burst noise are derived. Then, by computer simulations, it is shown that BER of the proposed method is superior to that of the conventional method for several conditions.

———————————————————————————————————————————————————————————————

Analysis of Selected Mapping and Partial Transmit Sequence for PAPR Reduction

Anil Singh Rathore, Departement of Electronics and Communication Engineering, BBDNITM, G.B. Technical University, Lucknow, India
Dr. Neelam Srivastava, Departement of Electronics Engineering, IET, G.B. Technical University, Lucknow, India

Abstract: – Two powerful and distortion less peak power reduction schemes for Orthogonal Frequency Division Multi-plexing (OFDM) are compared. One investigated technique is selected mapping (SLM) where the actual transmit signal is selected from a set of signals and the second scheme utilizes phase rotated partial transmit Sequences (PTS) to construct the transmit signal. Both approaches are very flexible as they do not impose any restriction on the modulation applied in the subcarriers or on their number. They both introduce some additional system complexity but nearly vanishing redundancy to achieve markedly improved statistics of the multicarrier transmit signal. The schemes are compared by simulation results with respect to the required system complexity and transmit signal redundancy.

———————————————————————————————————————————————————————————————

Effects of Imperfect Power Control and Sectorization on the Capacity of Multiclass CDMA System with Beamforming

Gunawan Wibisono, Department of Electrical Engineering, Faculty of Engineering University of Indonesia, Kampus Baru UI Depok 16424, Indonesia
Lina Oktaviana Sari, Department of Electrical Engineering. JakartaState Politechnic, Kampus PNJ Depok 16424, Indonesia

Abstract—Communications systems based on code division multiple access (CDMA) are growing fast this day. To support third generation technology (3G), CDMA has been expected to fulfill requirements of audio, data, and video services with higher system capacity. Audio, data and video services in CDMA systems can be viewed as multiclass CDMA system. In practice, the capacity of CDMA is limited by interferences, so that any reduction of the interference will directly cause capacity increases. Methods, such as sectorization and power control could reduce the interference. In this research, the impact of imperfect power control and imperfect sectorization to reverse-link user capacity of CDMA system based on signal to interference ratio ( SIR ) by using beamforming at mobile station (MS) transmitter and base station (BS) receiver will be analysed. It is shown from the results that the capacity of multiclass CDMA system decreases caused by the imperfect power control and imperfect sectorization. The system with sectorization using beamforming has large capacity of multiclass system than the system using beamforming without sectorization. The total addition of antenna beamforming elements at BS receiver and MS transmitter not always has large capacity of multiclass system, however depend on distribution of antenna beamforming elements at BS receiver and MS transmitter. The system with sectorization using beamforming has large capacity of multiclass system than the system with sectorization without beamforming. Optimum capacity of multiclass system achieved, when beamforming has even number of receive antenna elements Kr.

———————————————————————————————————————————————————————————————

Modal analysis and dispersion curve of unconventional Bragg waveguide

Y.K.Prajapati, Bundelkhand Institute of Engineerng and Technology, Jhansi, India
Vivek Singh, Department of Physics, Banaras University, Varanasi, India
J.P. Saini, Bundelkhand Institute of Engineerng and Technology, Jhansi, India

Abstract— In a previous paper we develop a transfer matrix theory that applies to any unconventional symmetric fiber surrounded by Bragg cladding. Using this formalism, along with Galerkin method, we study the waveguide dispersion for the m = 0 mode in an air-core super elliptical Bragg fiber and showed it is agrees well with the transfer matrix method. Computed results are shown in the form of dispersion curves and are compared with standard step index fiber. The Galerkin method is conceptually simple and requires only an eigenvalue solver without the need of special functions.

———————————————————————————————————————————————————————————————

Prediction of Vehicle Classification And Channel Modelling For Intelligent Transportation

Nirmalendu Bikas Sinha, College of Engineering & Management, Kolaghat, K.T.P.P Township, Purba-Medinipur, W.B, 721171, India
D.Mondal, Future Institute of Engineering & Management, Sonarpur, W.B, India
M.Mitra, Bengal Engineering and Science University, Shibpur, Howrah, W.B, India
R.Bera, Sikkim Manipal University, Majitar, Rangpo, East-Sikkim, India.

Abstract— A new test method of sufficient flexibility is developed to describe most pulse Doppler radar search systems which can be used to predict the classification of the target. The object of this section is to predict the detection capability of a pulse Doppler radar where the Doppler filter bandwidth is much wider than the bandwidth of each spectral line in the received signal. This method can easily classify various targets. Finally authors developed new channel modelling technique for the best utilization in intelligent transportation.

———————————————————————————————————————————————————————————————

Traffic Analysis of Wireless IP Networks

Mohammad Shahidul Islam, Electronic and Telecommunication Department, Faculty of Science and Information Technology, Daffodil International University, Sukrabad, Dhaka, Bangladesh.

Abstract— Wireless networks have crossed almost five billion subscribers worldwide with first, second and third generation mobile networks. The main service was voice and more recently modem-based low-rate and high rate data services. Because of the voice oriented traffic and circuit-switching technology, these networks are dimensioned and designed using the traditional traffic theory in telecommunications. Their design is based on high-cost centralized switching and signaling equipment and base stations as wireless access points. Another technology dominated the world in the wired communication networks is IP technology. The transparency of the Internet Protocol (IP) to all traffic types and low-cost switching equipment made it very attractive to operators and customers. The 3G of mobile networks introduces wide spectrum and high data rates as well as different types of circuit-switched and packet-based services. It provides IP connectivity besides the circuit switching. Future generation mobile systems are expected to include heterogeneous access technologies, such as wireless LAN and 3G, as well as end-to-end IP connectivity. The different type of traffic services and access technologies creates new possibilities for both operators and users. On the other hand, it raises new traffic and design issues. This paper provides traffic analysis and quality of service (QoS) of wireless IP networks with multiple traffic classes.

Link: http://sites.google.com/site/journaloftelecommunications

SEND YOUR MONEY AND GET PUBLISH, THOUGH IT HAS NO VALUE:
Name of Account: Chandramah Appadoo
Bank Name: National Westminster Bank
IBAN: GB90NWBK60193932123191
Swift Code: NWBKGB2L
Sort Code: 60-19-39
Bank Address: Southall Branch, 69 The broadway, Southall, Middlessex, UB1 1LD,UK

Journal of Telecommunications (ISSN 2042-8839)
http://sites.google.com/site/journaloftelecommunications/

Dr.Lee says:

ETRI big false and scam journal

This is a journal and Hmiy Zataivp and publishing for a price to pay Elmejrrin an interview published research and anti-false and attributed to people Akharrin this magazine is not credible
Papers

A Low-Complexity Planar Antenna Array for Wireless Communication Applications: Robust Source Localization in Impulsive Noise
Moon-Sik Lee, ETRI Journal, vol.32, no.6, Dec. 2010, pp.837-842.
DOI:10.4218/etrij.10.0109.0748

Statistical Analysis of a Subjective QoE Assessment for VVoIP Applications
Maria-Dolores Cano, Fernando Cerdan, and Sergio Almagro, ETRI Journal, vol.32, no.6, Dec. 2010, pp.843-853.
DOI:10.4218/etrij.10.0109.0645

Measurement Scheme for One-Way Delay Variation with Detection and Removal of Clock Skew
Makoto Aoki, Eiji Oki, and Roberto Rojas-Cessa, ETRI Journal, vol.32, no.6, Dec. 2010, pp.854-862.
DOI:10.4218/etrij.10.0109.0611

Reducing Channel Capacity for Scalable Video Coding in a Distributed Network
Hyunpil Kim, Sukhan Lee, Junghee Lee, and Yongsurk Lee, ETRI Journal, vol.32, no.6, Dec. 2010, pp.863-870.
DOI:10.4218/etrij.10.0110.0033

Concentric Circle-Based Image Signature for Near-Duplicate Detection in Large Databases
Ayoung Cho, Won-Keun Yang, Weon-Geun Oh, and Dong-Seok Jeong, ETRI Journal, vol.32, no.6, Dec. 2010, pp.871-880.
DOI:10.4218/etrij.10.0109.0623

Fast and Efficient Method for Fire Detection Using Image Processing
Turgay Celik, ETRI Journal, vol.32, no.6, Dec. 2010, pp.881-890.
DOI:10.4218/etrij.10.0109.0695

New Map-Matching Algorithm Using Virtual Track for Pedestrian Dead Reckoning
Seung Hyuck Shin, Chan Gook Park, and Sangon Choi, ETRI Journal, vol.32, no.6, Dec. 2010, pp.891-900.
DOI:10.4218/etrij.10.0110.0037

Preclinical Prototype Development of a Microwave Tomography System for Breast Cancer Detection
Seong-Ho Son, Nikolai Simonov, Hyuk-Je Kim, Jong-Moon Lee, and Soon-Ik Jeon, ETRI Journal, vol.32, no.6, Dec. 2010, pp.901-910.
DOI:10.4218/etrij.10.0109.0626

A Design Method of Hybrid Analog/Asymmetrical-FIR Pulse-Shaping Filters with an Eye-Opening Control Option against Receiver Timing Jitter
Chia-Yu Yao, ETRI Journal, vol.32, no.6, Dec. 2010, pp.911-920.
DOI:10.4218/etrij.10.0109.0725

Interference Suppression Using Principal Subspace Modification in Multichannel Wiener Filter and Its Application to Speech Recognition
Gibak Kim, ETRI Journal, vol.32, no.6, Dec. 2010, pp.921-931.
DOI:10.4218/etrij.10.0110.0045

Optimized Local Relocation for VLSI Circuit Modification Using Mean-Field Annealing
Gholam Reza Karimi, Ahmad Azizi Verki, and Sattar Mirzakuchaki, ETRI Journal, vol.32, no.6, Dec. 2010, pp.932-939.
DOI:10.4218/etrij.10.0109.0533

Rack-Level DC Power Solution for Volume Servers
Won-Ok Kwon, Hae-Moon Seo, and Pyung Choi, ETRI Journal, vol.32, no.6, Dec. 2010, pp.940-949.
DOI:10.4218/etrij.10.1510.0060

Secure Face Authentication Framework in Open Networks
Yongjin Lee, Yongki Lee, Yunsu Chung, and Kiyoung Moon, ETRI Journal, vol.32, no.6, Dec. 2010, pp.950-960.
DOI:10.4218/etrij.10.1510.0103

Letters

Efficient Multiplexing Scheme of Stereoscopic Video Sequences for Digital Broadcasting Services
Kugjin Yun, Kyuheon Kim, Namho Hur, Soo In Lee, and Gwang Hoon Park, ETRI Journal, vol.32, no.6, Dec. 2010, pp.961-964.
DOI:10.4218/etrij.10.0210.0138

On the Distribution Functions of Ratios Involving Gaussian Random Variables
Seungkeun Park, ETRI Journal, vol.32, no.6, Dec. 2010, pp.965-968.
DOI:10.4218/etrij.10.0210.0201

Chip Impedance Evaluation Method for UHF RFID Transponder ICs over Absorbed Input Power
Jeenmo Yang, and Junho Yeo, ETRI Journal, vol.32, no.6, Dec. 2010, pp.969-971.
DOI:10.4218/etrij.10.0210.0208

Lossy Source Compression of Non-Uniform Binary Source via Reinforced Belief Propagation over GQ-LDGM Codes
Jianping Zheng, Baoming Bai, and Ying Li, ETRI Journal, vol.32, no.6, Dec. 2010, pp.972-975.
DOI:10.4218/etrij.10.0210.0204

Dr. Markus says:

journals sexy

Let the science and its problems and discuss the issue of journals sexy that displays photos of body and pussy women because these images in some of these journals are published previously in issue for other journals, as I advise to be monitoring this business and also must contain any number of publication of these magazines on CD displays movies pornography and sexual intercourse Neighborhood of the women who offered their bodies and pussy in the pictures to be great fun

computer and communication journal very big Fake J says:

http://www.elsevier.com/wps/find/journaldescription.cws_home/525440/description#description

Posted in this journal depends only on the relationship editor with publisher for the payment of cash from the publishers to the editor to publish false paper

http://www.elsevier.com/wps/find/journaldescription.cws_home/525440/description#description

Journal of Telecommunications (user link) says:

Fake Journal, Publish Unrefereed Papers

SEND MONEY AND GET PUBLISH WITH NO REVIEW:
Link: http://sites.google.com/site/journaloftelecommunications

SEND YOUR MONEY AND GET PUBLISH, THOUGH IT HAS NO VALUE:
Name of Account: Chandramah Appadoo
Bank Name: National Westminster Bank
IBAN: GB90NWBK60193932123191
Swift Code: NWBKGB2L
Sort Code: 60-19-39
Bank Address: Southall Branch, 69 The broadway, Southall, Middlessex, UB1 1LD,UK

Journal of Telecommunications (ISSN 2042-8839)

LIST OF UNREFEREED PAPERS, THESE PAPERS HAVE NO VALUE, AUTHORS ARE A SHAME FOR THE SCIENTIFIC COMMUNITY:

Active-R Dual Input Integrator With Enhanced Time Constant Using a CDBA : Quadrature Oscillator Design [Full Text]

P.Venkateswaran, M. Kar, S.Das and R.Nandi

Abstract? A new dual-input integrator using a current differencing buffered amplifier (CDBA) element is presented ; the circuit needs a grounded capacitor and the time constant (τ ) has an enlargement factor being tunable by a single resistor. A sinusoid quadrature oscillator is realized thereafter with a double-integrator loop involving two such integrators. The designs are tested satisfactorily in a frequency-range of 1MHz-20MHz by both hardware implementation and PSPICE macromodel simulation.

——————————————————————————————————————————————————————————————-

Analysis of Sierpinski Gasket Tetrahedron Antennas [Full Text]

M. Alaydrus

Abstract?Sierpinski gasket fractal antennas are introduced some years ago showing multiband characteristics. Three dimensional Sierpinski gasket antennas are three dimensional extensions of those antennas, so that instead of triangles, we have tetrahedrons, arranged in a certain fashion. The structures are analyzed by surface integral equation method, the results show; they have also multiband characters, however with wider resonant regions. The effects of finite ground to the reflection factor of the antennas are also taken into account. Comparison between the calculation results with measurements shows good agreement.

——————————————————————————————————————————————————————————————-

Analyze the Performance of Cellular IP Networks [Full Text]

Mohammad Shahidul Islam

Abstract? Mobile networks and the Internet are converging. This convergence challenges the QoS provisioning in such mobile IP networks. The future mobile Internet will include many portable devices connected to the global network. In order to achieve higher bandwidth for the users, the cell size will have to be limited. That leads to the creation of microcellular, or even picocellular environments, where the users move frequently among cells. This paper addresses problems that arise from the integration of mobile networks and the Internet, which are mainly due to user mobility. Also analyze the impact of handovers on different traffic types, such as CBR, VBR, as well as best-effort traffic.

——————————————————————————————————————————————————————————————-

A Comparison of Proactive and Reactive Multi-hop Routing Protocols for Mobile Ad Hoc Networks [Full Text]

Foez Ahmed, Md. Shariful Islam, and Nayeema Islam

Abstract?Wireless communication technology is increasing daily; with such growth sooner or later it would not be practical or simply physically possible to have a fixed architecture for this kind of network. Ad hoc wireless network must be capable to selforganize and self-configure due to the fact that the mobile structure is changing all the time. Mobile hosts have a limited range and sending the message to another host, which is not in the sender?s host transmission range, must be forwarded through the network using other hosts which will be operated as routers for delivering the message throughout the network. To accomplish this communication, a routing protocol is used to discover routes between these hosts. This paper presents a variety of
comprehensive simulation results for two popular protocols ? Dynamic MANET On-demand (DYMO) and Optimized Link State Routing (OLSR) using NS2. Both two protocols are provided with identical traffic load and mobility patterns. We have considered TCP as transport protocol and FTP as traffic generator. The analysis is significant because we considered near about all the metrics as suggested by RFC 2501 and till to-date there are a few comparisons based on TCP.

——————————————————————————————————————————————————————————————-

Performance Analysis of an Efficient Wireless Communication System in AWGN and Slow Fading Channel [Full Text]

M. S Miah, Dr. M. M Rahman, T. K Godder and B. C Singh

Abstract? In this paper, first build up a wireless communication simulator including Gray coding, modulation, different channel models (AWGN, flat fading and frequency selective fading channels), channel estimation, adaptive equalization, and demodulation. Next, test the effect of different channel models to the data and image in receiver with constellation and BER (bit error rate) plots under QPSK modulation. For Image data source, we also compare the received image quality to original image in different channels. At last, give detail results and analyses of the performance improvement with channel estimation and adaptive equalization in slow Rayleigh fading channel. For frequency selective fading channel, use linear equalization with both
LMS (least mean squares) and RLS (Recursive Least Squares) algorithms to compare the different improvements. We will see that in AWGN channel, the image is degraded by random noise; in flat fading channel, the image is degraded by random noise and block noise; in frequency selective fading channel, the image is degraded by random noise, block noise, and ISI.

——————————————————————————————————————————————————————————————-

Brain Chip Implants: Controlling Movements with Thought Alone: The Impossible Becomes Reality [Full Text]

Ahmed Elmorshidy

Abstract ? This paper defines and discusses the break-through technology of brain implants. Brain implants, often referred to as neural are technological devices that connect directly to a biological subject’s brain. The paper explains how the link between the computer chip and the human brain is established, and how things that used to be in the science fiction movies has now become reality such as controlling movements through thought only and giving orders to the computer through the brain directly without any other interference from the human body. The paper also discusses the vital implication of this technology in the healthcare industry and the hope that this technology gives to paralyzed patients interact with their environments and perhaps, ultimately, to bypass damaged spinal cords and restore movement to lifeless limbs.

——————————————————————————————————————————————————————————————-

Future Prospects of MIMO in Wireless Communication [Full Text]

Nirmalendu Bikas Sinha, Kaustav Chowdhury and Deepak Kumar

Abstract?The so-called diversity-multiplexing trade-off characterizes the fundamental interaction between the robustness and capacity gains obtainable from multiple-input and multiple-output (MIMO) systems in fading environments. This paper develops practical schemes for approaching the optimal trade-off in various delay and complexity regimes. We focus on a two-transmitter and two-receiver antenna system, in which the receiver has channel knowledge, but the transmitter does not. We present a geometric view of the signal design problem. This view reveals how training based approaches can achieve the optimal (non-coherent) diversity-multiplexing tradeoffs. In this paper, the authors analyses the system parameters (types of the channel, modulation, channel diversity and suitable coding scheme) which play a pivotal role in 4G communication system. Simulation results demonstrate that MIMO system can provide better performance when efficient coding, modulation and proper selection of antenna diversity order is used. In contrast with traditional communication, the superiority of MIMO in next generation signal processing is established.

——————————————————————————————————————————————————————————————-

Pattern Steering Double Square Loop Antenna [Full Text]

Arun Raaza , K. Anbudurai, S. Ravi and S. P. Rajagopalan

Abstract ?A novel method of producing and switching multiple beams using double square loop (DSL) antenna is proposed. By switching either the eight active outer or inner feed points, the pattern can be steered at a coarse step of 45? throughout the 360? of space and the associated beam can be directed in eight directions, thus offering a wide range of options for modern wireless devices to focus the beam at a desired target direction. Furthermore, with varying permittivity value of dielectric substrate, the DSL produces axial and tilted beams of fine varying degree of elevation. The variation in the permittivity can be achieved electronically by using substrates made up of materials such as liquid crystals or ferro-electric materials (Barium Titanate, Barium Strontium Titanate or Lead Titanate) which may be constituted in a fine grained random polycrystalline or a ceramic form. The average gain of antenna beams is 8.3dBi. The beam steerable DSL antenna is designed to operate in the frequency band of 2.5 GHz to 5.8 GHz and is very likely to have direct applications in high data rate systems such as UWB, WIMAX and 4G networks.

——————————————————————————————————————————————————————————————-

Optimized LNA Structure for Pulse-Radar Receiver Applications [Full Text]

Mohammad Reza Salehi, Ebrahim Abiri, Ali Shourvarzi, Mohammad Bagher Jowkar, and Seyed Mehdi Oladali

Abstract?Analysis of different structures for LNAs is described. First, the voltage gain for common-source and cascode structure LNAs will be studied. Then, using CGD neutralization technique by center-tapped inductor, the detrimental effect of the gate-drain internal capacitor, in the common-source structure will be counteracted. A novel structure with the combination of this technique and cascode structure is inroduced. The result shows the voltage gain, in the 6.5-10-GHz radar band, is increased. The effect of this neutralization on noise and reverse isolation is discussed.

——————————————————————————————————————————————————————————————-

Moving Target Identification for Coherent MIMO Radar [Full Text]

Nirmalendu Bikas Sinha, Priyabrata Ray and Abhishek Mitra

Abstract? Motivated by the success of MIMO concept in communication, in this paper the authors deal with the prediction of moving target for coherent spatial diversity MIMO based pulse radar. MIMO radars have better detection performance and can extract target information more precisely than other known pulse radars. Based on coherent processing one decision rule is utilised for detection of target with unknown amplitude embedded in Additive White Gaussian Noise (AWGN) with known power using the Generalized Likelihood Ratio Test(GLRT) and then performance of these detectors have been evaluated analytically using swerling model 1 for moving target identification. We also analyze the diversity gain which we define as the rate that the probability of mis-detecting a target decays with the increasing SNR and show that for a MIMO radar system, with the increase in the number of pulses, the detection performance of Swerling I target are both improved. Simulation results demonstrate that MIMO radar can get better detection performance when more coherent pulses is used. In contrast with conventional radar the detection superiority of the MIMO radars for moving target with temporal coherent processing is established.

*********************************************

Link: http://sites.google.com/site/journaloftelecommunications

SEND YOUR MONEY AND GET PUBLISH, THOUGH IT HAS NO VALUE:
Name of Account: Chandramah Appadoo
Bank Name: National Westminster Bank
IBAN: GB90NWBK60193932123191
Swift Code: NWBKGB2L
Sort Code: 60-19-39
Bank Address: Southall Branch, 69 The broadway, Southall, Middlessex, UB1 1LD,UK

Journal of Telecommunications (ISSN 2042-8839)

Anonymous Coward says:

ETRI big false and scam journal
Dr.Lee, Dec 14th, 2010 @ 2:42am
This is a journal and Hmiy Zataivp and publishing for a price to pay Elmejrrin an interview published research and anti-false and attributed to people Akharrin this magazine is not credible
Papers

A Low-Complexity Planar Antenna Array for Wireless Communication Applications: Robust Source Localization in Impulsive Noise
Moon-Sik Lee, ETRI Journal, vol.32, no.6, Dec. 2010, pp.837-842.
DOI:10.4218/etrij.10.0109.0748

Statistical Analysis of a Subjective QoE Assessment for VVoIP Applications
Maria-Dolores Cano, Fernando Cerdan, and Sergio Almagro, ETRI Journal, vol.32, no.6, Dec. 2010, pp.843-853.
DOI:10.4218/etrij.10.0109.0645

Measurement Scheme for One-Way Delay Variation with Detection and Removal of Clock Skew
Makoto Aoki, Eiji Oki, and Roberto Rojas-Cessa, ETRI Journal, vol.32, no.6, Dec. 2010, pp.854-862.
DOI:10.4218/etrij.10.0109.0611

Reducing Channel Capacity for Scalable Video Coding in a Distributed Network
Hyunpil Kim, Sukhan Lee, Junghee Lee, and Yongsurk Lee, ETRI Journal, vol.32, no.6, Dec. 2010, pp.863-870.
DOI:10.4218/etrij.10.0110.0033

Concentric Circle-Based Image Signature for Near-Duplicate Detection in Large Databases
Ayoung Cho, Won-Keun Yang, Weon-Geun Oh, and Dong-Seok Jeong, ETRI Journal, vol.32, no.6, Dec. 2010, pp.871-880.
DOI:10.4218/etrij.10.0109.0623

Fast and Efficient Method for Fire Detection Using Image Processing
Turgay Celik, ETRI Journal, vol.32, no.6, Dec. 2010, pp.881-890.
DOI:10.4218/etrij.10.0109.0695

New Map-Matching Algorithm Using Virtual Track for Pedestrian Dead Reckoning
Seung Hyuck Shin, Chan Gook Park, and Sangon Choi, ETRI Journal, vol.32, no.6, Dec. 2010, pp.891-900.
DOI:10.4218/etrij.10.0110.0037

Preclinical Prototype Development of a Microwave Tomography System for Breast Cancer Detection
Seong-Ho Son, Nikolai Simonov, Hyuk-Je Kim, Jong-Moon Lee, and Soon-Ik Jeon, ETRI Journal, vol.32, no.6, Dec. 2010, pp.901-910.
DOI:10.4218/etrij.10.0109.0626

A Design Method of Hybrid Analog/Asymmetrical-FIR Pulse-Shaping Filters with an Eye-Opening Control Option against Receiver Timing Jitter
Chia-Yu Yao, ETRI Journal, vol.32, no.6, Dec. 2010, pp.911-920.
DOI:10.4218/etrij.10.0109.0725

Interference Suppression Using Principal Subspace Modification in Multichannel Wiener Filter and Its Application to Speech Recognition
Gibak Kim, ETRI Journal, vol.32, no.6, Dec. 2010, pp.921-931.
DOI:10.4218/etrij.10.0110.0045

Optimized Local Relocation for VLSI Circuit Modification Using Mean-Field Annealing
Gholam Reza Karimi, Ahmad Azizi Verki, and Sattar Mirzakuchaki, ETRI Journal, vol.32, no.6, Dec. 2010, pp.932-939.
DOI:10.4218/etrij.10.0109.0533

Rack-Level DC Power Solution for Volume Servers
Won-Ok Kwon, Hae-Moon Seo, and Pyung Choi, ETRI Journal, vol.32, no.6, Dec. 2010, pp.940-949.
DOI:10.4218/etrij.10.1510.0060

Secure Face Authentication Framework in Open Networks
Yongjin Lee, Yongki Lee, Yunsu Chung, and Kiyoung Moon, ETRI Journal, vol.32, no.6, Dec. 2010, pp.950-960.
DOI:10.4218/etrij.10.1510.0103

Letters

Efficient Multiplexing Scheme of Stereoscopic Video Sequences for Digital Broadcasting Services
Kugjin Yun, Kyuheon Kim, Namho Hur, Soo In Lee, and Gwang Hoon Park, ETRI Journal, vol.32, no.6, Dec. 2010, pp.961-964.
DOI:10.4218/etrij.10.0210.0138

On the Distribution Functions of Ratios Involving Gaussian Random Variables
Seungkeun Park, ETRI Journal, vol.32, no.6, Dec. 2010, pp.965-968.
DOI:10.4218/etrij.10.0210.0201

Chip Impedance Evaluation Method for UHF RFID Transponder ICs over Absorbed Input Power
Jeenmo Yang, and Junho Yeo, ETRI Journal, vol.32, no.6, Dec. 2010, pp.969-971.
DOI:10.4218/etrij.10.0210.0208

Lossy Source Compression of Non-Uniform Binary Source via Reinforced Belief Propagation over GQ-LDGM Codes
Jianping Zheng, Baoming Bai, and Ying Li, ETRI Journal, vol.32, no.6, Dec. 2010, pp.972-975.
DOI:10.4218/etrij.10.0210.0204

(reply to this) (link to this) (view in chronology)

insightful funny report ETRI big false and scam journal
Dr. Yun, Dec 14th, 2010 @ 2:52am
Yes I agree rai this journal is scam and false

(reply to this) (link to this) (view in chronology)

Anonymous Coward says:

They should’ve added the word “advertisement” to the top and bottom of each page, in very small print.

(reply to this) (link to this) (view in chronology)

insightful funny report Re:
CharlieM (profile), Jun 10th, 2009 @ 7:40am
“They should’ve added the word “advertisement” to the top and bottom of each page, in very small print”

That doesn’t mean anything – While I am not up on all the rules (and it varies by journal and grant), but if you use grant money to pay for publication costs (anywhere from 3,000 – 10,000 (and sometimes more)), you must put a footnote on the bottom and call your submission an “Advertisement” – all because you used grant money to defer pub. costs.

The rules are more complex and cumbersome, but basically, seeing “advertisement” on the bottom really doesn’t mean anything.

(reply to this) (link to this) (view in chronology)

insightful funny report DS, Jun 10th, 2009 @ 6:41am
As much as I’m not a fan of laws for every single thing, I just cannot believe that this is legal.

(reply to this) (link to this) (view in chronology)

insightful funny report Anonymous Coward, Jun 10th, 2009 @ 6:49am
Now that you mention it I don’t think a lot of “cable news” should be legal.

(reply to this) (link to this) (view in chronology)

insightful funny report That’s a good one.. eh! But do they make good beer?
anymouse (profile), Jun 10th, 2009 @ 8:45am
Oh, this is about Elsiver the fake publisher, nor Elsinor the fake brewery. Oh well, take off eh, they are both a couple of hosers…

(reply to this) (link to this) (view in chronology)

insightful funny report Two Fake Journals in Computer Science
Petre Dini, Sep 21st, 2009 @ 12:29am
While browsing the net, I found two more fake journals in Computer Science: (1) International Journal of Computer Science and Information Security (IJCSIS) (http://sites.google.com/site/ijcsis/contact-ijcsis) (2) International Journal of Computer and Network Security (IJCNS) (http://www.ijcns.org)

(reply to this) (link to this) (view in chronology)

insightful funny report Re: Two Fake Journals in Computer Science
mhd, Oct 15th, 2009 @ 4:29am
may be your paper not acceted and sais fake coz IJCNS is free journal.

(reply to this) (link to this) (view in chronology)

insightful funny report Re: Two Fake Journals in Computer Science
My attorney is looking into this, Nov 14th, 2009 @ 9:35am
There is nothing fake about the journals, on the contrary– the papers are quite high quality and the review process works like how ‘open source’ works for software industry. Stop posting silly claims like this or you will face law suits and/or criminal actions for defamation by posting the names of all these people and their respectable academic institutions here.

(reply to this) (link to this) (view in chronology)

insightful funny report Re: Two Fake Journals in Computer Science
Terry, Aug 16th, 2010 @ 10:36am
Never use a Debt card with Elsevier. If the total is 50.00 dollars they will take out 100.00 dollars and credit you later. There work is leaving the USA and going to India.
The credit department for the every day person, your account is in India along with the check you sent in.
Comments or Questions email David Hamre at D.Hamre@Elsevier.com

(reply to this) (link to this) (view in chronology)

insightful funny report FAKE JOURNAL CROP UP BEWARE — ijcvms.org
Petre Dini, Sep 23rd, 2009 @ 6:43am
Today I got a wonderful email read as follows: (All those who are against scams, forward this post to related and relevant websites/blogs/forums.) ————————————————- Dear Researcher, We have seen your profile on researchgate.net and we pleased to request you to hold the position of Reviewer in the International Journal of Computer Vision and Multimedia. The International Journal of Computer Vision and Multimedia is a scholarly peer-reviewed international scientific journal published monthly, focusing on theories, methods, algorithms, and applications in computer vision and multimedia. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on computer vision and multimedia. More information can be obtained from the official website: http://ijcvms.org You can register using this link. Registration is free! http://ijcvms.org/index.php/cvms/user/register Reviewers are also requested to send their CV to editor@ijcvms.org. Researchers holding a PhD can also apply to be part of the editorial team. We hope to hear from you very soon. Maria Hollingsworth Journal Manager ————————————————– These people are real academic criminals trying to make money out of researchers! They set up a fake journal, populate it with some people’s name and release CFP and ultimately their hands goes down to your pocket when it comes to register your papers!! They downloaded OJS which is an open source easily installed app, 10 mins configuration and they are done! The funny thing is that this guy happen to send me the email from his gmail ac and just before that I guess he configured his GMail to use the “Send Mail As” option to make it as if the mail comes from the journal domain name host. I simply extracted the header of the mail and got the following: ————————————————– Delivered-To: {my email add here} Received: by 10.115.110.15 with SMTP id n15cs31538wam; Wed, 23 Sep 2009 05:28:13 -0700 (PDT) Return-Path: Received-SPF: pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) client-ip=10.90.22.29; Authentication-Results: mr.google.com; spf=pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) smtp.mail=sameer.pudaruth@gmail.com; dkim=pass header.i=sameer.pudaruth@gmail.com Received: from mr.google.com ([10.90.22.29]) by 10.90.22.29 with SMTP id 29mr2033275agv.25.1253708891141 (num_hops = 1); Wed, 23 Sep 2009 05:28:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:sender:received:date :x-google-sender-auth:message-id:subject:from:content-type; bh=kXKqJmT6tjVZwsSeZjyltB5UtzETwbSnWFi/9khmUM0=; b=OLQZuU4e/Pfs5JBdkmj/po84qevgs6BA3Cb27yEYJfXObxZq7JT2bsp7kBz+LxmPDq upu20DAW9SpkymLOLYFSyky41LH87YFoCqVGgD6DzbSRzqxRPTLqsLIubiR2D1Om4pOI kInXjfa/Te6d6VWWXvfyGIFKeVSkDLXuaDcP4= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:date:x-google-sender-auth:message-id:subject :from:content-type; b=IZ8JCGqIwAF/cgAF/6O1OFm0wth7Plm3rLxxM5WKks31dpqZyDXDaGsdJrzt/PAxpS CGQtZvrbcpI7WbowgM4UJkWXEz5dv3+x6xkvJqbmwqzHTfNO7iPE+z9o9sgzRF8C8DWr Xm5ScwddfBrdZDeijOzvu+9r5JlIt5biMOmSQ= MIME-Version: 1.0 Sender: sameer.pudaruth@gmail.com Received: by 10.90.22.29 with SMTP id 29mt2033275agv.25.1253708890810; Wed, 23 Sep 2009 05:28:10 -0700 (PDT) Date: Wed, 23 Sep 2009 04:28:10 -0800 X-Google-Sender-Auth: 2dd18ebcc2b231bd Message-ID: Subject: Request for joining the International Journal of Computer Vision and Multimedia Services as Reviewer From: International Journal of Computer Vision and Multimedia Services Content-Type: multipart/alternative; boundary=0016362835f01b9f1004743dd91c –0016362835f01b9f1004743dd91c Content-Type: text/plain; charset=ISO-8859-1 ————————————————– sameer.pudaruth@gmail.com is sending the fake emails and also violating someone else identity (thats identity theft), that of Maria Hollingsworth who claims to be the Journal Manager!

(reply to this) (link to this) (view in chronology)

insightful funny report FAKE JOURNAL CROP UP BEWARE — ijcvms.org
Petre Dini, Sep 23rd, 2009 @ 6:44am
Today I got a wonderful email read as follows:
(All those who are against scams, forward this post to related and relevant websites/blogs/forums.)

————————————————-
Dear Researcher,

We have seen your profile on researchgate.net and we pleased to request you to hold the position of Reviewer in the International Journal of Computer Vision and Multimedia.

The International Journal of Computer Vision and Multimedia is a scholarly peer-reviewed international scientific journal published monthly, focusing on theories, methods, algorithms, and applications in computer vision and multimedia. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on computer vision and multimedia.

More information can be obtained from the official website:
http://ijcvms.org

You can register using this link. Registration is free!
http://ijcvms.org/index.php/cvms/user/register
Reviewers are also requested to send their CV to editor@ijcvms.org.

Researchers holding a PhD can also apply to be part of the editorial team.

We hope to hear from you very soon.

Maria Hollingsworth
Journal Manager
————————————————–

These people are real academic criminals trying to make money out of researchers! They set up a fake journal, populate it with some people’s name and release CFP and ultimately their hands goes down to your pocket when it comes to register your papers!! They downloaded OJS which is an open source easily installed app, 10 mins configuration and they are done!

The funny thing is that this guy happen to send me the email from his gmail ac and just before that I guess he configured his GMail to use the “Send Mail As” option to make it as if the mail comes from the journal domain name host. I simply extracted the header of the mail and got the following:

————————————————–
Delivered-To: {my email add here}
Received: by 10.115.110.15 with SMTP id n15cs31538wam;
Wed, 23 Sep 2009 05:28:13 -0700 (PDT)
Return-Path:
Received-SPF: pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) client-ip=10.90.22.29;
Authentication-Results: mr.google.com; spf=pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) smtp.mail=sameer.pudaruth@gmail.com; dkim=pass header.i=sameer.pudaruth@gmail.com
Received: from mr.google.com ([10.90.22.29])
by 10.90.22.29 with SMTP id 29mr2033275agv.25.1253708891141 (num_hops = 1);
Wed, 23 Sep 2009 05:28:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=gmail.com; s=gamma;
h=domainkey-signature:mime-version:sender:received:date
:x-google-sender-auth:message-id:subject:from:content-type;
bh=kXKqJmT6tjVZwsSeZjyltB5UtzETwbSnWFi/9khmUM0=;
b=OLQZuU4e/Pfs5JBdkmj/po84qevgs6BA3Cb27yEYJfXObxZq7JT2bsp7kBz+LxmPDq
upu20DAW9SpkymLOLYFSyky41LH87YFoCqVGgD6DzbSRzqxRPTLqsLIubiR2D1Om4pOI
kInXjfa/Te6d6VWWXvfyGIFKeVSkDLXuaDcP4=
DomainKey-Signature: a=rsa-sha1; c=nofws;
d=gmail.com; s=gamma;
h=mime-version:sender:date:x-google-sender-auth:message-id:subject
:from:content-type;
b=IZ8JCGqIwAF/cgAF/6O1OFm0wth7Plm3rLxxM5WKks31dpqZyDXDaGsdJrzt/PAxpS
CGQtZvrbcpI7WbowgM4UJkWXEz5dv3+x6xkvJqbmwqzHTfNO7iPE+z9o9sgzRF8C8DWr
Xm5ScwddfBrdZDeijOzvu+9r5JlIt5biMOmSQ=
MIME-Version: 1.0
Sender: sameer.pudaruth@gmail.com
Received: by 10.90.22.29 with SMTP id 29mt2033275agv.25.1253708890810; Wed, 23
Sep 2009 05:28:10 -0700 (PDT)
Date: Wed, 23 Sep 2009 04:28:10 -0800
X-Google-Sender-Auth: 2dd18ebcc2b231bd
Message-ID:
Subject: Request for joining the International Journal of Computer Vision and
Multimedia Services as Reviewer
From: International Journal of Computer Vision and Multimedia Services
Content-Type: multipart/alternative; boundary=0016362835f01b9f1004743dd91c

–0016362835f01b9f1004743dd91c
Content-Type: text/plain; charset=ISO-8859-1
————————————————–

sameer.pudaruth@gmail.com is sending the fake emails and also violating someone else identity (thats identity theft), that of Maria Hollingsworth who claims to be the Journal Manager!

(reply to this) (link to this) (view in chronology)

insightful funny report University of Mauritius – Lecturer Sameer Padaruth
Anonymous, Sep 27th, 2009 @ 11:30am
University of Mauritius

I think this lecturer, Sameer Pudaruth sameer.pudaruth@gmail.com is a lame lecturer who does not know much about computer ethics. In fact, he started a good website but the way he promoted it leads to severe criticism.

The sad part is that, all these criticisms will kill his good endeavour and discourage him to invest his time and energy in the website. He wants to host a website for education purposes and perhaps get some money with advertisements.

Anyway, he is a total nerd at dating. Who gets a girl with clichéd love letters? I should definitely teach him the skills behind dating! Duh.

There is another lecturer – Gavin Sathan – who tries to date university girls. Oh! How scornful. He always succeeds to invite to lunch the good-looking, yet stupid and lame, girls. Good for him, but this attitude is not professional. This lecturer lacks personality and integrity. He should learn from the respectable Darren (Dassen?) Sathan , or other lecturers like Pascal Grosset.

I hope this message reaches the concerned parties.

Special Offers:

June 2009 Solutions for Maths, Add Maths, Computer Studies, Chemistry and Principles of Accounts.

$2.00 each.

============================================

Examiners’ Reports available freely for all subjects on:

http://education.mu/forum

Marking Schemes available freely for some subjects on:

http://education.mu/colleges

=============================================

* All Papers and documents will be available till the 24th of September. *

=============================================

Payments can be done through Paypal. Please send your payments to sameer.pudaruth@gmail.com

(reply to this) (link to this) (view in chronology)

insightful funny report Scam: Fake Journal Publications
Petre Dini, Oct 20th, 2009 @ 10:16am
Beware of more unscrupulous journals with many academics getting scammed and deceit.

IJCSI Official Reviewers
http://www.ijcsi.org
• Mr. Markus Schatten, University of Zagreb, Faculty of Organization and Informatics, Croatia

• Mr. Forrest Sheng Bao, Texas Tech University, USA

• Mr. Vassilis Papataxiarhis, Department of Informatics and Telecommunications, National and Kapodistrian University of Athens, Panepistimiopolis, Ilissia, GR-15784, Athens, Greece, Greece

• Dr Modestos Stavrakis, Univarsity of the Aegean, Greece

• Dr Fadi KHALIL, LAAS — CNRS Laboratory, France

• Dr Dimitar Trajanov, Faculty of Electrical Engineering and Information technologies, ss. Cyril and Methodius Univesity – Skopje, Macedonia

• Dr Jinping Yuan, College of Information System and Management,National Univ. of Defense Tech., China

• Dr Alexis Lazanas, Ministry of Education, Greece

• Dr Stavroula Mougiakakou, University of Bern, ARTORG Center for Biomedical Engineering Research, Switzerland

• Dr DE RUNZ, CReSTIC-SIC, IUT de Reims, University of Reims, France

• Mr. Pramodkumar P. Gupta, Dept of Bioinformatics, Dr D Y Patil University, India

• Dr Alireza Fereidunian, School of ECE, University of Tehran, Iran

• Mr. Fred Viezens, Otto-Von-Guericke-University Magdeburg, Germany

• Mr. J. Caleb Goodwin, University of Texas at Houston: Health Science Center, USA

• Dr. Richard G. Bush, Lawrence Technological University, United States

• Dr. Ola Osunkoya, Information Security Architect, USA

• Mr. Kotsokostas N.Antonios, TEI Piraeus, Hellas

• Prof Steven Totosy de Zepetnek, U of Halle-Wittenberg & Purdue U & National Sun Yat-sen U, Germany, USA, Taiwan

• Mr. M Arif Siddiqui, Najran University, Saudi Arabia

• Ms. Ilknur Icke, The Graduate Center, City University of New York, USA

• Prof Miroslav Baca, Associated Professor/Faculty of Organization and Informatics/University of Zagreb, Croatia

• Dr. Elvia Ruiz Beltrán, Instituto Tecnológico de Aguascalientes, Mexico

• Mr. Moustafa Banbouk, Engineer du Telecom, UAE

• Mr. Kevin P. Monaghan, Wayne State University, Detroit, Michigan, USA

• Ms. Moira Stephens, University of Sydney, Australia

• Ms. Maryam Feily, National Advanced IPv6 Centre of Excellence (NAV6) , Universiti Sains Malaysia (USM), Malaysia

• Dr. Constantine YIALOURIS, Informatics Laboratory Agricultural University of Athens, Greece

• Mrs. Angeles Abella, U. de Montreal, Canada

• Dr. Patrizio Arrigo, CNR ISMAC, italy

• Mr. Anirban Mukhopadhyay, B.P.Poddar Institute of Management & Technology, India

• Mr. Dinesh Kumar, DAV Institute of Engineering & Technology, India

• Mr. Jorge L. Hernandez-Ardieta, INDRA SISTEMAS / University Carlos III of Madrid, Spain

• Mr. AliReza Shahrestani, University of Malaya (UM), National Advanced IPv6 Centre of Excellence (NAv6), Malaysia

• Mr. Blagoj Ristevski, Faculty of Administration and Information Systems Management – Bitola, Republic of Macedonia

• Mr. Mauricio Egidio Cantão, Department of Computer Science / University of São Paulo, Brazil

• Mr. Jules Ruis, Fractal Consultancy, The netherlands

• Mr. Mohammad Iftekhar Husain, University at Buffalo, USA

• Dr. Deepak Laxmi Narasimha, Department of Software Engineering, Faculty of Computer Science and Information Technology, University of Malaya, Malaysia

• Dr. Paola Di Maio, DMEM University of Strathclyde, UK

• Dr. Bhanu Pratap Singh, Institute of Instrumentation Engineering, Kurukshetra University Kurukshetra, India

• Mr. Sana Ullah, Inha University, South Korea

• Mr. Cornelis Pieter Pieters, Condast, The Netherlands

• Dr. Amogh Kavimandan, The MathWorks Inc., USA

• Dr. Zhinan Zhou, Samsung Telecommunications America, USA

• Mr. Alberto de Santos Sierra, Universidad Politécnica de Madrid, Spain

• Dr. Md. Atiqur Rahman Ahad, Department of Applied Physics, Electronics & Communication Engineering (APECE), University of Dhaka, Bangladesh

• Dr. Charalampos Bratsas, Lab of Medical Informatics, Medical Faculty, Aristotle University, Thessaloniki, Greece

• Ms. Alexia Dini Kounoudes, Cyprus University of Technology, Cyprus

• Mr. Anthony Gesase, University of Dar es salaam Computing Centre, Tanzania

• Dr. Jorge A. Ruiz-Vanoye, Universidad Juárez Autónoma de Tabasco, Mexico

• Dr. Alejandro Fuentes Penna, Universidad Popular Autónoma del Estado de Puebla, México

• Dr. Ocotlán Díaz-Parra, Universidad Juárez Autónoma de Tabasco, México

• Mrs. Nantia Iakovidou, Aristotle University of Thessaloniki, Greece

• Mr. Vinay Chopra, DAV Institute of Engineering & Technology, Jalandhar

• Ms. Carmen Lastres, Universidad Politécnica de Madrid – Centre for Smart Environments, Spain

• Dr. Sanja Lazarova-Molnar, United Arab Emirates University, UAE

• Mr. Srikrishna Nudurumati, Imaging & Printing Group R&D Hub, Hewlett-Packard, India

• Dr. Olivier Nocent, CReSTIC/SIC, University of Reims, France

• Mr. Burak Cizmeci, Isik University, Turkey

• Dr. Carlos Jaime Barrios Hernandez, LIG (Laboratory Of Informatics of Grenoble), France

• Mr. Md. Rabiul Islam, Rajshahi university of Engineering & Technology (RUET), Bangladesh

• Dr. LAKHOUA Mohamed Najeh, ISSAT – Laboratory of Analysis and Control of Systems, Tunisia

• Dr. Alessandro Lavacchi, Department of Chemistry – University of Firenze, Italy

• Mr. Mungwe, University of Oldenburg, Germany

• Mr. Somnath Tagore, Dr D Y Patil University, India

• Mr. Nehinbe Joshua, University of Essex, Colchester, Essex, UK

• Ms. Xueqin Wang, ATCS, USA

• Dr. Fondjo Fotou Franklin, Langston University, USA

• Mr. Haytham Mohtasseb, Department of Computing – University of Lincoln, United Kingdom

• Dr. Vishal Goyal, Department of Computer Science, Punjabi University, Patiala, India

• Mr. Thomas J. Clancy, ACM, United States

• Dr. Ahmed Nabih Zaki Rashed, Dr. in Electronic Engineering, Faculty of Electronic Engineering, menouf 32951, Electronics and Electrical Communication Engineering Department, Menoufia university, EGYPT, EGYPT

• Dr. Rushed Kanawati, LIPN, France

• Mr. Koteshwar Rao, K G Reddy College Of ENGG.&TECH,CHILKUR, RR DIST.,AP, India

• Mr. M. Nagesh Kumar, Department of Electronics and Communication, J.S.S. research foundation, Mysore University, Mysore-6, India

• Mr. Saqib Saeed, University of Siegen, Germany

• Dr. Ibrahim Noha, Grenoble Informatics Laboratory, France

• Mr. Muhammad Yasir Qadri, University of Essex, UK

• Mr. Annadurai .P, KMCPGS, Lawspet, Pondicherry, India, (Aff. Pondicherry Univeristy, India

• Mr. E Munivel , CEDTI (Govt. of India), India

• Dr. Chitra Ganesh Desai, University of Pune, India

• Mr. Syed, Analytical Services & Materials, Inc., USA

• Dr. Mashud Kabir, Department of Computer Science, University of Tuebingen, Germany

• Mrs. Payal N. Raj, Veer South Gujarat University, India

• Mrs. Priti Maheshwary, Maulana Azad National Institute of Technology, Bhopal, India

• Mr. Mahesh Goyani, S.P. University, India, India

• Mr. Vinay Verma, Defence Avionics Research Establishment, DRDO, India

• Dr. George A. Papakostas, Democritus University of Thrace, Greece

• Mr. Mohsen Toorani, Iran University of Science and Technology, Iran

• Mr. Abhijit Sanjiv Kulkarni, DARE, DRDO, India

• Mr. Kavi Kumar Khedo, University of Mauritius, Mauritius

• Dr. B. Sivaselvan, Indian Institute of Information Technology, Design & Manufacturing, Kancheepuram, IIT Madras Campus, India

• Dr. Partha Pratim Bhattacharya, Greater Kolkata College of Engineering and Management, West Bengal University of Technology, India

• Mr. Manish Maheshwari, Makhanlal C University of Journalism & Communication, India

• Dr. Siddhartha Kumar Khaitan, Iowa State University, USA

• Dr. Mandhapati Raju, General Motors Inc, USA

• Dr. M.Iqbal Saripan, Universiti Putra Malaysia, Malaysia

• Mr. Ahmad Shukri Mohd Noor, University Malaysia Terengganu, Malaysia

• Mr. Selvakuberan K, TATA Consultancy Services, India

• Dr. Smita Rajpal, Institute of Technology and Management, Gurgaon, India

• Mr. Rakesh Kachroo, Tata Consultancy Services, India

• Mr. Raman Kumar, National Institute of Technology, Jalandhar, Punjab., India

• Mr. Nitesh Sureja, S.P.University, India

• Dr. M. Emre Celebi, Louisiana State University, Shreveport, USA

• Dr. Aung Kyaw Oo, Defence Services Academy, Myanmar

• Mr. Sanjay P. Patel, Sankalchand Patel College of Engineering, Visnagar, Gujarat, India

• Dr. Pascal Fallavollita, Queens University, Canada

• Mr. Jitendra Agrawal, Rajiv Gandhi Technological University, Bhopal, MP, India

• Mr. Ismael Rafael Ponce Medellín, Cenidet (Centro Nacional de Investigación y Desarrollo Tecnológico), Mexico

• Mr. Supheakmungkol SARIN, Waseda University, Japan

• Mr. Shoukat Ullah, Govt. Post Graduate College Bannu, Pakistan

• Dr. Vivian Augustine, Telecom Zimbabwe, Zimbabwe

• Mrs. Mutalli Vatila, Offshore Business Philipines, Philipines

• Dr. Emanuele Goldoni, University of Pavia, Dept. of Electronics, TLC & Networking Lab, Italy

• Mr. Pankaj Kumar, SAMA, India

• Dr. Himanshu Aggarwal, Punjabi University,Patiala, India

• Dr. Vauvert Guillaume, Europages, France

• Prof Yee Ming Chen, Department of Industrial Engineering and Management, Yuan Ze University, Taiwan

• Dr. Constantino Malagón, Nebrija University, Spain

• Prof Kanwalvir Singh Dhindsa, B.B.S.B.Engg.College, Fatehgarh Sahib (Punjab), India

• Mr. Angkoon Phinyomark, Prince of Singkla University, Thailand

• Ms. Nital H. Mistry, Veer Narmad South Gujarat University, Surat, India

• Dr. M.R.Sumalatha, Anna University, India

• Mr. Somesh Kumar Dewangan, Disha Institute of Management and Technology, India

• Mr. Raman Maini, Punjabi University, Patiala(Punjab)-147002, India

• Dr. Abdelkader Outtagarts, Alcatel-Lucent Bell-Labs, France

• Prof Dr. Abdul Wahid, AKG Engg. College, Ghaziabad, India

• Mr. Prabu Mohandas, Anna University/Adhiyamaan College of Engineering, india

• Dr. Manish Kumar Jindal, Panjab University Regional Centre, Muktsar, India

• Prof Mydhili K Nair, M S Ramaiah Institute of Technnology, Bangalore, India

International Journal of Computer Science Issues (IJCSI)
Karan Lane, Mahebourg,
Republic of Mauritius

(reply to this) (link to this) (view in chronology)

Anonymous Coward says:

ETRI big false and scam journal
Dr.Lee, Dec 14th, 2010 @ 2:42am
This is a journal and Hmiy Zataivp and publishing for a price to pay Elmejrrin an interview published research and anti-false and attributed to people Akharrin this magazine is not credible
Papers

A Low-Complexity Planar Antenna Array for Wireless Communication Applications: Robust Source Localization in Impulsive Noise
Moon-Sik Lee, ETRI Journal, vol.32, no.6, Dec. 2010, pp.837-842.
DOI:10.4218/etrij.10.0109.0748

Statistical Analysis of a Subjective QoE Assessment for VVoIP Applications
Maria-Dolores Cano, Fernando Cerdan, and Sergio Almagro, ETRI Journal, vol.32, no.6, Dec. 2010, pp.843-853.
DOI:10.4218/etrij.10.0109.0645

Measurement Scheme for One-Way Delay Variation with Detection and Removal of Clock Skew
Makoto Aoki, Eiji Oki, and Roberto Rojas-Cessa, ETRI Journal, vol.32, no.6, Dec. 2010, pp.854-862.
DOI:10.4218/etrij.10.0109.0611

Reducing Channel Capacity for Scalable Video Coding in a Distributed Network
Hyunpil Kim, Sukhan Lee, Junghee Lee, and Yongsurk Lee, ETRI Journal, vol.32, no.6, Dec. 2010, pp.863-870.
DOI:10.4218/etrij.10.0110.0033

Concentric Circle-Based Image Signature for Near-Duplicate Detection in Large Databases
Ayoung Cho, Won-Keun Yang, Weon-Geun Oh, and Dong-Seok Jeong, ETRI Journal, vol.32, no.6, Dec. 2010, pp.871-880.
DOI:10.4218/etrij.10.0109.0623

Fast and Efficient Method for Fire Detection Using Image Processing
Turgay Celik, ETRI Journal, vol.32, no.6, Dec. 2010, pp.881-890.
DOI:10.4218/etrij.10.0109.0695

New Map-Matching Algorithm Using Virtual Track for Pedestrian Dead Reckoning
Seung Hyuck Shin, Chan Gook Park, and Sangon Choi, ETRI Journal, vol.32, no.6, Dec. 2010, pp.891-900.
DOI:10.4218/etrij.10.0110.0037

Preclinical Prototype Development of a Microwave Tomography System for Breast Cancer Detection
Seong-Ho Son, Nikolai Simonov, Hyuk-Je Kim, Jong-Moon Lee, and Soon-Ik Jeon, ETRI Journal, vol.32, no.6, Dec. 2010, pp.901-910.
DOI:10.4218/etrij.10.0109.0626

A Design Method of Hybrid Analog/Asymmetrical-FIR Pulse-Shaping Filters with an Eye-Opening Control Option against Receiver Timing Jitter
Chia-Yu Yao, ETRI Journal, vol.32, no.6, Dec. 2010, pp.911-920.
DOI:10.4218/etrij.10.0109.0725

Interference Suppression Using Principal Subspace Modification in Multichannel Wiener Filter and Its Application to Speech Recognition
Gibak Kim, ETRI Journal, vol.32, no.6, Dec. 2010, pp.921-931.
DOI:10.4218/etrij.10.0110.0045

Optimized Local Relocation for VLSI Circuit Modification Using Mean-Field Annealing
Gholam Reza Karimi, Ahmad Azizi Verki, and Sattar Mirzakuchaki, ETRI Journal, vol.32, no.6, Dec. 2010, pp.932-939.
DOI:10.4218/etrij.10.0109.0533

Rack-Level DC Power Solution for Volume Servers
Won-Ok Kwon, Hae-Moon Seo, and Pyung Choi, ETRI Journal, vol.32, no.6, Dec. 2010, pp.940-949.
DOI:10.4218/etrij.10.1510.0060

Secure Face Authentication Framework in Open Networks
Yongjin Lee, Yongki Lee, Yunsu Chung, and Kiyoung Moon, ETRI Journal, vol.32, no.6, Dec. 2010, pp.950-960.
DOI:10.4218/etrij.10.1510.0103

Letters

Efficient Multiplexing Scheme of Stereoscopic Video Sequences for Digital Broadcasting Services
Kugjin Yun, Kyuheon Kim, Namho Hur, Soo In Lee, and Gwang Hoon Park, ETRI Journal, vol.32, no.6, Dec. 2010, pp.961-964.
DOI:10.4218/etrij.10.0210.0138

On the Distribution Functions of Ratios Involving Gaussian Random Variables
Seungkeun Park, ETRI Journal, vol.32, no.6, Dec. 2010, pp.965-968.
DOI:10.4218/etrij.10.0210.0201

Chip Impedance Evaluation Method for UHF RFID Transponder ICs over Absorbed Input Power
Jeenmo Yang, and Junho Yeo, ETRI Journal, vol.32, no.6, Dec. 2010, pp.969-971.
DOI:10.4218/etrij.10.0210.0208

Lossy Source Compression of Non-Uniform Binary Source via Reinforced Belief Propagation over GQ-LDGM Codes
Jianping Zheng, Baoming Bai, and Ying Li, ETRI Journal, vol.32, no.6, Dec. 2010, pp.972-975.
DOI:10.4218/etrij.10.0210.0204

(reply to this) (link to this) (view in chronology)

insightful funny report ETRI big false and scam journal
Dr. Yun, Dec 14th, 2010 @ 2:52am
Yes I agree rai this journal is scam and false

(reply to this) (link to this) (view in chronology)

insightful funny report journals sexy
Dr. Markus, Dec 15th, 2010 @ 8:42pm
Let the science and its problems and discuss the issue of journals sexy that displays photos of body and pussy women because these images in some of these journals are published previously in issue for other journals, as I advise to be monitoring this business and also must contain any number of publication of these magazines on CD displays movies pornography and sexual intercourse Neighborhood of the women who offered their bodies and pussy in the pictures to be great fun

(reply to this) (link to this) (view in chronology

Anonymous Coward says:

Remember how Elsevier and Merck were caught putting out a fake journal that had articles favoring Merck drugs, implying peer reviewed articles that weren’t? Soon afterwards, it came out that Elsevier had a whole division for such things. However, following an internal investigation, it looks like Elsevier is backtracking a bit and saying that, while the group’s practices were problematic, most weren’t as egregious as the “Australasian Journal of Bone and Joint Medicine (AJBJM)” that was created by Merck and Elsevier. Instead, most of the others were sponsored by multiple companies, rather than just one. Still, the company admits that it never should have called the custom publications “journals” and is changing its publication rules — having editors from its real journals create the guidelines for any custom publication offerings. Either way, this whole episode is a serious black mark on Elsevier and the reputation of any of its journals — real or “fake.”

Anonymous Coward says:

FAKE JOURNAL CROP UP BEWARE — ijcvms.org
Petre Dini, Sep 23rd, 2009 @ 6:43am
Today I got a wonderful email read as follows: (All those who are against scams, forward this post to related and relevant websites/blogs/forums.) ————————————————- Dear Researcher, We have seen your profile on researchgate.net and we pleased to request you to hold the position of Reviewer in the International Journal of Computer Vision and Multimedia. The International Journal of Computer Vision and Multimedia is a scholarly peer-reviewed international scientific journal published monthly, focusing on theories, methods, algorithms, and applications in computer vision and multimedia. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on computer vision and multimedia. More information can be obtained from the official website: http://ijcvms.org You can register using this link. Registration is free! http://ijcvms.org/index.php/cvms/user/register Reviewers are also requested to send their CV to editor@ijcvms.org. Researchers holding a PhD can also apply to be part of the editorial team. We hope to hear from you very soon. Maria Hollingsworth Journal Manager ————————————————– These people are real academic criminals trying to make money out of researchers! They set up a fake journal, populate it with some people’s name and release CFP and ultimately their hands goes down to your pocket when it comes to register your papers!! They downloaded OJS which is an open source easily installed app, 10 mins configuration and they are done! The funny thing is that this guy happen to send me the email from his gmail ac and just before that I guess he configured his GMail to use the “Send Mail As” option to make it as if the mail comes from the journal domain name host. I simply extracted the header of the mail and got the following: ————————————————– Delivered-To: {my email add here} Received: by 10.115.110.15 with SMTP id n15cs31538wam; Wed, 23 Sep 2009 05:28:13 -0700 (PDT) Return-Path: Received-SPF: pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) client-ip=10.90.22.29; Authentication-Results: mr.google.com; spf=pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) smtp.mail=sameer.pudaruth@gmail.com; dkim=pass header.i=sameer.pudaruth@gmail.com Received: from mr.google.com ([10.90.22.29]) by 10.90.22.29 with SMTP id 29mr2033275agv.25.1253708891141 (num_hops = 1); Wed, 23 Sep 2009 05:28:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:sender:received:date :x-google-sender-auth:message-id:subject:from:content-type; bh=kXKqJmT6tjVZwsSeZjyltB5UtzETwbSnWFi/9khmUM0=; b=OLQZuU4e/Pfs5JBdkmj/po84qevgs6BA3Cb27yEYJfXObxZq7JT2bsp7kBz+LxmPDq upu20DAW9SpkymLOLYFSyky41LH87YFoCqVGgD6DzbSRzqxRPTLqsLIubiR2D1Om4pOI kInXjfa/Te6d6VWWXvfyGIFKeVSkDLXuaDcP4= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:date:x-google-sender-auth:message-id:subject :from:content-type; b=IZ8JCGqIwAF/cgAF/6O1OFm0wth7Plm3rLxxM5WKks31dpqZyDXDaGsdJrzt/PAxpS CGQtZvrbcpI7WbowgM4UJkWXEz5dv3+x6xkvJqbmwqzHTfNO7iPE+z9o9sgzRF8C8DWr Xm5ScwddfBrdZDeijOzvu+9r5JlIt5biMOmSQ= MIME-Version: 1.0 Sender: sameer.pudaruth@gmail.com Received: by 10.90.22.29 with SMTP id 29mt2033275agv.25.1253708890810; Wed, 23 Sep 2009 05:28:10 -0700 (PDT) Date: Wed, 23 Sep 2009 04:28:10 -0800 X-Google-Sender-Auth: 2dd18ebcc2b231bd Message-ID: Subject: Request for joining the International Journal of Computer Vision and Multimedia Services as Reviewer From: International Journal of Computer Vision and Multimedia Services Content-Type: multipart/alternative; boundary=0016362835f01b9f1004743dd91c –0016362835f01b9f1004743dd91c Content-Type: text/plain; charset=ISO-8859-1 ————————————————– sameer.pudaruth@gmail.com is sending the fake emails and also violating someone else identity (thats identity theft), that of Maria Hollingsworth who claims to be the Journal Manager!

(reply to this) (link to this) (view in chronology)

insightful funny report FAKE JOURNAL CROP UP BEWARE — ijcvms.org
Petre Dini, Sep 23rd, 2009 @ 6:44am
Today I got a wonderful email read as follows:
(All those who are against scams, forward this post to related and relevant websites/blogs/forums.)

————————————————-
Dear Researcher,

We have seen your profile on researchgate.net and we pleased to request you to hold the position of Reviewer in the International Journal of Computer Vision and Multimedia.

The International Journal of Computer Vision and Multimedia is a scholarly peer-reviewed international scientific journal published monthly, focusing on theories, methods, algorithms, and applications in computer vision and multimedia. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on computer vision and multimedia.

More information can be obtained from the official website:
http://ijcvms.org

You can register using this link. Registration is free!
http://ijcvms.org/index.php/cvms/user/register
Reviewers are also requested to send their CV to editor@ijcvms.org.

Researchers holding a PhD can also apply to be part of the editorial team.

We hope to hear from you very soon.

Maria Hollingsworth
Journal Manager
————————————————–

These people are real academic criminals trying to make money out of researchers! They set up a fake journal, populate it with some people’s name and release CFP and ultimately their hands goes down to your pocket when it comes to register your papers!! They downloaded OJS which is an open source easily installed app, 10 mins configuration and they are done!

The funny thing is that this guy happen to send me the email from his gmail ac and just before that I guess he configured his GMail to use the “Send Mail As” option to make it as if the mail comes from the journal domain name host. I simply extracted the header of the mail and got the following:

————————————————–
Delivered-To: {my email add here}
Received: by 10.115.110.15 with SMTP id n15cs31538wam;
Wed, 23 Sep 2009 05:28:13 -0700 (PDT)
Return-Path:
Received-SPF: pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) client-ip=10.90.22.29;
Authentication-Results: mr.google.com; spf=pass (google.com: domain of sameer.pudaruth@gmail.com designates 10.90.22.29 as permitted sender) smtp.mail=sameer.pudaruth@gmail.com; dkim=pass header.i=sameer.pudaruth@gmail.com
Received: from mr.google.com ([10.90.22.29])
by 10.90.22.29 with SMTP id 29mr2033275agv.25.1253708891141 (num_hops = 1);
Wed, 23 Sep 2009 05:28:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=gmail.com; s=gamma;
h=domainkey-signature:mime-version:sender:received:date
:x-google-sender-auth:message-id:subject:from:content-type;
bh=kXKqJmT6tjVZwsSeZjyltB5UtzETwbSnWFi/9khmUM0=;
b=OLQZuU4e/Pfs5JBdkmj/po84qevgs6BA3Cb27yEYJfXObxZq7JT2bsp7kBz+LxmPDq
upu20DAW9SpkymLOLYFSyky41LH87YFoCqVGgD6DzbSRzqxRPTLqsLIubiR2D1Om4pOI
kInXjfa/Te6d6VWWXvfyGIFKeVSkDLXuaDcP4=
DomainKey-Signature: a=rsa-sha1; c=nofws;
d=gmail.com; s=gamma;
h=mime-version:sender:date:x-google-sender-auth:message-id:subject
:from:content-type;
b=IZ8JCGqIwAF/cgAF/6O1OFm0wth7Plm3rLxxM5WKks31dpqZyDXDaGsdJrzt/PAxpS
CGQtZvrbcpI7WbowgM4UJkWXEz5dv3+x6xkvJqbmwqzHTfNO7iPE+z9o9sgzRF8C8DWr
Xm5ScwddfBrdZDeijOzvu+9r5JlIt5biMOmSQ=
MIME-Version: 1.0
Sender: sameer.pudaruth@gmail.com
Received: by 10.90.22.29 with SMTP id 29mt2033275agv.25.1253708890810; Wed, 23
Sep 2009 05:28:10 -0700 (PDT)
Date: Wed, 23 Sep 2009 04:28:10 -0800
X-Google-Sender-Auth: 2dd18ebcc2b231bd
Message-ID:
Subject: Request for joining the International Journal of Computer Vision and
Multimedia Services as Reviewer
From: International Journal of Computer Vision and Multimedia Services
Content-Type: multipart/alternative; boundary=0016362835f01b9f1004743dd91c

–0016362835f01b9f1004743dd91c
Content-Type: text/plain; charset=ISO-8859-1
————————————————–

sameer.pudaruth@gmail.com is sending the fake emails and also violating someone else identity (thats identity theft), that of Maria Hollingsworth who claims to be the Journal Manager!

(reply to this) (link to this) (view in chronology)

Journal of Telecommunications (user link) says:

SCAM AND FAKE JOURNAL

SEND MONEY AND GET PUBLISH WITH NO REVIEW:
Link: http://sites.google.com/site/journaloftelecommunications

SEND YOUR MONEY AND GET PUBLISH, THOUGH IT HAS NO VALUE:
Name of Account: Chandramah Appadoo
Bank Name: National Westminster Bank
IBAN: GB90NWBK60193932123191
Swift Code: NWBKGB2L
Sort Code: 60-19-39
Bank Address: Southall Branch, 69 The broadway, Southall, Middlessex, UB1 1LD,UK

Journal of Telecommunications (ISSN 2042-8839)

LIST OF UNREFEREED PAPERS, THESE PAPERS HAVE NO VALUE, AUTHORS ARE A SHAME FOR THE SCIENTIFIC COMMUNITY:

Active-R Dual Input Integrator With Enhanced Time Constant Using a CDBA : Quadrature Oscillator Design [Full Text]

P.Venkateswaran, M. Kar, S.Das and R.Nandi

Abstract? A new dual-input integrator using a current differencing buffered amplifier (CDBA) element is presented ; the circuit needs a grounded capacitor and the time constant (τ ) has an enlargement factor being tunable by a single resistor. A sinusoid quadrature oscillator is realized thereafter with a double-integrator loop involving two such integrators. The designs are tested satisfactorily in a frequency-range of 1MHz-20MHz by both hardware implementation and PSPICE macromodel simulation.

————————————————————————————- —————————————————————————————————- —

Analysis of Sierpinski Gasket Tetrahedron Antennas [Full Text]

M. Alaydrus

Abstract?Sierpinski gasket fractal antennas are introduced some years ago showing multiband characteristics. Three dimensional Sierpinski gasket antennas are three dimensional extensions of those antennas, so that instead of triangles, we have tetrahedrons, arranged in a certain fashion. The structures are analyzed by surface integral equation method, the results show; they have also multiband characters, however with wider resonant regions. The effects of finite ground to the reflection factor of the antennas are also taken into account. Comparison between the calculation results with measurements shows good agreement.

————————————————————————————– —————————————————————————————————- –

Analyze the Performance of Cellular IP Networks [Full Text]

Mohammad Shahidul Islam

Abstract? Mobile networks and the Internet are converging. This convergence challenges the QoS provisioning in such mobile IP networks. The future mobile Internet will include many portable devices connected to the global network. In order to achieve higher bandwidth for the users, the cell size will have to be limited. That leads to the creation of microcellular, or even picocellular environments, where the users move frequently among cells. This paper addresses problems that arise from the integration of mobile networks and the Internet, which are mainly due to user mobility. Also analyze the impact of handovers on different traffic types, such as CBR, VBR, as well as best-effort traffic.

—————————————————————————————- —————————————————————————————————

A Comparison of Proactive and Reactive Multi-hop Routing Protocols for Mobile Ad Hoc Networks [Full Text]

Foez Ahmed, Md. Shariful Islam, and Nayeema Islam

Abstract?Wireless communication technology is increasing daily; with such growth sooner or later it would not be practical or simply physically possible to have a fixed architecture for this kind of network. Ad hoc wireless network must be capable to selforganize and self-configure due to the fact that the mobile structure is changing all the time. Mobile hosts have a limited range and sending the message to another host, which is not in the sender?s host transmission range, must be forwarded through the network using other hosts which will be operated as routers for delivering the message throughout the network. To accomplish this communication, a routing protocol is used to discover routes between these hosts. This paper presents a variety of
comprehensive simulation results for two popular protocols ? Dynamic MANET On-demand (DYMO) and Optimized Link State Routing (OLSR) using NS2. Both two protocols are provided with identical traffic load and mobility patterns. We have considered TCP as transport protocol and FTP as traffic generator. The analysis is significant because we considered near about all the metrics as suggested by RFC 2501 and till to-date there are a few comparisons based on TCP.

——————————————————————————————– ———————————————————————————————–

P erformance Analysis of an Efficient Wireless Communication System in AWGN and Slow Fading Channel [Full Text]

M. S Miah, Dr. M. M Rahman, T. K Godder and B. C Singh

Abstract? In this paper, first build up a wireless communication simulator including Gray coding, modulation, different channel models (AWGN, flat fading and frequency selective fading channels), channel estimation, adaptive equalization, and demodulation. Next, test the effect of different channel models to the data and image in receiver with constellation and BER (bit error rate) plots under QPSK modulation. For Image data source, we also compare the received image quality to original image in different channels. At last, give detail results and analyses of the performance improvement with channel estimation and adaptive equalization in slow Rayleigh fading channel. For frequency selective fading channel, use linear equalization with both
LMS (least mean squares) and RLS (Recursive Least Squares) algorithms to compare the different improvements. We will see that in AWGN channel, the image is degraded by random noise; in flat fading channel, the image is degraded by random noise and block noise; in frequency selective fading channel, the image is degraded by random noise, block noise, and ISI.

——————————————————————————————– ———————————————————————————————–

B rain Chip Implants: Controlling Movements with Thought Alone: The Impossible Becomes Reality [Full Text]

Ahmed Elmorshidy

Abstract ? This paper defines and discusses the break-through technology of brain implants. Brain implants, often referred to as neural are technological devices that connect directly to a biological subject’s brain. The paper explains how the link between the computer chip and the human brain is established, and how things that used to be in the science fiction movies has now become reality such as controlling movements through thought only and giving orders to the computer through the brain directly without any other interference from the human body. The paper also discusses the vital implication of this technology in the healthcare industry and the hope that this technology gives to paralyzed patients interact with their environments and perhaps, ultimately, to bypass damaged spinal cords and restore movement to lifeless limbs.

—————————————————————————————— ————————————————————————————————-

Future Prospects of MIMO in Wireless Communication [Full Text]

Nirmalendu Bikas Sinha, Kaustav Chowdhury and Deepak Kumar

Abstract?The so-called diversity-multiplexing trade-off characterizes the fundamental interaction between the robustness and capacity gains obtainable from multiple-input and multiple-output (MIMO) systems in fading environments. This paper develops practical schemes for approaching the optimal trade-off in various delay and complexity regimes. We focus on a two-transmitter and two-receiver antenna system, in which the receiver has channel knowledge, but the transmitter does not. We present a geometric view of the signal design problem. This view reveals how training based approaches can achieve the optimal (non-coherent) diversity-multiplexing tradeoffs. In this paper, the authors analyses the system parameters (types of the channel, modulation, channel diversity and suitable coding scheme) which play a pivotal role in 4G communication system. Simulation results demonstrate that MIMO system can provide better performance when efficient coding, modulation and proper selection of antenna diversity order is used. In contrast with traditional communication, the superiority of MIMO in next generation signal processing is established.

———————————————————————————— —————————————————————————————————- —

Pattern Steering Double Square Loop Antenna [Full Text]

Arun Raaza , K. Anbudurai, S. Ravi and S. P. Rajagopalan

Abstract ?A novel method of producing and switching multiple beams using double square loop (DSL) antenna is proposed. By switching either the eight active outer or inner feed points, the pattern can be steered at a coarse step of 45? throughout the 360? of space and the associated beam can be directed in eight directions, thus offering a wide range of options for modern wireless devices to focus the beam at a desired target direction. Furthermore, with varying permittivity value of dielectric substrate, the DSL produces axial and tilted beams of fine varying degree of elevation. The variation in the permittivity can be achieved electronically by using substrates made up of materials such as liquid crystals or ferro-electric materials (Barium Titanate, Barium Strontium Titanate or Lead Titanate) which may be constituted in a fine grained random polycrystalline or a ceramic form. The average gain of antenna beams is 8.3dBi. The beam steerable DSL antenna is designed to operate in the frequency band of 2.5 GHz to 5.8 GHz and is very likely to have direct applications in high data rate systems such as UWB, WIMAX and 4G networks.

————————————————————————————— —————————————————————————————————-

Optimized LNA Structure for Pulse-Radar Receiver Applications [Full Text]

Mohammad Reza Salehi, Ebrahim Abiri, Ali Shourvarzi, Mohammad Bagher Jowkar, and Seyed Mehdi Oladali

Abstract?Analysis of different structures for LNAs is described. First, the voltage gain for common-source and cascode structure LNAs will be studied. Then, using CGD neutralization technique by center-tapped inductor, the detrimental effect of the gate-drain internal capacitor, in the common-source structure will be counteracted. A novel structure with the combination of this technique and cascode structure is inroduced. The result shows the voltage gain, in the 6.5-10-GHz radar band, is increased. The effect of this neutralization on noise and reverse isolation is discussed.

————————————————————————————– —————————————————————————————————- –

Moving Target Identification for Coherent MIMO Radar [Full Text]

Nirmalendu Bikas Sinha, Priyabrata Ray and Abhishek Mitra

Abstract? Motivated by the success of MIMO concept in communication, in this paper the authors deal with the prediction of moving target for coherent spatial diversity MIMO based pulse radar. MIMO radars have better detection performance and can extract target information more precisely than other known pulse radars. Based on coherent processing one decision rule is utilised for detection of target with unknown amplitude embedded in Additive White Gaussian Noise (AWGN) with known power using the Generalized Likelihood Ratio Test(GLRT) and then performance of these detectors have been evaluated analytically using swerling model 1 for moving target identification. We also analyze the diversity gain which we define as the rate that the probability of mis-detecting a target decays with the increasing SNR and show that for a MIMO radar system, with the increase in the number of pulses, the detection performance of Swerling I target are both improved. Simulation results demonstrate that MIMO radar can get better detection performance when more coherent pulses is used. In contrast with conventional radar the detection superiority of the MIMO radars for moving target with temporal coherent processing is established.

*********************************************

Link: http://sites.google.com/site/journaloftelecommunications

SEND YOUR MONEY AND GET PUBLISH, THOUGH IT HAS NO VALUE:
Name of Account: Chandramah Appadoo
Bank Name: National Westminster Bank
IBAN: GB90NWBK60193932123191
Swift Code: NWBKGB2L
Sort Code: 60-19-39
Bank Address: Southall Branch, 69 The broadway, Southall, Middlessex, UB1 1LD,UK

Journal of Telecommunications (ISSN 2042-8839)

Anonymous Coward says:

e: Scam: Fake Journal Publications

Sun Xio, Oct 22nd, 2009 @ 4:22am
Silly and stupid behavior! I have previously seen such type of attack to open access journal. If you don’t like it, so don’t like it why trying to defame it? If you are really an academic, then you are in the wrong job! You need to be in the FBI 😀
(reply to this) (link to this) (view in chronology)
insightful funny report
Re: Re: Scam: Fake Journal Publications

Joshua, Oct 22nd, 2009 @ 5:03am
Well said! 😉
(reply to this) (link to this) (view in chronology)
insightful funny report
Re: Scam: Fake Journal Publications

Karen, Oct 22nd, 2009 @ 4:53am
Looks like the growing popularity of IJCSI is really making someone unhappy! I guess the moderator should ban this comment.
(reply to this) (link to this) (view in chronology)
insightful funny report
Re: Scam: Fake Journal Publications

David, Oct 22nd, 2009 @ 10:50am
This is really a cheap thing to do, to list the reviewers. If you had any issue with the journal, you should have contacted them! And from what I understand, IJCSI is an open access and registered journal! So, what issue of fake are you speaking about?
(reply to this) (link to this) (view in chronology)

Trox (user link) says:

Two Fake Journals in Computer Science

I think Eurojournals can also be included in the list of fake publishers. I mean, ok.. they do publish the papers. Only the way they accept the papers is highly suspect. I mean, there was a case of a paper being accepted after less than a week without corrections! I believe the Journal name was European Journal of Scientific Research. … Owh, and yeah. . IJCSNS accepts papers that some normal conferences reject. I know as my friend related his experience 😛

trox says:

Two Fake Journals in Computer Science

Yeah. They’re not fake… they exist. But they dont properly review the papers. So, if you look at it academically, these journals aren’t proper and the integrity of the authors can be questioned…. Maybe the word fake is not appropriate… Low quality (or at times zero quality) might be more appropriate… just my two cents…

Dr.Lee says:

New scam and fake papers of ETRI journal

Packet Size Optimization for Improving the Energy Efficiency in Body Sensor Networks
Mari Carmen Domingo, ETRI Journal, vol.33, no.3, June 2011, pp.299-309.

DOI:10.4218/etrij.11.0110.0270
[PDF Full-Text (804KB)] [Scanned PDF (5,296KB)]

A New Soft-Fusion Approach for Multiple-Receiver Wireless Communication Systems
Ashraf M. Aziz, Ahmed M. ElBakly, Mohamed H.A. Azeem, and Gamal A. Hamid, ETRI Journal, vol.33, no.3, June 2011, pp.310-319.

DOI:10.4218/etrij.11.0110.0282
[PDF Full-Text (793KB)] [Scanned PDF (4,885KB)]

Closed-Form Expressions for Selection Combining System Statistics over Correlated Generalized-K Fading Channels in the Presence of Interference
Bojana Z. Nikolic, Mihajlo C. Stefanovic, Stefan R. Panic, Jelena A. Anastasov, and Borivoje Milosevic, ETRI Journal, vol.33, no.3, June 2011, pp.320-325.

DOI:10.4218/etrij.11.0110.0311
[PDF Full-Text (429KB)] [Scanned PDF (2,782KB)]

Sampling Jitter Effect on a Reconfigurable Digital IF Transceiver to WiMAX and HSDPA
Bong-Guk Yu, Jaekwon Lee, JinUp Kim, and Kyutae Lim, ETRI Journal, vol.33, no.3, June 2011, pp.326-334.

DOI:10.4218/etrij.11.0110.0339
[PDF Full-Text (823KB)] [Scanned PDF (4,350KB)]

Wideband Low-Reflection Transmission Lines for Bare Chip on Multilayer PCB
Rashad Ramzan, Jonas Fritzin, Jerzy Dabrowski, and Christer Svensson, ETRI Journal, vol.33, no.3, June 2011, pp.335-343.

DOI:10.4218/etrij.11.0110.0386
[PDF Full-Text (1,141KB)] [Scanned PDF (5,050KB)]

Coded and Scalar Prefix Trees: Prefix Matching Using the Novel Idea of Double Relation Chains
Mohammad Behdadfar, Hossein Saidi, Massoud Reza Hashemi, and Ying-Dar Lin, ETRI Journal, vol.33, no.3, June 2011, pp.344-354.

DOI:10.4218/etrij.11.0110.0381
[PDF Full-Text (816KB)] [Scanned PDF (5,572KB)]

New Approach to Inter-domain Multicast Protocols
Raquel Perez Leal, Juan A. Cachinero, and Encarna Pastor Martin, ETRI Journal, vol.33, no.3, June 2011, pp.355-365.

DOI:10.4218/etrij.11.0110.0405
[PDF Full-Text (1,415KB)] [Scanned PDF (6,595KB)]

Low-Power, All Digital Phase-Locked Loop with a Wide-Range, High Resolution TDC
YoungGun Pu, AnSoo Park, Joon-Sung Park, and Kang-Yoon Lee, ETRI Journal, vol.33, no.3, June 2011, pp.366-373.

DOI:10.4218/etrij.11.0110.0295
[PDF Full-Text (829KB)] [Scanned PDF (3,634KB)]

An Internal Pattern Run-Length Methodology for Slice Encoding
Lung-Jen Lee, Wang-Dauh Tseng, and Rung-Bin Lin, ETRI Journal, vol.33, no.3, June 2011, pp.374-381.

DOI:10.4218/etrij.11.0110.0319
[PDF Full-Text (367KB)] [Scanned PDF (3,822KB)]

Streaming RFID: Robust Stream Transmission over Passive RFID
Seok Joong Hwang, Youngsun Han, Seon Wook Kim, and Jong-Ok Kim, ETRI Journal, vol.33, no.3, June 2011, pp.382-392.

DOI:10.4218/etrij.11.0110.0458
[PDF Full-Text (1,045KB)] [Scanned PDF (6,361KB)]

Design of Two-Stage Class AB CMOS Buffers: A Systematic Approach
Antonio Lopez Martin, Jose Maria Algueta Algueta, Lucia Acosta, Jaime Ramirez-Angulo, and Ramon Gonzalez Carvajal, ETRI Journal, vol.33, no.3, June 2011, pp.393-400.

DOI:10.4218/etrij.11.0110.0465
[PDF Full-Text (1,254KB)] [Scanned PDF (5,459KB)]

A Fast Normalized Cross Correlation-Based Block Matching Algorithm Using Multilevel Cauchy-Schwartz Inequality
Byung Cheol Song, ETRI Journal, vol.33, no.3, June 2011, pp.401-406.

DOI:10.4218/etrij.11.0110.0315
[PDF Full-Text (317KB)] [Scanned PDF (2,950KB)]

Adaptive Online Voltage Scaling Scheme Based on the Nash Bargaining Solution
Sungwook Kim, ETRI Journal, vol.33, no.3, June 2011, pp.407-414.

DOI:10.4218/etrij.11.0110.0417
[PDF Full-Text (667KB)] [Scanned PDF (3,513KB)]

Vision-Based Finger Action Recognition by Angle Detection and Contour Analysis
Daeho Lee, and SeungGwan Lee, ETRI Journal, vol.33, no.3, June 2011, pp.415-422.

DOI:10.4218/etrij.11.0110.0313
[PDF Full-Text (1,926KB)] [Scanned PDF (4,207KB)]

An Adaptive Utterance Verification Framework Using Minimum Verification Error Training
Sung-Hwan Shin, Ho-Young Jung, and Biing-Hwang Juang, ETRI Journal, vol.33, no.3, June 2011, pp.423-433.

DOI:10.4218/etrij.11.0110.0489
[PDF Full-Text (399KB)] [Scanned PDF (5,288KB)]

Differential Fault Analysis for Round-Reduced AES by Fault Injection
JeaHoon Park, SangJae Moon, DooHo Choi, YouSung Kang, and JaeCheol Ha, ETRI Journal, vol.33, no.3, June 2011, pp.434-442.

DOI:10.4218/etrij.11.0110.0478
[PDF Full-Text (1,431KB)] [Scanned PDF (5,573KB)]

Evaluating the Efficiency of Mobile Content Companies Using Data Envelopment Analysis and Principal Component Analysis
Eun Jin Cho, and Myeong Cheol Park, ETRI Journal, vol.33, no.3, June 2011, pp.443-453.

DOI:10.4218/etrij.11.0110.0430
[PDF Full-Text (333KB)] [Scanned PDF (4,700KB)]

Letters

Classification of Degradation Types Based on Distribution of Blocky Blocks for IP-Based Video Services
Kyung-Yeon Min, Seon-Oh Lee, Dong-Gyu Sim, Hyun-Woo Lee, Won Ryu, and Kyoung-Hee Lee, ETRI Journal, vol.33, no.3, June 2011, pp.454-457.

DOI:10.4218/etrij.11.0210.0277
[PDF Full-Text (209KB)] [Scanned PDF (1,682KB)]

A Time-Optimal Anti-collision Algorithm for FSA-Based RFID Systems
Donghwan Lee, Jihoon Choi, Wonjun Lee, Sangheon Pack, Ding-Zhu Du, and Sangjin Hong, ETRI Journal, vol.33, no.3, June 2011, pp.458-461.

DOI:10.4218/etrij.11.0210.0243
[PDF Full-Text (245KB)] [Scanned PDF (1,922KB)]

Millimeter-Wave High-Linear CMOS Low-Noise Amplifier Using Multiple-Gate Transistors
Jihoon Kim, Wooyeol Choi, Abdus Samad Quraishi, and Youngwoo Kwon, ETRI Journal, vol.33, no.3, June 2011, pp.462-465.

DOI:10.4218/etrij.11.0210.0235
[PDF Full-Text (331KB)] [Scanned PDF (1,592KB)]

Fine-Grained FSMD Power Gating Considering Power Overhead
Chi-Hoon Shin, Myeong-Hoon Oh, Jae-Woo Sim, Jae-Chan Jeong, and Seong Woon Kim, ETRI Journal, vol.33, no.3, June 2011, pp.466-469.

DOI:10.4218/etrij.11.0210.0328
[PDF Full-Text (255KB)] [Scanned PDF (1,955KB)]

Blackbox and Scenario-Based Testing of Online Games Using Game Description Language
Chang-Sik Cho, Dong-Chun Lee, Kang-Min Sohn, Chang-Joon Park, and Ji-Hoon Kang, ETRI Journal, vol.33, no.3, June 2011, pp.470-473.

DOI:10.4218/etrij.11.0210.0172
[PDF Full-Text (1,268KB)] [Scanned PDF (2,475KB)]

Dr. Markus says:

IEEE Communications Letters very scam journal

Vol.15 No.5
May 2011

——————————————————————————–
FEATURE ARTICLES

Improved Nyquist Filters with Piece-Wise Parabolic Frequency Characteristics
Nicolae Dumitru Alexandru and Alexandra Ligia Onofrei Balan

Computationally Efficient Modulation Level Classification Based on Probability Distribution Distance Functions
Paulo Urriza, Student Member, IEEE, Eric Rebeiz, Student Member, IEEE, Przemyslaw Pawelczak, Member, IEEE, and Danijela vCabric

An Accurate and Efficient Approximation to the Gaussian Q-Function and its Applications in Performance Analysis in Nakagami-m Fading
Qinghua Shi and Y. Karasawa

Blind Multiuser Detection Based on Tikhonov Regularization
Li Hu, Xiyuan Zhou, and Liwei Zhang

Capacity Scaling of Infrastructure-Supported Erasure Networks
Won-Yong Shin, Member, IEEE, and Ajung Kim, Member, IEEE

User in the Loop: Mobility Aware Users Substantially Boost Spectral Efficiency of Cellular OFDMA Systems
Rainer Schoenen, Halim Yanikomeroglu, and Bernhard Walke

Game-Theoretic Approach for Primary-Secondary User Power Control Under Fast Flat Fading Channels
M. Alayesh and N. Ghani

A QoE-Oriented Strategy for OFDMA Radio Resource Allocation Based on Min-MOS Maximization
Claudio Sacchi, Senior Member, IEEE, Fabrizio Granelli, Senior Member, IEEE, and Christian Schlegel, Fellow, IEEE

Dynamic Resource Allocation for Real-Time Services in Cooperative OFDMA Systems
Danhua Zhang, Xiaoming Tao, Jianhua Lu, Senior Member, IEEE, and Meng Wang

Incentivising Fairness and Policing Nodes in WiFi
Ian Dangerfield, David Malone, and Douglas J. Leith

Interference-Limited Relaying Transmissions in Dual-Hop Cooperative Networks over Nakagami-m Fading
Daniel Benevides da Costa, Member, IEEE, Haiyang Ding, and Jianhua Ge

Average Energy Efficiency Contours with Multiple Decoding Policies
A. Akbari, Student Member, IEEE, M. A. Imran, R. Hoshyar, Member, IEEE, A. Amich, Student Member, IEEE, and R. Tafazolli, Member, IEEE

Maximal Ratio Diversity Combining Enhanced Security
Fangming He, Member, IEEE, Hong Man, Senior Member, IEEE, and Wei Wang, Member, IEEE

Asymptotic Performances of Near-Optimal Selective Distributed Beamforming for Two-Way Relaying with Partial Channel State Information
Jung-Bin Kim, Member, IEEE, In-Ho Lee, Member, IEEE, Dongwoo Kim, Senior Member, IEEE, and Jaesung Lim, Member, IEEE

Cross-Layer User Pairing for CSM in IEEE 802.16 Networks
Nikunj Aggarwal, R. Saravana Manickam, and C. Siva Ram Murthy

Spatial False Alarms in Cognitive Radio
Weijia Han, Jiandong Li, Qin Liu, and Linjing Zhao

Adaptive Polling Enhances Quality and Energy Saving for Multimedia over Bluetooth
David Contreras and Mario Castro

Theoretic Analysis of IEEE 802.11 Rate Adaptation Algorithm SampleRate
Jianhua He, Wenyang Guan, Lin Bai, and Kai Chen

On the Secrecy Rate of Multi-Antenna Wiretap Channel under Finite-Alphabet Input
Shafi Bashar, Student Member, IEEE, Zhi Ding, Fellow, IEEE, and Chengshan Xiao, Fellow, IEEE

Joint Temporal and Spatial Sensing Based Cooperative Cognitive Networks
Chen PeiPei and Zhang QinYu, Member, IEEE

Optimal Linear MMSE Beamforming for Two Way Multi-Antenna Relay Systems
Gen Li, Ying Wang, Member, IEEE, and Ping Zhang, Member, IEEE

The Effects of Narrowband Interference on Finite-Resolution IR-UWB Digital Receivers
Chao Zhang, Huarui Yin, Member, IEEE, and Pinyi Ren, Member, IEEE

An Effective 16-bit Random Number Aided Query Tree Algorithm for RFID Tag Anti-Collision
Ching-Nung Yang, Senior Member, IEEE, and Jyun-Yan He

Diversity-Multiplexing Tradeoff in the Low-SNR Regime
Sergey Loyka and Georgy Levin

Energy-Efficient Spectrum Sensing and Transmission for Cognitive Radio System
Yuan Wu and Danny H. K. Tsang

Demonstration of Spectrum Sensing with Blindly Learned Features
Peng Zhang, Student Member, IEEE, Robert Qiu, Senior Member, IEEE, and Nan Guo, Senior Member, IEEE

Chunk-Based Resource Allocation in Multicast OFDMA Systems with Average BER Constraint
Vasileios D. Papoutsis, Student Member, IEEE, and Stavros A. Kotsopoulos

Fusion Based 3D Tracking of Mobile Transmitters via Robust Set-Valued State Estimation with RSS Measurements
Pubudu N. Pathirana, Senior Member, IEEE, Samitha W. Ekanayake, and Andrey V. Savkin, Senior Member, IEEE

Improved Stopping Set Elimination by Parity-Check Matrix Extension of LDPC Codes
Saejoon Kim, Member, IEEE, Jun Heo, Member, IEEE, and Hyuncheol Park, Member, IEEE

Searching for New Convolutional Codes using the Cell Broadband Engine Architecture
Daniel Johnsson, Fredrik Bjärkeson, Martin Hell, and Florian Hug

Mismatched Bit-Interleaved Coded Noncoherent Orthogonal Modulation
Trung Thanh Nguyen, Student Member, IEEE, and Lutz Lampe, Senior Member, IEEE

A Concise Representation for the Soft-in Soft-out LMMSE Detector
Qinghua Guo, Member, IEEE, and Defeng David Huang, Senior Member, IEEE

On Transmission Efficiency for Wireless Broadcast Using Network Coding and Fountain Codes
Hoang D. T. Nguyen, Le-Nam Tran, Member, IEEE, and Een-Kee Hong, Senior Member, IEEE

Performance Analysis of DHT-Based Optical OFDM Using Large-Size Constellations in AWGN
Michela Svaluto Moreolo, Member, IEEE

Adaptive Clock Recovery Mechanism Having Dynamic Frequency Drift and Buffer Level Control in Packet Switched Networks
Hakjeon Bang, Jong-Oh Choi, Seong-Ro Lee, and Chang-Soo Park, Member, IEEE

An Initial Evaluation of Energy Efficient Ethernet
P. Reviriego, Member, IEEE, K. Christensen, Senior Member, IEEE, J. Rabanillo, and J. A. Maestro, Member, IEEE

Optimizing Node Capacity in Multilayer Networks
Iyad Katib, Student Member, IEEE, and Deep Medhi, Senior Member, IEEE

A Power Saving Model for Burst Transmission in Energy-Efficient Ethernet
Sergio Herrer?a-Alonso, Miguel Rodr?guez-P?rez, Member, IEEE, Manuel Fern?ndez-Veiga, Member, IEEE, and C?ndido L?pez-Garc?a

Analytical Evaluation of a HIP Registration Enhancement for NEMO Scenarios
Nerea Toledo, Member, IEEE, Marivi Higuero, Eduardo Jacob, Member, IEEE, and Jon Matias

Probing for Loss: The Case Against Probe Trains
Francois Baccelli, Sridhar Machiraju, Darryl Veitch, Fellow, IEEE, and Jean Bolot

Journal of Computer Science and Engineering (user link) says:

List of Unfereed Papers, No value papers

Anyone, try this, send them any sort of stupid paper, the journal will accept and will ask you to give MONEY.

Papers published by this journal has not value. The journal is already blacklisted by many universities.

Journal of Computer Science and Engineering
Email: editor.jcse@gmail.com

LIST OF UNREFEREED PAPERS, NO REVIEW, WASTE PUBLICATIONS

https://sites.google.com/site/jcseuk/volume-7-issue-2-june-2011

An Efficient Sampling Algorithm on Data Streams to Improve Closed Frequent Itemsets Mining Algorithms Results [Full Text]

Mohammad Saniee Abadeh and Mansour Tarafdar

——–

Facing the Duplicates in a Greek Hospital Information System [Full Text]

E. Mourtou

——–

Implementation of Approximate Reasoning Techniques using Vague Logic [Full Text]

Supriya Raheja, Reena Dadhich and Smita Rajpal

——–

A Hybrid of Simulated Annealing and Fuzzy Data Mining Approach for Concept Extraction from Databases [Full Text]

Ayoub Bagheri, Maryam Zekri and Mohammad-A. Rigi

——–

Spoofing A threat to Biometric Systems [Full Text]

Kezia R Badhiti and Prof.Sudha Thatimakula

——–

Design and Analysis of Using a Programmable Network Interface for High Speed Networks beyond the 10 Gbps [Full Text]

Mohamed Elbeshti1 , Michael Dixon and Terry Koziniec

——–

Design and Implementation of Extendable Media Streaming Application: Case Study of Windows 2003 Voice Recorder [Full Text]

Ezekiel U. Okike and Ayorinde Afolayan

——–

Development and Deployment of Fixed Wireless Access in South West Nigeria: Performance and Evaluation [Full Text]

Oluwaranti Adeniran and Achimugu Philip

——–

TD-PSOLA Based Emotional Speech Generation [Full Text]

A. Manpreet Kaur and B. Parminder Singh

——–

The Impact of Information Technology in Nigeria?s Banking Industry [Full Text]

Oluwagbemi Oluwatolani, Abah Joshua and Achimugu Philip

——–

Development of a Window Based Security System for Electronic Data Interchange [Full Text]

Achimugu Philip, Oluwagbemi Oluwatolani and Abah Joshua

The Electronic Data Interchange (EDI) is the exchange of standardized documents between computer systems for business use. The objective of this study is to make Electronic Data Interchange secure to use and to eliminate human intervention in the transfer of data between business partners so that productivity and efficiency can be improved and also promote its usage between two or more trading organizations. This paper provides an overview of EDI by describing the traditional problems of exchanging information in business environments and how the EDI solves those problems and gives benefits to the company that makes use of EDI. This paper also introduces the common EDI Standards and explains how it works, how it is used over the internet and the security measures implemented. The system was executed on both local area network and wide area network after a critical study of the existing EDI methods and also implemented using VB.Net programming language. Finally, an interactive program was developed that handles the transfer of files, with special attention to the security of the items that are being transferred from one computer workstation to another.

—————

Their account details:

Name of Account: Chandramah Appadoo
Bank Name: National Westminster Bank
IBAN: GB90NWBK60193932123191
Swift Code: NWBKGB2L
Sort Code: 60-19-39
Bank Address: Southall Branch, 69 The broadway, Southall,
Middlessex, UB1 1LD,UK
—————

Source: http://fakejournalss.wordpress.com/2011/07/20/list-of-unrefereed-papers-no-review-waste-publications-journal-of-computer-science-and-engineering/

Science Academy Publisher (user link) says:

Science Academy Publisher - Fake and Low Quality Journals

Science Academy Publisher – A curse for academics
http://sciacademypublisher.com

We recently came across a “publisher”, or better we would say a “one-man show’, here are the list of journals this person proposed to the community. Most of the papers published appears legit and most of them appears to be low quality articles.

As expected, NO REVIEW is done AT ALL. Not sure? Try it by yourself. Send them any paper and wait a few days to receive an email asking you that your paper has been accepted and to pay.

Below are the list of journals that have already been BLACKLISTED in several universities. Publication in these journals have NO VALUE!!!!

Email: sciencepublisher@gmail.com

International Journal of Research and Reviews in Computer Science (IJRRCS) 2079-2557

International Journal of Research and Reviews in Wireless Communications (IJRRWC) 2046-6447

International Journal of Research and Reviews in Information Sciences (IJRRIS) 2046-6439

International Journal of Research and Reviews in Software Engineering (IJRRSE) 2046-6188

International Journal of Research and Reviews in Artificial intelligence (IJRRAI) 2046-5122

International Journal of Research and Reviews in Computing Engineering (IJRRCE) 2046-5130

International Journal of Research and Reviews in Next Generation Networks (IJRRNGN) 2046-6897

International Journal of Research and Reviews in Wireless Sensor Networks (IJRRWSN) 2047-0037

International Journal of Research and Reviews in Ad hoc Networks (IJRRAN) 2046-5106

International Journal of Research and Reviews in Information Security and Privacy (IJRRISP) 2046-5718

International Journal of Research and Reviews in Information Technology (IJRRIT) 2046-6501

International Journal of Research and Reviews in Soft and Intelligent Computing (IJRRSIC) 2046-6412

International Journal of Research and Reviews in Electrical and Computer Engineering (IJRRECE) 2046-5149

International Journal of Research and Reviews in Mechatronic Design and Simulation (IJRRMDS) 2046-6234

International Journal of Research and Reviews in Signal Acquisition and Processing (IJRRSAP) 2046-617X

Science Academy Transactions on Computer and Communication Network (SATCCN) 2046-5157

Science Academy Transactions on Renewable Energy Systems Engineering and Technology (SATRESET) 2046-6404

Source: http://fakejournalss.wordpress.com/2011/07/24/science-academy-publisher-a-curse-for-academics/

expert author (user link) says:

100 % FAKE

unfortunately? i saw many writers are throwing Mr. Peter Din regarding the(International Journal of Computer Science Issues, by bad words and ill-behavior, because most of u have know experience of realizing real papers.
1. the journal said that is indexed in Scopus-Elsevier!!!
very easy simple clarification? just take the ISSN number and check your self!
2. paper said it has impact factor 0.242 which is pure fake,
go and check this journal in impact factor journals website
than if you know how to calculate the IF then you will confirm it is purely fake.
but, i am paying concern about your situations!!! because all of you have papers in that journal and sure you will defense for that wither is true or fake. i wish all of you wake up early.
regards

Julie Webster says:

More Fake Journals

hey check out IDOSI, MAXWEllSCI and ScienceHUβ

They claim to be foreign publishers but are low level people sitting somewhere in rural pakistan. i dont think they even know anything about publishing

Unfortunately i have had the experience in dealing with them.

My advice to all is NEVER to get your research published there.

http://scihub.org/
http://idosi.org
http://www.maxwellsci.com/

regards,
Julie

Leave a Reply to Anonymous Coward Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...