Categories
research stuff sharing

Tips terbitkan journal percuma di Scopus dan WoS

Hai semua, saya ingin kongsikan beberapa intipati penting yang dapat saya simpulkan dari kelas seminar yang telah saya sertai. Menerbitkan jurnal dalam pangkalan data terindeks seperti Scopus atau Web of Science secara percuma memerlukan strategi yang teliti. Berikut adalah beberapa tips yang boleh membantu:

  • Pilih Jurnal yang Relevan dan Terindeks Scopus/WoS. Semak jurnal yang tidak mengenakan yuran penerbitan. Terdapat juga jurnal yang ditaja oleh universiti atau organisasi yang tidak memerlukan bayaran penerbitan.
  • Gunakan pangkalan data rasmi seperti laman web Scopus atau WoS untuk mencari jurnal yang benar-benar relevan dengan bidang kajian yang dipilih. Pastikan bahawa jurnal masih pada talian di senarai terindeks dan bukan ‘predatory journal’.
  • Kenali Skop dan Panduan Jurnal Pengarang. Ikuti panduan penulis dengan teliti untuk memastikan bahawa format dan struktur manuskrip anda sesuai. Lakukan kajian kecil dan buang masa apabila kajian anda tidak sesuai dengan panduan mereka. Anda boleh pilih manuskrip yang lebih kurang kajian – yang telah diterbit oleh jurnal tersebut dan kemudian anda cuba ikut strukturnya.
  • Pastikan kajian anda sesuai dengan skop jurnal setiap jurnal mempunyai bidang kajian yang diterima. Ini meningkatkan peluang anda diterima.
  • Penulisan Manuskrip Berkualiti Tinggi. Pastikan kajian adalah asli dan memberi pengetahuan baru kepada bidang kajian, memudahkan penerimaan manuskrip. Manuskrip yang jelas dan tidak mempunyai kesalahan tatabahasa dan teknikal lebih mudah diterima. Lakukan sebanyak yang boleh penyuntingan dan semakan dalaman sebelum penghantaran. Gunakan tatabahasa dan perisian seperti Grammarly. Boleh juga hantar kepada proofreader seperti Proofreader by UK, Math Proofreader dan Proofreader Malaysia.
  • Proses semakan memerlukan masa. Sebaiknya, rancang dengan baik apabila menghantar manuskrip kerana semakan boleh mengambil masa beberapa bulan. Pastikan tarikh penghantaran anda sesuai dengan jadual tersebut.
  • Hindari menghantar ke banyak jurnal serentak. Kebanyakan jurnal tidak membenarkan penghantaran ke jurnal lain secara serentak, jadi penting untuk menghormati peraturan ini. Ia adalah melanggar etika jika anda bertindak menghantar serentak jurnal.
  • Berhati-hatilah dengan jurnal predatory yang meminta bayaran penerbitan tanpa menjalankan proses semakan yang teliti. Sentiasa semak kesahihan jurnal dengan memastikan mereka tersenarai dalam pangkalan data rasmi. Anda boleh rujuk penulisan saya yang terdahulu: https://nuuralifahroslan.com/2021/06/24/predatory-journals/)
  • Walaupun kebanyakan jurnal akses terbuka mengenakan bayaran penerbitan, terdapat juga yang menawarkan penerbitan secara percuma. Anda boleh mencari jurnal-jurnal ini melalui laman web seperti Directory of Open Access Journals (DOAJ)

Bagaimana cara untuk mengenalpasti jurnal percuma ?

Cara kenal pasti journal tersebut tawarankan Open Access (OA) atau Percuma, juga boleh dilakukan dengan access kepada pangkalan data seperti Scopus, Web of Science dan Elsevier Journal Finder. Kemudian pilih bidang yang anda inginkan. Kebanyakan journal OA ada dinyatakan Open Access atau icon lock. Jika tidak dinyatakan, maka journal tersebut ada menawarkan penerbitan secara percuma.

Semoga membantu!

* Semasa bengkel ini, pengajar menunjukkan kaedah pencarian jurnal percuma dalam database jurnal yang dinyatakan diatas. Bengkel yang sangat berbaloi untuk pelaburan ilmu.

Categories
research stuff

Writing & Get Published in High Impact Journal

By, Assoc. Prof Dr. Fatimah Khalid

Identifying Suitable Journal and Understanding Quartiles Ranking

ERA (Excellence in Research for Australia)

Overview:
ERA is an Australian research evaluation framework that assesses research quality within Australia’s higher education institutions. It was developed by the Australian Research Council (ARC).

Key Points:

  • Purpose: To evaluate the quality of research conducted at Australian universities and other research institutions.
  • Method: ERA collects data on research outputs, such as publications, from universities. These outputs are then reviewed by committees of experts.
  • Use: The results are used to inform government funding decisions and provide a benchmark for research performance.

ESCI (Emerging Sources Citation Index)

Overview:
ESCI is part of the Web of Science Core Collection, managed by Clarivate Analytics. It includes high-quality, peer-reviewed publications of regional importance and in emerging scientific fields.

Key Points:

  • Purpose: To extend the coverage of Web of Science by including journals that are not yet indexed in the more selective databases such as SCI, SSCI, or AHCI.
  • Criteria: Journals must be peer-reviewed, follow ethical publishing practices, and have a significant contribution to their field.
  • Benefits: Inclusion in ESCI provides increased visibility and accessibility for journals, often serving as a stepping stone to being indexed in more selective databases.

JCR (Journal Citation Reports)

Overview:
JCR, also managed by Clarivate Analytics, provides an annual update of the impact factors for scientific journals. It is one of the most widely recognized tools for assessing the relative importance of journals within their field.

Key Points:

  • Impact Factor: JCR calculates the impact factor of journals, which is a measure of the average number of citations received in a particular year by papers published in the journal during the two preceding years.
  • Categories: Journals are categorized by subject area, allowing for comparisons within specific fields.
  • Use: Researchers, institutions, and librarians use JCR to evaluate and compare journals, often influencing decisions on where to publish research.

Each of these indexing systems serves different purposes and audiences, contributing to the overall landscape of academic research evaluation and dissemination.

Journal Citation Reports (JCR) categorizes journals into quartiles based on their impact factor within specific subject categories. These quartiles provide a comparative ranking system, allowing researchers to assess the relative standing of a journal in its field. The quartiles are divided as follows:

Quartile Rankings

  • Q1 (First Quartile):
  • Represents the top 25% of journals in a specific subject category.
  • Journals in this quartile have the highest impact factors within their field.
  • Often considered the most prestigious and influential journals.
  • Q2 (Second Quartile):
  • Represents the 25% to 50% range of journals in a specific subject category.
  • Journals in this quartile have above-average impact factors but are not as highly ranked as Q1 journals.
  • Still considered reputable and well-regarded.
  • Q3 (Third Quartile):
  • Represents the 50% to 75% range of journals in a specific subject category.
  • Journals in this quartile have below-average impact factors.
  • They are considered less influential compared to Q1 and Q2 journals but still contribute valuable research.
  • Q4 (Fourth Quartile):
  • Represents the bottom 25% of journals in a specific subject category.
  • Journals in this quartile have the lowest impact factors within their field.
  • They are considered the least influential but still serve a purpose in disseminating research.

Importance of Quartiles

  • Reputation and Prestige: Journals in higher quartiles (Q1 and Q2) are generally perceived as more prestigious, and publishing in these journals can enhance the reputation of researchers and institutions.
  • Research Impact: Higher quartile journals tend to have a broader readership and higher citation rates, potentially increasing the visibility and impact of published research.
  • Funding and Career Advancement: Publishing in higher quartile journals can positively influence grant applications, tenure decisions, and career advancements for researchers.

Determining Quartiles

  • Impact Factor Calculation: The impact factor is calculated by dividing the number of citations in a given year to articles published in the journal during the two preceding years by the total number of articles published in the journal during those two years.
  • Subject Categories: Journals are categorized into specific subject areas, and quartiles are determined within these categories to ensure a fair comparison among journals with similar research focuses.

By understanding quartile rankings, researchers can make informed decisions about where to publish their work and how to evaluate the impact of journals within their field.

Scopus Indexing

Overview:

  • Scopus indexes peer-reviewed journals, conference proceedings, trade publications, and book series across various disciplines, including science, technology, medicine, social sciences, and arts and humanities.
  • It aims to provide a comprehensive view of the world’s research output, including both high-impact and regionally significant journals.

Inclusion Criteria:

  • Peer Review: The journal must have a robust peer review process to ensure the quality and reliability of published research.
  • Regular Publication: The journal should be published regularly and follow ethical publishing practices.
  • International Diversity: The editorial board and authors should represent a diverse, international community.
  • Content Quality: The journal’s content should be relevant, original, and contribute significantly to its field.

JCR versus Scopus

JCR: Provides a highly selective view of journal impact with detailed citation metrics, focusing on high-impact journals primarily in sciences and social sciences.

Scopus: Offers a broader view of academic research across disciplines, including a wide variety of publication types and extensive citation data.

Determining the Suitable Journal

Make your own journal target and identify the publication charge, publisher and time taken to publish.

A very insightful seminars. Hopefully I manage to publish my journals paper in an indexed journals this year!

Categories
research stuff

2022 Publication

Alhamdulillah, my journal paper accepted. Tittle “Systematic Literature Review and Analysis for Arabic Text Steganography Method Practically ” . Hopefully this journal manuscripts benefits researcher especially who is interested into Arabic Text Steganography (ATS). Feel free to cite our works. Thank you to my co-authors for the supportive, materials and encouragement till the work is published.

Categories
research stuff

Is Artificial Intelligence the “new” Operating System?

Prof. Omer RANA – Cardiff University, UK (Guest Speaker) Presentation

Categories
research stuff

Predatory Journals

Hai ^^ how’s your day? Hopefully full of excitement and always in a pink of health. Today I would like to share about Predatory journals.

What is the Predatory journals?

Predatory journals are unscrupulous entities that prioritize profit over academic rigor and ethical standards. Unlike reputable journals, which subject submissions to rigorous peer review, these journals often bypass or entirely skip this crucial step. Their primary goal is to collect author fees, known as article processing charges (APCs), without ensuring the quality of the work they publish. As a result, the articles published in predatory journals may be poorly researched, lack scholarly merit, or even be outright fraudulent.

Characteristics of Predatory Journals

Recognizing predatory journals can be challenging, especially for early-career researchers or those unfamiliar with the landscape of academic publishing. However, several red flags can help identify them:

  1. Lack of Peer Review: Reputable journals typically conduct a thorough peer review process, where experts in the field evaluate the quality and originality of the submitted research. Predatory journals either conduct superficial reviews or skip this step entirely.
  2. Aggressive Solicitation: Predatory journals often engage in aggressive email campaigns to solicit submissions, promising quick publication or offering to publish in exchange for a fee. They may target researchers with flattering emails that encourage submissions without providing evidence of their legitimacy.
  3. High Fees with Little Transparency: While many reputable open-access journals charge APCs, predatory journals often demand exorbitant fees without disclosing them upfront. Additionally, they may lack transparency regarding their pricing structure and editorial process.
  4. Inaccurate Indexing Claims: Predatory journals may falsely claim to be indexed in reputable databases such as Scopus or Web of Science. A thorough check of these databases can help verify the journal’s authenticity.
  5. Lack of Reputable Editorial Board: A genuine journal will list an editorial board consisting of respected scholars in the field. Predatory journals may list fake or unqualified individuals as editors or omit this information altogether.

Please do be careful with those journals and of course it will come with a consequences.

Why Are Predatory Journals Harmful?

The consequences of publishing in a predatory journal can be severe. For researchers, it can damage their reputation, as their work may not be considered credible if published in a low-quality outlet. Additionally, since predatory journals do not provide proper peer review, the research may contain errors, making it unreliable for future scholars. In extreme cases, these journals may even retract published articles without the author’s consent.

Moreover, the presence of predatory journals dilutes the academic literature with poorly vetted or fraudulent research, which can mislead policymakers, practitioners, and the public. This has far-reaching implications, particularly in fields like medicine, where inaccurate information could influence clinical decisions.

How to Avoid Predatory Journals

To avoid falling into the trap of predatory journals, researchers should carefully evaluate any publication they are considering submitting to. A few key steps include:

  • Check Reputable Indexes: Ensure the journal is listed in recognized databases such as the Directory of Open Access Journals (DOAJ), Scopus, or Web of Science.
  • Evaluate the Editorial Board: Look for a credible editorial board with recognized experts in the field. If the editors are not well-known or their qualifications are questionable, it may be a red flag.
  • Research the Journal’s Reputation: Look for reviews or discussions about the journal online. Academics often share their experiences with predatory journals on forums or social media.
  • Review the Peer-Review Process: Make sure the journal clearly outlines its peer-review process and adheres to ethical publishing standards.

Where to check the Predatory Journals ?

Beall’s List is one of a platform you can use to check the predatory journals.

Categories
research stuff

Applied Science Journal

All Praise to God. Today, my colleague conveyed the good news to me via WhatsApp. Her journal paper was accepted and will be published in Applied Science Journal. It was such hard work from her. She always keeps updated and does follow-up on the journal revisions. I was part of the journal team by providing her with the related materials for the papers. However, most of the writing and editing were truly from her and the rest of the authors.

Congratulations, Reema Thabit ^^. Her journal is entitled “A Comparative Analysis of Arabic Text Steganography”. The research paper is a very useful journal for beginners in understanding the Arabic Text Steganography method and technique.

Categories
research stuff

Research Gate

Hi there ^^ I just found out a great place to have a research networking and publish all your research papers. It’s Research Gate! You can visit the following link; https://www.researchgate.net

“Research Gate is a professional network for scientists and researchers. Over 20 million members from all over the world use it to share, discover, and discuss researches. ” – researchgate.net

Each researcher will have their own profile to ‘dump’ all their research works. Through there, they can build a huge network within their specialities and expertise. You may gather all your journal papers so that it would be an acknowledgement and to promote the journals to be cited.

This link is my research gate profile where you may add to your network if its is related to your areas of interest. ^^

https://www.researchgate.net/profile/Nuur_Alifah_Roslan

Categories
research stuff

Crytography Vs Steganography

Hai! Today we would discuss about the differences between steganography and cryptography. You may refer this previous posting as a brief introduction to Steganography. 

Introduction to Steganography

Okay! how about Cryptography?

Cryptography was popular with the jargon text which is only can be conceal with its secret key. Only the one that can break the secret key and resolve the jargon text into a readable message can have the secret message. 

In this case, the jargon text which is unreadable text such as ” hfuiafuwefhw” for example is call a ciphertext. They was publicly exposed to everybody during transmission or communication. Which create suspicious and this make anyone would like to decode it. If we compare it with the text steganography, the message is readable and unsuspicious. Since everyone can read, encoding text in neutral sentences is doubly effective. Only receiver know what the secret message written.

Ok now, I give a clearly example. You as the receiver, I give this key as a clue to conceal the secret text message. In the above paragraph, I did a simple text steganography.

Clue: In the fifth sentence. Combine each 1st letter to create a secret sentence. 

Answer:

Fifth sentence:

Since everyone can read, encoding text in neutral sentences is doubly effective.

Combine each 1st letter to create a secret sentence. 

Since everyone can read, encoding text in neutral sentences is doubly effective.

secret inside

This is the simplest way to explain what is steganography and the difference between cyrptography.

There was much more interesting information I would like to share with. Stay tune with my next posting.

Bye!

 

Categories
research stuff

Multimedia Security

When we talk about Multimedia security, commonly, it is related to intellectual properties and copyright issues. Today, information technology emerges widely in many sectors, including business and corporates. For the industry to successfully deploy any multimedia media services, it is crucial to ensure multimedia data’s confidentiality, integrity, and availability. Therefore, Multimedia Security plays such an important role to guard valuable data.

The most popular method and commonly used in Multimedia security is digital watermarking. This technique was derived from the basic steganography model, which sits under the sub-discipline of information hiding. 


Stay tuned for more detailed information about multimedia security in my next posting 🙂

Bye!

Categories
research stuff

Steganography

Steganography was a very uncommon and unique sub discipline in Information Security. It is unlike their famous cousin, Cryptography – always gets the spotlight. Yup, it even gets the most credit in many well-known Hollywood movies. I am sure that almost everyone has watched the Da Vinci Code movie, am I right?

14 years ago, It is a year I decide to pursue my Master of Science by research. I met my supervisor, Professor Ramlan Mahmod, and voiced out my intention. When I proposed this topic to him, it was such a nerve-breaking feeling. Why? Steganography is such a baby area (in Malaysia), and this field does not have much expertise in Malaysia. His PhD student and I were the pioneers for this field in UPM.

Nevertheless, I took it as a challenge ^^, and I signed an agreement to complete the research till PhD. There was no U-turn for this agreement~ haha. Yet, I never regret it.

What is this so unfamiliar jargon? Let’s dig deeper.

Steganography is an art of science which existed a long time ago, before the century. But it was not in the Dinosaur era ya, of course. The word Steganography was derived from ancient Greek. Stegano means hiding, and graphy means images. Therefore, the meaning of Steganography brings to “hide into an image”. Surprisingly, this method is commonly used for military purposes.

Throughout history, Steganography was used to send a secret message and to have a secret communication. The first example of this ancient technique was used by a Greek general who wrote confidential information on the shaved head of a trusted messenger and sent him to the receiver once his hair had fully grown back to hide the message completely.

This technique has crossed my mind, which during my childhood, I had a sort of similar secret communication role play. We used lime juice ink, refilled the ink pen, and then wrote a secret message on a piece of white paper. If you look into it with naked eyes, the paper appears to be blank – nothing was written there. However, if you hold it up under the sun and see through it, the written secret message will appear. Aha! Things are getting more exciting, right? 🙂

These are some stories from the past that I want to share, which are related to Steganography in the force and military area:

The technique has evolved over time, and during World War 2, the German army used invisible ink to write secret information in their covert communications. The fundamental of steganography elements comprises a secret message and a cover medium in which various techniques are used to embed the former into the latter. The steganography media will be the result of the combination between the secret message and the cover medium. Then, the secret communication is completed by sending the steganography media to the other parties with a key or technique to reveal the secret message. Only the recipient knows the keys or the technique used to conceal the secret message. On the other hand, the stego object has to have a high degree of perceptual transparency not to raise any public suspicion during transmission. [1]

Today in the digital era, the medium for hiding the secret message has been digitalized. Secret communication is now in the form of multimedia. It can be digital text, images, sound (audio) or even animation (video). The most popular technique is hiding digital text into digital images by using a specific algorithm. This is what we call the beauty of art and science 🙂

The following figure is to illustrate the basic diagram for the new modern Steganography simply.

Figure 1 : Modern Steganography (Source: N. A Roslan, 2018)

However, what the difference between steganography and cryptography? Read over my next posting for more eureka information!

See you! Bye 🙂

References: N.A Roslan, 2018, “Character Properties Method with Biometric Multifactor Authentication for Arabic Text Steganography”, Doctor of Philosophy, Universiti Putra Malaysia