scispace - formally typeset
Search or ask a question
Author

Mehdi Dadkhah

Bio: Mehdi Dadkhah is an academic researcher from Ferdowsi University of Mashhad. The author has contributed to research in topics: Phishing & Information security. The author has an hindex of 13, co-authored 64 publications receiving 531 citations. Previous affiliations of Mehdi Dadkhah include University of Siena & Islamic Azad University.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: The ranking approach is based on Beall's criteria for detection of predatory journals and it can help editors to improve their journals or convert their questionable journals to non-predatory ones and could help young editors to protect their journals against predatory practice.
Abstract: Predatory journals are a well-known issue for scholarly publishing and they are repositories for bogus research. In recent years, the number of predatory journals has risen and it is necessary to present a solution for this challenge. In this paper, we will discuss about a possible ranking of predatory journals. Our ranking approach is based on Beall’s criteria for detection of predatory journals and it can help editors to improve their journals or convert their questionable journals to non-predatory ones. Moreover, our approach could help young editors to protect their journals against predatory practice. Finally, we present a case study to clarify our approach.

52 citations

Journal ArticleDOI
TL;DR: In this study several soft computing methods are analyzed for robotic gripper applications and extreme learning machine (ELM) and support vector regression (SVR) approach shows the highest accuracy with ELM approach.
Abstract: Adaptive grippers should be able to detect and recognize grasping objects. To be able to do it control algorithm need to be established to control gripper tasks. Since the gripper movements are highly nonlinear systems it is desirable to avoid using of conventional control strategies for robotic manipulators. Instead of the conventional control strategies more advances algorithms can be used. In this study several soft computing methods are analyzed for robotic gripper applications. The gripper structure is fully compliant with embedded sensors. The sensors could be used for grasping shape detection. As soft computing methods, extreme learning machine (ELM) and support vector regression (SVR) were established. Also other soft computing methods are analyzed like fuzzy, neuro-fuzzy and artificial neural network approach. The results show the highest accuracy with ELM approach than other soft computing methods. Controlling input displacement of a new adaptive compliant gripper.This design of the gripper with embedded sensors as part of its structure.To build an effective prediction model of input displacement of gripper.The impact of the variation in the input parameters.

47 citations

Journal ArticleDOI
TL;DR: In this article, the authors introduce an approach to identify this type of journals that will be applicable by researchers in various academic disciplines, which will be used to enhance the academic standards of Universities, especially those that are indexed in websites such as Thomson Reuters.
Abstract: By developing research and academic centers, the number of performed research articles has also increased. On the other hand, publishing the results of these articles in scientific journals shall also grow. In the meantime, researchers are trying to publish the findings of their research in journals which have been approved by one or more international indices so that such findings can be seen. In order to enhance the academic standards of Universities, proper journal choice will be of interest to researchers, especially those that are indexed in websites such as Thomson Reuters. However, certain forgery frauds researchers by launching fake Web sites that have been named by academic journal titles. In this paper, we introduce an approach to identify this type of journals that will be applicable by researchers in various academic disciplines.

38 citations

Journal ArticleDOI
01 Jan 2015
TL;DR: This paper addresses the hijackers themselves, the methods they use to find their victims in the academic world, themethods they used to collect money from unsuspecting researchers by charging them to publish in hijacked journals, how they hide their identities, and how the academicworld can best protect itself from these cyber- criminals.
Abstract: During recent years, the academic world has suffered a lot from the threats of hijacked journals and fake publishers that have called into question the validity and reliability of scientific publications. The purpose of this paper is to tell the in-depth story of hijacked journals. This paper addresses the hijackers themselves, the methods they use to find their victims in the academic world, the methods they use to collect money from unsuspecting researchers by charging them to publish in hijacked journals, how they hide their identities, and how the academic world can best protect itself from these cyber- criminals. Without identifying specific journal hijackers, we tell the story of how an assistant professor of computer and information science from Saudi Arabia (who holds a Ph.D. from a Malaysian university) and his team of Word Press experts from Pakistan hijacked at least six journals including journal of technology, BRI's Journal of Advances in Science and Technology, Magnt Research Report, Scientific Khyber, Saussurea, and created one of the four fake websites for Texas Journal of Science. We also tell the story of how some conferences are integrated with hijacked journals, and how a cybercriminal with a fake address in United Arab Emirates used the pseudonym 'James Robinson' to mass hijack more than 20 academic journals (Journal of Balkan Tribological Association, Scientia Guaianae, Journal of American Medical Association, Cadmo, Entomon, Italianistica, Revue scientifique et technique, Kar- diologiya, Agrochimica, Terapevticheskii Arkhiv, Ama, Tekstil, Fauna Rossii I Sopredel Nykh Stran, Azariana, PSR health research bulletin, etc.). We also address the European cybercriminal with pseudonym 'Ruslan Boranbaev' who hijacked the Archives des Sciences in October 2011 and created the 'Science record journals' (to host three hijacked journals Including 'Science series data report', Innovaciencia, and 'Science and nature'; and seven fake journals) for the first time in the academic world in August 2011. We tell how Ruslan Boranbaev designed a systematic approach to mass hijack more than 25scientific journals, including Bothalia, Jokull, Cienia e tecnica, Wulfenia, Doriana, Revista Kasmera, Mitteilungen Klosterneuburg, Sylwan, HFSP journal, Natura, and Cahiers des Sciences Naturelles. We also tell the story how this genius cybercriminal, whom we could call the king of hijacked journals, created a fake 'web of sciences' portal in 2015 on a dedicated server in France to launch an automated spam broadcasting machine of calls for papers for his hijacked journals. We also present how the Ruslan Boranbaev created numerous online payment portals for collecting the publication charges of hijacked journals, and cheated the Thomson Reuters to provide hyperlinks to the fake website of three hijacked journals in his masterpiece 'revistas-academicas.com'. We also tell the story of how someone adopted the Ruslan Boranbaev approach to cheat the Thomson Reuters to create hyperlinks from master journal list of Thomson Reuters to two of his hijacked journals (GMP review: Allgemeine Forst und Jagdzeitung: http://www.sauerlander-verlag.com). Finally, we present the most comprehensive list of hijacked journals available, including all of those that we have detected from Au- gust 11, 2011 to June 15, 2015.

37 citations

Journal ArticleDOI
TL;DR: Hijacked journals are fake websites of authentic ones, utilizing the title and ISSNs of reputable journals that mimic reputable journals, generally claiming the impact factors that those journals have earned from Thomson Reuters.

36 citations


Cited by
More filters
01 Jan 2012

3,692 citations

01 Jan 2017
TL;DR: In this article, a revisión de literatura with apoyo del análisis de contenido and a modelo de regresión lineal is used to evaluate el nivel de desarrollo de la capacidad de absorción realizada (RACAP) in las Pyme colombianas.
Abstract: El artículo tiene como objetivo evaluar el nivel de desarrollo de la capacidad de absorción realizada (RACAP) en las Pyme colombianas. Se parte de una muestra de 363 Pyme colombianas (Dane,2012), se usa una revisión de literatura con apoyo del análisis de contenido y un modelo de regresión lineal, que permiten mostrar la existencia de una correlación lineal positiva entre la adquisición y asimilación del conocimiento externo en las organizaciones objeto de estudio,. Palabras clave: Capacidades de absorción, capacidades de absorción potencial, medición de las capacidades de absorción ABSTRACT:

296 citations

Journal ArticleDOI
TL;DR: 13 evidence-based characteristics by which predatory journals may potentially be distinguished from presumed legitimate journals are identified may be useful for authors who are assessing journals for possible submission or for others, such as universities evaluating candidates’ publications as part of the hiring process.
Abstract: The Internet has transformed scholarly publishing, most notably, by the introduction of open access publishing. Recently, there has been a rise of online journals characterized as ‘predatory’, which actively solicit manuscripts and charge publications fees without providing robust peer review and editorial services. We carried out a cross-sectional comparison of characteristics of potential predatory, legitimate open access, and legitimate subscription-based biomedical journals. On July 10, 2014, scholarly journals from each of the following groups were identified – potential predatory journals (source: Beall’s List), presumed legitimate, fully open access journals (source: PubMed Central), and presumed legitimate subscription-based (including hybrid) journals (source: Abridged Index Medicus). MEDLINE journal inclusion criteria were used to screen and identify biomedical journals from within the potential predatory journals group. One hundred journals from each group were randomly selected. Journal characteristics (e.g., website integrity, look and feel, editors and staff, editorial/peer review process, instructions to authors, publication model, copyright and licensing, journal location, and contact) were collected by one assessor and verified by a second. Summary statistics were calculated. Ninety-three predatory journals, 99 open access, and 100 subscription-based journals were analyzed; exclusions were due to website unavailability. Many more predatory journals’ homepages contained spelling errors (61/93, 66%) and distorted or potentially unauthorized images (59/93, 63%) compared to open access journals (6/99, 6% and 5/99, 5%, respectively) and subscription-based journals (3/100, 3% and 1/100, 1%, respectively). Thirty-one (33%) predatory journals promoted a bogus impact metric – the Index Copernicus Value – versus three (3%) open access journals and no subscription-based journals. Nearly three quarters (n = 66, 73%) of predatory journals had editors or editorial board members whose affiliation with the journal was unverified versus two (2%) open access journals and one (1%) subscription-based journal in which this was the case. Predatory journals charge a considerably smaller publication fee (median $100 USD, IQR $63–$150) than open access journals ($1865 USD, IQR $800–$2205) and subscription-based hybrid journals ($3000 USD, IQR $2500–$3000). We identified 13 evidence-based characteristics by which predatory journals may potentially be distinguished from presumed legitimate journals. These may be useful for authors who are assessing journals for possible submission or for others, such as universities evaluating candidates’ publications as part of the hiring process.

281 citations

Journal ArticleDOI
TL;DR: It is concluded that predatory publishing is a growing phenomenon that has the potential to greatly affect both bioethics and science at large and what can be done to eliminate or reduce the effects of this development.
Abstract: This paper describes and discusses the phenomenon ‘predatory publishing’, in relation to both academic journals and books, and suggests a list of characteristics by which to identify predatory journals. It also raises the question whether traditional publishing houses have accompanied rogue publishers upon this path. It is noted that bioethics as a discipline does not stand unaffected by this trend. Towards the end of the paper it is discussed what can and should be done to eliminate or reduce the effects of this development. The paper concludes that predatory publishing is a growing phenomenon that has the potential to greatly affect both bioethics and science at large. Publishing papers and books for profit, without any genuine concern for content, but with the pretence of applying authentic academic procedures of critical scrutiny, brings about a worrying erosion of trust in scientific publishing.

109 citations

Journal ArticleDOI
TL;DR: Young and inexperienced authors publishing in a predatory journal must be aware of the damage of their reputation, of inadequate peer review processes and that unprofitable journals might get closed and all published articles in that journal might be lost.
Abstract: The companies publishing predatory journals are an emerging problem in the area of scientific literature as they only seek to drain money from authors without providing any customer service for the authors or their readership. These predatory journals try to attract new submissions by aggressive email advertising and high acceptance rates. But in turn, they do not provide proper peer review, and therefore, the scientific quality of submitted articles is questionable. This is important because more and more people, including patients, are reading such journals and rely on the information they provide. Consequently, predatory journals are a serious threat to the integrity of medical science, and it is crucial for scientists, physicians and even patients to be aware of this problem. In this review, we briefly summarize the history of the open access movement, as well as the rise of and roles played by predatory journals. In conclusion, young and inexperienced authors publishing in a predatory journal must be aware of the damage of their reputation, of inadequate peer review processes and that unprofitable journals might get closed and all published articles in that journal might be lost.

108 citations