International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Abstracts Evaluation for Quality Assurance in Scientific Journal

Author NameAuthor Details

Eric Opoku Osei

Eric Opoku Osei[1]

[1]Lecturer, Christ Apostolic University College, Ghana.

Abstract

INTRODUCTION Abstract gives first impression of document that follows and offers instant scholarly credibility to direct and indirect stakeholders of that document. AIM/PURPOSE We aimed to determine quality standard adherence of nineteen (19) maiden abstracts already published in the editorial space of International Journal of Computer Networks and Applications (IJCNA) using “IMRAD” guiding rule as barometer. METHOD We conducted appraisal using abstracts in IJCNA database. Nineteen maiden papers were assessed using internationally accepted IMRAD guiding rule for journal writings and used MS-Excel for statistical analysis due to seize of data. RESULTS We found 47%, representing 9-papers adhering to the IMRAD rules for scientific writing guide. We also discovered 53%, representing 10-papers presenting their abstracts as in humanities guide. CONCLUSION In our conclusion, authors are responsible to adhere to the rules of the game and present quality standard abstracts to uphold their own credibility in academic publishing. RECOMMENDATION The editorial board has to update author guidelines to clearly spell-out IMRAD components expected in scientific/informative abstracts submissions, irrespective of the paper type.

Index Terms

Abstract

Scientific writing

IMRAD rule

Presentations appraisal

Quality assurance

Reference

  1. 1.
    Margaret Procter, “The Abstract” University of Toronto Coordinator, Writing Support, www.writing.utoronto.ca, Accessed on 5/4/2015
  2. 2.
    UNC college of Arts and Science, “The writing center”, http://cssac.unc.edu/ Accessed on 5/4/2015
  3. 3.
    Emerald Group Publishing, “How to write an abstract-some examples, http://www.emeraldgrouppublishing.com/authors/guides/write/abstracts.htm?part=2&view=print
  4. 4.
    A. Anuba Merlyn and A. Anuja Merlyn, “Energy Efficient Routing (EER) for Reducing Congestion and Time Delay in Wireless Sensor Network”, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 1-10, November – December (2014).
  5. 5.
    M. Milton Joe and Dr. B. Ramakrishnan, “A Survey of Various Security Issues in Online Social Networks, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 11-14, November – December (2014).
  6. 6.
    Tamer Hossam Eldin Helmy, Mohamed zaki Abd-ElMegied, Tarek S. Sobh, and Khaled Mahmoud Shafea Badran, “ Design of a Monitor for Detecting Money Laundering and Terrorist Financing”, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 15-25, November – December (2014).
  7. 7.
    Ganesh Potta and Santosh Naidu P, “An Empirical Model of Job Shop Scheduling With Related To Tiny Chemical Assembly Instructions Inside of Living Things and Gels Techniques”, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 26-32, November – December (2014).
  8. 8.
    Ravi Shankar P and Santosh Naidu P, “A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis”, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 33-3, November – December (2014).
  9. 9.
    J.Stanley Jesudoss and S.Selva Kumar, “Automatic Feedback Framework for Deriving Educational Ontologies”, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 40-47, November – December (2014).
  10. 10.
    Sandhya Rani G and Santosh Naidu P “Mitigation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimization”, International Journal of Computer Networks and Applications, volume 2, Issue 1, pp. 1-11, January – February (2015).
  11. 11.
    Feyza Altunbey and Bilal Alatas “Overlapping Community Detection in Social Networks Using Parliamentary Optimization Algorithm”, International Journal of Computer Networks and Applications, volume 2, Issue 1, pp. 12-19, January – February (2015).
  12. 12.
    C. Namesh and Dr.B. Ramakrishnan “Analysis of VBF protocol in Underwater Sensor Network for Static and Moving Nodes”, International Journal of Computer Networks and Applications, volume 2, Issue 1, pp. 20-26, January – February (2015).
  13. 13.
    Cheah Wai Zhao, Jayanand Jegatheesan, and Son Chee Loon “Exploring IOT Application Using Raspberry Pi”, International Journal of Computer Networks and Applications, volume 2, Issue 1, pp. 27-34, January – February (2015).
  14. 14.
    Heng-Te Chu, Lili Hsieh, and Wen-Shiung Chen, “A Novel Design of Instant Messaging Service Extended from Short Message Service with XMPP”, International Journal of Computer Networks and Applications, volume 2, Issue 1, pp. 35-40, January – February (2015).
  15. 15.
    G.Rohini and Dr. A.Srinivasan, “Dynamic Transition of Bandwidth and Power Saving Mechanism to Support Multimedia Streaming Using H.264/SVC over the Wireless Networks”, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 57-63, March – April (2015).
  16. 16.
    Aarti Singh and Manisha Malhotra “Security Concerns at Various Levels of Cloud Computing Paradigm: A Review”, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 41-45, March – April (2015).
  17. 17.
    N. Arulkumar and Dr. E. George Dharma Prakash Raj, “A Study on Topology based Vehicular Ad hoc Network Routing Protocols”, International Journal of Computer Networks and Applications, volume 2, Issue 2, March – April (2015).
  18. 18.
    Reham M. Abobeah, Dr. Mohamed M. Ezz, and Prof. Hany M. Harb, “Public-Key Cryptography Techniques Evaluation”, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 64-75, March – April (2015).
  19. 19.
    Emad Abu-Shanab and Eman Haddad, “The Influence of Smart Phones on Human Health and Behavior: Jordanians’ Perceptions”, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 52-56, March – April (2015).
  20. 20.
    Prachi, “A Probabilistic Key Management Protocol based on Kryptograph for WSN”, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 76-83, March – April (2015).
  21. 21.
    A. Meiappane, Dr. V. Prasanna Venkataesan, and V. Premanand, “Security Enhancement in Shoulder Surfing Attacks using Passpoints for Random Similar Images (PRSIm)”, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 84-91, March – April (2015).
  22. 22.
    Munna Kumar, Bimal Kumar Mishra, and T. C. Panda, “Effect of Quarantine & Vaccination on Infectious Nodes in Computer Network”, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 92-98, March – April (2015).