Transactions on Engineering and Computer Science is open access, scholarly peer-reviewed, and academic research journal for engineers, researchers, scientists, and academicians.
The primary objective of this journal (Trans Eng Comput Sci) is to be an
authoritative international forum for delivering both theoretical, innovative,
rare, and new findings that expand the knowledge in the field of Engineering
(Software, Mechanical, Civil, Electronics & Electrical) and all
interdisciplinary streams of Computer Sciences.
All manuscripts published by Transactions
on Engineering and Computer Science are made freely accessible online
immediately upon publication, without any subscription charges or blockade. A minimum of three independent Reviewer’s approval and an Editor's approval is taken
into consideration for acceptance or rejection of an article.
Authors are requested to submit their
valuable Research, Review, Mini-review, Short communication, Opinion, Letter to the Editor, etc as an attachment to the editorial office at: computer@gnoscience.com or editor.transactions@gnoscience.com
Related Topics and Keywords
Transactions
on Engineering Management, Transactions on Computers, Transactions on Cloud
Systems, Transactions on Environment and Electrical Engineering, Transactions
on Industrial Networks and Intelligent Systems, Electrical, Software, Mechanical, Civil, Internet of
Things, Data structure, Mathematical Modeling, Robotics Research, Engineering
informatics, Computer Science, Computer Engineering, Computer Technology,
Computer Hardware/Software, Robotics and application, Embedded Systems,
Artificial Intelligence, Data Base Management & Information Retrievals,
Geographical Information Systems/ Global Navigation Satellite Systems, Neural
Networks, Fuzzy Systems, Web
and Internet computing, Supercomputing.
Upcoming Special Issue
Title: Enabling Security in DevOps for a Better and Safer IT
Culture and Economic Growth
Dear Colleagues and Researchers,
You are invited to submit a paper for possible inclusion in
this special issue in the domain of
DevOps, Automation, Cloud Computing, Version Control Systems, and Cloud Security. We are inviting research
scholars to submit their research articles to this special issue within the
timeline. Please adhere to the process and timelines. You will need to indicate
your intention to submit your full paper by email to the email id:
editor.computerscience@gnoscience.com with the title of the paper, authors, and
abstract. The full manuscript, as a Word/PDF file, should be emailed to the
journal email id mentioned above. The review process for the articles submitted
for this special issue will be done by guest editors.
As cloud environments become increasingly complex,
organizations are adopting DevSecOps to innovate faster without compromising
security. DevOps is a collaboration framework that expands the impact of DevOps
by adding security practices to the software development and delivery process.
DevSecOps resolves the tension between DevOps teams that want to release
software quickly, and security teams that prioritize security over all else. By
integrating application security principles and practices into software
development and operations, teams can deliver new software and services at
agile speed without compromising application security.
IT companies must gain the 100% production run-time
visibility they need to defend against vulnerabilities in a containerized
environment. Its real-time, topology-driven, and precise risk assessment allows
IT teams to focus their energy where it matters for the business, eliminating
wasted time spent working through thousands of false positives.
Current advancements toward future IOT devices will
necessitate the collection and analysis of data from integrated devices such as
distributed storage, intelligent loads, and distributed energy resources. Big
data analytics can provide different types of insights when used with the IoT;
namely, descriptive analytics, diagnostic analytics, predictive analytics, and
prescriptive analytics. Descriptive analytics gives insights into how a
connected device is performing in real time. It can be used for anything from
locating a connected device to understanding how that device is used by
customers, to identifying anomalies.. Data visualization is an important aspect
of IoT analysis, aiding in the ability to identify key trends. Data
visualization is needed to properly identify and convey the best data insights
that can be used to drive business decisions. The data generated by IoT devices
is heterogeneous, meaning it comes in a variety of formats: structured,
unstructured, and semi-structured.
Threats evolve rapidly, and organizations that want to
escape game of catch-up use threat intelligence to enable proactive defenses.
Threat intelligence enables security teams to anticipate upcoming threats and
prioritize effectively to preempt them. Security teams can also use threat
intelligence to accelerate incident response and remediation and to make better
decisions
This Special Issue aims at publishing high-quality manuscripts
covering new research on topics related to the Integration of cloud computing
and Big data for better IOT utilization including but not limited to the
following:-
•DevOps Security and Vulnerabilities
•Version Control System and its benefits
•Dynatrace and Splunk monitoring in DevOps pipeline
•Cryptography and IAM.
•Security in microservices and containerization
•Virtualization vs
Containerization
Keywords
•Cloud
applications
•DevOps
•Virtualization, containerization, and
container orchestration
•Public,
private, and hybrid clouds
•IAM
•Microservices
•Cryptography
•Jenkins
•GIT
Topics of interest include, but are not limited to:
•DevOps
security and vulnerabilities
•Intelligent prediction and recommendation for IoT decision-making.
•Novel
big data analytics technology for IoT security.
•Data
confidentiality and privacy protection for IoT
•Lightweight IoT data transmission and communications
•Authentication and access control for data usage in IoT
•Security in DevOps
Important dates on Special Issue:
•Deadline
for submissions: 30/10/2023
•1st
round of acceptance notification: 15/11/2023
•Submission of revised papers: 30/11/2023
•2nd round of acceptance notification:
15/12/2023
•Publication online (tentative): 31/12/2023
Guest Editors of Special Issue
(Lead Guest Editor)
Prof. Vinay Singh, Sr Manager IT & Software, Colorado, USA
Email: usavinaysingh@yahoo.com
(Other Guest Editors)
Prof. Shalini Aggarwal, Professor in Graphic Era University, Dehradun, India
Email: shalinia@gehu.ac.in
Mr. Gopi Krishna Dhamodharan, Manager IT & Software, Colorado, USA
Email: gopikrishnadhamodharan@gmail.com
Name: WEI WEI (Co-Editors-in-Chief)
Email: weiwei@xaut.edu.cn
Address: School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, PR China.
Research Interests
Wireless Networks and Wireless Sensor Networks Application, Mobile Computing,Wireless Network Security, Image Processing, Distributed Computing.
Name: Ashraf Darwish (Co-Editors-in-Chief)
Email: ashraf.darwish.eg@ieee.org
Address: Mathematics Department, Faculty of Science, Helwan University, Cairo, Egypt, W 43rd Street, 2024, 90062, LA, CA, USA
WEI WEI (Co-Editors-in-Chief)
Email: weiwei[at]xaut.edu.cn
Associate Professor, School of Computer Science and Engineering,
Xi’an University of Technology, Xi’an 710048, PR China.
Ashraf Darwish (Co-Editors-in-Chief)
Email: ashraf.darwish.eg[at]ieee.org
Bo Cheng
Email: chengbo[at]bupt.edu.cn
Professor
of State Key Laboratory of Networking and Switching
Technology, Beijing University of Posts
and Telecommunications,
Beijing, China
Takaaki Musha
Email: takaaki.mushya[at]gmail.com
Vinay Singh (Lead Guest Editor)
Email: usavinaysingh@yahoo.com
Alhuseen Omar Nori Alsayed
Email: aoalsayd[at]kau.edu.sa
Girish R.Talmale
Email: girish.talmale[at]raisoni.net
S Kumar Chandar
Email: kumar.chandar[at]christuniversity.in
Hamid R. Parsaei
Email: hamid.parsaei[At]tamu.edu
Professor, Department of Industrial and
Systems Engineering, College Station, Texas, United States
Shang-Ming Zhou
Email: shangming.zhou[AT]plymouth.ac.uk
Volodymyr V. Kovalchuk
Email: lslvvvas[at]ukr.net
Professor of Computer Science, Department of the Environmental State University (Odessa), Odessa, Ukraine
Mohammad Abu Omar
Email: mmdabuomar[at]yahoo.com
Surendra Reddy Challapalli
Email: surendra.cfa@gmail.com
Coming Soon
Type 2 Diabetes Prediction Using Machine Learning Confidence Weighted Based Ensemble Methods
Research Article: Trans Eng Comput Sci
Transactions on Engineering and Computer Science welcomes
the author to submit Research article, Original article, Review, Mini-review,
Short communication, Opinion, Letter to the Editor, etc as an attachment to the
editorial office at: computer@gnoscience.com or
Scope: All areas related to Transactions on
Engineering and Computer Science aspects such as:
Transactions on Engineering Management,
Transactions on Computers, Transactions on Cloud Systems, Transactions on
Environment and Electrical Engineering, Transactions on Industrial Networks and
Intelligent Systems, Electrical, Software, Mechanical, Civil,
Internet of Things, Data structure, Mathematical Modeling, Robotics Research,
Engineering informatics, Computer Science, Computer Engineering, Computer
Technology, Computer Hardware/Software, Robotics and application, Embedded
Systems, Artificial Intelligence, Data Base Management & Information
Retrievals, Geographical Information Systems/ Global Navigation Satellite
Systems, Neural Networks, Fuzzy Systems, Web and Internet computing, Supercomputing.
Why does Gnoscience Group Charge Article processing fees?
Because
Gnoscience is a self-supporting organization and does not receive funding from
any institution/government, at the same time we don't charge subscription or
access fees, we ask authors to contribute to costs incurred by processing and
publishing Open Access work. When you contribute to the Gnoscience Open Access
journal, you're funding tools and resources such as:
We
request authors to contribute minimum publication charges as mentioned in the
table.
Article Type |
Processing Fee |
||
Low Income |
Middle Income |
High Income |
|
Research Article/Review Article |
$150 |
$250 |
$550 |
Mini-Review/Short Communication/Commentary |
$80 |
$120 |
$150 |
Special Issue |
$120 |
$220 |
$320 |
Note:
These publication charges are applicable to invited authors as well.
Withdrawal Policy
Authors may wish to withdraw their manuscript after submitting it. To withdraw a manuscript, we do not charge any fee, unless we haven’t done with the review process. We ask authors to pay 50% of the original article processing fee in case if author wishes to withdraw after the review process is completed.
Articles in the areas related to computers, cloud computing, neural networks, fuzzy systems, web and internet computing, supercomputing, artificial intelligence, etc are welcome in the Transactions on Engineering and Computer Science.
The manuscripts meeting the general criteria of significance and scientific excellence can be submitted.
The scholarly articles will be published approximately 15 days after acceptance.
The articles go through the Single blind review process, where the names of the reviewers are hidden from the authors.
Submission Guidelines
Author of the article must be responsible for the article during the submission and peer review process, and must follow the instructions for submitting the manuscript.
Author must provide a cover letter with the article, where should explain why the manuscript should be published and declare any potential competing interests.
Author can provide the contact details (name and email addresses) of two potential peer reviewers for the manuscript. These reviewers should be experts in their field who will provide an objective assessment of the manuscript.
The suggested peer reviewers should not have published with any of the authors of the manuscript within the past five years, should not be current collaborators and should not be members of the same research institution.
Suggested reviewers will be considered along with potential reviewers recommended by the Editorial Board members.
Procedures to Process to Manuscript
Peer Review Process
After submission, Case reports and Reviews: Open access follows single blinded peer review process where the names of the reviewers are hidden from the authors.
Plagiarism
Only novel manuscripts are approved after submission by the author, following standardized research methods. Manuscripts are subjected towards plagiarism check to determine their originality. Manuscript should not have the same content that is already published online. These acts and gestures are considered unethical publication practices and hence they are not encouraged.
Basic rules to prepare manuscript. Author, kindly go through given instructions
Manuscript Titles
Title should be brief, precise and technical enough to explain the intended meaning of the manuscript. It is usually free from acronyms, abbreviations or punctuation's.
Author Affiliation
Author name includes Last name followed by the concern Initials without space or any punctuation. In case of more than one author, they should be differentiated by the conjunction ‘and’ before the name of the Last author. Their affiliations are denoted by the superscript numbers after the initials of the author’s name. Corresponding author is represented with an asterisk in superscript.
Abstract
The word limit for Abstract is max. 250. It must summarize specifically the scientific content in the manuscript. It should be brief and accurate and must not contain any citations.
Index term/Keywords
Keywords serve as main tool for Indexers as well as Readers to locate your manuscript. Keywords enhance the chances of getting more citations and high readership to your manuscript. An article might contain up to maximum of 4-6 Keywords.
Abbreviations
Abbreviations must be separated by semicolon and all the abbreviations used in the manuscript must be mentioned with its expanded form at first instance.
Introduction
The introduction should discuss the purpose of the study in the broader context. Introduction should be clear to the readers who are not experts in this field. Include a brief review of the key literature. If there are relevant controversies or disagreements in the field, they should be mentioned so that a non-expert reader can delve into these issues further. The introduction should conclude with a brief statement of the overall aim of the experiments and a comment about whether that aim was achieved.
Materials and Methods
This section should provide a complete overview of the design of the study. Detailed descriptions of materials or participants, comparisons, interventions, and types of analysis should be mentioned. However, only new procedures should be described in detail; previously published procedures should be cited and important modifications of published procedures should be mentioned briefly. Capitalize trade names and include the manufacturer's name and address.
Results and Discussion
The results section should provide complete details of the experiment that are required to support the conclusion of the study. The results should be written in the past tense when describing findings in the authors' experiments. Previously published findings should be written in the present tense. Results and discussion may be combined or in a separate section. Speculation and detailed interpretation of data should not be included in the results but should be put into the discussion section.
Conclusion
This section should provide to adhere to support the study conclusions. This section included briefly detailed conclusive parameters of the whole study.
Acknowledgement
Authors can include funding sources and personal acknowledgement in this section. Authors are encouraged to list all the funding sources used for preparation of manuscript. Please provide the grant number and authors associated with specific funding sources.
Supplementary Information
We do not limit the number of supplementary material items that author has to include in the manuscript. Supplementary materials should be named as S (Example Figure S1, Table S1, Video S1, etc.). Make sure that these supplementary items should be cited in the text. They are published as raw dataset along with the manuscript.
References
References must be listed in the numerical system (Vancouver). All references should be numbered sequentially [in square brackets] in the text and listed in the same numerical order in the reference section. The reference numbers must be finalized and the bibliography must be fully formatted before submission.
The references should be relevant to the study and should refer to the original research sources. Self-citation and self-interest should be avoided by the authors, editors and peer-reviewers.
Examples
Journal Article with less than 3 authors: mention name of all the authors.
Nasta AM, Mayo HG, Kim P. Case report of ventral hernia complicating bariatric surgery. Trans Eng Comput Sci. 2022;3(2):126
Journal Article with more than 3 authors: mention name of the first three authors followed by et al.
Nasta AM, Mayo HG, Kim P, et al. Gemellamorbillorum: An underestimated etiology of central nervous system infection? Trans Eng Comput Sci. 2014;17(1):145-148.
Exceptions
Book References: name of the author, Title of Book. Nth ed. Country: Publisher; year
Mayo HG, Lichtinger A, Kim P. Principles of Genetics. 8th ed. New York: John Wiley & Sons; 2009
Book Chapter: name of the author, Title of book: editors: Country: Publisher; year. Page no.
Yeung SN, Lichtinger A, Mayo HG. Adhesion molecules and site-specific metastasis.In Thrombosis: NeriSerneri SS, Gensini GF, editors: An Update. New York: John Wiley & Sons; 1989. 269-303p.