Transactions on Engineering and Computer Science


Transactions on Engineering and Computer Science is open access, scholarly peer-reviewed, and academic research journal for engineers, researchers, scientists, and academicians. 


The primary objective of this journal (Trans Eng Comput Sci) is to be an authoritative international forum for delivering both theoretical, innovative, rare, and new findings that expand the knowledge in the field of Engineering (Software, Mechanical, Civil, Electronics & Electrical) and all interdisciplinary streams of Computer Sciences.

All manuscripts published by Transactions on Engineering and Computer Science are made freely accessible online immediately upon publication, without any subscription charges or blockade. A minimum of three independent Reviewer’s approval and an Editor's approval is taken into consideration for acceptance or rejection of an article.

Authors are requested to submit their valuable Research, Review, Mini-review, Short communication, Opinion, Letter to the Editor, etc as an attachment to the editorial office at: computer@gnoscience.com or editor.transactions@gnoscience.com


Related Topics and Keywords

Transactions on Engineering Management, Transactions on Computers, Transactions on Cloud Systems, Transactions on Environment and Electrical Engineering, Transactions on Industrial Networks and Intelligent Systems, Electrical, Software, Mechanical, Civil, Internet of Things, Data structure, Mathematical Modeling, Robotics Research, Engineering informatics, Computer Science, Computer Engineering, Computer Technology, Computer Hardware/Software, Robotics and application, Embedded Systems, Artificial Intelligence, Data Base Management & Information Retrievals, Geographical Information Systems/ Global Navigation Satellite Systems, Neural Networks, Fuzzy Systems, Web and Internet computing, Supercomputing.


Upcoming Special Issue

Title: Enabling Security in DevOps for a Better and Safer IT Culture and Economic Growth

Dear Colleagues and Researchers,

You are invited to submit a paper for possible inclusion in this special issue in the domain of  DevOps, Automation, Cloud Computing, Version Control Systems, and  Cloud Security. We are inviting research scholars to submit their research articles to this special issue within the timeline. Please adhere to the process and timelines. You will need to indicate your intention to submit your full paper by email to the email id: editor.computerscience@gnoscience.com with the title of the paper, authors, and abstract. The full manuscript, as a Word/PDF file, should be emailed to the journal email id mentioned above. The review process for the articles submitted for this special issue will be done by guest editors.

As cloud environments become increasingly complex, organizations are adopting DevSecOps to innovate faster without compromising security. DevOps is a collaboration framework that expands the impact of DevOps by adding security practices to the software development and delivery process. DevSecOps resolves the tension between DevOps teams that want to release software quickly, and security teams that prioritize security over all else. By integrating application security principles and practices into software development and operations, teams can deliver new software and services at agile speed without compromising application security.

IT companies must gain the 100% production run-time visibility they need to defend against vulnerabilities in a containerized environment. Its real-time, topology-driven, and precise risk assessment allows IT teams to focus their energy where it matters for the business, eliminating wasted time spent working through thousands of false positives.

Current advancements toward future IOT devices will necessitate the collection and analysis of data from integrated devices such as distributed storage, intelligent loads, and distributed energy resources. Big data analytics can provide different types of insights when used with the IoT; namely, descriptive analytics, diagnostic analytics, predictive analytics, and prescriptive analytics. Descriptive analytics gives insights into how a connected device is performing in real time. It can be used for anything from locating a connected device to understanding how that device is used by customers, to identifying anomalies.. Data visualization is an important aspect of IoT analysis, aiding in the ability to identify key trends. Data visualization is needed to properly identify and convey the best data insights that can be used to drive business decisions. The data generated by IoT devices is heterogeneous, meaning it comes in a variety of formats: structured, unstructured, and semi-structured.

Threats evolve rapidly, and organizations that want to escape game of catch-up use threat intelligence to enable proactive defenses. Threat intelligence enables security teams to anticipate upcoming threats and prioritize effectively to preempt them. Security teams can also use threat intelligence to accelerate incident response and remediation and to make better decisions

This Special Issue aims at publishing high-quality manuscripts covering new research on topics related to the Integration of cloud computing and Big data for better IOT utilization including but not limited to the following:-

•DevOps Security and Vulnerabilities

•Version Control System and its benefits

•Dynatrace and Splunk monitoring in DevOps pipeline

•Cryptography and IAM.

•Security in microservices and containerization

•Virtualization vs Containerization

Keywords

•Cloud applications

•DevOps

•Virtualization, containerization, and container orchestration

•Public, private, and hybrid clouds

•IAM

•Microservices

•Cryptography

•Jenkins

•GIT

Topics of interest include, but are not limited to:

•DevOps security and vulnerabilities

•Intelligent prediction and recommendation for IoT decision-making.

•Novel big data analytics technology for IoT security.

•Data confidentiality and privacy protection for IoT

•Lightweight IoT data transmission and communications

•Authentication and access control for data usage in IoT

•Security in DevOps

Important dates on Special Issue:

•Deadline for submissions: 30/10/2023

•1st round of acceptance notification: 15/11/2023

•Submission of revised papers: 30/11/2023

•2nd round of acceptance notification: 15/12/2023

•Publication online (tentative): 31/12/2023

Guest Editors of Special Issue

(Lead Guest Editor)

Prof. Vinay Singh, Sr Manager IT & Software, Colorado, USA 

Email: usavinaysingh@yahoo.com

(Other Guest Editors)

Prof. Shalini Aggarwal, Professor in Graphic Era University, Dehradun, India

Email: shalinia@gehu.ac.in

Mr. Gopi Krishna Dhamodharan, Manager IT & Software, Colorado, USA

Email: gopikrishnadhamodharan@gmail.com

Editor in Chief


Name: WEI WEI (Co-Editors-in-Chief)
Email: weiwei@xaut.edu.cn
Address: School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, PR China.

editor

Research Interests

Wireless Networks and Wireless Sensor Networks Application, Mobile Computing,Wireless Network Security, Image Processing, Distributed Computing.




Name: Ashraf Darwish (Co-Editors-in-Chief)
Email: ashraf.darwish.eg@ieee.org
Address: Mathematics Department, Faculty of Science, Helwan University, Cairo, Egypt, W 43rd Street, 2024, 90062, LA, CA, USA

editor
Research Interests:
Artificial Intelligence and its applications, Data Science, Emerging technologies, Sensor networks, Cloud and fog computing, Internet of Things and its applications, Blockchain technology applications



Editorial Board


WEI WEI (Co-Editors-in-Chief)

Email: weiwei[at]xaut.edu.cn

editor

Associate Professor, School of Computer Science and Engineering, 

Xi’an University of Technology, Xi’an 710048, PR China.



Ashraf Darwish (Co-Editors-in-Chief)

Email: ashraf.darwish.eg[at]ieee.org

editor
Mathematics Department, Faculty of Science, Helwan University, Cairo,
Egypt, W 43rd Street, 2024, 90062, LA, CA, USA


Bo Cheng

Email: chengbo[at]bupt.edu.cn

editor

Professor of State Key Laboratory of Networking and Switching 

Technology, Beijing University of Posts and Telecommunications, 

Beijing, China



Takaaki Musha

Email: takaaki.mushya[at]gmail.com

editor
Department of Mechanical Engineering
Shinshu University, Japan


Vinay Singh (Lead Guest Editor)

Email: usavinaysingh@yahoo.com

editor
Prof. Sr Manager IT & Software, Colorado, USA


Alhuseen Omar Nori Alsayed

Email: aoalsayd[at]kau.edu.sa

editor
Deanship of Scientific Research, 
Kink Abdul Aziz University, Saudi Arabia


Girish R.Talmale

Email: girish.talmale[at]raisoni.net

editor
Department of Engineering, India


S Kumar Chandar

Email: kumar.chandar[at]christuniversity.in

editor
Department of Computer Science
School of Business & Management CHRIST
(Deemed to be University), Bangalore, Karnataka, India


Hamid R. Parsaei

Email: hamid.parsaei[At]tamu.edu

editor

Professor, Department of Industrial and Systems Engineering, College Station, Texas, United States



Shang-Ming Zhou

Email: shangming.zhou[AT]plymouth.ac.uk

editor
Professor in e-Health, University of Plymouth, Plymouth, UK


Volodymyr V. Kovalchuk

Email: lslvvvas[at]ukr.net

editor

Professor of Computer Science, Department of the Environmental State University (Odessa), Odessa, Ukraine



Mohammad Abu Omar

Email: mmdabuomar[at]yahoo.com

editor
Head of Computer Information Systems, Department Faculty of Technology & Applied Sciences, Al-Quds Open University, Palestine


Surendra Reddy Challapalli

Email: surendra.cfa@gmail.com

editor
CitiBank, Tampa, FL, United States of America


Current Issue


Volume-3 Issue-2


Submit Manuscript


Transactions on Engineering and Computer Science welcomes the author to submit Research article, Original article, Review, Mini-review, Short communication, Opinion, Letter to the Editor, etc as an attachment to the editorial office at: computer@gnoscience.com or editor.transactions@gnoscience.com

Scope: All areas related to Transactions on Engineering and Computer Science aspects such as:

Transactions on Engineering Management, Transactions on Computers, Transactions on Cloud Systems, Transactions on Environment and Electrical Engineering, Transactions on Industrial Networks and Intelligent Systems, Electrical, Software, Mechanical, Civil, Internet of Things, Data structure, Mathematical Modeling, Robotics Research, Engineering informatics, Computer Science, Computer Engineering, Computer Technology, Computer Hardware/Software, Robotics and application, Embedded Systems, Artificial Intelligence, Data Base Management & Information Retrievals, Geographical Information Systems/ Global Navigation Satellite Systems, Neural Networks, Fuzzy Systems, Web and Internet computing, Supercomputing.

Article Processing Charges


Why does Gnoscience Group Charge Article processing fees?

Because Gnoscience is a self-supporting organization and does not receive funding from any institution/government, at the same time we don't charge subscription or access fees, we ask authors to contribute to costs incurred by processing and publishing Open Access work. When you contribute to the Gnoscience Open Access journal, you're funding tools and resources such as:

  • ·        Plagiarism check that certifies the originality of your writing.
  • ·        In-depth peer review and editorial comments from established experts in your field.
  • ·        Thorough proofreading and copyediting from our Editorial Analysts to bring your article up to publishing standards.
  • ·        Typesetting and formatting for PDF of an article, ISSN assigning and Volumes and Issue release. Indexing in all applicable partnered databases and reference services, as well as print versions upon request.
  • ·        Permanent web hosting for your articles and globally unrestricted access to your content.
  • ·        Indexing in all applicable partnered databases and reference services.

We request authors to contribute minimum publication charges as mentioned in the table.

 

Article Type

Processing Fee

Low Income

Middle Income

High Income

Research Article/Review Article

$150

$250

$550

Mini-Review/Short Communication/Commentary

$80

$120

$150

Special Issue

$120

$220

$320

Note: These publication charges are applicable to invited authors as well.

Withdrawal Policy

Authors may wish to withdraw their manuscript after submitting it. To withdraw a manuscript, we do not charge any fee, unless we haven’t done with the review process. We ask authors to pay 50% of the original article processing fee in case if author wishes to withdraw after the review process is completed.

Author Guidelines


Articles in the areas related to computers, cloud computing, neural networks, fuzzy systems, web and internet computing, supercomputingartificial intelligence, etc are welcome in the Transactions on Engineering and Computer Science.

  • The manuscripts meeting the general criteria of significance and scientific excellence can be submitted.

  • The scholarly articles will be published approximately 15 days after acceptance.

  • The articles go through the Single blind review process, where the names of the reviewers are hidden from the authors.

Submission Guidelines

  1. Author of the article must be responsible for the article during the submission and peer review process, and must follow the instructions for submitting the manuscript.

  2. Author must provide a cover letter with the article, where should explain why the manuscript should be published and declare any potential competing interests.

  3. Author can provide the contact details (name and email addresses) of two potential peer reviewers for the manuscript. These reviewers should be experts in their field who will provide an objective assessment of the manuscript.

  4. The suggested peer reviewers should not have published with any of the authors of the manuscript within the past five years, should not be current collaborators and should not be members of the same research institution.

  5. Suggested reviewers will be considered along with potential reviewers recommended by the Editorial Board members.

Procedures to Process to Manuscript

Peer Review Process

After submission, Case reports and Reviews: Open access follows single blinded peer review process where the names of the reviewers are hidden from the authors.

Plagiarism
Only novel manuscripts are approved after submission by the author, following standardized research methods. Manuscripts are subjected towards plagiarism check to determine their originality. Manuscript should not have the same content that is already published online. These acts and gestures are considered unethical publication practices and hence they are not encouraged.

Basic rules to prepare manuscript. Author, kindly go through given instructions

Manuscript Titles
Title should be brief, precise and technical enough to explain the intended meaning of the manuscript. It is usually free from acronyms, abbreviations or punctuation's.

Author Affiliation
Author name includes Last name followed by the concern Initials without space or any punctuation. In case of more than one author, they should be differentiated by the conjunction ‘and’ before the name of the Last author. Their affiliations are denoted by the superscript numbers after the initials of the author’s name. Corresponding author is represented with an asterisk in superscript.

Abstract

The word limit for Abstract is max. 250. It must summarize specifically the scientific content in the manuscript. It should be brief and accurate and must not contain any citations.

Index term/Keywords
Keywords serve as main tool for Indexers as well as Readers to locate your manuscript. Keywords enhance the chances of getting more citations and high readership to your manuscript. An article might contain up to maximum of 4-6 Keywords.

Abbreviations
Abbreviations must be separated by semicolon and all the abbreviations used in the manuscript must be mentioned with its expanded form at first instance.

Introduction
The introduction should discuss the purpose of the study in the broader context. Introduction should be clear to the readers who are not experts in this field. Include a brief review of the key literature. If there are relevant controversies or disagreements in the field, they should be mentioned so that a non-expert reader can delve into these issues further. The introduction should conclude with a brief statement of the overall aim of the experiments and a comment about whether that aim was achieved.


Materials and Methods

This section should provide a complete overview of the design of the study. Detailed descriptions of materials or participants, comparisons, interventions, and types of analysis should be mentioned. However, only new procedures should be described in detail; previously published procedures should be cited and important modifications of published procedures should be mentioned briefly. Capitalize trade names and include the manufacturer's name and address.


Results and Discussion

The results section should provide complete details of the experiment that are required to support the conclusion of the study. The results should be written in the past tense when describing findings in the authors' experiments. Previously published findings should be written in the present tense. Results and discussion may be combined or in a separate section. Speculation and detailed interpretation of data should not be included in the results but should be put into the discussion section.

Conclusion

This section should provide to adhere to support the study conclusions. This section included briefly detailed conclusive parameters of the whole study.


Acknowledgement
Authors can include funding sources and personal acknowledgement in this section. Authors are encouraged to list all the funding sources used for preparation of manuscript. Please provide the grant number and authors associated with specific funding sources.

Supplementary Information
We do not limit the number of supplementary material items that author has to include in the manuscript. Supplementary materials should be named as S (Example Figure S1, Table S1, Video S1, etc.). Make sure that these supplementary items should be cited in the text. They are published as raw dataset along with the manuscript.

References
References must be listed in the numerical system (Vancouver). All references should be numbered sequentially [in square brackets] in the text and listed in the same numerical order in the reference section. The reference numbers must be finalized and the bibliography must be fully formatted before submission.

The references should be relevant to the study and should refer to the original research sources. Self-citation and self-interest should be avoided by the authors, editors and peer-reviewers.

Examples

Journal Article with less than 3 authors: mention name of all the authors.
Nasta AM, Mayo HG, Kim P. Case report of ventral hernia complicating bariatric surgery. Trans Eng Comput Sci. 2022;3(2):126

Journal Article with more than 3 authors: mention name of the first three authors followed by et al. 

Nasta AM, Mayo HG, Kim P, et al. Gemellamorbillorum: An underestimated etiology of central nervous system infection? Trans Eng Comput Sci. 2014;17(1):145-148.

Exceptions

Book References: name of the author, Title of Book. Nth ed. Country: Publisher; year 

Mayo HG, Lichtinger A, Kim P. Principles of Genetics. 8th ed. New York: John Wiley & Sons; 2009

Book Chapter: name of the author, Title of book: editors: Country: Publisher; year. Page no. 

Yeung SN, Lichtinger A, Mayo HG. Adhesion molecules and site-specific metastasis.In Thrombosis: NeriSerneri SS, Gensini GF, editors: An Update. New York: John Wiley & Sons; 1989. 269-303p.