Journal Information
Journal of Information Science and Engineering (JISE)
https://jise.iis.sinica.edu.tw/
Impact Factor:
1.100
Publisher:
Institute of Information Science
ISSN:
0000-0000
Viewed:
12662
Tracked:
7
Call For Papers
Description

The Journal of Information Science and Engineering is published bimonthly by the Institute of Information Science, Academia Sinica. The purpose of this journal is to provide an open forum to publish high-quality research papers in the areas of information science and engineering to promote the exchange of research ideas, experiences, and results. This journal therefore invites the submission of technical manuscripts on topics within these areas.

Scope

The Journal of Information Science and Engineering is dedicated to the dissemination of information on computer science, computer engineering, and computer systems. This journal encourages articles on original research in the areas of computer hardware, software, man-machine interface, theory and applications. tutorial papers in the above-mentioned areas, and state-of-the-art papers on various aspects of computer systems and applications.

Subjects
Artificial Intelligence
Big Data & Cloud Computing
Audio, Speech, and Language Processing
Computer Architecture & Hardware Design
Computer Networks & Wireless Communication
Computer Security & Cryptography
Computer Vision & Pattern Recognition
Computer Systems
Data Mining & Analysis
Databases & Information Systems Evolutionary Computation
Fuzzy Systems
Human-Computer Interaction
Image Processing
Information Retrieval
Machine Learning
Multimedia
Natural Language Processing
Real-time & Embedded Systems
Sensor Networks
Signal Processing
Software Systems
Last updated by Dou Sun in 2024-08-25
Special Issues
Special Issue on Pattern Recognition in Real-Time Video Surveillance Systems Using Soft Computing
Submission Date: 2024-11-30

Aim and Scope Real-time video surveillance systems have created pattern recognition, a crucial feature in today's security infrastructure. These systems can quickly collect and analyse video data to identify and anticipate unusual behaviour or possible safety threats using soft computing approaches. The increasing interest in enhanced security in both public and private areas has led to a significant demand for advanced video surveillance systems. Traditional methods often fail in two domains such as large data sets and changing situations. Soft computing approaches are perfect for real-time surveillance applications because they are flexible, robust, and have the capacity to learn from data. Integrating pattern recognition in video surveillance for enhancing video quality and filtering noise through preprocessing, capturing video footage with cameras, finding relevant features from the video frames, and utilizing algorithms to detect patterns and anomalies. Advanced technologies are used by video surveillance systems to effectively recognize things and identify patterns. They use support vector machines to classify objects, genetic algorithms to improve detection accuracy, and fuzzy logic to handle uncertainty in video data. For optimal performance, several systems combine these techniques. Convolutional neural networks (CNNs), is a type of deep learning model, utilized for tasks including object detection in motion pictures and facial recognition. Edge computing reduces latency and internet consumption by processing data closer to its source. YOLO and Faster R-CNN are two examples of innovative neural network designs that have improved object detection capabilities significantly. The combination of Internet of Things (IoT) devices and video surveillance has improved monitoring capabilities, increasing the effectiveness and responsiveness of surveillance. Future developments in AI and machine learning, such as more efficient real-time analytics algorithms, increased accuracy with less false positives, and the development of fully autonomous surveillance systems that make decisions without the need for human intervention, may be facilitated by pattern recognition in video surveillance. Despite its potential, it has several challenges include ensuring data privacy, handling massive amounts of data and large-scale deployments, and adapting to various conditions. To overcome these challenges, advanced encryption is required to protect data, creating scalable and flexible modular systems, and incorporating adaptive algorithms to learn continuously and evolve with new data. However, the field of security is being revolutionized by pattern recognition in real-time video surveillance systems using soft computing. We accept submissions from a variety of fields and viewpoints, such as but not limited to: Pattern Recognition in Real-Time Video Surveillance Systems Using Soft Computing. Topics Potential topics include but are not limited to: Role of pattern recognition in modern video surveillance systems Enhancing security using soft computing approaches in real-time video surveillance Integrating advanced algorithms for real-time video data analysis Future directions in video surveillance with AI and soft computing integration Challenges and solutions in implementing pattern recognition for surveillance Contribution of deep learning in modern video surveillance Optimization of surveillance systems with support vector machines and genetic algorithms Utilization of IoT devices with video surveillance for enhanced monitoring Employing soft computing techniques for superior video surveillance performance Analysis of innovative neural network designs in object detection for surveillance systems Author’s Guidelines The submissions should follow the formatting guidelines of the Journal of Information Science and Engineering (https://jise.iis.sinica.edu.tw/pages/authors/manuscripts.html). For inquiries regarding this special issue, please contact the guest editors. All submitted papers will undergo rigorous peer review by a minimum of three reviewers, assessed for originality, significance, relevance, and clarity. Manuscripts should be prepared according to the JISE Word (or LaTeX) standard and converted into a PDF for submission. Electronic submissions should be submitted to SI_Auto_Submit_System at https://journal.iis.sinica.edu.tw/surl/jise-prv Publication Schedule Manuscript Submission Deadline: November 30, 2024 Notification of Acceptance/Rejection/Revision: February 28, 2025 Final Manuscript Due: April 30, 2025 Tentative Publication Date: November 1, 2025
Last updated by Dou Sun in 2024-08-25
Special Issue on Combinatorial Mathematics and Computation Theory
Submission Date: 2024-11-30

Aim The special issues on Combinatorial Mathematics and Computation Theory cover the various aspects of evolving algorithms related to Combinatorial Mathematics. It is based on the 41st Symposium on Combinatorial Mathematics and Computation Theory (CMCT2024) which will be held at University of Taipei, Taipei on May 17-18, 2024 (CMCT 2024) (). The main purpose of this symposium is to provide an opportunity for the experts of combinatorics, discrete mathematics, computational theory, algorithm, network computing, bioinformatics, and other research fields to gather together to discuss their recent research and promote other academic exchange. The special issues include the selected extended best papers of CMCT2024 after going through the review process. Scope Papers are solicited on the latest results from the recent advancement in technologies and applications of combinatorics, discrete mathematics, computational theory, algorithm, network computing, and bioinformatics. Topics include, but are not limited to: Artificial Intelligence Theory and Technology Related to Intelligent Science and Sustainable Development Combinatorics Combinatorial Design; Enumerative Combinatorics; Combinatorial Geometry; Combinatorial Topology; Analytic Combinatorics; Algebraic Graph Theory. Discrete Mathematics Graph Theory; Abstract Algebra; Theoretical Computer Science. Computational Theory Computational Complexity Theory; Computability Theory; Turing Machine; Optimization Problem. Algorithm Quantum Algorithm; Divide and Conquer; Reduction of Complexity; Back Tracking; Dynamic Programming; Linear Programming; Approximation Algorithm; Greedy Algorithm. Network Computing 5G Networks & Internet of Things (IoT); Heterogeneous Networks Web of Things; High Performance Internet Protocols; Internet Security and Privacy Localization; Data Center Networking; Blockchain and Consensus Algorithm. Bioinformatics Sequence Analysis; Gene and Protein Expression; Structural Bioinformatics; Network and System Biology; Phylogenetic Reconstruction; Next Generation Sequencing Analysis; Protein Function Prediction. Author’s Guidelines The submissions should follow the formatting guidelines of the Journal of Information Science and Engineering (https://jise.iis.sinica.edu.tw/pages/authors/manuscripts.html). Any questions regarding this special issue should be sent to the guest editor, Dr. Ling-Ju Hung. All submitted papers will be reviewed by at least three reviewers and selected based on their originality, significance, relevance, and clarity of presentation. The manuscript should be prepared in JISE Word (or Latex) standard and converted into a PDF for auto-submission system. Electronic paper should be submitted to SI_Auto_Submit_System at https://journal.iis.sinica.edu.tw/url/jise-24cmt Publication Schedule Manuscript Submission Deadline: November 30, 2024 Notification of Acceptance/Rejection/Revision: February 28, 2025 Final Manuscript Due: March 31, 2025 Tentative Publication Date: July, 2025
Last updated by Dou Sun in 2024-08-25
Special Issue on Information Centric Wireless Communication (ICWC) with Edge Fog Computing for 5G and beyond IoT Applications
Submission Date: 2024-12-31

Aim and Scope With the growing number of connected devices and the increasing volume of data generated by IoT applications, traditional network architectures are unable to handle the data traffic efficiently. Edge fog computing provides a distributed computing infrastructure at the edge of the network, enabling data to be processed and analyzed closer to the source, reducing latency and improving network performance. Additionally, ICWC allows for content-centric communication, enabling more efficient data distribution and reducing network congestion, making it a critical technology for enabling the success of 5G and beyond IoT applications. The combination of ICWC and edge fog computing is particularly suited for IoT applications, where data is generated and consumed at the edge of the network. For example, in smart homes, sensors generate data that needs to be processed and analyzed in real-time to enable automation and control. With ICWC and edge fog computing, the processing and analysis can be done at the edge of the network, reducing the need for data to be transmitted to a centralized server, which can be slow and unreliable. On the other hand, ICWC and edge fog computing also offer several benefits for 5G applications, such as ultra-reliable low-latency communication (URLLC) and massive machine-type communication (mMTC). In URLLC applications, such as remote surgery and autonomous vehicles, low latency is critical for ensuring real-time communication and decision-making. With edge fog computing, data can be processed and analyzed closer to the source, reducing latency and improving network performance. Similarly, in mMTC applications, such as smart cities and industrial automation, ICWC can enable efficient data distribution and reduce network congestion. One of the challenges of implementing ICWC with edge fog computing is the need for a new network architecture that supports content-centric communication. This requires new protocols and standards for data naming, caching, and distribution, as well as a distributed computing infrastructure at the edge of the network. Additionally, privacy and security concerns must be addressed to ensure that data is protected and only accessed by authorized parties. This special issue on Information Centric Wireless Communication with Edge Fog Computing for 5G and beyond IoT applications aims to provide a platform for researchers and practitioners to share their latest findings, innovations, and challenges related to the development, deployment, and evaluation of Information Centric Wireless Communication with Edge Fog Computing for 5G and beyond IoT applications. The special issue welcomes contributions that focus on novel protocols, architectures, algorithms, and use cases related to ICWC and edge fog computing, and encourages interdisciplinary research that addresses the technical, social, economic, and environmental aspects of the technology. The goal is to advance the state-of-the-art in ICWC and edge fog computing, and to facilitate the integration of these technologies into practical applications and systems that can benefit society and the industry. Topics Potential topics include but are not limited to: Development of new protocols for content-centric communication in wireless networks Design of edge fog computing architectures for real-time data processing in IoT applications Evaluation of the performance of edge fog computing architectures in terms of latency, bandwidth, and energy consumption Development of algorithms for efficient caching and distribution of popular content in ICWC networks Investigation of privacy and security issues in ICWC and edge fog computing architectures Development of mechanisms for managing network congestion in ICWC networks Investigation of the impact of edge fog computing on the scalability and reliability of IoT applications Algorithms and protocols for ICWC deployment in IoT systems Evaluation of the trade-offs between data processing at the edge of the network vs. centralized processing Exploration of use cases for ICWC and edge fog computing in different industries, such as healthcare, transportation, and manufacturing Investigation of the impact of ICWC and edge fog computing on the overall energy consumption of wireless networks Development of new machine learning algorithms for analyzing data at the edge of the network Design of new ICWC and edge fog computing architectures that can support the specific requirements of 5G applications, such as URLLC and mMTC. Author’s Guidelines The submissions should follow the formatting guidelines of the Journal of Information Science and Engineering (https://jise.iis.sinica.edu.tw/pages/authors/manuscripts.html). For inquiries regarding this special issue, please contact the guest editors. All submitted papers will undergo rigorous peer review by a minimum of three reviewers, assessed for originality, significance, relevance, and clarity. Manuscripts should be prepared according to the JISE Word (or LaTeX) standard and converted into a PDF for submission. Electronic submissions should be submitted to SI_Auto_Submit_System at https://journal.iis.sinica.edu.tw/surl/jise-icw Publication Schedule Manuscript Submission Deadline: December 31, 2024 Notification of Acceptance/Rejection/Revision: March 31, 2025 Final Manuscript Due: April 30, 2025 Tentative Publication Date: September 1, 2025
Last updated by Dou Sun in 2024-08-25
Related Journals
CCFFull NameImpact FactorPublisherISSN
Journal of Interaction Science Springer2194-0827
ET Microwaves, Antennas & Propagation1.100IET1751-8725
bJournal of Computer Science and Technology1.200Springer1000-9000
International Journal of UbicComp AIRCC0976-2213
Applied Soft Computing7.200Elsevier1568-4946
Indonesian Journal of Science and TechnologyUniversitas Pendidikan Indonesia2528-1410
Journal of Electronic Commerce Research3.900California State University Press1938-9027
Information Systems and e-Business Management2.300Springer1617-9846
Journal of Mathematical CryptologyWalter de Gruyter1862-2976
Full NameImpact FactorPublisher
Journal of Interaction Science Springer
ET Microwaves, Antennas & Propagation1.100IET
Journal of Computer Science and Technology1.200Springer
International Journal of UbicComp AIRCC
Applied Soft Computing7.200Elsevier
Indonesian Journal of Science and TechnologyUniversitas Pendidikan Indonesia
Journal of Electronic Commerce Research3.900California State University Press
Information Systems and e-Business Management2.300Springer
Journal of Mathematical CryptologyWalter de Gruyter
Related Conferences
Recommendation