期刊信息
Journal of Information Science and Engineering (JISE)
https://jise.iis.sinica.edu.tw/影响因子: |
1.100 |
出版商: |
Institute of Information Science |
ISSN: |
0000-0000 |
浏览: |
12796 |
关注: |
7 |
征稿
Description The Journal of Information Science and Engineering is published bimonthly by the Institute of Information Science, Academia Sinica. The purpose of this journal is to provide an open forum to publish high-quality research papers in the areas of information science and engineering to promote the exchange of research ideas, experiences, and results. This journal therefore invites the submission of technical manuscripts on topics within these areas. Scope The Journal of Information Science and Engineering is dedicated to the dissemination of information on computer science, computer engineering, and computer systems. This journal encourages articles on original research in the areas of computer hardware, software, man-machine interface, theory and applications. tutorial papers in the above-mentioned areas, and state-of-the-art papers on various aspects of computer systems and applications. Subjects Artificial Intelligence Big Data & Cloud Computing Audio, Speech, and Language Processing Computer Architecture & Hardware Design Computer Networks & Wireless Communication Computer Security & Cryptography Computer Vision & Pattern Recognition Computer Systems Data Mining & Analysis Databases & Information Systems Evolutionary Computation Fuzzy Systems Human-Computer Interaction Image Processing Information Retrieval Machine Learning Multimedia Natural Language Processing Real-time & Embedded Systems Sensor Networks Signal Processing Software Systems
最后更新 Dou Sun 在 2024-08-25
Special Issues
Special Issue on Pattern Recognition in Real-Time Video Surveillance Systems Using Soft Computing截稿日期: 2024-11-30Aim and Scope Real-time video surveillance systems have created pattern recognition, a crucial feature in today's security infrastructure. These systems can quickly collect and analyse video data to identify and anticipate unusual behaviour or possible safety threats using soft computing approaches. The increasing interest in enhanced security in both public and private areas has led to a significant demand for advanced video surveillance systems. Traditional methods often fail in two domains such as large data sets and changing situations. Soft computing approaches are perfect for real-time surveillance applications because they are flexible, robust, and have the capacity to learn from data. Integrating pattern recognition in video surveillance for enhancing video quality and filtering noise through preprocessing, capturing video footage with cameras, finding relevant features from the video frames, and utilizing algorithms to detect patterns and anomalies. Advanced technologies are used by video surveillance systems to effectively recognize things and identify patterns. They use support vector machines to classify objects, genetic algorithms to improve detection accuracy, and fuzzy logic to handle uncertainty in video data. For optimal performance, several systems combine these techniques. Convolutional neural networks (CNNs), is a type of deep learning model, utilized for tasks including object detection in motion pictures and facial recognition. Edge computing reduces latency and internet consumption by processing data closer to its source. YOLO and Faster R-CNN are two examples of innovative neural network designs that have improved object detection capabilities significantly. The combination of Internet of Things (IoT) devices and video surveillance has improved monitoring capabilities, increasing the effectiveness and responsiveness of surveillance. Future developments in AI and machine learning, such as more efficient real-time analytics algorithms, increased accuracy with less false positives, and the development of fully autonomous surveillance systems that make decisions without the need for human intervention, may be facilitated by pattern recognition in video surveillance. Despite its potential, it has several challenges include ensuring data privacy, handling massive amounts of data and large-scale deployments, and adapting to various conditions. To overcome these challenges, advanced encryption is required to protect data, creating scalable and flexible modular systems, and incorporating adaptive algorithms to learn continuously and evolve with new data. However, the field of security is being revolutionized by pattern recognition in real-time video surveillance systems using soft computing. We accept submissions from a variety of fields and viewpoints, such as but not limited to: Pattern Recognition in Real-Time Video Surveillance Systems Using Soft Computing. Topics Potential topics include but are not limited to: Role of pattern recognition in modern video surveillance systems Enhancing security using soft computing approaches in real-time video surveillance Integrating advanced algorithms for real-time video data analysis Future directions in video surveillance with AI and soft computing integration Challenges and solutions in implementing pattern recognition for surveillance Contribution of deep learning in modern video surveillance Optimization of surveillance systems with support vector machines and genetic algorithms Utilization of IoT devices with video surveillance for enhanced monitoring Employing soft computing techniques for superior video surveillance performance Analysis of innovative neural network designs in object detection for surveillance systems Author’s Guidelines The submissions should follow the formatting guidelines of the Journal of Information Science and Engineering (https://jise.iis.sinica.edu.tw/pages/authors/manuscripts.html). For inquiries regarding this special issue, please contact the guest editors. All submitted papers will undergo rigorous peer review by a minimum of three reviewers, assessed for originality, significance, relevance, and clarity. Manuscripts should be prepared according to the JISE Word (or LaTeX) standard and converted into a PDF for submission. Electronic submissions should be submitted to SI_Auto_Submit_System at https://journal.iis.sinica.edu.tw/surl/jise-prv Publication Schedule Manuscript Submission Deadline: November 30, 2024 Notification of Acceptance/Rejection/Revision: February 28, 2025 Final Manuscript Due: April 30, 2025 Tentative Publication Date: November 1, 2025
最后更新 Dou Sun 在 2024-08-25
Special Issue on Combinatorial Mathematics and Computation Theory截稿日期: 2024-11-30Aim The special issues on Combinatorial Mathematics and Computation Theory cover the various aspects of evolving algorithms related to Combinatorial Mathematics. It is based on the 41st Symposium on Combinatorial Mathematics and Computation Theory (CMCT2024) which will be held at University of Taipei, Taipei on May 17-18, 2024 (CMCT 2024) (). The main purpose of this symposium is to provide an opportunity for the experts of combinatorics, discrete mathematics, computational theory, algorithm, network computing, bioinformatics, and other research fields to gather together to discuss their recent research and promote other academic exchange. The special issues include the selected extended best papers of CMCT2024 after going through the review process. Scope Papers are solicited on the latest results from the recent advancement in technologies and applications of combinatorics, discrete mathematics, computational theory, algorithm, network computing, and bioinformatics. Topics include, but are not limited to: Artificial Intelligence Theory and Technology Related to Intelligent Science and Sustainable Development Combinatorics Combinatorial Design; Enumerative Combinatorics; Combinatorial Geometry; Combinatorial Topology; Analytic Combinatorics; Algebraic Graph Theory. Discrete Mathematics Graph Theory; Abstract Algebra; Theoretical Computer Science. Computational Theory Computational Complexity Theory; Computability Theory; Turing Machine; Optimization Problem. Algorithm Quantum Algorithm; Divide and Conquer; Reduction of Complexity; Back Tracking; Dynamic Programming; Linear Programming; Approximation Algorithm; Greedy Algorithm. Network Computing 5G Networks & Internet of Things (IoT); Heterogeneous Networks Web of Things; High Performance Internet Protocols; Internet Security and Privacy Localization; Data Center Networking; Blockchain and Consensus Algorithm. Bioinformatics Sequence Analysis; Gene and Protein Expression; Structural Bioinformatics; Network and System Biology; Phylogenetic Reconstruction; Next Generation Sequencing Analysis; Protein Function Prediction. Author’s Guidelines The submissions should follow the formatting guidelines of the Journal of Information Science and Engineering (https://jise.iis.sinica.edu.tw/pages/authors/manuscripts.html). Any questions regarding this special issue should be sent to the guest editor, Dr. Ling-Ju Hung. All submitted papers will be reviewed by at least three reviewers and selected based on their originality, significance, relevance, and clarity of presentation. The manuscript should be prepared in JISE Word (or Latex) standard and converted into a PDF for auto-submission system. Electronic paper should be submitted to SI_Auto_Submit_System at https://journal.iis.sinica.edu.tw/url/jise-24cmt Publication Schedule Manuscript Submission Deadline: November 30, 2024 Notification of Acceptance/Rejection/Revision: February 28, 2025 Final Manuscript Due: March 31, 2025 Tentative Publication Date: July, 2025
最后更新 Dou Sun 在 2024-08-25
Special Issue on Information Centric Wireless Communication (ICWC) with Edge Fog Computing for 5G and beyond IoT Applications截稿日期: 2024-12-31Aim and Scope With the growing number of connected devices and the increasing volume of data generated by IoT applications, traditional network architectures are unable to handle the data traffic efficiently. Edge fog computing provides a distributed computing infrastructure at the edge of the network, enabling data to be processed and analyzed closer to the source, reducing latency and improving network performance. Additionally, ICWC allows for content-centric communication, enabling more efficient data distribution and reducing network congestion, making it a critical technology for enabling the success of 5G and beyond IoT applications. The combination of ICWC and edge fog computing is particularly suited for IoT applications, where data is generated and consumed at the edge of the network. For example, in smart homes, sensors generate data that needs to be processed and analyzed in real-time to enable automation and control. With ICWC and edge fog computing, the processing and analysis can be done at the edge of the network, reducing the need for data to be transmitted to a centralized server, which can be slow and unreliable. On the other hand, ICWC and edge fog computing also offer several benefits for 5G applications, such as ultra-reliable low-latency communication (URLLC) and massive machine-type communication (mMTC). In URLLC applications, such as remote surgery and autonomous vehicles, low latency is critical for ensuring real-time communication and decision-making. With edge fog computing, data can be processed and analyzed closer to the source, reducing latency and improving network performance. Similarly, in mMTC applications, such as smart cities and industrial automation, ICWC can enable efficient data distribution and reduce network congestion. One of the challenges of implementing ICWC with edge fog computing is the need for a new network architecture that supports content-centric communication. This requires new protocols and standards for data naming, caching, and distribution, as well as a distributed computing infrastructure at the edge of the network. Additionally, privacy and security concerns must be addressed to ensure that data is protected and only accessed by authorized parties. This special issue on Information Centric Wireless Communication with Edge Fog Computing for 5G and beyond IoT applications aims to provide a platform for researchers and practitioners to share their latest findings, innovations, and challenges related to the development, deployment, and evaluation of Information Centric Wireless Communication with Edge Fog Computing for 5G and beyond IoT applications. The special issue welcomes contributions that focus on novel protocols, architectures, algorithms, and use cases related to ICWC and edge fog computing, and encourages interdisciplinary research that addresses the technical, social, economic, and environmental aspects of the technology. The goal is to advance the state-of-the-art in ICWC and edge fog computing, and to facilitate the integration of these technologies into practical applications and systems that can benefit society and the industry. Topics Potential topics include but are not limited to: Development of new protocols for content-centric communication in wireless networks Design of edge fog computing architectures for real-time data processing in IoT applications Evaluation of the performance of edge fog computing architectures in terms of latency, bandwidth, and energy consumption Development of algorithms for efficient caching and distribution of popular content in ICWC networks Investigation of privacy and security issues in ICWC and edge fog computing architectures Development of mechanisms for managing network congestion in ICWC networks Investigation of the impact of edge fog computing on the scalability and reliability of IoT applications Algorithms and protocols for ICWC deployment in IoT systems Evaluation of the trade-offs between data processing at the edge of the network vs. centralized processing Exploration of use cases for ICWC and edge fog computing in different industries, such as healthcare, transportation, and manufacturing Investigation of the impact of ICWC and edge fog computing on the overall energy consumption of wireless networks Development of new machine learning algorithms for analyzing data at the edge of the network Design of new ICWC and edge fog computing architectures that can support the specific requirements of 5G applications, such as URLLC and mMTC. Author’s Guidelines The submissions should follow the formatting guidelines of the Journal of Information Science and Engineering (https://jise.iis.sinica.edu.tw/pages/authors/manuscripts.html). For inquiries regarding this special issue, please contact the guest editors. All submitted papers will undergo rigorous peer review by a minimum of three reviewers, assessed for originality, significance, relevance, and clarity. Manuscripts should be prepared according to the JISE Word (or LaTeX) standard and converted into a PDF for submission. Electronic submissions should be submitted to SI_Auto_Submit_System at https://journal.iis.sinica.edu.tw/surl/jise-icw Publication Schedule Manuscript Submission Deadline: December 31, 2024 Notification of Acceptance/Rejection/Revision: March 31, 2025 Final Manuscript Due: April 30, 2025 Tentative Publication Date: September 1, 2025
最后更新 Dou Sun 在 2024-08-25
相关期刊
CCF | 全称 | 影响因子 | 出版商 | ISSN |
---|---|---|---|---|
Journal of Interaction Science | Springer | 2194-0827 | ||
ET Microwaves, Antennas & Propagation | 1.100 | IET | 1751-8725 | |
b | Journal of Computer Science and Technology | 1.200 | Springer | 1000-9000 |
International Journal of UbicComp | AIRCC | 0976-2213 | ||
Applied Soft Computing | 7.200 | Elsevier | 1568-4946 | |
Indonesian Journal of Science and Technology | Universitas Pendidikan Indonesia | 2528-1410 | ||
Journal of Electronic Commerce Research | 3.900 | California State University Press | 1938-9027 | |
Information Systems and e-Business Management | 2.300 | Springer | 1617-9846 | |
Journal of Mathematical Cryptology | Walter de Gruyter | 1862-2976 |
全称 | 影响因子 | 出版商 |
---|---|---|
Journal of Interaction Science | Springer | |
ET Microwaves, Antennas & Propagation | 1.100 | IET |
Journal of Computer Science and Technology | 1.200 | Springer |
International Journal of UbicComp | AIRCC | |
Applied Soft Computing | 7.200 | Elsevier |
Indonesian Journal of Science and Technology | Universitas Pendidikan Indonesia | |
Journal of Electronic Commerce Research | 3.900 | California State University Press |
Information Systems and e-Business Management | 2.300 | Springer |
Journal of Mathematical Cryptology | Walter de Gruyter |
相关会议
简称 | 全称 | 截稿日期 | 会议日期 |
---|---|---|---|
RCIS | International Conference on Research Challenges in Information Science | 2022-01-15 | 2022-05-17 |
ICAMMCE | International Conference on Advances in Materials, Mechatronics and Civil Engineering | 2020-02-05 | 2020-03-20 |
ICEMP | International Conference on Engineering Mathematics and Physics | 2023-05-20 | 2023-07-05 |
MISNC | Multidisciplinary International Social Networks Conference | 2020-08-16 | 2020-10-31 |
UCC | International Conference on Utility and Cloud Computing | 2024-08-10 | 2024-12-16 |
CMSAM | International Conference on Computational Modeling, Simulation and Applied Mathematics | 2017-10-12 | 2017-10-22 |
AIEE | International Conference on Artificial Intelligence in Electronics Engineering | 2024-10-15 | 2025-01-13 |
BIOM | International Conference on Big Data, IoT and Machine Learning | 2022-10-08 | 2022-10-22 |
CASoN | International Conference on Computational Aspects of Social Networks | 2015-09-05 | 2015-12-01 |
WISE | International Conference on Web Information System Engineering | 2024-06-20 | 2024-12-02 |
推荐