Calls for Papers (special): International Journal of Information Technology and Web Engineering (IJITWE)


Special Issue On: Recent advances in Mobile Cloud Computing and Web based Applications

Submission Due Date
7/1/2017

Guest Editors
Dr. Yaser Jararweh, Jordan University of Science & Technology, Jordan
Dr. B. B. Gupta, National Institute of Technology Kurukshetra, India

Introduction
Cybersecurity is an essential need for a modern society in which information technology and services pervade every aspect of our lives. However, it is challenging to achieve, as technology is changing at rapid speed and our systems become ever more complex. We are gradually becoming more dependent upon such information and communication infrastructures, and the threats we face are organised by attackers or cyber criminals to exploit our dependency. Moreover, cyberspace is considered as the fifth battlefield after land, air, water and space. Moreover, mobile devices face many resource and other challenges (battery life, storage, bandwidth, security, etc.).

To solve these problems, researchers have introduced a trusted and dependable solution, called Mobile Cloud Computing (MCC) which refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. As in every new technology, some challenges face the vision of the Mobile Cloud Computing, which are the administrative policies and security concerns (i.e. secure data storage, secure computation, network security, data privacy, usage privacy, location privacy, etc). Additionally, web based applications also have various security and privacy issues which need to be addressed.

Objective
Objective of this sspecial issue is to investigate the opportunities and requirements for Mobile Cloud Computing and web based applications. In addition, it seeks for novel contributions that help mitigating Mobile Cloud Computing and web based application challenges. Contributions may present and solve open technical problems, integrate novel solutions efficiently, and focus on the performance evaluation and comparison with existing standards.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

  • Security and privacy issues in Web based applications
  • Cross Site Scripting attacks
  • Security analysis and verification of communication protocol in mobile cloud computing (MCC)
  • Privacy-preserving protocols in mobile cloud computing
  • Access control mechanisms in mobile cloud computing
  • Cryptography cloud storage
  • Cloud Security
  • IoT Security
  • Botnet Detection
  • Cyber Physical Systems (CPSs)
  • Fog Computing
  • MCC Pricing and billing models
  • Data storage, processing, and management at MCC platform
  • Admission control for MCC
  • Social engineering, insider threats, advance spear phishing
  • Incident Handling and Penetration Testing
  • Forensics of Virtual and MCC Environments
  • Security protocols in MCC
  • Innovative authentication methods to mobile devices and services
  • Mobile application and application store security and privacy
  • Mobile malware collection, statistics, and analysis
  • Bots on mobile devices
  • Reverse engineering and automated analysis of mobile malware
  • MCC Resource scheduling that enhances the reliability and scalability
  • MCC Resources monitoring mechanism and utilization measuring mechanism
  • MCC resources allocation and management
  • MCC virtualization


Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Recent advances in Mobile Cloud Computing and Web based Applications on or before June 01, 2017. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Dr. B. B. Gupta & Dr. Yaser Jararweh
Guest Editors
International Journal of Information Technology and Web Engineering (IJITWE)
E-mail: yaser.amd@gmail.com; bbgupta@nitkkr.ac.in

Special Issue On: Cyber Security and Privacy Issues

Submission Due Date
7/31/2017

Guest Editors
Dr C P Gupta, Associate Professor, Rajasthan Technical University, Kota, India
Dr Nishtha Kesswani, Asst Professor, Central University of Rajasthan, India

Introduction
Cyber security is an important tool in protecting privacy and preventing unauthorized surveillance, and information sharing and intelligence gathering can be useful tools for effecting cyber security. The management of risk to information systems is considered fundamental to effective cybersecurity. Over the past several years, experts and policymakers have expressed increasing concerns about protecting ICT systems from cyber-attacks, which many experts expect to increase in frequency and severity over the next several years. The security and privacy of ICT should not be overlooked. Recommendations on design and implementation of a secure Web-based learning system is now a must.

Objective
The issue aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of ICT systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.

Recommended Topics
Topics to be discussed in this special issue include the following:

Cyber security
  • Big Data Techniques in Cyber Security
  • Forensic Analysis of Cyber Crimes
  • Secure Design, Tooling, and Engineering
  • Security and Trust of Citizens

Database security
  • Big Data Communication and Analytics
  • Data Sharing and Infrastructures
  • Quality of Service (QoS)

Cloud security
  • Mobile Cloud
  • Cloud and Systems Management
  • Cloud Computing and Networking

Network Security
  • Digital Signature Techniques
  • Advance Persistent Threat
  • Security and Cyber attacks in Next-generation Communication Networks
  • Information-Centric Networking
  • Data Network Management
  • Network Monitoring and Control
  • Traffic Measurement, Analysis, Modeling and Visualization
  • Sensor Nets and Embedded Systems
  • Network applications (web, multimedia streaming, gaming, etc.)
  • Software-Defined Networking
  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
  • Security & Privacy in Peer-to-Peer and Overlay Networks
  • Security & Privacy for Emerging Technologies: VoIP, Social Networks
  • Security & Isolation in Cloud, Data Center and Software-Defined Networks


Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Cyber Security and Privacy Issues on or before July 31, 2017. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis by three exerts in the field. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Dr C P Gupta, Dr Nishthaf Kesswani
Guest Editors
International Journal of Information Technology and Web Engineering (IJITWE)
E-mail: iccs@iaasse.org

Special Issue On: Social Media Fusion with Deep Learning and its Application

Submission Due Date
8/31/2017

Guest Editors
Dr. Walter Miller, University of Alberta, Canada
Dr. Louis Thomas, University of Alberta, Canada
Arun Kumar Sangaiah, VIT University, India
Ford Lumban Gaol, Bina Nusantara University, Republik Indonesia
Krishn K. Mishra, University of Missouri, USA

Introduction
Social media is the tool and platform, where people share their thoughts, experience and opinions between each other. It is a kind of new medium for information exchange and sharing. In recent years, social media is thriving in the fertile soil on the Internet, which changes people's way of life. Compared with conventional medium, social media has some characteristics, such as interactive, multimodal, and collective relational, which makes it challenging to analyze, manage and index these social media data and analysis behind all the interactions. How to automatically discover and mine useful information from large scale social media content and relational data for effective information search, access, and recommendation has become the key for the development of the Internet and next-generation of services. Meanwhile, deep learning, which handles the representation learning problems by multiple non-linear mapping and artificial intelligent algorithms, has powerful abilities of enabling feature learning and feature fusion. Related research shows that deep network based models have a unique advantage in solving the complex problems from massive data, and they demonstrate steps and empirical evidence for solving the problems in social media, understanding activities behind the scene and help organizations and government better about customers and citizens’ thoughts, behaviors and comments on their services. Feature learning based on deep network in social media aims to find representative feature for social media items. It is not only the important precondition and foundation for social media information mining, but also a hot section in multimedia and machine learning communities.

This special section aims at collecting on fusion methods and algorithms for merging multiple sources of information by using deep learning, machine learning and AI methods for social media mining, social recommendation systems and social network analysis. Any research on modeling social media information using deep learning and machine learning methods and its applications to real world social media mining problems, new aggregation approaches (not mere extensions) offered by them, as well as conflict/inconsistency analysis among multiple pieces of social media information is welcome.

Submitted contributions (which should be original and not previously published either in full or in part or presented even in a more or less similar form at any other forum) covering high quality and unpublished research that clearly delineate the role of social media fusion with deep learning are invited. Such manuscripts should present novel and impactful research on this topic. The manuscript will be judged solely on the basis of new contributions excluding the contributions made in earlier publications. Justification of contributions should be described in sufficient detail to be reproducible on the basis of the material presented in the paper and the references cited therein.

Recommended Topics
Topics appropriate for this special section include (but are not necessarily limited to):

  • Social media modeling and social computing
  • Deep learning and machine learning methods for social media fusion
  • Social media fusion system
  • Sentiment analysis, large scale sentiment analysis and simulations
  • Social network analysis and fusion techniques
  • Fusion analysis, query, management and indexing
  • Social recommendation systems with deep learning
  • Computational intelligence for big data social network
  • Social media mining, optimization and fusion with IoT, Fog and Cloud Computing
  • Multi-modality fusion with business process modeling and workflows
  • Multimedia summarization, visualization and recommendation
  • Fusion with artificial intelligence
  • Fusion between social network, geo-spatial data and deep analysis
  • Integration of social media with location data and location privacy
  • User behavior analysis and fusion
  • Social media monetization and fusion with machine learning
  • Privacy, security and trust issues for service fusion
  • New fusion methods, technologies and services


Submission Procedure
Interested authors should consult the journal’s guidelines for manuscript submissions at at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

Submitted papers must be original, must not have been previously published or be under consideration for publication elsewhere. In case a paper has been already presented at a conference, it should be extended by at least 30% new technical contributions, before submitted for this special section.

Important Dates
Manuscript due: August 31, 2017
Paper acceptance decision: October 31, 2017
Expected publication: First Quarter, 2018

All submissions and inquiries should be directed to the attention of:
Walter Miller
Guest Editor
International Journal of Information Technology and Web Engineering (IJITWE)
Email: millerwal920@gmail.com

Special Issue On: Intelligent Approaches toward the Future in Internet of Things (SI-IAIOT)

Submission Due Date
10/30/2017

Guest Editors
Dr. Rajeev Arya, CMR Engineering College, (Jawaharlal Nehru Technology University), Hyderabad, India
Dr. S. C. Sharma,Indian Institute of Technology Roorkee, Uttarakhand, India
Dr. Shamimul Qamar,King Khalid University, Abha, Saudi Arabia

Introduction
Internet of Things is a field that digitized the physical world. It has great prospects for the future and is becoming very popular. Thousands of researchers around the world are currently working in systems based on the Internet of Things. IoT is basically a technology concept and/or an architecture which is an aggregation of already available technologies. The core of many IoT systems is based in a network of smart things or connected sensors or a network of embedded system. These systems are already being applied in a lot of areas like smart cities, smart healthcare innovation, smart homes, smart agriculture, industrial automation as food processing & marketing in Food industry, Garbage management and monitoring systems, etc. The Internet of Things (IoT) brings traditional Internet industry and society with new trends and promising technologies. The objective of Internet of things is to bring together people, process, data and things to make networked connections more relevant and valuable than ever before, turning information into actions that create new capabilities, richer experiences and unprecedented economic opportunity for business, individuals and countries. IoT Applications range from Digital sensor tools/ Interfaces used for remote applications to smarter and more well connected mobile devices, industrial machine learning systems and other types of distributed hardware that have recently become more intelligent and automated. The rapid growth in Information & communication technology and the power of the Internet has strongly impacted the business and service delivery models of today‘s global environment. These objects are uniquely addressable and use standard communication protocol and communicate in a heterogeneous networking environment. We are entering into the smart world where the ways of doing things are being changed; with wired or wireless sensors collecting huge data sets to measure the physical world and taking Analytical steps to reach intelligent decisions. Internet of Things can also be considered as a subset of traditional Big Data. The actual pattern and nature of such data is indistinct, but is certainly large, complex, in homogeneous structure and unstructured. The swift growth of sensing devices under Internet of Things purview is generating such bulky, complex and heterogeneous data that the available computing capacity of the existing systems are unable to successfully match up the data challenges of today; this has emerged as one of the core issues for the data science community. Extracting precise inferences from raw sensor data is not easy within the noisy and multifaceted environments. Deep Learning is one of the most promising approaches for prevailing over this challenge, and achieving reliable inference. As Internet of Things and its applications are majorly impacting human life, the scientific communities consider a wider outreach from the processing and sharing of Internet of Things across the variety of the several commodity devices around us. Thus, the development of new technologies encourages to cater the current data processing requirement.

Objective
This special issue intends to bring together theoreticians and practitioners from academia and industries worldwide working in a broad range of topics relevant to the theory and practice of Intelligent Approaches toward the Future in Internet of Things to promote ideas that will influence and encourage researchers to work for the betterment of mankind.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

  • Architectures and protocols for wireless networks
  • MAC, routing and transport protocols for wireless networks
  • Energy efficient wireless devices
  • Sensor data processing and integration
  • Smart healthcare innovation using IoT
  • IoT applications, services, integrations, Cognitive
  • Deep learning with wireless network: algorithm and applications
  • IoT with deep learning
  • Standards like IEEE 802.15.4 and Energy efficient protocols for IoT
  • Novel architectures, concepts, principles, and mechanisms for IoT
  • Big data analysis, Cloud, fog, and edge computing for IoT
  • Security and Privacy issues in IoT
  • Middleware, frameworks and distributed applications for coordinating devices in IoT
  • Solutions to improve IoT big data networks - congestion, scalability
  • Hardening security for IoT - Challenges and solutions
  • Localization and location aware routing protocols
  • Energy-efficiency in mobile ad hoc networks, vehicular networks, wireless sensor networks
  • Physical layer techniques, channel/network coding for energy efficiency MAC
  • Routing and transport protocols for wireless ad hoc networks


Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Intelligent Approaches toward the Future in Internet of Things (SI-IAIOT) before 30th October, 2017. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Dr. Rajeev Arya
Guest Editor
International Journal of Information Technology and Web Engineering (IJITWE)
E-mail: rajeev.arya.ism@gmail.com

Special Issue On: Advanced Research in Privacy and Forensic Analytic of Web Engineering

Submission Due Date
12/25/2017

Guest Editors
Gulshan Shrivastava, National Institute of Technology Patna, India
Nhu Nguyen Gia, Duy Tan University, Vietnam
Gaurav Sharma,Université Libre de Bruxelles, Brussels, Belgium
Mohamed Salim Bouhlel, University of Sfax, Tunisia

Introduction
The internet is a net of networks used for innumerable purposes, even by the public. Statistics show that the penetration of the Internet has increased manifold in the last decade and almost every Tom, Dick and Harry is using the internet for fulfilling their different needs and purposes. The internet, which is also known as, Infobahn, used for purposes such as business (including e-commerce), government, academics and even for domestic purposes. It has become a powerful and an essential medium for exchange/transfer of files, online chat, document sharing and accessing websites on the World Wide Web. it is even a powerful medium for entertainment; as people can play games, get information regarding their respective hobbies and connect with different people including friends using social media. E-learning has greatly replaced classroom learning mandate thus revolutionizing information sharing by adding newfangled dimensions. Web forensic analytics is the measurement, collection, analysis and reporting of internet data for the purpose of understanding and optimizing web usage. It is a tool for measuring web traffic, business and market research by assessing and improving the effectiveness of a website. For instance, it helps to measure change of traffic to a website after the launch of a new advertising campaign, including the number of visitors on the website and number of pages viewed by the visitors.

Objective
Today, websites are important communication channels that reach a massive audience. Measuring the effectiveness of these websites has become a key issue for researchers, as well as practitioners. However, there is no consensus on how to define website effectiveness and which dimensions need to be used for the evaluation of these websites. This problem is more noteworthy for information driven websites like academic, medical and legal advisory websites. The main intent of this special issue to provide a premier international platform fora wide range of professions, including scholars, researchers, academicians and industry people to present and discuss how to bridge the gap by providing an in-depth look into analytics in web data and explaining technologies involved and their relationship to forensic procedures. This special issue covers web database with features beyond trust and privacy capabilities. This special issue will also discusses procedures for the validation, preservation, acquisition, examination, analysis, and reporting of web information and its best practices for the real world.

Recommended Topics
Topics to be discussed in this special issue include the following:

  • Integration of embedded computers, wireless sensor networks, every-day appliances, smart gateways, and tagged objects (RFID, barcodes, QRs, NFC) using a Web approach.
  • Secure converged and integrated systems for web computing.
  • Real-time communication with physical objects (e.g.,WebSockets, Web-RTC, MQTT, CoAP, AMQP).
  • Web-based discovery, search, composition, and physical mashups.
  • Web-based Android application threat analysis.
  • Use of semantic technologies to facilitate the interaction with and between things on the Web.
  • (Meta-)Models and paradigms allowing model-driven approaches for the Web Engineering.
  • Investigation in Smart phone for cyber crime.
  • Security, privacy, access control, and sharing of physical things on the Web.
  • Application of Web tools and techniques in the physical world (e.g., REST, HTML5, 6lowpan, cloud services, social networks).
  • Cloud platforms and services for the Web of Things.
  • Concrete applications, use-cases, deployments, and evaluations of Web-enabled Things in contexts such as smart homes, connected cities, and Web 2.0 enterprises.
  • Privacy and forensic of Web engineering in telecommunication systems.


Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Advanced Research in Privacy and Forensic Analytic of Web Engineering on or before December 25, 2017. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis by three exerts in the field. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Gulshan Shrivastava
Guest Editor
International Journal of Information Technology and Web Engineering (IJITWE)
E-mail: gulshan.shrivastava@ieee.org

Special Issue On: Soft Computing Techniques and Web based Applications

Submission Due Date
3/30/2018

Guest Editors
Harry (Haoxiang) Wang, Cornell University, USA
Yufeng Wang, Shanghai Institute of Technology, China
Xiang Wang, University of Science and Technology Beijing, China

Introduction
Soft computing is a set of methods which are highly consistent at the target level and distinctive at the method level. This feature determines the natural complementarity and integration among the soft computing members. The organic combination of its members can often take into account the different aspects of the problem and perspective, complementary advantages, coordination, and achieved good results. Soft computing mainly includes rough set, fuzzy logic, neural network, genetic algorithm, particle swarm algorithm, chaos and other parts while compared with traditional hard computing, soft computing is closer to the objective things themselves, and human thinking more closely with more intelligent to complete the solution to the problem. With the development of related technologies, soft computing has developed rapidly in recent years, and is widely used in many fields, such as the analysis of complex systems, signal processing, pattern recognition, fault diagnosis, data compression and so on. Soft computing and the other areas of professional and technical knowledge combined to form a specific and effective means to solve the problem. And each member between the soft computing are not mutually exclusive, but cooperation, so in solving specific problems can use soft computing technology to realize the complementary advantages.

Since the concept of Web mining was put forward in 1996, it has attracted the interest of many researchers. They have studied and explored Web knowledge discovery from different aspects and in different ways. Web mining data can be derived from the Web server, client and proxy server and the data types are text, pictures, sounds and tags; data characteristics are unmarked, distributed, heterogeneous, semi-structured and time-varying. Therefore, although Web mining can be seen as a special application of data mining, because of its data characteristics and the relevance of people, Web mining is necessarily to be regarded as an independent research area to explore. Under this background, the integration of soft computing techniques and Web based applications is the trend.

Objective
This special issue aims at bringing together researchers in the world working on soft computing techniques with the special applications on Web engineering. We are seeking for the high-quality and unpublished original work that deliver their research in the soft computing techniques. Contributions may present and solve open technical problems, integrate novel solutions efficiently, and focus on the performance evaluation and comparison with existing standards.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

  • Big Data for Internet-based Services
  • Metadata and Metamodeling
  • Multimedia and User Interfaces
  • Databases and Data Warehouses
  • Distributed and Parallel Applications
  • Protocols and Standards
  • System Integration
  • Web Programming
  • Web Security and Privacy
  • Computational Intelligence on the Web
  • Web Data Mining
  • Learning User Profiles
  • Peer-to-Peer Approaches for Web Application Architectures
  • Reuse and Integration
  • Systematic Reuse of Web Services
  • Use and Integration of Meta-data in Web Applications
  • Web Design Patterns and Pattern Mining
  • Managing Web Application Design, Evolution and Maintenance
  • Meta-Knowledge Discovery and Representation
  • Opinion Mining and Sentiment Analysis
  • Intelligent Web and the E-commerce
  • Intelligent Web and the Art Design and Sciences
  • Intelligent Web and the Management
  • Intelligent Web and the Sport Sciences


Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Soft Computing Techniques and Web based Applications on or before August 30, 2017. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Harry (Haoxiang) Wang, Yufeng Wang, Xiang Wang
Guest Editor
International Journal of Information Technology and Web Engineering (IJITWE)
E-mail: hw496@goperception.com