Submission Preparation Checklist

As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.

  • The submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
  • The submission file is in OpenOffice or Microsoft Word document file format.
  • Where available, URLs for the references have been provided.
  • The text is single-spaced; uses a 10-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
  • The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines.

Author Guidelines

Author Guidelines and Journal Template already in this website. Please follow both.


Example for references:


[1] K. Chen, Linear Networks and Systems. Belmont, CA: Wadsworth, 1993, pp. 123-135.


[2] The Oxford Dictionary of Computing, 5th ed. Oxford: Oxford University Press, 2003.


[3] Bass, P. Clements, and R. Kazman, Software Architecture in Practice, 2nd ed. Reading, MA: Addison Wesley, 2003. [E-book] Available: Safari e-book.


[4] D. Lipson and B. D. Horwitz, “Photosensory reception and transduction,” in Sensory Receptors and Signal Transduction, J. L. Spudich and B. H. Satir, Eds. New York: Wiley-Liss, 2001, pp-1-64.


[5] B. R. Strimpel, "Computer graphics," in McGraw-Hill Encyclopedia of Science and Technology, 8th ed., Vol. 4. New York: McGraw-Hill, 1997, pp. 279-283.


[6] Altun, “Understanding hypertext in the context of reading on the web: Language learners’ experience,” Current Issues in Education, vol. 6, no. 12, July, 2005. [Online]. Available: http://cie.ed.asu.edu/volume6/number12/.[Access-ed Dec. 2, 2007].


[7] Ayasso and A. Mohammad-Djafari, "Joint NDT Image Restoration and Segmentation Using Gauss–Markov–Potts Prior Models and Variational Bayesian Computation," IEEE Transactions on Image Processing, vol. 19, no. 9, pp. 2265-77, 2010. [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed Sept. 10, 2010].


[8] Chen, W. Huang, B. Zhou, C. Liu, W.H. Mow, "PiCode: a new picture-embedding 2D barcode", IEEE Transactions on Image Processing, vol. 25, no. 8, pp. 3444-3458, August 2016.


[9] Bánoci, M. Broda, G. Bugár, D. Levický, "Universal Image Steganalytic Method", In: Radioengineering, vol. 23, no. 4, pp. 1213-1220, December 2014, ISSN 1210-2512.


[10] Smith, R. Jones, and K. Trello, “Adaptive filtering in data communications with self improved error reference,” In Proc. IEEE International Conference on Wireless Communications ’04, 2004, pp. 65-68.


[11] Liu and H. Miao, "A specification based approach to testing polymorphic attributes," in Formal Methods and Software Engineering: Proc.of the 6th Int. Conf. on Formal Engineering Methods, ICFEM 2004, Seattle, WA, USA, November 8-12, 2004, J. Davies, W. Schulte, M. Barnett, Eds. Berlin: Springer, 2004. pp. 306-19.


[12] Lach, "SBFS: Steganography based file system," in Proc. of the 2008 1st Int. Conf. on Information Technology, IT 2008, 19-21 May 2008, Gdansk, Poland [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed: 10 Sept. 2010].


[13] A. Nimr, "Defuzzification of the outputs of fuzzy controllers," presented at 5th Int. Conf. on Fuzzy Systems, 1996, Cairo, Egypt. 1996.


[14] Kimura and A. Lipeles, “Fuzzy controller component,” U. S. Patent 14, 860,040, 14 Dec., 2006.


[15] Texas Instruments, “High speed CMOS logic analog multiplexers/demultiplexers,” 74HC4051 datasheet, Nov. 1997 [Revised Sept. 2002].


[16] European Telecommunications Standards Institute, “Digital Video Broadcasting (DVB): Implementati-on guidelines for DVB terrestrial services; transmission aspects,” European Telecommuni-cations Standards Institute, ETSI TR-101-190, 1997. [Online]. Available: http://www.etsi.org. [Accessed: Aug. 17, 1998].


[17] Sussman, "Home page - Dr. Gerald Sussman," July 2002. [Online]. Available: http:// www.comm.pdx.edu/faculty/Sussman/sussmanpage.htm. [Accessed: Sept. 12, 2004].


[18] Karnik, “Performance of TCP congestion control with rate feedback: TCP/ABR and rate adaptive TCP/IP,” M. Eng. thesis, Indian Institute of Science, Bangalore, India, Jan. 1999.


[19] Sudweeks, Development and Leadership in Computer-Mediated Collaborative Groups. PhD [Dissertation]. Murdoch, WA: Murdoch Univ., 2007. [Online]. Available: Australasian Digital Theses Program.


[20] Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and control,” Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999.


[21] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1997.


Source guidelines for references:


https://ieeeauthorcenter.ieee.org/wp-content/uploads/IEEE-Reference-Guide.pdf.


https://ieee-dataport.org/sites/default/files/analysis/27/IEEE%20Citation%20Guidelines.pdf.