About the Journal

Focus and Scope

The Journal of Embedded System Security and Intelligent Systems (JESSI), ISSN/e-ISSN 2745-925X/2722-273X covers all topics of technology in the field of embedded systems, computer and network security, and intelligence systems as well as innovative and productive ideas related to emerging technology and computer engineering, including but not limited to :

  • Network Security
  • System Security
  • Information Security
  • Social Network & Digital Security
  • Cyber Crime
  • Machine Learning
  • Decision Support System
  • Intelligent System
  • Fuzzy System
  • Evolutionary Computing
  • Internet of Thing
  • Micro & Nano Technology
  • Sensor Network
  • Renewable Energy
  • Wearable Devices
  • Embedded Robotics
  • Microcontroller

Peer Review Policy

Publication of articles in the Journal of Embedded Systems Security and Intelligent Systems (JESSI) is dependent solely on scientific validity and coherence as judged by our editors and/or peer reviewers, who will also assess whether the writing is comprehensible and whether the work represents a useful contribution to the field. JESSI acknowledged the effort and suggestions made by its reviewers.

Initial evaluation of manuscripts

The Editor will first evaluate all manuscripts submitted. Although rare, it is entirely feasible for an exceptional manuscript to be accepted at this stage. Those rejected at this stage are insufficiently original, have serious scientific flaws, or are outside the aims and scope of the JESSI. Those that meet the minimum criteria are passed on to experts for review.

Type of peer review

Submitted manuscripts will generally be reviewed by two peer reviewers who will be asked to evaluate whether the manuscript is scientifically sound and coherent, whether it duplicates the already published works, and whether or not the manuscript is sufficiently clear for publication. The method is a blind peer review.

Review reports

Reviewers are asked to evaluate whether the manuscript:

  • Is original by stating the objectives and gap clearly
  • Is methodologically sound
  • Follows appropriate ethical guidelines
  • Has results/findings which are presented and support the conclusions
  • Correctly references previous relevant work
  • Reviewers are not expected to correct or copyedit manuscripts. Language correction is not part of the peer review process.

 

Decision

Reviewers advise the editor, who is responsible for the final decision to accept or reject the article. The Editors will reach a decision based on these reports and, where necessary, they will consult with members of the Editorial Board. The editor’s decision is final.

Becoming a Reviewer

If you are not currently a reviewer for JESSI but would like to be added to the list of reviewers, please contact us. The benefits of reviewing for JESSI include the opportunity to see and evaluate the latest work in related research areas at an early stage and to be acknowledged in our list of reviewers. You may also be able to cite your work for JESSI as part of your professional development requirements.

Open Access Policy

All articles published by the Journal of Embedded Systems, Security and Intelligent Systems (JESSI) are openly accessible on the principle that making research freely available to the public supports greater global knowledge exchange. It means:

  • Every reader has free and unlimited access to the full text of all articles published in JESSI, and
  • Every reader is free to re-use the published article if proper citation of the original publication is given.

 

Copyright Notice

Authors who publish in the Journal of Embedded Systems, Security and Intelligent Systems agree to the following terms:

  • Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under an Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
  • Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
  • Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.

Plagiarism Screening

Papers submitted to JESSI will be screened for plagiarism using Turnitin/iThenticate plagiarism detection tools. JESSI will immediately reject papers leading to plagiarism or self-plagiarism.
Before submitting articles to reviewers, those are first checked for similarity/plagiarism tools, by a member of the editorial team. The papers submitted to JESSI must have a similarity level of less than 25%.
Plagiarism is exposing another person’s thoughts or words as though they were your own, without permission, credit, or acknowledgment, or because of failing to cite the sources properly. Plagiarism can take diverse forms, from literal copying to paraphrasing the work of another. To properly judge whether an author has plagiarized, we emphasize the following possible situations:

  • An author can copy another author’s work- by copying word by word, in whole or in part, without permission, acknowledging or citing the source. This practice can be identified by comparing the source and the manuscript/work that is suspected of plagiarism.
  • Substantial copying implies for an author to reproduce a substantial part of another author, without permission, acknowledgment, or citation. The substantial term can be understood both in terms of quality and quantity, being often used in the context of Intellectual property. Quality refers to the relative value of the copied text in proportion to the work as a whole.
  • Paraphrasing involves taking ideas, words, or phrases from a source and crafting them into new sentences within the writing. This practice becomes unethical when the author does not properly cite or acknowledge the original work/author. This form of plagiarism is the more difficult form to be identified.

Author Guidelines

Please prepare your manuscript before submission, using the following guidelines and the article template below:

Format

Article files should be provided in Microsoft Word format. We currently do not accept other formats, such as LaTex or PDF files.

Article Length

Articles should be between 10-15 pages, including references. A maximum of 4 pages long appendices are allowed.

Article Title

A title of 10 (ten) words maximum should be provided.

Author Details and Authorship

All contributing authors’ names should be added, and their names arranged in the correct order for publication. A correct email address should be supplied only by the corresponding author. The full name of each author must be present in the exact format they should appear for publication, including or excluding any middle names or initials as required. The affiliation of each contributing author should be correct on their author name.

The criteria of authorship are as follows; Substantial contributions to the conception or design of the work; or the acquisition, analysis, or interpretation of data for the work; Drafting the work or revising it critically for important intellectual content; Final approval of the version to be published; Agreement to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.

Structured Abstract

Authors must supply a structured abstract in their submission, which includes:

  • Purpose
  • Design/methods/approach
  • Findings/results
  • Conclusions

A maximum of 250 words in total excluding keywords. It has to be in English regardless of the article's content's languages.

Keywords

Authors should provide appropriate and short keywords that encapsulate the principal topics of the paper. The maximum number of keywords is 5 (five) words.

Article Organization

The body of articles should be organized (at least) into the IMRaD structure as follow;

  • The introduction Section provides adequate background or context (problem and its significance) of the study. The subject should not be written extensively. It is expected that the rationale or purpose of the study (gap analysis), the objective in general and specific, and the hypothesis (if any) should be expressed clearly. Present a clear "state of the art" of the subject, which discussed literature and theoretical concepts behind it. A concise general background may be included in the article. Present at least 5 (five) recent related works to support the novelty of the research.
  • The methods section provides sufficient details to allow the work to be reproduced by an independent researcher. Methods that are already published should be summarized and indicated by a reference. If quoting directly from a previously published method, use quotation marks and also cite the source. Any modifications to existing methods should also be described. Indicate the participants observed, including demographic data, number of respondents, the rationale of respondents' selection, etc. Describe the design of the experiment, such as the experiment procedures, surveys, interviews, observation characteristics, etc. Write the complete research procedure. Be sure that explanations made in the article will allow other researchers to reproduce the work, or make future work out of it.
  • Results and discussions. Write results in a logical sequence. Results with important findings should be presented first. When presenting results in a table or figure, do not repeat all those contents in the text. Present only the summary of the text. Describe only new and important aspects of the study. Do not repeat all information from the results section or any section above. Present limitations of the study. Write the issues that are new or unsolved, for future research. This section consists of the information on What/How the presented data were produced, no raw data should be present in the article. The produced data are presented in tables, or figures with an explanation of what is the result/findings from the work. The section will also need to address connections between findings and basic concepts or hypotheses made earlier. Authors should also express whether any arguments were needed relating to other works from other researchers. Write implications made by the work related to theoretical or applications.
  • Conclusions Section. The conclusion should be linked to the title and objectives of the study. Do not make statements not adequately supported by your findings. Write the improvements made to the computer engineering field or science in general. Do not make further discussions, repeat the abstract, or only list the results of research results. Do not use bulleted points, use paragraphed sentences instead.

Biographies and Acknowledgments

Those who contribute but do not meet all criteria for authorship should not be listed as authors, but they should be acknowledged at the end of the text. Only the names of the persons but not their roles should be written under the acknowledgment section. Authors must declare all sources of external research funding in their article and a statement to this effect should appear in the Acknowledgements section.

Authors who wish to include these items should save them together in the MS Word file to be uploaded with the submission. If they are to be included, a brief professional biography of 100 words maximum should be supplied for each named author.

Article Categories

Authors must categorize their paper as part of the article information. The category which most closely describes their paper should be selected from the list below.

  • Research paper. This category covers papers that report on any type of research undertaken by the authors. The research may involve the construction or testing of a model or framework, action research, testing of data, market research or surveys, empirical, scientific, or laboratory research.
  • Technical paper. Describes and evaluates technical products, processes, or services.
  • Conceptual paper. These papers will not be based on research but will develop hypotheses. The papers are likely to be discursive and will cover philosophical discussions and comparative studies of others' work and thinking.
  • Case study reports. Case studies describe actual interventions or experiences within organizations. They may well be subjective and will not generally report on research. A description of a legal case or a hypothetical case study used as a teaching exercise would also fit into this category.

Headings

Headings must be concise, with a clear indication of the distinction between the hierarchy of headings. The format is provided in the article's template.

Notes/Endnotes

Notes or Endnotes should be used only if necessary and must be identified in the text by consecutive numbers, enclosed in square brackets, and listed at the end of the article.

Figures

All Figures (charts, diagrams, line drawings, web pages/screenshots, and photographic images) should be submitted in electronic form. All Figures should be of high quality, legible, and numbered consecutively with Arabic numerals. Graphics may be supplied in color to facilitate their appearance on the online database. Figures created in MS Word, MS PowerPoint, and MS Excel should be supplied in their native formats. Electronic figures created in other applications should be copied from the origination software and pasted into an MS Word template document. Photographic images should be inserted in the main body of the article and of high quality.

Tables

Tables should be typed and included in the main body of the article. The position of tables should be inserted in the text as close to the point of reference as possible. Ensure that any superscripts or asterisks are shown next to the relevant items and have corresponding explanations displayed as footnotes to the table, figure, or plate.

References

JESSI prefers articles that refer mainly to journal articles, research reports, and conference proceedings, rather than rely heavily on textbooks or handbooks to demonstrate articles' novelty in the subject discussed. The use of Mendeley as a tool in referencing is preferable and encouraged. References should be carefully checked for completeness, accuracy, and consistency.

Author(s) should cite publications in the text following the IEEE citation style. At the end of the paper, a reference list in alphabetical order should be supplied as follows:

DVD
[1] I. Holm, Narrator, and J. Fullerton-Smith, Producer, How to Build a Human [DVD]. London: BBC; 2002.

Sound Recording
[2] D. Fisher, Writer, and T. Baker, Presenter, Doctor Who and the Creature From the Pit [Sound recording]. Bath, UK: BBC Audiobooks, 2009.

Video Recording
[3] C. Rogers, Writer, and Director, Grrls in IT [Videorecording]. Bendigo, Vic. : Video Education Australasia, 1999.

YouTube/Vimeo Video
[4] NRK. "Medieval helpdesk with English subtitles," YouTube, Feb. 26, 2007 [Video file]. Available: http://www.youtube.com/watch?v=pQHX-SjgQvQ. [Accessed: Jan. 28, 2014].

Chapter or Article in Edited Book
[5] A. Rezi and M. Allam, "Techniques in array processing using transformations, " in Control and Dynamic Systems, Vol. 69, Multidimensional Systems, C. T. Leondes, Ed. San Diego: Academic Press, 1995, pp. 133-180.

Book: Single Author
[6] W.-K. Chen, Linear Networks and Systems. Belmont, CA: Wadsworth, 1993, pp. 123-135

Book: Two or More Authors
[7] U. J. Gelinas, Jr., S. G. Sutton, and J. Fedorowicz, Business Processes, and Information Technology. Cincinnati: South-Western/Thomson Learning, 2004.

Book: Organisation as Author
[8] World Bank, Information and Communication Technologies: A World Bank group strategy. Washington, DC: World Bank, 2002.

Book: Government Agency as Author
[9] Australia. Attorney-Generals Department., Digital Agenda Review, 4 Vols. Canberra: Attorney-General's Department, 2003.

Book: No Author
[10] The Oxford Dictionary of Computing, 5th ed. Oxford: Oxford University Press, 2003.

Book: Editor
[11] D. Sarunyagate, Ed., Lasers. New York: McGraw-Hill, 1996.

Book: Different Editions
[12] K. Schwalbe, Information Technology Project Management, 3rd ed. Boston: Course Technology, 2004.

Scientific/Technical Report
[13] K. E. Elliott and C.M. Greene, "A local adaptive protocol," Argonne National Laboratory, Argonne, France, Tech. Rep. 916-1010-BB, 1997.

Conference Paper in Print
[14] L. Liu and H. Miao, "A specification-based approach to testing polymorphic attributes," in Formal Methods and Software Engineering: Proc. of the 6th Int. Conf. on Formal Engineering Methods, ICFEM 2004, Seattle, WA, USA, November 8-12, 2004, J. Davies, W. Schulte, M. Barnett, Eds. Berlin: Springer, 2004. pp. 306-19.

Conference Paper from the Internet
[15] J. Lach, "SBFS: Steganography based file system," in Proc. of the 2008 1st Int. Conf. on Information Technology, IT 2008, 19-21 May 2008, Gdansk, Poland [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed: 10 Sept. 2010].

Conference Proceedings
[16] T. J. van Weert and R. K. Munro, Eds., Informatics and the Digital Society: Social, ethical and cognitive issues: IFIP TC3/WG3.1&3.2 Open Conf. e on Social, Ethical and Cognitive Issues of Informatics and ICT, July 22-26, 2002, Dortmund, Germany. Boston: Kluwer Academic, 2003.
E-book
[17] L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice, 2nd ed. Reading, MA: Addison Wesley, 2003. [Online] Available: Safari e-book.

A chapter from an E-book
[18] D. Kawecki, "Fuel preparation," in Combustion Engineering Issues for Solid Fuel Systems, B.G. Miller and D.A. Tillman, Eds. Boston, MA: Academic Press, 2008, 199-240. [Online] Available: Referex.

Article from an Electronic Encyclopaedia
[19] G. S. Thompson and M. P. Harmer, "Nanoscale ceramic composites," in Encyclopedia of Materials: Science and Technology, K. H. J. Buschow, R. W. Cahn, M. C. Flemings, B. Ilschner, E.J. Kramer, S. Mahajan, and P. Veyssière, Eds. Amsterdam: Elsevier, 2001, pp. 5927-5930. [Online]. Available: ScienceDirect.

Journal Article from a Full Text Database
[20] H. Ayasso and A. Mohammad-Djafari, "Joint NDT Image Restoration and Segmentation Using Gauss-Markov-Potts Prior Models and Variational Bayesian Computation," IEEE Transactions on Image Processing, vol. 19, no. 9, pp. 2265-77, 2010. [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed Sept. 10, 2010].

Journal Article from the Internet
[21] P. H. C. Eilers and J. J. Goeman, "Enhancing scatterplots with smoothed densities," Bioinformatics, vol. 20, no. 5, pp. 623-628, March 2004. [Online]. Available: www.oxfordjournals.org. [Accessed Sept. 18, 2004].

Electronic Document
[22] European Telecommunications Standards Institute, "Digital Video Broadcasting (DVB): Implementation guidelines for DVB terrestrial services; transmission aspects," European Telecommunications Standards Institute, ETSI TR-101-190, 1997. [Online]. Available: http://www.etsi.org. [Accessed: Aug. 17, 1998].

Government Publication
[23] Australia. Department of Education, Employment and Workplace Relations, Survey on Changes in Awareness and Understanding of Science, Engineering, and Technology: Report on findings. Canberra: The Department; 2008. [Online]. Available: http://www.dest.gov.au/NR/rdonlyres/241263CF-8585-4EEC-B104-C947C6C18029/23713/SurveyonChangesinawarenessunderstandingofSET.pdf. [Accessed: Sept. 7, 2010].

Whole Internet Site
[24] J. Geralds, "Sega Ends Production of Dreamcast," vnunet.com, para. 2, Jan. 31, 2001. [Online]. Available: http://nl1.vnunet.com/news/1116995. [Accessed: Sept. 12, 2004].

Journal Article in Print: Abbreviated titles
[25] G. Liu, K. Y. Lee, and H. F. Jordan, "TDM and TWDM de Bruijn networks and shuffle-nets for optical communications," IEEE Trans. Comp., vol. 46, pp. 695-701, June 1997.

Journal Article in Print: Full titles
[26] J. R. Beveridge and E. M. Riseman, "How easy is matching 2D line models using local search?" IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, pp. 564-579, June 1997.

Unpublished Thesis
[27] M. W. Dixon, "Application of neural networks to solve the routing problem in communication networks," Ph.D. dissertation, Murdoch Univ., Murdoch, WA, Australia, 1999.

Published Thesis
[28] M. Lehmann, Data Access in Workflow Management Systems. Berlin: Aka, 2006.

Thesis from a Full Text Database
[29] F. Sudweeks, Development and Leadership in Computer-Mediated Collaborative Groups. Ph.D. [Dissertation]. Murdoch, WA: Murdoch Univ., 2007. [Online]. Available: Australasian Digital Theses Program.

Author Fee

This journal charges the following author fees.

Article Submission Charges: 0.00 (IDR)

Article Processing Charges: 0.00 (IDR)

Article Publication Charges:

  • 0.00 (IDR) for External Author
  • 100.000 (IDR) for Internal Author

With the payment of this fee, the review, editorial decision, and author notification on this manuscript are guaranteed to take place within 4 weeks.

Publication Ethics

JESSI (Journal of Embedded Systems, Security, and Intelligent Systems) is a peer-reviewed journal. This statement clarifies the ethical behavior of all parties involved in the act of publishing an article in this journal, including the author, the chief editor, the Editorial Board, the peer-reviewer­­­­­ and the publisher (Universitas Negeri Makassar). This statement is based on COPE’s Code of Conduct (see below).

Ethical Guideline for Journal Publication

The publication of an article in a peer-reviewed JESSI journal is an essential building block in the development of a coherent and respected network of knowledge. It is a direct reflection of the quality of the work of the authors and the institutions that support them. Peer-reviewed articles support and embody the scientific method. It is, therefore, important to agree upon standards of expected ethical behavior for all parties involved in the act of publishing: the author, the journal editor, the peer reviewer, the publisher, and the society.

Publisher and Editor

Universitas Negeri Makassar as publisher of JESSI takes its duties of guardianship over all stages of publishing extremely seriously and we recognize our ethical and other responsibilities. We are committed to ensuring that advertising, reprint, or other commercial revenue has no impact or influence on editorial decisions. In addition, the Universitas Negeri Makassar and Editorial Board will assist in communications with other journals and/or publishers where this is useful and necessary.

Publication decisions: The editor of the JESSI journal is responsible for deciding which of the articles submitted to the journal should be published. The validation of the work in question and its importance to researchers and readers must always drive such decisions. The editors may be guided by the policies of the journal's editorial board and constrained by such legal requirements as shall then be in force regarding libel, copyright infringement, and plagiarism. The editors may confer with other editors or reviewers in making this decision.

Fair play: An editor at any time evaluates manuscripts for their intellectual content without regard to race, gender, sexual orientation, religious belief, ethnic origin, citizenship, or political philosophy of the authors.

Confidentiality: The editor and any editorial staff must not disclose any information about a submitted manuscript to anyone other than the corresponding author, reviewers, potential reviewers, other editorial advisers, and the publisher, as appropriate.

Disclosure and conflicts of interest: Unpublished materials disclosed in a submitted manuscript must not be used in an editor's research without the express written consent of the author.

Reviewers

Contribution to Editorial Decisions: Peer review assists the editor in making editorial decisions and through the editorial communications with the author may also assist the author in improving the paper.

Promptness: Any selected referee who feels unqualified to review the research reported in a manuscript or knows that its prompt review will be impossible should notify the editor and excuse himself from the review process.

Confidentiality: Any manuscripts received for review must be treated as confidential documents. They must not be shown to or discussed with others except as authorized by the editor.

Standards of Objectivity: Reviews should be conducted objectively. Personal criticism of the author is inappropriate. Referees should express their views clearly with supporting arguments.

Acknowledgment of Sources: Reviewers should identify relevant published work that has not been cited by the authors. Any statement that an observation, derivation, or argument had been previously reported should be accompanied by the relevant citation. A reviewer should also call to the editor's attention any substantial similarity or overlap between the manuscript under consideration and any other published paper of which they have personal knowledge.

Disclosure and Conflict of Interest: Privileged information or ideas obtained through peer review must be kept confidential and not used for personal advantage. Reviewers should not consider manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships or connections with any of the authors, companies, or institutions connected to the papers.

Authors

Reporting standards: Authors of reports of original research should present an accurate account of the work performed as well as an objective discussion of its significance. Underlying data should be represented accurately in the paper. A paper should contain sufficient detail and references to permit others to replicate the work. Fraudulent or knowingly inaccurate statements constitute unethical behavior and are unacceptable.

Data Access and Retention: Authors are asked to provide the raw data in connection with a paper for editorial review, and should be prepared to provide public access to such data (consistent with the ALPSP-STM Statement on Data and Databases), if practicable, and should, in any event, be prepared to retain such data for a reasonable time after publication.

Originality and Plagiarism: The authors should ensure that they have written entirely original works, and if the authors have used the work and/or words of others that this has been appropriately cited or quoted.

Multiple, Redundant, or Concurrent Publication: An author should not, in general, publish manuscripts describing essentially the same research in more than one journal or primary publication. Submitting the same manuscript to more than one journal concurrently constitutes unethical publishing behavior and is unacceptable.

Acknowledgment of Sources: Proper acknowledgment of the work of others must always be given. Authors should cite publications that have been influential in determining the nature of the reported work.

Authorship of the Paper: Authorship should be limited to those who have made a significant contribution to the conception, design, execution, or interpretation of the reported study. All those who have made significant contributions should be listed as co-authors. Where others have participated in certain substantive aspects of the research project, they should be acknowledged or listed as contributors. The corresponding author should ensure that all appropriate co-authors and no inappropriate co-authors are included in the paper and that all co-authors have seen and approved the final version of the paper and have agreed to its submission for publication.

Disclosure and Conflicts of Interest: All authors should disclose in their manuscript any financial or other substantive conflicts of interest that might be construed to influence the results or interpretation of their manuscript. All sources of financial support for the project should be disclosed.

Fundamental errors in published works: When an author discovers a significant error or inaccuracy in his/her own published work, the author must promptly notify the journal editor or publisher and cooperate with the editor to retract or correct the paper.