Forthcoming articles


International Journal of Autonomic Computing


These articles have been peer-reviewed and accepted for publication in IJAC, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJAC are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Autonomic Computing (4 papers in press)


Regular Issues


    by Hemalatha P, Vijitha Ananthi J. 
    Abstract: Nowadays successful communication was provided by the wireless network with high data rate services. The major strategies in wireless network were security and trustworthiness. Due to the denial of service attacks, most of the communication was disrupted. That was overcome by a new proposed algorithm called reverse tracing algorithm, which helps to find the attackers through reverse tracing messages. If the acknowledgment received after every successful transmission, that was secure communication. If does not receive acknowledgement properly, that will be considered as unsuccessful transmission. By using this revers tracing algorithm, can identify the attacks. Simulation results have performed using network simulator tool and then parameters such as throughput, delay, drop rate, goodput and packet delivery ratio was analyzed. Compared to the previous approaches, proposed reverse tracing algorithm achieves good performance.
    Keywords: MANET; reverse tracing algorithm; denial of service attacks; network simulator.

    by Kapil Mangla, Anil Kumar 
    Abstract: For many years, designing of high speed low power circuits with CMOS technology was a difficult challenge for research community. There are various levels at which design problem related to low power and increased demand can be addressed; these levels are - software level, architecture level, algorithm level, circuit level and process technology level. In this paper we have designed a 4-bit Look Ahead Carry Adder using CMOS technology. The objective of this paper is to put different approaches that reduce the consumption of power of Look Ahead Carry Adder. We have designed Look Ahead Carry Adder using Stackiabatic Technique and compared with conventional, adiabatic & stacking techniques. The objective of this paper is to put different approaches that reduce the consumption of power.
    Keywords: CMOS Circuit; VLSI; Combinational Circuits; Tanner EDA; Power.

  • Predictive Mining for Stock Market based on Live News TF-IDF Features   Order a copy of this article
    by Vaishali Ingle, Sachin Deshmukh 
    Abstract: The various machine learning algorithms are used for prediction of stock market movement. The data collected for stock market is in the form of breaking news from various finance web sites. The TF-IDF features extracted from online news data are used for creation of HMM model along with log likelihood values. The next day's stock price is predicted as either higher or lower than current day's stock price. Results obtained from proposed model is compared with results from other machine learning predictive techniques such as Random Forest ,KNN,Multiple Regression, Bagging and Boosting. The proposed model produces approximately 70 % of accurate prediction. The captured features are graphically represented with word cloud .The results can be further improved with use of deep learning ensemble methods.
    Keywords: Text Mining; Stock Market ,HMM; Bagging; Boosting; Multiple Regression; Random Forest; Finance News ; TF-IDF; Word cloud.

  • A Survey on Load Balancing Algorithms in Cloud Computing   Order a copy of this article
    by Rafiqul Zaman Khan, Mohammad Oqail Ahmad 
    Abstract: Cloud computing is a rising technology, which offers various online services like data storage, application and infrastructure on pay per used fashion that provides access in location independent manner. These services offer significant benefits for both consumer and producer. For optimal utilization of resources, researchers from both academia and industry focuses their efforts towards on cloud computing services. To achieve this target, numerous challenges have to be faced, out of which, load balancing is a centric issue in cloud computing environment which requires distribution of work load in a fairly manner across all the nodes. In this paper, a rich collection of algorithms have been surveyed and presented with detailed classification of algorithms based on different metrics such as reaction time, resource utilization, and energy efficiency and so on. Moreover, the merits, demerits, implementation tool and scope of implementation of each algorithm have been presented. The different implementation tools have also been discussed which provides the better idea for simulation platform. This work is intended to enable the readers to decide suitable approach and simulation platform for better load balancing algorithm.
    Keywords: cloud computing; load balancing algorithms; load balancing strategies.