Forthcoming articles


International Journal of Soft Computing and Networking


These articles have been peer-reviewed and accepted for publication in IJSCN, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJSCN are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Soft Computing and Networking (2 papers in press)


Regular Issues


  • Enhanced Cloud Server Management Software Development by Adapting Systematic Innovations   Order a copy of this article
    by Song-Kyoo Kim 
    Abstract: The paper is dealing with algorithmic system software implementation of the cloud service reliability by using the systematic innovation method that is the structured process to generate the new idea. By using the unique innovation methods, it provides the implementation algorithm to manage the computing resources that are delivered as a service over the Internet. Cloud server management is focused on reliability and the external cloud servers are hooked up by the long-haul network and replace broken main cloud severs immediately. When the recovery system is not available because of the given conditions, external servers are being used for backups. The results are demonstrated in the framework of optimized server allocation problems with unreliable backup servers and algorithm (operational workflow) that could be implemented on the management system.
    Keywords: Network management; systematic innovation; stochastic modelling; cloud architecture;

  • Improvisation in the processes of Intrusion Detection System through CAII   Order a copy of this article
    by Saad Masood Butt 
    Abstract: Usability evaluation methods have gained a substantial attention in networks particularly in Intrusion Detection System (IDS) as these evaluation methods are envisioned to achieve usability and define usability defects for a large number of practical softwares. Despite a good number of available survey and methods on usability evaluation, we feel that there is a gap in existing literature in terms of usability evaluation methods, IDS interfaces and following usability guidelines in IDS development. This paper reviews the state of the art for improving usability of networks that illustrates the issues and challenges in the context of design matters. Further, we propose the taxonomy of key issues in evaluation methods and usability problems. We also define design heuristics for IDS users and interfaces that improves detection of usability defects and interface usability compared to conventional evaluation heuristics. The similarities and differences of usability evaluation methods and usability problems are summarized on the basis of usability factors, current evaluation methods and interfaces loopholes.
    Keywords: Intrusion Detection System, Heuristics Evaluation, IDS Interface, Usability Evaluation methods