Forthcoming and Online First Articles

International Journal of Web Engineering and Technology

International Journal of Web Engineering and Technology (IJWET)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Web Engineering and Technology (5 papers in press)

Regular Issues

  • PR-MQTT: A Novel Approach for Traffic Reduction and Message Prioritization in IoT Applications   Order a copy of this article
    by Jiby J. Puthiyidam, Shelbi Joseph 
    Abstract: IoT applications often involve devices with limited processing power, memory capacity, and low resource consumption. The vast number of devices connected to IoT networks generates massive amounts of data, making effective data management crucial for IoT applications. IoT applications prefer lightweight messaging protocols over the standard internet protocol, hyper text transfer protocol (HTTP). Message queue telemetry transport (MQTT) has emerged as a popular communication protocol for IoT applications. In some instances, specific messages may hold greater importance than others. However, most standard IoT protocols lack inherent mechanisms to prioritise incoming messages. This paper presents a new approach to reducing network traffic in IoT applications by selectively transmitting messages while prioritising the processing of urgent messages. The proposed method is integrated with HBMQTT, an MQTT broker. The experimental evaluation indicates that with the proposed PR-MQTT broker, the latency of the priority messages remains nearly constant, irrespective of the message's index position. Priority messages are consistently delivered within 1015 milliseconds, resulting in a speed improvement of over 90% compared to regular messages. Additionally, the proposed approach reduces CPU resource utilisation and network traffic by 25% and the transmission delay of normal messages by 50%.
    Keywords: internet of things; IoT; MQTT protocol; message priority; IoT networks; network traffic.
    DOI: 10.1504/IJWET.2024.10061282
  • Application of improved K-Means algorithm in the cultivation of creative music talents under the needs of sustainable development and transformation   Order a copy of this article
    by Peng Li, Zeng Fan 
    Abstract: The countrys requirements for the education management level and personnel training of colleges and universities are increasing day by day, especially on how to cultivate innovative talents. This research proposes a K-means clustering algorithm (K-means) based on noise reduction autoencoder for the cultivation of creative music talents. After reducing the dimension of the autoencoder, and then clustering and analyzing the music course grades of college students through the K-means algorithm, the problems in the cultivation of creative talents can be found. The results show that the DAE-K algorithm (K-means clustering algorithm with Denoising Auto Encoder, DAE-K) outperforms the K-means algorithm on the performance indicators NMI, AMI and FMI, and is better than the K-means algorithm on the Statlog-Image Segmentation dataset. Therefore, it shows that the training of practical operation is weakened in talent training, and the emphasis on practical courses should be strengthened in the subsequent talent training plan.
    Keywords: Sustainable development; Autoencoder; K-means; Talent training.

  • Deep Learning based Task Scheduling in Edge Computing   Order a copy of this article
    by BantupalliI Nagalaskshmi, Sumathy S 
    Abstract: A potential paradigm called edge computing (EC) has recently come to light that supports internet of things (IoT) applications that are resource allocation with low latency services at the network edge. For scheduling the application tasks, the edge server’s constrained processing capabilities present significant difficulties. The IoT-EC scenario is used in this research to study the task scheduling problem, and various jobs are scheduled to virtual machines (VMs) set up the edge server by maximising long-term task satisfaction. The proposed optimal task scheduling considers parameters like makespan, execution time, execution cost, and risk probability. Particularly, the risk probability estimation is done by the deep convolutional neural network (D-CNN). This estimation is based on task security and VM security. The scheduling of tasks is carried out via the new hybrid bald eagle Archimedes optimisation (HBEAO) by considering a multi-objective to minimise the makespan, execution time, execution cost, and risk probability. The proposed model is validated with existing models in terms of execution cost, execution time, fitness, makespan, risk probability, etc. It is observed that the HBEAO model attains less execution cost (37.27$), execution time (0.99 seconds), fitness (3.48%), risk probability (0.19%) and computation time (2,325.87 sec) respectively.
    Keywords: task scheduling; deep learning; edge computing; server; optimisation; internet of things; IoT; deep convolutional neural network; D-CNN.
    DOI: 10.1504/IJWET.2024.10061935
  • A Cultural Industry Text Classification Method Based on Knowledge Graph Information Constraints and Knowledge Fusion   Order a copy of this article
    by Xue Ji 
    Abstract: The study proposes a text classification method for the cultural industry. It uses knowledge graph information constraints and fusion. A knowledge graph is constructed for the cultural industry text, extracting entities and relationships with supervision. The encoding and decoding layers are optimised, and the knowledge fusion module incorporates attention. Article information is condensed and filtered, and the classifier calculates category probability. The experimental results show that in the loss function value test, in the validation data, our research method drops to the lowest value of 0.007 after about 25 iterations at the fastest, which is much lower than the lowest value of TextCNN about 0.038. When F1 value is tested in the validation data, when the average text length of our research method increases to 35 Byte, the highest F1 value reaches 0.88. Our research demonstrates effective text classification in the cultural industry with higher efficiency.
    Keywords: cultural industry; text classification; knowledge graph; attention mechanism; knowledge fusion.

  • A Distributed Framework for Distributed Denial-of-Service Attack Detection in Internet of Things Environments Using Deep Learning   Order a copy of this article
    by Amisi Wawire Silas, Lawrence Nderu, Dalton Ndirangu 
    Abstract: Internet of things (IoT) networks dominate industries, homes, organisations, and other aspects of life owing to their automation capabilities. However, IoT networks are vulnerable to attacks, especially distributed denial-of-service (DDoS) attacks, as they tend to have low computational capabilities and are highly diverse. While current research shows the potential of utilising deep learning methods to detect DDoS attacks, there is a lack of a framework that can be used to deploy an effective deep learning algorithm to detect DDoS attacks in heterogeneous IoT environments. Accordingly, this paper developed a DDoS detection framework based on the CNN-BiLSTM model, which can be deployed in a distributed network and includes adequate pre-processing. Simulations were also done to demonstrate the application of the framework and its effectiveness.
    Keywords: machine learning; artificial intelligence; internet of things; IoT; deep learning; convolutional neural networks; CNNs; BiLSTM; distributed denial-of-service; DDoS.