Forthcoming and Online First Articles

International Journal of Web Engineering and Technology

International Journal of Web Engineering and Technology (IJWET)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Web Engineering and Technology (6 papers in press)

Regular Issues

  • A Comprehensive Review and Open Issues on Energy Aware Resource Allocation in Cloud   Order a copy of this article
    by Shubhuam Singh, Pawan Singh, Sudeep Tanwar 
    Abstract: Cloud computing is an on-demand service resource that includes applications to data centers on a pay-per-use basis. While allocating resources, the node failure causes the cloud service failures. This reduces the quality of service along with 'extra' energy consumption. This survey makes a evaluation on 65 papers regarding energy aware resource allocation techniques in cloud. The performances and associated highest attainments of each contribution are described in this review. In addition, the tools used for implementing the resource allocation techniques in each paper along with type of workloads were considered. We examine a number of current or developed energy-aware resource allocation approaches for cloud settings in this study. We also provide a thorough analysis of the various energy-conscious resource allocation and selection strategies for cloud-based virtual machines. Lastly, the clear sketch of issues and weakness are determined that may be supportive to resolve the existing problems in this aspect.
    Keywords: Cloud computing; Resource allocation; Energy utilization; Quality of Service; Workloads.

  • Web Applications Testing Techniques: A Systematic Mapping Study   Order a copy of this article
    by Samer Hanna, Amro Al-Said Ahmad 
    Abstract: Due to the importance of Web application testing techniques for detecting faults and assessing quality attributes, many research papers were published in this field. For this reason, it became essential to analyse, classify and summarize the research in the field. The main goal of this research is to provide a classification or categorization of Web applications testing techniques or approaches to help researchers and practitioners to understand the current state-of-the-art in this field and find it easier to focus their research on the areas that had received less attention. To achieve this goal, this research conducted a systematic mapping study on 98 research papers in the field of Web applications testing published between 2008 and 2021. This mapping study resulted in a classification schema that categorizes the papers in this field into: model-based testing category, security testing category, and other types of testing categories. In model-based testing of Web applications, research papers were classified according to the model used for test data generation, while the research papers in the field of Web applications security testing were classified according to the targeted vulnerability. The results showed that the most commonly used Web applications testing techniques in literature are model-based testing and security testing. Besides, the most commonly used models in model-based testing are finite-state machines. The most targeted vulnerability in security testing is SQL injection. Test automation is the most targeted testing goal in both model-based and security testing. For other Web applications testing techniques, the main goals of testing were test automation, test coverage, and assessing security quality attributes.
    Keywords: Web applications testing techniques; systematic mapping study; testing purposes; model-based testing; security testing; test automation; and test coverage.

  • A Framework for Implementing Micro Frontend Architecture   Order a copy of this article
    by Sylvester Timona Wanjala 
    Abstract: Web applications are an indispensable part of any enterprise information system. In the recent past, we have seen maturity in technologies that enable the separation of frontend and backend. The backend of these technologies has adopted microservices architecture while the frontend has maintained monolithic architectures. Micro Frontends have come up as a solution to the conventional monolithic frontend. Still, so far, there is no straightforward approach to implementation that satisfies the different practical requirements of a modern web application. This paper proposes an architectural framework for implementing Micro Frontends to address challenges experienced in earlier implementations. We developed two simple web applications, one using the proposed architectural design, and another using the monolithic architecture and compared their performance. The proposed framework offers a clear approach for implementing Micro Frontends while addressing some of the challenges experienced in early design such as inconsistent layout and lack of clear implementation strategy without introducing performance issues.
    Keywords: Microservice Architecture; Micro frontend; Monolithic Design; Software Architecture; Software pattern.

  • Attention-based 3DTCN-LSTM short-term network traffic prediction model considering multi-base station spatiotemporal coupling   Order a copy of this article
    by Yuliang Zhan, Ji Zhou, Jiayi Zhang 
    Abstract: Implementing an accurate traffic prediction method can help telecom operators to pre-manage and optimize the network in advance, and it is also easy to adjust the power consumption of the base station. At present, most forecasting methods of network traffic in one region ignores the impact of other regions. With the popularity of mobile devices, the correlation between mobile devices and local base stations cannot be ignore, to accurately predict network traffic. Combining the spatiotemporal characteristics of traffic to achieve more accurate traffic prediction, this paper proposes a 3D Temporal Convolutional Network-Long Short-Term Memory (3DTCN-LSTM) model optimized based on the attention mechanism, which uses 3DTCN to obtain the spatial characteristics of traffic distribution and the temporal characteristics of traffic time series, and introduces attention by adding CABM blocks, an attention mechanism module combining spatial and channel. The mechanism reduces redundant information interference, enabling the extraction of long-range spatial correlations. The long-term dependency characteristics of the traffic are then obtained through the LSTM network. Finally, the experiments on the dataset demonstrate that the prediction effect of the 3DTCN-LSTM model is significantly better than LSTM, BiLSTM, TCN, TCN-LSTM, 3DCNN and other models. Compared with the LSTM model, BiLSTM model, and 3DCNN model, the 3DTCN-LSTM model based on the attention mechanism reduces MAE by 53.59%, 61.74%, 65.37%, RMSE by 69.45%, 72.17%, 71.12%, and MAPE by 40.94%, 44.13%, 61.83%, respectively, which shows that it can achieve accurate traffic prediction.
    Keywords: 3D Temporal Convolutional Network-Long Short-Term Memory ; Attention model; network traffic prediction.

  • An Architecture Based Modeling of fault-tolerant SOA-based systems   Order a copy of this article
    by Swati Goel 
    Abstract: Service-Oriented Architecture (SOA) may effectively be implemented in distributed software development like cloud computing, Internet-of-things, etc. Expectations from these systems, in terms of their reliability and availability, are increasing day by day. Fault tolerance is an approach that ensures the correct functioning of the system even in the presence of faults. Various fault tolerance mechanisms may be applied on a system. It is a cumbersome task to decide which mechanism is more suitable for a specific situation. Implementation of fault tolerance involves as an additional cost factor due to the redundancy of software components. One has to intelligently decide what level of redundancy needs to be applied in a system. In this paper, a fault tolerance policy, at an architectural level, is proposed for an SOA-based system. The proposed policy is based on the severity analysis of various software services in an SOA-based system. AADL (Architecture Analysis and Design Language) is used for the modeling of the system. Fault tree analysis and functional hazard assessment have been used for severity analysis. A Smart Home Security System (SHSS) is used for the demonstration of the practicality of the proposed model. The proposed policy can be used as a fault tolerance solution.
    Keywords: Fault tolerance; Service Oriented Architecture; Architecture Analysis & Design Language (AADL); Error Model Annex (EMA); Functional Hazard Assessment (FHA); Fault Tree Analysis(FTA).

  • A Novel Machine Extraction Algorithm for Implicit and Explicit Keywords based on a Dynamic Web Metadata Scientific Scholars Corpus   Order a copy of this article
    by Mawloud Mosbah 
    Abstract: keywords extraction, as an operation to construct metadata, is an important pre-processing task considered by many natural language processing applications such as text summarization, information retrieval, and clustering of documents. In this paper, we introduce a novel machine extraction algorithm for implicit and explicit keywords. The algorithm relies on a dynamic corpus of similar documents built by information retrieval engines. In addition to the direct utilization of the keywords for similar documents, our algorithm combines some basic techniques. The given results, compared with some basic methods of the literature, seem to be very promising and we claim also the efficiency of our solution.
    Keywords: Natural language processing; keywords extraction; automatic construction of metadata; implicit keywords; explicit keywords.