About the Journal
Focus and Scope
- Dependable distributed embedded real-time systems
- Dependable digital circuits and hardware architectures
- Automation systems integration
- Robust decision theory
II. Distributed and Parallel Systems
- Cloud/elastic/services computing
- Internet of Things and Internet Engineering
- Adaptive computing
- Design paradigms for distributed and parallel systems
- Parallel algorithms and data structures
- Interfaces, languages and libraries for HPC and parallel computing
- Run-time systems and scheduling
- Performance measurement and benchmarking
III. Business Informatics
- Model engineering and software engineering
- Process engineering
- Interorganisational systems, e-commerce und e-government
- Advanced manufacturing
- Web science und semantic web
- Business intelligence
- Secure business
- Digital preservation and information management
IV. Computer Science
- Algorithms & Theory
- Artificial Intelligence
- Biomedical Computing
- Computer Graphics
- Computer Science Education
- Computer Security & Privacy
- Computer Vision
- Database Systems
- Game Design & Development
- High-Performance Computing
- Human-Computer Interaction
- Machine Learning
- Networks
- Programming Languages & Verification
- Software Engineering
- Symbolic Computation
V. Computer Security
- Artificial Intelligence
- Cybersecurity
- High-Performance Computing
- Knowledge Representation
- Programming Languages & Verification
- Security & Privacy
- Software Engineering
VI. Informatics & Data Science
- Bibliometric
- Big Data & Data Science
- Biomedical Computing & Bioinformatics
- Data Mining
- Database Systems
- Distributed Systems
- Geographic Information Systems
- Health Informatics
- Human Factors & Ergonomic
- Information Resources and Structures
- Information Retrieval
- Information Visualization
- Knowledge Representation
- Scientific Computing
- Social Computing & Informatics
VII. System & Software Engineering
- Database Systems
- High-Performance Computing
- Programming Languages & Verification
- Security & Privacy
- Software Engineering
VIII. Educational Technology
- ICT (Information and Communication Technologies) in Education
Peer Review Process
Each submitted manuscript is evaluated on the following basis
- The originality of its contribution to the field of scholarly publishing
- The soundness of its theory and methodology gave the topic
- The coherence of its analysis
- Its ability to communicate to readers (grammar and style).
Normal turn-around time for evaluation of manuscript is one to three months from the date of receipt.
Publication Frequency
This journal is published 2 times per year.
Open Access Policy
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.
Article Processing Charges
Every article submitted to JIEET will not have any 'Article Processing Charges'. This includes submitting, peer-reviewing, editing, publishing, maintaining and archiving, and allows immediate access to full-text versions of the articles.
Plagiarism Check
Plagiarism screening will be conducted by JIEET Editorial Board using Turnitin Plagiarism Checker and Crossref Similarity Check plagiarism screening service powered by Turnitin.
References Management
Every article submitted to JIEET shall use reference management software e.g. EndNote® or Mendeley.
License Terms
Articles published in JIEET are distributed under the CC Attribution-NonCommercial-ShareAlike 4.0 license.
Submission of an original manuscript to the journal will be taken to mean that it represents originality work not previously published. Please see JIEET (Journal of Information Engineering and Educational Technology) originality guidelines for details. Use this in conjunction with the points below about references, before submission i.e. always attribute using either indented text or quote marks as well as making use of the preferred IEEE style of formatting. Authors submitting articles for publication warrant that the work is not an infringement of any existing copyright and will indemnify the publisher against any breach of such warranty. For ease of dissemination and to ensure proper policing of use, papers and contributions become the legal copyright of the publisher unless otherwise agreed.