The publication will not be an Open Access repository (Effective January 2017).
A maximum of thirty-nine (39) papers will be included in every journal issue (effective April 2013).
Multiple submission of the same paper on different journal submission will all be discarded (effective January 2017).
Paper title, author and corresponding author(s) names should be the same to the submitted paper and on the submission system (effective January 2017).
Each paper should only have one (1) corresponding author and cannot be changed (effective April 2013).
If plagiarism problem was found, all authors including the corresponded authors cannot submit paper(s) to our journal for three years.
The paper will be removed even though it was already published, and this will be noticed on the home page (effective April 2013).
If double submission was found, all authors including the corresponded authors cannot submit paper(s) to our journal for three years.
The paper will be removed even though it was published, and this will be noticed on the home page (effective April 2013).
Only paper(s) containing simulation, implementation, case study or other evidence of research advancement will be published.
Ideal paper can be published after the editorial board grants permission after reviewing the paper (effective April 2013).
Papers from one country cannot exceed 60% in every journal issue; it will be based by the first authors' nationality (effective July 2014).
Only one (1) paper from same author can be included in each issue regardless of role and order (effective July 2014).
SERSC DOES NOT ALLOW ANY AGENTS FROM CHINA to act on our behalf in collecting papers for our journals. SERSC have standard procedures in publication of submitted papers.
IJAST aims to facilitate and support research related to advanced science and technology and its applications.
Our Journal provides a chance for academic and industry professionals to discuss
recent progress in the area of advanced science and technology.
The topics covered by IJAST include the following:-
Bio-science and Bio-technology
Communication and Networking
Computer Science and its Applications
Control and Automation
Database Theory and Application
Grid and Distributed Computing
Security Technology and Information Assurance
Signal Processing, Image Processing and Pattern Recognition
Software Engineering & Its Applications
u and e Service, Science and Technology
Ubiquitous Multimedia Computing
Abdallah Mhamed, Institut National des Telecommunications, France
Agustinus Borgy Waluyo, I2R, Singapore
Akemi Galvez Tomida, University of Cantabria, Spain
Alejandro Nieto, University of Santiago de Compostela, Spain
Alfred Tan, Edith Cown University, Australia
Andres Iglesias, University of Cantabria, Spain
Bo Zhang, Rice University, USA
Byungjoo Park, Hannam University, Korea
Carlos Becker, Westphall Federal University of Santa Catarina, Brazil
Chih-Heng Ke, Kinmen 892, Taiwan
Chunbo Ma, Shanghai Jiao Tong University, China
Debnath Bhattacharyya, Heritage Inst. of Technology, India
Dhiman Barman, Juniper Networks, USA
El-Sayed El-Alfy, KFUPM, Saudi Arabia
Feki Mohamed Ali, I2R, Singapore
Guandong Xu, Victoria University, Australia
Haojin Zhu, University of Waterloo, Canada
Jemal Abawajy, Deakin University, Australia
Kaiqi Xiong, North Carolina State University, USA
Longbing Cao, University of Technology, Australia
Mafruz Zaman Ashrafi, I2R, Singapore
Maricel Balitanas, University of San Agustin, Iloilo City, Philippines
Mehnaz Tabassum, Daffodil International University, India
Mohamed Hamdi, Carthage University, Tunisia
Mohammad Faiz Liew Abdulla, Universiti Tun Hussein Onn Malaysia, UTHM, Malaysia
Mohammad Nazmul Haque, The University of Newcastle, Australia
Mohammed Khaja Nizamuddin, Deccan College Of Engineering & Technology, India
N.Ch.Sriman Narayana Iyengar, VIT University, India
Narjes Doggazz, Faculté des sciences Tunis, Tunisia
Pawan Jindal, Jaypee University of Engineering and Technology, India
Phuc V. Nguyen, Asian Institute of Technology and Management, Vietnam
Prakash Veeraraghavan, La Trobe University, Australia
Pramode Verma, The University of Oklahoma, USA
Ravi Yadahalli, SDM College of Engineering & Technology, India
Salman Abdul Moiz, Centre for Development of Advanced Computing, India
Sasan Adibi, University of Waterloo, Canada
SeongHan Shin, Research Center for Information Security, AIST, Japan
Seong-Moo Yoo, University of Alabama-Huntsville, USA
Seungjin Park, University of Southern Indiana, USA
Shahaboddin Shamshirband, Islamic Azad University Branch Chalous, Iran
Shawulu Hunira Nggada, Higher Colleges of Technology, UAE
Sherali Zeadally, University of the District of Columbia, USA
Shlomo Mark, Sami Shamoon College of Engineering, SCE, Israel
Suat Ozdemir, Arizona State University, USA
Suyoto, University Of Atma Jaya Yogyakarta, Indonesia
Syed Naimatullah Hussain, BTL College of Engineering, India
Thomas Sri Widodo, University of Gadjah Mada Yogyakarta, Indonesia
Tom Tofigh, AT&T, USA
Torab Torabi, La Trobe University, Australia
Vladimir Kropotov, Bauman University, Russia
Yali Liu, University of California, USA
Yang Li, Institute of Computing Technology, Chinese Academy of Sciences, China