Page 46 - Read Online
P. 46

Author Instructions

           is less than or equal to six, if there are more than six authors, only the first three authors’ names should be listed, other
           authors’ names should be omitted and replaced with “et al.”. The journal’s name should be required to be italicized and
           the journal references should have corresponding DOI numbers. Information from manuscripts accepted but not published
           should be cited in the text as “Unpublished material” with written permission from the source. Journal names should be
           abbreviated according to the List of Title Word Abbreviations.

           References should be described as follows, depending on the types of works:
            Types                Examples
            Journal articles by   Cao MS, Pan LX, Gao YF, et al. Neural network ensemble-based parameter sensitivity analysis in
            individual authors   civil engineering systems. Neural Comput Applic 2017;28:1583-90. [DOI: 10.1007/s00521-015-2132-4]
            Organization as author  Diabetes Prevention Program Research Group. Hypertension, insulin, and proinsulin in
                                 participants with impaired glucose tolerance. Hypertension 2002;40:679-86. [DOI: 10.1161/01.
                                 hyp.0000035706.28494.09]
            Both personal authors and  Vallancien G, Emberton M, Harving N, van Moorselaar RJ; Alf-One Study Group. Sexual dysfunction
            organization as author  in 1,274 European men suffering from lower urinary tract symptoms. J Urol 2003;169:2257-61. [DOI:
                                 10.1097/01.ju.0000067940.76090.73]
            Journal articles not in   Mao X, Ding YK. Sentiment feature analysis and harmonic sense evaluation of images. J Electronic
            English              2001;29:23-7. (in Chinese)
            Journal articles ahead of   Albasir A, Hu Q, Naik K, Naik N. Unsupervised detection of security threats in cyberphysical system
            print                and IoT devices based on power fingerprints and RBM autoencoders. J Surveill Secur Saf 2021; Epub
                                 ahead of print [DOI: 10.20517/jsss.2020.19]
            Books                Gaydon AG, Wolfhard HG. Flames. 2nd ed. London: Chapman and Hall Ltd.; 1960. pp. 10-20.
            Book chapters        Chothia T, Smirnov V. A traceability attack against e-passports. In: Sion R, Editor. Financial
                                 cryptography. Lecture notes in computer science. Springer; 2010. pp. 20-34..
            Online resource      Intel Technology Journal. Developing smart toys - from idea to product. Available from: https://www.
                                 intel.com/content/dam/www/public/us/en/documents/research/2001-vol05-iss-4-intel-technology-
                                 journal.pdf. [Last accessed on 20 Feb 2021]
            Conference proceedings  Harnden P, Joffe JK, Jones WG, Editors. Germ cell tumours V. Proceedings of the 5th Germ Cell
                                 Tumour Conference; 2001 Sep 13-15; Leeds, UK. New York: Springer; 2002..
            Conference paper     Christensen S, Oppacher F. An analysis of Koza's computational effort statistic for genetic
                                 programming. In: Foster JA, Lutton E, Miller J, Ryan C, Tettamanzi AG, Editors. Genetic
                                 programming. EuroGP 2002: Proceedings of the 5th European Conference on Genetic Programming;
                                 2002 Apr 3-5; Kinsdale, Ireland. Berlin: Springer; 2002. pp. 182-91.
            Unpublished material  Tian D, Araki H, Stahl E, Bergelson J, Kreitman M. Signature of balancing selection in Arabidopsis.
                                 Proc Natl Acad Sci U S A. Forthcoming 2002.
           The journal also recommends that authors prepare references with a bibliography software package, such as EndNote to
           avoid typing mistakes and duplicated references.

           2.3.3.10 Supplementary Materials
           Additional  data  and  information  can  be  uploaded  as  Supplementary  Materials  to  accompany  the  manuscripts.  The
           supplementary  materials  will  also  be  available  to  the  referees  as  part  of  the  peer-review  process.  Any  file  format  is
           acceptable, such as data sheet (word, excel, csv, cdx, fasta, pdf or zip files), presentation (powerpoint, pdf or zip files), image
           (cdx, eps, jpeg, pdf, png or tiff), table (word, excel, csv or pdf), audio (mp3, wav or wma) or video (avi, divx, flv, mov, mp4,
           mpeg, mpg or wmv). All information should be clearly presented. Supplementary materials should be cited in the main text
           in numeric order (e.g., Supplementary Figure 1, Supplementary Figure 2, Supplementary Table 1, Supplementary Table 2,
           etc.). The style of supplementary figures or tables complies with the same requirements on figures or tables in main text.
           Videos and audios should be prepared in English, and limited to a size of 500 MB.

           2.4 Manuscript Format
           2.4.1 File Format
           Manuscript files can be in DOC and DOCX formats and should not be locked or protected.

           Manuscript prepared in LaTex must be collated into one ZIP folder (including all source files and images, so that the
           Editorial Office can recompile the submitted PDF).


           When preparing manuscripts in different file formats, please use the corresponding Manuscript Templates.
           2.4.2 Length
           There are no restrictions on paper length, number of figures, or number of supporting documents. Authors are encouraged

                                                                                                                                                         Complex Engineering Systems | Volume 2 | Issue 4 |
   41   42   43   44   45   46   47   48   49   50   51