About the Journal

Ubiquitous Technology Journal (UTJ) [ISSN: 3079-5273] stands as a globally recognized, peer-reviewed, open-access journal dedicated to the field of computer science. It emphasizes key areas (i.e., but not limited to) such as computer and network architecture along with computer-human interaction, and is published online by 'CrossLink Studies' at regular intervals.

Swift Review Process: Following submission, manuscripts undergo a peer review process, with authors receiving initial feedback about 20 days post-submission. Upon acceptance, the transition to publication is completed within 4 days.

Scope: The journal's scope encompasses a broad spectrum of topics within the realms of computer science and engineering, highlighting the interdisciplinary nature and wide-reaching impact of the field. Our focus areas include, but are not limited to, the foundational principles and innovative developments in computers and computation, artificial intelligence, cybernetics, and the intricate design and functionality of hardware and architecture. We delve into the dynamics of information systems, the diverse applications bridging disciplines, and the cutting-edge software, graphics, and programming techniques that drive technological advancement.

The journal also covers theoretical and methodological aspects, exploring the core of computer hardware, peripheral devices, and the evolving landscape of computer software. From the powerhouses of supercomputers to the ubiquity of personal and embedded computers, including desktops, notebooks, calculators, and microprocessors, our coverage is extensive. We examine the essentials of computer networking, the Internet, and the role of programmable analog computers, alongside the integration and utility of industrial robots within various sectors.

Electrical engineering's contribution to computer programming, including the development of programming languages and the intricate designs of CPUs and arithmetic logic units, are of keen interest. The journal further investigates computer storage mechanisms, such as RAM, along with input/output systems, and the various storage devices like hard disk drives, floppy disks, and optical disc drives, emphasizing their role in enabling computer multitasking and multiprocessing.

In the context of the information age, we explore the significance of graphics, applied mathematics, and electronics in enhancing security and propelling computers' & technologies' utility in industry. The design, testing, and application of digital and analog techniques, interaction with computers, and the advancements in communications and control through circuit systems and integrated circuits, receive special attention.

Additionally, the journal invites contributions on computers in simulation, computability theory, virtualization, and the environmental considerations of electronic waste. We celebrate the history of computer hardware and the evolution of human-computer interaction, pervasive computing, and information visualization, acknowledging the transformative power of computing technology across all aspects of life and society.


Subject Field List (i.e., includes but not limited to):  Ubiquitous computing; Internet of Things (IoT); Smart environments; Context-aware computing; Wearable technology; Mobile computing; Ambient intelligence; Pervasive computing; Wireless sensor networks; Ubiquitous communication protocols; Human-computer interaction; Cyber-physical systems; Location-based services; Sensor data fusion; Edge computing; Cloud computing; Artificial intelligence in ubiquitous systems; Machine learning for ubiquitous computing; Data privacy in ubiquitous environments; Security in pervasive systems; Ubiquitous healthcare; Smart homes; Intelligent transportation systems; Mobile and ubiquitous learning; Augmented reality; Virtual reality in ubiquitous systems; Smart cities; Distributed computing in ubiquitous environments; Energy-efficient computing; Environmental monitoring; Ubiquitous system architectures; Middleware for ubiquitous computing; Network protocols for IoT; Mobile sensing; Real-time data processing; Social implications of ubiquitous technology; User experience in pervasive systems; Context modeling and reasoning; Location privacy; Data analytics in ubiquitous environments; Wearable sensors; Multi-modal interaction; IoT hardware and devices; Ubiquitous robotics; Self-adaptive systems; Privacy-preserving technologies; Ubiquitous networking; Embedded systems; Distributed AI; Ubiquitous security frameworks; Smart grid technology; Intelligent agents in ubiquitous computing; Mobile cloud computing; Cognitive computing; Cybersecurity in ubiquitous environments; Data mining in IoT; IoT standards and protocols; Adaptive systems; Interoperability in pervasive systems; Mobility management; Ubiquitous multimedia applications; Intelligent environments; Distributed sensing; Autonomous systems; Context-aware mobile services; Ambient computing; Vehicular ad hoc networks; Autonomous vehicles; Distributed ledger technology in IoT; Ubiquitous computing for disaster management; Wearable computing for healthcare; Pervasive sensing technologies; Smart energy management; IoT data storage solutions; Distributed trust management; Ubiquitous machine learning applications; Real-time monitoring systems; Sensor networks for smart agriculture; Ubiquitous computing in retail; Edge AI; Blockchain for IoT; Smart grid cybersecurity; Privacy in smart environments; Adaptive user interfaces; Ubiquitous computing in healthcare; IoT analytics; Ubiquitous media streaming; Real-time collaboration tools; Security protocols for IoT; Wearable health monitoring systems; Social computing in ubiquitous environments; Ubiquitous computing in education; Smart wearable technology; IoT-based predictive maintenance; Distributed data management; Fog computing; Mobile ad hoc networks; Secure data sharing in IoT; User-centric pervasive computing.

Copyright / Open Access: Publications in UTJ will be made available as open-access articles, adhering to the Creative Commons Attribution License (CC BY-SA 4.0) terms and conditions. Authors may retain copyright of their work. At the conclusion of the published material, 'CrossLink Studies' will include a specific note to this effect.