i-manager’s Journal on Information Technology provides a forum to the academics, professionals and advanced level students in IT for exchanging significant information, productive ideas associated with information technology and future prospects in the areas of contemporary information and communications technology. Technology changes so rapidly and the Journal aims to publish high quality papers from academia and practitioners in all areas pertaining to Information Technology and disseminate Knowledge on the same.
We follow stringent publication ethics, and plagiarized papers are not published, and are withdrawn at any stage of the publishing process. Plagiarism is not limited to the Results and Discussion sections; it can involve any part of the manuscript, including figures and tables, in which material is copied from another publication without attestation, reference, or permission.Publication Ethics and Malpractice Statement
We do not charge any publication fee to publish in i-manager's Journal on Information Technology.
The Journal follows a double blind peer-review process. The submitted articles / research papers are reviewed by Professors/ Educators of Information Technology.
For all copyright related queries contact email@example.com
h5-index: 3, h5-median: 9
|Indian Citation Index|
|** UGC Approved List of Journals 2017
|Ulrich's Periodicals Directory|
A Novel Encryption Scheme to Seucre the Data Using DNA Based Play Fair Cipher Technique
Image Search by comparing Gabor filter with SVM and SIFT
Video Processing in Visual system for color detection for people with Tritanopia
Neural Networks Application for Detecting Heart Disease
IoT and Cloud Based Vehicle Toll Collection System
Classification of User Opinion using Sentiment Analysis
A comprehensive review and efficient implementation of privacy-preserving associative classification
Academicians, practitioners and post-graduate students of Information Technology, University Educational Bodies, Researchers, leading Corporate etc.
Graphical Processing Unit
Grasshopper Operating System
Optical Disc Data Security
Uniprocessor Virtual Memory without TLBS
Security Issues in Grid Computing
Secure Socket Layer (SSI)
Pluggable Authentication Modules (PAM)
Serial ATA (Sata)
Session Initiation Protocol (SIP)
Data Over Cable System (Docsis)
Fluorescent Multilayer Disc (FMD)
Datagram Congestion Control Protocol (DCCP)