i-manager’s Journal on Information Technology provides a forum to the academics, professionals and advanced level students in IT for exchanging significant information, productive ideas associated with information technology and future prospects in the areas of contemporary information and communications technology. Technology changes so rapidly and the Journal aims to publish high quality papers from academia and practitioners in all areas pertaining to Information Technology and disseminate Knowledge on the same.
We follow stringent publication ethics, and plagiarized papers are not published, and are withdrawn at any stage of the publishing process. Plagiarism is not limited to the Results and Discussion sections; it can involve any part of the manuscript, including figures and tables, in which material is copied from another publication without attestation, reference, or permission.Publication Ethics and Malpractice Statement
We do not charge any publication fee to publish in i-manager's Journal on Information Technology.
The Journal follows a double blind peer-review process. The submitted articles / research papers are reviewed by Professors/ Educators of Information Technology.
h5-index: 3, h5-median: 9
|Indian Citation Index|
|** UGC Approved List of Journals 2017
|Ulrich's Periodicals Directory|
A Comparative study on Dynamic Task Scheduling algorithms
System to Detect Data Leakage within Organisation
Performance Analysis Of Cluster Based Energy Efficient Routing Protocols For MANET
Web Enabled Open Source GIS Based Tourism Information System for Shimla Municipality (H.P), India
Analysis of List scheduling for Dependent Task
Performance Analysis of Load Balancing
Two-Level Security Framework for Virtual Machine Migration In Cloud Computing
Determination of Ethics in Web Designing and Evaluation
Academicians, practitioners and post-graduate students of Information Technology, University Educational Bodies, Researchers, leading Corporate etc.
Graphical Processing Unit
Grasshopper Operating System
Optical Disc Data Security
Uniprocessor Virtual Memory without TLBS
Security Issues in Grid Computing
Secure Socket Layer (SSI)
Pluggable Authentication Modules (PAM)
Serial ATA (Sata)
Session Initiation Protocol (SIP)
Data Over Cable System (Docsis)
Fluorescent Multilayer Disc (FMD)
Datagram Congestion Control Protocol (DCCP)