i-manager’s Journal on Information Technology provides a forum to the academics, professionals and advanced level students in IT for exchanging significant information, productive ideas associated with information technology and future prospects in the areas of contemporary information and communications technology. Technology changes so rapidly and the Journal aims to publish high quality papers from academia and practitioners in all areas pertaining to Information Technology and disseminate Knowledge on the same.
We follow stringent publication ethics, and plagiarized papers are not published, and are withdrawn at any stage of the publishing process. Plagiarism is not limited to the Results and Discussion sections; it can involve any part of the manuscript, including figures and tables, in which material is copied from another publication without attestation, reference, or permission.Publication Ethics and Malpractice Statement
We do not charge any publication fee to publish in i-manager's Journal on Information Technology.
The Journal follows a double blind peer-review process. The submitted articles / research papers are reviewed by Professors/ Educators of Information Technology.
h5-index: 3, h5-median: 9
|Indian Citation Index|
|** UGC Approved List of Journals 2017
|Ulrich's Periodicals Directory|
Analysis of Group Mobility and File Mobility Model for Routing Protocols in MANET Using Netsim
Comparative Analysis on a Predictive Model using Tree Based Machine Learning Techniques for Big Data Analytics
Performance Comparison of ABR using EPKCH in MANET
A New Approach for Employee Safety in Industries with IoT
Multilayer Perceptron For Classification Of Website Phishing
A Novel Hybrid Security Algorithm
A Comparative study of Secure Index Based on Context Based Fertility for Ranked Search over Encrypted Data
Academicians, practitioners and post-graduate students of Information Technology, University Educational Bodies, Researchers, leading Corporate etc.
Graphical Processing Unit
Grasshopper Operating System
Optical Disc Data Security
Uniprocessor Virtual Memory without TLBS
Security Issues in Grid Computing
Secure Socket Layer (SSI)
Pluggable Authentication Modules (PAM)
Serial ATA (Sata)
Session Initiation Protocol (SIP)
Data Over Cable System (Docsis)
Fluorescent Multilayer Disc (FMD)
Datagram Congestion Control Protocol (DCCP)