Corrections, Retractions & Expressions of Concern



In an effort to better serve our researchers, librarians, and others in the academic community, Ejmanager believes clarity in the publishing record is a critical component of information distribution. Recognizing a published article as a finalized “Version of Record” establishes the expectation that it can be relied upon as accurate, complete, and citable. Ejmanager defines this Version of Record as the initial article publication for open access journals.

It is presumed that manuscripts report on work based on honest observations. However occasionally information becomes available with may contradict this. In such situations Ejmanager Publishing journals apply Committee on Publication Ethics guidelines on corrections, retractions and expressions of concern.

Corrections

Errors in published papers may be identified requiring publication of a correction in the form of a corrigendum or erratum. Because articles can be read and cited as soon as they are published, any changes thereafter could potentially impact those who read and cited the earlier version. Ejmanager provides authors with an opportunity to review article proofs prior to publication with the express goal of ensuring accuracy of the content. Publishing an erratum or corrigendum increases the likelihood readers will find out about the change and also explains the specifics of the change.

Corrigenda and Errata are published on a numbered page and will contain the original article's citation. Cases where these corrections are insufficient to address an error will be dealt with on a case-by-case basis by the Editor in Chief. Inadequacies arising from the normal course of new scientific research are not within the scope of this and will require no correction or withdrawal.

Expressions of Concern

Where substantial doubt arises as to the honesty or integrity of a submitted or published article it is the Editor in Chief's responsibility to ensure that the matter is adequately addressed, usually by the authors' sponsoring institution. It is not normally the Editor in Chief's responsibility to carry out the investigation or make a determination. The Editor in Chief should be promptly informed of the decision of the sponsoring institution and a retraction printed should it be determined that a fraudulent paper was published. Alternatively, the Editor in Chief may choose to publish an expression of concern over aspects of the conduct or integrity of the work.

Article withdrawal

Articles may be withdrawn by corresponding author before accepting for publication. If it is accepted, it could be used only for Articles in Press which represent early versions of articles and sometimes contain errors, or may have been accidentally submitted twice. Occasionally, but less frequently, the articles may represent infringements of professional ethical codes, such as multiple submission, bogus claims of authorship, plagiarism, fraudulent use of data or the like. Articles in Press (articles that have been accepted for publication but which have not been formally published and will not yet have the complete volume/issue/page information) that include errors, or are discovered to be accidental duplicates of other published article(s), or are determined to violate our journal publishing ethics guidelines in the view of the editors (such as multiple submission, bogus claims of authorship, plagiarism, fraudulent use of data or the like), may be “Withdrawn” from eJManager. Articles which have been published under an issue could not be withdrawn.

Article retraction

Infringements of professional ethical codes, such as multiple submission, bogus claims of authorship, plagiarism, fraudulent use of data or the like. Occasionally a retraction will be used to correct errors in submission or publication.The retraction of an article by its authors or the editor under the advice of members of the scholarly community has long been an occasional feature of the learned world. Standards for dealing with retractions have been developed by a number of library and scholarly bodies, and this best practice is adopted for article retraction by eJManager:

  -  A retraction note titled “Retraction: [article title]” signed by the authors and/or the editor is published in the paginated part of a subsequent issue of the journal and listed in the contents list.
  -  In the electronic version, a link is made to the original article.
  -  The online article is preceded by a screen containing the retraction note. It is to this screen that the link resolves; the reader can then proceed to the article itself.
  -  The original article is retained unchanged save for a watermark on the .pdf indicating on each page that it is “retracted.”
  -  The HTML version of the document is removed.

Article removal: legal limitations

In an extremely limited number of cases, it may be necessary to remove an article from the online database. This will only occur where the article is clearly defamatory, or infringes others’ legal rights, or where the article is, or we have good reason to expect it will be, the subject of a court order, or where the article, if acted upon, might pose a serious health risk. In these circumstances, while the metadata (Title and Authors) will be retained, the text will be replaced with a screen indicating the article has been removed for legal reasons.

Article replacement

In cases where the article, if acted upon, might pose a serious health risk, the authors of the original article may wish to retract the flawed original and replace it with a corrected version. In these circumstances the procedures for retraction will be followed with the difference that the database retraction notice will publish a link to the corrected re-published article and a history of the document.


Current Issue : 2020, Vol: 8, Issue: 2
ISSN : 2278-9723
ISSUES : 02 per year
PUBLISHER :

Benefits of publishing in International Journal of Communication and Computer Technologies

  • Online submission
  • Wider visibility through open access
  • Higher impact
  • Prompt review

Abstracting and Indexing Information

Google Scholar

General Impact Factor (GIF)

DOAJ

Scopus citation 

 

Scopus
EXPORT DATE:24 Nov 2018

Gnanambigai, J., Rengarajan, D.R., Anbukkarasi, K.
Leach and Its Descendant Protocols: A Survey
(2012) International Journal of Communication and Computer Technologies,
 1 (3), pp. 15-22. Cited 25 times.


Gangwar, A., Bhardwaj, M.
An overview: Peak to average power ratio in OFDM system & its effect
(2012) International Journal of Communication and Computer Technologies, 
1 (2), pp. 22-25. Cited 20 times.


Sharma, A., Gupta, P.C.
Predicting the number of blood donors through their age and blood group by using data mining tool
(2012) International Journal of Communication and Computer Technology,
1 (2-6), pp. 6-10. Cited 9 times.


Sundhar, C., Archana, D.
Automatic screening of fundus images for detection of diabetic retinopathy
(2014) International Journal of Communication and Computer Technologies,
 2 (1), pp. 100-105. Cited 8 times.


Kaur, M., Mahajan, M.
Using encryption algorithms to enhance the data security in cloud computing
(2013) International Journal of Communication and Computer Technologies, 
1 (3), pp. 56-60. Cited 6 times.


Abinaya, V., Vennila, M., Padmanabhan, N.
Sentence level text clustering using a hierarchical fuzzy relational clustering algorithm
(2014) Proc. of International Journal of Communication and Computer Technologies, 2 (2).
Cited 3 times.


Malakar, S., Mohanta, D., Sarkar, R., Nasipuri, M.
A Novel Noise-Removal Technique for Document Images
(2010) International Journal of Communications and Computer Technology, 2, pp. 120-124. Cited 3 times.


Ramahrishnan, S., Elakkiya, B., Geetha, R., Vasuki, P., Mahalingam, S.
Image encryption using chaotic maps in hybrid domain
(2014) International Journal of Communication and Computer Technologies, 2 (5), pp. 44-48. Cited 2 times.


Jeevanand, D., Keerthivasan, K., Mohamed Rilwan, J., Murugan, P.
Real Time Embedded Network Video Capture And SMS Alerting system
(2014) International Journal of Communication and Computer Technologies. Cited 2 times.


Rethesh, D.
Analysis on fpga designs of parallel high performance multipliers
(2014) International Journal of Communication and Computer Technologies, 2 (12), pp. 70-77. Cited 2 times.


Atchaya, S., Dhanalakshmi, N., Veeramani, R.
A compact design of multiband microstrip patch antenna for GSM, Bluetooth and Wi-MAX applications
(2014) International Journal of Communication and Computer Technologies, 2 (1), pp. 1-4. Cited 2 times.


Xavier, N.
Security of PHR in cloud computing using ABE technique
(2013) International Journal of Communication and Computer Technologies, 1 (72), pp. 265-269. Cited 2 times.


Vijay, V., Gowri, K., Velmurugan, S., Basha, A.M.
Detection and extraction of p wave an T wave in ECG to improve sensitivity for e-health monitoring
(2016) International Journal of Communication and Computer Technologies, 4 (4). Cited 1 time.


Santhosh, M.
Electronic voting machine using internet
(2016) International Journal of Communication and Computer Technologies. Cited 1 time.


Suba, R., Satheeskumar, R.
Efficient cluster-based congestion control in wireless mesh network
(2016) International Journal of Communication and Computer Technologies, pp. 4059-4064. Cited 1 time.


Sundararaju, K., Sukumar, P.
Improvement of power quality using PQ Theory based series hybrid active power filter
(2016) International Journal of Communication and Computer Technologies., 4 (2), pp. 4007-4011. Cited 1 time.


Rajasudhan, S., Nallusamy, R.
A study on cryptographic methods in cloud storage
(2014) International Journal of Communication and Computer Technologies, 2 (2), pp. 1-5. Cited 1 time.


Jeba Pon Elizabeth, S., Vedhapriya Vadhana, R.
Comparing PSNR by using Integer and Haar Wavelet Transform in Reversible Data Hiding Technique
(2014) International Journal of Communication and Computer Technologies, 2 (10). Cited 1 time.


Rajasudhan, S., Nallusamy
A Study on Cryptography Methods in Cloud Storage
(2014) International Journal of Communication and Computer Technologies, 2 (2). Cited 1 time.


Kavitha, P., Keerthana, C., Niroja, V., Vivekanandhan, V.
Mobile-id based sybil attack detection on the Mobile ADHOC Network
(2014) International Journal of Communication and Computer Technologies, 2 (2), pp. 56-63. Cited 1 time.


Singh, S.P., Goyal, N.
Security Configuration and Performance Analysis of FTP Server
(2014) International Journal of Communication and Computer Technologies, 2 (3), pp. 39-42. Cited 1 time.


Jayasinghe, J.W., Anguera, J., Uduwawala, D.N.
A simple design of multi band microstrip patch antennas robust to fabrication tolerances for gsm, umts, lte, and bluetooth applications by using genetic algorithm optimization
(2014) International Journal of Communication and Computer Technologies, 2 (1). Cited 1 time.


Sharma, S., Shiwani, S.
Data mining based accuracy enhancement of ANN using Swarm intelligence
(2014) International Journal of Communication and Computer Technologies, 2 (9). Cited 1 time.


Rajasudhan, S., Nallusamy, R.
A study on cryptographic methods in cloud storage
(2014) International Journal of Communication and Computer Technologies, 2, pp. 2278-9723. Cited 1 time.


Kavitha, P., Keerthana, C., Niroja, V., Vivekanandhan, V.
(2014) International Journal of Communication and Computer Technologies, 2. Cited 1 time.


Srivastava, K.A., Yadav, K.D., Pandey, K.S.
The security in private cloud computing
(2013) International Journal of Communication and Computer Technologies, 1 (4). Cited 1 time.


Gangwar, A., Bhardwaj, M.
'An Overview: Peak to Average Power Ratio in OFDM system & its Effect'
(2013) International Journal of Communication and Computer Technologies. Cited 1 time.


Kaur, M., Mahajan, M.
Using encryption Algorithms to enhance the Data Security in Cloud Computing
(2013) International Journal of Communication and Computer Technologies, 1 (12). Cited 1 time.


Nandhini, J., Nithya, M., Prabhakaran, S.
Advance virus detection using combined techniques of pattern matching and dynamic instruction sequences
(2013) International Journal of Communication and Computer Technologies, pp. 156-161. Cited 1 time.


Gupta, P., Shiwani, S.
Computer Science Department Suresh Gyan Vihar University India RECITAL INVESTIGATION of IPv4 and IPv6 USING WIRED NETWORKS in OMNET++
(2013) International Journal of Communication and Computer Technologies, 1 (47). Cited 1 time.


Goyal, N., Hemrajani, N.
Comparative study of AODV and DSR routing protocols for MANET: Performance analysis
(2013) International Journal of Communication and Computer Technologies, 1 (57). Cited 1 time.


Kaur, M., Mahajan, M.
Using encryption algorithm to enhance data security in cloud computing
(2013) International Journal of Communication and Computer Technology. Cited 1 time.


Kumar Srivastava, K., Tripathi, A., Kumar Tiwari, A.
Secure data transmission in AODV routing protocol
(2013) International Journal of Communication and Computer Technologies, 1 (4). Cited 1 time.


Mandeep, T., Manish, Y.
Using encryption algorithms to enhance the data security in cloud computing
(2013) International Journal of Communication and Computer Technologies, 1 (12), pp. 78-89. Cited 1 time.


Goyal, N., Hemrajani, N.
Comparative study of AODV and DSR routing protocols for MANET: Performance analysis
(2013) International Journal of Communication and Computer Technologies, 1 (57), pp. 198-202. Cited 1 time.


Shoeb, M., Kumar Gupta, V.
A crypt analysis of the tiny encryption algorithm in key generation
(2013) International Journal of Communication and Computer Technologies, 1 (38). Cited 1 time.


Shoeb, M., Gupta, V.K.
A cryptanalysis of the tiny encryption algorithm in key generation
(2013) International Journal of Communication and Computer Technologies (IJCCTS), 1 (5), pp. 123-128. Cited 1 time.


Gangwar, A., Bhardwaj, M.
"An Overview: PAPR in OFDM Systems and its Effects"
(2012) International journal of communication and computer technology, 1 (2). Cited 1 time.


Gnanambigai, J., Rengarajan, N., Anbukkarasi, K.
(2012) International Journal of Communication and Computer Technologies, 1. Cited 1 time.


Arthi, R.
Robotica and Automation nanorobots-design and applications
(2012) International Journal of Communication and Computer Technology, 1 (1), pp. 26-32. Cited 1 time.


Bishnoi, D.K., Lakhwani, K.
Advanced approaches of handwritten digit recognition using hybrid algorithm
(0000) International Journal of Communication and Computer Technologies, 1 (57), pp. 186-191. Cited 1 time.


Goyal, D., Hemrajani, N., Paliwal, K.
GPH Algorithm: Improved CBC improved BIFID cipher Symmetric Key Algorithm
(0000) International Journal of Communication and Computer Technologies, 1 (60), pp. 208-211. Cited 1 time.


Gupta, P.C., Sharma, A.
(0000) Predicting the Number of Blood Donors Through Their Age and Blood Group by Using Data Mining Too International Journal of Communication and Computer Technologies, 1. Cited 1 time.


(0000) Dr.N.Rengarajan#2,K.Anbukkarasi#3 International Journal of Communication and Computer Technologies, 101 (2-3). Cited 1 time.