Editorial Policies



Timeline Publication takes intellectual integrity very seriously. The publisher, editors, reviewers, and authors all agree upon the following standards of expected ethical behaviour, which are based on COPES’s Best Practice Guidelines.

 

Publication Ethics and Publication Malpractice Statement

(based on Elsevier recommendations and COPE's Best Practice Guidelines for Journal Editors)

 Ethical guidelines for journal publication

(These guidelines are based on existing Elsevier policies).

The publication of an article in a peer-reviewed journal IJECCE is an essential building block in the development of a coherent and respected network of knowledge. It is a direct reflection of the quality of the work of the authors and the institutions that support them. Peer-reviewed articles support and embody the scientific method. It is therefore important to agree upon standards of expected ethical behaviour for all parties involved in the act of publishing: the author, the journal editor, the peer reviewer, the publisher and the society.

Timeline Publication as publisher of the journal IJECCE takes its duties of guardianship over all stages of publishing extremely seriously and we recognize our ethical and other responsibilities.

We are committed to ensuring that advertising, reprint or other commercial revenue has no impact or influence on editorial decisions. In addition, the Timeline Publication and Editorial Board will assist in communications with other journals and/or publishers where this is useful and necessary.

Duties of authors

(These guidelines are based on existing Elsevier policies).

Reporting standards

Authors of reports of original research should present an accurate account of the work performed as well as an objective discussion of its significance. Underlying data should be represented accurately in the paper. A paper should contain sufficient detail and references to permit others to replicate the work.

Fraudulent or knowingly inaccurate statements constitute unethical behaviour and are unacceptable.

Review and professional publication articles should also be accurate and objective, and editorial opinion works should be clearly identified as such.

Data access and retention

Authors may be asked to provide the raw data in connection with a paper for editorial review, and should be prepared to provide public access to such data, if practicable, and should in any event be prepared to retain such data for a reasonable time after publication.

Originality and plagiarism

The authors should ensure that they have written entirely original works, and if the authors have used the work and/or words of others, that this has been appropriately cited or quoted. Plagiarism takes many forms, from passing off another’s paper as the authors own paper, to copying or paraphrasing substantial parts of another’s paper (without attribution), to claiming results from research conducted by others. Plagiarism in all its forms constitutes unethical publishing behaviour and is unacceptable.

Multiple, redundant or concurrent publication

An author should not in general publish manuscripts describing essentially the same research in more than one journal or primary publication. Submitting the same manuscript to more than one journal concurrently constitutes unethical publishing behaviour and is unacceptable. In general, an author should not submit for consideration in another journal a previously published paper. Publication of some kinds of articles (e.g. clinical guidelines, translations) in more than one journal is sometimes justifiable, provided certain conditions are met. The authors and editors of the journals concerned must agree to the secondary publication, which must reflect the same data and interpretation of the primary document. The primary reference must be cited in the secondary publication.

Acknowledgement of sources

Proper acknowledgment of the work of others must always be given. Authors should cite publications that have been influential in determining the nature of the reported work. Information obtained privately, as in conversation, correspondence, or discussion with third parties, must not be used or reported without explicit, written permission from the source. Information obtained in the course of confidential services, such as refereeing manuscripts or grant applications, must not be used without the explicit written permission of the author of the work involved in these services.

Authorship of the paper

Authorship should be limited to those who have made a significant contribution to the conception, design, execution, or interpretation of the reported study. All those who have made significant contributions should be listed as co-authors. Where there are others who have participated in certain substantive aspects of the research project, they should be acknowledged or listed as contributors. The corresponding author should ensure that all appropriate co-authors and no inappropriate co-authors are included on the paper, and that all co-authors have seen and approved the final version of the paper and have agreed to its submission for publication.

Hazards and human or animal subjects

If the work involves chemicals, procedures or equipment that have any unusual hazards inherent in their use, the author must clearly identify these in the manuscript. If the work involves the use of animal or human subjects, the author should ensure that the manuscript contains a statement that all procedures were performed in compliance with relevant laws and institutional guidelines and that the appropriate institutional committee(s) has approved them. Authors should include a statement in the manuscript that informed consent was obtained for experimentation with human subjects. The privacy rights of human subjects must always be observed.

Disclosure and conflicts of interest

All authors should disclose in their manuscript any financial or other substantive conflict of interest that might be construed to influence the results or interpretation of their manuscript. All sources of financial support for the project should be disclosed. Examples of potential conflicts of interest which should be disclosed include employment, consultancies, stock ownership, honoraria, paid expert testimony, patent applications/registrations, and grants or other funding. Potential conflicts of interest should be disclosed at the earliest stage possible.

Fundamental errors in published works

When an author discovers a significant error or inaccuracy in his/her own published work, it is the authors obligation to promptly notify the journal editor or publisher and cooperate with the editor to retract or correct the paper. If the editor or the publisher learns from a third party that a published work contains a significant error, it is the obligation of the author to promptly retract or correct the paper or provide evidence to the editor of the correctness of the original paper.


Current Issue : 2020, Vol: 8, Issue: 2
ISSN : 2278-9723
ISSUES : 02 per year
PUBLISHER :

Benefits of publishing in International Journal of Communication and Computer Technologies

  • Online submission
  • Wider visibility through open access
  • Higher impact
  • Prompt review

Abstracting and Indexing Information

Google Scholar

General Impact Factor (GIF)

DOAJ

Scopus citation 

 

Scopus
EXPORT DATE:24 Nov 2018

Gnanambigai, J., Rengarajan, D.R., Anbukkarasi, K.
Leach and Its Descendant Protocols: A Survey
(2012) International Journal of Communication and Computer Technologies,
 1 (3), pp. 15-22. Cited 25 times.


Gangwar, A., Bhardwaj, M.
An overview: Peak to average power ratio in OFDM system & its effect
(2012) International Journal of Communication and Computer Technologies, 
1 (2), pp. 22-25. Cited 20 times.


Sharma, A., Gupta, P.C.
Predicting the number of blood donors through their age and blood group by using data mining tool
(2012) International Journal of Communication and Computer Technology,
1 (2-6), pp. 6-10. Cited 9 times.


Sundhar, C., Archana, D.
Automatic screening of fundus images for detection of diabetic retinopathy
(2014) International Journal of Communication and Computer Technologies,
 2 (1), pp. 100-105. Cited 8 times.


Kaur, M., Mahajan, M.
Using encryption algorithms to enhance the data security in cloud computing
(2013) International Journal of Communication and Computer Technologies, 
1 (3), pp. 56-60. Cited 6 times.


Abinaya, V., Vennila, M., Padmanabhan, N.
Sentence level text clustering using a hierarchical fuzzy relational clustering algorithm
(2014) Proc. of International Journal of Communication and Computer Technologies, 2 (2).
Cited 3 times.


Malakar, S., Mohanta, D., Sarkar, R., Nasipuri, M.
A Novel Noise-Removal Technique for Document Images
(2010) International Journal of Communications and Computer Technology, 2, pp. 120-124. Cited 3 times.


Ramahrishnan, S., Elakkiya, B., Geetha, R., Vasuki, P., Mahalingam, S.
Image encryption using chaotic maps in hybrid domain
(2014) International Journal of Communication and Computer Technologies, 2 (5), pp. 44-48. Cited 2 times.


Jeevanand, D., Keerthivasan, K., Mohamed Rilwan, J., Murugan, P.
Real Time Embedded Network Video Capture And SMS Alerting system
(2014) International Journal of Communication and Computer Technologies. Cited 2 times.


Rethesh, D.
Analysis on fpga designs of parallel high performance multipliers
(2014) International Journal of Communication and Computer Technologies, 2 (12), pp. 70-77. Cited 2 times.


Atchaya, S., Dhanalakshmi, N., Veeramani, R.
A compact design of multiband microstrip patch antenna for GSM, Bluetooth and Wi-MAX applications
(2014) International Journal of Communication and Computer Technologies, 2 (1), pp. 1-4. Cited 2 times.


Xavier, N.
Security of PHR in cloud computing using ABE technique
(2013) International Journal of Communication and Computer Technologies, 1 (72), pp. 265-269. Cited 2 times.


Vijay, V., Gowri, K., Velmurugan, S., Basha, A.M.
Detection and extraction of p wave an T wave in ECG to improve sensitivity for e-health monitoring
(2016) International Journal of Communication and Computer Technologies, 4 (4). Cited 1 time.


Santhosh, M.
Electronic voting machine using internet
(2016) International Journal of Communication and Computer Technologies. Cited 1 time.


Suba, R., Satheeskumar, R.
Efficient cluster-based congestion control in wireless mesh network
(2016) International Journal of Communication and Computer Technologies, pp. 4059-4064. Cited 1 time.


Sundararaju, K., Sukumar, P.
Improvement of power quality using PQ Theory based series hybrid active power filter
(2016) International Journal of Communication and Computer Technologies., 4 (2), pp. 4007-4011. Cited 1 time.


Rajasudhan, S., Nallusamy, R.
A study on cryptographic methods in cloud storage
(2014) International Journal of Communication and Computer Technologies, 2 (2), pp. 1-5. Cited 1 time.


Jeba Pon Elizabeth, S., Vedhapriya Vadhana, R.
Comparing PSNR by using Integer and Haar Wavelet Transform in Reversible Data Hiding Technique
(2014) International Journal of Communication and Computer Technologies, 2 (10). Cited 1 time.


Rajasudhan, S., Nallusamy
A Study on Cryptography Methods in Cloud Storage
(2014) International Journal of Communication and Computer Technologies, 2 (2). Cited 1 time.


Kavitha, P., Keerthana, C., Niroja, V., Vivekanandhan, V.
Mobile-id based sybil attack detection on the Mobile ADHOC Network
(2014) International Journal of Communication and Computer Technologies, 2 (2), pp. 56-63. Cited 1 time.


Singh, S.P., Goyal, N.
Security Configuration and Performance Analysis of FTP Server
(2014) International Journal of Communication and Computer Technologies, 2 (3), pp. 39-42. Cited 1 time.


Jayasinghe, J.W., Anguera, J., Uduwawala, D.N.
A simple design of multi band microstrip patch antennas robust to fabrication tolerances for gsm, umts, lte, and bluetooth applications by using genetic algorithm optimization
(2014) International Journal of Communication and Computer Technologies, 2 (1). Cited 1 time.


Sharma, S., Shiwani, S.
Data mining based accuracy enhancement of ANN using Swarm intelligence
(2014) International Journal of Communication and Computer Technologies, 2 (9). Cited 1 time.


Rajasudhan, S., Nallusamy, R.
A study on cryptographic methods in cloud storage
(2014) International Journal of Communication and Computer Technologies, 2, pp. 2278-9723. Cited 1 time.


Kavitha, P., Keerthana, C., Niroja, V., Vivekanandhan, V.
(2014) International Journal of Communication and Computer Technologies, 2. Cited 1 time.


Srivastava, K.A., Yadav, K.D., Pandey, K.S.
The security in private cloud computing
(2013) International Journal of Communication and Computer Technologies, 1 (4). Cited 1 time.


Gangwar, A., Bhardwaj, M.
'An Overview: Peak to Average Power Ratio in OFDM system & its Effect'
(2013) International Journal of Communication and Computer Technologies. Cited 1 time.


Kaur, M., Mahajan, M.
Using encryption Algorithms to enhance the Data Security in Cloud Computing
(2013) International Journal of Communication and Computer Technologies, 1 (12). Cited 1 time.


Nandhini, J., Nithya, M., Prabhakaran, S.
Advance virus detection using combined techniques of pattern matching and dynamic instruction sequences
(2013) International Journal of Communication and Computer Technologies, pp. 156-161. Cited 1 time.


Gupta, P., Shiwani, S.
Computer Science Department Suresh Gyan Vihar University India RECITAL INVESTIGATION of IPv4 and IPv6 USING WIRED NETWORKS in OMNET++
(2013) International Journal of Communication and Computer Technologies, 1 (47). Cited 1 time.


Goyal, N., Hemrajani, N.
Comparative study of AODV and DSR routing protocols for MANET: Performance analysis
(2013) International Journal of Communication and Computer Technologies, 1 (57). Cited 1 time.


Kaur, M., Mahajan, M.
Using encryption algorithm to enhance data security in cloud computing
(2013) International Journal of Communication and Computer Technology. Cited 1 time.


Kumar Srivastava, K., Tripathi, A., Kumar Tiwari, A.
Secure data transmission in AODV routing protocol
(2013) International Journal of Communication and Computer Technologies, 1 (4). Cited 1 time.


Mandeep, T., Manish, Y.
Using encryption algorithms to enhance the data security in cloud computing
(2013) International Journal of Communication and Computer Technologies, 1 (12), pp. 78-89. Cited 1 time.


Goyal, N., Hemrajani, N.
Comparative study of AODV and DSR routing protocols for MANET: Performance analysis
(2013) International Journal of Communication and Computer Technologies, 1 (57), pp. 198-202. Cited 1 time.


Shoeb, M., Kumar Gupta, V.
A crypt analysis of the tiny encryption algorithm in key generation
(2013) International Journal of Communication and Computer Technologies, 1 (38). Cited 1 time.


Shoeb, M., Gupta, V.K.
A cryptanalysis of the tiny encryption algorithm in key generation
(2013) International Journal of Communication and Computer Technologies (IJCCTS), 1 (5), pp. 123-128. Cited 1 time.


Gangwar, A., Bhardwaj, M.
"An Overview: PAPR in OFDM Systems and its Effects"
(2012) International journal of communication and computer technology, 1 (2). Cited 1 time.


Gnanambigai, J., Rengarajan, N., Anbukkarasi, K.
(2012) International Journal of Communication and Computer Technologies, 1. Cited 1 time.


Arthi, R.
Robotica and Automation nanorobots-design and applications
(2012) International Journal of Communication and Computer Technology, 1 (1), pp. 26-32. Cited 1 time.


Bishnoi, D.K., Lakhwani, K.
Advanced approaches of handwritten digit recognition using hybrid algorithm
(0000) International Journal of Communication and Computer Technologies, 1 (57), pp. 186-191. Cited 1 time.


Goyal, D., Hemrajani, N., Paliwal, K.
GPH Algorithm: Improved CBC improved BIFID cipher Symmetric Key Algorithm
(0000) International Journal of Communication and Computer Technologies, 1 (60), pp. 208-211. Cited 1 time.


Gupta, P.C., Sharma, A.
(0000) Predicting the Number of Blood Donors Through Their Age and Blood Group by Using Data Mining Too International Journal of Communication and Computer Technologies, 1. Cited 1 time.


(0000) Dr.N.Rengarajan#2,K.Anbukkarasi#3 International Journal of Communication and Computer Technologies, 101 (2-3). Cited 1 time.