Home
Author Guide
Editor Guide
Reviewer Guide
Published Issues
Special Issue
Introduction
Special Issues List
Sections and Topics
Sections
Topics
Internet of Things (IoT) in Smart Systems and Applications
Human-Computer Interaction (HCI) in Modern Technological Systems
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access
Copyright and Licensing
Preservation and Repository Policy
Publication Ethics
Editorial Process
Contact Us
General Information
ISSN:
1798-2340 (Online)
Frequency:
Monthly
DOI:
10.12720/jait
Indexing:
ESCI (Web of Science)
,
Scopus
,
DOAJ
,
CNKI
, EBSCO,
etc
.
APC:
1000 USD
Acceptance Rate:
27%
Average Days to Accept:
99 days
Managing Editor:
Ms. Mia Hu
E-mail:
editor@jait.us
Journal Metrics:
Impact Factor 2024: 1.5-Q3; CiteScore 2024: 4.8-Q3
Editor-in-Chief
Prof. Kin C. Yow
University of Regina, Saskatchewan, Canada
I'm delighted to serve as the Editor-in-Chief of
Journal of Advances in Information Technology
.
JAIT
is intended to reflect new directions of research and report latest advances in information technology. I will do my best to increase the prestige of the journal.
What's New
2026-04-16
All papers published in JAIT Vol.17, No. 3 have been indexed by Scopus.
2026-02-23
JAIT Vol. 17, No. 2 has been published online!
2025-10-21
Exciting news! JAIT has been accepted for inclusion in the Directory of Open Access Journals (DOAJ)!
Home
>
Published Issues
>
2011
>
Volume 2, No. 2, May 2011
>
Volume 2, No. 2, May 2011
Article#
Article Title & Authors (Volume 2, No. 2, May 2011)
Page
1
Guest Editorial——Special Issue on Security Issues and Solutions for Information, Computer and Networks
Karthikeyan Subramainan
71
2
Components Based Key Management Algorithm for Storage Area Networks
P.Mahalingam, N.Jayaprakash, and S.Karthikeyan
72
3
Securing Retinal Template Using Quasigroups
N. Radha, T. Rubya, and S.Karthikeyan
80
4
Security Model for TCP/IP Protocol Suite
M. Anand Kumar and S. Karthikeyan
87
5
Defense Strategy Using Trust Based Model to Mitigate Active Attacks in DSR Based MANET
N. Bhalaji and A. Shanmugam
92
6
Emerging Intuitionistic Fuzzy Classifiers for Intrusion Detection System
Kavitha B., Karthikeyan S., and Sheeba Maybell P.
99
7
Analysis of Open Environment Sign-in Schemes- Privacy Enhanced & Trustworthy Approach
Zubair Ahmad Khattak, Jamalul-Lail Ab Manan, and Suziah Sulaiman
109
8
Design Research of an Adaptive-Fuzzy-Neural Controller
Peifeng Niu, Guoqiang Li, and Mizhe Zhang
122
9
A Fault-Tolerant Routing Protocol for Mobile Ad Hoc Networks
Rana E. Ahmed
128