📢 Latest Update: UGC Discontinues CARE Journal Listing: New Guidelines for Selecting Peer-Reviewed Journals View Now

Current Trends in Information Technology Cover

Current Trends in Information Technology

E-ISSN: 2249-4707 | P-ISSN: 2348-7895 | Peer-Reviewed Journal (Refereed Journal) | Hybrid Open Access

About the Journal

Current Trends in Information Technology is a peer-reviewed hybrid open-access journal launched in 2011, focused on the rapid publication of fundamental research papers on all areas of Information Technology across multidisciplinary domains.

View full focus & scope More

Journal Metrics

Key performance indicators showcasing our journal’s impact and reach

45

Published Articles (2024)

60.77

Days Acceptance Time

112.5

Day Publication Time

Total Visits

Journal Information

Title: Current Trends in Information Technology
Abbreviation: ctit
Issues Per Year: 3 Issues
P-ISSN: 2348-7895
E-ISSN: 2249-4707
Publisher: STM Journals, An imprint of Consortium e-Learning Network Pvt. Ltd.
DOI: 10.37591/CTIT
Starting Year: 2011
Subject: Information Technology
Publication Format: Hybrid Open Access
Language: English
Copyright Policy: CC BY-NC-ND
Type: Peer-reviewed Journal (Refereed Journal)

Address:

STM Journals, An imprint of Consortium e-Learning Network Pvt. Ltd. A-118, 1st Floor, Sector-63, Noida, U.P. India, Pin - 201301

Editorial Board

View Full Editorial Board

ctit maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

Editor in Chief

Editor

Dr. Loganathan R, Professor & HOD

Sri Venkateshwara College of Engineering, Bengaluru, Karnataka, India, 562157

Email :

Latest Articles

Ahead of Print

Human-in-the-Loop AI in HR Decision-Making: Insights from Big 4 AI Governance Reports

The integration of artificial intelligence (AI) in human resource (HR) decision-making has transformed recruitment, performance evaluations, and talent management.

AI governance, human-in-the-loop AI, HR analytics, Big 4 consulting, algorithmic bias, ethical AI, explainable AI (XAI)

Exploring AI-Driven Student Performance Analysis as a Dimension of an AI-Powered Assessment and Feedback System: A Comprehensive Review

The rapid proliferation of artificial intelligence (AI) in educational technology has heralded a paradigmatic transformation in assessment methodologies, transitioning from static, summative evaluations to dynamic, data-driven systems that emphasize continuous formative feedback.

Artificial intelligence, AI-powered assessment and feedback system, student performance, deep learning, algorithmic

AI-Driven Exam Grading, Percentile Calculation, and Plagiarism Detection System for Educational Integrity

The influence of artificial intelligence (AI) on academic evaluation has become increasingly significant, particularly in areas such as automated grading, large-scale content analysis, and plagiarism detection.

AI-powered education, grading, academic integrity, plagiarism detection, hybrid framework, ethical education, AI content, human-AI collaboration, content analysis, human insights, misclassification

A Study of the Impact of AI-Powered Recommendation Systems on Consumer Purchase Decisions in the E-Commerce Industry

Through personalized suggestions, the e-commerce industry has been affected so much that it has been overtaken by AI-powered recommendation systems.

AI-powered recommendations, e-commerce, consumer behavior, product discovery, online shopping, personalization, purchase decisions, trust in AI, digital marketing, and customer engagement

Elderly Healthcare Using Federated Learning Approach

The healthcare system for elderly people faces several challenges, which can be addressed using advanced machine learning models.

Long short-term memory, recurrent neural network, convolutional neural network, deep reinforcement learning, WESAD, UCI HAR, MIMIC III, Internet of Medical Things

Exploring the Intersection of Blockchain and Cybersecurity

The digital landscape is an increasingly contested battleground, where the escalating sophistication of cyber threats consistently challenges the efficacy of traditional, centralized security architectures.

Cybersecurity, blockchain, user layer, application layer, distributed ledger technology, principle of least privilege