All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Journal of Global Research in Computer Sciences : Citations & Metrics Report

Important citations (766)
image Ghosh p, roy tk, majumder c. optimization of industrial wastewater treatment using intuitionistic fuzzy goal geometric programming problem. fuzzy information and engineering. 2016 sep 1;8(3):329-43.
image Tomar v, bhatia m. software localization kit for indian mass. in2014 ieee international symposium on signal processing and information technology (isspit) 2014 dec 15 (pp. 000247-000255). ieee.
image Baggio é, valim md, barbosa sd, sasso gt, lacey g. localization of the surewash pocket® mobile health app to brazilian portuguese. revista gaúcha de enfermagem. 2020 oct 26;41.
image Tomar v, bhatia m. localization of text editor using java programming. international journal of computer applications. 2014 mar;89(12):49-54.
image Mpofu p, salawu a. african language use in the digital public sphere: functionality of the localised google webpage in zimbabwe. south african journal of african languages. 2020 jan 2;40(1):76-84.
image Seljan s, dunđer i. automatic quality evaluation of machine-translated output in sociological-philosophical-spiritual domain. in2015 10th iberian conference on information systems and technologies (cisti) 2015 jun 17 (pp. 1-4). ieee.
image Panditrao mm, panditrao mm, panditrao am. development of resistance to the effect of local anesthetic agents administered via various routes due to single or multiple, previous scorpion bites: a proposed hypothesis and reporting a yet unrecognized phenomenon. j anesth crit care open access. 2015;3(5):00110.
image Naturu s, pulicherla y, mattigunta l, ch vr. traditional phytotherapy treatment for snake bite and scorpion sting by ethnic groups of kadapa district, andhra pradesh, india. international journal of pharmaceutical sciences review and research. 2013;20(1):64-70.
image Suranse v, sawant ns, paripatyadar sv, krutha k, paingankar ms, padhye ad, bastawade db, dahanukar n. first molecular phylogeny of scorpions of the family buthidae from india. mitochondrial dna part a. 2017 jul 4;28(4):606-11.
image Suranse v, sawant ns, paripatyadar sv, krutha k, paingankar ms, padhye ad, bastawade db, dahanukar n. first molecular phylogeny of scorpions of the family buthidae from india. mitochondrial dna part a. 2017 jul 4;28(4):606-11.
image Bahekar s, kale r, nagpure s. a review on medicinal plants used in scorpion bite treatment in india. mintage j. pharm med sci. 2012;1(1):1-6.
image Priyanka k, rao cs. a novel approach on middle attack prevention using https and ssl.
image Rubasinghe id. transaction verification model for peer-to-peer service-oriented digital currency transactions based on the foundation of blockchain architecture. abc research alert. 2016 dec 31;4(3):lanka-.
image Li s, li x, hao j, an b, feng z, chen k, zhang c. defending against man-in-the-middle attack in repeated games. inijcai 2017 jan 1 (pp. 3742-3748).
image Albahar ma, haataja k, toivanen p. towards enhancing just works model in bluetooth pairing. international journal on information technologies & security. 2016 dec 1;8(4).
image Mohammed sd, hasan tm. cryptosystems using an improving hiding technique based on latin square and magic square. indonesian journal of electrical engineering and computer science. 2020 oct;20(1):510-20.
image Hussain i, pandey n, singh av, negi mc, rana a. presenting iot security based on cryptographic practices in data link layer in power generation sector. in2020 8th international conference on reliability, infocom technologies and optimization (trends and future directions)(icrito) 2020 jun 4 (pp. 1085-1088). ieee.
image Sahab dm, rahma am, hasan tm. maintaining the integrity of encrypted data by using the improving hash function based on gf (????). tem journal. 2020 aug 1;9(3):1277.
image Rahma am, hossen am. new variant of public key based on diffie-hellman with magic cube of six-dimensions. international journal of computer science and information security (ijcsis). 2015 oct;13(10).
image Shukla vk, pandey n, ojha db. proposed model for secure snmp communication with magic square method. international journal of engineering research. 2014 may;3(5).