All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Journal of Global Research in Computer Sciences : Citations & Metrics Report

Important citations (766)
image Sharma g, pandey n, hussain i, kathri sk. design of framework and analysis of internet of things at data link layer. in2017 2nd international conference on telecommunication and networks (tel-net) 2017 aug 10 (pp. 1-4). ieee.
image Dawood oa, rahma am, hossen am. generalized method for constructing magic cube by folded magic squares. international journal of intelligent systems and applications. 2016;8(1):1.
image Merciol f, lefèvre s. la stéganographie: une solution pour enrichir le contenu des vidéos numériques. incolloque national de la recherche en iut (cnriut) 2011 (p. 187).
image Bae h, min s, choi hs, yoon s. dna privacy: analyzing malicious dna sequences using deep neural networks. gene. 2020 aug 18;5:3.
image Prakash kj, sivakumar p. memetic algorithm based on hill climbing algorithm for ic partitioning.
image Singh p, yadav p. secure transmission of information by lsb encoding technique using audio steganography and cryptography.
image Manikandan r, sekar k, hariharan k. a broad review on various vlsi cad algorithms for circuit partitioning problems.
image Hussain hs, aljunid sa, yahya s, ali fh. a critical review of soft computing image information hiding.
image Nayak s, panda m. vlsi cell partitioning using data mining approaches.
image Ibrahim ab, pramukantoro es. desain dan implementasi in-network caching pada content centric networking menggunakan ccn-lite dengan simulator omnet+. jurnal pengembangan teknologi informasi dan ilmu komputer e-issn.;2548:964x.
image Bandyopadhyay sk, dutta b, majumdar a, bhowmick s. hide text within an audio clip. journal of current computer science and technology. 2011;1(6):305-15.
image Ibrahim ab, pramukantoro es. desain dan implementasi in-network caching pada content centric networking menggunakan ccn-lite dengan simulator omnet+. jurnal pengembangan teknologi informasi dan ilmu komputer e-issn.;2548:964x.
image Shinde a, chaware sm. content centric networks (ccn): a survey. in2018 2nd international conference on i-smac (iot in social, mobile, analytics and cloud)(i-smac) i-smac (iot in social, mobile, analytics and cloud)(i-smac), 2018 2nd international conference on 2018 aug 30 (pp. 595-598). ieee.
image Kaur m, sharma vk. encryption based lsb steganography technique for digital images and text data. international journal of computer science and network security (ijcsns). 2016 sep 1;16(9):90.
image Meligy am, nasef mm, eid ft. a hybrid technique for enhancing the efficiency of audio steganography. international journal of image, graphics and signal processing. 2016;8(1):36.
image Achuthshankar a, achuthshankar a, arjun kp, sreenarayanan nm. encryption of reversible data hiding for better visibility and high security. procedia technology. 2016 jan 1;25:216-23.
image Alkorbi h, alataby a, altaee m, alnuaimy w. highly efficient image steganography using haar dwt for hiding miscellaneous data. jordanian journal of computers and information technology. 2016;2(1):17-.
image Ahmadizadeh e, aghasian e, taheri hp, nejad rf. an automated model to detect fake profiles and botnets in online social networks using steganography technique. iosr journal of computer engineering (iosr-jce). 2015;17(1):65-71.
image Urs pn, pooja r, apoorva p. comparitive study on existing and proposed system of access control with anonymous authentication of da ta stored. in2017 international conference on intelligent computing and control (i2c2) 2017 jun 23 (pp. 1-5). ieee.
image Salah hj, rimiru rm, kimwele mw. an alternative model to overcoming two phase commit blocking problem. international journal of computer (ijc). 2017;26(1):71-88.