All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Journal of Global Research in Computer Sciences : Citations & Metrics Report

Important citations (766)
image Tyagi r, sharma nk, malhotra k, khosla a. comprehensive methodology for threat identification and vulnerability assessment in ad hoc networks. incyber security 2018 (pp. 335-347). springer, singapore.
image Garg r. manet: enhanced lightweight sybil attack detection technique. inhandbook of research on advanced trends in microwave and communication engineering 2017 (pp. 444-476). igi global.
image Pandit c, ladhe s. detecting malicious node: survey. int. journal of engineering research and applications. 2014;4(1).
image Pandit cm, ladhe sa. secure routing protocol in manet using tac. in2014 first international conference on networks & soft computing (icnsc2014) 2014 aug 19 (pp. 107-112). ieee.
image Sun q, hua w, tian m, wang y. a method of oversized image generation based on stitching jpeg file streams. international journal of signal processing, image processing and pattern recognition. 2015;8(8):159-68.
image Park jh, lee hj, choi jh, kim sg. design and implementation of the 3d real-time monitoring video system for the smart phone.
image De luca p, russiello vm, sannino rc, valente l. a study for image compression using re-pair algorithm. arxiv preprint arxiv:1901.10744. 2019 jan 30.
image Sun q, xiong j, wang y. a method of image segmentation based on the jpeg file stream. journal of computational methods in sciences and engineering. 2015 jan 1;15(3):467-75.
image Hammoodi as, çelebi fv. secure the supervise cluster-base for health institutions and using in remote health. journal of medical imaging and health informatics. 2020 jan 1;10(1):223-7.
image Hammoodi as. a secure cluster-based wireless sensor networks applications (doctoral dissertation, ankara yıldırım beyazıt üniversitesi fen bilimleri enstitüsü).
image Kamil bz, hameed ma, abdullah jn. using cardano's method for solving cubic equation in the cryptosystem to protect data security against cyber attack. in2020 2nd annual international conference on information and sciences (aicis) 2020 nov 24 (pp. 127-131). ieee.
image Singh l, bharti rk. comparison among different cryptographic algorithms using neighborhood-generated keys. international journal of computer applications. 2013 jan 1;73(5):39-42.
image Osaghae eo. replication of ciphertext in cryptographic system. journal of applied sciences and environmental management. 2018 sep 11;22(8):1193-7.
image Singh hr, danewalia as, chopra d, kumar n. randomly generated algorithms and dynamic connections. international journal of scientific research in network security and communication. 2014;2(1):231-8.
image Warjri j, raj eg. ked-a symmetric key algorithm for secured information exchange using modulo 69. international journal of computer network and information security. 2013 aug 1;5(10):37.
image Hussain i, negi mc, pandey n. proposing an encryption/decryption scheme for iot communications using binary-bit sequence and multistage encryption. in2018 7th international conference on reliability, infocom technologies and optimization (trends and future directions)(icrito) 2018 aug 29 (pp. 709-713). ieee.
image Manasrah am, al‐din bn. mapping private keys into one public key using binary matrices and masonic cipher: caesar cipher as a case study. security and communication networks. 2016 jul 25;9(11):1450-61.
image Patidar k, kumar m, kumar s. performance analysis of de over k-means proposed model of soft computing. inartificial intelligence: concepts, methodologies, tools, and applications 2017 (pp. 2294-2307). igi global.
image Chiu c, shu ch. monthly car sales prediction using internet word-of-mouth (ewom). in2017 ieee international conference on innovations in intelligent systems and applications (inista) 2017 jul 3 (pp. 345-348). ieee.
image Kumar i, mann m. an approach to energy diffusion in wireless sensor network.