All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Journal of Global Research in Computer Sciences : Citations & Metrics Report

Important citations (766)
image Basu d, bose a, bhowmik s, chatterjee s, nath a. advanced feedback encryption standard version-1 (afes-1). international journal of computer applications. 2014 jan 1;103(3).
image Rao as, sunitha kv. secure geographical routing in manet using the adaptive position update. international journal of advanced computer research. 2014 sep 1;4(3):785.
image Nath a, bhowmik s, basu d, bose a, chatterjee s. bit level multi way feedback encryption standard version-2 (blmwfes-2). in2014 ieee international conference on advanced communications, control and computing technologies 2014 may 8 (pp. 1702-1707). ieee.
image Majumdar s, maiti a, nath a. new secured steganography algorithm using encrypted secret message inside qrtm code: system implemented in android phone. in2015 international conference on computational intelligence and communication networks (cicn) 2015 dec 12 (pp. 1130-1134). ieee.
image Roy a. brief comparison of rsa and diffie-hellman (public key) algorithm. accents transactions on information security. 2016;1(1).
image Palati m. studies on aircell in a conservator tank. power research. 2015 dec 16;11(4):675-80.
image Al-salti f, alzeidi n, arafeh b. a new multipath grid-based geographic routing protocol for underwater wireless sensor networks. in2014 international conference on cyber-enabled distributed computing and knowledge discovery 2014 oct 13 (pp. 331-336). ieee.
image Chowdhury sk, sen m. attacks and mitigation techniques on mobile ad hoc network—a survey. in2017 international conference on trends in electronics and informatics (icei) 2017 may 11 (pp. 11-18). ieee.
image Orrensalo t, nikou s. entrepreneurs’ information retrieval: the role of affective aspects through the media richness theory. in2021 ieee international conference on technology and entrepreneurship (icte) 2021 aug 24 (pp. 1-6). ieee.
image Chowdhury sk, sen m. attacks and mitigation techniques on mobile ad hoc network—a survey. in2017 international conference on trends in electronics and informatics (icei) 2017 may 11 (pp. 11-18). ieee.
image Lucero l. safe spaces in online places: social media and lgbtq youth. multicultural education review. 2017 apr 3;9(2):117-28.
image Shanthi hj, anita em. secure and efficient distance effect routing algorithm for mobility (se_dream) in manets. inproceedings of the 3rd international symposium on big data and cloud computing challenges (isbcc–16’) 2016 (pp. 65-80). springer, cham.
image Hanumanthsastry s, prasadababu ms. analysis & prediction of sales data in sap-erp system using clustering algorithms. arxiv e-prints. 2013 dec:arxiv-1312.
image Sathiya a, selvam k. analysis of sales and distribution of an it industry using data mining techniques.
image Satyanarayana s. implementation of a global bi governance structure: a case study of the business area, mining rock excavation of atlas copco.
image Sulastra im, sudarma m, kumara in. pemodelan integrasi nearly real time data warehouse dengan service oriented architecture untuk menunjang sistem informasi retail. maj. ilm. teknol. elektro. 2015;14(2):11.
image Sastry sh, babu p, prasada ms. analysis & prediction of sales data in sap-erp system using clustering algorithms. arxiv preprint arxiv:1312.2678. 2013 dec 10.
image Sastry sh, babu p, prasada ms. implementation of crisp methodology for erp systems. arxiv preprint arxiv:1312.2065. 2013 dec 7.
image Eriksson o, goldkuhl g. preconditions for public sector e-infrastructure development. information and organization. 2013 jul 1;23(3):149-76.
image Gupta sk. usability models based on network artifacts for rural development. international journal of computer technology and applications. 2013 may 1;4(3):508.