All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Journal of Global Research in Computer Sciences : Citations & Metrics Report

Important citations (766)
image Sheoran k, sangwan op. an insight of software quality models applied in predicting software quality attributes: a comparative analysis. in2015 4th international conference on reliability, infocom technologies and optimization (icrito)(trends and future directions) 2015 sep 2 (pp. 1-5). ieee.
image Kalita hk, kar a. key management and security planning in wireless ad-hoc networks.
image
image Alfaqih tm, al-dhelaan am, hassan mm. wireless sensor network simulation environment. international journal of computer applications. 2015 jan 1;118(17).
image Kalita hk, kar a. key management in secure self organized wireless sensor network: a new approach. inproceedings of the international conference & workshop on emerging trends in technology 2011 feb 25 (pp. 865-870).
image Goyal n, kakkar s, rani s. design and implementation of mosfet model equations on matlab simulink library. international journal of computer applications.;975:8887.
image Rashid mm, gondal i, kamruzzaman j. acsp-tree: a tree structure for mining behavioral patterns from wireless sensor networks. in38th annual ieee conference on local computer networks 2013 oct 21 (pp. 691-694). ieee.
image Tran t, kuhnert m, wietfeld c. performance evaluation of feasible and holistic csh-mu handoff solution for seamless emergency service provisioning. in2012 ieee symposium on computers and communications (iscc) 2012 jul 1 (pp. 000317-000324). ieee.
image Tran t, kuhnert m, wietfeld c. energy-efficient handoff decision algorithms for csh-mu mobility solution. in2012 21st international conference on computer communications and networks (icccn) 2012 jul 30 (pp. 1-6). ieee.
image Singh r, mishra a, tyagi a, ojha db. error free e-messaging technique using symmetric key encryption-ehdes.
image Sreedevi s, mathew tj. a modified approach for the removal of impulse noise from mammogram images. ininternational symposium on signal processing and intelligent recognition systems 2019 dec 18 (pp. 291-305). springer, singapore.
image Bania rk, halder a. adaptive trimmed median filter for impulse noise detection and removal with an application to mammogram images. international journal of image and graphics. 2020 oct 16;20(04):2050032.
image Sreedevi s, sherly e. a new and efficient approach for the removal of high density impulse noise in mammogram. international journal of computer aided engineering and technology. 2020;12(3):370-91.
image Sreedevi s, sherly e. a new and efficient approach for the removal of high density impulse noise in mammogram. international journal of computer aided engineering and technology. 2020;12(3):370-91.
image Sharma s, jangra s. international journal of advanced research in computer science and software engineering. international journal. 2015 may;5(5).
image Jain a, singh s, bhateja v. a robust approach for denoising and enhancement of mammographic images contaminated with high density impulse noise. international journal of convergence computing. 2013 jan 1;1(1):38-49.
image
image
image Kanak a, ergün s. a practical biometric random number generator for mobile security applications. ieice transactions on fundamentals of electronics, communications and computer sciences. 2017 jan 1;100(1):158-66.
image Alaslni g, elrefaei la. transfer learning with convolutional neural networks for iris recognition. int. j. artif. intell. appl. 2019;10(5):47-64.