All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Journal of Global Research in Computer Sciences : Citations & Metrics Report

Important citations (766)
image Mandhare pa, kharat v, patil cy. intelligent road traffic control system for traffic congestion a perspective. international journal of computer sciences and engineering. 2018 jul 31;6(07):2018.
image Japertas s, jankūnienė r. nfc vulnerabilities investigation. ininternational conference on distributed computer and communication networks 2020 sep 14 (pp. 450-463). springer, cham.
image Anand k, sharma er. comparison of lsb and msb based image steganography. international journal of advanced research in computer science and software engineering. 2014 aug;4(8):906-9.
image Shekhar s, ansari ma. image analysis for brain tumor detection from mri images using wavelet transform. in2018 international conference on power energy, environment and intelligent control (peeic) 2018 apr 13 (pp. 670-675). ieee.
image Deb d, dutta b, roy s. a noble approach for noise removal from brain image using region filling. in2014 ieee international conference on advanced communications, control and computing technologies 2014 may 8 (pp. 1403-1406). ieee.
image Budiyanti rt, herlambang pm, nandini n. tantangan etika dan hukum penggunaan rekam medis elektronik dalam era personalized medicine. jurnal kesehatan vokasional. 2019;4(1):49-54.
image Cadena l, espinosa n, cadena f, korneeva a, kruglyakov a, legalov a, romanenko a, zotin a. brain's tumor image processing using shearlet transform. inapplications of digital image processing xl 2017 sep 19 (vol. 10396, p. 103961b). international society for optics and photonics.
image Serna e, serna a. power and limitations of formal methods for software fabrication: thirty years later. informatica. 2017 may 9;41(3).
image Devi s, makani r. encoding n-party man-in-middle attack for diffie–hellman algorithm in a client-server paradigm. ijcsit) international journal of computer science and information technologies. 2015;6(6):4860-5.
image Minhas nm, qazi am, shahzadi s, ghafoor s. an integration of uml sequence diagram with formal specification methods—a formal solution based on z. journal of software engineering and applications. 2015;8(08):372.
image Baravati hb, hosseinkhani j, keikhaee s, ostad m, khayat h, havasi m. a new data mining-based approach to improving the quality of alerts in intrusion detection systems. ijcsns int. j. comput. sci. netw. secur. 2017 aug 30;17(8):194-8.
image Devi s, makani r. generation of n-party man-in-middle attack for diffie-hellman key exchange protocol: a review. international journal of computer science and information technologies. 2015;6(5):4281-5.
image Humayoun m, qazi am. towards knowledge management in re practices to support software development. journal of software engineering and applications. 2015;8(08):407.
image Ioniţă i, ioniţă l. an agent-based approach for building an intrusion detection system. in2013 roedunet international conference 12th edition: networking in education and research 2013 sep 26 (pp. 1-6). ieee.
image Bashir n, bilal m, liaqat m, marjani m, malik n, ali m. modeling class diagram using nlp in object-oriented designing. in2021 national computing colleges conference (nccc) 2021 mar 27 (pp. 1-6). ieee.
image Hatkar sp, kadam sh, syed ah. analysis of various periodicity detection algorithms in time series data with design of new algorithm. international journal of computer applications technology and research. 2014;3:229-39.
image Reddy jm, prasad sv, baragada sr. international journal of engineering sciences & research technology requirement engineering: an approach to quality software development.
image Usha r, perumal k. svm classification of brain images from mri scans using morphological transformation and glcm texture features. international journal of computational systems engineering. 2019;5(1):18-23.
image Pai dg, pai y. analysis of the beaufort cipher expansion technique and its usage in providing data security in cloud. incyber intelligence and information retrieval 2022 (pp. 49-58). springer, singapore.
image Nanda sj, gulati i, chauhan r, modi r, dhaked u. a k-means-galactic swarm optimization-based clustering algorithm with otsu’s entropy for brain tumor detection. applied artificial intelligence. 2019 jan 28;33(2):152-70.