All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Journal of Global Research in Computer Sciences : Citations & Metrics Report

Important citations (766)
image Tyamanavar v, nidagundi j. fpga implementation of a 32-bit mips processor. international journal of engineering research & technology (ijert). 2019;7(10):1-5.
image Omran ss, mahmood hs. vhdl prototyping of a 5-stages pipelined risc processor for educational purposes.
image Mahmood hs, omran ss. pipelined mips processor with cache controller using vhdl implementation for educational purposes. in2013 international conference on electrical communication, computer, power, and control engineering (iceccpce) 2013 dec 17 (pp. 82-87). ieee.
image Alphonso cp, mascarenhas m. multi-mode data security for secret communication.
image Bouchane m, tarhda m, hlou l. enhanced color image method for watermarking in rgb space using lsb substitution. inproceedings of the mediterranean conference on information & communication technologies 2015 2016 (pp. 157-164). springer, cham.
image Rughani p, pandya h. steganography in java supported mobile phones. international journal of computer information systems. 2012;5(5):18-48.
image Bandhyopadhyay a, dey d, pal rk, maji ak. an indirect addressing image steganographic scheme using 9× 9 sudoku matrix. inproceedings of the international conference on computing and communication systems 2018 (pp. 689-703). springer, singapore.
image Malathi m, rahul m, kumar ns, thamaraiselvan r. enhanced image steganography using aes & spiht compression. in2017 international conference on innovations in information, embedded and communication systems (iciiecs) 2017 mar 17 (pp. 1-5). ieee.
image Senarathne a, de zoysa k. ilsb: indexing with least significant bit algorithm for effective data hiding. international journal of computer applications. 2014 may 26;161.
image Siahaan ap, rahim r, aryza s, lubis ah. comparison between dynamic and static blocks in sequitur algorithm algorithm.
image Borse d, patil s. review and analysis of multifarious spatial domain steganography techniques. international journal of engineering research and technology. 2015 jan;4.
image Patil sd, bhendwade ps, patil rt. steganographic secure data communication. in2014 international conference on communication and signal processing 2014 apr 3 (pp. 953-956). ieee.
image Yeap kh. design of a keyless coded home lock system using verilog hardware description language. international journal of electronics, computer and communications technologies. 2012 oct 1;3(1):10-6.
image Job d, paul v. image steganography technique using sudoku puzzle and ecc algorithm for secured data transmission. journal of theoretical & applied information technology. 2014 aug 20;66(1).
image Punitha k, murugan a. a novel algorithm for dna sequence compression. inemerging research in computing, information, communication and applications 2019 (pp. 151-159). springer, singapore.
image Wani sa, saif sm. a unified approach to integrate various public modules to produce better and reliable e-governance working framework‖. international journal of computer application.(1).
image Saif sm, wani sa, maheswran m, khan sa. a network engineering solution for data sharing across healthcare providers and protects patients health data privacy using ehr system. journal of global research in computer science. 2011 sep 17;2(8):67-72.
image Anand k, sharma er. comparison of lsb and msb based image steganography. international journal of advanced research in computer science and software engineering. 2014 aug;4(8):906-9.
image Adhikary k, bhushan s, kumar s, dutta k. hybrid algorithm to detect ddos attacks in vanets. wireless personal communications. 2020 oct;114(4):3613-34.
image Job d, paul v. an efficient video steganography technique for secured data transmission. in2016 international conference on data mining and advanced computing (sapience) 2016 mar 16 (pp. 298-305). ieee.