All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Journal of Global Research in Computer Sciences : Citations & Metrics Report

Important citations (766)
image Mohammed rt, yaakob r, zaidan aa, sharef nm, abdullah rh, zaidan bb, dawood ka. review of the research landscape of multi-criteria evaluation and benchmarking processes for many-objective optimization methods: coherent taxonomy, challenges and recommended solution. international journal of information technology & decision making. 2020 nov 17;19(06):1619-93.
image Mardani a, zavadskas ek, streimikiene d, jusoh a, nor km, khoshnoudi m. using fuzzy multiple criteria decision making approaches for evaluating energy saving technologies and solutions in five star hotels: a new hierarchical framework. energy. 2016 dec 15;117:131-48.
image El-sayed hh. shortest paths routing problem in manets. appl. math. 2016;10(5):1885-91.
image Uppari dj. a novel review on biometric system based on digital signal processing.
image Khan sa, usman m, riaz n. face recognition via optimized features fusion. journal of intelligent & fuzzy systems. 2015 jan 1;28(4):1819-28.
image Parashar n, vatsa ak. novel architecture of adaptive and optimized policy based handover in manet. incomputer networks & communications (netcom) 2013 (pp. 653-664). springer, new york, ny.
image Parashar n. an optimized mechanism for adaptive and dynamic policy based handover in clustered manet.
image Kulkarni sb, yuvaraju bn. challenges and issues of cluster based security in manet. iosr j. comput. eng. 2016 jul;18:1-5.
image Purboyo tw, kuspriyanto a. framework for analysis a network vulnerability. international journal of emerging trends & technology in computer science. 2013 jul;2(4).
image Purboyo tw. new non path metrics for evaluating network security based on vulnerability. international journal of computer science issues (ijcsi). 2012 jul 1;9(4):487.
image Purboyo tw, rahardjo b. some framework, architecture and approach for analysis a network vulnerability. in2012 international conference on system engineering and technology (icset) 2012 sep 11 (pp. 1-4). ieee.
image Shukla pk, bhatele kr. security in ad-hoc networks (manets). innext generation wireless network security and privacy 2015 (pp. 286-312). igi global.
image Delmotte a, tanaka k, kubo h, funatomi t, mukaigawa y. blind watermarking for 3-d printed objects by locally modifying layer thickness. ieee transactions on multimedia. 2019 dec 25;22(11):2780-91.
image Rufa sm. bacterial load of the surface of some selected automated teller machines (atms) in kano metropolis, nigeria. bayero journal of pure and applied sciences. 2019;12(1):76-9.
image John ou, asuquo ce, akpan mm. bacteriological assessment of automated teller and point of sales machine user interface in uyo metropolis, nigeria.
image Tamgale sb, kothawade sn. application of deep convolutional neural network to prevent atm fraud by facial disguise identification. in2017 ieee international conference on computational intelligence and computing research (iccic) 2017 dec 14 (pp. 1-5). ieee.
image Osarenmwinda o, blessing oo. quantification, variability assessment of bacterial pollution and public health hazards linked to users of automated teller machines in ekpoma, edo state-nigeria. biotechnology. 2020 mar 3;5(1):34-40.
image Okunye ol, kotun bc, kolade-titilayo t. bacterial colonization on automated teller machines from selected local government areas in ibadan, oyo state. annals of health research. 2020 mar 28;6(1):59-66.
image Zadig sm. understanding the impact of hacker innovation upon is security countermeasures (doctoral dissertation, nova southeastern university).
image Tripathi v, gangodkar d, latta v, mittal a. robust abnormal event recognition via motion and shape analysis at atm installations. journal of electrical and computer engineering. 2015 jan 1;2015.