All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Journal of Global Research in Computer Sciences : Citations & Metrics Report

Important citations (766)
image Berhanu ya. dynamic time quantum based round robin cpu scheduling algorithm.
image Muraleedharan a, antony n, nandakumar r. dynamic time slice round robin scheduling algorithm with unknown burst time. indian journal of science and technology. 2016 mar 9;9(8):16.
image Ghosh p, thakor v. optimization of hybrid encryption algorithm for secure communication system. inthird international congress on information and communication technology 2019 (pp. 973-981). springer, singapore.
image Zouaoui s, boussaid l, mtibaa a. priority based round robin (pbrr) cpu scheduling algorithm. international journal of electrical & computer engineering (2088-8708). 2019 feb 1;9(1).
image Verma p, gaba gs. coherent caesar cipher for resource constrained devices. international journal of security and its applications. 2016 may 1;10(5):327-36.
image Abdulrahim a, abdullahi se, sahalu jb. a new improved round robin (nirr) cpu scheduling algorithm. international journal of computer applications. 2014 jan 1;90(4).
image Srikantaswamy sg, phaneendra dh. improved caesar cipher with random number generation technique and multistage encryption. international journal on cryptography and information security (ijcis). 2012 dec;2(4):39-49.
image Mishra mk, rashid f. an improved round robin cpu scheduling algorithm with varying time quantum. international journal of computer science, engineering and applications. 2014 aug 1;4(4):1.
image Balkrishan j, singh ap. concealing data in a digital image with multilayer security. multimedia tools and applications. 2016 jun;75(12):7045-63.
image Soria-lorente a, berres s. a secure steganographic algorithm based on frequency domain for the transmission of hidden information. security and communication networks. 2017 mar 1;2017.
image Al-otaibi na, gutub aa. flexible stego-system for hiding text in images of personal computers based on user security priority. inproceedings of 2014 international conference on advanced engineering technologies (aet-2014) 2014 dec 25 (pp. 250-256).
image Thivya af, tharcis p. secrecy preserving discovery of subtle statistic.
image Babu s, aswini v. data leakage detection in network using the passive ip trace back (pit) technique.
image Al-otaibi na, gutub aa. 2-leyer security system for hiding sensitive text data on personal computers. lecture notes on information theory. 2014 jun;2(2):151-7.
image Kumar m, pandey s, jaiswal kl. unsupervised region growing multi objective genetic algorithm for image segmentation. international journal. 2014 oct;2(10).
image Li j, ge q, wu j, li y, yang x, ma z. research and implementation of a distributed transaction processing middleware. future generation computer systems. 2017 sep 1;74:232-40.
image Radwan t, azer m, abdelbaki n. towards efficient and secure cloud. in2013 third international conference on advances in computing and communications 2013 aug 29 (pp. 134-140). ieee.
image Ghosh p, roy tk. role of distance metric in goal geometric programming problem (g^ 2 p^ 2) under imprecise environment. international journal of fuzzy system applications (ijfsa). 2019 jan 1;8(1):65-82.
image Autor p, autor p. datenverluste und störfälle im cloud computing: eine quantitative analyse von service level agreements, störereignissen und reaktionen der nutzer.
image Ghosh p, roy tk. intuitionistic fuzzy goal geometric programming problem. notes on intuitionistic fuzzy sets. 2014;20(1):63-78.