• COMPUTER

    Computing the better
    Outputs
    The World is no more about computers than astronomy is about telescopes.- Edsger W.Dijkstra Read More
  • ALGORITHM

    Describing Algorithm to bring Positive ChangeAn algorithm must be seen to be believed.
    -Donald Knuth
    Read More
  • NETWORK

    Having Strong Base and a Huge NetworkThe Internet is becoming the town square for the global village of tomorrow. -Bill Gates Read More
  • 1
  • 2
  • 3

Global Journal of Computer Science and Technology: (E) Network, Web & Security is an international journal for publishing computer science research papers. It aims to encourage and provide international publication to researchers, scientists, and engineers. We welcome original research, articles, surveys, and review papers from all over the world.

Turnaround Time

Rigorous and double blind peer review workflow and process.
Workflow Guide

Submit in any format

You can send the article in any format. Our expert executives will perform formatting task.
Author Guidelines (optional)

Print Journal

The multicolored print journal is impressed on 110 GSM paper and matt-laminated photo paper binding. After ejournal launch, innovative and eco-friendly production process, a complimentary copy is dispatched to authors within ten days.

Compatibility

3D virtual journals, eJournals, PDFs, PS, HTML and PKP Open Journal System’s XML formats are available for each article.
ComputerResearch.orgComputerResearch.org

Leadership

Global Journals Incorporated is Delaware, USA based and internationally well-established organization which is governed by ISO certified groups and accredited by the non-profit societies. Since more than a decade, thousands of universities and authors from 153 countries acknowledged and published with us.
View Specifications

Commitment to Excellence

Our inviolable and mandatory practice of thorough peer review at the heart of our scholarly publishing is to ensure that only good science is published in our refereed journal.
Workflow

Indexing and Impact

Journal is indexed/ being indexed by near about all the relevant indexing organizations with world-class standards for journal assessment to match the requirements of top universities and institutions.
View Specifications

Global Journal of Computer Science and Technology

Since 2001, Global Journal of Computer Science and Technology: (E) Network, Web & Security has been an academic, open access, peer-reviewed, interdisciplinary, refereed journal focusing on all aspects of computer science. The GJCST is superintended and sponsored by the Open Association of Research Society USA (OARS). The OARS has been esteemed internationally since 1964, aiming to highlight the research of frontiers and enhance research & development.

Tags

  • 

Publish video with us

    Publish video with us

    If a picture is worth a thousand words, then a video is worth a million. Broadcast your research in video format for free.

    Learn more & submit your Video

  • Organize conference with us

    Organize conference with us

    Let’s do big. Organize, collaborate and sponsor in upcoming seminars, seminars, symposiums, conferences, and webinars.

    Contact Evangelist

  • Access scientific community infrastructure

    Access scientific community infrastructure

    • Use our standards cloud infrastructure for carrying out research.
    • Get access to research project’s relevant sponsors.
    • Automated tools allow us to collaborate and validate your manuscript and references during the authoring process on the cloud.

    Submit your project

  • Knowledge Reservoir of Thesis and eBooks

    Knowledge Reservoir of Thesis and eBooks

    Publish your eBook, Thesis/Dissertation with us. Our open access eBooks publishing service allows authors to edit the manuscript in collaboration with us.

    Submit your Thesis Submit your Ebook

  • Subscribe Journals

    Subscribe Journals

    Institutionally branded dashboard, eJournal library IP access and mobile access available.

    Download Brochure Subscribe Journal

  • 1

Best Practices

Type of License Creative Commons
Open Access Yes
Does the author retain unrestricted copyright? Yes
Does the author retain publishing rights? Yes
Permanent article identifier DOI (Digital Object Identifier)

Read Standards

Latest eJournals of GJCST

Journal Specification

GJCST-E Volume 17

GJCST 11

ISSN Online 0975-4172
ISSN Print 0975-4350
Print Estd. 2001
DOI 10.17406/gjcst
Publishing Frequency Monthly
CODEN GJCST
Society Accreditation Yes

Journal Metrics

Recent Citations

Citation indices  All Since 2011
Citations 3804   3560
h-index 26 25
i10-index 100 93
Submit paper to GJCST

Researchers and scientists can now submit papers with ease using our special “Submit Paper” service. If you are experiencing some problem submitting your material, you can go through this link and submit a paper in a simplified manner.

Click here to “Submit” your paper.

 

Computer Science Membership (Optional)

The Global Journals Inc., as described in our Corporate Statement, is an educational, research publishing, research, and professional membership organization. Membership of FARSC and MARSC is open.

 Click here for more details

Technology and Innovation Blog of Computer Science

Recent Articles Published in GJCST-E

A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches

The world is undergoing a dramatic rapid transformation from isolated systems to ubiquitous Internet-based-enabled ‘things’ capable of interacting each other and generating data that can be analyzed to extract valuable information. This highly interconnected global network structure known as Internet of Things will enrich everyoneâ€...

Read Paper

Simultaneous Initiating EPR and Quantum Channel by Quantum Key Distribution Protocol

Cryptography is the background of protecting the flowed information between various communicated parties. Quantum cryptography gives the extreme trust to transferred information by creating a unique secret key that is based upon the law of physics. This paper will discuss a novel algorithm that is presented through quantum key distribution (QKD) pr...

Read Paper

State of the Art Survey on Session Hijacking

With the advent of online banking more and more users are willing to make purchases online and doing so flourishes the online E-Business sector ever so more. Attackers are ever so vigilant and active now on web than ever to leverage the insecure web application and database that is out there on the internet to exploit. Today’s internet as we...

Read Paper

Security Issues and Energy Consumption in Implementing Wireless Sensor Networks

The Internet has become an indispensable means of sourcing and storing information. In the future, the Internet will be used to control objects, not just information. This raises the issue of security. In the case of wireless sensor networks, the main challenge will be to provide secure lines of communication between devices on the same network....

Read Paper

Fast Dictionary Learning for Sparse Representations of Speech Signals

For dictionary-based decompositions of certain types, it has been observed that there might be a link between sparsity in the dictionary and sparsity in the decomposition. Sparsity in the dictionary has also been associated with the derivation of fast and efficient dictionary learning algorithms. Therefore, in this paper we present a greedy adaptiv...

Read Paper

ebook
 

Introducing

Global Journals eBooks

and Thesis

Publication Service

 

Articles under Review



Security Threats in Cloud Computing

Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. General example of cloud services is Google apps, provided by Google and Microsoft SharePoint. The rapid gr...

A statistical study of complex neural networks implementations in REST api.

Artificial neural networks (ANNs) or connectionist systems are computing systems inspired by the biological neural networks that constitute animal brains. Such systems learn (progressively improve performance) to do tasks by considering examples, generally without task-specific programming....

Intrusion Detection System based on Ant Colony System

Challenge of designing and building of the current Network Intrusion Detection System not only improves the ability for discriminating the improper internet behaviors, but also considers the plenty of computer resources which will be cost during the analysis of the network packets and behaviors....

Articles under Press

 

Potential of Big Data Analytics in Bio-medical and Health Care Arena: An Exploratory Study

With the leveraging emerging big Data in every industry, Big Data can amalgamate all data related to patient to get a complete view of patient to analyze and predict the outcomes. Using big data analytics as tools. It can enhance development in new drugs, health care financing process and clinical approaches and extends a lots of benefits suc...

Comparative Analysis of Multicasting Routing Protocols in Mobile Adhoc Networks

Mobile Ad-Hoc Networks (MANETs) are autonomous and decentralized wireless systems. Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. Many Routing protocols have been proposed so far ...

Design of Heterogeneous Wireless Mesh Network for LTE

Congestion in LTE and other cellular networks can be reduced by cell splitting and by buying more spectrum. But due to the heavy licensing fee and the cost of setting up new base stations, service providers have started to resort to the unlicensed spectrum, particularly the ISM band to offload some of the data from the LTE network locally, in areas...

Performance Analysis of Multiuser downlink MIMO NOMA Wireless Communication System on Color Image Transmission

In this paper, a comprehensive study has been made to evaluate the performance of 2 × 2 multiantenna configured MIMO NOMA wireless communication system. The simulated system incorporatesvarious types of signal processing techniques (Channel coding: LDPC & Convolutional, Digital modulation: QPSK, DQPSK & 4-QAM, Signal detection:ML decoding based QR...

 

Indexing Logos

index

USA Incorporation No.: 0423089 | OARS Affiliation Id: 4636/AO | USA Tax ID (Emp. ID): 098-0673227 | License No.: 42125/022010/1186 | Reg. No.: 430374 | Import-Export: 1109007027
As ISO 9001:2005 Certified Group. Global Journals Logo® is a registered trademark of Global Journals Incorporated and Global Journals Private Limited. Corporate Research Patents Pending. Copyrights © 2017 by Global Journals Creative Commons License Creative Commons License Hybrid Access Journals by Global Journals is licensed under a Creative Commons Attribution 4.0 International License.

Community Groups Computer Science

  • 1

Connect on Facebook