scispace - formally typeset
Search or ask a question
JournalISSN: 2229-371X

Journal of Global Research in Computer Sciences 

About: Journal of Global Research in Computer Sciences is an academic journal. The journal publishes majorly in the area(s): Encryption & Wireless sensor network. Over the lifetime, 663 publications have been published receiving 2807 citations.

Papers published on a yearly basis

Papers
More filters
Journal Article
TL;DR: The aim of this work is to provide various mobility strategies, defences and measures, control aspect, management and governance aspect to look forth in implementing a BYOD strategy in an organization.
Abstract: The growth of mobile technology, with regard to availability of 3G/4G services and devices like Smartphone’s has created new phenomenon for communication and data processing ability to do business One such phenomenon that has emerged in the business environment is BYOD (Bring Your Own Device), which means that employees use their personal device to access company resources for work, inside or outside organizational environment This new phenomenon brings with itself new opportunities but has many risks associated with it Using mobile devices for personal as well as professional work brings with itself risks that need to be mitigated The aim of this work is to provide various mobility strategies, defences and measures, control aspect, management and governance aspect to look forth in implementing a BYOD strategy in an organization

109 citations

Journal Article
TL;DR: In image processing, noise reduction and restoration of image is expected to improve the qualitative inspection of an image and the performance criteria of quantitative image analysis techniques.
Abstract: In image processing, noise reduction and restoration of image is expected to improve the qualitative inspection of an image and the performance criteria of quantitative image analysis techniques Digital image is inclined to a variety of noise which affects the quality of image. The main purpose of de-noising the image is to restore the detail of original image as much as possible. The criteria of the noise removal problem depends on the noise type by which the image is corrupting .In the field of reducing the image noise several type of linear and non linear filtering techniques have been proposed . Different approaches for reduction of noise and image enhancement have been considered, each of which has their own limitation and advantages.

84 citations

Journal Article
TL;DR: This paper provides a critical review of steganography as well as to analyze the characteristics of various cover media namely image, text, audio and video in respects of the fundamental concepts, the progress of Steganographic methods and the development of the corresponding steganalysis schemes.
Abstract: The staggering growth in communication technology and usage of public domain channels (i.e. Internet) has greatly facilitated transfer of data. However, such open communication channels have greater vulnerability to security threats causing unauthorized information access. Traditionally, encryption is used to realize the communication security. However, important information is not protected once decoded. Steganography is the art and science of communicating in a way which hides the existence of the communication. Important information is firstly hidden in a host data, such as digital image, text, video or audio, etc, and then transmitted secretly to the receiver. Steganalysis is another important topic in information hiding which is the art of detecting the presence of steganography. This paper provides a critical review of steganography as well as to analyze the characteristics of various cover media namely image, text, audio and video in respects of the fundamental concepts, the progress of steganographic methods and the development of the corresponding steganalysis schemes

80 citations

Journal Article
TL;DR: The IHS sharpening technique is one of the most commonly used techniques for sharpening. as mentioned in this paper explored different IHS transformation techniques and experiment it as IHS based image fusion.
Abstract: The IHS sharpening technique is one of the most commonly used techniques for sharpening. Different transformations have been developed to transfer a color image from the RGB space to the IHS space. Through literature, it appears that, various scientists proposed alternative IHS transformations and many papers have reported good results whereas others show bad ones as will as not those obtained which the formula of IHS transformation were used. In addition to that, many papers show different formulas of transformation matrix such as IHS transformation. This leads to confusion what is the exact formula of the IHS transformation?. Therefore, the main purpose of this work is to explore different IHS transformation techniques and experiment it as IHS based image fusion. The image fusion performance was evaluated, in this study, using various methods to estimate the quality and degree of information improvement of a fused image quantitatively.

80 citations

Journal Article
TL;DR: After improvement in Round Robin it has been found that the waiting time and turnaround time have been reduced drastically and this paper describes an improvement in RR.
Abstract: One of the most important components of the computer resource is the CPU. CPU scheduling involves a careful examination of pending processes to determine the most efficient way to service the requests. CPU scheduling is the basis of multiprogrammed operating systems. Most CPU scheduling algorithms concentrate on maximizing CPU utilization and throughput and minimizing turnaround time, waiting time, response time and number of context switching for a set of requests. Some of the popular CPU scheduling algorithms are First-Come-First-Served (FCFS), Shortest Job First (SJF), Priority Scheduling and Round Robin (RR). FCFS is the simplest form of CPU scheduling algorithm. This algorithm is simple to implement, but it generally does not provide the fastest service. Round Robin being the most popular choice in time shared system, but it may not be suitable for real time systems because of larger waiting time, turnaround time and more number of context switches. This paper describes an improvement in RR. A simulator program has been designed and tested the Improved Round Robin (IRR). After improvement in RR it has been found that the waiting time and turnaround time have been reduced drastically.

75 citations

Network Information
Related Journals (5)
International Journal of Computer Applications
26.6K papers, 157.4K citations
83% related
International Journal of Computer Theory and Engineering
1.2K papers, 10.2K citations
77% related
Journal of Computer Science
2.7K papers, 23.5K citations
74% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20211
20193
201828
201710
20166
201525