Back to Top
Go Back
Journal Photo for International Journal of Computer Science and Engineering Research and Development
Peer reviewed only Open Access

International Journal of Computer Science and Engineering Research and Development (IJCSERD)

Publisher : PRJ Publication
Computer Science Engineering
e-ISSN 2248-9371
p-ISSN 2248-9363
Issue Frequency Monthly
Est. Year 2011
Mobile 7358634864
DOI YES
Language English
APC YES
Impact Factor Assignee Google Scholar
Email ijcserd@gmail.com

Journal Descriptions

The International Journal of Computer Science and Engineering Research and Development (IJCSERD) is a prestigious scholarly journal committed to advancing the field of computer science and engineering. Established in 2011, IJCSERD has consistently provided a platform for researchers, practitioners, and academicians to disseminate their latest findings and innovative ideas. The journal covers a broad spectrum of topics within the domain, ensuring a comprehensive repository of knowledge that addresses the diverse aspects of computer science and engineering. Published by PRJ Publication, IJCSERD adheres to rigorous peer-review standards, ensuring the publication of high-quality, original research articles, review papers, and case studies. The journal welcomes submissions that contribute to the theoretical, experimental, and applied advancements in areas including, but not limited to, artificial intelligence, machine learning, data science, software engineering, computer networks, cybersecurity, and computational theory.

International Journal of Computer Science and Engineering Research and Development (IJCSERD) is :-

  • International, Peer-Reviewed, Open Access, Refereed, Computer Science, Engineering , Online or Print , Monthly Journal

  • UGC Approved, ISSN Approved: P-ISSN P-ISSN: 2248-9363, E-ISSN: 2248-9371, Established: 2011,
  • Provides Crossref DOI
  • Not indexed in Scopus, WoS, DOAJ, PubMed, UGC CARE

Indexing

Role In Research Journal

Publications of IJCSERD

mj iaeme May, 2025
Micro Service architecture (MSA) of software development is a thing which has done wonders in scaling and making the application more modular. Nevertheless, its distributed nature creates is...
mj iaeme May, 2025
Monitoring helps in making IAM activities across through cloud and on premise more visible, with real time alerts, advanced forensic analysis and better compliance reporting. In a global ban...
mj iaeme May, 2025
With the current big data, business organization accommodate digital platform and collected enormous structured and unstructured dossier. There is significant centralized repository establis...
In this work, AI pipeline based on generative models and large language models that combine to improve early cancer detection from radiological imaging. The system fuses text and image modal...
Karthick Ramachandran February, 2025
As multi-property casinos expand across international jurisdictions, they face increasing pressure to maintain observability, enforce compliance, and share intelligence, without violating da...
Researcher v May, 2025
This paper looks into the optimisation of Order-to-Cash (O2C) cycles in SAP environments by using Robotic Process Automation (RPA) and Artificial Intelligence (AI). It allows enterprises to ...
Tim O'Brien May, 2025
In an era of increasing digital dependence, cyber threats have become more sophisticated and pervasive. Traditional security measures are no longer sufficient to combat advanced cyberattacks...
K. Mahesh April, 2011
We propose a solution to determine the optimal elastic matching of a deformable template to an image. The central idea is to cast the optimal matching of each template point to a correspondi...
Anjali B. January, 2011
Fuzzy clustering techniques are used to construct clusters with uncertain boundaries and allows that one object belongs to overlapping clusters with some membership degree. In other words, t...
Gurudatt Kulkarni November, 2012
This paper present a state of art about biometric hand, different techniques used. Biometric is essentially used to avoid risks of password easy to find or Stoll; with as slogan save Time an...