ISSN: 2229-371X
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world. Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Total published articles |
27 | 41 | 28 | 16 | 17 | 20 | 20 | 8 | 4 | 20 | 47 | 132 | 167 | 182 |
Research, Review articles and Editorials |
5 | 11 | 11 | 13 | 0 | 0 | 0 | 0 | 4 | 12 | 47 | 129 | 156 | 182 |
Research communications, Review communications, Editorial communications, Case reports and Commentary |
21 | 26 | 18 | 3 | 17 | 20 | 20 | 8 | 0 | 8 | 0 | 0 | 0 | 0 |
Conference proceedings |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Citations received as per Google Scholar, other indexing platforms and portals |
202 | 297 | 357 | 355 | 362 | 378 | 415 | 432 | 431 | 353 | 276 | 174 | 112 | 52 |
Journal total citations count | 3761 |
Journal impact factor | 14.81 |
Journal 5 years impact factor | 17.33 |
Journal cite score | 16.70 |
Journal h-index | 30 |
Journal h-index since 2019 | 19 |
Journal Impact Factor 2020 formula |
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)} Y= Year |
Journal 5-year Impact Factor 2020 formula |
Citations(2018 + 2019 + 2020 + 2021 + 2022)/ {Published articles(2018 + 2019 + 2020 + 2021 + 2022)} |
Journal citescore |
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3 |
Patra c, nath a. green computing-new paradigm of energy efficiency and e-waste minimization-a pilot study on current trends. int j adv res comput sci manag stud. 2014 nov;2(11).
|
|
Diouani s, medromi h. green cloud computing: efficient energy-aware and dynamic resources management in data centers. international journal of advanced computer science and applications. 2018 jul 1;9(7):124-7.
|
|
Erlich z, zviran m. authentication practices from passwords to biometrics. inencyclopedia of information science and technology, third edition 2015 (pp. 4248-4257). igi global.
|
|
Wu d, lv s, jiang m, song h. using channel pruning-based yolo v4 deep learning algorithm for the real-time and accurate detection of apple flowers in natural environments. computers and electronics in agriculture. 2020 nov 1;178:105742.
|
|
Vatsal s, agarwal s. energy efficiency metrics for safeguarding the performance of data centre communication systems by green cloud solutions. in2019 international conference on cutting-edge technologies in engineering (icon-cute) 2019 nov 14 (pp. 136-140). ieee.
|
|
Balhareth h. how to foster green it in saudi arabia higher education. international journal of management research and development (ijmrd), online. 2018 may 12;7(1).
|
|
Zaheer z, khan a, umar ms, khan mh. one-tip secure: next-gen of text-based password. ininformation and communication technology for competitive strategies 2019 (pp. 235-243). springer, singapore.
|
|
Musa n, abd hamid n, ishak ms. the development of digital literacy in academic context in indonesia: literature review study. jurnal iqra': kajian ilmu pendidikan. 2021 dec 2;6(2):198-214.
|
|
Akbari m, samadzadegan f, weibel r. a generic regional spatio-temporal co-occurrence pattern mining model: a case study for air pollution. journal of geographical systems. 2015 jul;17(3):249-74.
|
|
Fatima r, siddiqui n, umar ms, khan mh. a novel text-based user authentication scheme using pseudo-dynamic password. ininformation and communication technology for competitive strategies 2019 (pp. 177-186). springer, singapore.
|
|
Santhosh tp, kumar tb, kurian mz. development of embedded software and verification for peripherals of arm7tdmi-s.
|
|
Ibrahim lm, ibrahim ka. constructing an add-in tool for enterprise architect v7. 5 to measure the quality of object oriented design (class diagram). international journal of computer science and information security. 2015 jul 1;13(7):72.
|
|
Slimeni f, scheers b, chtourou z. security threats in military cognitive radio networks. in2015 international conference on military communications and information systems (icmcis) 2015 may 18 (pp. 1-10). ieee.
|
|
Albak lh, omar al-nima rr, salih ah. palm print verification based deep learning. telkomnika. 2021 jun 1;19(3).
|
|
Siswanto a, tarigan p, fahmi f. design of contactless hand biometric system with relative geometric parameters. in2013 3rd international conference on instrumentation, communications, information technology and biomedical engineering (icici-bme) 2013 nov 7 (pp. 199-203). ieee.
|
|
Shukla vk, pandey n, ojha db. proposed model for secure snmp communication with magic square method. international journal of engineering research. 2014 may;3(5).
|
|
Siregar l. review pengujian keamanan perangkat lunak dalam software development life cycle (sdlc). journal of applied sciences, electrical engineering and computer technology. 2020 dec 31;1(3):1-1.
|
|
Venkatesan kp, vijayarangan v. secure and reliable routing in cognitive radio networks. wireless networks. 2017 aug;23(6):1689-96.
|
|
Kishor a, kurmi j. current challenges of security in cloud computing.
|
|
Manikandan v, sivaram m. international journal of advanced trends in computer science and engineering. international journal. 2019 sep;8(5).
|
|