All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Patra c, nath a. green computing-new paradigm of energy efficiency and e-waste minimization-a pilot study on current trends. int j adv res comput sci manag stud. 2014 nov;2(11).
Diouani s, medromi h. green cloud computing: efficient energy-aware and dynamic resources management in data centers. international journal of advanced computer science and applications. 2018 jul 1;9(7):124-7.
Erlich z, zviran m. authentication practices from passwords to biometrics. inencyclopedia of information science and technology, third edition 2015 (pp. 4248-4257). igi global.
Wu d, lv s, jiang m, song h. using channel pruning-based yolo v4 deep learning algorithm for the real-time and accurate detection of apple flowers in natural environments. computers and electronics in agriculture. 2020 nov 1;178:105742.
Vatsal s, agarwal s. energy efficiency metrics for safeguarding the performance of data centre communication systems by green cloud solutions. in2019 international conference on cutting-edge technologies in engineering (icon-cute) 2019 nov 14 (pp. 136-140). ieee.
Balhareth h. how to foster green it in saudi arabia higher education. international journal of management research and development (ijmrd), online. 2018 may 12;7(1).
Zaheer z, khan a, umar ms, khan mh. one-tip secure: next-gen of text-based password. ininformation and communication technology for competitive strategies 2019 (pp. 235-243). springer, singapore.
Musa n, abd hamid n, ishak ms. the development of digital literacy in academic context in indonesia: literature review study. jurnal iqra': kajian ilmu pendidikan. 2021 dec 2;6(2):198-214.
Akbari m, samadzadegan f, weibel r. a generic regional spatio-temporal co-occurrence pattern mining model: a case study for air pollution. journal of geographical systems. 2015 jul;17(3):249-74.
Fatima r, siddiqui n, umar ms, khan mh. a novel text-based user authentication scheme using pseudo-dynamic password. ininformation and communication technology for competitive strategies 2019 (pp. 177-186). springer, singapore.
Santhosh tp, kumar tb, kurian mz. development of embedded software and verification for peripherals of arm7tdmi-s.
Ibrahim lm, ibrahim ka. constructing an add-in tool for enterprise architect v7. 5 to measure the quality of object oriented design (class diagram). international journal of computer science and information security. 2015 jul 1;13(7):72.
Slimeni f, scheers b, chtourou z. security threats in military cognitive radio networks. in2015 international conference on military communications and information systems (icmcis) 2015 may 18 (pp. 1-10). ieee.
Albak lh, omar al-nima rr, salih ah. palm print verification based deep learning. telkomnika. 2021 jun 1;19(3).
Siswanto a, tarigan p, fahmi f. design of contactless hand biometric system with relative geometric parameters. in2013 3rd international conference on instrumentation, communications, information technology and biomedical engineering (icici-bme) 2013 nov 7 (pp. 199-203). ieee.
Shukla vk, pandey n, ojha db. proposed model for secure snmp communication with magic square method. international journal of engineering research. 2014 may;3(5).
Siregar l. review pengujian keamanan perangkat lunak dalam software development life cycle (sdlc). journal of applied sciences, electrical engineering and computer technology. 2020 dec 31;1(3):1-1.
Venkatesan kp, vijayarangan v. secure and reliable routing in cognitive radio networks. wireless networks. 2017 aug;23(6):1689-96.
Kishor a, kurmi j. current challenges of security in cloud computing.
Manikandan v, sivaram m. international journal of advanced trends in computer science and engineering. international journal. 2019 sep;8(5).