All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Almotiri sh. integrated fuzzy based computational mechanism for the selection of effective malicious traffic detection approach. ieee access. 2021 jan 8;9:10751-64.
Bianchi aj. processamento de áudio em tempo real em plataformas computacionais de alta disponibilidade e baixo custo (doctoral dissertation, universidade de sao paulo).
Alojaiman b. toward selection of trustworthy and efficient e-learning platform. ieee access. 2021 sep 20;9:133889-901.
Bianchi aj. processamento de áudio em tempo real em dispositivos computacionais de alta disponibilidade e baixo custo (doctoral dissertation, universidade de são paulo).
Ahmad m, al-amri jf, subahi af, khatri s, seh ah, nadeem m, agrawal a. healthcare device security assessment through computational methodology. computer systems science and engineering. 2022 jan 1;41(2):811-28.
Bianchi aj, queiroz m. on the performance of real-time dsp on android devices. inproceedings of the 9th sound and music computing conference 2012 (pp. 113-120).
Alenezi m. ontology-based context-sensitive software security knowledge management modeling. int j electr comput eng. 2020 dec;10(6):6507-20.
Kanojiya a, nagori v. analysis of architecture and forms of outputs of decision support systems implemented for different domains. in2018 second international conference on inventive communication and computational technologies (icicct) 2018 apr 20 (pp. 346-350). ieee.
Rizvi s, mitchell j, showan n. analysis of security vulnerabilities and threat assessment in cognitive radio (cr) networks. in2014 ieee 8th international conference on application of information and communication technologies (aict) 2014 oct 15 (pp. 1-6). ieee.
Khan mw, pandey d, khan sa. critical review on software testing: security perspective. ininternational conference on smart trends for information technology and computer communications 2016 aug 6 (pp. 714-723). springer, singapore.
Al-zahrani fa. evaluating the usable-security of healthcare software through unified technique of fuzzy logic, anp and topsis. ieee access. 2020 jun 12;8:109905-16.
Singla r. a literature survey on mood detection system. international journal of computer science and information technologies. 2016;7(1):6-10.
Khari m, kumar p. embedding security in software development life cycle (sdlc). in2016 3rd international conference on computing for sustainable global development (indiacom) 2016 mar 16 (pp. 2182-2186). ieee.
Li s, li x, hao j, an b, feng z, chen k, zhang c. defending against man-in-the-middle attack in repeated games. inijcai 2017 jan 1 (pp. 3742-3748).
Kumar r, khan sa, khan ra. revisiting software security: durability perspective. international journal of hybrid information technology. 2015 feb;8(2):311-22.
Gulraj m, ahmad n. mood detection of psychological and mentally disturbed patients using machine learning techniques. international journal of computer science and network security (ijcsns). 2016 aug 1;16(8):63.
Gajbhiye s, karmakar s, sharma m, sharma s. bluetooth secure simple pairing with enhanced security level. journal of information security and applications. 2019 feb 1;44:170-83.
Varsha hs. a review of region growing and image segmentation techniques.
Benson cc, lajish vl, rajamani k. a novel skull stripping and enhancement algorithm for the improved brain tumor segmentation using mathematical morphology. international journal of image, graphics and signal processing. 2016 jul 1;8(7):59.
Muniyappan s, rajendran p. contrast enhancement of medical images through adaptive genetic algorithm (aga) over genetic algorithm (ga) and particle swarm optimization (pso). multimedia tools and applications. 2019 mar;78(6):6487-511.