ISSN: 2229-371X
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world. Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Total published articles |
27 | 41 | 28 | 16 | 17 | 20 | 20 | 8 | 4 | 20 | 47 | 132 | 167 | 182 |
Research, Review articles and Editorials |
5 | 11 | 11 | 13 | 0 | 0 | 0 | 0 | 4 | 12 | 47 | 129 | 156 | 182 |
Research communications, Review communications, Editorial communications, Case reports and Commentary |
21 | 26 | 18 | 3 | 17 | 20 | 20 | 8 | 0 | 8 | 0 | 0 | 0 | 0 |
Conference proceedings |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Citations received as per Google Scholar, other indexing platforms and portals |
202 | 297 | 357 | 355 | 362 | 378 | 415 | 432 | 431 | 353 | 276 | 174 | 112 | 52 |
Journal total citations count | 3761 |
Journal impact factor | 14.81 |
Journal 5 years impact factor | 17.33 |
Journal cite score | 16.70 |
Journal h-index | 30 |
Journal h-index since 2019 | 19 |
Journal Impact Factor 2020 formula |
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)} Y= Year |
Journal 5-year Impact Factor 2020 formula |
Citations(2018 + 2019 + 2020 + 2021 + 2022)/ {Published articles(2018 + 2019 + 2020 + 2021 + 2022)} |
Journal citescore |
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3 |
Almotiri sh. integrated fuzzy based computational mechanism for the selection of effective malicious traffic detection approach. ieee access. 2021 jan 8;9:10751-64.
|
|
Bianchi aj. processamento de áudio em tempo real em plataformas computacionais de alta disponibilidade e baixo custo (doctoral dissertation, universidade de sao paulo).
|
|
Alojaiman b. toward selection of trustworthy and efficient e-learning platform. ieee access. 2021 sep 20;9:133889-901.
|
|
Bianchi aj. processamento de áudio em tempo real em dispositivos computacionais de alta disponibilidade e baixo custo (doctoral dissertation, universidade de são paulo).
|
|
Ahmad m, al-amri jf, subahi af, khatri s, seh ah, nadeem m, agrawal a. healthcare device security assessment through computational methodology. computer systems science and engineering. 2022 jan 1;41(2):811-28.
|
|
Bianchi aj, queiroz m. on the performance of real-time dsp on android devices. inproceedings of the 9th sound and music computing conference 2012 (pp. 113-120).
|
|
Alenezi m. ontology-based context-sensitive software security knowledge management modeling. int j electr comput eng. 2020 dec;10(6):6507-20.
|
|
Kanojiya a, nagori v. analysis of architecture and forms of outputs of decision support systems implemented for different domains. in2018 second international conference on inventive communication and computational technologies (icicct) 2018 apr 20 (pp. 346-350). ieee.
|
|
Rizvi s, mitchell j, showan n. analysis of security vulnerabilities and threat assessment in cognitive radio (cr) networks. in2014 ieee 8th international conference on application of information and communication technologies (aict) 2014 oct 15 (pp. 1-6). ieee.
|
|
Khan mw, pandey d, khan sa. critical review on software testing: security perspective. ininternational conference on smart trends for information technology and computer communications 2016 aug 6 (pp. 714-723). springer, singapore.
|
|
Al-zahrani fa. evaluating the usable-security of healthcare software through unified technique of fuzzy logic, anp and topsis. ieee access. 2020 jun 12;8:109905-16.
|
|
Singla r. a literature survey on mood detection system. international journal of computer science and information technologies. 2016;7(1):6-10.
|
|
Khari m, kumar p. embedding security in software development life cycle (sdlc). in2016 3rd international conference on computing for sustainable global development (indiacom) 2016 mar 16 (pp. 2182-2186). ieee.
|
|
Li s, li x, hao j, an b, feng z, chen k, zhang c. defending against man-in-the-middle attack in repeated games. inijcai 2017 jan 1 (pp. 3742-3748).
|
|
Kumar r, khan sa, khan ra. revisiting software security: durability perspective. international journal of hybrid information technology. 2015 feb;8(2):311-22.
|
|
Gulraj m, ahmad n. mood detection of psychological and mentally disturbed patients using machine learning techniques. international journal of computer science and network security (ijcsns). 2016 aug 1;16(8):63.
|
|
Gajbhiye s, karmakar s, sharma m, sharma s. bluetooth secure simple pairing with enhanced security level. journal of information security and applications. 2019 feb 1;44:170-83.
|
|
Varsha hs. a review of region growing and image segmentation techniques.
|
|
Benson cc, lajish vl, rajamani k. a novel skull stripping and enhancement algorithm for the improved brain tumor segmentation using mathematical morphology. international journal of image, graphics and signal processing. 2016 jul 1;8(7):59.
|
|
Muniyappan s, rajendran p. contrast enhancement of medical images through adaptive genetic algorithm (aga) over genetic algorithm (ga) and particle swarm optimization (pso). multimedia tools and applications. 2019 mar;78(6):6487-511.
|
|