All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Mandhare pa, kharat v, patil cy. intelligent road traffic control system for traffic congestion a perspective. international journal of computer sciences and engineering. 2018 jul 31;6(07):2018.
Japertas s, jankà «nienÃâ r. nfc vulnerabilities investigation. ininternational conference on distributed computer and communication networks 2020 sep 14 (pp. 450-463). springer, cham.
Anand k, sharma er. comparison of lsb and msb based image steganography. international journal of advanced research in computer science and software engineering. 2014 aug;4(8):906-9.
Shekhar s, ansari ma. image analysis for brain tumor detection from mri images using wavelet transform. in2018 international conference on power energy, environment and intelligent control (peeic) 2018 apr 13 (pp. 670-675). ieee.
Deb d, dutta b, roy s. a noble approach for noise removal from brain image using region filling. in2014 ieee international conference on advanced communications, control and computing technologies 2014 may 8 (pp. 1403-1406). ieee.
Budiyanti rt, herlambang pm, nandini n. tantangan etika dan hukum penggunaan rekam medis elektronik dalam era personalized medicine. jurnal kesehatan vokasional. 2019;4(1):49-54.
Cadena l, espinosa n, cadena f, korneeva a, kruglyakov a, legalov a, romanenko a, zotin a. brain's tumor image processing using shearlet transform. inapplications of digital image processing xl 2017 sep 19 (vol. 10396, p. 103961b). international society for optics and photonics.
Serna e, serna a. power and limitations of formal methods for software fabrication: thirty years later. informatica. 2017 may 9;41(3).
Devi s, makani r. encoding n-party man-in-middle attack for diffie–hellman algorithm in a client-server paradigm. ijcsit) international journal of computer science and information technologies. 2015;6(6):4860-5.
Minhas nm, qazi am, shahzadi s, ghafoor s. an integration of uml sequence diagram with formal specification methods—a formal solution based on z. journal of software engineering and applications. 2015;8(08):372.
Baravati hb, hosseinkhani j, keikhaee s, ostad m, khayat h, havasi m. a new data mining-based approach to improving the quality of alerts in intrusion detection systems. ijcsns int. j. comput. sci. netw. secur. 2017 aug 30;17(8):194-8.
Devi s, makani r. generation of n-party man-in-middle attack for diffie-hellman key exchange protocol: a review. international journal of computer science and information technologies. 2015;6(5):4281-5.
Humayoun m, qazi am. towards knowledge management in re practices to support software development. journal of software engineering and applications. 2015;8(08):407.
Ionià £ÃÆ i, ionià £ÃÆ l. an agent-based approach for building an intrusion detection system. in2013 roedunet international conference 12th edition: networking in education and research 2013 sep 26 (pp. 1-6). ieee.
Bashir n, bilal m, liaqat m, marjani m, malik n, ali m. modeling class diagram using nlp in object-oriented designing. in2021 national computing colleges conference (nccc) 2021 mar 27 (pp. 1-6). ieee.
Hatkar sp, kadam sh, syed ah. analysis of various periodicity detection algorithms in time series data with design of new algorithm. international journal of computer applications technology and research. 2014;3:229-39.
Reddy jm, prasad sv, baragada sr. international journal of engineering sciences & research technology requirement engineering: an approach to quality software development.
Usha r, perumal k. svm classification of brain images from mri scans using morphological transformation and glcm texture features. international journal of computational systems engineering. 2019;5(1):18-23.
Pai dg, pai y. analysis of the beaufort cipher expansion technique and its usage in providing data security in cloud. incyber intelligence and information retrieval 2022 (pp. 49-58). springer, singapore.
Nanda sj, gulati i, chauhan r, modi r, dhaked u. a k-means-galactic swarm optimization-based clustering algorithm with otsu’s entropy for brain tumor detection. applied artificial intelligence. 2019 jan 28;33(2):152-70.