All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Tyamanavar v, nidagundi j. fpga implementation of a 32-bit mips processor. international journal of engineering research & technology (ijert). 2019;7(10):1-5.
Omran ss, mahmood hs. vhdl prototyping of a 5-stages pipelined risc processor for educational purposes.
Mahmood hs, omran ss. pipelined mips processor with cache controller using vhdl implementation for educational purposes. in2013 international conference on electrical communication, computer, power, and control engineering (iceccpce) 2013 dec 17 (pp. 82-87). ieee.
Alphonso cp, mascarenhas m. multi-mode data security for secret communication.
Bouchane m, tarhda m, hlou l. enhanced color image method for watermarking in rgb space using lsb substitution. inproceedings of the mediterranean conference on information & communication technologies 2015 2016 (pp. 157-164). springer, cham.
Rughani p, pandya h. steganography in java supported mobile phones. international journal of computer information systems. 2012;5(5):18-48.
Bandhyopadhyay a, dey d, pal rk, maji ak. an indirect addressing image steganographic scheme using 9× 9 sudoku matrix. inproceedings of the international conference on computing and communication systems 2018 (pp. 689-703). springer, singapore.
Malathi m, rahul m, kumar ns, thamaraiselvan r. enhanced image steganography using aes & spiht compression. in2017 international conference on innovations in information, embedded and communication systems (iciiecs) 2017 mar 17 (pp. 1-5). ieee.
Senarathne a, de zoysa k. ilsb: indexing with least significant bit algorithm for effective data hiding. international journal of computer applications. 2014 may 26;161.
Siahaan ap, rahim r, aryza s, lubis ah. comparison between dynamic and static blocks in sequitur algorithm algorithm.
Borse d, patil s. review and analysis of multifarious spatial domain steganography techniques. international journal of engineering research and technology. 2015 jan;4.
Patil sd, bhendwade ps, patil rt. steganographic secure data communication. in2014 international conference on communication and signal processing 2014 apr 3 (pp. 953-956). ieee.
Yeap kh. design of a keyless coded home lock system using verilog hardware description language. international journal of electronics, computer and communications technologies. 2012 oct 1;3(1):10-6.
Job d, paul v. image steganography technique using sudoku puzzle and ecc algorithm for secured data transmission. journal of theoretical & applied information technology. 2014 aug 20;66(1).
Punitha k, murugan a. a novel algorithm for dna sequence compression. inemerging research in computing, information, communication and applications 2019 (pp. 151-159). springer, singapore.
Wani sa, saif sm. a unified approach to integrate various public modules to produce better and reliable e-governance working frameworkââ¬â. international journal of computer application.(1).
Saif sm, wani sa, maheswran m, khan sa. a network engineering solution for data sharing across healthcare providers and protects patients health data privacy using ehr system. journal of global research in computer science. 2011 sep 17;2(8):67-72.
Anand k, sharma er. comparison of lsb and msb based image steganography. international journal of advanced research in computer science and software engineering. 2014 aug;4(8):906-9.
Adhikary k, bhushan s, kumar s, dutta k. hybrid algorithm to detect ddos attacks in vanets. wireless personal communications. 2020 oct;114(4):3613-34.
Job d, paul v. an efficient video steganography technique for secured data transmission. in2016 international conference on data mining and advanced computing (sapience) 2016 mar 16 (pp. 298-305). ieee.