All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Puspasari s. steganography application for efficient documentation of palembang cultural objects. in2016 international conference on computer communication and informatics (iccci) 2016 jan 7 (pp. 1-5). ieee.
Job d, paul v. image steganography technique using sudoku puzzle and ecc algorithm for secured data transmission. journal of theoretical & applied information technology. 2014 aug 20;66(1).
Mishra s, dastidar a. hybrid image encryption and decryption using cryptography and watermarking technique for high security applications. in2018 international conference on current trends towards converging technologies (icctct) 2018 mar 1 (pp. 1-5). ieee.
Singhal v, yadav d, bandil dk. steganography and steganalysis: a review. international journal of electronics and computer science engineering, pp399-404. 2012.
Singh i, raina jp. advance scheme for secret data hiding system using hop field & lsb. international journal of computer trends and technology (ijctt)–volume. 2013 jul;4:16-23.
Job d, paul v. an efficient video steganography technique for secured data transmission. in2016 international conference on data mining and advanced computing (sapience) 2016 mar 16 (pp. 298-305). ieee.
Nosrati m, karimi r, nosrati h, nosrati a. taking a brief look at steganography: methods and approaches. journal of american science. 2011;7(6).
Seyyedi sa, sadykhov rk. digital image steganography concept and evaluation. international journal of computer applications. 2013 jan 1;66(5).
Tsai se, liu kc, yang sm. an efficient image watermarking method based on fast discrete cosine transform algorithm. mathematical problems in engineering. 2017 aug 16;2017.
Dutta h, das rk, nandi s, prasanna sm. an overview of digital audio steganography. iete technical review. 2020 nov 1;37(6):632-50.
Ishengoma fr. the art of data hiding with reed-solomon error correcting codes. arxiv preprint arxiv:1411.4790. 2014 nov 18.
Hamed g, marey m, el-sayed sa, tolba mf. comparative study for various dna based steganography techniques with the essential conclusions about the future research. in2016 11th international conference on computer engineering & systems (icces) 2016 dec 20 (pp. 220-225). ieee.
Nosrati m, karimi r, nosrati h, nosrati a. embedding stego-text in cover images using linked list concepts and lsb technique. journal of american science. 2011 oct;7(6):97-100.
Hariri m, karimi r, nosrati m. an introduction to steganography methods. world applied programming. 2011 aug;1(3):191-5.
Mirzaei f, faridafshin m, movafeghi a, faghihi r. automated defect detection of weldments and castings using canny, sobel and gaussian filter edge detectors: a comparison study. tehran, iran.[google scholar]. 2017.
Iqbal m, munggaran lc. backup strategy for it disaster recovery plan using active data guard and netbackup.
Triningsih a, supriyono h. aplikasi data mining berbasis web menggunakan metode k-means clustering untuk pengelompokan penjualan terlaris produk kacamata.
Govender p, sivakumar v. investigating diffuse irradiance variation under different cloud conditions in durban, using k-means clustering. journal of energy in southern africa. 2019 aug;30(3):22-32.
Sensuse di, purwandari b, rahayu p. defining e-portofolio factor for competency certification using fuzzy delphi method. turkish online journal of educational technology-tojet. 2018 apr;17(2):25-33.
Saffie na, rasmani ka. fuzzy delphi method: issues and challenges. in2016 international conference on logistics, informatics and service sciences (liss) 2016 jul 24 (pp. 1-7). ieee.