All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Mohammed rt, yaakob r, zaidan aa, sharef nm, abdullah rh, zaidan bb, dawood ka. review of the research landscape of multi-criteria evaluation and benchmarking processes for many-objective optimization methods: coherent taxonomy, challenges and recommended solution. international journal of information technology & decision making. 2020 nov 17;19(06):1619-93.
Mardani a, zavadskas ek, streimikiene d, jusoh a, nor km, khoshnoudi m. using fuzzy multiple criteria decision making approaches for evaluating energy saving technologies and solutions in five star hotels: a new hierarchical framework. energy. 2016 dec 15;117:131-48.
El-sayed hh. shortest paths routing problem in manets. appl. math. 2016;10(5):1885-91.
Uppari dj. a novel review on biometric system based on digital signal processing.
Khan sa, usman m, riaz n. face recognition via optimized features fusion. journal of intelligent & fuzzy systems. 2015 jan 1;28(4):1819-28.
Parashar n, vatsa ak. novel architecture of adaptive and optimized policy based handover in manet. incomputer networks & communications (netcom) 2013 (pp. 653-664). springer, new york, ny.
Parashar n. an optimized mechanism for adaptive and dynamic policy based handover in clustered manet.
Kulkarni sb, yuvaraju bn. challenges and issues of cluster based security in manet. iosr j. comput. eng. 2016 jul;18:1-5.
Purboyo tw, kuspriyanto a. framework for analysis a network vulnerability. international journal of emerging trends & technology in computer science. 2013 jul;2(4).
Purboyo tw. new non path metrics for evaluating network security based on vulnerability. international journal of computer science issues (ijcsi). 2012 jul 1;9(4):487.
Purboyo tw, rahardjo b. some framework, architecture and approach for analysis a network vulnerability. in2012 international conference on system engineering and technology (icset) 2012 sep 11 (pp. 1-4). ieee.
Shukla pk, bhatele kr. security in ad-hoc networks (manets). innext generation wireless network security and privacy 2015 (pp. 286-312). igi global.
Delmotte a, tanaka k, kubo h, funatomi t, mukaigawa y. blind watermarking for 3-d printed objects by locally modifying layer thickness. ieee transactions on multimedia. 2019 dec 25;22(11):2780-91.
Rufa sm. bacterial load of the surface of some selected automated teller machines (atms) in kano metropolis, nigeria. bayero journal of pure and applied sciences. 2019;12(1):76-9.
John ou, asuquo ce, akpan mm. bacteriological assessment of automated teller and point of sales machine user interface in uyo metropolis, nigeria.
Tamgale sb, kothawade sn. application of deep convolutional neural network to prevent atm fraud by facial disguise identification. in2017 ieee international conference on computational intelligence and computing research (iccic) 2017 dec 14 (pp. 1-5). ieee.
Osarenmwinda o, blessing oo. quantification, variability assessment of bacterial pollution and public health hazards linked to users of automated teller machines in ekpoma, edo state-nigeria. biotechnology. 2020 mar 3;5(1):34-40.
Okunye ol, kotun bc, kolade-titilayo t. bacterial colonization on automated teller machines from selected local government areas in ibadan, oyo state. annals of health research. 2020 mar 28;6(1):59-66.
Zadig sm. understanding the impact of hacker innovation upon is security countermeasures (doctoral dissertation, nova southeastern university).
Tripathi v, gangodkar d, latta v, mittal a. robust abnormal event recognition via motion and shape analysis at atm installations. journal of electrical and computer engineering. 2015 jan 1;2015.