ISSN: 2229-371X
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world. Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Total published articles |
27 | 41 | 28 | 16 | 17 | 20 | 20 | 8 | 4 | 20 | 47 | 132 | 167 | 182 |
Research, Review articles and Editorials |
5 | 11 | 11 | 13 | 0 | 0 | 0 | 0 | 4 | 12 | 47 | 129 | 156 | 182 |
Research communications, Review communications, Editorial communications, Case reports and Commentary |
21 | 26 | 18 | 3 | 17 | 20 | 20 | 8 | 0 | 8 | 0 | 0 | 0 | 0 |
Conference proceedings |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Citations received as per Google Scholar, other indexing platforms and portals |
202 | 297 | 357 | 355 | 362 | 378 | 415 | 432 | 431 | 353 | 276 | 174 | 112 | 52 |
Journal total citations count | 3761 |
Journal impact factor | 14.81 |
Journal 5 years impact factor | 17.33 |
Journal cite score | 16.70 |
Journal h-index | 30 |
Journal h-index since 2019 | 19 |
Journal Impact Factor 2020 formula |
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)} Y= Year |
Journal 5-year Impact Factor 2020 formula |
Citations(2018 + 2019 + 2020 + 2021 + 2022)/ {Published articles(2018 + 2019 + 2020 + 2021 + 2022)} |
Journal citescore |
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3 |
Berhanu ya. dynamic time quantum based round robin cpu scheduling algorithm.
|
|
Muraleedharan a, antony n, nandakumar r. dynamic time slice round robin scheduling algorithm with unknown burst time. indian journal of science and technology. 2016 mar 9;9(8):16.
|
|
Ghosh p, thakor v. optimization of hybrid encryption algorithm for secure communication system. inthird international congress on information and communication technology 2019 (pp. 973-981). springer, singapore.
|
|
Zouaoui s, boussaid l, mtibaa a. priority based round robin (pbrr) cpu scheduling algorithm. international journal of electrical & computer engineering (2088-8708). 2019 feb 1;9(1).
|
|
Verma p, gaba gs. coherent caesar cipher for resource constrained devices. international journal of security and its applications. 2016 may 1;10(5):327-36.
|
|
Abdulrahim a, abdullahi se, sahalu jb. a new improved round robin (nirr) cpu scheduling algorithm. international journal of computer applications. 2014 jan 1;90(4).
|
|
Srikantaswamy sg, phaneendra dh. improved caesar cipher with random number generation technique and multistage encryption. international journal on cryptography and information security (ijcis). 2012 dec;2(4):39-49.
|
|
Mishra mk, rashid f. an improved round robin cpu scheduling algorithm with varying time quantum. international journal of computer science, engineering and applications. 2014 aug 1;4(4):1.
|
|
Balkrishan j, singh ap. concealing data in a digital image with multilayer security. multimedia tools and applications. 2016 jun;75(12):7045-63.
|
|
Soria-lorente a, berres s. a secure steganographic algorithm based on frequency domain for the transmission of hidden information. security and communication networks. 2017 mar 1;2017.
|
|
Al-otaibi na, gutub aa. flexible stego-system for hiding text in images of personal computers based on user security priority. inproceedings of 2014 international conference on advanced engineering technologies (aet-2014) 2014 dec 25 (pp. 250-256).
|
|
Thivya af, tharcis p. secrecy preserving discovery of subtle statistic.
|
|
Babu s, aswini v. data leakage detection in network using the passive ip trace back (pit) technique.
|
|
Al-otaibi na, gutub aa. 2-leyer security system for hiding sensitive text data on personal computers. lecture notes on information theory. 2014 jun;2(2):151-7.
|
|
Kumar m, pandey s, jaiswal kl. unsupervised region growing multi objective genetic algorithm for image segmentation. international journal. 2014 oct;2(10).
|
|
Li j, ge q, wu j, li y, yang x, ma z. research and implementation of a distributed transaction processing middleware. future generation computer systems. 2017 sep 1;74:232-40.
|
|
Radwan t, azer m, abdelbaki n. towards efficient and secure cloud. in2013 third international conference on advances in computing and communications 2013 aug 29 (pp. 134-140). ieee.
|
|
Ghosh p, roy tk. role of distance metric in goal geometric programming problem (g^ 2 p^ 2) under imprecise environment. international journal of fuzzy system applications (ijfsa). 2019 jan 1;8(1):65-82.
|
|
Autor p, autor p. datenverluste und störfälle im cloud computing: eine quantitative analyse von service level agreements, störereignissen und reaktionen der nutzer.
|
|
Ghosh p, roy tk. intuitionistic fuzzy goal geometric programming problem. notes on intuitionistic fuzzy sets. 2014;20(1):63-78.
|
|