All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Berhanu ya. dynamic time quantum based round robin cpu scheduling algorithm.
Muraleedharan a, antony n, nandakumar r. dynamic time slice round robin scheduling algorithm with unknown burst time. indian journal of science and technology. 2016 mar 9;9(8):16.
Ghosh p, thakor v. optimization of hybrid encryption algorithm for secure communication system. inthird international congress on information and communication technology 2019 (pp. 973-981). springer, singapore.
Zouaoui s, boussaid l, mtibaa a. priority based round robin (pbrr) cpu scheduling algorithm. international journal of electrical & computer engineering (2088-8708). 2019 feb 1;9(1).
Verma p, gaba gs. coherent caesar cipher for resource constrained devices. international journal of security and its applications. 2016 may 1;10(5):327-36.
Abdulrahim a, abdullahi se, sahalu jb. a new improved round robin (nirr) cpu scheduling algorithm. international journal of computer applications. 2014 jan 1;90(4).
Srikantaswamy sg, phaneendra dh. improved caesar cipher with random number generation technique and multistage encryption. international journal on cryptography and information security (ijcis). 2012 dec;2(4):39-49.
Mishra mk, rashid f. an improved round robin cpu scheduling algorithm with varying time quantum. international journal of computer science, engineering and applications. 2014 aug 1;4(4):1.
Balkrishan j, singh ap. concealing data in a digital image with multilayer security. multimedia tools and applications. 2016 jun;75(12):7045-63.
Soria-lorente a, berres s. a secure steganographic algorithm based on frequency domain for the transmission of hidden information. security and communication networks. 2017 mar 1;2017.
Al-otaibi na, gutub aa. flexible stego-system for hiding text in images of personal computers based on user security priority. inproceedings of 2014 international conference on advanced engineering technologies (aet-2014) 2014 dec 25 (pp. 250-256).
Thivya af, tharcis p. secrecy preserving discovery of subtle statistic.
Babu s, aswini v. data leakage detection in network using the passive ip trace back (pit) technique.
Al-otaibi na, gutub aa. 2-leyer security system for hiding sensitive text data on personal computers. lecture notes on information theory. 2014 jun;2(2):151-7.
Kumar m, pandey s, jaiswal kl. unsupervised region growing multi objective genetic algorithm for image segmentation. international journal. 2014 oct;2(10).
Li j, ge q, wu j, li y, yang x, ma z. research and implementation of a distributed transaction processing middleware. future generation computer systems. 2017 sep 1;74:232-40.
Radwan t, azer m, abdelbaki n. towards efficient and secure cloud. in2013 third international conference on advances in computing and communications 2013 aug 29 (pp. 134-140). ieee.
Ghosh p, roy tk. role of distance metric in goal geometric programming problem (g^ 2 p^ 2) under imprecise environment. international journal of fuzzy system applications (ijfsa). 2019 jan 1;8(1):65-82.
Autor p, autor p. datenverluste und störfälle im cloud computing: eine quantitative analyse von service level agreements, störereignissen und reaktionen der nutzer.
Ghosh p, roy tk. intuitionistic fuzzy goal geometric programming problem. notes on intuitionistic fuzzy sets. 2014;20(1):63-78.