All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Ghosh p, roy tk, majumder c. optimization of industrial wastewater treatment using intuitionistic fuzzy goal geometric programming problem. fuzzy information and engineering. 2016 sep 1;8(3):329-43.
Tomar v, bhatia m. software localization kit for indian mass. in2014 ieee international symposium on signal processing and information technology (isspit) 2014 dec 15 (pp. 000247-000255). ieee.
Baggio é, valim md, barbosa sd, sasso gt, lacey g. localization of the surewash pocket® mobile health app to brazilian portuguese. revista gaúcha de enfermagem. 2020 oct 26;41.
Tomar v, bhatia m. localization of text editor using java programming. international journal of computer applications. 2014 mar;89(12):49-54.
Mpofu p, salawu a. african language use in the digital public sphere: functionality of the localised google webpage in zimbabwe. south african journal of african languages. 2020 jan 2;40(1):76-84.
Seljan s, dunÃâer i. automatic quality evaluation of machine-translated output in sociological-philosophical-spiritual domain. in2015 10th iberian conference on information systems and technologies (cisti) 2015 jun 17 (pp. 1-4). ieee.
Panditrao mm, panditrao mm, panditrao am. development of resistance to the effect of local anesthetic agents administered via various routes due to single or multiple, previous scorpion bites: a proposed hypothesis and reporting a yet unrecognized phenomenon. j anesth crit care open access. 2015;3(5):00110.
Naturu s, pulicherla y, mattigunta l, ch vr. traditional phytotherapy treatment for snake bite and scorpion sting by ethnic groups of kadapa district, andhra pradesh, india. international journal of pharmaceutical sciences review and research. 2013;20(1):64-70.
Suranse v, sawant ns, paripatyadar sv, krutha k, paingankar ms, padhye ad, bastawade db, dahanukar n. first molecular phylogeny of scorpions of the family buthidae from india. mitochondrial dna part a. 2017 jul 4;28(4):606-11.
Suranse v, sawant ns, paripatyadar sv, krutha k, paingankar ms, padhye ad, bastawade db, dahanukar n. first molecular phylogeny of scorpions of the family buthidae from india. mitochondrial dna part a. 2017 jul 4;28(4):606-11.
Bahekar s, kale r, nagpure s. a review on medicinal plants used in scorpion bite treatment in india. mintage j. pharm med sci. 2012;1(1):1-6.
Priyanka k, rao cs. a novel approach on middle attack prevention using https and ssl.
Rubasinghe id. transaction verification model for peer-to-peer service-oriented digital currency transactions based on the foundation of blockchain architecture. abc research alert. 2016 dec 31;4(3):lanka-.
Li s, li x, hao j, an b, feng z, chen k, zhang c. defending against man-in-the-middle attack in repeated games. inijcai 2017 jan 1 (pp. 3742-3748).
Albahar ma, haataja k, toivanen p. towards enhancing just works model in bluetooth pairing. international journal on information technologies & security. 2016 dec 1;8(4).
Mohammed sd, hasan tm. cryptosystems using an improving hiding technique based on latin square and magic square. indonesian journal of electrical engineering and computer science. 2020 oct;20(1):510-20.
Hussain i, pandey n, singh av, negi mc, rana a. presenting iot security based on cryptographic practices in data link layer in power generation sector. in2020 8th international conference on reliability, infocom technologies and optimization (trends and future directions)(icrito) 2020 jun 4 (pp. 1085-1088). ieee.
Sahab dm, rahma am, hasan tm. maintaining the integrity of encrypted data by using the improving hash function based on gf (????). tem journal. 2020 aug 1;9(3):1277.
Rahma am, hossen am. new variant of public key based on diffie-hellman with magic cube of six-dimensions. international journal of computer science and information security (ijcsis). 2015 oct;13(10).
Shukla vk, pandey n, ojha db. proposed model for secure snmp communication with magic square method. international journal of engineering research. 2014 may;3(5).