ISSN: 2229-371X
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world. Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Total published articles |
27 | 41 | 28 | 16 | 17 | 20 | 20 | 8 | 4 | 20 | 47 | 132 | 167 | 182 |
Research, Review articles and Editorials |
5 | 11 | 11 | 13 | 0 | 0 | 0 | 0 | 4 | 12 | 47 | 129 | 156 | 182 |
Research communications, Review communications, Editorial communications, Case reports and Commentary |
21 | 26 | 18 | 3 | 17 | 20 | 20 | 8 | 0 | 8 | 0 | 0 | 0 | 0 |
Conference proceedings |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Citations received as per Google Scholar, other indexing platforms and portals |
202 | 297 | 357 | 355 | 362 | 378 | 415 | 432 | 431 | 353 | 276 | 174 | 112 | 52 |
Journal total citations count | 3761 |
Journal impact factor | 14.81 |
Journal 5 years impact factor | 17.33 |
Journal cite score | 16.70 |
Journal h-index | 30 |
Journal h-index since 2019 | 19 |
Journal Impact Factor 2020 formula |
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)} Y= Year |
Journal 5-year Impact Factor 2020 formula |
Citations(2018 + 2019 + 2020 + 2021 + 2022)/ {Published articles(2018 + 2019 + 2020 + 2021 + 2022)} |
Journal citescore |
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3 |
Sharma g, pandey n, hussain i, kathri sk. design of framework and analysis of internet of things at data link layer. in2017 2nd international conference on telecommunication and networks (tel-net) 2017 aug 10 (pp. 1-4). ieee.
|
|
Dawood oa, rahma am, hossen am. generalized method for constructing magic cube by folded magic squares. international journal of intelligent systems and applications. 2016;8(1):1.
|
|
Merciol f, lefèvre s. la stéganographie: une solution pour enrichir le contenu des vidéos numériques. incolloque national de la recherche en iut (cnriut) 2011 (p. 187).
|
|
Bae h, min s, choi hs, yoon s. dna privacy: analyzing malicious dna sequences using deep neural networks. gene. 2020 aug 18;5:3.
|
|
Prakash kj, sivakumar p. memetic algorithm based on hill climbing algorithm for ic partitioning.
|
|
Singh p, yadav p. secure transmission of information by lsb encoding technique using audio steganography and cryptography.
|
|
Manikandan r, sekar k, hariharan k. a broad review on various vlsi cad algorithms for circuit partitioning problems.
|
|
Hussain hs, aljunid sa, yahya s, ali fh. a critical review of soft computing image information hiding.
|
|
Nayak s, panda m. vlsi cell partitioning using data mining approaches.
|
|
Ibrahim ab, pramukantoro es. desain dan implementasi in-network caching pada content centric networking menggunakan ccn-lite dengan simulator omnet+. jurnal pengembangan teknologi informasi dan ilmu komputer e-issn.;2548:964x.
|
|
Bandyopadhyay sk, dutta b, majumdar a, bhowmick s. hide text within an audio clip. journal of current computer science and technology. 2011;1(6):305-15.
|
|
Ibrahim ab, pramukantoro es. desain dan implementasi in-network caching pada content centric networking menggunakan ccn-lite dengan simulator omnet+. jurnal pengembangan teknologi informasi dan ilmu komputer e-issn.;2548:964x.
|
|
Shinde a, chaware sm. content centric networks (ccn): a survey. in2018 2nd international conference on i-smac (iot in social, mobile, analytics and cloud)(i-smac) i-smac (iot in social, mobile, analytics and cloud)(i-smac), 2018 2nd international conference on 2018 aug 30 (pp. 595-598). ieee.
|
|
Kaur m, sharma vk. encryption based lsb steganography technique for digital images and text data. international journal of computer science and network security (ijcsns). 2016 sep 1;16(9):90.
|
|
Meligy am, nasef mm, eid ft. a hybrid technique for enhancing the efficiency of audio steganography. international journal of image, graphics and signal processing. 2016;8(1):36.
|
|
Achuthshankar a, achuthshankar a, arjun kp, sreenarayanan nm. encryption of reversible data hiding for better visibility and high security. procedia technology. 2016 jan 1;25:216-23.
|
|
Alkorbi h, alataby a, altaee m, alnuaimy w. highly efficient image steganography using haar dwt for hiding miscellaneous data. jordanian journal of computers and information technology. 2016;2(1):17-.
|
|
Ahmadizadeh e, aghasian e, taheri hp, nejad rf. an automated model to detect fake profiles and botnets in online social networks using steganography technique. iosr journal of computer engineering (iosr-jce). 2015;17(1):65-71.
|
|
Urs pn, pooja r, apoorva p. comparitive study on existing and proposed system of access control with anonymous authentication of da ta stored. in2017 international conference on intelligent computing and control (i2c2) 2017 jun 23 (pp. 1-5). ieee.
|
|
Salah hj, rimiru rm, kimwele mw. an alternative model to overcoming two phase commit blocking problem. international journal of computer (ijc). 2017;26(1):71-88.
|
|