All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Sharma g, pandey n, hussain i, kathri sk. design of framework and analysis of internet of things at data link layer. in2017 2nd international conference on telecommunication and networks (tel-net) 2017 aug 10 (pp. 1-4). ieee.
Dawood oa, rahma am, hossen am. generalized method for constructing magic cube by folded magic squares. international journal of intelligent systems and applications. 2016;8(1):1.
Merciol f, lefèvre s. la stéganographie: une solution pour enrichir le contenu des vidéos numériques. incolloque national de la recherche en iut (cnriut) 2011 (p. 187).
Bae h, min s, choi hs, yoon s. dna privacy: analyzing malicious dna sequences using deep neural networks. gene. 2020 aug 18;5:3.
Prakash kj, sivakumar p. memetic algorithm based on hill climbing algorithm for ic partitioning.
Singh p, yadav p. secure transmission of information by lsb encoding technique using audio steganography and cryptography.
Manikandan r, sekar k, hariharan k. a broad review on various vlsi cad algorithms for circuit partitioning problems.
Hussain hs, aljunid sa, yahya s, ali fh. a critical review of soft computing image information hiding.
Nayak s, panda m. vlsi cell partitioning using data mining approaches.
Ibrahim ab, pramukantoro es. desain dan implementasi in-network caching pada content centric networking menggunakan ccn-lite dengan simulator omnet+. jurnal pengembangan teknologi informasi dan ilmu komputer e-issn.;2548:964x.
Bandyopadhyay sk, dutta b, majumdar a, bhowmick s. hide text within an audio clip. journal of current computer science and technology. 2011;1(6):305-15.
Ibrahim ab, pramukantoro es. desain dan implementasi in-network caching pada content centric networking menggunakan ccn-lite dengan simulator omnet+. jurnal pengembangan teknologi informasi dan ilmu komputer e-issn.;2548:964x.
Shinde a, chaware sm. content centric networks (ccn): a survey. in2018 2nd international conference on i-smac (iot in social, mobile, analytics and cloud)(i-smac) i-smac (iot in social, mobile, analytics and cloud)(i-smac), 2018 2nd international conference on 2018 aug 30 (pp. 595-598). ieee.
Kaur m, sharma vk. encryption based lsb steganography technique for digital images and text data. international journal of computer science and network security (ijcsns). 2016 sep 1;16(9):90.
Meligy am, nasef mm, eid ft. a hybrid technique for enhancing the efficiency of audio steganography. international journal of image, graphics and signal processing. 2016;8(1):36.
Achuthshankar a, achuthshankar a, arjun kp, sreenarayanan nm. encryption of reversible data hiding for better visibility and high security. procedia technology. 2016 jan 1;25:216-23.
Alkorbi h, alataby a, altaee m, alnuaimy w. highly efficient image steganography using haar dwt for hiding miscellaneous data. jordanian journal of computers and information technology. 2016;2(1):17-.
Ahmadizadeh e, aghasian e, taheri hp, nejad rf. an automated model to detect fake profiles and botnets in online social networks using steganography technique. iosr journal of computer engineering (iosr-jce). 2015;17(1):65-71.
Urs pn, pooja r, apoorva p. comparitive study on existing and proposed system of access control with anonymous authentication of da ta stored. in2017 international conference on intelligent computing and control (i2c2) 2017 jun 23 (pp. 1-5). ieee.
Salah hj, rimiru rm, kimwele mw. an alternative model to overcoming two phase commit blocking problem. international journal of computer (ijc). 2017;26(1):71-88.