ISSN: 2229-371X
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world. Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Total published articles |
27 | 41 | 28 | 16 | 17 | 20 | 20 | 8 | 4 | 20 | 47 | 132 | 167 | 182 |
Research, Review articles and Editorials |
5 | 11 | 11 | 13 | 0 | 0 | 0 | 0 | 4 | 12 | 47 | 129 | 156 | 182 |
Research communications, Review communications, Editorial communications, Case reports and Commentary |
21 | 26 | 18 | 3 | 17 | 20 | 20 | 8 | 0 | 8 | 0 | 0 | 0 | 0 |
Conference proceedings |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Citations received as per Google Scholar, other indexing platforms and portals |
202 | 297 | 357 | 355 | 362 | 378 | 415 | 432 | 431 | 353 | 276 | 174 | 112 | 52 |
Journal total citations count | 3761 |
Journal impact factor | 14.81 |
Journal 5 years impact factor | 17.33 |
Journal cite score | 16.70 |
Journal h-index | 30 |
Journal h-index since 2019 | 19 |
Journal Impact Factor 2020 formula |
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)} Y= Year |
Journal 5-year Impact Factor 2020 formula |
Citations(2018 + 2019 + 2020 + 2021 + 2022)/ {Published articles(2018 + 2019 + 2020 + 2021 + 2022)} |
Journal citescore |
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3 |
Tyagi r, sharma nk, malhotra k, khosla a. comprehensive methodology for threat identification and vulnerability assessment in ad hoc networks. incyber security 2018 (pp. 335-347). springer, singapore.
|
|
Garg r. manet: enhanced lightweight sybil attack detection technique. inhandbook of research on advanced trends in microwave and communication engineering 2017 (pp. 444-476). igi global.
|
|
Pandit c, ladhe s. detecting malicious node: survey. int. journal of engineering research and applications. 2014;4(1).
|
|
Pandit cm, ladhe sa. secure routing protocol in manet using tac. in2014 first international conference on networks & soft computing (icnsc2014) 2014 aug 19 (pp. 107-112). ieee.
|
|
Sun q, hua w, tian m, wang y. a method of oversized image generation based on stitching jpeg file streams. international journal of signal processing, image processing and pattern recognition. 2015;8(8):159-68.
|
|
Park jh, lee hj, choi jh, kim sg. design and implementation of the 3d real-time monitoring video system for the smart phone.
|
|
De luca p, russiello vm, sannino rc, valente l. a study for image compression using re-pair algorithm. arxiv preprint arxiv:1901.10744. 2019 jan 30.
|
|
Sun q, xiong j, wang y. a method of image segmentation based on the jpeg file stream. journal of computational methods in sciences and engineering. 2015 jan 1;15(3):467-75.
|
|
Hammoodi as, çelebi fv. secure the supervise cluster-base for health institutions and using in remote health. journal of medical imaging and health informatics. 2020 jan 1;10(1):223-7.
|
|
Hammoodi as. a secure cluster-based wireless sensor networks applications (doctoral dissertation, ankara yñldñrñm beyazñt üniversitesi fen bilimleri enstitüsü).
|
|
Kamil bz, hameed ma, abdullah jn. using cardano's method for solving cubic equation in the cryptosystem to protect data security against cyber attack. in2020 2nd annual international conference on information and sciences (aicis) 2020 nov 24 (pp. 127-131). ieee.
|
|
Singh l, bharti rk. comparison among different cryptographic algorithms using neighborhood-generated keys. international journal of computer applications. 2013 jan 1;73(5):39-42.
|
|
Osaghae eo. replication of ciphertext in cryptographic system. journal of applied sciences and environmental management. 2018 sep 11;22(8):1193-7.
|
|
Singh hr, danewalia as, chopra d, kumar n. randomly generated algorithms and dynamic connections. international journal of scientific research in network security and communication. 2014;2(1):231-8.
|
|
Warjri j, raj eg. ked-a symmetric key algorithm for secured information exchange using modulo 69. international journal of computer network and information security. 2013 aug 1;5(10):37.
|
|
Hussain i, negi mc, pandey n. proposing an encryption/decryption scheme for iot communications using binary-bit sequence and multistage encryption. in2018 7th international conference on reliability, infocom technologies and optimization (trends and future directions)(icrito) 2018 aug 29 (pp. 709-713). ieee.
|
|
Manasrah am, alââ¬Âdin bn. mapping private keys into one public key using binary matrices and masonic cipher: caesar cipher as a case study. security and communication networks. 2016 jul 25;9(11):1450-61.
|
|
Patidar k, kumar m, kumar s. performance analysis of de over k-means proposed model of soft computing. inartificial intelligence: concepts, methodologies, tools, and applications 2017 (pp. 2294-2307). igi global.
|
|
Chiu c, shu ch. monthly car sales prediction using internet word-of-mouth (ewom). in2017 ieee international conference on innovations in intelligent systems and applications (inista) 2017 jul 3 (pp. 345-348). ieee.
|
|
Kumar i, mann m. an approach to energy diffusion in wireless sensor network.
|
|