ISSN: 2229-371X
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world. Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Total published articles |
27 | 41 | 28 | 16 | 17 | 20 | 20 | 8 | 4 | 20 | 47 | 132 | 167 | 182 |
Research, Review articles and Editorials |
5 | 11 | 11 | 13 | 0 | 0 | 0 | 0 | 4 | 12 | 47 | 129 | 156 | 182 |
Research communications, Review communications, Editorial communications, Case reports and Commentary |
21 | 26 | 18 | 3 | 17 | 20 | 20 | 8 | 0 | 8 | 0 | 0 | 0 | 0 |
Conference proceedings |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Citations received as per Google Scholar, other indexing platforms and portals |
202 | 297 | 357 | 355 | 362 | 378 | 415 | 432 | 431 | 353 | 276 | 174 | 112 | 52 |
Journal total citations count | 3761 |
Journal impact factor | 14.81 |
Journal 5 years impact factor | 17.33 |
Journal cite score | 16.70 |
Journal h-index | 30 |
Journal h-index since 2019 | 19 |
Journal Impact Factor 2020 formula |
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)} Y= Year |
Journal 5-year Impact Factor 2020 formula |
Citations(2018 + 2019 + 2020 + 2021 + 2022)/ {Published articles(2018 + 2019 + 2020 + 2021 + 2022)} |
Journal citescore |
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3 |
Anjum h, babar mi, jehanzeb m, khan m, chaudhry s, sultana s, shahid z, zeshan f, bhatti sn. a comparative analysis of quality assurance of mobile applications using automated testing tools. international journal of advanced computer science and applications. 2017 jul 1;8(7):249-55.
|
|
Pooja r, urs bp, apoorva p. access control with anonymous authentication of data stored in clouds using abe algorithm. in2017 international conference on communication and signal processing (iccsp) 2017 apr 6 (pp. 0909-0912). ieee.
|
|
Sneha k, malle gm. research on software testing techniques and software automation testing tools. in2017 international conference on energy, communication, data analytics and soft computing (icecds) 2017 aug 1 (pp. 77-81). ieee.
|
|
Shabir my, iqbal a, mahmood z, ghafoor a. analysis of classical encryption techniques in cloud computing. tsinghua science and technology. 2016 feb 4;21(1):102-13.
|
|
Elbagir fa, khalid a, khanfar k. a survey of commit protocols in distributed real time database systems. international journal of emerging trends & technology in computer science. 2016;31(2):61-6.
|
|
Tessier rg. application of hypervalent iodine reagents for novel cysteine labeling. epfl; 2019.
|
|
Mishra jh. performance analysis of some neural network algorithms using nsl-kdd dataset.
|
|
Tayal s, garg pk, vijay s. optimization models for selecting base station sites for cellular network planning. inapplications of geomatics in civil engineering 2020 (pp. 637-647). springer, singapore.
|
|
Chawla j, kumari s. performance evaluation of droptail and random early detection. international research journal of engineering and technology. 2016;3(5):721-7.
|
|
Sarkar mj. use of cloud computing in the field of library and information science.
|
|
Iqbal m, munggaran lc. backup strategy for it disaster recovery plan using active data guard and netbackup.
|
|
Patil mn, nemade mu. content-based audio classification using segmentation, mfcc feature extraction and neural network approach. inieee proceedings of international conference on electrical, electronics, computers, communication, mechanical and computing (eeccmc) 2018 jan (pp. 310-316).
|
|
Iqbal m, munggaran lc. backup strategy for it disaster recovery plan using active data guard and netbackup.
|
|
Nasurudeen tf, shukla vk, gupta s. automation of disaster recovery and security in cloud computing. in2021 international conference on communication information and computing technology (iccict) 2021 jun 25 (pp. 1-6). ieee.
|
|
Ayong ah. the impact of iso9001 on service delivery at the logistics department of a brewery in gabon (doctoral dissertation, cape peninsula university of technology).
|
|
Kishore a, neelambike sm. application of radial basis function network tool for correlation of cd4+ count with plasma viral load in hiv-seropositive individuals. journal of clinical and diagnostic research: jcdr. 2016 apr;10(4):dc05.
|
|
Van laer s. supporting learners in control: investigating self-regulated learning in blended learning environments.
|
|
Sugita k, takayama k. implementation and evaluation of a scene search method for multimedia content using subtitles. artificial life and robotics. 2019 sep;24(3):404-14.
|
|
Imouokhome fa, desmond mk, osubor vi. causes of failure and breakdown of personal computers in nigeria. university of sindh journal of information and communication technology. 2018 apr 30;2(2):105-10.
|
|
Nurika o, hassan mf, zakaria n, jung lt. real throughput measurements comparison between unoptimized and optimized network cards. science international. 2016;29:87-91.
|
|