ISSN: 2229-371X
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world. Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2022 | 2021 | 2020 | 2019 | 2018 | |
---|---|---|---|---|---|
Year wise published articles |
28 | 16 | 17 | 20 | 20 |
Year wise citations received |
28 | 20 | 18 | 9 | 2 |
Journal total citations count | 3761 |
Journal impact factor | 14.81 |
Journal 5 years impact factor | 17.33 |
Journal cite score | 16.70 |
Journal h-index | 30 |
Journal h-index since 2018 | 19 |
Journal Impact Factor 2020 formula |
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)} Y= Year |
Journal 5-year Impact Factor 2020 formula |
Citations(2018 + 2019 + 2020 + 2021 + 2022)/ {Published articles(2018 + 2019 + 2020 + 2021 + 2022)} |
Journal citescore |
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3 |
Basu d, bose a, bhowmik s, chatterjee s, nath a. advanced feedback encryption standard version-1 (afes-1). international journal of computer applications. 2014 jan 1;103(3).
|
|
Rao as, sunitha kv. secure geographical routing in manet using the adaptive position update. international journal of advanced computer research. 2014 sep 1;4(3):785.
|
|
Nath a, bhowmik s, basu d, bose a, chatterjee s. bit level multi way feedback encryption standard version-2 (blmwfes-2). in2014 ieee international conference on advanced communications, control and computing technologies 2014 may 8 (pp. 1702-1707). ieee.
|
|
Majumdar s, maiti a, nath a. new secured steganography algorithm using encrypted secret message inside qrtm code: system implemented in android phone. in2015 international conference on computational intelligence and communication networks (cicn) 2015 dec 12 (pp. 1130-1134). ieee.
|
|
Roy a. brief comparison of rsa and diffie-hellman (public key) algorithm. accents transactions on information security. 2016;1(1).
|
|
Palati m. studies on aircell in a conservator tank. power research. 2015 dec 16;11(4):675-80.
|
|
Al-salti f, alzeidi n, arafeh b. a new multipath grid-based geographic routing protocol for underwater wireless sensor networks. in2014 international conference on cyber-enabled distributed computing and knowledge discovery 2014 oct 13 (pp. 331-336). ieee.
|
|
Chowdhury sk, sen m. attacks and mitigation techniques on mobile ad hoc network—a survey. in2017 international conference on trends in electronics and informatics (icei) 2017 may 11 (pp. 11-18). ieee.
|
|
Orrensalo t, nikou s. entrepreneurs’ information retrieval: the role of affective aspects through the media richness theory. in2021 ieee international conference on technology and entrepreneurship (icte) 2021 aug 24 (pp. 1-6). ieee.
|
|
Chowdhury sk, sen m. attacks and mitigation techniques on mobile ad hoc network—a survey. in2017 international conference on trends in electronics and informatics (icei) 2017 may 11 (pp. 11-18). ieee.
|
|
Lucero l. safe spaces in online places: social media and lgbtq youth. multicultural education review. 2017 apr 3;9(2):117-28.
|
|
Shanthi hj, anita em. secure and efficient distance effect routing algorithm for mobility (se_dream) in manets. inproceedings of the 3rd international symposium on big data and cloud computing challenges (isbcc–16’) 2016 (pp. 65-80). springer, cham.
|
|
Hanumanthsastry s, prasadababu ms. analysis & prediction of sales data in sap-erp system using clustering algorithms. arxiv e-prints. 2013 dec:arxiv-1312.
|
|
Sathiya a, selvam k. analysis of sales and distribution of an it industry using data mining techniques.
|
|
Satyanarayana s. implementation of a global bi governance structure: a case study of the business area, mining rock excavation of atlas copco.
|
|
Sulastra im, sudarma m, kumara in. pemodelan integrasi nearly real time data warehouse dengan service oriented architecture untuk menunjang sistem informasi retail. maj. ilm. teknol. elektro. 2015;14(2):11.
|
|
Sastry sh, babu p, prasada ms. analysis & prediction of sales data in sap-erp system using clustering algorithms. arxiv preprint arxiv:1312.2678. 2013 dec 10.
|
|
Sastry sh, babu p, prasada ms. implementation of crisp methodology for erp systems. arxiv preprint arxiv:1312.2065. 2013 dec 7.
|
|
Eriksson o, goldkuhl g. preconditions for public sector e-infrastructure development. information and organization. 2013 jul 1;23(3):149-76.
|
|
Gupta sk. usability models based on network artifacts for rural development. international journal of computer technology and applications. 2013 may 1;4(3):508.
|
|