All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Gupta sk. usability models based on network artifacts for rural development. international journal of computer technology and applications. 2013 may 1;4(3):508.
City j. research on multi-vehicle logistics ridesharing matching problem with space-time. international journal of hybrid information technology. 2016;9(7):325-36.
Derakhshan a, mikaeili m, nasrabadi am, gedeon t. network physiology of ‘fight or flight’response in facial superficial blood vessels. physiological measurement. 2019 jan 21;40(1):014002.
Zhao h, yang y. the research on two phase pickup vehicle routing based on the k-means++ and genetic algorithms. international journal of web engineering and technology. 2020;15(1):32-58.
Diwaker c, tomar p. optimization and appraisal of pso for cbs using cbse metrics. in2016 3rd international conference on computing for sustainable global development (indiacom) 2016 mar 16 (pp. 1024-1028). ieee.
Obiadazie re, okigbo ec. awareness of cloud computing services by non-science undergraduate students in anambra state. south eastern journal of research and sustainable development (sejrsd). 2021 sep 9;4(2):73-96.
Adesina ao, agbele kk, abidoye ap, nyongesa ho. text messaging and retrieval techniques for a mobile health information system. journal of information science. 2014 dec;40(6):736-48.
Mallick rk, moharana hs, pradhan s. an inspiritaonal tool for enriching contemporary higher education: cloud computing. in2018 international conference on information technology (icit) 2018 dec 19 (pp. 260-265). ieee.
Mallick rk, moharana hs, pradhan s. an inspiritaonal tool for enriching contemporary higher education: cloud computing. in2018 international conference on information technology (icit) 2018 dec 19 (pp. 260-265). ieee.
Hamoodi sa. investigative behavioral intention to knowledge acceptance and motivation in cloud computing applications. international journal of advanced computer science & applications. 2016;1(7):268-93.
Boison bt, dsane-nsoh sa, degadzor f. barriers to the adoption of cloud computing in ghana: the case of selected public tertiary institutions. international journal of computer science engineering and information technology research. 2016;6(2):29-40.
Bhateja a, mittal k. dna steganography: literature survey on its viability as a novel cryptosystem. journal of computer science and engineering research. 2015;1:8-14.
Bae h, lee b, kwon s, yoon s. dna steganalysis using deep recurrent neural networks. inbiocomputing 2019: proceedings of the pacific symposium 2018 (pp. 88-99).
Bashier e, ahmed g, othman ha, shappo r. hiding secret messages using artificial dna sequences generated by integer chaotic maps. international journal of computer applications. 2013 jan 1;70(15).
Hamed g, marey m, amin se, tolba mf. hybrid, randomized and high capacity conservative mutations dna-based steganography for large sized data. biosystems. 2018 may 1;167:47-61.
Hamed g, marey m, el-sayed sa, tolba mf. hybrid technique for steganography-based on dna with n-bits binary coding rule. in2015 7th international conference of soft computing and pattern recognition (socpar) 2015 nov 13 (pp. 95-102). ieee.
Shrivastava g, pandey a, sharma k. steganography and its technique: technical overview. inproceedings of the third international conference on trends in information, telecommunication and computing 2013 (pp. 615-620). springer, new york, ny.
Hamed g, marey m, el-sayed s, tolba f. dna based steganography: survey and analysis for parameters optimization. inapplications of intelligent optimization in biology and medicine 2016 (pp. 47-89). springer, cham.
Peer a, ponto k. evaluating perceived distance measures in room-scale spaces using consumer-grade head mounted displays. in2017 ieee symposium on 3d user interfaces (3dui) 2017 mar 18 (pp. 83-86). ieee.
Poisel r, tjoa s. forensics investigations of multimedia data: a review of the state-of-the-art. in2011 sixth international conference on it security incident management and it forensics 2011 may 10 (pp. 48-61). ieee.