All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Kumari n, yadav b. a temporal domain steganography technique based onoptimal solution using evolutionary algorithm.
Kumari n, yadav b. a temporal domain steganography technique based onoptimal solution using evolutionary algorithm.
Jyoti j, sabir m. more secured steganography model with high concealing capacity by using genetic algorithm, integer wavelet transform and opap. more secured steganography model with high concealing capacity by using genetic algorithm, integer wavelet transform and opap. 2013;1:1-5.
Khamrui a, mandal jk. a wavelet transform based image authentication approach using genetic algorithm (awtiaga). inict and critical infrastructure: proceedings of the 48th annual convention of computer society of india-vol i 2014 (pp. 251-258). springer, cham.
Pandey a, badal n. a modified circular version of playfair cipher. inproceedings of 2nd international conference on advanced computing and software engineering (icacse) 2019 mar 12.
Pandey a, badal n. a modified circular version of playfair cipher. inproceedings of 2nd international conference on advanced computing and software engineering (icacse) 2019 mar 12.
Zeeshan m, ullah s, anayat s, hussain rg, nasir n. a review study on unique way of information hiding: steganography. international journal on data science and technology. 2017;3(5):45-51.
Sabir m. genetic algorithm based image steganography for enhancement of concealing capacity and security. international journal of image, graphics and signal processing. 2013 jun 1;5(7):18.
Chaturvedi p, bairwa rk. an integer wavelet transform based steganography technique for concealing data in colored images. international journal of recent research and review. 2014 mar;7(1):49-57.
Ibanez al, djamal ec, ilyas r, najmurrokhman a. optimization of least significant bit steganography using genetic algorithm to improve data security. in2018 10th international conference on information technology and electrical engineering (icitee) 2018 jul 24 (pp. 523-528). ieee.
Nair tr. genetic algorithm to make persistent security and quality of image in steganography from rs analysis. arxiv preprint arxiv:1204.2616. 2012 apr 12.
Iwut i, budiman g, novamizanti l. optimization of discrete cosine transform-based image watermarking by genetics algorithm. indonesian journal of electrical engineering and computer science. 2016 oct;4(1):91-103.
Kabetta h. information hiding in css: a secure scheme text-steganography using public key cryptosystem. international journal on cryptography and information security (ijcis). 2011 dec;1(1).
Bandyopadhyay sk, dutta b, majumdar a, bhowmick s. hide text within an audio clip. journal of current computer science and technology. 2011;1(6):305-15.
Katare u, patidar p, tiwari a. comparative analysis of zf and mmse receiver for multicode mc-cdma downlink channels. international journal of engineering science and innovative technology,(ijesit). 2014;3(4).
Savithri v, marimuthu a. forward linear predictive queuing based window adjustment policy for congestion control in voice over manet (voman). in2017 international conference on computer communication and informatics (iccci) 2017 jan 5 (pp. 1-4). ieee.
Bhansali a, sharma hr. an open source framework for prtf protocol.
Majeed mn, chattha sp, akram a, zafrullah m. vehicular ad hoc networks: history and future development arenas. int. j. inf. techno. elect. eng.. 2013 apr;2(2):25-9.
Faisal m, khan mn. an enhanced scheme for reducing vertical handover latency. international journal of advanced computer science and applications. 2012 jan;3(1).
Ghosh s, bharadwaj sj, bharadwaj sj, gumber s. engineered bioclimatic responses in ancient settlements: a case study. international journal of biometeorology. 2021 may 29:1-6.