ISSN: 2229-371X
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world. Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Total published articles |
27 | 41 | 28 | 16 | 17 | 20 | 20 | 8 | 4 | 20 | 47 | 132 | 167 | 182 |
Research, Review articles and Editorials |
5 | 11 | 11 | 13 | 0 | 0 | 0 | 0 | 4 | 12 | 47 | 129 | 156 | 182 |
Research communications, Review communications, Editorial communications, Case reports and Commentary |
21 | 26 | 18 | 3 | 17 | 20 | 20 | 8 | 0 | 8 | 0 | 0 | 0 | 0 |
Conference proceedings |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Citations received as per Google Scholar, other indexing platforms and portals |
202 | 297 | 357 | 355 | 362 | 378 | 415 | 432 | 431 | 353 | 276 | 174 | 112 | 52 |
Journal total citations count | 3761 |
Journal impact factor | 14.81 |
Journal 5 years impact factor | 17.33 |
Journal cite score | 16.70 |
Journal h-index | 30 |
Journal h-index since 2019 | 19 |
Journal Impact Factor 2020 formula |
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)} Y= Year |
Journal 5-year Impact Factor 2020 formula |
Citations(2018 + 2019 + 2020 + 2021 + 2022)/ {Published articles(2018 + 2019 + 2020 + 2021 + 2022)} |
Journal citescore |
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3 |
Kumari n, yadav b. a temporal domain steganography technique based onoptimal solution using evolutionary algorithm.
|
|
Kumari n, yadav b. a temporal domain steganography technique based onoptimal solution using evolutionary algorithm.
|
|
Jyoti j, sabir m. more secured steganography model with high concealing capacity by using genetic algorithm, integer wavelet transform and opap. more secured steganography model with high concealing capacity by using genetic algorithm, integer wavelet transform and opap. 2013;1:1-5.
|
|
Khamrui a, mandal jk. a wavelet transform based image authentication approach using genetic algorithm (awtiaga). inict and critical infrastructure: proceedings of the 48th annual convention of computer society of india-vol i 2014 (pp. 251-258). springer, cham.
|
|
Pandey a, badal n. a modified circular version of playfair cipher. inproceedings of 2nd international conference on advanced computing and software engineering (icacse) 2019 mar 12.
|
|
Pandey a, badal n. a modified circular version of playfair cipher. inproceedings of 2nd international conference on advanced computing and software engineering (icacse) 2019 mar 12.
|
|
Zeeshan m, ullah s, anayat s, hussain rg, nasir n. a review study on unique way of information hiding: steganography. international journal on data science and technology. 2017;3(5):45-51.
|
|
Sabir m. genetic algorithm based image steganography for enhancement of concealing capacity and security. international journal of image, graphics and signal processing. 2013 jun 1;5(7):18.
|
|
Chaturvedi p, bairwa rk. an integer wavelet transform based steganography technique for concealing data in colored images. international journal of recent research and review. 2014 mar;7(1):49-57.
|
|
Ibanez al, djamal ec, ilyas r, najmurrokhman a. optimization of least significant bit steganography using genetic algorithm to improve data security. in2018 10th international conference on information technology and electrical engineering (icitee) 2018 jul 24 (pp. 523-528). ieee.
|
|
Nair tr. genetic algorithm to make persistent security and quality of image in steganography from rs analysis. arxiv preprint arxiv:1204.2616. 2012 apr 12.
|
|
Iwut i, budiman g, novamizanti l. optimization of discrete cosine transform-based image watermarking by genetics algorithm. indonesian journal of electrical engineering and computer science. 2016 oct;4(1):91-103.
|
|
Kabetta h. information hiding in css: a secure scheme text-steganography using public key cryptosystem. international journal on cryptography and information security (ijcis). 2011 dec;1(1).
|
|
Bandyopadhyay sk, dutta b, majumdar a, bhowmick s. hide text within an audio clip. journal of current computer science and technology. 2011;1(6):305-15.
|
|
Katare u, patidar p, tiwari a. comparative analysis of zf and mmse receiver for multicode mc-cdma downlink channels. international journal of engineering science and innovative technology,(ijesit). 2014;3(4).
|
|
Savithri v, marimuthu a. forward linear predictive queuing based window adjustment policy for congestion control in voice over manet (voman). in2017 international conference on computer communication and informatics (iccci) 2017 jan 5 (pp. 1-4). ieee.
|
|
Bhansali a, sharma hr. an open source framework for prtf protocol.
|
|
Majeed mn, chattha sp, akram a, zafrullah m. vehicular ad hoc networks: history and future development arenas. int. j. inf. techno. elect. eng.. 2013 apr;2(2):25-9.
|
|
Faisal m, khan mn. an enhanced scheme for reducing vertical handover latency. international journal of advanced computer science and applications. 2012 jan;3(1).
|
|
Ghosh s, bharadwaj sj, bharadwaj sj, gumber s. engineered bioclimatic responses in ancient settlements: a case study. international journal of biometeorology. 2021 may 29:1-6.
|
|