All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Kim ks, ibrahim mm, jung ih, kim s. mathematical analysis of the effectiveness of control strategies to prevent the autorun virus transmission propagation. applied mathematics and computation. 2020 apr 15;371:124955.
Jena s, mohanty md, mohanty mn. biomedical image segmentation using optimized fuzzy c-mean algorithm. indian journal of science and technology. 2017 sep 1;10(35).
Arora m, maurya n. an analytical approach of mars rovers by using gpu technology and genetic algorithm. international journal of scientific and research publications.:287.
Somasundaram d. pixel sensible local band analysis in microscopic chromosome images using cspa. cytology and genetics. 2016 jan;50(1):42-6.
Manikandan g, rajendiran p, balakrishnan r, thangaselvan s. a modified polybius square based approach for enhancing data security. international journal of pure and applied mathematics. 2018;119(12):13317-24.
Kaur s, kaur k. search engine optimization techniques with website perspective. int. arab. j. e technol.. 2017;4(3):103-8.
Meera r, abraham a. detecting tumours by segmenting mri images using transformed differential evolution algorithm with kapur’s thresholding. neural computing & applications. 2020 may 1;32(10):6139-49.
Himawan h, arisantoso a, saefullah a. search engine optimization (seo) menggunakan metode white hat seo untuk meningkatkan peringkat dan trafik kunjungan website. prosiding snatif. 2017 sep 3:783-90.
Roopakumari ng, kumar n. image segmentation using improved genetic algorithm. int. j. of engineering and advanced technology (ijeat). 2019;9(1).
Divya v, sasirekha n. high capacity steganography technique based on wavelet transform. in2016 online international conference on green engineering and technologies (ic-get) 2016 nov 19 (pp. 1-5). ieee.
Zareei a, karimi a. liver segmentation with new supervised method to create initial curve for active contour. computers in biology and medicine. 2016 aug 1;75:139-50.
Princy p. a comparison of symmetric key algorithms des, aes, blowfish, rc4, rc6: a survey. international journal of computer science & engineering technology (ijcset). 2015 may;6(5):328-31.
Kim ks, ibrahim mm, jung ih, kim s. mathematical analysis of the effectiveness of control strategies to prevent the autorun virus transmission propagation. applied mathematics and computation. 2020 apr 15;371:124955.
Salam m, khan su. risks mitigation practices for multi-sourcing vendors in green software development: risks mitigation practices for multi-sourcing vendors. proceedings of the pakistan academy of sciences: a. physical and computational sciences. 2017;54(1):71-87.
Manikandan g, kamarasan m, sairam n. a new approach for secure data transfer based on wavelet transform. int. j. netw. secur.. 2013 jan;15(2):106-12.
Khurshid n, bannerman pl. modeling spi sustainment in software-developing organizations: a research framework. ininternational conference on software process improvement and capability determination 2014 nov 4 (pp. 214-225). springer, cham.
Ramalingam m, prabhusundhar p, prabhahari r, azhaharasan v, yuvaraj k. classifications of biometric security authentication and cluster based intrusion detection, prevention technique in mobile ad-hoc network.
Salam m, khan su. developing green and sustainable software: success factors for vendors. in2016 7th ieee international conference on software engineering and service science (icsess) 2016 aug 26 (pp. 1059-1062). ieee.
Zeng l, wang l, zeng y, li x, xiao q. discovering spatial co-location patterns with dominant influencing features in anomalous regions. indasfaa (workshops) 2021 (pp. 267-282).
Rashid n, khan su. using agile methods for the development of green and sustainable software: success factors for gsd vendors. journal of software: evolution and process. 2018 aug;30(8):e1927.