ISSN: 2229-371X
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world. Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Total published articles |
27 | 41 | 28 | 16 | 17 | 20 | 20 | 8 | 4 | 20 | 47 | 132 | 167 | 182 |
Research, Review articles and Editorials |
5 | 11 | 11 | 13 | 0 | 0 | 0 | 0 | 4 | 12 | 47 | 129 | 156 | 182 |
Research communications, Review communications, Editorial communications, Case reports and Commentary |
21 | 26 | 18 | 3 | 17 | 20 | 20 | 8 | 0 | 8 | 0 | 0 | 0 | 0 |
Conference proceedings |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Citations received as per Google Scholar, other indexing platforms and portals |
202 | 297 | 357 | 355 | 362 | 378 | 415 | 432 | 431 | 353 | 276 | 174 | 112 | 52 |
Journal total citations count | 3761 |
Journal impact factor | 14.81 |
Journal 5 years impact factor | 17.33 |
Journal cite score | 16.70 |
Journal h-index | 30 |
Journal h-index since 2019 | 19 |
Journal Impact Factor 2020 formula |
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)} Y= Year |
Journal 5-year Impact Factor 2020 formula |
Citations(2018 + 2019 + 2020 + 2021 + 2022)/ {Published articles(2018 + 2019 + 2020 + 2021 + 2022)} |
Journal citescore |
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3 |
Kim ks, ibrahim mm, jung ih, kim s. mathematical analysis of the effectiveness of control strategies to prevent the autorun virus transmission propagation. applied mathematics and computation. 2020 apr 15;371:124955.
|
|
Jena s, mohanty md, mohanty mn. biomedical image segmentation using optimized fuzzy c-mean algorithm. indian journal of science and technology. 2017 sep 1;10(35).
|
|
Arora m, maurya n. an analytical approach of mars rovers by using gpu technology and genetic algorithm. international journal of scientific and research publications.:287.
|
|
Somasundaram d. pixel sensible local band analysis in microscopic chromosome images using cspa. cytology and genetics. 2016 jan;50(1):42-6.
|
|
Manikandan g, rajendiran p, balakrishnan r, thangaselvan s. a modified polybius square based approach for enhancing data security. international journal of pure and applied mathematics. 2018;119(12):13317-24.
|
|
Kaur s, kaur k. search engine optimization techniques with website perspective. int. arab. j. e technol.. 2017;4(3):103-8.
|
|
Meera r, abraham a. detecting tumours by segmenting mri images using transformed differential evolution algorithm with kapur’s thresholding. neural computing & applications. 2020 may 1;32(10):6139-49.
|
|
Himawan h, arisantoso a, saefullah a. search engine optimization (seo) menggunakan metode white hat seo untuk meningkatkan peringkat dan trafik kunjungan website. prosiding snatif. 2017 sep 3:783-90.
|
|
Roopakumari ng, kumar n. image segmentation using improved genetic algorithm. int. j. of engineering and advanced technology (ijeat). 2019;9(1).
|
|
Divya v, sasirekha n. high capacity steganography technique based on wavelet transform. in2016 online international conference on green engineering and technologies (ic-get) 2016 nov 19 (pp. 1-5). ieee.
|
|
Zareei a, karimi a. liver segmentation with new supervised method to create initial curve for active contour. computers in biology and medicine. 2016 aug 1;75:139-50.
|
|
Princy p. a comparison of symmetric key algorithms des, aes, blowfish, rc4, rc6: a survey. international journal of computer science & engineering technology (ijcset). 2015 may;6(5):328-31.
|
|
Kim ks, ibrahim mm, jung ih, kim s. mathematical analysis of the effectiveness of control strategies to prevent the autorun virus transmission propagation. applied mathematics and computation. 2020 apr 15;371:124955.
|
|
Salam m, khan su. risks mitigation practices for multi-sourcing vendors in green software development: risks mitigation practices for multi-sourcing vendors. proceedings of the pakistan academy of sciences: a. physical and computational sciences. 2017;54(1):71-87.
|
|
Manikandan g, kamarasan m, sairam n. a new approach for secure data transfer based on wavelet transform. int. j. netw. secur.. 2013 jan;15(2):106-12.
|
|
Khurshid n, bannerman pl. modeling spi sustainment in software-developing organizations: a research framework. ininternational conference on software process improvement and capability determination 2014 nov 4 (pp. 214-225). springer, cham.
|
|
Ramalingam m, prabhusundhar p, prabhahari r, azhaharasan v, yuvaraj k. classifications of biometric security authentication and cluster based intrusion detection, prevention technique in mobile ad-hoc network.
|
|
Salam m, khan su. developing green and sustainable software: success factors for vendors. in2016 7th ieee international conference on software engineering and service science (icsess) 2016 aug 26 (pp. 1059-1062). ieee.
|
|
Zeng l, wang l, zeng y, li x, xiao q. discovering spatial co-location patterns with dominant influencing features in anomalous regions. indasfaa (workshops) 2021 (pp. 267-282).
|
|
Rashid n, khan su. using agile methods for the development of green and sustainable software: success factors for gsd vendors. journal of software: evolution and process. 2018 aug;30(8):e1927.
|
|