
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
CNN‐OHGS: CNN‐oppositional‐based Henry gas solubility optimization model for autonomous vehicle control system
S. Ravikumar, D. Kavitha
Journal of Field Robotics (2021) Vol. 38, Iss. 7, pp. 967-979
Closed Access | Times Cited: 51
S. Ravikumar, D. Kavitha
Journal of Field Robotics (2021) Vol. 38, Iss. 7, pp. 967-979
Closed Access | Times Cited: 51
Showing 1-25 of 51 citing articles:
An efficient cloud‐based healthcare services paradigm for chronic kidney disease prediction application using boosted support vector machine
J. Aswini, B. Yamini, Rajaram Jatothu, et al.
Concurrency and Computation Practice and Experience (2021) Vol. 34, Iss. 10
Closed Access | Times Cited: 56
J. Aswini, B. Yamini, Rajaram Jatothu, et al.
Concurrency and Computation Practice and Experience (2021) Vol. 34, Iss. 10
Closed Access | Times Cited: 56
Advances in Henry Gas Solubility Optimization: A Physics-Inspired Metaheuristic Algorithm With Its Variants and Applications
M.A. El‐Shorbagy, Anas Bouaouda, Hossam A. Nabwey, et al.
IEEE Access (2024) Vol. 12, pp. 26062-26095
Open Access | Times Cited: 11
M.A. El‐Shorbagy, Anas Bouaouda, Hossam A. Nabwey, et al.
IEEE Access (2024) Vol. 12, pp. 26062-26095
Open Access | Times Cited: 11
A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logic
Memoona Sadaf, Zafar Iqbal, Zahid Anwar, et al.
Vehicular Communications (2024) Vol. 46, pp. 100741-100741
Closed Access | Times Cited: 9
Memoona Sadaf, Zafar Iqbal, Zahid Anwar, et al.
Vehicular Communications (2024) Vol. 46, pp. 100741-100741
Closed Access | Times Cited: 9
An optimized AdaBoost Multi-class support vector machine for driver behavior monitoring in the advanced driver assistance systems
S. Ravikumar, Sekar Sellappan, Jeyalakshmi Shunmugiah, et al.
Expert Systems with Applications (2022) Vol. 212, pp. 118618-118618
Closed Access | Times Cited: 28
S. Ravikumar, Sekar Sellappan, Jeyalakshmi Shunmugiah, et al.
Expert Systems with Applications (2022) Vol. 212, pp. 118618-118618
Closed Access | Times Cited: 28
A review of Henry gas solubility optimization algorithm: a robust optimizer and applications
Laith Abualigah, Ghada Al-Hilo, Ali Raza, et al.
Elsevier eBooks (2024), pp. 177-192
Closed Access | Times Cited: 6
Laith Abualigah, Ghada Al-Hilo, Ali Raza, et al.
Elsevier eBooks (2024), pp. 177-192
Closed Access | Times Cited: 6
Automotive Information Security Assessment and Risk Management Methods
Huang Sheng Xie, Wenyuan Wei, Xudong Bian, et al.
Lecture notes on data engineering and communications technologies (2025), pp. 541-551
Closed Access
Huang Sheng Xie, Wenyuan Wei, Xudong Bian, et al.
Lecture notes on data engineering and communications technologies (2025), pp. 541-551
Closed Access
Identification of oil authenticity and adulteration using deep long short-term memory-based neural network with seagull optimization algorithm
V. Surya, A. Senthilselvi
Neural Computing and Applications (2022) Vol. 34, Iss. 10, pp. 7611-7625
Closed Access | Times Cited: 20
V. Surya, A. Senthilselvi
Neural Computing and Applications (2022) Vol. 34, Iss. 10, pp. 7611-7625
Closed Access | Times Cited: 20
An Efficient Modified Dragonfly Optimization Based MIMO-OFDM for Enhancing QoS in Wireless Multimedia Communication
S. Jothi, A. Chandrasekar
Wireless Personal Communications (2021) Vol. 122, Iss. 2, pp. 1043-1065
Closed Access | Times Cited: 25
S. Jothi, A. Chandrasekar
Wireless Personal Communications (2021) Vol. 122, Iss. 2, pp. 1043-1065
Closed Access | Times Cited: 25
Random Forest-Based Oppositional Henry Gas Solubility Optimization Model for Service Attack Improvement in WSN
S. Jeyalakshmi, Santhoshini Sekar, S. Ravikumar, et al.
Journal of The Institution of Engineers (India) Series B (2022) Vol. 103, Iss. 3, pp. 939-950
Closed Access | Times Cited: 16
S. Jeyalakshmi, Santhoshini Sekar, S. Ravikumar, et al.
Journal of The Institution of Engineers (India) Series B (2022) Vol. 103, Iss. 3, pp. 939-950
Closed Access | Times Cited: 16
F2SO: An Energy Efficient Cluster Based Routing Protocol Using Fuzzy Firebug Swarm Optimization Algorithm in WSN
K. Suresh, S. S. Sreeja Mole, A Joseph Selva Kumar
The Computer Journal (2022) Vol. 66, Iss. 5, pp. 1126-1138
Closed Access | Times Cited: 16
K. Suresh, S. S. Sreeja Mole, A Joseph Selva Kumar
The Computer Journal (2022) Vol. 66, Iss. 5, pp. 1126-1138
Closed Access | Times Cited: 16
An Efficient AlexNet Deep Learning Architecture for Automatic Diagnosis of Cardio-Vascular Diseases in Healthcare System
I. Nelson, C. Annadurai, K. Nirmala Devi
Wireless Personal Communications (2022) Vol. 126, Iss. 1, pp. 493-509
Closed Access | Times Cited: 16
I. Nelson, C. Annadurai, K. Nirmala Devi
Wireless Personal Communications (2022) Vol. 126, Iss. 1, pp. 493-509
Closed Access | Times Cited: 16
An automatic query expansion based on hybrid CMO-COOT algorithm for optimized information retrieval
Abdullah Saleh Alqahtani, S. Prabakeran, M. Maheswari, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 6, pp. 8625-8643
Closed Access | Times Cited: 15
Abdullah Saleh Alqahtani, S. Prabakeran, M. Maheswari, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 6, pp. 8625-8643
Closed Access | Times Cited: 15
Wireless IoT and Cyber-Physical System for Health Monitoring Using Honey Badger Optimized Least-Squares Support-Vector Machine
G. Premalatha, V. Thulasi Bai
Wireless Personal Communications (2022) Vol. 124, Iss. 4, pp. 3013-3034
Open Access | Times Cited: 15
G. Premalatha, V. Thulasi Bai
Wireless Personal Communications (2022) Vol. 124, Iss. 4, pp. 3013-3034
Open Access | Times Cited: 15
Oppositional tunicate fuzzy C ‐means algorithm and logistic regression for intrusion detection on cloud
P. Kanimozhi, T. Aruldoss Albert Victoire
Concurrency and Computation Practice and Experience (2021) Vol. 34, Iss. 4
Closed Access | Times Cited: 18
P. Kanimozhi, T. Aruldoss Albert Victoire
Concurrency and Computation Practice and Experience (2021) Vol. 34, Iss. 4
Closed Access | Times Cited: 18
Secured control systems through integrated IoT devices and control systems
N. Rajendran, Rupinder Singh, Manu Raj Moudgil, et al.
Measurement Sensors (2022) Vol. 24, pp. 100487-100487
Open Access | Times Cited: 13
N. Rajendran, Rupinder Singh, Manu Raj Moudgil, et al.
Measurement Sensors (2022) Vol. 24, pp. 100487-100487
Open Access | Times Cited: 13
MKELM: Mixed Kernel Extreme Learning Machine using BMDA optimization for web services based heart disease prediction in smart healthcare
Adlin Sheeba, S. Padmakala, C. A. Subasini, et al.
Computer Methods in Biomechanics & Biomedical Engineering (2022) Vol. 25, Iss. 10, pp. 1180-1194
Closed Access | Times Cited: 12
Adlin Sheeba, S. Padmakala, C. A. Subasini, et al.
Computer Methods in Biomechanics & Biomedical Engineering (2022) Vol. 25, Iss. 10, pp. 1180-1194
Closed Access | Times Cited: 12
Fuzzy artificial bee colony‐based CNN‐LSTM and semantic feature for fake product review classification
Minu Susan Jacob, P. Selvi Rajendran
Concurrency and Computation Practice and Experience (2021) Vol. 34, Iss. 1
Closed Access | Times Cited: 17
Minu Susan Jacob, P. Selvi Rajendran
Concurrency and Computation Practice and Experience (2021) Vol. 34, Iss. 1
Closed Access | Times Cited: 17
Privacy preserving framework using Gaussian mutation based firebug optimization in cloud computing
Kartik Anand, A. Vijayaraj, M. Anand
The Journal of Supercomputing (2022) Vol. 78, Iss. 7, pp. 9414-9437
Closed Access | Times Cited: 11
Kartik Anand, A. Vijayaraj, M. Anand
The Journal of Supercomputing (2022) Vol. 78, Iss. 7, pp. 9414-9437
Closed Access | Times Cited: 11
Sarcastic user behavior classification and prediction from social media data using firebug swarm optimization-based long short-term memory
Enamundram Naga Karthik, T. Sethukarasi
The Journal of Supercomputing (2021) Vol. 78, Iss. 4, pp. 5333-5357
Closed Access | Times Cited: 15
Enamundram Naga Karthik, T. Sethukarasi
The Journal of Supercomputing (2021) Vol. 78, Iss. 4, pp. 5333-5357
Closed Access | Times Cited: 15
An ensemble approach for healthcare application and diagnosis using natural language processing
Badi Alekhya, R. Sasikumar
Cognitive Neurodynamics (2022) Vol. 16, Iss. 5, pp. 1203-1220
Open Access | Times Cited: 10
Badi Alekhya, R. Sasikumar
Cognitive Neurodynamics (2022) Vol. 16, Iss. 5, pp. 1203-1220
Open Access | Times Cited: 10
A Hybrid Fuzzy-SCOOT Algorithm to Optimize Possibilistic Mean Semi-absolute Deviation Model for Optimal Portfolio Selection
Jagdish Kumar Pahade, Manoj Jha
International Journal of Fuzzy Systems (2022) Vol. 24, Iss. 4, pp. 1958-1973
Closed Access | Times Cited: 9
Jagdish Kumar Pahade, Manoj Jha
International Journal of Fuzzy Systems (2022) Vol. 24, Iss. 4, pp. 1958-1973
Closed Access | Times Cited: 9
An Integration of Archerfish Hunter Spotted Hyena Optimization and Improved ELM Classifier for Multicollinear Big Data Classification Tasks
S. Chidambaram, M. M. Gowthul Alam
Neural Processing Letters (2022) Vol. 54, Iss. 3, pp. 2049-2077
Closed Access | Times Cited: 8
S. Chidambaram, M. M. Gowthul Alam
Neural Processing Letters (2022) Vol. 54, Iss. 3, pp. 2049-2077
Closed Access | Times Cited: 8
Dynamic convolutional neural network based e‐waste management and optimized collection planning
C. Jenifa Latha, K. Kalaiselvi, S. Ramanarayan, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 17
Closed Access | Times Cited: 8
C. Jenifa Latha, K. Kalaiselvi, S. Ramanarayan, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 17
Closed Access | Times Cited: 8
An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment
N. Mageshkumar, L. Lakshmanan
The Journal of Supercomputing (2022) Vol. 78, Iss. 13, pp. 14892-14918
Closed Access | Times Cited: 7
N. Mageshkumar, L. Lakshmanan
The Journal of Supercomputing (2022) Vol. 78, Iss. 13, pp. 14892-14918
Closed Access | Times Cited: 7
Transfer learning based recurrent neural network algorithm for linguistic analysis
S. Sasikala, S. Ramesh, S. Gomathi, et al.
Concurrency and Computation Practice and Experience (2021) Vol. 34, Iss. 5
Closed Access | Times Cited: 10
S. Sasikala, S. Ramesh, S. Gomathi, et al.
Concurrency and Computation Practice and Experience (2021) Vol. 34, Iss. 5
Closed Access | Times Cited: 10