OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Enhancing Cloud-Based Machine Learning Models with Federated Learning Techniques
Rejuwan Shamim, Yousef Farhaoui
Lecture notes in networks and systems (2024), pp. 594-606
Closed Access | Times Cited: 28

Showing 1-25 of 28 citing articles:

Big Data Analytics in Supply Chain Management
Nia Sara, Belmaati Hicham
(2024), pp. 400-408
Closed Access | Times Cited: 4

Algorithmic Approaches to the Traveling Salesman Problem for the Development of Students’ Computational Thinking
Serafeim A. Triantafyllou, Theodosios Sapounidis
(2024), pp. 509-523
Closed Access | Times Cited: 2

Learning Design of Lesson Plans with LAMS and CADMOS
Serafeim A. Triantafyllou, Yousef Farhaoui
(2024), pp. 103-111
Closed Access | Times Cited: 1

An In-depth Comparative Study: YOLOv3 vs. Faster R-CNN for Object Detection in Computer Vision
Rejuwan Shamim, Yousef Farhaoui
(2024), pp. 266-277
Closed Access

Customer Behavior Tracing and Prediction Using Genetic Algorithm: Review of Literature
Sara Mahdi Aboud, Mustafa Radif
(2024), pp. 58-64
Closed Access

Strategic Intelligence as a Pillar of Economic Intelligence in the Era of Governance 2.0
Chaymae Douhid, Younes Abid, Mohamed Chemlal
(2024), pp. 340-353
Closed Access

Deep Learning-Based Predictive Analytics for Anomaly Detection in Big Data Environments
Yousef Farhaoui, Ahmad El Allaoui
(2024), pp. 148-154
Closed Access

Enhancing Query Processing in Big Data: Scalability and Performance Optimization
M. Sahaya Sheela, Yousef Farhaoui, C. Kanmani Pappa, et al.
(2024), pp. 46-57
Closed Access

Genomic Insights Revealed: Multiclass DNA Sequence Classification Using Optimized Naive Bayes Modeling
Rejuwan Shamim, Yousef Farhaoui, Md Arshad
(2024), pp. 210-221
Closed Access

Thermal Imaging System for the Detection of Varicose Veins in Adult Patients
Brian Meneses-Claudio
(2024), pp. 498-517
Closed Access

VAE-CNN for Coronary Artery Disease Prediction
Nabaouia Louridi, Amine El Ouahidi, Clément Benic, et al.
(2024), pp. 155-164
Closed Access

Artificial Intelligence and Knowledge Management in Business Classification in Latin America
Daniel Andrade-Girón, William Joel Marín Rodriguez
(2024), pp. 454-464
Closed Access

Understanding and Designing Turing Machines with Innovative Applications to Computing
Serafeim A. Triantafyllou
(2024), pp. 197-209
Closed Access

Temperature Measurement System to Detect Possible Cases of Patients with Diabetic Foot Applied to University Professors
Brian Meneses-Claudio, Enrique Lee Huamaní, Melissa Yauri-Machaca
(2024), pp. 552-568
Closed Access

Bar Code Detection for AI-Driven EDA and Big Data Analytics
Yousef Farhaoui, Ahmad El Allaoui
(2024), pp. 476-488
Closed Access

Incidence of Air Pollution on Human Development in Emerging Countries: A Supervised Learning Approach
Carolina Henao-Rodríguez, Jenny-Paola Lis-Gutiérrez, Melissa Lis-Gutiérrez
(2024), pp. 535-551
Closed Access

Strategies for Migrating BI Solutions to the Cloud: A Framework for Integrated and Secure Viability Analysis
Najia Khouibiri, Yousef Farhaoui, Haidar Aissa, et al.
(2024), pp. 498-508
Closed Access

AI-Enhanced Big Data IoT System for Helmet Detection to Boost Biker Safety
Yousef Farhaoui, Ahmad El Allaoui
(2024), pp. 489-497
Closed Access

Optimizing Hyperparameters for Fraud Detection: A Comparative Analysis of Machine Learning Algorithms
Md Arshad, Yousef Farhaoui, Rejuwan Shamim
(2024), pp. 218-228
Closed Access

Iterative Method of Newton-Raphson for Systems with Two Equations
Serafeim A. Triantafyllou
(2024), pp. 1-8
Closed Access

Designing a Comprehensive Data Security Protection System for Multi-dimensional Threats in Cloud Computing
M. Sahaya Sheela, Yousef Farhaoui, D. Hemanand, et al.
(2024), pp. 53-65
Closed Access

Medical Image Compression Using Discrete Wavelet Transform
Hashim Adnan, Ali Obied, Ali Al-Fayadh
(2024), pp. 160-167
Closed Access

Page 1 - Next Page

Scroll to top