OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Genetic Algorithm-Based Vaccine Optimization Technique to Control COVID-19
V. Ajantha Devi, Mohd Naved, E. Gangadevi, et al.
Lecture notes on data engineering and communications technologies (2022), pp. 1-15
Closed Access | Times Cited: 14

Showing 14 citing articles:

The Accuracy and Efficiency in Facial Mask Detection: Comparing Resnet-50 Algorithm to Googlenet
Shaik Khaleelbasha, K Nattar Kannan
(2024), pp. 1-5
Closed Access

Securing Trust in the Connected World: Exploring IoT Security for Privacy in Connected Environments
Sheetal Sheetal, Deepa Deepa, Abosede S. Alli
(2024) Vol. 4, pp. 1-6
Closed Access

A Hybrid technolgy using Machine learning and blockchain technology to prevent Covid
Arvind Kumar Pandey, Vipul Vekariya
(2023), pp. 481-484
Closed Access | Times Cited: 1

AI-Assisted Resource Allocation for Improved Business Efficiency and Profitability
G. Saravana Kumar, K. K. Ramachandran, Sonal Sharma, et al.
(2023), pp. 54-58
Closed Access | Times Cited: 1

A Theoretical analysis of Recent development in Statistical kind of Machine Learning
Chandrashekhar Goswami, Manish Gupta, Sonal Sharma, et al.
(2023), pp. 770-774
Closed Access | Times Cited: 1

A Hybrid Model with Digital Proximity
Rahul Mishra
(2023), pp. 2430-2433
Closed Access

A Review of Metaheuristics for Solving Combinatorial Optimization Problems in Management
Gulnar Sadat Mulla, Keerat Kumar Gupta, Sameer Dev Sharma, et al.
(2023), pp. 38-42
Closed Access

Threat Evaluation of Enterprise Utilizations via Graphical Modeling
Manisha Chandna
(2023), pp. 2411-2415
Closed Access

Page 1

Scroll to top