OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cognitive informatics in image semantics description, identification and automatic pattern understanding
Lidia Ogiela
Neurocomputing (2013) Vol. 122, pp. 58-69
Closed Access | Times Cited: 35

Showing 1-25 of 35 citing articles:

Medical Image Retrieval Using Vector Quantization and Fuzzy S-tree
Jana Nowaková, Michal Prílepok, Václav Snåšel
Journal of Medical Systems (2016) Vol. 41, Iss. 2
Open Access | Times Cited: 78

Cognitive systems for intelligent business information management in cognitive economy
Lidia Ogiela, Marek R. Ogiela
International Journal of Information Management (2014) Vol. 34, Iss. 6, pp. 751-760
Closed Access | Times Cited: 62

Advanced techniques for knowledge management and access to strategic information
Lidia Ogiela
International Journal of Information Management (2014) Vol. 35, Iss. 2, pp. 154-159
Closed Access | Times Cited: 56

Insider Threats and Cryptographic Techniques in Secure Information Management
Lidia Ogiela, Marek R. Ogiela
IEEE Systems Journal (2015) Vol. 11, Iss. 2, pp. 405-414
Closed Access | Times Cited: 56

Towards cognitive economy
Lidia Ogiela
Soft Computing (2014) Vol. 18, Iss. 9, pp. 1675-1683
Closed Access | Times Cited: 44

Intelligent techniques for secure financial management in cloud computing
Lidia Ogiela
Electronic Commerce Research and Applications (2015) Vol. 14, Iss. 6, pp. 456-464
Closed Access | Times Cited: 44

Bio-Inspired Cryptographic Techniques in Information Management Applications
Lidia Ogiela, Marek R. Ogiela
(2016) Vol. 38, pp. 1059-1063
Closed Access | Times Cited: 40

Facial emotion recognition with transition detection for students with high-functioning autism in adaptive e-learning
Hui-Chuan Chu, William Wei-Jen Tsai, Min-Ju Liao, et al.
Soft Computing (2017) Vol. 22, Iss. 9, pp. 2973-2999
Closed Access | Times Cited: 40

Cryptographic techniques of strategic data splitting and secure information management
Lidia Ogiela
Pervasive and Mobile Computing (2015) Vol. 29, pp. 130-141
Closed Access | Times Cited: 40

Linguistic techniques for cryptographic data sharing algorithms
Urszula Ogiela, Lidia Ogiela
Concurrency and Computation Practice and Experience (2017) Vol. 30, Iss. 3
Open Access | Times Cited: 39

Spatial analysis and data mining techniques for identifying risk factors of Out-of-Hospital Cardiac Arrest
Jui‐Hung Kao, Ta‐Chien Chan, Feipei Lai, et al.
International Journal of Information Management (2016) Vol. 37, Iss. 1, pp. 1528-1538
Closed Access | Times Cited: 26

Security of Selected Secret Sharing Schemes
Urszula Ogiela, Makoto Takizawa, Lidia Ogiela
Advances in intelligent systems and computing (2017), pp. 395-400
Closed Access | Times Cited: 8

Personalized cryptography in cognitive management
Lidia Ogiela, Makoto Takizawa
Soft Computing (2017) Vol. 21, Iss. 9, pp. 2451-2464
Closed Access | Times Cited: 7

Cognitive Information Systems
Lidia Ogiela
Elsevier eBooks (2017), pp. 61-78
Closed Access | Times Cited: 7

Human-Machine Synergy in Real Estate Similarity Concept
Małgorzata Renigier‐Biłozor, Artur Janowski
Real Estate Management and Valuation (2023) Vol. 32, Iss. 2, pp. 13-30
Open Access | Times Cited: 2

A service model for nutrition supplement prediction based on Fuzzy Bayes model using bigdata in livestock
Saraswathi Sivamani, Jongsun Choi, Yongyun Cho
Annals of Operations Research (2017) Vol. 265, Iss. 2, pp. 257-268
Closed Access | Times Cited: 5

Safety and Standardization of Data Sharing Techniques and Protocols for Management of Strategic Data
Lidia Ogiela, Marek R. Ogiela, Makoto Takizawa
(2017), pp. 1076-1081
Closed Access | Times Cited: 5

Intelligent Management Model Based on CBR-SDA Approach – An Example of Smart Life Recommendation System for Choosing Clothes and Accessories
Hsing-Chung Chen, Ruan Qiu-Hua, Yeh Pei-Chi, et al.
(2016) Vol. 7, pp. 446-451
Closed Access | Times Cited: 3

Application of Cognitive Information Systems in Medical Image Semantic Analysis
Marek R. Ogiela, Lidia Ogiela
Electronics (2024) Vol. 13, Iss. 2, pp. 325-325
Open Access

Transformative Intelligence in Data Analysis and Knowledge Exploration
Lidia Ogiela, Makoto Takizawa, Urszula Ogiela
Lecture notes on data engineering and communications technologies (2024), pp. 274-281
Closed Access

Security among UPFs belonging to Different 5G/B5G/6G Networks
Liang-Sheng Hsiao, Kun-Lin Tsai, Jung‐Chun Liu, et al.
Information Systems Frontiers (2024)
Closed Access

Cognitive information systems in secure information management and personalized cryptography
Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
(2014), pp. 1152-1157
Closed Access | Times Cited: 2

Behavioral Keys in Cryptography and Security Systems
Marek R. Ogiela, Lidia Ogiela
Lecture notes on data engineering and communications technologies (2017), pp. 296-300
Closed Access | Times Cited: 2

Application of Personalized Cryptography in Cloud Environment
Marek R. Ogiela, Lidia Ogiela
Lecture notes on data engineering and communications technologies (2016), pp. 253-257
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top