
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Large‐scale system identification using self‐adaptive penguin search algorithm
Karthikeyan Udaichi, Ravi Chinaveer Nagappan, Miguel García-Torres, et al.
IET Control Theory and Applications (2023) Vol. 17, Iss. 17, pp. 2292-2303
Open Access | Times Cited: 47
Karthikeyan Udaichi, Ravi Chinaveer Nagappan, Miguel García-Torres, et al.
IET Control Theory and Applications (2023) Vol. 17, Iss. 17, pp. 2292-2303
Open Access | Times Cited: 47
Showing 1-25 of 47 citing articles:
Optimal scheduling of clean energy storage and charging integrated system by fusing DE algorithm and kernel search algorithm
Xinhua Wang, Yu Jia, Hao Su, et al.
Energy Informatics (2025) Vol. 8, Iss. 1
Open Access
Xinhua Wang, Yu Jia, Hao Su, et al.
Energy Informatics (2025) Vol. 8, Iss. 1
Open Access
Anomaly-Based Intrusion Detection System Using Bidirectional Long Short-Term Memory for Internet of Things
Praveen Kumar, S. Neduncheliyan, Myasar Mundher Adnan, et al.
(2024) Vol. 13, pp. 01-04
Closed Access | Times Cited: 2
Praveen Kumar, S. Neduncheliyan, Myasar Mundher Adnan, et al.
(2024) Vol. 13, pp. 01-04
Closed Access | Times Cited: 2
Design and Development of Music Intelligent Education System Based on Artificial Intelligence
Bo Xu
(2024) Vol. 47.2, pp. 1-6
Closed Access | Times Cited: 2
Bo Xu
(2024) Vol. 47.2, pp. 1-6
Closed Access | Times Cited: 2
A Wi-Fi Network Experience Quality Evaluation Model based on Network Security
Qiuming Peng
(2024), pp. 1-5
Closed Access | Times Cited: 1
Qiuming Peng
(2024), pp. 1-5
Closed Access | Times Cited: 1
The Application of Computer Algorithms in Marketing Data Analysis and Prediction
Pengfei Jiao, Chunxiang Guo
(2024), pp. 1-5
Closed Access | Times Cited: 1
Pengfei Jiao, Chunxiang Guo
(2024), pp. 1-5
Closed Access | Times Cited: 1
Cluster Head Selection for Single and Multiple data Sinks in Heterogeneous WSN using Wild Horse Optimization
Mohammed I. Habelalmateen, Gotte Ranjith Kumar, B P Nayana, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1
Mohammed I. Habelalmateen, Gotte Ranjith Kumar, B P Nayana, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1
ResNet110 and Mask Recurrent Convolutional Neural Network Based Detection and Classification of Colorectal Cancer
Laith H. Alzubaidi, Priyanka Kanth, S Suhas, et al.
(2024), pp. 1-4
Closed Access | Times Cited: 1
Laith H. Alzubaidi, Priyanka Kanth, S Suhas, et al.
(2024), pp. 1-4
Closed Access | Times Cited: 1
OEM Supply Chain Elastic Operation and Improvement Strategies Under the Background of Internet of Things
Yanhong Wu
(2024), pp. 1-5
Closed Access | Times Cited: 1
Yanhong Wu
(2024), pp. 1-5
Closed Access | Times Cited: 1
Evaluation and Optimization of Machine Learning Algorithms in Personalized Marketing
Chunxiang Guo, Pengfei Jiao
(2024) Vol. 10, pp. 1-5
Closed Access | Times Cited: 1
Chunxiang Guo, Pengfei Jiao
(2024) Vol. 10, pp. 1-5
Closed Access | Times Cited: 1
Evaluation of English Pronunciation Interaction Quality Based on Deep Learning
Bo Xu
(2024), pp. 1-5
Closed Access
Bo Xu
(2024), pp. 1-5
Closed Access
New Energy Optimization Method Based on Multiple Information Fusion and Visualization
Yichi Liu, Fangquan Wu, Yuan Ji, et al.
(2024), pp. 1-5
Closed Access
Yichi Liu, Fangquan Wu, Yuan Ji, et al.
(2024), pp. 1-5
Closed Access
Genetic Algorithm based Mathematical Model for Students Performance in Examination
You Yang
(2024), pp. 1-4
Closed Access
You Yang
(2024), pp. 1-4
Closed Access
E-commerce Recommendation Algorithm of Agricultural Products based on Knowledge Graph
Yeming Qiu, Qi Qi
(2024), pp. 1-6
Closed Access
Yeming Qiu, Qi Qi
(2024), pp. 1-6
Closed Access
Optimizing Resource Allocation in Mobile Edge Computing for IIoT through Reinforcement Learning and Multiobjective Particle Swarm Optimization
Sudhakar AVV, Maya Mohan, K. Maharajan, et al.
(2024), pp. 1-5
Closed Access
Sudhakar AVV, Maya Mohan, K. Maharajan, et al.
(2024), pp. 1-5
Closed Access
Automatic Software Vulnerability Analysis through a Multi-Head Attention and Long Short-Term Memory Approach
Jayapal Lande, N P Tejaswini, Hassan M. Al–Jawahry, et al.
(2024), pp. 1-4
Closed Access
Jayapal Lande, N P Tejaswini, Hassan M. Al–Jawahry, et al.
(2024), pp. 1-4
Closed Access
Design of Network Data Monitoring and Control System Based on Internet of Things Technology
Xiaolu Zhang, Wuqiang Shen, Lei Cui
(2024), pp. 1-7
Closed Access
Xiaolu Zhang, Wuqiang Shen, Lei Cui
(2024), pp. 1-7
Closed Access
Research Application of Sports Games based on Multi-Example Multi-Marker Learning in the Research Application of Children's Intellectual Development
Danni Liu, Haibo Hu
(2024), pp. 1-5
Closed Access
Danni Liu, Haibo Hu
(2024), pp. 1-5
Closed Access
Application Research of Neural Networks in the Evaluation of Investment Risk for Entrepreneurial Ventures
Yanxi Liu
(2024), pp. 1-5
Closed Access
Yanxi Liu
(2024), pp. 1-5
Closed Access
Automatic Recommendation Algorithm for E-Commerce Personalized Information Based on B2C Data Model Analysis
Gongbao Liu, B. Zeng
(2024), pp. 1-6
Closed Access
Gongbao Liu, B. Zeng
(2024), pp. 1-6
Closed Access
Random Programming Model Analysis of Infant Development Impact Based on Random Forest Algorithm
Yu Cao, Zihe Shen, Fengjing Shi
(2024), pp. 1-7
Closed Access
Yu Cao, Zihe Shen, Fengjing Shi
(2024), pp. 1-7
Closed Access
Application of Particle Swarm Optimization Algorithm in Continuous Stirred Tank Reartnr (CSTR) Control System
Zhe Zhang, Zhonglei Fan
(2024), pp. 1-6
Closed Access
Zhe Zhang, Zhonglei Fan
(2024), pp. 1-6
Closed Access
Interactive Intelligent Design System Based on Java Web Framework
Han Li
(2024), pp. 1-6
Closed Access
Han Li
(2024), pp. 1-6
Closed Access
Fraud Detection in Credit Card Using Competitive Swarm Optimization with Support Vector Machine
Ashwini Gajakosh, R Archana Reddy, Myasar Mundher Adnan, et al.
(2024), pp. 1-4
Closed Access
Ashwini Gajakosh, R Archana Reddy, Myasar Mundher Adnan, et al.
(2024), pp. 1-4
Closed Access
Performance Analysis and Improvement of Lithium Battery Charging System Based on Deep Learning Algorithms
Hongtu Lv, H. Zhang, Gongju Li
(2024) Vol. 30, pp. 1-5
Closed Access
Hongtu Lv, H. Zhang, Gongju Li
(2024) Vol. 30, pp. 1-5
Closed Access