
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Sparse Long Short-Term Memory Approach for Energy-Efficient Adaptive Cluster Fuzzy-based Controller in Wireless Sensor Network
Kavita Ramanan, S. P. Ramesh, C. Sahaya Kingsly, et al.
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 211-219
Closed Access | Times Cited: 5
Kavita Ramanan, S. P. Ramesh, C. Sahaya Kingsly, et al.
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 211-219
Closed Access | Times Cited: 5
Showing 5 citing articles:
A Machine Learning Approach for Recommending Soil Nutrient Levels
R. Anitha, A. Ramathilagam, M. Jeyavelan, et al.
(2024), pp. 1-6
Closed Access
R. Anitha, A. Ramathilagam, M. Jeyavelan, et al.
(2024), pp. 1-6
Closed Access
Artificial Intelligence Methods for the Prognosis of Cardiovascular Disease
A. Ramathilagam, B. Kaviya, T. Muthamizhan, et al.
(2024), pp. 1-7
Closed Access
A. Ramathilagam, B. Kaviya, T. Muthamizhan, et al.
(2024), pp. 1-7
Closed Access
Machine Learning Approach for Malware Detection Using Malware Memory Analysis Data
S. P. Ramesh, Santosh Anand, Vidhyalakshmi Karthikeyan
Communications in computer and information science (2024), pp. 135-145
Closed Access
S. P. Ramesh, Santosh Anand, Vidhyalakshmi Karthikeyan
Communications in computer and information science (2024), pp. 135-145
Closed Access
Artificial Intelligence For Realtime Face Recognition Attendance Using College Classrooms and Buses
A Ahila, Hosanna Princye P, A. Poonguzhali, et al.
(2024), pp. 1-6
Closed Access
A Ahila, Hosanna Princye P, A. Poonguzhali, et al.
(2024), pp. 1-6
Closed Access
Advancements in Cybersecurity Using Deep Learning Techniques Attack Detection for Trojan Horses
Hosanna Princye P, A Ahila, A. Anna Lakshmi, et al.
(2024), pp. 1-6
Closed Access
Hosanna Princye P, A Ahila, A. Anna Lakshmi, et al.
(2024), pp. 1-6
Closed Access