OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Applications of rough sets in big data analysis: An overview
Piotr Pięta, Tomasz Szmuc
International Journal of Applied Mathematics and Computer Science (2021) Vol. 31, Iss. 4
Open Access | Times Cited: 18

Showing 18 citing articles:

Hypergraph-based attribute reduction of formal contexts in rough sets
Hua Mao, Shengyu Wang, Chang Liu, et al.
Expert Systems with Applications (2023) Vol. 234, pp. 121062-121062
Closed Access | Times Cited: 11

Optimizing Outdoor Micro-Space Design for Prolonged Activity Duration: A Study Integrating Rough Set Theory and the PSO-SVR Algorithm
Jingwen Tian, Zimo Chen, Lingling Yuan, et al.
Buildings (2024) Vol. 14, Iss. 12, pp. 3950-3950
Open Access | Times Cited: 1

The digital twin model of vehicle containers to provide an ergonomic handling mechanism
Ahmed M. Abed, Laila F. Seddek, Samia Elattar, et al.
South Florida Journal of Development (2022) Vol. 3, Iss. 2, pp. 1971-1992
Open Access | Times Cited: 4

Rough IPFCM Clustering Algorithm and Its Application on Smart Phones with Euclidean Distance
Chih‐Ming Chen, Sheng-Chieh Chang, Chen‐Chia Chuang, et al.
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5195-5195
Open Access | Times Cited: 4

Big Data Technology in the Macrodecision-Making Model of Regional Industrial Economic Information Applied Research
Kaiyan Lin
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 4

Searching of Potentially Anomalous Signals in Cosmic-Ray Particle Tracks Images Using Rough k-Means Clustering Combined with Eigendecomposition-Derived Embedding
Tomasz Hachaj, Marcin Piekarczyk, Jarosław Wąs
Lecture notes in computer science (2023), pp. 431-445
Closed Access | Times Cited: 2

An English Teaching Ability Assessment Method Based on Fuzzy Mean-Shift Clustering
Tingting Wu, Minlin Wen
Scientific Programming (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 3

Applications of Rough Set Theory in Demand Side Management of Electrical Power Industry: A Review
Tasmeea Rahman, Mohammad Lutfi Othman, Samsul Bahari Mohd Noor, et al.
(2024), pp. 53-58
Closed Access

Accurately Determining Labor Test Results Using the Rough Set Method
Retno Devita, Sarjon Defit
Jurnal Penelitian Pendidikan IPA (2024) Vol. 10, Iss. 4, pp. 1723-1730
Open Access

A Resource-based view Assessment of Big Data Analysis and its Impact on Strategic Human Resources Quality Management Systems
Dr G Madhumita Dr. Rushina Khan
Journal of Informatics Education and Research (2024) Vol. 4, Iss. 2
Open Access

An insightful data-driven crowd simulation model based on rough sets
Tomasz Hachaj, Jarosław Wąs
Information Sciences (2024), pp. 121670-121670
Closed Access

Rules’ Quality Generated by the Classification Method for Independent Data Sources Using Pawlak Conflict Analysis Model
Małgorzata Przybyła–Kasperek, Katarzyna Kusztal
Lecture notes in computer science (2023), pp. 390-405
Closed Access | Times Cited: 1

Innovative System for Analyzing English Translation Software Based on IoT Big Data
Rongliang Niu, Wei Yang
Mobile Information Systems (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 2

Analysing High Dimensional Data using Rough Tolerance Relation
K. Anitha, Debabrata Datta
2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) (2022), pp. 1-5
Closed Access | Times Cited: 2

A proximal-based algorithm for piecewise sparse approximation with application to scattered data fitting
Yijun Zhong, Chong‐Jun Li, Zhong Li, et al.
International Journal of Applied Mathematics and Computer Science (2022) Vol. 32, Iss. 4
Open Access | Times Cited: 1

Network security in multiple threats: A critical study
Kapil Joshi, Rajesh Kumar, Harishchander Anandaram, et al.
Applied and Computational Engineering (2023) Vol. 19, Iss. 1, pp. 253-258
Open Access

Page 1

Scroll to top