OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Implementation of Machine Learning in Health Management to Improve the Process of Medical Appointments in Perú
Edwin Jose Kcomt Ponce, Enrique Lee Huamaní, Alexi Delgado
International Journal of Emerging Technology and Advanced Engineering (2022) Vol. 12, Iss. 2, pp. 74-85
Open Access | Times Cited: 21

Showing 21 citing articles:

Cantera-Based Python Computer Program for Solving Steam Power Cycles with Superheating
Osama A. Marzouk
International Journal of Emerging Technology and Advanced Engineering (2023) Vol. 13, Iss. 3, pp. 63-73
Open Access | Times Cited: 3

Federated Learning Paradigms in Network Security for Distributed Systems
Anatha Charan Ojha, D. Yadav, B P Ashwini
(2023), pp. 1-5
Closed Access | Times Cited: 2

Machine Learning Model for Forecasting the Rating of Mobile Apps
Sharda, Ruchika Malhotra
(2024), pp. 170-173
Closed Access

Shaping the Future of Mobile Edge Computing with Innovative Architectures and Designs for Web3.0 over 5G/6G Networks
Ashwini Malviya, Chandra Prakash Lora, A Kannagi
2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT) (2024) Vol. 87, pp. 168-175
Closed Access

Exploring the Influence of Mobile Apps on Customer Engagement and Loyalty
Priti Verma, Richa Pandey, Purushottam Das, et al.
Lecture notes in networks and systems (2024), pp. 130-143
Closed Access

Analyzing the Trade-Offs Between Model Size and Approximation in Deep Learning
K. Asha, Sumitra Padmanabhan, Harshita Kaushik
(2024), pp. 1-6
Closed Access

Designing Secure Communication Protocols for Industrial Systems
Meenakshi Dheer, Deepak K. Sinha, Nutan Kaushik
(2024), pp. 1-6
Closed Access

Blockchain and Edge Computing for IoT Advancements
Feon Jaison, Chetan Chaudhary, R Manaswini
(2023), pp. 1-6
Closed Access | Times Cited: 1

Real-Time Phishing Attack Detection through Advanced Machine Learning Techniques
Hemant Sharma, Praveen Sharma, Rakesh Singh
(2023), pp. 1-6
Closed Access | Times Cited: 1

Mobile application for care and health control of camelids
Roberto Demmis Muñoz Villacorta, Carlos Oscco Aguero, Laberiano Andrade-Arenas
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 29, Iss. 3, pp. 1769-1769
Open Access | Times Cited: 1

Service Model under the Lean Service and Machine Learning Approach to Increase External User Satisfaction: A case study in the health sector SMEs in Peru
Joselyn Villavicencio-Condor, Andrea Valdivia-Castro, Martín Collao-Díaz, et al.
(2022), pp. 204-210
Open Access | Times Cited: 1

The Confluence of Edge Computing and Artificial Neural Networks for Real-time Data Processing in IoT Devices
J Bhuvana, Chetan Chaudhary, Renuka Bhagwat
2021 International Conference on System, Computation, Automation and Networking (ICSCAN) (2023) Vol. 1, pp. 1-6
Closed Access

Cryptographic Key Management Using Neural Network Algorithm
Neha Shrivastava, Praveen Kumar Sharma, Faim Multani
(2023), pp. 1-6
Closed Access

Neural Network Solutions for Advanced Persistent Threat Analysis
Rajesh Nema, Neeraj Patel, Shikha Chourasia
(2023), pp. 1-5
Closed Access

Intrusion Response Automation Through Machine Learning Algorithms
Nitish Vashisht
(2023), pp. 1-6
Closed Access

The Evolution and Integration of Seamlessly Synchronized Data Streams in Modern Businesses
Kalyan Acharjya, Sunil Datt Sharma, G. Ezhilarasan
(2023), pp. 1-6
Closed Access

Advanced Distributed Ledger Technologies for Predictive Network Security Analytics
S Varalakshmi, D. Yadav, K R Varalakshmi
(2023), pp. 1-6
Closed Access

Page 1

Scroll to top