Journal of Information Technology & Software Engineering : Citations & Metrics Report
Articles published in Journal of Information Technology & Software Engineering have been cited by esteemed scholars and scientists all around the world. Journal of Information Technology & Software Engineering has got h-index 8, which means every article in Journal of Information Technology & Software Engineering has got 8 average citations.
Following are the list of articles that have cited the articles published in Journal of Information Technology & Software Engineering.
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Total published articles |
60 | 56 | 32 | 58 | 13 | 13 | 26 | 24 | 29 | 26 | 14 | 26 | 23 | 8 |
Research, Review articles and Editorials |
50 | 5 | 6 | 31 | 7 | 6 | 22 | 22 | 25 | 25 | 11 | 25 | 22 | 8 |
Research communications, Review communications, Editorial communications, Case reports and Commentary |
0 | 51 | 26 | 27 | 6 | 7 | 4 | 2 | 4 | 1 | 3 | 1 | 1 | 0 |
Conference proceedings |
0 | 0 | 9 | 0 | 0 | 0 | 0 | 0 | 58 | 62 | 0 | 0 | 0 | 0 |
Citations received as per Google Scholar, other indexing platforms and portals |
114 | 184 | 58 | 47 | 50 | 34 | 21 | 89 | 70 | 51 | 38 | 18 | 4 | 0 |
Journal total citations count | 1526 |
Journal impact factor | 1.16 |
Journal 5 years impact factor | 1.47 |
Journal cite score | 1.29 |
Journal h-index | 8 |
Journal h-index since 2019 | 8 |
Important citations (347)
Ratter a. gpu accelerated 2d and 3d position tracking and slam. |
|
Zheng g, zhang l, zhang hy, ding b. design of an indoor exploration and multi-objective navigation system. in2018 37th chinese control conference (ccc).2018;5451-5458. |
|
Ratter a, sammut c. fused 2d/3d position tracking for robust slam on mobile robots. in2015 ieee/rsj international conference on intelligent robots and systems (iros).2015;1962-1969. |
|
Alsoufi a. development experience of national enterprise architecture framework: a case study. j info techn soft eng.2014;4(1):1. |
|
Panigrahi ss, shaurya s, das p, swain ak, jena ak. test scenarios generation using uml sequence diagram. in2018 international conference on information technology (icit).2018 ;50-56. |
|
Uppari dj. a novel review on biometric system based on digital signal processing. |
|
Tangai mm, kaguta rj, yi y. effect of ease of use and fallibility of biometric fingerprint technology in criminal identification in kenya. |
|
Alanazi a, elleithy k. optimized occlusion-free viewpoint for improving the coverage in wireless multimedia sensor networks. |
|
Hoc nt, jános l. energy-efficient, and reliable communication in wireless sensor networks. |
|
Nguyen th. energy-efficient, and reliable communication in wireless sensor networks.2018 |
|
Arafath ms, khan ku, sunitha kv. incorporating privacy and security in military application based on opportunistic sensor network. intl j internet tech secured transac.2017;7(4):295-316. |
|
Bourmada a, bilami a. hybrid energy efficient protocol with service differentiation for qos provisions in multi-hop wsns. int j embed real-time commun sys (ijertcs).2015;6(2):27-47. |
|
Nguyen ht, jános l. position location technique in nonâ€lineâ€ofâ€sight environments for wireless sensor networks. j comp sci cyber.2016;32(2):93-111. |
|
Arafath ms, khan ku. opportunistic sensor networks: a survey on privacy and secure routing. in2017 2nd international conference on anti-cyber crimes (icacc).2017;41-46. |
|
Alanazi a, elleithy k. an optimized hidden node detection paradigm for improving the coverage and network efficiency in wireless multimedia sensor networks. sensors. 2016;16(9):1438. |
|
Asif m, khan s, ahmad r, sohail m, singh d. quality of service of routing protocols in wireless sensor networks: a review. ieee access.2017;5:1846-71. |
|
Alanazi a, elleithy k. real-time qos routing protocols in wireless multimedia sensor networks: study and analysis. sensors. 2015;15(9):22209-33. |
|
El badawy ta, magdy mm. the practice of knowledge management in private higher education institutions in egypt: the demographics effect. int j bus admin.2015;6(2). |
|
Oyetoyan td, jaatun mg, cruzes ds. measuring developers' software security skills, usage, and training needs. inexploring security in software architecture and design.2019;260-286. |
|
Condolo v, fernando m. diseño y aplicación de técnicas metaheurÃsticas para control de tráfico. |
|