Journal of Information Technology & Software Engineering : Citations & Metrics Report
Articles published in Journal of Information Technology & Software Engineering have been cited by esteemed scholars and scientists all around the world. Journal of Information Technology & Software Engineering has got h-index 8, which means every article in Journal of Information Technology & Software Engineering has got 8 average citations.
Following are the list of articles that have cited the articles published in Journal of Information Technology & Software Engineering.
2022 | 2021 | 2020 | 2019 | 2018 | |
---|---|---|---|---|---|
Year wise published articles |
32 | 58 | 13 | 13 | 26 |
Year wise citations received |
58 | 47 | 50 | 34 | 21 |
Journal total citations count | 250 |
Journal impact factor | 1.16 |
Journal 5 years impact factor | 1.47 |
Journal cite score | 1.29 |
Journal h-index | 8 |
Journal h-index since 2018 | 8 |
Important citations (347)
Ratter a. gpu accelerated 2d and 3d position tracking and slam. |
|
Zheng g, zhang l, zhang hy, ding b. design of an indoor exploration and multi-objective navigation system. in2018 37th chinese control conference (ccc).2018;5451-5458. |
|
Ratter a, sammut c. fused 2d/3d position tracking for robust slam on mobile robots. in2015 ieee/rsj international conference on intelligent robots and systems (iros).2015;1962-1969. |
|
Alsoufi a. development experience of national enterprise architecture framework: a case study. j info techn soft eng.2014;4(1):1. |
|
Panigrahi ss, shaurya s, das p, swain ak, jena ak. test scenarios generation using uml sequence diagram. in2018 international conference on information technology (icit).2018 ;50-56. |
|
Uppari dj. a novel review on biometric system based on digital signal processing. |
|
Tangai mm, kaguta rj, yi y. effect of ease of use and fallibility of biometric fingerprint technology in criminal identification in kenya. |
|
Alanazi a, elleithy k. optimized occlusion-free viewpoint for improving the coverage in wireless multimedia sensor networks. |
|
Hoc nt, jános l. energy-efficient, and reliable communication in wireless sensor networks. |
|
Nguyen th. energy-efficient, and reliable communication in wireless sensor networks.2018 |
|
Arafath ms, khan ku, sunitha kv. incorporating privacy and security in military application based on opportunistic sensor network. intl j internet tech secured transac.2017;7(4):295-316. |
|
Bourmada a, bilami a. hybrid energy efficient protocol with service differentiation for qos provisions in multi-hop wsns. int j embed real-time commun sys (ijertcs).2015;6(2):27-47. |
|
Nguyen ht, jános l. position location technique in nonâ€lineâ€ofâ€sight environments for wireless sensor networks. j comp sci cyber.2016;32(2):93-111. |
|
Arafath ms, khan ku. opportunistic sensor networks: a survey on privacy and secure routing. in2017 2nd international conference on anti-cyber crimes (icacc).2017;41-46. |
|
Alanazi a, elleithy k. an optimized hidden node detection paradigm for improving the coverage and network efficiency in wireless multimedia sensor networks. sensors. 2016;16(9):1438. |
|
Asif m, khan s, ahmad r, sohail m, singh d. quality of service of routing protocols in wireless sensor networks: a review. ieee access.2017;5:1846-71. |
|
Alanazi a, elleithy k. real-time qos routing protocols in wireless multimedia sensor networks: study and analysis. sensors. 2015;15(9):22209-33. |
|
El badawy ta, magdy mm. the practice of knowledge management in private higher education institutions in egypt: the demographics effect. int j bus admin.2015;6(2). |
|
Oyetoyan td, jaatun mg, cruzes ds. measuring developers' software security skills, usage, and training needs. inexploring security in software architecture and design.2019;260-286. |
|
Condolo v, fernando m. diseño y aplicación de técnicas metaheurÃsticas para control de tráfico. |
|