American Journal of Computer Science and Information Technology : Citations & Metrics Report

Articles published in American Journal of Computer Science and Information Technology have been cited by esteemed scholars and scientists all around the world. American Journal of Computer Science and Information Technology has got h-index 12, which means every article in American Journal of Computer Science and Information Technology has got 12 average citations.

Following are the list of articles that have cited the articles published in American Journal of Computer Science and Information Technology.

  2024 2023 2022 2021 2020 2019

Total published articles

0 66 65 89 34 14

Research, Review articles and Editorials

0 3 5 45 22 14

Research communications, Review communications, Editorial communications, Case reports and Commentary

0 60 60 15 12 0

Conference proceedings

0 0 0 0 0 36

Citations received as per Google Scholar, other indexing platforms and portals

100 138 138 1200 105 64
Journal total citations count 620
Journal impact factor 1.68
Journal 5 years impact factor 2.12
Journal cite score 2.18
Journal h-index 12
Journal h-index since 2019 12
image

Deep G, Kaur L, Gupta S. Lung Nodule Retrieval by Integrating Local Binary Pattern with Template Matching.

  View at Publisher | View at Google Scholar |
image

Vivekanandan N. Comparison of Probability Distributions for Extreme Value Analysis of Wind Speed–A Case Study.

  View at Publisher | View at Google Scholar |
image

Gangele S, Dongre A (2015) Area Estimation for Web Browsing Performance of Users by Applying Numerical Method. International Journal of Computer Applications. 1: 120.

  View at Publisher | View at Google Scholar |
image

Gangele S, Patil S. Two-Call and Rest State Based Internet Traffic Sharing Analysis in Two Market Environment.

  View at Publisher | View at Google Scholar |
image

Laan N (2015) Impact of blood droplets.

  View at Publisher | View at Google Scholar |
image

Agrawal A, Verma AK (2016) A review & impact of Trust Schemes in MANET. InProceedings of the International Conference on Advances in Information Communication Technology & Computing 12:  26.

  View at Publisher | View at Google Scholar |
image

Krishna CM, Srinivas Y (2015) Color Image Segmentation Based on Log Normal Distribution.

  View at Publisher | View at Google Scholar |
image

Deep G, Kaur L, Gupta S (2016) Lung Nodule Retrieval by Integrating Local Binary Pattern with Template Matching.

  View at Publisher | View at Google Scholar |
image

A Survey On Wireless Communications : 6g And 7g 1

  View at Publisher | View at Google Scholar | View at Indexing
image

Geçmi?ten Günümüze Kablosuz Mobil ?leti?im Teknolojileri

  View at Publisher | View at Google Scholar | View at Indexing
image

Analysis of Heart Disease Using Parallel and Sequential Ensemble Methods With Feature Selection Techniques: Heart Disease Prediction

  View at Publisher | View at Google Scholar | View at Indexing
image

Analysis of Popular Techniques Used in Educational Data Mining.

  View at Publisher | View at Google Scholar | View at Indexing
image

Caracterización del aprendizaje de algoritmos mediante minería de datos en el nivel superior.

  View at Publisher | View at Google Scholar | View at Indexing
image

Blackhole attack implementation and its performance evaluation using AODV routing in MANET

  View at Publisher | View at Google Scholar | View at Indexing
image

The Effectiveness of Mobile Ad Hoc Routing Protocols Under a Gray Hole Attack

  View at Publisher | View at Google Scholar | View at Indexing
image

Enhanced Technique for Detecting Active and Passive Black-Hole Attacks in MANET

  View at Publisher | View at Google Scholar | View at Indexing
image

DETECTION AND AVOIDANCE OF COORDINATED BLACK HOLE ATTACK IN MANET'S

  View at Publisher | View at Google Scholar | View at Indexing
image

Intrusion Detection Systems And Its Vulnerabilities For Manet: A Review

  View at Publisher | View at Google Scholar | View at Indexing
image

Performance Analysis of Black Hole attack in MANET

  View at Publisher | View at Google Scholar | View at Indexing
image

Implementation of Multiple Blackhole Attack in AODV Routing Protocol in MANET

  View at Publisher | View at Google Scholar | View at Indexing