ISSN : 2349-3917
Articles published in American Journal of Computer Science and Information Technology have been cited by esteemed scholars and scientists all around the world. American Journal of Computer Science and Information Technology has got h-index 12, which means every article in American Journal of Computer Science and Information Technology has got 12 average citations.
Following are the list of articles that have cited the articles published in American Journal of Computer Science and Information Technology.
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | |
---|---|---|---|---|---|---|
Total published articles |
0 | 66 | 65 | 89 | 34 | 14 |
Research, Review articles and Editorials |
0 | 3 | 5 | 45 | 22 | 14 |
Research communications, Review communications, Editorial communications, Case reports and Commentary |
0 | 60 | 60 | 15 | 12 | 0 |
Conference proceedings |
0 | 0 | 0 | 0 | 0 | 36 |
Citations received as per Google Scholar, other indexing platforms and portals |
100 | 138 | 138 | 1200 | 105 | 64 |
Journal total citations count | 620 |
Journal impact factor | 1.68 |
Journal 5 years impact factor | 2.12 |
Journal cite score | 2.18 |
Journal h-index | 12 |
Journal h-index since 2019 | 12 |
Deep G, Kaur L, Gupta S. Lung Nodule Retrieval by Integrating Local Binary Pattern with Template Matching. |
|
View at Publisher | View at Google Scholar | | |
Vivekanandan N. Comparison of Probability Distributions for Extreme Value Analysis of Wind Speed–A Case Study. |
|
View at Publisher | View at Google Scholar | | |
Gangele S, Dongre A (2015) Area Estimation for Web Browsing Performance of Users by Applying Numerical Method. International Journal of Computer Applications. 1: 120. |
|
View at Publisher | View at Google Scholar | | |
Gangele S, Patil S. Two-Call and Rest State Based Internet Traffic Sharing Analysis in Two Market Environment. |
|
View at Publisher | View at Google Scholar | | |
Laan N (2015) Impact of blood droplets. |
|
View at Publisher | View at Google Scholar | | |
Agrawal A, Verma AK (2016) A review & impact of Trust Schemes in MANET. InProceedings of the International Conference on Advances in Information Communication Technology & Computing 12: 26. |
|
View at Publisher | View at Google Scholar | | |
Krishna CM, Srinivas Y (2015) Color Image Segmentation Based on Log Normal Distribution. |
|
View at Publisher | View at Google Scholar | | |
Deep G, Kaur L, Gupta S (2016) Lung Nodule Retrieval by Integrating Local Binary Pattern with Template Matching. |
|
View at Publisher | View at Google Scholar | | |
A Survey On Wireless Communications : 6g And 7g 1 |
|
View at Publisher | View at Google Scholar | View at Indexing | |
Geçmi?ten Günümüze Kablosuz Mobil ?leti?im Teknolojileri |
|
View at Publisher | View at Google Scholar | View at Indexing | |
Analysis of Heart Disease Using Parallel and Sequential Ensemble Methods With Feature Selection Techniques: Heart Disease Prediction |
|
View at Publisher | View at Google Scholar | View at Indexing | |
Analysis of Popular Techniques Used in Educational Data Mining. |
|
View at Publisher | View at Google Scholar | View at Indexing | |
Caracterización del aprendizaje de algoritmos mediante minerÃa de datos en el nivel superior. |
|
View at Publisher | View at Google Scholar | View at Indexing | |
Blackhole attack implementation and its performance evaluation using AODV routing in MANET |
|
View at Publisher | View at Google Scholar | View at Indexing | |
The Effectiveness of Mobile Ad Hoc Routing Protocols Under a Gray Hole Attack |
|
View at Publisher | View at Google Scholar | View at Indexing | |
Enhanced Technique for Detecting Active and Passive Black-Hole Attacks in MANET |
|
View at Publisher | View at Google Scholar | View at Indexing | |
DETECTION AND AVOIDANCE OF COORDINATED BLACK HOLE ATTACK IN MANET'S |
|
View at Publisher | View at Google Scholar | View at Indexing | |
Intrusion Detection Systems And Its Vulnerabilities For Manet: A Review |
|
View at Publisher | View at Google Scholar | View at Indexing | |
Performance Analysis of Black Hole attack in MANET |
|
View at Publisher | View at Google Scholar | View at Indexing | |
Implementation of Multiple Blackhole Attack in AODV Routing Protocol in MANET |
|
View at Publisher | View at Google Scholar | View at Indexing | |