Journal of Information Technology & Software Engineering : Citations & Metrics Report
Articles published in Journal of Information Technology & Software Engineering have been cited by esteemed scholars and scientists all around the world. Journal of Information Technology & Software Engineering has got h-index 8, which means every article in Journal of Information Technology & Software Engineering has got 8 average citations.
Following are the list of articles that have cited the articles published in Journal of Information Technology & Software Engineering.
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Total published articles |
50 | 56 | 32 | 58 | 13 | 13 | 26 | 24 | 29 | 26 | 14 | 26 | 23 | 8 |
Research, Review articles and Editorials |
50 | 5 | 6 | 31 | 7 | 6 | 22 | 22 | 25 | 25 | 11 | 25 | 22 | 8 |
Research communications, Review communications, Editorial communications, Case reports and Commentary |
0 | 51 | 26 | 27 | 6 | 7 | 4 | 2 | 4 | 1 | 3 | 1 | 1 | 0 |
Conference proceedings |
0 | 0 | 9 | 0 | 0 | 0 | 0 | 0 | 58 | 62 | 0 | 0 | 0 | 0 |
Citations received as per Google Scholar, other indexing platforms and portals |
114 | 184 | 58 | 47 | 50 | 34 | 21 | 89 | 70 | 51 | 38 | 18 | 4 | 0 |
Journal total citations count | 1526 |
Journal impact factor | 1.16 |
Journal 5 years impact factor | 1.47 |
Journal cite score | 1.29 |
Journal h-index | 8 |
Journal h-index since 2019 | 8 |
Important citations (347)
Tamimi a, abunaser m, tawalbeh aa, saleh k. intelligent traffic light based on genetic algorithm. in2019 ieee jordan international joint conference on electrical engineering and information technology (jeeit).2019;851-854. |
|
Ahmed em. continuous genetic algorithm for traffic signal control. in2018 international conference on computer, control, electrical, and electronics engineering (iccceee).2018;1-5. |
|
Ramzan s, bajwa is, kazmi r. challenges in nosql-based distributed data storage: a systematic literature review. electronics. 2019;8(5):488. |
|
Leal f, musicante ma. using sla to guide database transition to nosql on the cloud: a systematic mapping study. in2015 ieee/acs 12th international conference of computer systems and applications (aiccsa) 2015;1-8. |
|
Ouanouki r, april a, abran a, gomez a, desharnais jm. toward building rdb to hbase conversion rules. j big data.2017;4(1):10. |
|
Uppari dj. a novel review on biometric system based on digital signal processing. |
|
Кузнецов СД. Ðовые виды уÑтройÑтв Ñ…Ñ€Ð°Ð½ÐµÐ½Ð¸Ñ Ð´Ð°Ð½Ð½Ñ‹Ñ… и архитектуры СУБД. |
|
Кузнецов СД. ПерÑпективы и проблемы иÑÐ¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¾Ð¿ÐµÑ€Ð°Ñ‚Ð¸Ð²Ð½Ð¾Ð¹ ÑнергонезавиÑимой памÑти. |
|
Lee sw, ryu kw. block unit mapping technique of nand flash memory using variable offset. í•œêµì»´í“¨í„°ì •ë³´í•™íšŒë…¼ë¬¸ì§€.2019;24(8):9-17. |
|
Kuznetsov sd. new storage devices and the future of database management. baltic j mod comp.2018;6(1):1-2. |
|
Duong ht, paché g. supply chain practices in asian emerging countries: a measurement tool of relational dimensions. j transition stud rev. 2017;24(1):15-29. |
|
Duong ht, paché g. relational integration between supply chain members: proposal of a measurement scale applicable to asian emerging countries. |
|
Parab nr, colaco lm, coutinho f. cloud based secure banking application. in2017 2nd ieee international conference on recent trends in electronics, information & communication technology (rteict).2017;830-834. |
|
Maram b, gopisetty gk.the role of iot in agriculture fields. |
|
Maram b, gopisetty gk.the role of iot in agriculture fields. |
|
Talirongan h, sison am, medina rp. modified advanced encryption standard using butterfly effect. in2018 ieee 10th international conference on humanoid, nanotechnology, information technology, communication and control, environment and management (hnicem)ieee. |
|
Wenceslao jr fv. enhancing the performance of the advanced encryption standard (aes) algorithm using multiple substitution boxes. int j comm net info security.2018;10(3):496. |
|
Nadu st. a block cipher algorithm to enhance the avalanche effect using dynamic key-dependent s-box and genetic operations. int j pure and appl math.2018;119(10):399-418. |
|
Sanchez j, correa r, buenaño h, arias s, gomez h. encryption techniques: a theoretical overview and future proposals. in2016 third international conference on edemocracy & egovernment (icedeg).2016;60-64. |
|
Maram b, gnanasekar jm, manogaran g, balaanand m. intelligent security algorithm for unicode data privacy and security in iot. service oriented computing and applications.2019;13(1):3-15. |
|