Egyptian Informatics Journal

Papers
(The median citation count of Egyptian Informatics Journal is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Security and privacy of electronic health records: Concerns and challenges214
Smart cities: Fusion-based intelligent traffic congestion control system for vehicular networks using machine learning techniques203
A predictive machine learning application in agriculture: Cassava disease detection and classification with imbalanced dataset using convolutional neural networks195
Internet of things and ransomware: Evolution, mitigation and prevention107
BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security107
A new evolutionary algorithm: Learner performance based behavior algorithm64
A 3D-convolutional neural network framework with ensemble learning techniques for multi-modal emotion recognition60
Private blockchain-based encryption framework using computational intelligence approach55
Bi-parametric distance and similarity measures of picture fuzzy sets and their applications in medical diagnosis54
A novel optimization algorithm (Lion-AYAD) to find optimal DNA protein synthesis42
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)35
Survey on spectrum sharing/allocation for cognitive radio networks Internet of Things32
Enabling recommendation system architecture in virtualized environment for e-learning32
A survey on sentiment analysis in Urdu: A resource-poor language32
The impact of using different annotation schemes on named entity recognition28
AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT27
AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment27
Classification and comparison of ad hoc networks: A review26
HMATC: Hierarchical multi-label Arabic text classification model using machine learning25
Social network sentiment classification method combined Chinese text syntax with graph convolutional neural network24
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system24
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods24
Deep learning based fusion strategies for personality prediction23
Synthetic data with neural machine translation for automatic correction in arabic grammar23
Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior23
IoT security system with modified Zero Knowledge Proof algorithm for authentication22
Toward secret data location via fuzzy logic and convolutional neural network21
Iris based cancelable biometric cryptosystem for secure healthcare smart card21
Enhanced concept-level sentiment analysis system with expanded ontological relations for efficient classification of user reviews20
A method for generation of substitution box based on random selection20
Hybridized classification algorithms for data classification applications: A review20
Hierarchical blockchain structure for node authentication in IoT networks19
A blockchain-based models for student information systems19
A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism19
The impact of synthetic text generation for sentiment analysis using GAN based models19
A fully automatic fine tuned deep learning model for knee osteoarthritis detection and progression analysis18
Energy efficiency in cognitive radio network using cooperative spectrum sensing based on hybrid spectrum handoff17
Evolutionary offloading in an edge environment17
An Improved Task Allocation Strategy in Cloud using Modified K-means Clustering Technique17
Prediction the dynamic viscosity of MWCNT-Al2O3 (30:70)/ Oil 5W50 hybrid nano-lubricant using Principal Component Analysis (PCA) with Artificial Neural Network (ANN)16
Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system16
An intelligent use of stemmer and morphology analysis for Arabic information retrieval16
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks16
Adopting security maturity model to the organizations’ capability model15
Mutual authentication of nodes using session token with fingerprint and MAC address validation14
Intelligent deep analysis of DNA sequences based on FFGM to enhancement the performance and reduce the computation14
An approach based on the ifcOWL ontology to support indoor navigation14
Smart Traffic Scheduling for Crowded Cities Road Networks14
Detecting suicidality on social media: Machine learning at rescue14
Trajectory control and image encryption using affine transformation of lorenz system14
Deployment of an intelligent and secure cattle health monitoring system13
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection13
An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)13
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system12
Systematic literature review and analysis for Arabic text steganography method practically12
An efficient machine-learning model based on data augmentation for pain intensity recognition12
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks12
A weighted Markov-clustering routing protocol for optimizing energy use in wireless sensor networks12
Modeling time delay, external noise and multiple malware infections in wireless sensor networks11
Anomaly Detection and Bottleneck Identification of The Distributed Application in Cloud Data Center using Software–Defined Networking11
Lane prediction optimization in VANET11
A comparative study of hybrid estimation distribution algorithms in solving the facility layout problem11
A novel approach for detecting advanced persistent threats10
Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks10
AutismOnt: An Ontology-Driven Decision Support For Autism Diagnosis and Treatment10
Detection of malware in downloaded files using various machine learning models10
Automised flow rule formation by using machine learning in software defined networks based edge computing10
iFogRep: An intelligent consistent approach for replication and placement of IoT based on fog computing9
BPR algorithm: New broken plural rules for an Arabic stemmer9
Building a trust model system to avoid cloud services reputation attacks9
Efficient privacy-preservation scheme for securing urban P2P VANET networks9
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers9
AI-Driven livestock identification and insurance management system8
Click fraud detection for online advertising using machine learning8
A genomic rule-based KNN model for fast flux botnet detection8
Federated learning optimization: A computational blockchain process with offloading analysis to enhance security8
The fuzzy common vulnerability scoring system (F-CVSS) based on a least squares approach with fuzzy logistic regression8
An improved Image Interpolation technique using OLA e-spline8
Wireless battery recharging through UAV in wireless sensor networks8
Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework7
Game theory based node clustering for cognitive radio wireless sensor networks7
Cyber threat attribution using unstructured reports in cyber threat intelligence7
Efficient framework for detecting COVID-19 and pneumonia from chest X-ray using deep convolutional network7
Model of functioning of the centralized wireless information ecosystem focused on multimedia streaming7
A hybrid deep learning-based framework for future terrorist activities modeling and prediction7
Predicting the prevalence of lung cancer using feature transformation techniques7
Towards developing a Block Chain based Advanced Data Security-Reward Model (DSecCS) in mobile crowd sensing networks6
Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic6
AgroSupportAnalytics: A Cloud-based Complaints Management and Decision Support System for Sustainable Farming in Egypt6
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities6
Mutual learning differential particle swarm optimization6
Contention-based traffic priority MAC protocols in wireless body area networks: A thematic review6
Psychological Human Traits Detection based on Universal Language Modeling6
Implementing MRCRLB technique on modulation schemes in wireless rechargeable sensor networks6
Permutation-based frame synchronization method for data transmission systems with short packets6
Security-aware dynamic VM consolidation6
A comprehensive analysis of the correlation between maximal clique size and centrality metrics for complex network graphs6
TBMOR: A lightweight trust-based model for secure routing of opportunistic networks6
Trust identification through cognitive correlates with emphasizing attention in cloud robotics6
Evaluation of Boruta algorithm in DDoS detection6
Solving the vehicle routing problem with time windows using modified football game algorithm5
Forensic analysis and security assessment of IoT camera firmware for smart homes5
Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms5
Energy-aware intelligent scheduling for deadline-constrained workflows in sustainable cloud computing5
Research on smart city data encryption and communication efficiency improvement under federated learning framework5
Decomposition-based interval multi-objective evolutionary algorithm with adaptive adjustment of weight vectors and neighborhoods5
An optimal configuration-based trading scheme for profit optimization in wireless networks5
An optimal defect recognition security-based terahertz low resolution image system using deep learning network5
Prediction of complex public opinion evolution based on improved multi-objective grey wolf optimizer5
Local dynamic neighborhood based outlier detection approach and its framework for large-scale datasets5
A hybridization of granular adaptive tabu search with path relinking for the multi-depot open vehicle routing problem5
Enhancing enterprises trust mechanism through integrating blockchain technology into e-commerce platform for SMEs4
Minimizing tardiness and makespan for distributed heterogeneous unrelated parallel machine scheduling by knowledge and Pareto-based memetic algorithm4
Provably throttling SQLI using an enciphering query and secure matching4
A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster4
Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization4
Analysis of wavelength reservation based quality of service differentiation in optical burst switching networks using Markov model4
Workflow migration in uncertain edge computing environments based on interval many-objective evolutionary algorithm4
HIV/AIDS predictive model using random forest based on socio-demographical, biological and behavioral data4
Model of the information security protection subsystem operation and method of optimization of its composition4
Combining machine learning algorithms for personality trait prediction4
Study on trust evaluation and service selection for Service-Oriented E-Commerce systems in IoT environments4
A deep learning-based framework for automatic detection of drug resistance in tuberculosis patients4
Enhancing cooperation in MANET using neighborhood compressive sensing model4
Predict student learning styles and suitable assessment methods using click stream4
A method for transferring BIM data into domain ontologies: A case study based on airport services4
Machine learning algorithms in proactive decision making for handover management from 5G & beyond 5G3
Detecting software performance problems using source code analysis techniques3
A many objective commercial recommendation algorithm via Game-Based core node extraction3
RFID-based location based services framework for alerting on black spots for accident prevention3
Modeling of blockchain with encryption based secure education record management system3
An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron3
CPDA: A conflict-free periodic data aggregation technique in wireless sensor networks3
Optimizing flexible job shop scheduling with automated guided vehicles using a multi-strategy-driven genetic algorithm3
Retrieval of behavior trees using map-and-reduce technique3
A new fusion of mutual information and Otsu multilevel thresholding technique for hyperspectral band selection3
Pattern recognition of omicron variants from amalgamated multi-focus EEG signals and X-ray images using deep transfer learning3
An improved gaussian mixture hidden conditional random fields model for audio-based emotions classification3
Joint non-negative and fuzzy coding with graph regularization for efficient data clustering3
Read my lips: Artificial intelligence word-level arabic lipreading system3
Low complexity design of bit parallel polynomial basis systolic multiplier using irreducible polynomials3
Aligning document layouts extracted with different OCR engines with clustering approach3
0.046536207199097