Egyptian Informatics Journal

Papers
(The median citation count of Egyptian Informatics Journal is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
IFC: Editorial273
Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides238
A resilient image encryption scheme using Laplace transform155
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users74
CoTNeT: Contextual transformer network for encrypted traffic classification72
A blockchain-based models for student information systems62
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system60
High-accuracy lung disease classification via logistic regression and advanced feature extraction techniques46
Precision blood pressure prediction leveraging Photoplethysmograph signals using Support Vector Regression43
An improvised nature-inspired algorithm enfolded broad learning system for disease classification40
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer37
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system35
Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems34
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks32
Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks32
Advanced colon cancer detection: Integrating context-aware multi-image fusion (Camif) in a multi-stage framework31
Ransomware detection based on machine learning using memory features31
IFC: Editorial30
Enhanced threat intelligence framework for advanced cybersecurity resilience30
Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization28
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)28
The fuzzy common vulnerability scoring system (F-CVSS) based on a least squares approach with fuzzy logistic regression28
Optimizing fault prediction in software based on MnasNet/LSTM optimized by an improved lotus flower algorithm27
Advanced segmentation method for integrating multi-omics data for early cancer detection27
Graph Sample and Aggregate-Attention network optimized for automatic translation of five line stanzas of Tang poems to poetic language27
Email spam detection by deep learning models using novel feature selection technique and BERT26
Enhancing DDoS attack detection in IoT using PCA25
Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches25
Blockchain-supported online banking scheme25
Bi-parametric distance and similarity measures of picture fuzzy sets and their applications in medical diagnosis24
Model of the information security protection subsystem operation and method of optimization of its composition24
A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster23
‘Retraction notice to “ODRNN: Optimized deep recurrent neural networks for automatic detection of leukaemia” [Egypt. Inform. J. 26 (2024) 100453]’23
A shallow 3D convolutional neural network for violence detection in videos22
LBCC-Hung: A load balancing protocol for cloud computing based on Hungarian method22
A two-hop neighbor preference-based random network graph model with high clustering coefficient for modeling real-world complex networks22
PERS: Personalized environment recommendation system based on vital signs21
Enhanced concept-level sentiment analysis system with expanded ontological relations for efficient classification of user reviews21
A study of Isual perceptual target monitoring in graphic design based on Multi-Task structured learning and interaction mapping21
Corrigendum to “A hybrid deep learning-based framework for future terrorist activities modeling and prediction” [Egypt. Inform. J. 23(3) 2022, 437–446]20
Provably throttling SQLI using an enciphering query and secure matching19
A novel interest drift sensitivity academic paper recommender based on implicit feedback19
Delay probability in adaptive systems based on activation function of classical neural networks18
Lightweight authentication protocol for connected medical IoT through privacy-preserving access17
Workflow migration in uncertain edge computing environments based on interval many-objective evolutionary algorithm16
Interval valued inventory model with different payment strategies for green products under interval valued Grey Wolf optimizer Algorithm fitness function16
MC-ShuffleNetV2: A lightweight model for maize disease recognition16
AutismOnt: An Ontology-Driven Decision Support For Autism Diagnosis and Treatment15
IFC: Editorial15
A comparative study of hybrid estimation distribution algorithms in solving the facility layout problem15
IFC: Editorial15
Machine learning algorithms in proactive decision making for handover management from 5G & beyond 5G14
A machine learning neural network architecture for the accelerating universe based modified gravity14
A road lane detection approach based on reformer model14
Proactive threat hunting to detect persistent behaviour-based advanced adversaries14
A genomic rule-based KNN model for fast flux botnet detection13
An optimal defect recognition security-based terahertz low resolution image system using deep learning network13
Machine learning RNNs, SVM and NN Algorithm for Massive-MIMO-OTFS 6G Waveform with Rician and Rayleigh channel13
Optimal scheduling of solar-surface water source heat pump system based on an improved arithmetic optimization algorithm13
Evolutionary approach for composing a thoroughly optimized ensemble of regression neural networks13
Design and development of an effective classifier for medical images based on machine learning and image segmentation12
IFC: Editorial12
Building a trust model system to avoid cloud services reputation attacks12
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers12
A speech separation system in video sequence using dilated inception network and U-Net11
Security-aware dynamic VM consolidation11
Solving dynamic vehicle routing problem with time windows by ant colony system with bipartite graph matching11
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks11
YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information11
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods11
Combining machine learning algorithms for personality trait prediction11
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications11
Investigating feature extraction by SIFT methods for prostate cancer early detection11
Predict student learning styles and suitable assessment methods using click stream10
TGT: A Novel Adversarial Guided Oversampling Technique for Handling Imbalanced Datasets10
A 3D-convolutional neural network framework with ensemble learning techniques for multi-modal emotion recognition10
Reliable prediction of software defects using Shapley interpretable machine learning models10
A proposed authentication and group-key distribution model for data warehouse signature, DWS framework10
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection10
IFC: Editorial10
A private Ethereum blockchain for organ donation and transplantation based on intelligent smart contracts9
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities9
The impact of synthetic text generation for sentiment analysis using GAN based models9
Improving intrusion detection using LSTM-RNN to protect drones’ networks9
Diagonalize three-dimensional nonlinear chaotic map to encrypt color image9
Deep hybrid approach with sequential feature extraction and classification for robust malware detection9
Self-ChakmaNet: A deep learning framework for indigenous language learning using handwritten characters9
A knowledge graph based intelligent auxiliary diagnosis and treatment system for primary tinnitus using traditional Chinese medicine9
An automated quantitative investment model of stock selection and market timing based on industry information9
The quality of service assessment of eMBB and mMTC traffic in a clustered 5G ecosystem of a smart factory8
A comparative survey on LEACH successors clustering algorithms for energy-efficient longevity WSNs8
Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing8
A multi-objective fuzzy model based on enhanced artificial fish Swarm for multiple RNA sequences alignment8
A new probabilistic linguistic decision-making process based on PL-BWM and improved three-way TODIM methods8
Deep Learning Approach for Age-related Macular Degeneration Detection Using Retinal Images: Efficacy Evaluation of Different Deep Learning Models8
Reinforcement learning for process Mining: Business process optimization with avoiding bottlenecks8
A password-based authentication approach for edge computing architectures8
Detecting suicidality on social media: Machine learning at rescue7
Diagnosis of patellofemoral osteoarthritis using enhanced sequential deep learning techniques7
Energy-aware intelligent scheduling for deadline-constrained workflows in sustainable cloud computing7
The impact of using different annotation schemes on named entity recognition7
An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron7
Pattern recognition of omicron variants from amalgamated multi-focus EEG signals and X-ray images using deep transfer learning7
Recognizing human activities with the use of Convolutional Block Attention Module7
Complex attack detection scheme using history trajectory in internet of vehicles7
BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security7
Efficient GDD feature approximation based brain tumour classification and survival analysis model using deep learning7
Configuring the RegTech business model to explore implications of FinTech7
IoT enabled data protection with substitution box for lightweight ciphers6
Modeling time delay, external noise and multiple malware infections in wireless sensor networks6
IFC: Editorial6
Enhanced breast cancer detection and classification via CAMR-Gabor filters and LSTM: A deep Learning-Based method6
An IoT-based architecture for human resource management in construction sites using software defined networking (SDN) and game theory6
Spectral analysis of Cupric oxide (CuO) and Graphene Oxide (GO) via machine learning techniques6
Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network6
Distributed hybrid flowshop scheduling with consistent sublots under delivery time windows: A penalty lot-assisted iterated greedy algorithm6
IFC: Editorial6
Quantum computing in addressing greenhouse gas emissions: A systematic literature review6
Trajectory control and image encryption using affine transformation of lorenz system6
IFC: Editorial6
A new evolutionary algorithm: Learner performance based behavior algorithm6
Fuzzy operator infrared image deblurring algorithm for image blurring in dragon boat races6
Learning-based two-phase cooperative optimizer for distributed machine scheduling with heterogeneous factories and order priorities5
Trust identification through cognitive correlates with emphasizing attention in cloud robotics5
An effective method for global optimization – Improved slime mould algorithm combine multiple strategies5
RFID-based location based services framework for alerting on black spots for accident prevention5
A many objective commercial recommendation algorithm via Game-Based core node extraction5
A deep learning-based framework for automatic detection of drug resistance in tuberculosis patients5
A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks5
An optimal configuration-based trading scheme for profit optimization in wireless networks5
EFFSIP: Efficient forest fire system using IoT and parallel computing5
A real-time framework for opinion spam detection in Arabic social networks5
HIV/AIDS predictive model using random forest based on socio-demographical, biological and behavioral data5
Determining the optimal number of clusters by Enhanced Gap Statistic in K-mean algorithm5
Social network sentiment classification method combined Chinese text syntax with graph convolutional neural network5
Local dynamic neighborhood based outlier detection approach and its framework for large-scale datasets5
An intelligent fuzzy reinforcement learning-based routing algorithm with guaranteed latency and bandwidth in SDN: Application of video conferencing services5
Energy efficiency in cognitive radio network using cooperative spectrum sensing based on hybrid spectrum handoff5
Automised flow rule formation by using machine learning in software defined networks based edge computing5
Decentralized and collaborative approach to mobile crowdsensing by implementing continuous feedback between the nodes4
Improving healthy food recommender systems through heterogeneous hypergraph learning4
Cyber vulnerabilities detection system in logistics-based IoT data exchange4
Deepfake detection: Enhancing performance with spatiotemporal texture and deep learning feature fusion4
Psychological Human Traits Detection based on Universal Language Modeling4
Botnet sequential activity detection with hybrid analysis4
Towards precision medicine in Glioblastoma: Unraveling MGMT methylation status in glioblastoma using adaptive sparse autoencoders4
A comprehensive analysis of the correlation between maximal clique size and centrality metrics for complex network graphs4
En-RfRsK: An ensemble machine learning technique for prognostication of diabetes mellitus4
A file archival integrity check method based on the BiLSTM + CNN model and deep learning4
A Lightweight malware detection technique based on hybrid fuzzy simulated annealing clustering in Android apps4
IFC: Editorial4
IFC: Editorial4
Model of functioning of the centralized wireless information ecosystem focused on multimedia streaming4
The financial impact of human resources configuration: A quantitative analysis based on modified single candidate optimizer3
A proposed secure framework for protecting cloud-based educational systems from hacking3
Prediction the dynamic viscosity of MWCNT-Al2O3 (30:70)/ Oil 5W50 hybrid nano-lubricant using Principal Component Analysis (PCA) with Artificial Neural Network (ANN)3
A federated learning model for intelligent cattle health monitoring system using body area sensors and IoT3
Blockchain and big data integration design for traceability and carbon footprint management in the fishery supply chain3
A novel approach for detecting advanced persistent threats3
Molding robust S-box design based on linear fractional transformation and multilayer Perceptron: Applications to multimedia security3
Security and privacy of electronic health records: Concerns and challenges3
A multi-dimensional framework for improving data reliability in mobile crowd sensing3
Fuzzy decision support system for english language teaching with corpus data3
Cyber epidemic spread forecasting based on the entropy-extremal dynamic interpretation of the SIR model3
A method for transferring BIM data into domain ontologies: A case study based on airport services3
Efficient framework for detecting COVID-19 and pneumonia from chest X-ray using deep convolutional network3
Aligning document layouts extracted with different OCR engines with clustering approach3
Equalizer Design: HBOA-DE-trained radial basis function neural networks3
Dual subpopulation artificial bee colony algorithm based on individual gradation2
Benchmark Arabic news posts and analyzes Arabic sentiment through RMuBERT and SSL with AMCFFL technique2
Hybridized classification algorithms for data classification applications: A review2
Writer adaptation for E2E Arabic online handwriting recognition via adversarial multi task learning2
MalRed: An innovative approach for detecting malware using the red channel analysis of color images2
Low complexity design of bit parallel polynomial basis systolic multiplier using irreducible polynomials2
Lane prediction optimization in VANET2
Cluster-based anonymity model and algorithm for 1:1 dataset with a single sensitive attribute using machine learning technique2
IFC: Editorial2
A clustering approach for classifying scholars based on publication performance using bibliometric data2
Innovation of teaching mechanism of music course integrating artificial intelligence technology: ITMMCAI-MCA-ACNN approach2
End-to-end neural automatic speech recognition system for low resource languages2
IFC: Editorial2
Design of security management model for communication networks in digital cultural consumption under Metaverse – The case of mobile game2
0.032567977905273