Egyptian Informatics Journal

Papers
(The median citation count of Egyptian Informatics Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
IFC: Editorial285
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users214
TriPlaNet: Enhancing machine-paraphrasing plagiarism detection through triplet network and contrastive learning76
Corrigendum to “Intrusion detection system framework for cyber-physical systems” [Egypt. Inform. J. 30 (2025) 100600]55
Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides52
A multi-module approach to evaluate online teaching quality in international Chinese education49
CoTNeT: Contextual transformer network for encrypted traffic classification49
A resilient image encryption scheme using Laplace transform48
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system47
Precision blood pressure prediction leveraging Photoplethysmograph signals using Support Vector Regression39
A blockchain-based models for student information systems38
Detection cyberbullying using AI and sentiment analysis to examine psychological impacts on vulnerable groups37
Wavelet-Based EEG classification of neural responses to applied pressure physiotherapy37
High-accuracy lung disease classification via logistic regression and advanced feature extraction techniques37
HAMNet: Hierarchical Attention-enhanced Molecular Hypergraph Network for medication recommendation with data imbalance mitigation37
Graph centrality and deep learning for enhanced portfolio management36
Investigating the performance of DistilBert and LSTM-CNN models with GloVe embeddings for emotion detection from textual data35
Multiform-based evolutionary framework for large-scale constrained multi-objective optimization34
IFC: Editorial33
Temporal record linkage for heterogeneous big data records32
An improvised nature-inspired algorithm enfolded broad learning system for disease classification31
Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks31
AI-optimized breast cancer prognostics: Robust prediction with transformer-based lesion localization and hard voting classifier30
IFC: Editorial30
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer29
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks29
Advanced colon cancer detection: Integrating context-aware multi-image fusion (Camif) in a multi-stage framework28
Effectiveness of Teachable Machine, mobile net, and YOLO for object detection: A comparative study on practical applications28
Ransomware detection based on machine learning using memory features26
Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems25
Advanced hybrid UNet architectures for retinal vessel segmentation24
EmbryoSwin++: Enhanced swin transformer with supervised contrastive learning for embryo multi-stage classification in assisted reproductive technology24
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system23
A study of Isual perceptual target monitoring in graphic design based on Multi-Task structured learning and interaction mapping22
Enhanced threat intelligence framework for advanced cybersecurity resilience22
ADAMAEX—Alzheimer’s disease classification via attention-enhanced autoencoders and XAI22
Blockchain-supported online banking scheme21
Enhancing DDoS attack detection in IoT using PCA21
Optimizing fault prediction in software based on MnasNet/LSTM optimized by an improved lotus flower algorithm21
LBCC-Hung: A load balancing protocol for cloud computing based on Hungarian method20
Model of the information security protection subsystem operation and method of optimization of its composition20
Graph Sample and Aggregate-Attention network optimized for automatic translation of five line stanzas of Tang poems to poetic language20
Blockchain-enhanced optimization for a secure and transparent global energy supply chain with reduced environmental impact and cost19
A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster19
Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches18
Dynamic oversampling-driven Kolmogorov–Arnold networks for credit card fraud detection: An ensemble approach to robust financial security18
‘Retraction notice to “ODRNN: Optimized deep recurrent neural networks for automatic detection of leukaemia” [Egypt. Inform. J. 26 (2024) 100453]’18
Email spam detection by deep learning models using novel feature selection technique and BERT18
PERS: Personalized environment recommendation system based on vital signs18
Advanced segmentation method for integrating multi-omics data for early cancer detection18
Dialogue relation extraction based on Multi-Perspective Contextual Interaction Attention Network17
A shallow 3D convolutional neural network for violence detection in videos17
Multi-Scale attention and hierarchical feature extraction-based network for metal surface defect detection17
Design and assessment of lightweight cryptographic algorithms on ESP32 and STM32 for IoD security16
A novel interest drift sensitivity academic paper recommender based on implicit feedback16
Delay probability in adaptive systems based on activation function of classical neural networks16
Corrigendum to “A hybrid deep learning-based framework for future terrorist activities modeling and prediction” [Egypt. Inform. J. 23(3) 2022, 437–446]15
Interval valued inventory model with different payment strategies for green products under interval valued Grey Wolf optimizer Algorithm fitness function15
Lightweight authentication protocol for connected medical IoT through privacy-preserving access15
Task scheduling in fog computing systems using deep learning15
Advanced AI-driven intrusion detection for securing cloud-based industrial IoT14
MC-ShuffleNetV2: A lightweight model for maize disease recognition14
Provably throttling SQLI using an enciphering query and secure matching14
IFC: Editorial13
Purifying Kopi Luwak beans with precise RL-based proximal policy optimization using visual transformer with FRD13
IFC: Editorial13
Exploring q-rung Orthopair fuzzy sets based on multi criteria decision making: A systematic literature review13
AutismOnt: An Ontology-Driven Decision Support For Autism Diagnosis and Treatment13
A machine learning neural network architecture for the accelerating universe based modified gravity13
Workflow migration in uncertain edge computing environments based on interval many-objective evolutionary algorithm13
Advanced skin lesion segmentation and classification using adaptive contextual GLCM and deep learning hybrid models13
Machine learning algorithms in proactive decision making for handover management from 5G & beyond 5G13
A road lane detection approach based on reformer model13
Proactive threat hunting to detect persistent behaviour-based advanced adversaries13
A robust tuned EfficientNet-B2 using dynamic learning for predicting different grades of brain cancer12
Lightweight sign language intelligent recognition model based on improved R-C3D12
Evolutionary approach for composing a thoroughly optimized ensemble of regression neural networks12
Climate-resilient water management: Leveraging IoT and AI for sustainable agriculture12
Improved lightweight node storage solutions in blockchain12
A data encryption access control algorithm based on zero-trust model with degree of discretization12
Hybrid signal algorithm detection in NOMA 5G waveform: Transforming smart healthcare connectivity by reducing latency12
Optimal scheduling of solar-surface water source heat pump system based on an improved arithmetic optimization algorithm11
Deep learning for sustainable agriculture: automating rice and paddy ripeness classification for enhanced food security11
An optimal defect recognition security-based terahertz low resolution image system using deep learning network11
Machine learning RNNs, SVM and NN Algorithm for Massive-MIMO-OTFS 6G Waveform with Rician and Rayleigh channel11
Network information security protection method based on additive Gaussian noise and mutual information neural network in cloud computing background11
Adaptive Q-Learning-Based Event-Prioritized QoS and incentive optimization for enhancing safety in vehicular fog networks11
IFC: Editorial10
Optimal bidding strategy for virtual power plants in day-ahead markets: A quantile-based approach10
Innovative quantum techniques for improving system performance in cloud computing10
Design of a federated learning algorithm for power big data privacy computing based on pruning technique and homomorphic encryption10
A control-driven transition strategy for enhanced multi-level threshold image segmentation optimization10
Recognition algorithm of piano playing music notes based on improved hidden Markov model10
A genomic rule-based KNN model for fast flux botnet detection9
Investigating feature extraction by SIFT methods for prostate cancer early detection9
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers9
Combining machine learning algorithms for personality trait prediction9
Golden Jackal Driven Optimization for a transparent and interpretable Intrusion Detection System using explainable AI to revolutionize cybersecurity9
Design and development of an effective classifier for medical images based on machine learning and image segmentation9
A speech separation system in video sequence using dilated inception network and U-Net8
Weighted explainable federated learning for privacy-preserving and scalable energy optimization in autonomous vehicular networks8
Improving data transmission through optimizing blockchain sharding in cloud IoT based healthcare applications8
A hybrid deep learning-based model for enhanced feature representation in image retrieval systems8
A federated supply chain finance risk control method based on personalized differential privacy8
Enhancing security in social computing systems through knowledge learning techniques8
YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information8
Simulink-Driven Digital Twin Implementation for Smart Greenhouse Environmental Control8
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications8
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks8
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods8
Ransomware detection and family classification using fine-tuned BERT and RoBERTa models8
Solving dynamic vehicle routing problem with time windows by ant colony system with bipartite graph matching8
Optimizing AI-generated image metadata with hybrid color analysis and semantic keyword structuring8
Deep hybrid approach with sequential feature extraction and classification for robust malware detection7
The impact of synthetic text generation for sentiment analysis using GAN based models7
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection7
A novel self-adaptive interval Type-3 Fuzzy Logic System for X spam detection7
Improving intrusion detection using LSTM-RNN to protect drones’ networks7
Reliable prediction of software defects using Shapley interpretable machine learning models7
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities7
DebtGuard: A Predictive Model For Managing Technical Debt In Agile Development7
An automated quantitative investment model of stock selection and market timing based on industry information7
A knowledge graph based intelligent auxiliary diagnosis and treatment system for primary tinnitus using traditional Chinese medicine7
IFC: Editorial7
Predict student learning styles and suitable assessment methods using click stream7
Analytical residual network architecture with semi-supervision for sonar-based ship classification in underwater defense systems7
A private Ethereum blockchain for organ donation and transplantation based on intelligent smart contracts7
Metadata association feature ATC data security assessment6
A modified genetic algorithm for large-scale and joint satellite mission planning6
ALMANET: A hybrid online learning IDS for real-time IoT security6
Optimization of real-time transmission and coding algorithm for high quality film and television content based on 6G wireless communication technology6
An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron6
Detecting suicidality on social media: Machine learning at rescue6
Reinforcement learning for process Mining: Business process optimization with avoiding bottlenecks6
Emotion recognition in panoramic audio and video virtual reality based on deep learning and feature fusion6
Diagonalize three-dimensional nonlinear chaotic map to encrypt color image6
A new probabilistic linguistic decision-making process based on PL-BWM and improved three-way TODIM methods6
IAPN: Framework to secure IoT-based infrastructures using Private APN6
A password-based authentication approach for edge computing architectures6
Optimizing deep learning for webshell detection based on flexible dataset reduction6
Self-ChakmaNet: A deep learning framework for indigenous language learning using handwritten characters6
Analysis and visualization of fraud detection patterns through data mining and classification using MLP and hybrid deep learning model6
Enhancing IoT security and healthcare data protection in the metaverse: A Dynamic Adaptive Security Mechanism6
Reliable generative interpretable framework for efficient predictive analysis of air quality index6
A multi-objective fuzzy model based on enhanced artificial fish Swarm for multiple RNA sequences alignment6
A comparative survey on LEACH successors clustering algorithms for energy-efficient longevity WSNs6
The quality of service assessment of eMBB and mMTC traffic in a clustered 5G ecosystem of a smart factory6
Energy-aware intelligent scheduling for deadline-constrained workflows in sustainable cloud computing5
Improving scalability, energy efficiency, and cost-effectiveness in Kubernetes clusters using a nonlinear regression-based predictive replica model and ORLE algorithm5
Diagnosis of patellofemoral osteoarthritis using enhanced sequential deep learning techniques5
Configuring the RegTech business model to explore implications of FinTech5
IFC: Editorial5
Attention based rewards in LSTM for detection of stimming behaviour in autistic children5
Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing5
Pattern recognition of omicron variants from amalgamated multi-focus EEG signals and X-ray images using deep transfer learning5
Deep Learning Approach for Age-related Macular Degeneration Detection Using Retinal Images: Efficacy Evaluation of Different Deep Learning Models5
An analysis of acoustic features for accented speech classification5
IFC: Editorial5
Distributed hybrid flowshop scheduling with consistent sublots under delivery time windows: A penalty lot-assisted iterated greedy algorithm5
BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security5
Complex attack detection scheme using history trajectory in internet of vehicles5
A machine learning framework for evaluating basketball player skill development using video analysis5
Improving and simulating urban landscape image recognition using combination optimization and fuzzy K-means algorithm5
Recognizing human activities with the use of Convolutional Block Attention Module5
Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network4
IoT enabled data protection with substitution box for lightweight ciphers4
Edge computing optimization: an enhanced algorithm for efficient caching and latency reduction4
A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks4
Simulation method for disaster mechanism caused by panic emotion of evacuation crowds4
Fuzzy operator infrared image deblurring algorithm for image blurring in dragon boat races4
An IoT-based architecture for human resource management in construction sites using software defined networking (SDN) and game theory4
Spectral analysis of Cupric oxide (CuO) and Graphene Oxide (GO) via machine learning techniques4
Cloud based collaborative data compression technology for power Internet of Things4
MAGRU-PPGO background for optimized haploidentical donor selection in bone marrow transplantation using GAO-based feature filtering4
Social network sentiment classification method combined Chinese text syntax with graph convolutional neural network4
Enhanced breast cancer detection and classification via CAMR-Gabor filters and LSTM: A deep Learning-Based method4
Ensuring quality in software requirement engineering process: A comparative study4
Modeling time delay, external noise and multiple malware infections in wireless sensor networks4
Quantum computing in addressing greenhouse gas emissions: A systematic literature review4
EFFSIP: Efficient forest fire system using IoT and parallel computing4
An innovative approach to advanced voice classification of sacred Quranic recitations through multimodal fusion4
Enhancing wireless sensor network performance through self-tuned fuzzy logic, adaptive palm tree optimization, and Stackelberg Game-Theoretic load balancing: A comprehensive approach for energy effici4
Efficient GDD feature approximation based brain tumour classification and survival analysis model using deep learning4
IFC: Editorial4
An optimal configuration-based trading scheme for profit optimization in wireless networks3
Traffic sign detection and recognition in Jordan based on machine learning and deep learning3
5G network mobility analysis for user equipment3
Proposed machine learning technique based on RIME algorithm for gas prediction: A case study of the Messinian Abu Madi Reservoir, Nile Delta Basin, Egypt3
Learning-based two-phase cooperative optimizer for distributed machine scheduling with heterogeneous factories and order priorities3
A deep fake detection approach for cyber security threat based on deep learning and diffusion-osmosis model3
An encryption method for LAN feedback sharing information based on robust multi-view subspace clustering3
An effective method for global optimization – Improved slime mould algorithm combine multiple strategies3
An intelligent fuzzy reinforcement learning-based routing algorithm with guaranteed latency and bandwidth in SDN: Application of video conferencing services3
Dam water levels prediction using advanced hybrid deep learning model based on Bayesian Optimization approach3
Anomaly detection in graph databases using graph neural networks: Identifying unusual patterns in graphs3
RFID-based location based services framework for alerting on black spots for accident prevention3
A robust and efficient algorithm for graph coloring problem based on Malatya centrality and sequent independent sets3
Determining the optimal number of clusters by Enhanced Gap Statistic in K-mean algorithm3
Botnet sequential activity detection with hybrid analysis2
IFC: Editorial2
Hair removal and lesion segmentation of dermoscopic images for classification of skin cancer using deep neural networks2
A deep learning-orchestrated garlic routing architecture for secure telesurgery operations in healthcare 4.02
En-RfRsK: An ensemble machine learning technique for prognostication of diabetes mellitus2
HIV/AIDS predictive model using random forest based on socio-demographical, biological and behavioral data2
A deep learning-based framework for automatic detection of drug resistance in tuberculosis patients2
Automised flow rule formation by using machine learning in software defined networks based edge computing2
Human action detection considering video segmentation and multi-scale feature fusion2
Machine learning models for enhanced stroke detection and prediction2
IFC: Editorial2
Resource management optimisation of OFDM-IDMA system for 5G multi-tier backhaul networks2
Decentralized and collaborative approach to mobile crowdsensing by implementing continuous feedback between the nodes2
Towards precision medicine in Glioblastoma: Unraveling MGMT methylation status in glioblastoma using adaptive sparse autoencoders2
A robust deep learning pipeline for multi-class cervical cancer cell identification2
Improving healthy food recommender systems through heterogeneous hypergraph learning2
Eeg-based detection of epileptic seizures in patients with disabilities using a novel attention-driven deep learning framework with SHAP interpretability2
Improving medical image classification based on Boosted Beluga Whale Optimizer with Triangular Mutation and Cross Vision transformer models2
Enhancing medical image segmentation through stacked u-net architectures with interconnected convolution layers2
MANET highly efficient clustering technique based on coverage k-means algorithm2
Trust identification through cognitive correlates with emphasizing attention in cloud robotics2
Badminton actions detection from sensor data based on Deep Belief network optimized by Advanced Snake optimizer2
Deepfake detection: Enhancing performance with spatiotemporal texture and deep learning feature fusion2
Multi-task detection of harmful content in code-mixed meme captions using large language models with zero-shot, few-shot, and fine-tuning approaches2
The financial impact of human resources configuration: A quantitative analysis based on modified single candidate optimizer2
A Lightweight malware detection technique based on hybrid fuzzy simulated annealing clustering in Android apps2
Model of functioning of the centralized wireless information ecosystem focused on multimedia streaming2
Energy efficiency in cognitive radio network using cooperative spectrum sensing based on hybrid spectrum handoff2
Symbolic regression and interpretable ensemble learning approach in determining early onset of diabetic peripheral neuropathy2
A real-time framework for opinion spam detection in Arabic social networks2
Impact of yoga asanas on primary dysmenorrhea-EEG band power analysis and deep learning based classification2
A many objective commercial recommendation algorithm via Game-Based core node extraction2
Cyber vulnerabilities detection system in logistics-based IoT data exchange2
A file archival integrity check method based on the BiLSTM + CNN model and deep learning2
A non-invasive computer-aided personalized diagnosis system for Osteopenia and Osteoporosis1
An improved multiobjective evolutionary algorithm for time-dependent vehicle routing problem with time windows1
An optimized feature selection using triangle mutation rule and restart strategy in enhanced slime mould algorithm1
A method for generation of substitution box based on random selection1
TransAdaptNet: a transformer-based adaptive learning model for accurate Monkeypox detection and classification1
Standardization of expected value in gap statistic using Gaussian distribution for optimal number of clusters selection in K-means1
A provably secure two-way authenticated key agreement protocol for IIoT environments1
Proposal to strength image encryption using blockchain and hybrid chaotic-DNA techniques1
Prediction of complex public opinion evolution based on improved multi-objective grey wolf optimizer1
Detecting Arabic sexual harassment using bidirectional long-short-term memory and a temporal convolutional network1
Heart disease prediction using autoencoder and DenseNet architecture1
Community oriented socio-behavioural PentaPlicative Cipher Technique1
Design and optimization of human-machine interaction interface for the intelligent Internet of Things based on deep learning and spatial computing1
A real-time system for monitoring and classification of human falls on stairs using 2.4 GHz XBee3 micro modules with a tri-axial accelerometer and KNN algorithms1
BACAD: AI-based framework for detecting vertical broken access control attacks1
Private blockchain-based encryption framework using computational intelligence approach1
Advancing sustainable supply chain management − integrating blockchain technology for carbon emission reduction1
A novel approach for efficient resource allocation in 6G V2V networks using neighbor-aware greedy algorithm and sweep line model1
0.10817193984985