Egyptian Informatics Journal

Papers
(The median citation count of Egyptian Informatics Journal is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Smart cities: Fusion-based intelligent traffic congestion control system for vehicular networks using machine learning techniques172
A predictive machine learning application in agriculture: Cassava disease detection and classification with imbalanced dataset using convolutional neural networks158
Security and privacy of electronic health records: Concerns and challenges135
Internet of things and ransomware: Evolution, mitigation and prevention98
BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security65
Extractive Arabic Text Summarization Using Modified PageRank Algorithm56
A new evolutionary algorithm: Learner performance based behavior algorithm55
Extractive multi-document text summarization based on graph independent sets54
Bi-parametric distance and similarity measures of picture fuzzy sets and their applications in medical diagnosis53
A 3D-convolutional neural network framework with ensemble learning techniques for multi-modal emotion recognition52
Private blockchain-based encryption framework using computational intelligence approach46
A novel optimization algorithm (Lion-AYAD) to find optimal DNA protein synthesis35
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)32
A survey on sentiment analysis in Urdu: A resource-poor language30
Detection outliers on internet of things using big data technology29
Survey on spectrum sharing/allocation for cognitive radio networks Internet of Things27
Enabling recommendation system architecture in virtualized environment for e-learning26
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system24
The impact of using different annotation schemes on named entity recognition24
AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment23
HMATC: Hierarchical multi-label Arabic text classification model using machine learning23
AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT23
Social network sentiment classification method combined Chinese text syntax with graph convolutional neural network21
Synthetic data with neural machine translation for automatic correction in arabic grammar19
IoT security system with modified Zero Knowledge Proof algorithm for authentication19
Enhanced concept-level sentiment analysis system with expanded ontological relations for efficient classification of user reviews19
A blockchain-based models for student information systems18
Iris based cancelable biometric cryptosystem for secure healthcare smart card18
A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism16
Evolutionary offloading in an edge environment16
Deep learning based fusion strategies for personality prediction16
Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior15
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods15
Hybridized classification algorithms for data classification applications: A review15
An intelligent use of stemmer and morphology analysis for Arabic information retrieval15
Hierarchical blockchain structure for node authentication in IoT networks15
Toward secret data location via fuzzy logic and convolutional neural network15
Trajectory control and image encryption using affine transformation of lorenz system14
Mutual authentication of nodes using session token with fingerprint and MAC address validation14
The impacts of social media on University students in Iraq14
An Improved Task Allocation Strategy in Cloud using Modified K-means Clustering Technique14
An approach based on the ifcOWL ontology to support indoor navigation14
A method for generation of substitution box based on random selection14
Adopting security maturity model to the organizations’ capability model13
The impact of synthetic text generation for sentiment analysis using GAN based models13
NOMA based CR for QAM-64 and QAM-25613
An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)12
Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system12
Energy efficiency in cognitive radio network using cooperative spectrum sensing based on hybrid spectrum handoff12
Prediction the dynamic viscosity of MWCNT-Al2O3 (30:70)/ Oil 5W50 hybrid nano-lubricant using Principal Component Analysis (PCA) with Artificial Neural Network (ANN)11
Intelligent deep analysis of DNA sequences based on FFGM to enhancement the performance and reduce the computation11
An efficient machine-learning model based on data augmentation for pain intensity recognition11
Gender identification for Egyptian Arabic dialect in twitter using deep learning models10
AutismOnt: An Ontology-Driven Decision Support For Autism Diagnosis and Treatment10
Classification and comparison of ad hoc networks: A review10
A comparative study of hybrid estimation distribution algorithms in solving the facility layout problem9
Automised flow rule formation by using machine learning in software defined networks based edge computing9
Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks9
Building a trust model system to avoid cloud services reputation attacks9
Detecting suicidality on social media: Machine learning at rescue9
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection9
Modeling time delay, external noise and multiple malware infections in wireless sensor networks9
BPR algorithm: New broken plural rules for an Arabic stemmer9
Anomaly Detection and Bottleneck Identification of The Distributed Application in Cloud Data Center using Software–Defined Networking9
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks9
Smart Traffic Scheduling for Crowded Cities Road Networks9
Efficient privacy-preservation scheme for securing urban P2P VANET networks8
Lane prediction optimization in VANET8
The fuzzy common vulnerability scoring system (F-CVSS) based on a least squares approach with fuzzy logistic regression7
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks7
A novel approach for detecting advanced persistent threats7
Detection of malware in downloaded files using various machine learning models7
An improved Image Interpolation technique using OLA e-spline6
Efficient framework for detecting COVID-19 and pneumonia from chest X-ray using deep convolutional network6
A genomic rule-based KNN model for fast flux botnet detection6
Deployment of an intelligent and secure cattle health monitoring system6
Formal verification for a PMQTT protocol6
Systematic literature review and analysis for Arabic text steganography method practically6
A weighted Markov-clustering routing protocol for optimizing energy use in wireless sensor networks6
A novel solution for a Wireless Body Sensor Network: Telehealth elderly people monitoring6
Click fraud detection for online advertising using machine learning5
A comprehensive analysis of the correlation between maximal clique size and centrality metrics for complex network graphs5
A hybrid deep learning-based framework for future terrorist activities modeling and prediction5
Security-aware dynamic VM consolidation5
A novel crypto technique based ciphertext shifting5
Towards developing a Block Chain based Advanced Data Security-Reward Model (DSecCS) in mobile crowd sensing networks5
AgroSupportAnalytics: A Cloud-based Complaints Management and Decision Support System for Sustainable Farming in Egypt5
Model of functioning of the centralized wireless information ecosystem focused on multimedia streaming5
Model of the information security protection subsystem operation and method of optimization of its composition5
Mutual learning differential particle swarm optimization5
Permutation-based frame synchronization method for data transmission systems with short packets5
Wireless battery recharging through UAV in wireless sensor networks5
Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic5
Implementing MRCRLB technique on modulation schemes in wireless rechargeable sensor networks5
Game theory based node clustering for cognitive radio wireless sensor networks5
Introducing languid particle dynamics to a selection of PSO variants5
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system5
Forensic analysis and security assessment of IoT camera firmware for smart homes4
Cyber threat attribution using unstructured reports in cyber threat intelligence4
An optimal configuration-based trading scheme for profit optimization in wireless networks4
A fully automatic fine tuned deep learning model for knee osteoarthritis detection and progression analysis4
Analysis of wavelength reservation based quality of service differentiation in optical burst switching networks using Markov model4
Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework4
A deep learning-based framework for automatic detection of drug resistance in tuberculosis patients4
Trust identification through cognitive correlates with emphasizing attention in cloud robotics4
iFogRep: An intelligent consistent approach for replication and placement of IoT based on fog computing4
Minimizing tardiness and makespan for distributed heterogeneous unrelated parallel machine scheduling by knowledge and Pareto-based memetic algorithm4
Psychological Human Traits Detection based on Universal Language Modeling4
Enhancing cooperation in MANET using neighborhood compressive sensing model4
Local dynamic neighborhood based outlier detection approach and its framework for large-scale datasets4
Research on smart city data encryption and communication efficiency improvement under federated learning framework3
Provably throttling SQLI using an enciphering query and secure matching3
Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms3
Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization3
Predicting the prevalence of lung cancer using feature transformation techniques3
Detecting software performance problems using source code analysis techniques3
A novel enhanced hybrid recursive algorithm: Image processing based augmented reality for gallbladder and uterus visualisation3
Low complexity design of bit parallel polynomial basis systolic multiplier using irreducible polynomials3
Aligning document layouts extracted with different OCR engines with clustering approach3
Federated learning optimization: A computational blockchain process with offloading analysis to enhance security3
Prediction of complex public opinion evolution based on improved multi-objective grey wolf optimizer3
Evaluation of Boruta algorithm in DDoS detection3
Retrieval of behavior trees using map-and-reduce technique3
A method for transferring BIM data into domain ontologies: A case study based on airport services3
0.026731967926025