Egyptian Informatics Journal

Papers
(The median citation count of Egyptian Informatics Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
A survey on sentiment analysis in Urdu: A resource-poor language214
Automatically transforming full length biomedical articles into search queries for retrieving related articles203
Recognizing human activities with the use of Convolutional Block Attention Module195
A proposed secure framework for protecting cloud-based educational systems from hacking107
A resilient image encryption scheme using Laplace transform107
A hybrid contextual framework to predict severity of infectious disease: COVID-19 case study64
DeepSecure watermarking: Hybrid Attention on Attention Net and Deep Belief Net based robust video authentication using Quaternion Curvelet Transform domain60
Synthetic data with neural machine translation for automatic correction in arabic grammar55
A blockchain-based models for student information systems54
A niche-based evolutionary algorithm with dual cooperative archive for solving constrained multi-objective optimization problems43
IFC: Editorial35
Combining machine learning algorithms for personality trait prediction32
Design and development of an effective classifier for medical images based on machine learning and image segmentation32
IFC: Editorial30
Detection of malware in downloaded files using various machine learning models28
IFC: Editorial28
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers27
Evolutionary offloading in an edge environment25
Intelligent SDN to enhance security in IoT networks24
Adopting security maturity model to the organizations’ capability model24
Distributed hybrid flowshop scheduling with consistent sublots under delivery time windows: A penalty lot-assisted iterated greedy algorithm24
Cyber epidemic spread forecasting based on the entropy-extremal dynamic interpretation of the SIR model23
Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides23
Efficient GDD feature approximation based brain tumour classification and survival analysis model using deep learning23
Deep Learning-Assisted Compound Bioactivity Estimation Framework22
Building a trust model system to avoid cloud services reputation attacks22
A new evolutionary algorithm: Learner performance based behavior algorithm21
Contention-based traffic priority MAC protocols in wireless body area networks: A thematic review21
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users20
An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)20
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system19
A genomic rule-based KNN model for fast flux botnet detection19
Predicting the prevalence of lung cancer using feature transformation techniques19
A method for transferring BIM data into domain ontologies: A case study based on airport services19
Prediction the dynamic viscosity of MWCNT-Al2O3 (30:70)/ Oil 5W50 hybrid nano-lubricant using Principal Component Analysis (PCA) with Artificial Neural Network (ANN)18
CoTNeT: Contextual transformer network for encrypted traffic classification17
An intelligent optimization strategy for nurse-patient scheduling in the Internet of Medical Things applications17
Configuring the RegTech business model to explore implications of FinTech16
Molding robust S-box design based on linear fractional transformation and multilayer Perceptron: Applications to multimedia security16
Classification feature selection and dimensionality reduction based on logical binary sine-cosine function arithmetic optimization algorithm16
Security and privacy of electronic health records: Concerns and challenges15
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)14
Blockchain and big data integration design for traceability and carbon footprint management in the fishery supply chain14
Trajectory control and image encryption using affine transformation of lorenz system14
Towards developing a Block Chain based Advanced Data Security-Reward Model (DSecCS) in mobile crowd sensing networks14
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system14
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks14
IFC: Editorial13
A speech separation system in video sequence using dilated inception network and U-Net13
IFC: Editorial13
Aligning document layouts extracted with different OCR engines with clustering approach12
A simple Galois Power-of-Two real time embedding scheme for performing Arabic morphology deep learning tasks12
Modeling time delay, external noise and multiple malware infections in wireless sensor networks12
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks12
An improvised nature-inspired algorithm enfolded broad learning system for disease classification11
Social network sentiment classification method combined Chinese text syntax with graph convolutional neural network11
Efficient framework for detecting COVID-19 and pneumonia from chest X-ray using deep convolutional network11
RETRACTED: ODRNN: Optimized Deep Recurrent Neural Networks for Automatic Detection of Leukaemia11
Toward secret data location via fuzzy logic and convolutional neural network10
iFogRep: An intelligent consistent approach for replication and placement of IoT based on fog computing10
Modeling of blockchain with encryption based secure education record management system10
Wireless battery recharging through UAV in wireless sensor networks10
Smart Traffic Scheduling for Crowded Cities Road Networks10
A federated learning model for intelligent cattle health monitoring system using body area sensors and IoT9
A multi-dimensional framework for improving data reliability in mobile crowd sensing9
Cluster-based anonymity model and algorithm for 1:1 dataset with a single sensitive attribute using machine learning technique9
A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks9
Grey Wolf Optimization algorithm with random local optimal regulation and first-element dominance9
Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks8
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications8
Enhanced threat intelligence framework for advanced cybersecurity resilience8
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer8
IFC: Editorial8
A weighted Markov-clustering routing protocol for optimizing energy use in wireless sensor networks8
YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information8
A new fusion of mutual information and Otsu multilevel thresholding technique for hyperspectral band selection7
Fuzzy operator infrared image deblurring algorithm for image blurring in dragon boat races7
Ransomware detection based on machine learning using memory features7
The best angle correction of basketball shooting based on the fusion of time series features and dual CNN7
Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization7
Multi-fuzzy clustering validity index ensemble: A Dempster-Shafer theory-based parallel and series fusion7
Expression of Concern: “BSDN-HMTD: A blockchain supported SDN framework for detecting DDoS attacks using deep learning method” [Egypt. Infor. J. 27 (2024) 100515]7
Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems6
Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics6
A clustering approach for classifying scholars based on publication performance using bibliometric data6
Retrieval of behavior trees using map-and-reduce technique6
IFC: Editorial6
Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network6
A fully automatic fine tuned deep learning model for knee osteoarthritis detection and progression analysis6
TGT: A Novel Adversarial Guided Oversampling Technique for Handling Imbalanced Datasets6
Enabling recommendation system architecture in virtualized environment for e-learning6
Adaptive batch mode active learning with deep similarity6
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods6
Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks6
A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster6
Intelligent deep analysis of DNA sequences based on FFGM to enhancement the performance and reduce the computation6
PERS: Personalized environment recommendation system based on vital signs5
Low complexity design of bit parallel polynomial basis systolic multiplier using irreducible polynomials5
Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms5
A proposed authentication and group-key distribution model for data warehouse signature, DWS framework5
Security-aware dynamic VM consolidation5
Game theory based node clustering for cognitive radio wireless sensor networks5
Bi-parametric distance and similarity measures of picture fuzzy sets and their applications in medical diagnosis5
A study of Isual perceptual target monitoring in graphic design based on Multi-Task structured learning and interaction mapping5
IFC: Editorial5
A CR-5G network based on multi-user for various waveforms detection5
IFC: Editorial5
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection4
Permutation-based frame synchronization method for data transmission systems with short packets4
Trust identification through cognitive correlates with emphasizing attention in cloud robotics4
MalRed: An innovative approach for detecting malware using the red channel analysis of color images4
Email spam detection by deep learning models using novel feature selection technique and BERT4
A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism4
Reliable prediction of software defects using Shapley interpretable machine learning models4
Hybridized classification algorithms for data classification applications: A review4
Predict student learning styles and suitable assessment methods using click stream4
Model of the information security protection subsystem operation and method of optimization of its composition4
Local dynamic neighborhood based outlier detection approach and its framework for large-scale datasets4
A hybridization of granular adaptive tabu search with path relinking for the multi-depot open vehicle routing problem4
A two-hop neighbor preference-based random network graph model with high clustering coefficient for modeling real-world complex networks4
IFC: Editorial4
A shallow 3D convolutional neural network for violence detection in videos4
Lane prediction optimization in VANET3
Writer adaptation for E2E Arabic online handwriting recognition via adversarial multi task learning3
RFID-based location based services framework for alerting on black spots for accident prevention3
Enhancing DDoS attack detection in IoT using PCA3
Mutual learning differential particle swarm optimization3
‘Retraction notice to “ODRNN: Optimized deep recurrent neural networks for automatic detection of leukaemia” [Egypt. Inform. J. 26 (2024) 100453]’3
Evaluation of Boruta algorithm in DDoS detection3
An optimal configuration-based trading scheme for profit optimization in wireless networks3
Learning-based two-phase cooperative optimizer for distributed machine scheduling with heterogeneous factories and order priorities3
Read my lips: Artificial intelligence word-level arabic lipreading system3
Enhanced concept-level sentiment analysis system with expanded ontological relations for efficient classification of user reviews3
A hybrid deep learning-based framework for future terrorist activities modeling and prediction3
Optimization of accuracy in estimating the dynamic viscosity of MWCNT-CuO/oil 10W40 nano-lubricants3
A fast ADMM algorithm for sparse precision matrix estimation using lasso penalized D-trace loss3
Dual subpopulation artificial bee colony algorithm based on individual gradation3
Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches2
Blockchain-supported online banking scheme2
The impact of synthetic text generation for sentiment analysis using GAN based models2
Optimizing flexible job shop scheduling with automated guided vehicles using a multi-strategy-driven genetic algorithm2
Solving dynamic vehicle routing problem with time windows by ant colony system with bipartite graph matching2
Efficient and Secure Color Image Encryption System with Enhanced Speed and Robustness Based on Binary Tree2
Determining the optimal number of clusters by Enhanced Gap Statistic in K-mean algorithm2
An intelligent fuzzy reinforcement learning-based routing algorithm with guaranteed latency and bandwidth in SDN: Application of video conferencing services2
An effective method for global optimization – Improved slime mould algorithm combine multiple strategies2
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities2
LBCC-Hung: A load balancing protocol for cloud computing based on Hungarian method2
Data fusion for driver drowsiness recognition: A multimodal perspective2
Enhancing medical image classification via federated learning and pre-trained model2
The fuzzy common vulnerability scoring system (F-CVSS) based on a least squares approach with fuzzy logistic regression2
Design of security management model for communication networks in digital cultural consumption under Metaverse – The case of mobile game2
Heart disease prediction using autoencoder and DenseNet architecture1
TBMOR: A lightweight trust-based model for secure routing of opportunistic networks1
HD-MVCNN: High-density ECG signal based diabetic prediction and classification using multi-view convolutional neural network1
Cyber vulnerabilities detection system in logistics-based IoT data exchange1
Enhancing cooperation in MANET using neighborhood compressive sensing model1
Provably throttling SQLI using an enciphering query and secure matching1
Knowledge graph completion method based on hyperbolic representation learning and contrastive learning1
Anomaly Detection and Bottleneck Identification of The Distributed Application in Cloud Data Center using Software–Defined Networking1
A 3D-convolutional neural network framework with ensemble learning techniques for multi-modal emotion recognition1
Deployment of an intelligent and secure cattle health monitoring system1
A private Ethereum blockchain for organ donation and transplantation based on intelligent smart contracts1
An improved multiobjective evolutionary algorithm for time-dependent vehicle routing problem with time windows1
Joint non-negative and fuzzy coding with graph regularization for efficient data clustering1
A deep learning-based framework for automatic detection of drug resistance in tuberculosis patients1
Cyber threat attribution using unstructured reports in cyber threat intelligence1
Community oriented socio-behavioural PentaPlicative Cipher Technique1
Energy efficiency in cognitive radio network using cooperative spectrum sensing based on hybrid spectrum handoff1
Optimizing microarray cancer gene selection using swarm intelligence: Recent developments and an exploratory study1
HIV/AIDS predictive model using random forest based on socio-demographical, biological and behavioral data1
A novel interest drift sensitivity academic paper recommender based on implicit feedback1
BACAD: AI-based framework for detecting vertical broken access control attacks1
Interval valued inventory model with different payment strategies for green products under interval valued Grey Wolf optimizer Algorithm fitness function1
Road detection by using gradient magnitude image and adaptive thresholding based Watershed1
Exploring business intelligence applications in the healthcare industry: A comprehensive analysis1
Diagonalize three-dimensional nonlinear chaotic map to encrypt color image1
Workflow migration in uncertain edge computing environments based on interval many-objective evolutionary algorithm1
IoT security system with modified Zero Knowledge Proof algorithm for authentication1
Implementing MRCRLB technique on modulation schemes in wireless rechargeable sensor networks1
Delay probability in adaptive systems based on activation function of classical neural networks1
0.045777082443237