Egyptian Informatics Journal

Papers
(The TQCC of Egyptian Informatics Journal is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Security and privacy of electronic health records: Concerns and challenges214
Smart cities: Fusion-based intelligent traffic congestion control system for vehicular networks using machine learning techniques203
A predictive machine learning application in agriculture: Cassava disease detection and classification with imbalanced dataset using convolutional neural networks195
Internet of things and ransomware: Evolution, mitigation and prevention107
BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security107
A new evolutionary algorithm: Learner performance based behavior algorithm64
A 3D-convolutional neural network framework with ensemble learning techniques for multi-modal emotion recognition60
Private blockchain-based encryption framework using computational intelligence approach55
Bi-parametric distance and similarity measures of picture fuzzy sets and their applications in medical diagnosis54
A novel optimization algorithm (Lion-AYAD) to find optimal DNA protein synthesis42
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)35
Enabling recommendation system architecture in virtualized environment for e-learning32
A survey on sentiment analysis in Urdu: A resource-poor language32
Survey on spectrum sharing/allocation for cognitive radio networks Internet of Things32
The impact of using different annotation schemes on named entity recognition28
AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT27
AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment27
Classification and comparison of ad hoc networks: A review26
HMATC: Hierarchical multi-label Arabic text classification model using machine learning25
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods24
Social network sentiment classification method combined Chinese text syntax with graph convolutional neural network24
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system24
Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior23
Deep learning based fusion strategies for personality prediction23
Synthetic data with neural machine translation for automatic correction in arabic grammar23
IoT security system with modified Zero Knowledge Proof algorithm for authentication22
Iris based cancelable biometric cryptosystem for secure healthcare smart card21
Toward secret data location via fuzzy logic and convolutional neural network21
A method for generation of substitution box based on random selection20
Hybridized classification algorithms for data classification applications: A review20
Enhanced concept-level sentiment analysis system with expanded ontological relations for efficient classification of user reviews20
A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism19
The impact of synthetic text generation for sentiment analysis using GAN based models19
Hierarchical blockchain structure for node authentication in IoT networks19
A blockchain-based models for student information systems19
A fully automatic fine tuned deep learning model for knee osteoarthritis detection and progression analysis18
Evolutionary offloading in an edge environment17
An Improved Task Allocation Strategy in Cloud using Modified K-means Clustering Technique17
Energy efficiency in cognitive radio network using cooperative spectrum sensing based on hybrid spectrum handoff17
Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system16
An intelligent use of stemmer and morphology analysis for Arabic information retrieval16
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks16
Prediction the dynamic viscosity of MWCNT-Al2O3 (30:70)/ Oil 5W50 hybrid nano-lubricant using Principal Component Analysis (PCA) with Artificial Neural Network (ANN)16
Adopting security maturity model to the organizations’ capability model15
An approach based on the ifcOWL ontology to support indoor navigation14
Smart Traffic Scheduling for Crowded Cities Road Networks14
Detecting suicidality on social media: Machine learning at rescue14
Trajectory control and image encryption using affine transformation of lorenz system14
Mutual authentication of nodes using session token with fingerprint and MAC address validation14
Intelligent deep analysis of DNA sequences based on FFGM to enhancement the performance and reduce the computation14
An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)13
Deployment of an intelligent and secure cattle health monitoring system13
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection13
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks12
A weighted Markov-clustering routing protocol for optimizing energy use in wireless sensor networks12
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system12
Systematic literature review and analysis for Arabic text steganography method practically12
An efficient machine-learning model based on data augmentation for pain intensity recognition12
Lane prediction optimization in VANET11
A comparative study of hybrid estimation distribution algorithms in solving the facility layout problem11
Modeling time delay, external noise and multiple malware infections in wireless sensor networks11
Anomaly Detection and Bottleneck Identification of The Distributed Application in Cloud Data Center using Software–Defined Networking11
AutismOnt: An Ontology-Driven Decision Support For Autism Diagnosis and Treatment10
Detection of malware in downloaded files using various machine learning models10
Automised flow rule formation by using machine learning in software defined networks based edge computing10
A novel approach for detecting advanced persistent threats10
Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks10
BPR algorithm: New broken plural rules for an Arabic stemmer9
Building a trust model system to avoid cloud services reputation attacks9
Efficient privacy-preservation scheme for securing urban P2P VANET networks9
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers9
iFogRep: An intelligent consistent approach for replication and placement of IoT based on fog computing9
0.019229173660278