Egyptian Informatics Journal

Papers
(The TQCC of Egyptian Informatics Journal is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
A survey on sentiment analysis in Urdu: A resource-poor language214
Automatically transforming full length biomedical articles into search queries for retrieving related articles203
Recognizing human activities with the use of Convolutional Block Attention Module195
A proposed secure framework for protecting cloud-based educational systems from hacking107
A resilient image encryption scheme using Laplace transform107
A hybrid contextual framework to predict severity of infectious disease: COVID-19 case study64
DeepSecure watermarking: Hybrid Attention on Attention Net and Deep Belief Net based robust video authentication using Quaternion Curvelet Transform domain60
Synthetic data with neural machine translation for automatic correction in arabic grammar55
A blockchain-based models for student information systems54
A niche-based evolutionary algorithm with dual cooperative archive for solving constrained multi-objective optimization problems43
IFC: Editorial35
Combining machine learning algorithms for personality trait prediction32
Design and development of an effective classifier for medical images based on machine learning and image segmentation32
IFC: Editorial30
Detection of malware in downloaded files using various machine learning models28
IFC: Editorial28
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers27
Evolutionary offloading in an edge environment25
Adopting security maturity model to the organizations’ capability model24
Distributed hybrid flowshop scheduling with consistent sublots under delivery time windows: A penalty lot-assisted iterated greedy algorithm24
Intelligent SDN to enhance security in IoT networks24
Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides23
Efficient GDD feature approximation based brain tumour classification and survival analysis model using deep learning23
Cyber epidemic spread forecasting based on the entropy-extremal dynamic interpretation of the SIR model23
Building a trust model system to avoid cloud services reputation attacks22
Deep Learning-Assisted Compound Bioactivity Estimation Framework22
A new evolutionary algorithm: Learner performance based behavior algorithm21
Contention-based traffic priority MAC protocols in wireless body area networks: A thematic review21
An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)20
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users20
A genomic rule-based KNN model for fast flux botnet detection19
Predicting the prevalence of lung cancer using feature transformation techniques19
A method for transferring BIM data into domain ontologies: A case study based on airport services19
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system19
Prediction the dynamic viscosity of MWCNT-Al2O3 (30:70)/ Oil 5W50 hybrid nano-lubricant using Principal Component Analysis (PCA) with Artificial Neural Network (ANN)18
CoTNeT: Contextual transformer network for encrypted traffic classification17
An intelligent optimization strategy for nurse-patient scheduling in the Internet of Medical Things applications17
Configuring the RegTech business model to explore implications of FinTech16
Molding robust S-box design based on linear fractional transformation and multilayer Perceptron: Applications to multimedia security16
Classification feature selection and dimensionality reduction based on logical binary sine-cosine function arithmetic optimization algorithm16
Security and privacy of electronic health records: Concerns and challenges15
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)14
Blockchain and big data integration design for traceability and carbon footprint management in the fishery supply chain14
Trajectory control and image encryption using affine transformation of lorenz system14
Towards developing a Block Chain based Advanced Data Security-Reward Model (DSecCS) in mobile crowd sensing networks14
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system14
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks14
IFC: Editorial13
A speech separation system in video sequence using dilated inception network and U-Net13
IFC: Editorial13
A simple Galois Power-of-Two real time embedding scheme for performing Arabic morphology deep learning tasks12
Modeling time delay, external noise and multiple malware infections in wireless sensor networks12
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks12
Aligning document layouts extracted with different OCR engines with clustering approach12
Efficient framework for detecting COVID-19 and pneumonia from chest X-ray using deep convolutional network11
RETRACTED: ODRNN: Optimized Deep Recurrent Neural Networks for Automatic Detection of Leukaemia11
An improvised nature-inspired algorithm enfolded broad learning system for disease classification11
Social network sentiment classification method combined Chinese text syntax with graph convolutional neural network11
iFogRep: An intelligent consistent approach for replication and placement of IoT based on fog computing10
Modeling of blockchain with encryption based secure education record management system10
Wireless battery recharging through UAV in wireless sensor networks10
Smart Traffic Scheduling for Crowded Cities Road Networks10
Toward secret data location via fuzzy logic and convolutional neural network10
Cluster-based anonymity model and algorithm for 1:1 dataset with a single sensitive attribute using machine learning technique9
A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks9
Grey Wolf Optimization algorithm with random local optimal regulation and first-element dominance9
A federated learning model for intelligent cattle health monitoring system using body area sensors and IoT9
A multi-dimensional framework for improving data reliability in mobile crowd sensing9
Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks8
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications8
Enhanced threat intelligence framework for advanced cybersecurity resilience8
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer8
IFC: Editorial8
A weighted Markov-clustering routing protocol for optimizing energy use in wireless sensor networks8
YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information8
A new fusion of mutual information and Otsu multilevel thresholding technique for hyperspectral band selection7
Fuzzy operator infrared image deblurring algorithm for image blurring in dragon boat races7
Ransomware detection based on machine learning using memory features7
The best angle correction of basketball shooting based on the fusion of time series features and dual CNN7
Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization7
Multi-fuzzy clustering validity index ensemble: A Dempster-Shafer theory-based parallel and series fusion7
Expression of Concern: “BSDN-HMTD: A blockchain supported SDN framework for detecting DDoS attacks using deep learning method” [Egypt. Infor. J. 27 (2024) 100515]7
0.07499098777771