Egyptian Informatics Journal

Papers
(The TQCC of Egyptian Informatics Journal is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
IFC: Editorial273
Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides238
A resilient image encryption scheme using Laplace transform155
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users74
CoTNeT: Contextual transformer network for encrypted traffic classification72
A blockchain-based models for student information systems62
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system60
High-accuracy lung disease classification via logistic regression and advanced feature extraction techniques46
Precision blood pressure prediction leveraging Photoplethysmograph signals using Support Vector Regression43
An improvised nature-inspired algorithm enfolded broad learning system for disease classification40
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer37
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system35
Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems34
Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks32
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks32
Advanced colon cancer detection: Integrating context-aware multi-image fusion (Camif) in a multi-stage framework31
Ransomware detection based on machine learning using memory features31
Enhanced threat intelligence framework for advanced cybersecurity resilience30
IFC: Editorial30
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)28
The fuzzy common vulnerability scoring system (F-CVSS) based on a least squares approach with fuzzy logistic regression28
Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization28
Advanced segmentation method for integrating multi-omics data for early cancer detection27
Graph Sample and Aggregate-Attention network optimized for automatic translation of five line stanzas of Tang poems to poetic language27
Optimizing fault prediction in software based on MnasNet/LSTM optimized by an improved lotus flower algorithm27
Email spam detection by deep learning models using novel feature selection technique and BERT26
Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches25
Blockchain-supported online banking scheme25
Enhancing DDoS attack detection in IoT using PCA25
Model of the information security protection subsystem operation and method of optimization of its composition24
Bi-parametric distance and similarity measures of picture fuzzy sets and their applications in medical diagnosis24
A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster23
‘Retraction notice to “ODRNN: Optimized deep recurrent neural networks for automatic detection of leukaemia” [Egypt. Inform. J. 26 (2024) 100453]’23
A two-hop neighbor preference-based random network graph model with high clustering coefficient for modeling real-world complex networks22
A shallow 3D convolutional neural network for violence detection in videos22
LBCC-Hung: A load balancing protocol for cloud computing based on Hungarian method22
A study of Isual perceptual target monitoring in graphic design based on Multi-Task structured learning and interaction mapping21
PERS: Personalized environment recommendation system based on vital signs21
Enhanced concept-level sentiment analysis system with expanded ontological relations for efficient classification of user reviews21
Corrigendum to “A hybrid deep learning-based framework for future terrorist activities modeling and prediction” [Egypt. Inform. J. 23(3) 2022, 437–446]20
A novel interest drift sensitivity academic paper recommender based on implicit feedback19
Provably throttling SQLI using an enciphering query and secure matching19
Delay probability in adaptive systems based on activation function of classical neural networks18
Lightweight authentication protocol for connected medical IoT through privacy-preserving access17
MC-ShuffleNetV2: A lightweight model for maize disease recognition16
Workflow migration in uncertain edge computing environments based on interval many-objective evolutionary algorithm16
Interval valued inventory model with different payment strategies for green products under interval valued Grey Wolf optimizer Algorithm fitness function16
IFC: Editorial15
AutismOnt: An Ontology-Driven Decision Support For Autism Diagnosis and Treatment15
IFC: Editorial15
A comparative study of hybrid estimation distribution algorithms in solving the facility layout problem15
A machine learning neural network architecture for the accelerating universe based modified gravity14
A road lane detection approach based on reformer model14
Proactive threat hunting to detect persistent behaviour-based advanced adversaries14
Machine learning algorithms in proactive decision making for handover management from 5G & beyond 5G14
Machine learning RNNs, SVM and NN Algorithm for Massive-MIMO-OTFS 6G Waveform with Rician and Rayleigh channel13
Optimal scheduling of solar-surface water source heat pump system based on an improved arithmetic optimization algorithm13
Evolutionary approach for composing a thoroughly optimized ensemble of regression neural networks13
A genomic rule-based KNN model for fast flux botnet detection13
An optimal defect recognition security-based terahertz low resolution image system using deep learning network13
IFC: Editorial12
Building a trust model system to avoid cloud services reputation attacks12
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers12
Design and development of an effective classifier for medical images based on machine learning and image segmentation12
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods11
Combining machine learning algorithms for personality trait prediction11
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications11
Investigating feature extraction by SIFT methods for prostate cancer early detection11
A speech separation system in video sequence using dilated inception network and U-Net11
Security-aware dynamic VM consolidation11
Solving dynamic vehicle routing problem with time windows by ant colony system with bipartite graph matching11
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks11
YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information11
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection10
IFC: Editorial10
Predict student learning styles and suitable assessment methods using click stream10
TGT: A Novel Adversarial Guided Oversampling Technique for Handling Imbalanced Datasets10
A 3D-convolutional neural network framework with ensemble learning techniques for multi-modal emotion recognition10
Reliable prediction of software defects using Shapley interpretable machine learning models10
A proposed authentication and group-key distribution model for data warehouse signature, DWS framework10
Diagonalize three-dimensional nonlinear chaotic map to encrypt color image9
Deep hybrid approach with sequential feature extraction and classification for robust malware detection9
Self-ChakmaNet: A deep learning framework for indigenous language learning using handwritten characters9
A knowledge graph based intelligent auxiliary diagnosis and treatment system for primary tinnitus using traditional Chinese medicine9
An automated quantitative investment model of stock selection and market timing based on industry information9
A private Ethereum blockchain for organ donation and transplantation based on intelligent smart contracts9
The impact of synthetic text generation for sentiment analysis using GAN based models9
Improving intrusion detection using LSTM-RNN to protect drones’ networks9
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities9
0.062140941619873