Egyptian Informatics Journal

Papers
(The TQCC of Egyptian Informatics Journal is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Smart cities: Fusion-based intelligent traffic congestion control system for vehicular networks using machine learning techniques172
A predictive machine learning application in agriculture: Cassava disease detection and classification with imbalanced dataset using convolutional neural networks158
Security and privacy of electronic health records: Concerns and challenges135
Internet of things and ransomware: Evolution, mitigation and prevention98
BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security65
Extractive Arabic Text Summarization Using Modified PageRank Algorithm56
A new evolutionary algorithm: Learner performance based behavior algorithm55
Extractive multi-document text summarization based on graph independent sets54
Bi-parametric distance and similarity measures of picture fuzzy sets and their applications in medical diagnosis53
A 3D-convolutional neural network framework with ensemble learning techniques for multi-modal emotion recognition52
Private blockchain-based encryption framework using computational intelligence approach46
A novel optimization algorithm (Lion-AYAD) to find optimal DNA protein synthesis35
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)32
A survey on sentiment analysis in Urdu: A resource-poor language30
Detection outliers on internet of things using big data technology29
Survey on spectrum sharing/allocation for cognitive radio networks Internet of Things27
Enabling recommendation system architecture in virtualized environment for e-learning26
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system24
The impact of using different annotation schemes on named entity recognition24
AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment23
HMATC: Hierarchical multi-label Arabic text classification model using machine learning23
AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT23
Social network sentiment classification method combined Chinese text syntax with graph convolutional neural network21
Synthetic data with neural machine translation for automatic correction in arabic grammar19
IoT security system with modified Zero Knowledge Proof algorithm for authentication19
Enhanced concept-level sentiment analysis system with expanded ontological relations for efficient classification of user reviews19
A blockchain-based models for student information systems18
Iris based cancelable biometric cryptosystem for secure healthcare smart card18
Evolutionary offloading in an edge environment16
Deep learning based fusion strategies for personality prediction16
A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism16
Hybridized classification algorithms for data classification applications: A review15
An intelligent use of stemmer and morphology analysis for Arabic information retrieval15
Hierarchical blockchain structure for node authentication in IoT networks15
Toward secret data location via fuzzy logic and convolutional neural network15
Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior15
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods15
Mutual authentication of nodes using session token with fingerprint and MAC address validation14
The impacts of social media on University students in Iraq14
An Improved Task Allocation Strategy in Cloud using Modified K-means Clustering Technique14
An approach based on the ifcOWL ontology to support indoor navigation14
A method for generation of substitution box based on random selection14
Trajectory control and image encryption using affine transformation of lorenz system14
Adopting security maturity model to the organizations’ capability model13
The impact of synthetic text generation for sentiment analysis using GAN based models13
NOMA based CR for QAM-64 and QAM-25613
An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)12
Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system12
Energy efficiency in cognitive radio network using cooperative spectrum sensing based on hybrid spectrum handoff12
Prediction the dynamic viscosity of MWCNT-Al2O3 (30:70)/ Oil 5W50 hybrid nano-lubricant using Principal Component Analysis (PCA) with Artificial Neural Network (ANN)11
Intelligent deep analysis of DNA sequences based on FFGM to enhancement the performance and reduce the computation11
An efficient machine-learning model based on data augmentation for pain intensity recognition11
Gender identification for Egyptian Arabic dialect in twitter using deep learning models10
AutismOnt: An Ontology-Driven Decision Support For Autism Diagnosis and Treatment10
Classification and comparison of ad hoc networks: A review10
Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks9
Building a trust model system to avoid cloud services reputation attacks9
Detecting suicidality on social media: Machine learning at rescue9
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection9
Modeling time delay, external noise and multiple malware infections in wireless sensor networks9
BPR algorithm: New broken plural rules for an Arabic stemmer9
Anomaly Detection and Bottleneck Identification of The Distributed Application in Cloud Data Center using Software–Defined Networking9
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks9
Smart Traffic Scheduling for Crowded Cities Road Networks9
A comparative study of hybrid estimation distribution algorithms in solving the facility layout problem9
Automised flow rule formation by using machine learning in software defined networks based edge computing9
0.02295708656311