Egyptian Informatics Journal

Papers
(The TQCC of Egyptian Informatics Journal is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
IFC: Editorial300
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users227
Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides85
High-accuracy lung disease classification via logistic regression and advanced feature extraction techniques59
TriPlaNet: Enhancing machine-paraphrasing plagiarism detection through triplet network and contrastive learning58
Corrigendum to “Intrusion detection system framework for cyber-physical systems” [Egypt. Inform. J. 30 (2025) 100600]57
CoTNeT: Contextual transformer network for encrypted traffic classification51
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system49
Precision blood pressure prediction leveraging Photoplethysmograph signals using Support Vector Regression47
A multi-module approach to evaluate online teaching quality in international Chinese education43
Detection cyberbullying using AI and sentiment analysis to examine psychological impacts on vulnerable groups42
HAMNet: Hierarchical Attention-enhanced Molecular Hypergraph Network for medication recommendation with data imbalance mitigation41
Graph centrality and deep learning for enhanced portfolio management40
Wavelet-Based EEG classification of neural responses to applied pressure physiotherapy40
A resilient image encryption scheme using Laplace transform39
Causal inference and explainable machine learning for analyzing treatment side effect in metastatic castration-resistant prostate cancer patients38
Multiform-based evolutionary framework for large-scale constrained multi-objective optimization37
Investigating the performance of DistilBert and LSTM-CNN models with GloVe embeddings for emotion detection from textual data37
A blockchain-based models for student information systems37
Reliability-oriented offloading of dependent tasks based on topology reconstruction in Industrial Internet Edge Computing37
IFC: Editorial35
Temporal record linkage for heterogeneous big data records34
Advanced colon cancer detection: Integrating context-aware multi-image fusion (Camif) in a multi-stage framework33
Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems33
IFC: Editorial32
Advanced hybrid UNet architectures for retinal vessel segmentation31
EmbryoSwin++: Enhanced swin transformer with supervised contrastive learning for embryo multi-stage classification in assisted reproductive technology31
An improvised nature-inspired algorithm enfolded broad learning system for disease classification30
Effectiveness of Teachable Machine, mobile net, and YOLO for object detection: A comparative study on practical applications30
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks30
Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks25
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system24
Ransomware detection based on machine learning using memory features24
Enhanced threat intelligence framework for advanced cybersecurity resilience24
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer24
AI-optimized breast cancer prognostics: Robust prediction with transformer-based lesion localization and hard voting classifier24
Advanced segmentation method for integrating multi-omics data for early cancer detection24
Model of the information security protection subsystem operation and method of optimization of its composition23
‘Retraction notice to “ODRNN: Optimized deep recurrent neural networks for automatic detection of leukaemia” [Egypt. Inform. J. 26 (2024) 100453]’23
A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster23
A study of Isual perceptual target monitoring in graphic design based on Multi-Task structured learning and interaction mapping23
Reconstruction of project quality assessment through a data-driven machine learning model22
Graph Sample and Aggregate-Attention network optimized for automatic translation of five line stanzas of Tang poems to poetic language22
Dialogue relation extraction based on Multi-Perspective Contextual Interaction Attention Network22
Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches22
PERS: Personalized environment recommendation system based on vital signs22
ADAMAEX—Alzheimer’s disease classification via attention-enhanced autoencoders and XAI21
Design and assessment of lightweight cryptographic algorithms on ESP32 and STM32 for IoD security21
Multi-Scale attention and hierarchical feature extraction-based network for metal surface defect detection21
Enhancing DDoS attack detection in IoT using PCA20
Blockchain-enhanced optimization for a secure and transparent global energy supply chain with reduced environmental impact and cost19
Dynamic oversampling-driven Kolmogorov–Arnold networks for credit card fraud detection: An ensemble approach to robust financial security19
Email spam detection by deep learning models using novel feature selection technique and BERT19
Blockchain-supported online banking scheme19
LBCC-Hung: A load balancing protocol for cloud computing based on Hungarian method18
Optimizing fault prediction in software based on MnasNet/LSTM optimized by an improved lotus flower algorithm18
A shallow 3D convolutional neural network for violence detection in videos18
Provably throttling SQLI using an enciphering query and secure matching17
Corrigendum to “A hybrid deep learning-based framework for future terrorist activities modeling and prediction” [Egypt. Inform. J. 23(3) 2022, 437–446]17
MC-ShuffleNetV2: A lightweight model for maize disease recognition17
Workflow migration in uncertain edge computing environments based on interval many-objective evolutionary algorithm16
Task scheduling in fog computing systems using deep learning16
Interval valued inventory model with different payment strategies for green products under interval valued Grey Wolf optimizer Algorithm fitness function16
Delay probability in adaptive systems based on activation function of classical neural networks16
A novel interest drift sensitivity academic paper recommender based on implicit feedback16
Lightweight authentication protocol for connected medical IoT through privacy-preserving access15
A road lane detection approach based on reformer model15
Lightweight sign language intelligent recognition model based on improved R-C3D15
Advanced AI-driven intrusion detection for securing cloud-based industrial IoT15
Climate-resilient water management: Leveraging IoT and AI for sustainable agriculture15
Purifying Kopi Luwak beans with precise RL-based proximal policy optimization using visual transformer with FRD15
Exploring q-rung Orthopair fuzzy sets based on multi criteria decision making: A systematic literature review15
IFC: Editorial14
Binary classification for imbalanced datasets using a novel metric method14
IFC: Editorial14
A data encryption access control algorithm based on zero-trust model with degree of discretization14
Proactive threat hunting to detect persistent behaviour-based advanced adversaries14
A machine learning neural network architecture for the accelerating universe based modified gravity14
Machine learning algorithms in proactive decision making for handover management from 5G & beyond 5G14
A robust tuned EfficientNet-B2 using dynamic learning for predicting different grades of brain cancer13
A novel method based on variational mode decomposition for lie detection13
Advanced skin lesion segmentation and classification using adaptive contextual GLCM and deep learning hybrid models13
Hybrid signal algorithm detection in NOMA 5G waveform: Transforming smart healthcare connectivity by reducing latency13
Advanced effort estimation in software projects using ensemble-based fusion techniques13
Evolutionary approach for composing a thoroughly optimized ensemble of regression neural networks13
Improved lightweight node storage solutions in blockchain13
Machine learning RNNs, SVM and NN Algorithm for Massive-MIMO-OTFS 6G Waveform with Rician and Rayleigh channel12
Optimal scheduling of solar-surface water source heat pump system based on an improved arithmetic optimization algorithm12
Design of a federated learning algorithm for power big data privacy computing based on pruning technique and homomorphic encryption12
An optimal defect recognition security-based terahertz low resolution image system using deep learning network12
Adaptive Q-Learning-Based Event-Prioritized QoS and incentive optimization for enhancing safety in vehicular fog networks12
Design and development of an effective classifier for medical images based on machine learning and image segmentation11
Golden Jackal Driven Optimization for a transparent and interpretable Intrusion Detection System using explainable AI to revolutionize cybersecurity11
IFC: Editorial11
Network information security protection method based on additive Gaussian noise and mutual information neural network in cloud computing background11
Innovative quantum techniques for improving system performance in cloud computing11
Optimal bidding strategy for virtual power plants in day-ahead markets: A quantile-based approach11
A genomic rule-based KNN model for fast flux botnet detection11
Recognition algorithm of piano playing music notes based on improved hidden Markov model11
Deep learning for sustainable agriculture: automating rice and paddy ripeness classification for enhanced food security11
Combining machine learning algorithms for personality trait prediction11
A control-driven transition strategy for enhanced multi-level threshold image segmentation optimization11
Investigating feature extraction by SIFT methods for prostate cancer early detection10
Tailored experiences: Unraveling T–A–P dynamics in activity-driven tourism recommendations for special interest travelers10
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers10
A speech separation system in video sequence using dilated inception network and U-Net10
Enhancing security in social computing systems through knowledge learning techniques10
Ransomware detection and family classification using fine-tuned BERT and RoBERTa models10
Artificial intelligence-based framework for 3D shape measurement and reconstruction from 2D observations10
IFC: Editorial9
Simulink-Driven Digital Twin Implementation for Smart Greenhouse Environmental Control9
Weighted explainable federated learning for privacy-preserving and scalable energy optimization in autonomous vehicular networks9
Optimizing AI-generated image metadata with hybrid color analysis and semantic keyword structuring9
YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information9
Reliable prediction of software defects using Shapley interpretable machine learning models9
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods9
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications9
Analytical residual network architecture with semi-supervision for sonar-based ship classification in underwater defense systems8
A federated supply chain finance risk control method based on personalized differential privacy8
A novel self-adaptive interval Type-3 Fuzzy Logic System for X spam detection8
An automated quantitative investment model of stock selection and market timing based on industry information8
A hybrid deep learning-based model for enhanced feature representation in image retrieval systems8
DebtGuard: A Predictive Model For Managing Technical Debt In Agile Development8
Graph-based temporal anomaly detection with self-supervised contrastive learning and dynamic adaptive thresholding for acoustic howling suppression8
Predict student learning styles and suitable assessment methods using click stream8
Epileptic seizure detection using information Gain-Based hybrid Features: Deep Neural network and comparative Machine learning approaches8
ALMANET: A hybrid online learning IDS for real-time IoT security8
A knowledge graph based intelligent auxiliary diagnosis and treatment system for primary tinnitus using traditional Chinese medicine8
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities8
Improving data transmission through optimizing blockchain sharding in cloud IoT based healthcare applications8
The impact of synthetic text generation for sentiment analysis using GAN based models8
A private Ethereum blockchain for organ donation and transplantation based on intelligent smart contracts8
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection8
Solving dynamic vehicle routing problem with time windows by ant colony system with bipartite graph matching8
0.13693189620972