Egyptian Informatics Journal

Papers
(The median citation count of Egyptian Informatics Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
IFC: Editorial288
Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides246
A resilient image encryption scheme using Laplace transform160
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users76
A multi-module approach to evaluate online teaching quality in international Chinese education74
CoTNeT: Contextual transformer network for encrypted traffic classification63
A blockchain-based models for student information systems60
Precision blood pressure prediction leveraging Photoplethysmograph signals using Support Vector Regression46
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system46
High-accuracy lung disease classification via logistic regression and advanced feature extraction techniques42
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer41
Temporal record linkage for heterogeneous big data records37
Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks37
Effectiveness of Teachable Machine, mobile net, and YOLO for object detection: A comparative study on practical applications36
Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems32
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)32
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks32
IFC: Editorial32
Enhanced threat intelligence framework for advanced cybersecurity resilience31
Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization31
An improvised nature-inspired algorithm enfolded broad learning system for disease classification30
Ransomware detection based on machine learning using memory features28
Advanced colon cancer detection: Integrating context-aware multi-image fusion (Camif) in a multi-stage framework28
Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches27
Blockchain-enhanced optimization for a secure and transparent global energy supply chain with reduced environmental impact and cost27
Blockchain-supported online banking scheme27
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system27
Bi-parametric distance and similarity measures of picture fuzzy sets and their applications in medical diagnosis26
The fuzzy common vulnerability scoring system (F-CVSS) based on a least squares approach with fuzzy logistic regression25
‘Retraction notice to “ODRNN: Optimized deep recurrent neural networks for automatic detection of leukaemia” [Egypt. Inform. J. 26 (2024) 100453]’25
Model of the information security protection subsystem operation and method of optimization of its composition25
A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster24
A two-hop neighbor preference-based random network graph model with high clustering coefficient for modeling real-world complex networks24
PERS: Personalized environment recommendation system based on vital signs23
Enhanced concept-level sentiment analysis system with expanded ontological relations for efficient classification of user reviews23
LBCC-Hung: A load balancing protocol for cloud computing based on Hungarian method23
A study of Isual perceptual target monitoring in graphic design based on Multi-Task structured learning and interaction mapping23
Enhancing DDoS attack detection in IoT using PCA22
A shallow 3D convolutional neural network for violence detection in videos21
ADAMAEX—Alzheimer’s disease classification via attention-enhanced autoencoders and XAI20
Advanced segmentation method for integrating multi-omics data for early cancer detection19
Email spam detection by deep learning models using novel feature selection technique and BERT19
Graph Sample and Aggregate-Attention network optimized for automatic translation of five line stanzas of Tang poems to poetic language19
Optimizing fault prediction in software based on MnasNet/LSTM optimized by an improved lotus flower algorithm19
A novel interest drift sensitivity academic paper recommender based on implicit feedback17
Provably throttling SQLI using an enciphering query and secure matching17
Corrigendum to “A hybrid deep learning-based framework for future terrorist activities modeling and prediction” [Egypt. Inform. J. 23(3) 2022, 437–446]17
Lightweight authentication protocol for connected medical IoT through privacy-preserving access16
Delay probability in adaptive systems based on activation function of classical neural networks16
Interval valued inventory model with different payment strategies for green products under interval valued Grey Wolf optimizer Algorithm fitness function16
MC-ShuffleNetV2: A lightweight model for maize disease recognition15
Advanced AI-driven intrusion detection for securing cloud-based industrial IoT15
Workflow migration in uncertain edge computing environments based on interval many-objective evolutionary algorithm14
IFC: Editorial14
IFC: Editorial14
AutismOnt: An Ontology-Driven Decision Support For Autism Diagnosis and Treatment14
A comparative study of hybrid estimation distribution algorithms in solving the facility layout problem14
Climate-resilient water management: Leveraging IoT and AI for sustainable agriculture14
A machine learning neural network architecture for the accelerating universe based modified gravity13
Proactive threat hunting to detect persistent behaviour-based advanced adversaries13
A road lane detection approach based on reformer model13
Machine learning algorithms in proactive decision making for handover management from 5G & beyond 5G13
Optimal scheduling of solar-surface water source heat pump system based on an improved arithmetic optimization algorithm12
A robust tuned EfficientNet-B2 using dynamic learning for predicting different grades of brain cancer12
Design and development of an effective classifier for medical images based on machine learning and image segmentation12
An optimal defect recognition security-based terahertz low resolution image system using deep learning network12
Improved lightweight node storage solutions in blockchain12
Machine learning RNNs, SVM and NN Algorithm for Massive-MIMO-OTFS 6G Waveform with Rician and Rayleigh channel12
Hybrid signal algorithm detection in NOMA 5G waveform: Transforming smart healthcare connectivity by reducing latency12
Evolutionary approach for composing a thoroughly optimized ensemble of regression neural networks12
Network information security protection method based on additive Gaussian noise and mutual information neural network in cloud computing background12
A genomic rule-based KNN model for fast flux botnet detection12
Combining machine learning algorithms for personality trait prediction11
Building a trust model system to avoid cloud services reputation attacks11
IFC: Editorial11
Ransomware detection and family classification using fine-tuned BERT and RoBERTa models11
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers11
A control-driven transition strategy for enhanced multi-level threshold image segmentation optimization11
Simulink-Driven Digital Twin Implementation for Smart Greenhouse Environmental Control10
Investigating feature extraction by SIFT methods for prostate cancer early detection10
Enhancing security in social computing systems through knowledge learning techniques10
YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information10
A speech separation system in video sequence using dilated inception network and U-Net10
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications10
Security-aware dynamic VM consolidation10
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks10
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods10
TGT: A Novel Adversarial Guided Oversampling Technique for Handling Imbalanced Datasets9
Reliable prediction of software defects using Shapley interpretable machine learning models9
Improving data transmission through optimizing blockchain sharding in cloud IoT based healthcare applications9
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities9
IFC: Editorial9
A proposed authentication and group-key distribution model for data warehouse signature, DWS framework9
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection9
Solving dynamic vehicle routing problem with time windows by ant colony system with bipartite graph matching8
Enhancing IoT security and healthcare data protection in the metaverse: A Dynamic Adaptive Security Mechanism8
The impact of synthetic text generation for sentiment analysis using GAN based models8
A knowledge graph based intelligent auxiliary diagnosis and treatment system for primary tinnitus using traditional Chinese medicine8
Predict student learning styles and suitable assessment methods using click stream8
A 3D-convolutional neural network framework with ensemble learning techniques for multi-modal emotion recognition8
An automated quantitative investment model of stock selection and market timing based on industry information7
Improving intrusion detection using LSTM-RNN to protect drones’ networks7
A private Ethereum blockchain for organ donation and transplantation based on intelligent smart contracts7
An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron7
The quality of service assessment of eMBB and mMTC traffic in a clustered 5G ecosystem of a smart factory7
Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing7
Diagonalize three-dimensional nonlinear chaotic map to encrypt color image7
A password-based authentication approach for edge computing architectures7
BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security7
A multi-objective fuzzy model based on enhanced artificial fish Swarm for multiple RNA sequences alignment7
A comparative survey on LEACH successors clustering algorithms for energy-efficient longevity WSNs7
Self-ChakmaNet: A deep learning framework for indigenous language learning using handwritten characters7
IAPN: Framework to secure IoT-based infrastructures using Private APN7
Deep hybrid approach with sequential feature extraction and classification for robust malware detection7
A new probabilistic linguistic decision-making process based on PL-BWM and improved three-way TODIM methods7
Metadata association feature ATC data security assessment7
Reinforcement learning for process Mining: Business process optimization with avoiding bottlenecks7
Deep Learning Approach for Age-related Macular Degeneration Detection Using Retinal Images: Efficacy Evaluation of Different Deep Learning Models7
IFC: Editorial6
A new evolutionary algorithm: Learner performance based behavior algorithm6
Diagnosis of patellofemoral osteoarthritis using enhanced sequential deep learning techniques6
Energy-aware intelligent scheduling for deadline-constrained workflows in sustainable cloud computing6
Recognizing human activities with the use of Convolutional Block Attention Module6
IFC: Editorial6
Complex attack detection scheme using history trajectory in internet of vehicles6
Pattern recognition of omicron variants from amalgamated multi-focus EEG signals and X-ray images using deep transfer learning6
Efficient GDD feature approximation based brain tumour classification and survival analysis model using deep learning6
Detecting suicidality on social media: Machine learning at rescue6
The impact of using different annotation schemes on named entity recognition6
Enhanced breast cancer detection and classification via CAMR-Gabor filters and LSTM: A deep Learning-Based method5
Configuring the RegTech business model to explore implications of FinTech5
An innovative approach to advanced voice classification of sacred Quranic recitations through multimodal fusion5
Quantum computing in addressing greenhouse gas emissions: A systematic literature review5
Distributed hybrid flowshop scheduling with consistent sublots under delivery time windows: A penalty lot-assisted iterated greedy algorithm5
Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network5
IoT enabled data protection with substitution box for lightweight ciphers5
Trajectory control and image encryption using affine transformation of lorenz system5
Fuzzy operator infrared image deblurring algorithm for image blurring in dragon boat races5
IFC: Editorial5
Modeling time delay, external noise and multiple malware infections in wireless sensor networks5
Spectral analysis of Cupric oxide (CuO) and Graphene Oxide (GO) via machine learning techniques5
An IoT-based architecture for human resource management in construction sites using software defined networking (SDN) and game theory4
Local dynamic neighborhood based outlier detection approach and its framework for large-scale datasets4
A robust and efficient algorithm for graph coloring problem based on Malatya centrality and sequent independent sets4
Trust identification through cognitive correlates with emphasizing attention in cloud robotics4
Energy efficiency in cognitive radio network using cooperative spectrum sensing based on hybrid spectrum handoff4
Social network sentiment classification method combined Chinese text syntax with graph convolutional neural network4
An effective method for global optimization – Improved slime mould algorithm combine multiple strategies4
An optimal configuration-based trading scheme for profit optimization in wireless networks4
Determining the optimal number of clusters by Enhanced Gap Statistic in K-mean algorithm4
RFID-based location based services framework for alerting on black spots for accident prevention4
An intelligent fuzzy reinforcement learning-based routing algorithm with guaranteed latency and bandwidth in SDN: Application of video conferencing services4
A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks4
Learning-based two-phase cooperative optimizer for distributed machine scheduling with heterogeneous factories and order priorities4
Cloud based collaborative data compression technology for power Internet of Things4
EFFSIP: Efficient forest fire system using IoT and parallel computing4
HIV/AIDS predictive model using random forest based on socio-demographical, biological and behavioral data3
Automised flow rule formation by using machine learning in software defined networks based edge computing3
IFC: Editorial3
A deep learning-based framework for automatic detection of drug resistance in tuberculosis patients3
Botnet sequential activity detection with hybrid analysis3
Improving healthy food recommender systems through heterogeneous hypergraph learning3
En-RfRsK: An ensemble machine learning technique for prognostication of diabetes mellitus3
A many objective commercial recommendation algorithm via Game-Based core node extraction3
MANET highly efficient clustering technique based on coverage k-means algorithm3
Cyber vulnerabilities detection system in logistics-based IoT data exchange3
Deepfake detection: Enhancing performance with spatiotemporal texture and deep learning feature fusion3
Decentralized and collaborative approach to mobile crowdsensing by implementing continuous feedback between the nodes3
Psychological Human Traits Detection based on Universal Language Modeling3
A real-time framework for opinion spam detection in Arabic social networks3
A deep learning-orchestrated garlic routing architecture for secure telesurgery operations in healthcare 4.03
A comprehensive analysis of the correlation between maximal clique size and centrality metrics for complex network graphs3
A Lightweight malware detection technique based on hybrid fuzzy simulated annealing clustering in Android apps3
IFC: Editorial3
Model of functioning of the centralized wireless information ecosystem focused on multimedia streaming3
Towards lightweight model using non-local-based graph convolution neural network for SQL injection detection2
A method for transferring BIM data into domain ontologies: A case study based on airport services2
A novel approach for detecting advanced persistent threats2
A file archival integrity check method based on the BiLSTM + CNN model and deep learning2
Security and privacy of electronic health records: Concerns and challenges2
Efficient framework for detecting COVID-19 and pneumonia from chest X-ray using deep convolutional network2
Cluster-based anonymity model and algorithm for 1:1 dataset with a single sensitive attribute using machine learning technique2
A proposed secure framework for protecting cloud-based educational systems from hacking2
Multi-task detection of harmful content in code-mixed meme captions using large language models with zero-shot, few-shot, and fine-tuning approaches2
Federated learning-based semantic segmentation framework for sustainable development2
Blockchain and big data integration design for traceability and carbon footprint management in the fishery supply chain2
A multi-dimensional framework for improving data reliability in mobile crowd sensing2
A clustering approach for classifying scholars based on publication performance using bibliometric data2
Molding robust S-box design based on linear fractional transformation and multilayer Perceptron: Applications to multimedia security2
Cyber epidemic spread forecasting based on the entropy-extremal dynamic interpretation of the SIR model2
Towards precision medicine in Glioblastoma: Unraveling MGMT methylation status in glioblastoma using adaptive sparse autoencoders2
The financial impact of human resources configuration: A quantitative analysis based on modified single candidate optimizer2
Prediction the dynamic viscosity of MWCNT-Al2O3 (30:70)/ Oil 5W50 hybrid nano-lubricant using Principal Component Analysis (PCA) with Artificial Neural Network (ANN)2
Aligning document layouts extracted with different OCR engines with clustering approach2
A real-time system for monitoring and classification of human falls on stairs using 2.4 GHz XBee3 micro modules with a tri-axial accelerometer and KNN algorithms1
Click fraud detection for online advertising using machine learning1
Innovation of teaching mechanism of music course integrating artificial intelligence technology: ITMMCAI-MCA-ACNN approach1
Standardization of expected value in gap statistic using Gaussian distribution for optimal number of clusters selection in K-means1
MalRed: An innovative approach for detecting malware using the red channel analysis of color images1
IoT security system with modified Zero Knowledge Proof algorithm for authentication1
Dual subpopulation artificial bee colony algorithm based on individual gradation1
Design and optimization of human-machine interaction interface for the intelligent Internet of Things based on deep learning and spatial computing1
Design of security management model for communication networks in digital cultural consumption under Metaverse – The case of mobile game1
IFC: Editorial1
LPBSA: Pre-clinical data analysis using advanced machine learning models for disease prediction1
Evaluation of Boruta algorithm in DDoS detection1
Community oriented socio-behavioural PentaPlicative Cipher Technique1
A method for generation of substitution box based on random selection1
Multi-factor evaluation of clustering methods for e-commerce application1
Benchmark Arabic news posts and analyzes Arabic sentiment through RMuBERT and SSL with AMCFFL technique1
Prediction of complex public opinion evolution based on improved multi-objective grey wolf optimizer1
End-to-end neural automatic speech recognition system for low resource languages1
A non-invasive computer-aided personalized diagnosis system for Osteopenia and Osteoporosis1
Enhancing medical image classification via federated learning and pre-trained model1
Heart disease prediction using autoencoder and DenseNet architecture1
Lane prediction optimization in VANET1
An improved multiobjective evolutionary algorithm for time-dependent vehicle routing problem with time windows1
IFC: Editorial1
Equalizer Design: HBOA-DE-trained radial basis function neural networks1
Novel framework on double event-triggered consensus of positive multi-agent systems1
A federated learning model for intelligent cattle health monitoring system using body area sensors and IoT1
Deep learning based fusion strategies for personality prediction1
Private blockchain-based encryption framework using computational intelligence approach1
CPDA: A conflict-free periodic data aggregation technique in wireless sensor networks1
Explainable AI supported hybrid deep learnig method for layer 2 intrusion detection1
Detecting Arabic sexual harassment using bidirectional long-short-term memory and a temporal convolutional network1
Low complexity design of bit parallel polynomial basis systolic multiplier using irreducible polynomials1
A novel approach for efficient resource allocation in 6G V2V networks using neighbor-aware greedy algorithm and sweep line model1
Cryptocurrency-driven ransomware syndicates operating on the darknet: A focused examination of the Arab world1
Anomaly Detection and Bottleneck Identification of The Distributed Application in Cloud Data Center using Software–Defined Networking1
Enhanced multiple sclerosis diagnosis by MRI image retrieval using convolutional autoencoders1
HMATC: Hierarchical multi-label Arabic text classification model using machine learning1
Writer adaptation for E2E Arabic online handwriting recognition via adversarial multi task learning1
Fuzzy decision support system for english language teaching with corpus data1
Hybridized classification algorithms for data classification applications: A review1
BACAD: AI-based framework for detecting vertical broken access control attacks1
Study on trust evaluation and service selection for Service-Oriented E-Commerce systems in IoT environments1
0.047778129577637