Egyptian Informatics Journal

Papers
(The median citation count of Egyptian Informatics Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
DeepSecure watermarking: Hybrid Attention on Attention Net and Deep Belief Net based robust video authentication using Quaternion Curvelet Transform domain258
Molding robust S-box design based on linear fractional transformation and multilayer Perceptron: Applications to multimedia security234
A genomic rule-based KNN model for fast flux botnet detection147
Synthetic data with neural machine translation for automatic correction in arabic grammar74
IFC: Editorial62
Design and development of an effective classifier for medical images based on machine learning and image segmentation60
IFC: Editorial59
IFC: Editorial46
Detection of malware in downloaded files using various machine learning models39
Evolutionary offloading in an edge environment38
Predicting the prevalence of lung cancer using feature transformation techniques35
A method for transferring BIM data into domain ontologies: A case study based on airport services35
Adopting security maturity model to the organizations’ capability model32
Intelligent SDN to enhance security in IoT networks31
Deep Learning-Assisted Compound Bioactivity Estimation Framework30
Efficient GDD feature approximation based brain tumour classification and survival analysis model using deep learning30
Novel validity indices for dynamic clustering and an Improved Dynamic Fuzzy C-Means29
Investigating feature extraction by SIFT methods for prostate cancer early detection28
Precision blood pressure prediction leveraging Photoplethysmograph signals using Support Vector Regression28
Enhanced breast cancer detection and classification via CAMR-Gabor filters and LSTM: A deep Learning-Based method27
High-accuracy lung disease classification via logistic regression and advanced feature extraction techniques26
Basketball technical action recognition based on a combination of capsule neural network and augmented red panda optimizer26
An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)25
IFC: Editorial25
An intelligent optimization strategy for nurse-patient scheduling in the Internet of Medical Things applications25
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers24
Distributed hybrid flowshop scheduling with consistent sublots under delivery time windows: A penalty lot-assisted iterated greedy algorithm24
A hybrid contextual framework to predict severity of infectious disease: COVID-19 case study24
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users24
A niche-based evolutionary algorithm with dual cooperative archive for solving constrained multi-objective optimization problems23
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system23
Contention-based traffic priority MAC protocols in wireless body area networks: A thematic review23
Building a trust model system to avoid cloud services reputation attacks23
Classification feature selection and dimensionality reduction based on logical binary sine-cosine function arithmetic optimization algorithm22
A proposed secure framework for protecting cloud-based educational systems from hacking20
A resilient image encryption scheme using Laplace transform19
Configuring the RegTech business model to explore implications of FinTech19
Combining machine learning algorithms for personality trait prediction19
Recognizing human activities with the use of Convolutional Block Attention Module18
CoTNeT: Contextual transformer network for encrypted traffic classification17
Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides16
Security and privacy of electronic health records: Concerns and challenges15
Cyber epidemic spread forecasting based on the entropy-extremal dynamic interpretation of the SIR model15
A blockchain-based models for student information systems15
Prediction the dynamic viscosity of MWCNT-Al2O3 (30:70)/ Oil 5W50 hybrid nano-lubricant using Principal Component Analysis (PCA) with Artificial Neural Network (ANN)15
A new evolutionary algorithm: Learner performance based behavior algorithm15
Trajectory control and image encryption using affine transformation of lorenz system14
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)14
Expression of Concern: “BSDN-HMTD: A blockchain supported SDN framework for detecting DDoS attacks using deep learning method” [Egypt. Infor. J. 27 (2024) 100515]14
A clustering approach for classifying scholars based on publication performance using bibliometric data13
The best angle correction of basketball shooting based on the fusion of time series features and dual CNN13
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks13
Fuzzy operator infrared image deblurring algorithm for image blurring in dragon boat races13
Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network12
Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics12
Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks12
Social network sentiment classification method combined Chinese text syntax with graph convolutional neural network12
Efficient framework for detecting COVID-19 and pneumonia from chest X-ray using deep convolutional network11
Wireless battery recharging through UAV in wireless sensor networks11
Multi-fuzzy clustering validity index ensemble: A Dempster-Shafer theory-based parallel and series fusion11
iFogRep: An intelligent consistent approach for replication and placement of IoT based on fog computing11
IFC: Editorial11
A speech separation system in video sequence using dilated inception network and U-Net11
Advanced colon cancer detection: Integrating context-aware multi-image fusion (Camif) in a multi-stage framework10
A novel feature selection technique: Detection and classification of Android malware10
Quantum computing in addressing greenhouse gas emissions: A systematic literature review10
Overseas short video recommendations: A multimodal graph convolutional network approach incorporating cultural preferences10
Equalizer Design: HBOA-DE-trained radial basis function neural networks10
Multi-strategy fusion binary SHO guided by Pearson correlation coefficient for feature selection with cancer gene expression data9
Fuzzy decision support system for english language teaching with corpus data9
Next-Generation energy Management: Particle Density algorithm for residential microgrid optimization9
IoT enabled data protection with substitution box for lightweight ciphers9
Mechanical fault diagnosis based on combination of sparsely connected neural networks and a modified version of social network search9
Analyzing urban public sports facilities for recognition and optimization using intelligent image processing9
Spectral analysis of Cupric oxide (CuO) and Graphene Oxide (GO) via machine learning techniques9
An improvised nature-inspired algorithm enfolded broad learning system for disease classification8
Toward secret data location via fuzzy logic and convolutional neural network8
A weighted Markov-clustering routing protocol for optimizing energy use in wireless sensor networks8
An IoT-based architecture for human resource management in construction sites using software defined networking (SDN) and game theory8
Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks8
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications7
A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks7
YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information7
Towards developing a Block Chain based Advanced Data Security-Reward Model (DSecCS) in mobile crowd sensing networks7
A federated learning model for intelligent cattle health monitoring system using body area sensors and IoT7
IFC: Editorial7
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer7
Modeling time delay, external noise and multiple malware infections in wireless sensor networks7
Enhanced threat intelligence framework for advanced cybersecurity resilience7
Adaptive batch mode active learning with deep similarity6
RETRACTED: ODRNN: Optimized Deep Recurrent Neural Networks for Automatic Detection of Leukaemia6
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system6
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods6
Smart Traffic Scheduling for Crowded Cities Road Networks6
A proposed authentication and group-key distribution model for data warehouse signature, DWS framework6
A multi-dimensional framework for improving data reliability in mobile crowd sensing6
Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization6
Aligning document layouts extracted with different OCR engines with clustering approach6
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks6
A fully automatic fine tuned deep learning model for knee osteoarthritis detection and progression analysis6
Cluster-based anonymity model and algorithm for 1:1 dataset with a single sensitive attribute using machine learning technique6
Modeling of blockchain with encryption based secure education record management system6
Grey Wolf Optimization algorithm with random local optimal regulation and first-element dominance6
Blockchain and big data integration design for traceability and carbon footprint management in the fishery supply chain6
A new fusion of mutual information and Otsu multilevel thresholding technique for hyperspectral band selection6
Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems6
Ransomware detection based on machine learning using memory features6
IFC: Editorial6
Email spam detection by deep learning models using novel feature selection technique and BERT5
Predict student learning styles and suitable assessment methods using click stream5
The fuzzy common vulnerability scoring system (F-CVSS) based on a least squares approach with fuzzy logistic regression5
IFC: Editorial5
Model of the information security protection subsystem operation and method of optimization of its composition5
A 3D-convolutional neural network framework with ensemble learning techniques for multi-modal emotion recognition5
Trust identification through cognitive correlates with emphasizing attention in cloud robotics5
IFC: Editorial5
Writer adaptation for E2E Arabic online handwriting recognition via adversarial multi task learning5
Efficient and Secure Color Image Encryption System with Enhanced Speed and Robustness Based on Binary Tree5
A hybridization of granular adaptive tabu search with path relinking for the multi-depot open vehicle routing problem5
Design of security management model for communication networks in digital cultural consumption under Metaverse – The case of mobile game5
Permutation-based frame synchronization method for data transmission systems with short packets5
A CR-5G network based on multi-user for various waveforms detection5
Solving dynamic vehicle routing problem with time windows by ant colony system with bipartite graph matching5
IFC: Editorial5
An optimal configuration-based trading scheme for profit optimization in wireless networks5
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection5
A two-hop neighbor preference-based random network graph model with high clustering coefficient for modeling real-world complex networks4
Mutual learning differential particle swarm optimization4
Enabling recommendation system architecture in virtualized environment for e-learning4
A study of Isual perceptual target monitoring in graphic design based on Multi-Task structured learning and interaction mapping4
RFID-based location based services framework for alerting on black spots for accident prevention4
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities4
LBCC-Hung: A load balancing protocol for cloud computing based on Hungarian method4
PERS: Personalized environment recommendation system based on vital signs4
Intelligent deep analysis of DNA sequences based on FFGM to enhancement the performance and reduce the computation4
Reliable prediction of software defects using Shapley interpretable machine learning models4
A hybrid deep learning-based framework for future terrorist activities modeling and prediction4
Data fusion for driver drowsiness recognition: A multimodal perspective4
Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches3
‘Retraction notice to “ODRNN: Optimized deep recurrent neural networks for automatic detection of leukaemia” [Egypt. Inform. J. 26 (2024) 100453]’3
A shallow 3D convolutional neural network for violence detection in videos3
A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster3
Learning-based two-phase cooperative optimizer for distributed machine scheduling with heterogeneous factories and order priorities3
Hybridized classification algorithms for data classification applications: A review3
MalRed: An innovative approach for detecting malware using the red channel analysis of color images3
Local dynamic neighborhood based outlier detection approach and its framework for large-scale datasets3
Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms3
An effective method for global optimization – Improved slime mould algorithm combine multiple strategies3
Retrieval of behavior trees using map-and-reduce technique3
Optimization of accuracy in estimating the dynamic viscosity of MWCNT-CuO/oil 10W40 nano-lubricants3
Lane prediction optimization in VANET2
Dual subpopulation artificial bee colony algorithm based on individual gradation2
Blockchain-supported online banking scheme2
Optimizing fault prediction in software based on MnasNet/LSTM optimized by an improved lotus flower algorithm2
Benchmark Arabic news posts and analyzes Arabic sentiment through RMuBERT and SSL with AMCFFL technique2
Spam detection using hybrid model on fusion of spammer behavior and linguistics features2
A fast ADMM algorithm for sparse precision matrix estimation using lasso penalized D-trace loss2
An intelligent fuzzy reinforcement learning-based routing algorithm with guaranteed latency and bandwidth in SDN: Application of video conferencing services2
TGT: A Novel Adversarial Guided Oversampling Technique for Handling Imbalanced Datasets2
Graph Sample and Aggregate-Attention network optimized for automatic translation of five line stanzas of Tang poems to poetic language2
End-to-end neural automatic speech recognition system for low resource languages2
Enhanced concept-level sentiment analysis system with expanded ontological relations for efficient classification of user reviews2
Determining the optimal number of clusters by Enhanced Gap Statistic in K-mean algorithm2
Enhancing DDoS attack detection in IoT using PCA2
Low complexity design of bit parallel polynomial basis systolic multiplier using irreducible polynomials2
Innovation of teaching mechanism of music course integrating artificial intelligence technology: ITMMCAI-MCA-ACNN approach2
Advanced segmentation method for integrating multi-omics data for early cancer detection2
EFFSIP: Efficient forest fire system using IoT and parallel computing2
TBMOR: A lightweight trust-based model for secure routing of opportunistic networks1
Implementation and test of a Device-Free localization system with a modified desync network protocol and a weighted k-nearest neighbor algorithm1
The role of hybrid models in financial decision-making: Forecasting stock prices with advanced algorithms1
Read my lips: Artificial intelligence word-level arabic lipreading system1
Optimizing flexible job shop scheduling with automated guided vehicles using a multi-strategy-driven genetic algorithm1
The impact of synthetic text generation for sentiment analysis using GAN based models1
Entropy-extreme concept of data gaps filling in a small-sized collection1
MC-ShuffleNetV2: A lightweight model for maize disease recognition1
An automated quantitative investment model of stock selection and market timing based on industry information1
A single-individual based variable neighborhood search algorithm for the blocking hybrid flow shop group scheduling problem1
Community oriented socio-behavioural PentaPlicative Cipher Technique1
Road detection by using gradient magnitude image and adaptive thresholding based Watershed1
Deep hybrid approach with sequential feature extraction and classification for robust malware detection1
Bi-parametric distance and similarity measures of picture fuzzy sets and their applications in medical diagnosis1
Security-aware dynamic VM consolidation1
A real-time framework for opinion spam detection in Arabic social networks1
Knowledge graph completion method based on hyperbolic representation learning and contrastive learning1
Improving intrusion detection using LSTM-RNN to protect drones’ networks1
Decomposition-based interval multi-objective evolutionary algorithm with adaptive adjustment of weight vectors and neighborhoods1
Heart disease prediction using autoencoder and DenseNet architecture1
Evaluation of Boruta algorithm in DDoS detection1
A non-invasive computer-aided personalized diagnosis system for Osteopenia and Osteoporosis1
Game theory based node clustering for cognitive radio wireless sensor networks1
Many-objective evolutionary algorithm based on three-way decision1
Enhancing medical image classification via federated learning and pre-trained model1
Multistep prediction for egg prices: An efficient sequence-to-sequence network1
iLDA: A new dimensional reduction method for non-Gaussian and small sample size datasets1
0.10642790794373