Egyptian Informatics Journal

Papers
(The TQCC of Egyptian Informatics Journal is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
IFC: Editorial261
Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides182
A resilient image encryption scheme using Laplace transform64
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users50
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system48
Precision blood pressure prediction leveraging Photoplethysmograph signals using Support Vector Regression46
High-accuracy lung disease classification via logistic regression and advanced feature extraction techniques45
A blockchain-based models for student information systems42
TriPlaNet: Enhancing machine-paraphrasing plagiarism detection through triplet network and contrastive learning41
CoTNeT: Contextual transformer network for encrypted traffic classification41
A multi-module approach to evaluate online teaching quality in international Chinese education40
Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks36
Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization34
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer34
Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems34
Ransomware detection based on machine learning using memory features33
IFC: Editorial33
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks32
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system31
Advanced colon cancer detection: Integrating context-aware multi-image fusion (Camif) in a multi-stage framework30
Enhanced threat intelligence framework for advanced cybersecurity resilience30
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)29
Effectiveness of Teachable Machine, mobile net, and YOLO for object detection: A comparative study on practical applications28
Temporal record linkage for heterogeneous big data records28
IFC: Editorial28
A two-hop neighbor preference-based random network graph model with high clustering coefficient for modeling real-world complex networks27
An improvised nature-inspired algorithm enfolded broad learning system for disease classification27
Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches27
A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster25
‘Retraction notice to “ODRNN: Optimized deep recurrent neural networks for automatic detection of leukaemia” [Egypt. Inform. J. 26 (2024) 100453]’25
Model of the information security protection subsystem operation and method of optimization of its composition25
LBCC-Hung: A load balancing protocol for cloud computing based on Hungarian method24
PERS: Personalized environment recommendation system based on vital signs23
A shallow 3D convolutional neural network for violence detection in videos22
A study of Isual perceptual target monitoring in graphic design based on Multi-Task structured learning and interaction mapping22
Graph Sample and Aggregate-Attention network optimized for automatic translation of five line stanzas of Tang poems to poetic language22
Blockchain-enhanced optimization for a secure and transparent global energy supply chain with reduced environmental impact and cost21
Advanced segmentation method for integrating multi-omics data for early cancer detection21
ADAMAEX—Alzheimer’s disease classification via attention-enhanced autoencoders and XAI20
Dynamic oversampling-driven Kolmogorov–Arnold networks for credit card fraud detection: An ensemble approach to robust financial security19
Enhanced concept-level sentiment analysis system with expanded ontological relations for efficient classification of user reviews19
Optimizing fault prediction in software based on MnasNet/LSTM optimized by an improved lotus flower algorithm18
Enhancing DDoS attack detection in IoT using PCA18
Blockchain-supported online banking scheme18
Email spam detection by deep learning models using novel feature selection technique and BERT18
A novel interest drift sensitivity academic paper recommender based on implicit feedback17
Corrigendum to “A hybrid deep learning-based framework for future terrorist activities modeling and prediction” [Egypt. Inform. J. 23(3) 2022, 437–446]17
Lightweight authentication protocol for connected medical IoT through privacy-preserving access16
Interval valued inventory model with different payment strategies for green products under interval valued Grey Wolf optimizer Algorithm fitness function16
Delay probability in adaptive systems based on activation function of classical neural networks16
Workflow migration in uncertain edge computing environments based on interval many-objective evolutionary algorithm15
Advanced AI-driven intrusion detection for securing cloud-based industrial IoT15
Provably throttling SQLI using an enciphering query and secure matching15
MC-ShuffleNetV2: A lightweight model for maize disease recognition15
IFC: Editorial14
A machine learning neural network architecture for the accelerating universe based modified gravity14
Advanced skin lesion segmentation and classification using adaptive contextual GLCM and deep learning hybrid models14
A comparative study of hybrid estimation distribution algorithms in solving the facility layout problem14
AutismOnt: An Ontology-Driven Decision Support For Autism Diagnosis and Treatment14
IFC: Editorial14
A road lane detection approach based on reformer model14
Purifying Kopi Luwak beans with precise RL-based proximal policy optimization using visual transformer with FRD13
Proactive threat hunting to detect persistent behaviour-based advanced adversaries13
Machine learning algorithms in proactive decision making for handover management from 5G & beyond 5G13
Exploring q-rung Orthopair fuzzy sets based on multi criteria decision making: A systematic literature review13
Climate-resilient water management: Leveraging IoT and AI for sustainable agriculture13
Hybrid signal algorithm detection in NOMA 5G waveform: Transforming smart healthcare connectivity by reducing latency12
Machine learning RNNs, SVM and NN Algorithm for Massive-MIMO-OTFS 6G Waveform with Rician and Rayleigh channel12
An optimal defect recognition security-based terahertz low resolution image system using deep learning network12
Evolutionary approach for composing a thoroughly optimized ensemble of regression neural networks12
Improved lightweight node storage solutions in blockchain12
A robust tuned EfficientNet-B2 using dynamic learning for predicting different grades of brain cancer12
Optimal scheduling of solar-surface water source heat pump system based on an improved arithmetic optimization algorithm12
Network information security protection method based on additive Gaussian noise and mutual information neural network in cloud computing background12
A genomic rule-based KNN model for fast flux botnet detection12
A control-driven transition strategy for enhanced multi-level threshold image segmentation optimization11
Combining machine learning algorithms for personality trait prediction11
Ransomware detection and family classification using fine-tuned BERT and RoBERTa models11
Innovative quantum techniques for improving system performance in cloud computing11
Building a trust model system to avoid cloud services reputation attacks10
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications10
A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods10
IFC: Editorial10
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers10
Simulink-Driven Digital Twin Implementation for Smart Greenhouse Environmental Control10
Weighted explainable federated learning for privacy-preserving and scalable energy optimization in autonomous vehicular networks10
Design and development of an effective classifier for medical images based on machine learning and image segmentation10
A speech separation system in video sequence using dilated inception network and U-Net10
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks10
Enhancing security in social computing systems through knowledge learning techniques10
Recognition algorithm of piano playing music notes based on improved hidden Markov model10
Investigating feature extraction by SIFT methods for prostate cancer early detection10
IFC: Editorial9
TGT: A Novel Adversarial Guided Oversampling Technique for Handling Imbalanced Datasets9
A federated supply chain finance risk control method based on personalized differential privacy9
YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information9
Solving dynamic vehicle routing problem with time windows by ant colony system with bipartite graph matching9
Novel linear programming models based on distance measure of IFSs and modified TOPSIS method for portfolio selection9
Security-aware dynamic VM consolidation9
A proposed authentication and group-key distribution model for data warehouse signature, DWS framework9
Predict student learning styles and suitable assessment methods using click stream9
Improving data transmission through optimizing blockchain sharding in cloud IoT based healthcare applications9
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities8
Emotion recognition in panoramic audio and video virtual reality based on deep learning and feature fusion8
Diagonalize three-dimensional nonlinear chaotic map to encrypt color image8
An automated quantitative investment model of stock selection and market timing based on industry information8
Reliable prediction of software defects using Shapley interpretable machine learning models8
A knowledge graph based intelligent auxiliary diagnosis and treatment system for primary tinnitus using traditional Chinese medicine8
A hybrid deep learning-based model for enhanced feature representation in image retrieval systems8
Improving intrusion detection using LSTM-RNN to protect drones’ networks8
The impact of synthetic text generation for sentiment analysis using GAN based models8
A private Ethereum blockchain for organ donation and transplantation based on intelligent smart contracts8
Enhancing IoT security and healthcare data protection in the metaverse: A Dynamic Adaptive Security Mechanism8
A modified genetic algorithm for large-scale and joint satellite mission planning8
0.19243001937866