Egyptian Informatics Journal

Papers
(The TQCC of Egyptian Informatics Journal is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
DeepSecure watermarking: Hybrid Attention on Attention Net and Deep Belief Net based robust video authentication using Quaternion Curvelet Transform domain258
Molding robust S-box design based on linear fractional transformation and multilayer Perceptron: Applications to multimedia security234
A genomic rule-based KNN model for fast flux botnet detection147
Synthetic data with neural machine translation for automatic correction in arabic grammar74
IFC: Editorial62
Design and development of an effective classifier for medical images based on machine learning and image segmentation60
IFC: Editorial59
IFC: Editorial46
Detection of malware in downloaded files using various machine learning models39
Evolutionary offloading in an edge environment38
A method for transferring BIM data into domain ontologies: A case study based on airport services35
Predicting the prevalence of lung cancer using feature transformation techniques35
Adopting security maturity model to the organizations’ capability model32
Intelligent SDN to enhance security in IoT networks31
Deep Learning-Assisted Compound Bioactivity Estimation Framework30
Efficient GDD feature approximation based brain tumour classification and survival analysis model using deep learning30
Novel validity indices for dynamic clustering and an Improved Dynamic Fuzzy C-Means29
Investigating feature extraction by SIFT methods for prostate cancer early detection28
Precision blood pressure prediction leveraging Photoplethysmograph signals using Support Vector Regression28
Enhanced breast cancer detection and classification via CAMR-Gabor filters and LSTM: A deep Learning-Based method27
Basketball technical action recognition based on a combination of capsule neural network and augmented red panda optimizer26
High-accuracy lung disease classification via logistic regression and advanced feature extraction techniques26
IFC: Editorial25
An intelligent optimization strategy for nurse-patient scheduling in the Internet of Medical Things applications25
An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)25
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users24
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers24
Distributed hybrid flowshop scheduling with consistent sublots under delivery time windows: A penalty lot-assisted iterated greedy algorithm24
A hybrid contextual framework to predict severity of infectious disease: COVID-19 case study24
Building a trust model system to avoid cloud services reputation attacks23
A niche-based evolutionary algorithm with dual cooperative archive for solving constrained multi-objective optimization problems23
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system23
Contention-based traffic priority MAC protocols in wireless body area networks: A thematic review23
Classification feature selection and dimensionality reduction based on logical binary sine-cosine function arithmetic optimization algorithm22
A proposed secure framework for protecting cloud-based educational systems from hacking20
Combining machine learning algorithms for personality trait prediction19
A resilient image encryption scheme using Laplace transform19
Configuring the RegTech business model to explore implications of FinTech19
Recognizing human activities with the use of Convolutional Block Attention Module18
CoTNeT: Contextual transformer network for encrypted traffic classification17
Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides16
Prediction the dynamic viscosity of MWCNT-Al2O3 (30:70)/ Oil 5W50 hybrid nano-lubricant using Principal Component Analysis (PCA) with Artificial Neural Network (ANN)15
A new evolutionary algorithm: Learner performance based behavior algorithm15
Security and privacy of electronic health records: Concerns and challenges15
Cyber epidemic spread forecasting based on the entropy-extremal dynamic interpretation of the SIR model15
A blockchain-based models for student information systems15
Expression of Concern: “BSDN-HMTD: A blockchain supported SDN framework for detecting DDoS attacks using deep learning method” [Egypt. Infor. J. 27 (2024) 100515]14
Trajectory control and image encryption using affine transformation of lorenz system14
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)14
Fuzzy operator infrared image deblurring algorithm for image blurring in dragon boat races13
A clustering approach for classifying scholars based on publication performance using bibliometric data13
The best angle correction of basketball shooting based on the fusion of time series features and dual CNN13
Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks13
Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics12
Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks12
Social network sentiment classification method combined Chinese text syntax with graph convolutional neural network12
Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network12
IFC: Editorial11
A speech separation system in video sequence using dilated inception network and U-Net11
Efficient framework for detecting COVID-19 and pneumonia from chest X-ray using deep convolutional network11
Wireless battery recharging through UAV in wireless sensor networks11
Multi-fuzzy clustering validity index ensemble: A Dempster-Shafer theory-based parallel and series fusion11
iFogRep: An intelligent consistent approach for replication and placement of IoT based on fog computing11
Equalizer Design: HBOA-DE-trained radial basis function neural networks10
Advanced colon cancer detection: Integrating context-aware multi-image fusion (Camif) in a multi-stage framework10
A novel feature selection technique: Detection and classification of Android malware10
Quantum computing in addressing greenhouse gas emissions: A systematic literature review10
Overseas short video recommendations: A multimodal graph convolutional network approach incorporating cultural preferences10
Mechanical fault diagnosis based on combination of sparsely connected neural networks and a modified version of social network search9
Analyzing urban public sports facilities for recognition and optimization using intelligent image processing9
Spectral analysis of Cupric oxide (CuO) and Graphene Oxide (GO) via machine learning techniques9
Multi-strategy fusion binary SHO guided by Pearson correlation coefficient for feature selection with cancer gene expression data9
Fuzzy decision support system for english language teaching with corpus data9
Next-Generation energy Management: Particle Density algorithm for residential microgrid optimization9
IoT enabled data protection with substitution box for lightweight ciphers9
Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks8
An improvised nature-inspired algorithm enfolded broad learning system for disease classification8
Toward secret data location via fuzzy logic and convolutional neural network8
A weighted Markov-clustering routing protocol for optimizing energy use in wireless sensor networks8
An IoT-based architecture for human resource management in construction sites using software defined networking (SDN) and game theory8
A federated learning model for intelligent cattle health monitoring system using body area sensors and IoT7
IFC: Editorial7
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer7
Enhanced threat intelligence framework for advanced cybersecurity resilience7
An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications7
A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks7
YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information7
Towards developing a Block Chain based Advanced Data Security-Reward Model (DSecCS) in mobile crowd sensing networks7
Modeling time delay, external noise and multiple malware infections in wireless sensor networks7
1.4722170829773