Egyptian Informatics Journal

短名Egypt. Inform. J.
Journal Impact5.19
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q1)
期刊索引SCI Q2中科院 3 区
ISSN1110-8665, 2090-4754
h-index50
国内分区计算机科学(3区)计算机科学计算机人工智能(3区)计算机科学计算机信息系统(3区)

埃及信息学杂志由开罗大学计算机与人工智能学院出版。该杂志为计算领域的最新研究和开发提供了一个论坛,包括计算机科学、信息技术、信息系统、运筹学和决策支持。无论是来自学术、研究还是商业来源,都鼓励提交本刊所涵盖主题的创新和未发表的作品。

期刊主页投稿网址
涉及主题计算机科学数学人工智能操作系统工程类机器学习计算机网络物理程序设计语言哲学算法计算机安全生物统计电信心理学量子力学经济
出版信息出版商: Elsevier B.V.出版周期: 期刊类型: journal
基本数据创刊年份: 2010原创研究文献占比96.67%自引率:4.00%Gold OA占比: 94.19%
平均审稿周期 网友分享经验:52 Weeks

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

BSDN-HMTD: A blockchain supported SDN framework for detecting DDoS attacks using deep learning method

2024-9-1

Classification and monitoring of arm exercises using machine learning and wrist-worn band

2024-9-1

DDoSNet: Detection and prediction of DDoS attacks from realistic multidimensional dataset in IoT network environment

2024-9-1

Grey Wolf Optimization algorithm with random local optimal regulation and first-element dominance

2024-9-1

An intelligent deep hash coding network for content-based medical image retrieval for healthcare applications

2024-9-1

A single-individual based variable neighborhood search algorithm for the blocking hybrid flow shop group scheduling problem

2024-9-1

YOLO-HyperVision: A vision transformer backbone-based enhancement of YOLOv5 for detection of dynamic traffic information

2024-9-1

Prediction of one- and three-months yoga practices effect on chronic venous insufficiency based on machine learning classifiers

2024-9-1

Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches

2024-9-1

A hybrid contextual framework to predict severity of infectious disease: COVID-19 case study

2024-9-1

Data fusion for driver drowsiness recognition: A multimodal perspective

2024-9-1

Implementation and test of a Device-Free localization system with a modified desync network protocol and a weighted k-nearest neighbor algorithm

2024-9-1

Enhancing medical image classification via federated learning and pre-trained model

2024-9-1

iLDA: A new dimensional reduction method for non-Gaussian and small sample size datasets

2024-9-1

Deep hybrid approach with sequential feature extraction and classification for robust malware detection

2024-9-1

Enhanced threat intelligence framework for advanced cybersecurity resilience

2024-9-1

Machine learning RNNs, SVM and NN Algorithm for Massive-MIMO-OTFS 6G Waveform with Rician and Rayleigh channel

2024-9-1

Blockchain-supported online banking scheme

2024-9-1

Multilevel thresholding Aerial image segmentation using comprehensive learning-based Snow ablation optimizer with double attractors

2024-9-1

‘Retraction notice to “ODRNN: Optimized deep recurrent neural networks for automatic detection of leukaemia” [Egypt. Inform. J. 26 (2024) 100453]’

2024-9-1

Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics

2024-9-1

A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems

2024-9-1

An intelligent fuzzy reinforcement learning-based routing algorithm with guaranteed latency and bandwidth in SDN: Application of video conferencing services

2024-9-1

A proposed secure framework for protecting cloud-based educational systems from hacking

2024-9-1

Advancements in detecting, preventing, and mitigating DDoS attacks in cloud environments: A comprehensive systematic review of state-of-the-art approaches

2024-9-1

Deepfake detection: Enhancing performance with spatiotemporal texture and deep learning feature fusion

2024-9-1

DeepSecure watermarking: Hybrid Attention on Attention Net and Deep Belief Net based robust video authentication using Quaternion Curvelet Transform domain

2024-9-1

Vision-based initial localization of AGV and path planning with PO-JPS algorithm

2024-9-1

Recognizing human activities with the use of Convolutional Block Attention Module

2024-9-1

Determining the optimal number of clusters by Enhanced Gap Statistic in K-mean algorithm

2024-9-1

Proactive threat hunting to detect persistent behaviour-based advanced adversaries

2024-9-1

A resilient image encryption scheme using Laplace transform

2024-9-1

Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing

2024-9-1

A federated learning model for intelligent cattle health monitoring system using body area sensors and IoT

2024-9-1

Efficient and Secure Color Image Encryption System with Enhanced Speed and Robustness Based on Binary Tree

2024-9-1

Enhancing brain tumor segmentation in MRI images: A hybrid approach using UNet, attention mechanisms, and transformers

2024-9-1

A knowledge graph based intelligent auxiliary diagnosis and treatment system for primary tinnitus using traditional Chinese medicine

2024-8-16

A multi-dimensional framework for improving data reliability in mobile crowd sensing

2024-8-9

Improving intrusion detection using LSTM-RNN to protect drones’ networks

2024-7-8

MC-ShuffleNetV2: A lightweight model for maize disease recognition

2024-7-6

Digital forensics for the socio-cyber world (DF-SCW): A novel framework for deepfake multimedia investigation on social media platforms

2024-7-1

Cluster-based anonymity model and algorithm for 1:1 dataset with a single sensitive attribute using machine learning technique

2024-6-13

Email spam detection by deep learning models using novel feature selection technique and BERT

2024-6-1

Configuring the RegTech business model to explore implications of FinTech

2024-6-1

Classification feature selection and dimensionality reduction based on logical binary sine-cosine function arithmetic optimization algorithm

2024-6-1

An automated quantitative investment model of stock selection and market timing based on industry information

2024-6-1

Lightweight authentication protocol for connected medical IoT through privacy-preserving access

2024-6-1

Boosted Nutcracker optimizer and Chaos Game Optimization with Cross Vision Transformer for medical image classification

2024-6-1

Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks

2024-6-1

Predict student learning styles and suitable assessment methods using click stream

2024-6-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司