Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
Data Analytics and Blockchain: A Review

Safa S. Abdul-Jabbar; Alaa K. Farhan; Rana F. Ghani

Volume 23, Issue 1 , March 2023, , Page 23-34

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.3

Abstract
  Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships ...  Read More ...

Computer
RCAE_BFV: Retrieve Encrypted Images using Convolution AutoEncoder and BFV

Emad M. Alsaedi; Alaa Kadhim Farhan

Volume 22, Issue 3 , September 2022, , Page 48-61

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.5

Abstract
  Content-Based Image Retrieval (CBIR) is an actual application in computer vision, which retrieves similar images from a database. Deep Learning (DL) is essential in many applications, including image retrieval applications. However, encryption techniques are used to protect data privacy because these ...  Read More ...

Computer
Designing a New Lightweight AES Algorithm to Improve the Security of the IoT Environment

Sameeh Abdulghafour Jassim; Alaa K. Farhan

Volume 22, Issue 2 , June 2022, , Page 96-108

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.9

Abstract
  Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. ...  Read More ...