Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
Big Data Aggregation, Visualization and Clustering for Smart Grid in Smart City using Machine Learning

Haider M. Al-Mashhadi; Hussain Jassim Fahad

Volume 23, Issue 3 , September 2023, , Page 39-53

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.4

Abstract
  Electrical energy is one of the most important components of life today where different fields depend on it. The field of electrical energy distribution (electricity network), which transmits electrical energy from sources to consumers, is one of the most important areas that need to be developed and ...  Read More ...

Communication
Review: Dual Method Cryptography and Steganography in Video Frames in IoT

Rawia Abdullah Muhammed; Maisa'a Abid Ali Al-Dabbas; Ashwak Mahmood Alabaichi

Volume 23, Issue 3 , September 2023, , Page 139-155

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.12

Abstract
  The Internet of things (IoT) is one of those emerging technologies, which aregoing to rule the world in the next few decades. The IoT environment not only enablesHuman to Machine interaction but also fosters Machine to Machine connectivity.Numerous IoT devices have poor security and insufficient computing ...  Read More ...

Computer
Meerkat Clan-Based Feature Selection in Random Forest Algorithm for IoT Intrusion Detection

Adil Yousef Hussein; Ahmed T. Sadiq

Volume 22, Issue 3 , September 2022, , Page 15-24

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.2

Abstract
  Hackerscanconductmoredestructivecyber-attacksthankstotherapidspread of Internet of Things (IoT) devices, posing significant security risks for users. Through a malicious process, the attacker intended to exhaust the capital of the target IoT network. Researchers and company owners are concerned about ...  Read More ...

Computer
Designing a New Lightweight AES Algorithm to Improve the Security of the IoT Environment

Sameeh Abdulghafour Jassim; Alaa K. Farhan

Volume 22, Issue 2 , June 2022, , Page 96-108

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.9

Abstract
  Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. ...  Read More ...

Cloud Based Processing of Vibrational Signal for Oil Pipeline Monitoring System

Sabreen J. Siwan; Waleed Fawwaz Shareef; Ahmed Nasser

Volume 21, Issue 3 , September 2021, , Page 24-39

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.3.3

Abstract
  Petroleum is the economic infrastructure in Iraq because it generates a significant portion of the country's revenue and can be considered as the primary source of financial costs each year. As a consequence, it is critical to protect the sector and continue to develop it. Therefore, it is important ...  Read More ...

Blockchain for Authorized Access of Health Insurance IoT System

Iman Mohammed Hasan; Rana Fareed Ghani

Volume 21, Issue 3 , September 2021, , Page 76-88

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.3.7

Abstract
  Today's insurance industry plays a significant role in a variety of fields, particularly in health insurance. As IoT technology advances, health insurers in IoT networks can obtain real-time medical data for individuals and issue individual insurance policies based on a person's lifestyle. However, sharing ...  Read More ...

Enhanced MQTT Protocol by Smart Gateway

Hawraa R. Abdul Ameer; Hamid M. Hasan

Volume 20, Issue 1 , January 2020, , Page 53-67

Abstract
  The MQTT protocol is one of the Internet of Things (loT) application protocols. It is based on publishing/subscribing messaging patterns. This protocol uses a broker to manage the communication between the subscribers and the publishers over the internet. There were two problems associated with the implementation ...  Read More ...