Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
Maximizing Group Efficacy for the Generalized Cell Formation Problem Using Route Rank Index and Genetic Algorithm

Dhulfiqar Hakeem Dhayef; Sawsan S A Al-Zubaidi; Luma A H Al-Kindi

Volume 24, Issue 1 , March 2024, , Page 13-26

https://doi.org/https://doi.org/10.33103/uot.ijccce.24.1.2

Abstract
  Cell formation plays a crucial role in the development of cellular manufacturing systems (CMS). Previous studies in this field have typically assumed that each part is associated with a single process plan. However, incorporating alternative routes offers additional flexibility in CMS design. This paper ...  Read More ...

Computer
Development of Customized MIPS_32 Core Processor for Image Processing Applications

Omar Nowfal MohammedTaher; Mohammed Najm Abdullah; Hassan Awheed Jeiad

Volume 24, Issue 1 , March 2024, , Page 27-42

https://doi.org/https://doi.org/10.33103/uot.ijccce.24.1.3

Abstract
  Definitely, image processing operations without advanced and expensive microprocessors consume more time, power, and larger programs. So, improving the reasonable cost of microprocessors is crucial in this situation. This paper proposes an improvement for the MIPS_32 architecture that is called a Customized ...  Read More ...

Computer
Handwritten Signature Identification Based on Hybrid Features and Machine Learning Algorithms

Zainab Hashim; Hanaa Mohsin; Ahmed Alkhayyat

Volume 24, Issue 1 , March 2024, , Page 43-56

https://doi.org/https://doi.org/10.33103/uot.ijccce.24.1.4

Abstract
  Handwritten signature identification is a process that determines an individual’s true identity by analyzing their signature. This is an important task in various applications such as financial transactions, legal document verification, and biometric systems. Various techniques have been developed ...  Read More ...

Computer
A Comparative Study Using Deep Learning Models And Transfer Learning for Detection And Classification of Alzheimer’s Disease

Afrah Salman Dawood

Volume 24, Issue 1 , March 2024, , Page 57-70

https://doi.org/https://doi.org/10.33103/uot.ijccce.24.1.5

Abstract
  Recently, the burgeoning disciplines of Machine Learning (ML) and Deep Learning (DL) have experienced considerable integration across diverse scientific domains. Of significant note is their integration into the medical sector, specifically in the intricate methodologies of pathological categorization. ...  Read More ...

Computer
Enhancement of Cloud Computing Environment Using Machine Learning Algorithms MLCE

Mohammed E. Seno; Ban N. Dhannoon; Omer K. Jasim Mohammad

Volume 23, Issue 4 , December 2023, , Page 1-12

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.4.1

Abstract
  Cloud computing is an evolving and high-demand research field at theforefront of technological advancements. It aims to provide software resources andoperates based on service-oriented delivery. Within the infrastructure as a service (IaaS)framework, the cloud offers end customers access to crucial infrastructure ...  Read More ...

Computer
Ensemble Feature Selection for Age Estimation from Speech

Umniah Hameed Jaid; alia karim Abdulhassan

Volume 23, Issue 4 , December 2023, , Page 13-23

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.4.2

Abstract
   The voice signal carries a wide range of data about the speaker, including theirphysical characteristics, feelings, and level of health. There are several uses for the estimateof these physical characteristics from the speech in forensics, security, surveillance,marketing, and customer service. ...  Read More ...

Computer
Improve Multi-Object Detection and Tracking for an Automated Traffic Surveillance System

Rashad N. Razak; Hadeel N. Abdullah

Volume 23, Issue 4 , December 2023, , Page 35-45

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.4.4

Abstract
  Multi-Object Detection and Tracking (MODT) are essential in manyapplication fields. Still, many enhancements in the speed of detection and tracking wererequired to overcome the challenges during implementation. This paper presents a newalgorithm system for (MODT) to improve the execution time to be robust ...  Read More ...

Computer
Analytical and Comparative Study for Optimization Problems

Sanaa Ali Jabber; Soukaena H. Hashem; Shatha H Jafer

Volume 23, Issue 4 , December 2023, , Page 46-57

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.4.5

Abstract
  Finding an optimal solution to some problem, like minimizing andmaximizing the objective function, is the goal of Single-Objective Optimization (SOP).Real-world problems, on the other hand, are more complicated and involve a widerrange of objectives, several objectives should be maximized in such problems. ...  Read More ...

Computer
A Survey on Business Intelligence Approach Based on Deep Learning

Asaad Raheem Kareem; Hasanen S. Abdullah

Volume 23, Issue 4 , December 2023, , Page 58-70

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.4.6

Abstract
  The article provides an overview of two recent developments in technology: Business Intelligence (BI) and Deep Learning (DL). In order to support decision-making processes, BI entails gathering, integrating, and analyzing data from various sources, while DL uses artificial neural networks to learn and ...  Read More ...

Computer
Developed the EX-RED Algorithm to Find Best Parameters Based on Load Connection Factor

Amar A. Mahawish; Hassan Jalee.l Hassan

Volume 23, Issue 4 , December 2023, , Page 84-94

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.4.8

Abstract
  The performance of the Internet is significantly impacted by network congestion. Because of the internet's current rapid growth, congestion could increase and cause more packets to be dropped. The Transmission Control Protocol (TCP) connection is used as the reliable transmission of packets which has ...  Read More ...

Computer
Design of Face Detection and Recognition System to Enhance Security of Safe Locker

Mohammed Majid Msallam

Volume 23, Issue 4 , December 2023, , Page 95-105

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.4.9

Abstract
  In recent years, safe lockers have been spread in public places to secure valuable belongings. The people are concerned about losing safe locker keys or use of the spare key by others and will remain worried about their things. To solve the forenamed matter, this paper proposed a system that depends ...  Read More ...

Computer
Dynamic Shifts in Digital Currencies: Tracing the Evolution of Digital Currencies from Bitcoin's Inception to 2023

Asmaa A Mohammed; Abdul Monem S. Rahma; Hala B. Abdulwahad

Volume 23, Issue 4 , December 2023, , Page 106-116

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.4.10

Abstract
  The rapid "development of communication technology" has had a considerable impact on financial transactions, leading to the appearance of new types of "currency." These digital currencies are intended to streamline processes, decrease time and effort expenditures, and minimize financial losses while ...  Read More ...

Computer
A Review of Face Detection Methods Based on Feature Approach

Dina M. Abdulhussien; Laith J. Saud

Volume 23, Issue 3 , September 2023, , Page 1-9

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.1

Abstract
  Face detection technology is the first and essential step for facial-based analysis algorithms such as face recognition, face feature extraction, face alignment, face enhancement, and face parsing. That is besides serving other applications related to human intention and act analysis such as facial expression ...  Read More ...

Computer
Metadata Scraping Using Programmable Customized Search Engine

Esraa Q. Naamha; Matheel E. Abdulmunim

Volume 23, Issue 3 , September 2023, , Page 10-25

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.2

Abstract
  The World Wide Web (WWW) is a vast repository of knowledge, including intellectual, social, financial, and security-related data. Online information is typically accessed for instructional purposes. On the internet, information is accessible in a variety of formats and access interfaces. ...  Read More ...

Computer
Decentralized IoT System Based on Blockchain and Homomorphic Technologies

Mohanad A. Mohammed; Hala B. Abdul Wahab

Volume 23, Issue 3 , September 2023, , Page 26-38

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.3

Abstract
  decentralization within IoT eliminates the need to use distributed networks within IoT to communicate only with servers that may face difficulties related to the internet, vulnerabilities, DDOS, or hijacks, merging blockchain with IoT converted the IoT system into a decentralized with many benefits and ...  Read More ...

Computer
Big Data Aggregation, Visualization and Clustering for Smart Grid in Smart City using Machine Learning

Haider M. Al-Mashhadi; Hussain Jassim Fahad

Volume 23, Issue 3 , September 2023, , Page 39-53

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.4

Abstract
  Electrical energy is one of the most important components of life today where different fields depend on it. The field of electrical energy distribution (electricity network), which transmits electrical energy from sources to consumers, is one of the most important areas that need to be developed and ...  Read More ...

Computer
A Review on Utilizing Big Data Techniques for Performance Improvement in Software Defined Networking

Sama Salam Samaan; Hassan Awheed Jeiad

Volume 23, Issue 3 , September 2023, , Page 68-79

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.6

Abstract
  Traditional network abilities have a drastic shortage in the current networking world. Software-Defined Networking (SDN) is a revival development in the networking domain that provides separation of control and data planes, enlarges the data plane granularity, and simplifies the network devices. All ...  Read More ...

Computer
A New Perspective for Mining COCO Dataset

Suha Dh. Athab; Kesra Nermend; Abdulamir Abdullah Karim

Volume 23, Issue 3 , September 2023, , Page 80-89

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.7

Abstract
  Microsoft Common Objects in Context (COCO) is a huge image dataset that has over 300 k images belonging to more than ninety-one classes. COCO has valuable information in the field of detection, segmentation, classification, and tagging; but the COCO dataset suffers from being unorganized, and classes ...  Read More ...

Computer
Efficient Iris Image Recognition System Based on Machine Learning Approach

Hind Moutaz Al-Dabbas; Raghad Abdulaali Azeez; Akbas Ezaldeen Ali

Volume 23, Issue 3 , September 2023, , Page 104-114

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.9

Abstract
  Iris identification is a well‐ known technology used to detect striking biometric identification techniques for recognizing human beings based on physical behavior. The texture of the iris is essential and its anatomy varies from individual to individual. Humans have distinctive physical characteristics ...  Read More ...

Computer
A Survey of Graph Techniques Applied in Software Defined Networking

Sama Salam Samaan; Hassan Awheed Jeiad

Volume 23, Issue 3 , September 2023, , Page 115-124

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.10

Abstract
  Modelling computer networks in general, particularly Software Defined Networking (SDN) as a graph, is beneficial in network planning and design, configuration management, traffic analysis, and security. According to the dynamic nature of SDN, it needs a fast response due to the rapid changes in the network ...  Read More ...

Computer
In-Depth Assessment of Cryptographic Algorithms Namely DES, 3DES, AES, RSA, and Blowfish

Samara Mohammed Radhi; Raheem Ogla

Volume 23, Issue 3 , September 2023, , Page 125-138

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.11

Abstract
  Securing information is difficult in the modern internet era, asterabytes of data are generated daily online and online transactions occurvirtually every second. The current world's information security relies heavily oncryptography, which makes the internet a safer environment. Making informationincoherent ...  Read More ...

Computer
Real-Time Multi-Agent Mobile Robot based on A Client-Server Model

Rasheed Abdul Ameer Rasheed; Ahmed Sabah Al-Araji; Mohammed Najm Abdullah; Hamed S Al-Raweshidy

Volume 23, Issue 3 , September 2023, , Page 156-170

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.13

Abstract
  A client-server network is one of the most important topics in a computer network. In this work, a real-time computer control system is designed based on the Client-Server Model for a Multi-Agent Mobile Robot System (CSM-MAMRS) and is applied to a building that consists of (N) floors and uses one mobile ...  Read More ...

Computer
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique

Yasmin A. Hassan; Abdul Monem S. Rahma

Volume 23, Issue 3 , September 2023, , Page 186-196

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.15

Abstract
  Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and ...  Read More ...

Computer
Software Agent Systems Serving the E-Commerce System a Comparative Study

Farah Tawfiq Abdul Hussien; Abdul Monem S. Rahma; Hala Bahjat Abdul Wahab

Volume 23, Issue 2 , June 2023, , Page 1-12

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.1

Abstract
  Providing security for each online consumer over the internet is a critical issue that may cause a time consuming problem that may cause big load on the website server especially for the large websites at the rush time. This process may generate a variety of issues, including response time delays, client ...  Read More ...

Computer
Analytical Study for Optimization Techniques to Prolong WSNs Life

Hayder I. Mutar; Muna M. Jawad

Volume 23, Issue 2 , June 2023, , Page 13-23

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.2

Abstract
  Wireless Sensor Networks (WSNs) have become the most cost- effective monitoring solution due to their low cost, despite their major drawback of limited power due to dependence on batteries. Each Sensor Node (SN) is clustered in a particular location and forms a network by self-organizing. They often ...  Read More ...