Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
Short Survey of the Interleaver Technique in Communication System

Zeina Abdullah Humadi; Qusay Fadhel Al-Doori

Volume 23, Issue 2 , June 2023, , Page 24-36

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.3

Abstract
  Communication and computing systems have made it easier for the world to transfer data and information from the sender to the recipient at the lowest cost and most efficiency. The transmission process may cause data corruption or error for many reasons, including the environment, the large volume of ...  Read More ...

Computer
Dynamic Obstacle Avoidance Algorithm for Autonomous Mobile Robots

Noor Abdul Khaleq Zghair; Ahmed S. Al-Araji

Volume 23, Issue 2 , June 2023, , Page 63-82

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.6

Abstract
  A mobile robot's major purpose is to get to its destination by traveling over an optimum path defined by various parameters such as time, distance, and the robot's safety from any impediments in its path. As a result, the backbone of the autonomous mobile robot is path planning and obstacle avoidance. ...  Read More ...

Computer
Design and Implementation of Security Gatway for IoT Devices Security

Ekhlas Kadhum Hamza; Marwan Alaa Hussein

Volume 23, Issue 2 , June 2023, , Page 95-111

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.8

Abstract
  As the Internet of Things (IoT) is growing in popularity globally, which has resulted in a rise in cyber threats, experts are focusing more on its security. The majority of IoT security research to date has concentrated on huge devices, while small IoT devices have received comparably little attention. ...  Read More ...

Computer
Automatic Translation From Iraqi Sign Language to Arabic Text or Speech Using CNN

Raja’a M. Mohammed; Suhad M. Kadhem

Volume 23, Issue 2 , June 2023, , Page 112-124

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.9

Abstract
  Sign language (SL) is Non-verbal communication and a way for thedeaf and mute to communicate without words. A deaf and mute person's hands,face, and body shows what they want to say. Since the number of deaf and dumbpeople is increasing, there must be other ways to learn sign language orcommunicate with ...  Read More ...

Computer
Object Detection Using Deep Learning Methods: A Review

Asmaa Hasan Alrubaie; Maisa'a Abid Ali Khodher; Ahmed Talib Abdulameer

Volume 23, Issue 2 , June 2023, , Page 136-152

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.11

Abstract
  Target detection, one of the key functions of computer vision, has grown in importance as a study area over the past two decades and is currently often employed. In a certain video, it seeks to rapidly and precisely detect and locate a huge amount of the objects according to redetermined categories. ...  Read More ...

Computer
A survey on Deep Learning Face Synthesis and Animation Techniques Used in Deepfake

Suha Mohammed Saleh; Abdulamir A. Karim

Volume 23, Issue 2 , June 2023, , Page 153-159

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.12

Abstract
  From big data analytics to computer vision and human-level control, deep learning has been effectively applied to a wide range of complicated challenges. However, these same deep learning advancements have also been used to develop malicious software that threatens individuals' personal data, democratic ...  Read More ...

Computer
Design an Algorithm for dynamic Slice of SD-WAN Using VLAN

Talah Oday Alani; Ameer Mosa Al-Sadi

Volume 23, Issue 2 , June 2023, , Page 160-175

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.13

Abstract
  Software-Defined Network (SDN) is one of the most predominant technologies for networking in the existing and next-generation networks. SDN can conFig. , control, protect, and optimize network resources through software. The fundamental benefit of SDN is enabling the application of dynamic management. ...  Read More ...

Computer
Recognition of Upper Limb Movements Based on Hybrid EEG and EMG Signals for Human-Robot Interaction

Huda M. Rada; Alia Karim Abdul Hassan; Ali H. Al-Timemy

Volume 23, Issue 2 , June 2023, , Page 176-191

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.14

Abstract
  Upper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive ...  Read More ...

Computer
A Systematic Review of Deep Dream

Lafta R. Al-Khazraji; Ayad R. Abbas; Abeer S. Jamil

Volume 23, Issue 2 , June 2023, , Page 192-209

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.15

Abstract
  Deep Dream (DD) is a new technology that works as a creative image-editing approach by employing the representations of CNN to produce dreams-like images by taking the benefits of both Deep CNN and Inception to build the dream through layer-by-layer implementation. As the days go by, the DD becomes widely ...  Read More ...

Computer
Abnormal Behavior Detection in Video Surveillance Using Inception-v3 Transfer Learning Approaches

Sabah Abdulazeez Jebur; Khalid A. Hussein; Haider Kadhim Hoomod

Volume 23, Issue 2 , June 2023, , Page 210-221

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.16

Abstract
  The use of video surveillance systems has increased due to security concerns and their relatively low cost. Researchers are working to create intelligent Closed Circuit Television (CCTV) cameras that can automatically analyze behavior in real-time to detect anomalous behaviors and prevent dangerous accidents. ...  Read More ...

Computer
A Proposed Algorithm for Hiding a Text in an Image Using QR Code

Haider Saeed Wdhayeh; Raghad Abdulaali Azeez; Athraa Jasim Mohammed

Volume 23, Issue 1 , March 2023, , Page 1-9

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.1

Abstract
  In this paper, an algorithm to hide information in an image using QR code technology is presented. QR Code “QUICK RESPONSE CODE” is a two-dimensional array that can include different types of data and was first developed in 1993 for the Japanese Toyota Corporation for the purpose of tracking ...  Read More ...

Computer
Data Analytics and Blockchain: A Review

Safa S. Abdul-Jabbar; Alaa K. Farhan; Rana F. Ghani

Volume 23, Issue 1 , March 2023, , Page 23-34

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.3

Abstract
  Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships ...  Read More ...

Computer
Architecture of Deep Learning and Its Applications

Afrah Salman Dawood; Zena Mohammed Faris

Volume 23, Issue 1 , March 2023, , Page 35-56

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.4

Abstract
  Recently, Deep Learning (DL) has accomplished enormous prosperity in various areas, like natural language processing (NLP), image processing, different medical issues and computer vision. Both Machine Learning (ML) and DL as compared to traditional methods, can learn and make better and enhanced use ...  Read More ...

Computer
A Review: E-voting Security in Mobile Fog computing

Asmaa Ibrahim Hussieen; Abeer Tariq MaoLood; Ekhlas Khalaf Gbash

Volume 23, Issue 1 , March 2023, , Page 57-68

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.5

Abstract
  Conventional voting activities are often replaced by electronic voting (EV) in light of the quick expansion of the Internet. For a variety of reasons, various nations have lately switched to EV rather than conventional voting. Different EV systems were presented up to this point. In both practical and ...  Read More ...

Computer
Deep Learning Based on Attention in Semantic Segmentation: An Introductory Survey

Muna Khalaf; Ban N. Dhannoon

Volume 23, Issue 1 , March 2023, , Page 104-114

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.9

Abstract
  Semantic segmentation refers to labeling each pixel in the scene to its belonging object. It is a critical task for many computer vision applications that requires scene understanding because It attempts to mimic human perceptual grouping. Despite the unremitting efforts in this field, it is still a ...  Read More ...

Computer
Dynamic Model Based on the Gaming Argumentation Framework (DGAF): Foreign Exchange Market as A Case of Study

Adnan T. Kareem; Hasanen S. Abdullah; Ahmed T. Sadiq

Volume 23, Issue 1 , March 2023, , Page 143-164

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.12

Abstract
  argumentation has become an attraction recently, because it is widely used in decision-making, at 1994 Dung invented a new argumentation model, called Argumentation Framework AF. This system investigates assaults of arguments, and it also works away on attributes, this model is designed to take care ...  Read More ...

Computer
Machine Learning Techniques for Vehicle Detection

Maryam Raad Shihab; Rana Fareed Ghani; Athraa Jasim Mohammed

Volume 22, Issue 4 , December 2022, , Page 1-12

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.1

Abstract
  The traffic surveillance system is a type of intelligent system of traffic control. Traffic control provides solutions to most problems faced by people. It helps to monitor, detect traffic congestion and traffic accidents. As science evolved, it became possible to control traffic using video surveillance. ...  Read More ...

Computer
Predicting Alzheimer's Disease Using Filter Feature Selection Method

Shaymaa Taha Ahmed; Suhad Malallah Kadhem

Volume 22, Issue 4 , December 2022, , Page 13-27

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.2

Abstract
  Alzheimer’s disease (AD) is caused by multiple variables. Alzheimer's disease development and progression are influenced by genetic variants. The molecular pathways causing Alzheimer's disease are still poorly understood. In Alzheimer's disease research, determining an effective and reliable diagnosis ...  Read More ...

Computer
Systematic Review on Cyber-Security Applications

Shaymaa Mahmood Naser; Yossra Hussain Ali

Volume 22, Issue 4 , December 2022, , Page 28-36

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.3

Abstract
  Cybersecurity systems have been taken into account in modern information systems and methods. This is due to the increase in electronic attacks on storage information in terms of transmission, reception and storage. Therefore, the need to produce such systems in a complete way to prevent their penetration ...  Read More ...

Computer
Medical Image Enhancement Techniques

Dhuha Abd Almoanf; Shaimaa H. Shaker

Volume 22, Issue 4 , December 2022, , Page 48-59

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.5

Abstract
  Computed tomography (CT) is used to diagnose diseases and tumors. A special dye called contrast material is used in CT scans to assist emphasize the parts of the body being examined. Therefore, an enhancement technique to improve CT images' degradation is needed. This paper aims to present a method to ...  Read More ...

Computer
Combinatorial Testing Approaches: A Systematic Review

Heba Mohammed Fadhil; Mohammed Najm Abdullah; Mohammed Issam Younis

Volume 22, Issue 4 , December 2022, , Page 60-79

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.6

Abstract
  Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and ...  Read More ...

Computer
A Hybrid Digital Image Watermarking By Using DWT and LSB Method

Zainab F. Makhrib; Abdulamir A. karim

Volume 22, Issue 4 , December 2022, , Page 115-126

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.9

Abstract
  The Digital watermarking is a field of information hiding that entails hiding the crucial information in the original data in order to prevent illegal duplication and distribution of multimedia data such as image, video, text and ect.. In this paper, we present two techniques to embed watermarks in the ...  Read More ...

Computer
A Proposed Authentication Method for Document in Blockchain Based E-Government System

Zainab A. Kamal; Rana F. Ghani

Volume 22, Issue 4 , December 2022, , Page 127-139

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.10

Abstract
  the primary concerns with manual transactions include corruption, lack oftransparency, fraud, and mismanagement of distribution operations, all of which arecreated by traditional centralized applications, necessitating the migration to blockchaintechnology. In this work, a system is presented to secure ...  Read More ...

Computer
Cardiovascular Patients Monitoring Using Internet of Things And Decision Tree

Rasha Ismail Ahmed; Rasha Mohammed Mohsin Mohammed Mohsin; Rana Fareed Ghani

Volume 22, Issue 4 , December 2022, , Page 152-159

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.12

Abstract
  The rapid growth of the human population and the spread of many bad habits affect the health of human beings, this leads to many health problems, such as heart disease, blood pressure, and diabetes. Some of these diseases require earlier detection and fast treatment, to avoid major risks, such as permanent ...  Read More ...

Computer
Image Protection Using Genetic Algorithm and Cipher Technique

Raad Abdul Ameer Qasim; Bashar Saadoon Mahdi

Volume 22, Issue 4 , December 2022, , Page 160-166

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.13

Abstract
  Image Protection is one of the most important issues that have created problems in technology challenges in the past and present years, whether they are stored or when sent to other parties. And how to develop the techniques adopted in encrypting it, devise new methods, or integrate the available technologies ...  Read More ...