Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
Software Defined Network Implementation by Using OpenDayLight Centralized Controller

Salah Sabah Abed; Mohammed Natiq Fadhil

Volume 22, Issue 4 , December 2022, , Page 167-176

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.14

Abstract
  The most attractive study framework among academics is Software Define Networking Networking SDN, which aims to create the Internet with an architecture- independent architecture that will lead to the most significant advances in the network field. This can solve many network problems to deal with high ...  Read More ...

Computer
Generating Honeyword Based on A Proposed Bees Algorithm

Yasser A. Yasser; Ahmed T. Sadiq; Wasim AlHamdani

Volume 22, Issue 4 , December 2022, , Page 177-191

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.15

Abstract
  Honeywords are fake passwords that are typically companions to the real password “sugarword.” The honeyword technique is a password cracking detection technique that works effectively to improve the security of hashed passwords by making password cracking simpler to detect. The password database ...  Read More ...

Computer
A Convolutional Neural Network for Detecting COVID-19 from Chest X-ray Images

Basma Wael Abdullah; Hanaa Mohsin Ahmed

Volume 22, Issue 3 , September 2022, , Page 1-14

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.1

Abstract
  since the global pandemic of COVID-19 has spread out, the use of Artificial Intelligence to analyze Chest X-Ray (CXR) image for COVID-19 diagnosis and patient treatment is becoming more important. This research hypothesized that using COVID19 radiographic changes in the X-Ray images. Artificial Intelligence ...  Read More ...

Computer
Meerkat Clan-Based Feature Selection in Random Forest Algorithm for IoT Intrusion Detection

Adil Yousef Hussein; Ahmed T. Sadiq

Volume 22, Issue 3 , September 2022, , Page 15-24

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.2

Abstract
  Hackerscanconductmoredestructivecyber-attacksthankstotherapidspread of Internet of Things (IoT) devices, posing significant security risks for users. Through a malicious process, the attacker intended to exhaust the capital of the target IoT network. Researchers and company owners are concerned about ...  Read More ...

Computer
An Efficient Electronic Payment Using Biometric Authentication

Ahmed Abdul Karim Talib; Aymen Dawood Salman

Volume 22, Issue 3 , September 2022, , Page 25-33

Abstract
  Traditional identification techniques for electronic payments, such as the Personal Identification Number (PIN), are becoming outdated and unsafe, while mobile payments are becoming more popular and widely used. It presents a risk to issuers since there is no reliable consumer verification method available, ...  Read More ...

Computer
RCAE_BFV: Retrieve Encrypted Images using Convolution AutoEncoder and BFV

Emad M. Alsaedi; Alaa Kadhim Farhan

Volume 22, Issue 3 , September 2022, , Page 48-61

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.5

Abstract
  Content-Based Image Retrieval (CBIR) is an actual application in computer vision, which retrieves similar images from a database. Deep Learning (DL) is essential in many applications, including image retrieval applications. However, encryption techniques are used to protect data privacy because these ...  Read More ...

Computer
Intelligent Parameter Tuning using Deep Q-network in Adaptive Queue Management Systems

Ayman Basheer Yousif; Hassan Hassan Jaleel; Ghaida Muttasher

Volume 22, Issue 3 , September 2022, , Page 62-71

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.6

Abstract
  Network traffic has risen in recent years to the point that it is obviously and astonishingly in 2020, with the increase predicted to double in the following days. Up to 23 Teraa bit every month is an incredible amount. The Active Queue Management (AQM) algorithm is one of the most significant study ...  Read More ...

Computer
A Framework for Predicting Airfare Prices Using Machine Learning

Heba Mohammed Fadhil; Mohammed Najm Abdullah; Mohammed Issam Younis

Volume 22, Issue 3 , September 2022, , Page 81-96

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.8

Abstract
  Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques ...  Read More ...

Computer
Hybridized Dimensionality Reduction Method for Machine Learning based Web Pages Classification

Thabit Sulaiman Sabbah

Volume 22, Issue 3 , September 2022, , Page 97-110

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.9

Abstract
  Feature space high dimensionality is a well-known problem in text classification and web mining domains, it is caused mainly by the large number of vocabularies contained within web documents. Several methods were applied to select the most useful and important features over the years; however, the performance ...  Read More ...

Computer
Unmasking Deepfakes Based on Deep Learning and Noise Residuals

Wildan J. Jameel; Suhad M. Kadhem; Ayad R. Abbas

Volume 22, Issue 3 , September 2022, , Page 111-117

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.10

Abstract
  The main reason for the emergence of a deepfake (deep learning and fake) term is the evolution in artificial intelligence techniques, especially deep learning. Deep learning algorithms, which auto-solve problems when giving large sets of data, are used to swap faces in digital media to create fake media ...  Read More ...

Computer
Automatic Quality of Experience Measuring for Video Conference in Real-Time

Roaa E. Alhassany; Rana F. Ghani

Volume 22, Issue 3 , September 2022, , Page 118-127

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.11

Abstract
  In recent years, especially with COVID-19, video conference applications have become very important. Millions of peoples around the world have become to communicate with each other through using video conference applications. The most critical factor in the performance success of video conference applications ...  Read More ...

Computer
Optimizing Artificial Neural Networks Using Levy- Chaotic Mapping on Wolf Pack Optimization Algorithm for Detect Driving Sleepiness

Sarah Saadoon Jasim; Alia Karim Abdul Hassan; Scott Turner

Volume 22, Issue 3 , September 2022, , Page 128-136

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.12

Abstract
  Artificial Neural Networks (ANNs) are utilized to solve a variety of problems in many domains. In this type of network, training and selecting parameters that define networks architecture play an important role in enhancing the accuracy of the network's output; Therefore, Prior to training, those parameters ...  Read More ...

Computer
SNOW3G Modified by using PLL Algorithms in Magic Cube

Rana Mohammed Zaki; Hala Bahjat Abdul wahab

Volume 22, Issue 3 , September 2022, , Page 137-146

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.13

Abstract
  Thomas and Patrik are working on a stream cipher called SNOW 3G. In 2006, it was chosen as the centerpiece of a new set of confidentiality and integrity algorithms for the Universal Mobile Telecommunications System (UMTS). In 2008, Böhm published an article named "Statistical Evaluation of Stream Cipher ...  Read More ...

Computer
The Techniques of Based Internet Key Exchange (IKE) Protocol to Secure Key Negotiation

Zainab Kareem Mahyob; Raheem AbdulSahib Ogla; Suhiar Mohammed Zeki

Volume 22, Issue 3 , September 2022, , Page 147-154

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.14

Abstract
  The Internet is a massive network that connects millions of users from all over the world and the data transmitted via it needs great protection, especially since that are in the age of big data. To solve part of this problem, IPsec was utilized, which is a set of protocols necessary to offer security ...  Read More ...

Computer
Color Visual Cryptography Based on Three Dimensional Chaotic Map

Shaymaa Ammar Fadhil; Alaa K. Farhan

Volume 22, Issue 2 , June 2022, , Page 1-12

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.1

Abstract
  Cryptographic approaches based on chaos theory provide a several new and promising avenues for developing safe picture encryption solutions. This paper aims to complicate the process of decrypting images by adding encryption with keys, this was achieved by applying the principle of the 3D-chaotic system ...  Read More ...

Computer
Convolutional Recurrent Neural Networks for Text Lecture Summarization

Muna Ghazi; Matheel Abdulmunim

Volume 22, Issue 2 , June 2022, , Page 27-39

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.3

Abstract
  Text summarization can be utilized for variety type of purposes; one of them for summary lecture file. A long document expended long time and large capacity. Since it may contain duplicated information, more over, irrelevant details that take long period to access relevant information. Summarization ...  Read More ...

Computer
Unknown Input Observer-Based Decentralized PID- BFO Algorithm for Interconnected Systems Against Fault Actuator

Noor Safaa; Montadher sami shaker

Volume 22, Issue 2 , June 2022, , Page 40-52

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.4

Abstract
  This article presents a decentralized controller/observer for nonlinear large- scale interconnected systems with actuator fault. The proposal integrates a robust proportional-integral-derivative (PID) controller with the unknown input observer (UIO) to achieve closed-loop robustness against the interactions ...  Read More ...

Computer
A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm(Keccak)

Yusra Ahmed Ghareeb; Ekhlas Khalaf Gbashi

Volume 22, Issue 2 , June 2022, , Page 53-62

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.5

Abstract
  Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated ...  Read More ...

Computer
Comparative of Viola-Jones and YOLO v3 for Face Detection in Real time

Tameem Obaida; Nidaa Flaih Hassan; Abeer Salim Jamil

Volume 22, Issue 2 , June 2022, , Page 63-72

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.6

Abstract
  This Face detection is considering one of the important topics for recognizing human, it is the first step before the face recognition process, it is considered one of the biggest challenges in the field of vision computer. In recent years Many algorithms for detection have appeared, which depend on ...  Read More ...

Computer
Proposed Hybrid Ensemble Learning Algorithms for an Efficient Intrusion Detection System

doaa nteesha mhawi; Soukaena H. hashem

Volume 22, Issue 2 , June 2022, , Page 73-84

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.7

Abstract
  Due to sophisticated cyber-attacks, and to produce false alarms on suspicious or unusual behavior to monitor computer resources, Intrusion Detection Systems (IDSs) are required. Hence, Many Machine Learning (ML) and data mining techniques have been proposed to increase the effectiveness of IDSs, whereas ...  Read More ...

Computer
Intrusion Detection System Based on Ada boosting and Bagging Algorithm

Ali khalid Hilool; Soukaena H. hashem; Shatha H. Jafer

Volume 22, Issue 2 , June 2022, , Page 85-95

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.8

Abstract
  Computer worms execute damaging functions in the network systems, compromising system security. Although researchers use a variety of methods to detect worms and prevent their spread. Detecting worms remains a challenge for the following reasons: First, a huge volume of irrelevant data affects classification ...  Read More ...

Computer
Designing a New Lightweight AES Algorithm to Improve the Security of the IoT Environment

Sameeh Abdulghafour Jassim; Alaa K. Farhan

Volume 22, Issue 2 , June 2022, , Page 96-108

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.9

Abstract
  Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. ...  Read More ...

Computer
Detection And Count of Human Bodies In a Crowd Scene Based on Enhancement Features By Using The YOLO v5 Algorithm

Mohammed Abduljabbar Ali; Abir Jaafar Hussain; Ahmed T. Sadiq

Volume 22, Issue 2 , June 2022, , Page 125-134

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.11

Abstract
  Crowd detection has various applications nowadays. However, detecting humans in crowded circumstances is difficult because the features of different objects conflict, making cross-state detection impossible. Detectors in the overlapping zone may therefore overreact. The proposal uses the YOLO v5 (You ...  Read More ...

Computer
Survey: Recent Techniques of Image Fragile Watermarking

hala khalid Hussien; Ra'ad A. Muhajjar; Bashar saadoon mahdi

Volume 22, Issue 2 , June 2022, , Page 135-145

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.12

Abstract
  Ease of access to digital images and the many images editing programs available, like photoshop. All this makes the Issue of protecting images against modification becomes essential. Some images contain crucial information that can risk a patient's life, such as medical images and e- government images ...  Read More ...

Computer
Design of Smart Irrigation System for Vegetable Farms Based on Efficient Wireless Sensor Network

Wid Badee; Muayad Sadik Croock

Volume 22, Issue 1 , March 2022, , Page 72-85

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.1.8

Abstract
  Designing an efficient irrigation system is a crucial issue in agriculture, due to water scarcity problem around the world with the need of increasing agricultural production to satisfy the demands of the enlargement of population. Therefore, to design a smart irrigation system, a real monitoring of ...  Read More ...