Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
Task Scheduling in Cloud Computing Based on The Cuckoo Search Algorithm

sajjad shamkhi jaber; Yossra Ali; Nuha Ibrahim

Volume 22, Issue 1 , March 2022, , Page 86-96

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.1.9

Abstract
  Task scheduling is one of the very crucial facets of cloud computing. The task scheduling method must assign jobs to virtual machines. In cloud computing, task scheduling includes a frontal influence on a system's resource utilization and operational costs. Diverse meta-heuristic algorithms, in addition ...  Read More ...

Computer
Framework For Modeling and Simulation of Secure Cloud Services

Teaba Wala aldeen khairi

Volume 22, Issue 1 , March 2022, , Page 97-107

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.1.10

Abstract
  Many companies recognize the importance of cloud computing all around the world. However, various worries keep businesses from adopting cloud computing. Data security, privacy, and trust difficulties are among them. Recently, there have been rapid developments in the progression of cloud computing services. ...  Read More ...

Computer
Applying Gamma and Histogram Equalization Algorithms for Improving System-performance of Face Recognition-based CNN

shayma Ashor; Hanaa Mohsin Ahmed

Volume 22, Issue 1 , March 2022, , Page 108-117

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.1.11

Abstract
  In the last few years, many applications have viewed great development, such as smart city applications, social media, smartphones, security systems, etc. In most of these applications, facial recognition played a major role. The work of these applications begins by locating the face within the image ...  Read More ...

Computer
Speaker Recognition System Based on Mel Frequency Cepstral Coefficient and Four Features

Ashraf Tahseen Ali; Hasanen Abdullah; Mohammed Natiq Fadhil

Volume 21, Issue 4 , December 2021, , Page 82-89

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.8

Abstract
  Biometrics signs are the most important factor in the human recognition field and considered an effective technique for person authentication systems. Voice recognition is a popular method to use due to its ease of implementation and acceptable effectiveness. This research paper will introduce a speaker ...  Read More ...

Computer
Timetabling Problem Solving Based on Improved Meerkat Clan Algorithm (IMCA)

Mohammed Abdulwahid Jebur; Hasanen Abdullah

Volume 21, Issue 4 , December 2021, , Page 104-113

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.10

Abstract
  The university courses timetabling problem (UCTP) is a big topic among academics and institutions since it occurs every academic year. In general, UCTP is the distribution of events across slots time for each room based on a list of restrictions provided in one semester, such as (hard constraint and ...  Read More ...