Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)

Particle Swarm Optimization Based LQ-Servo Controller for Congestion Avoidance

Sana S. Sabry; Thaker M. Nayl

Volume 19, Issue 1 , January 2019, , Page 63-70

Abstract
  The network congestion is an essential problem that leads to packetslosing and performance degradation. Thus, preventing congestion in thenetwork is very important to enhance and improve the quality of service. Activequeue management (AQM) is the solution to control congestion in TCP networkmiddle nodes ...  Read More ...

Indoor Localization System Using Wi-Fi Technology

Noor Abdul Khaleq Zghair; Muayad Sadik Croock; Ali Abdul Razzaq Taresh

Volume 19, Issue 2 , April 2019, , Page 69-77

Abstract
  Recently, indoor localization has witnessed an increase in interest,due to the potential wide range of using in different applications, such asInternet of Things (IoT). It is also providing a solution for the absence of GlobalPositioning System (GPS) signals inside buildings. Different techniques havebeen ...  Read More ...

Computer
Design of Smart Irrigation System for Vegetable Farms Based on Efficient Wireless Sensor Network

Wid Badee; Muayad Sadik Croock

Volume 22, Issue 1 , March 2022, , Page 72-85

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.1.8

Abstract
  Designing an efficient irrigation system is a crucial issue in agriculture, due to water scarcity problem around the world with the need of increasing agricultural production to satisfy the demands of the enlargement of population. Therefore, to design a smart irrigation system, a real monitoring of ...  Read More ...

Performance Evaluation of Fiber Bragg Grating Strain Sensor Integrating in WDM Communication System

Mohammed Ali Yaseen; A. K. Abass

Volume 20, Issue 2 , April 2020, , Page 74-78

Abstract
  In this paper, a fiber Bragg grating (FBG) strain sensor is simulated utilizing OptiGrating software. Then the proposed sensor is integrated into the wavelength division multiplexing (WDM) communication system via OptiSystem software in order to evaluate its performance as a strain sensor. The proposed ...  Read More ...

Computer
A Framework for Predicting Airfare Prices Using Machine Learning

Heba Mohammed Fadhil; Mohammed Najm Abdullah; Mohammed Issam Younis

Volume 22, Issue 3 , September 2022, , Page 81-96

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.8

Abstract
  Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques ...  Read More ...

Computer
Speaker Recognition System Based on Mel Frequency Cepstral Coefficient and Four Features

Ashraf Tahseen Ali; Hasanen Abdullah; Mohammed Natiq Fadhil

Volume 21, Issue 4 , December 2021, , Page 82-89

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.8

Abstract
  Biometrics signs are the most important factor in the human recognition field and considered an effective technique for person authentication systems. Voice recognition is a popular method to use due to its ease of implementation and acceptable effectiveness. This research paper will introduce a speaker ...  Read More ...

Computer
Intrusion Detection System Based on Ada boosting and Bagging Algorithm

Ali khalid Hilool; Soukaena H. hashem; Shatha H. Jafer

Volume 22, Issue 2 , June 2022, , Page 85-95

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.8

Abstract
  Computer worms execute damaging functions in the network systems, compromising system security. Although researchers use a variety of methods to detect worms and prevent their spread. Detecting worms remains a challenge for the following reasons: First, a huge volume of irrelevant data affects classification ...  Read More ...

The Use of the Moore-Penrose Pseudoinverse for Evaluating the RGA of Non-Square Systems

Rafal Al Yousuf; Jeffrey Uhlmann

Volume 21, Issue 3 , September 2021, , Page 89-97

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.3.8

Abstract
  A recently-derived alternative method for computing the relative gain array (RGA) for singular and/or non-square systems has been proposed, which provably guarantees unit invariance. This property is not offered by the conventional method that uses the Moore-Penrose (MP) pseudoinverse. In this paper, ...  Read More ...

Communication
Design of Ultra Dense WDM Optical Communication System to Reduce Signal Impairments Using DCF and Repeater Techniques

Dina S Akram; Haydar M. AL-Tamimi

Volume 23, Issue 3 , September 2023, , Page 90-103

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.8

Abstract
  Linear and non-linear impairments are the major problems that affected the dense wavelength division multiplexing (DWDM) system performance. In this simulation designs, two different compensation techniques have been proposed to eliminate signal impairments. The repeater technique was ...  Read More ...

Communication
Performance Evaluation of 64 x 64 c Node-B Antenna Beamforming for 5G Mobile System

Akam Hussein Hasan; Jalal J Hamad Ameen

Volume 23, Issue 1 , March 2023, , Page 95-103

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.8

Abstract
  Since the need for larger data rates and wireless system radio networks has increased, several organizations in this industry have started to develop and implement their 5G mobile technology scenarios. Since mobile telecommunications' quick expansion has motivated companies to constantly plan and work ...  Read More ...

Computer
Design and Implementation of Security Gatway for IoT Devices Security

Ekhlas Kadhum Hamza; Marwan Alaa Hussein

Volume 23, Issue 2 , June 2023, , Page 95-111

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.8

Abstract
  As the Internet of Things (IoT) is growing in popularity globally, which has resulted in a rise in cyber threats, experts are focusing more on its security. The majority of IoT security research to date has concentrated on huge devices, while small IoT devices have received comparably little attention. ...  Read More ...

Control
A Comparative Study of Graph Search Algorithms for Planar Manipulator to Avoid Obstacle Collision

Mustafa Laith Muhammed; Amjad Jaleel Humaidi; Enass Hassan Flaieh

Volume 22, Issue 4 , December 2022, , Page 99-114

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.8

Abstract
  The search algorithms are characterized by their ability to find the optimal path in a short calculation time. In this study, a comparative analysis has been conducted to perform path planning of planar manipulator for static obstacle avoidance based on graph search algorithms. Four methods have been ...  Read More ...

A Comparative Study of Researches Based on Magic Square in Encryption with Proposing a New Technology

Ibrahim Malik ALattar; Abdul Monem S Rahma

Volume 21, Issue 2 , June 2021, , Page 102-114

Abstract
  This paper aims to develop a new cryptographic algorithm that isbased on the magic square method of order five with multi message lengths tobe more complex in order to increase the complexity; in addition to comparingthe cipher with the use of the magic square of order five, four and three (allsingle ...  Read More ...

Routing with Energy Threshold for WSN-IoT Based on RPL Protocol

Sarah Ammar Rafea; Abdulkareem Abdulrahman Kadhim

Volume 19, Issue 1 , January 2019, , Page 71-81

Abstract
  Internet of Things (IoT) enables things to have connectivity throughthe internet. The number of things is growing fast and has to be uniquelyidentified through the Internet to communicate with other things. In WirelessSensor Networks (WSNs) each node can be considered as a thing. WSN noderesources are ...  Read More ...

Bandwidth Utilization Prediction in LAN Network Using Time Series Modeling

Ammar T. Namel; Mouayad A. Sahib; Shatha M. Hasan

Volume 19, Issue 2 , April 2019, , Page 78-89

Abstract
  monitoring the behavior of computer networks is essential forproblem identification and optimal management. Part of this behavior to bemonitored is the utilization of the network bandwidth. Several techniques areused to model and forecast network traffic such as time series models, moderndata mining ...  Read More ...

Computer
Task Scheduling in Cloud Computing Based on The Cuckoo Search Algorithm

sajjad shamkhi jaber; Yossra Ali; Nuha Ibrahim

Volume 22, Issue 1 , March 2022, , Page 86-96

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.1.9

Abstract
  Task scheduling is one of the very crucial facets of cloud computing. The task scheduling method must assign jobs to virtual machines. In cloud computing, task scheduling includes a frontal influence on a system's resource utilization and operational costs. Diverse meta-heuristic algorithms, in addition ...  Read More ...

3D Textured Model Encryption Using 2D Logistic and 3D Lorenz Chaotic Map

Nashwan Alsalam Ali; Abdul Monem S Rahma; Shaimaa h. Shaker

Volume 21, Issue 4 , December 2021, , Page 90-103

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.9

Abstract
  The widespread of recent multimedia, including various 3D model applications in different domains of areas, may lead to 3D models being stolen and attacked by hackers. Moreover, 3D models must be protected from unauthorized users and when transmitting over the internet. Nowadays the 3D model protection ...  Read More ...

Computer
Designing a New Lightweight AES Algorithm to Improve the Security of the IoT Environment

Sameeh Abdulghafour Jassim; Alaa K. Farhan

Volume 22, Issue 2 , June 2022, , Page 96-108

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.9

Abstract
  Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. ...  Read More ...

Computer
Hybridized Dimensionality Reduction Method for Machine Learning based Web Pages Classification

Thabit Sulaiman Sabbah

Volume 22, Issue 3 , September 2022, , Page 97-110

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.9

Abstract
  Feature space high dimensionality is a well-known problem in text classification and web mining domains, it is caused mainly by the large number of vocabularies contained within web documents. Several methods were applied to select the most useful and important features over the years; however, the performance ...  Read More ...

Impostor Detection Based Finger Veins Applying Machine Learning Methods

Ashraf Tahseen Ali; Hasanen Abdullah; Mohammed Natiq Fadhil

Volume 21, Issue 3 , September 2021, , Page 98-111

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.3.9

Abstract
  Finger veins are different from other biometric signs; it is a special characteristic of the human body. The challenge for an imposter to explore and comprehend it, since the veins are below the skin, it is impossible to tell which one is, and which one stands out because the person has more than one ...  Read More ...

Computer
Efficient Iris Image Recognition System Based on Machine Learning Approach

Hind Moutaz Al-Dabbas; Raghad Abdulaali Azeez; Akbas Ezaldeen Ali

Volume 23, Issue 3 , September 2023, , Page 104-114

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.9

Abstract
  Iris identification is a well‐ known technology used to detect striking biometric identification techniques for recognizing human beings based on physical behavior. The texture of the iris is essential and its anatomy varies from individual to individual. Humans have distinctive physical characteristics ...  Read More ...

Computer
Automatic Translation From Iraqi Sign Language to Arabic Text or Speech Using CNN

Raja’a M. Mohammed; Suhad M. Kadhem

Volume 23, Issue 2 , June 2023, , Page 112-124

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.9

Abstract
  Sign language (SL) is Non-verbal communication and a way for thedeaf and mute to communicate without words. A deaf and mute person's hands,face, and body shows what they want to say. Since the number of deaf and dumbpeople is increasing, there must be other ways to learn sign language orcommunicate with ...  Read More ...

Comparison of Three Proposal Methods in Steganography Encryption Secret Message using PVD and MapReduce

Huda Ghazie Abd UL Sahib; Maisa Abid Ali Khodher

Volume 21, Issue 2 , June 2021, , Page 115-131

Abstract
  This paper will present a comparison between three proposed methods. All of these methodsinclude hiding a secret message inside a video for the aim of transferring it to another party with highsecurity and a high embedding rate in order to ensure that the secret message is not discovered by theattacker. ...  Read More ...

Smart Autonomous Wheelchair Controlled by Voice Commands-Aided by Tracking System

Farah F. Alkhalid; Bashra Kadhim Oleiwi

Volume 19, Issue 1 , January 2019, , Page 82-87

Abstract
  This study focuses on the design of an autonomous wheelchair basedsmart driving features for disabled persons. The movement directions andposition tracking of the wheelchair are controlled and localized by pre-definedvoice commands and global positioning system (GPS), respectively. Arduinomicrocontroller ...  Read More ...

Reducing Short Circuit Level in 400kV Iraqi Grid System by Using FACTS Device

Inaam I. Ali; Mohanad Sh. Tarad Al-Aasam

Volume 19, Issue 2 , April 2019, , Page 90-99

Abstract
  Electrical power systems are different in their sizes because of their amount of generation power stations, substations, transmission lines and loads. Therefore, these factors may impact on short circuit levels values. Capacity of power stations and dummy transmission lines in Extra high voltage grid ...  Read More ...