Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)

Computer
Framework For Modeling and Simulation of Secure Cloud Services

Teaba Wala aldeen khairi

Volume 22, Issue 1 , March 2022, , Page 97-107

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.1.10

Abstract
  Many companies recognize the importance of cloud computing all around the world. However, various worries keep businesses from adopting cloud computing. Data security, privacy, and trust difficulties are among them. Recently, there have been rapid developments in the progression of cloud computing services. ...  Read More ...

Computer
Timetabling Problem Solving Based on Improved Meerkat Clan Algorithm (IMCA)

Mohammed Abdulwahid Jebur; Hasanen Abdullah

Volume 21, Issue 4 , December 2021, , Page 104-113

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.10

Abstract
  The university courses timetabling problem (UCTP) is a big topic among academics and institutions since it occurs every academic year. In general, UCTP is the distribution of events across slots time for each room based on a list of restrictions provided in one semester, such as (hard constraint and ...  Read More ...

Control
Optimal Linear Quadratic Control for Knee-Ankle Orthosis System

Fatimah I. Hussein; Safanah Raafat

Volume 22, Issue 2 , June 2022, , Page 109-124

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.10

Abstract
  The control technique for an exoskeleton system for lower limb rehabilitation is complicated, and numerous internal and external elements must be taken into account, in addition to the uncertainties in the system model. In this paper, through the analysis of the lower extremity exoskeleton is utilized ...  Read More ...

Computer
Unmasking Deepfakes Based on Deep Learning and Noise Residuals

Wildan J. Jameel; Suhad M. Kadhem; Ayad R. Abbas

Volume 22, Issue 3 , September 2022, , Page 111-117

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.10

Abstract
  The main reason for the emergence of a deepfake (deep learning and fake) term is the evolution in artificial intelligence techniques, especially deep learning. Deep learning algorithms, which auto-solve problems when giving large sets of data, are used to swap faces in digital media to create fake media ...  Read More ...

Impostor Recognition Based Voice Authentication by Applying Three Machine Learning Algorithms

Ashraf Tahseen Ali; Hasanen Abdullah; Mohammed Natiq Fadhil

Volume 21, Issue 3 , September 2021, , Page 112-124

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.3.10

Abstract
  As compared to other conventional biometrics systems, voice is a unique and important metric, where it is used in many vital fields as the security and communication domains that do not need to be expensive to achieve. The purpose of this article is to see how machine learning (ML) algorithms perform ...  Read More ...

Computer
A Survey of Graph Techniques Applied in Software Defined Networking

Sama Salam Samaan; Hassan Awheed Jeiad

Volume 23, Issue 3 , September 2023, , Page 115-124

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.10

Abstract
  Modelling computer networks in general, particularly Software Defined Networking (SDN) as a graph, is beneficial in network planning and design, configuration management, traffic analysis, and security. According to the dynamic nature of SDN, it needs a fast response due to the rapid changes in the network ...  Read More ...

Control
Whale Optimization Algorithm Enhances the Performance of Knee-Exoskeleton System Controlled by SMC

Zahraa Ali Waheed; Amjad Jaleel Humaidi

Volume 23, Issue 2 , June 2023, , Page 125-135

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.10

Abstract
  Physiotherapeutic exoskeleton devices have recently been developed to helppeople rehabilitate impaired limb mobility and replace the use of physiotherapists. Suchsystems are characterized by high nonlinear and time-varying coefficients. In order tocope with such difficult control challenges, a need arose ...  Read More ...

Assessment of Service Departments in the Governorates Through Social Media Comments

Sura Sabah Rasheed; Ahmed T. Sadiq

Volume 21, Issue 2 , June 2021, , Page 132-142

Abstract
  Social media have been increasing obviously and widely due to the fact that it is a mediafor users who express their emotions using reviews and comments on a variety of areas in life. In thepresent study, a modest model has been suggested for the assessment of service departments with theuse of reviews ...  Read More ...

Computer
Applying Gamma and Histogram Equalization Algorithms for Improving System-performance of Face Recognition-based CNN

shayma Ashor; Hanaa Mohsin Ahmed

Volume 22, Issue 1 , March 2022, , Page 108-117

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.1.11

Abstract
  In the last few years, many applications have viewed great development, such as smart city applications, social media, smartphones, security systems, etc. In most of these applications, facial recognition played a major role. The work of these applications begins by locating the face within the image ...  Read More ...

Computer
Automatic Quality of Experience Measuring for Video Conference in Real-Time

Roaa E. Alhassany; Rana F. Ghani

Volume 22, Issue 3 , September 2022, , Page 118-127

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.11

Abstract
  In recent years, especially with COVID-19, video conference applications have become very important. Millions of peoples around the world have become to communicate with each other through using video conference applications. The most critical factor in the performance success of video conference applications ...  Read More ...

Computer
Detection And Count of Human Bodies In a Crowd Scene Based on Enhancement Features By Using The YOLO v5 Algorithm

Mohammed Abduljabbar Ali; Abir Jaafar Hussain; Ahmed T. Sadiq

Volume 22, Issue 2 , June 2022, , Page 125-134

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.11

Abstract
  Crowd detection has various applications nowadays. However, detecting humans in crowded circumstances is difficult because the features of different objects conflict, making cross-state detection impossible. Detectors in the overlapping zone may therefore overreact. The proposal uses the YOLO v5 (You ...  Read More ...

Computer
In-Depth Assessment of Cryptographic Algorithms Namely DES, 3DES, AES, RSA, and Blowfish

Samara Mohammed Radhi; Raheem Ogla

Volume 23, Issue 3 , September 2023, , Page 125-138

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.11

Abstract
  Securing information is difficult in the modern internet era, asterabytes of data are generated daily online and online transactions occurvirtually every second. The current world's information security relies heavily oncryptography, which makes the internet a safer environment. Making informationincoherent ...  Read More ...

Computer
Object Detection Using Deep Learning Methods: A Review

Asmaa Hasan Alrubaie; Maisa'a Abid Ali Khodher; Ahmed Talib Abdulameer

Volume 23, Issue 2 , June 2023, , Page 136-152

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.11

Abstract
  Target detection, one of the key functions of computer vision, has grown in importance as a study area over the past two decades and is currently often employed. In a certain video, it seeks to rapidly and precisely detect and locate a huge amount of the objects according to redetermined categories. ...  Read More ...

Computer
Optimizing Artificial Neural Networks Using Levy- Chaotic Mapping on Wolf Pack Optimization Algorithm for Detect Driving Sleepiness

Sarah Saadoon Jasim; Alia Karim Abdul Hassan; Scott Turner

Volume 22, Issue 3 , September 2022, , Page 128-136

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.12

Abstract
  Artificial Neural Networks (ANNs) are utilized to solve a variety of problems in many domains. In this type of network, training and selecting parameters that define networks architecture play an important role in enhancing the accuracy of the network's output; Therefore, Prior to training, those parameters ...  Read More ...

Computer
Survey: Recent Techniques of Image Fragile Watermarking

hala khalid Hussien; Ra'ad A. Muhajjar; Bashar saadoon mahdi

Volume 22, Issue 2 , June 2022, , Page 135-145

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.12

Abstract
  Ease of access to digital images and the many images editing programs available, like photoshop. All this makes the Issue of protecting images against modification becomes essential. Some images contain crucial information that can risk a patient's life, such as medical images and e- government images ...  Read More ...

Communication
Review: Dual Method Cryptography and Steganography in Video Frames in IoT

Rawia Abdullah Muhammed; Maisa'a Abid Ali Al-Dabbas; Ashwak Mahmood Alabaichi

Volume 23, Issue 3 , September 2023, , Page 139-155

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.12

Abstract
  The Internet of things (IoT) is one of those emerging technologies, which aregoing to rule the world in the next few decades. The IoT environment not only enablesHuman to Machine interaction but also fosters Machine to Machine connectivity.Numerous IoT devices have poor security and insufficient computing ...  Read More ...

Computer
A survey on Deep Learning Face Synthesis and Animation Techniques Used in Deepfake

Suha Mohammed Saleh; Abdulamir A. Karim

Volume 23, Issue 2 , June 2023, , Page 153-159

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.12

Abstract
  From big data analytics to computer vision and human-level control, deep learning has been effectively applied to a wide range of complicated challenges. However, these same deep learning advancements have also been used to develop malicious software that threatens individuals' personal data, democratic ...  Read More ...

Computer
SNOW3G Modified by using PLL Algorithms in Magic Cube

Rana Mohammed Zaki; Hala Bahjat Abdul wahab

Volume 22, Issue 3 , September 2022, , Page 137-146

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.13

Abstract
  Thomas and Patrik are working on a stream cipher called SNOW 3G. In 2006, it was chosen as the centerpiece of a new set of confidentiality and integrity algorithms for the Universal Mobile Telecommunications System (UMTS). In 2008, Böhm published an article named "Statistical Evaluation of Stream Cipher ...  Read More ...

Computer
Design an Algorithm for dynamic Slice of SD-WAN Using VLAN

Talah Oday Alani; Ameer Mosa Al-Sadi

Volume 23, Issue 2 , June 2023, , Page 160-175

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.13

Abstract
  Software-Defined Network (SDN) is one of the most predominant technologies for networking in the existing and next-generation networks. SDN can conFig. , control, protect, and optimize network resources through software. The fundamental benefit of SDN is enabling the application of dynamic management. ...  Read More ...

Computer
The Techniques of Based Internet Key Exchange (IKE) Protocol to Secure Key Negotiation

Zainab Kareem Mahyob; Raheem AbdulSahib Ogla; Suhiar Mohammed Zeki

Volume 22, Issue 3 , September 2022, , Page 147-154

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.14

Abstract
  The Internet is a massive network that connects millions of users from all over the world and the data transmitted via it needs great protection, especially since that are in the age of big data. To solve part of this problem, IPsec was utilized, which is a set of protocols necessary to offer security ...  Read More ...

Computer
Recognition of Upper Limb Movements Based on Hybrid EEG and EMG Signals for Human-Robot Interaction

Huda M. Rada; Alia Karim Abdul Hassan; Ali H. Al-Timemy

Volume 23, Issue 2 , June 2023, , Page 176-191

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.14

Abstract
  Upper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive ...  Read More ...

Computer
Real-Time Multi-Agent Mobile Robot based on A Client-Server Model

Rasheed Abdul Ameer Rasheed; Ahmed Sabah Al-Araji; Mohammed Najm Abdullah; Hamed S Al-Raweshidy

Volume 23, Issue 3 , September 2023, , Page 156-170

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.13

Abstract
  A client-server network is one of the most important topics in a computer network. In this work, a real-time computer control system is designed based on the Client-Server Model for a Multi-Agent Mobile Robot System (CSM-MAMRS) and is applied to a building that consists of (N) floors and uses one mobile ...  Read More ...

Computer
A Systematic Review of Deep Dream

Lafta R. Al-Khazraji; Ayad R. Abbas; Abeer S. Jamil

Volume 23, Issue 2 , June 2023, , Page 192-209

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.15

Abstract
  Deep Dream (DD) is a new technology that works as a creative image-editing approach by employing the representations of CNN to produce dreams-like images by taking the benefits of both Deep CNN and Inception to build the dream through layer-by-layer implementation. As the days go by, the DD becomes widely ...  Read More ...

Computer
Abnormal Behavior Detection in Video Surveillance Using Inception-v3 Transfer Learning Approaches

Sabah Abdulazeez Jebur; Khalid A. Hussein; Haider Kadhim Hoomod

Volume 23, Issue 2 , June 2023, , Page 210-221

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.2.16

Abstract
  The use of video surveillance systems has increased due to security concerns and their relatively low cost. Researchers are working to create intelligent Closed Circuit Television (CCTV) cameras that can automatically analyze behavior in real-time to detect anomalous behaviors and prevent dangerous accidents. ...  Read More ...

Design Interval Type-2 Fuzzy Like (PID) Controller for Trajectory Tracking of Mobile Robot

Mohamed J. Mohamed; Mustafa Y. Abbas

Volume 19, Issue 3 , July 2019, , Page 1-15

https://doi.org/https://doi.org/10.33103/uot.ijccce.19.3.1

Abstract
  One of the major problems in the field of mobile robots is the trajectory tracking problem. There are a big number of investigations for different control strategies that have been used to control the motion of the mobile robot when the nonlinear kinematic model of mobile robots was considered. The trajectory ...  Read More ...