Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)

Communication
Machine Learning for Identifying Fraud in Credit Card Transactions

Mohammad Abd Abbas; Bilal Ghazal Ghazal; Ahmad ghandour Ghandour

Volume 24, Issue 1 , March 2024, , Page 71-83

https://doi.org/https://doi.org/10.33103/uot.ijccce.24.1.6

Abstract
  Online payment methods for e-commerce and many websites in various fields have increased significantly. Therefore, credit card frauds are easy targets, and their rate is on the rise which poses a major problem for online payments. The basic concept is to examine consumers' purchasing histories to extrapolate ...  Read More ...

Computer
Developed the EX-RED Algorithm to Find Best Parameters Based on Load Connection Factor

Amar A. Mahawish; Hassan Jalee.l Hassan

Volume 23, Issue 4 , December 2023, , Page 84-94

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.4.8

Abstract
  The performance of the Internet is significantly impacted by network congestion. Because of the internet's current rapid growth, congestion could increase and cause more packets to be dropped. The Transmission Control Protocol (TCP) connection is used as the reliable transmission of packets which has ...  Read More ...

Computer
Design of Face Detection and Recognition System to Enhance Security of Safe Locker

Mohammed Majid Msallam

Volume 23, Issue 4 , December 2023, , Page 95-105

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.4.9

Abstract
  In recent years, safe lockers have been spread in public places to secure valuable belongings. The people are concerned about losing safe locker keys or use of the spare key by others and will remain worried about their things. To solve the forenamed matter, this paper proposed a system that depends ...  Read More ...

Computer
Deep Learning Based on Attention in Semantic Segmentation: An Introductory Survey

Muna Khalaf; Ban N. Dhannoon

Volume 23, Issue 1 , March 2023, , Page 104-114

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.9

Abstract
  Semantic segmentation refers to labeling each pixel in the scene to its belonging object. It is a critical task for many computer vision applications that requires scene understanding because It attempts to mimic human perceptual grouping. Despite the unremitting efforts in this field, it is still a ...  Read More ...

Computer
Dynamic Shifts in Digital Currencies: Tracing the Evolution of Digital Currencies from Bitcoin's Inception to 2023

Asmaa A Mohammed; Abdul Monem S. Rahma; Hala B. Abdulwahad

Volume 23, Issue 4 , December 2023, , Page 106-116

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.4.10

Abstract
  The rapid "development of communication technology" has had a considerable impact on financial transactions, leading to the appearance of new types of "currency." These digital currencies are intended to streamline processes, decrease time and effort expenditures, and minimize financial losses while ...  Read More ...

Computer
A Hybrid Digital Image Watermarking By Using DWT and LSB Method

Zainab F. Makhrib; Abdulamir A. karim

Volume 22, Issue 4 , December 2022, , Page 115-126

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.9

Abstract
  The Digital watermarking is a field of information hiding that entails hiding the crucial information in the original data in order to prevent illegal duplication and distribution of multimedia data such as image, video, text and ect.. In this paper, we present two techniques to embed watermarks in the ...  Read More ...

Control
Comparative Between Backstepping and Adaptive Backstepping Control for Controlling Prosthetic Knee

Mayyasah Ali Salman; Saleem Khalefa Kadhim

Volume 23, Issue 1 , March 2023, , Page 115-131

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.10

Abstract
  The lower limb amputees are increasing day by day. This has led to an increase in research in the field of prosthetic knee. In this work, a prosthetic knee was designed and developed to assist human movements and more quality of life for millions of individuals who have lost lower limbs. The dynamic ...  Read More ...

Computer
A Proposed Authentication Method for Document in Blockchain Based E-Government System

Zainab A. Kamal; Rana F. Ghani

Volume 22, Issue 4 , December 2022, , Page 127-139

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.10

Abstract
  the primary concerns with manual transactions include corruption, lack oftransparency, fraud, and mismanagement of distribution operations, all of which arecreated by traditional centralized applications, necessitating the migration to blockchaintechnology. In this work, a system is presented to secure ...  Read More ...

Communication
Review on Fractal Video and Image Compression Techniques

Baydaa Sh. Z. Abood; Hanan A. R. Akkar; Amean Sh. Al-Safi

Volume 23, Issue 1 , March 2023, , Page 132-142

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.11

Abstract
  Compression of images process is a step in the image processing. It is concerned with the transmission and storage of digitally created images. Fractal coding is a potential image and video compression approach with good reconstruction fidelity and relatively large compression ratios, because of its ...  Read More ...

Control
Machine Learning Approach Based on Automated Classification for Leg Rehabilitation

Ayat Naji Hussain; Sahar Adil Abboud; Basim Abdul baki Jumaa; Mohammed Najm Abdullah

Volume 22, Issue 4 , December 2022, , Page 140-151

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.11

Abstract
  Human gait data follows distinct and identifiable patterns that are critical for movement analysis and evaluation Like other biological signals. The success of a rehabilitation program is dependent on the execution of proper progress monitoring. To ensure success, diagnosis of gait anomalies, as well ...  Read More ...

Computer
Dynamic Model Based on the Gaming Argumentation Framework (DGAF): Foreign Exchange Market as A Case of Study

Adnan T. Kareem; Hasanen S. Abdullah; Ahmed T. Sadiq

Volume 23, Issue 1 , March 2023, , Page 143-164

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.12

Abstract
  argumentation has become an attraction recently, because it is widely used in decision-making, at 1994 Dung invented a new argumentation model, called Argumentation Framework AF. This system investigates assaults of arguments, and it also works away on attributes, this model is designed to take care ...  Read More ...

Computer
Cardiovascular Patients Monitoring Using Internet of Things And Decision Tree

Rasha Ismail Ahmed; Rasha Mohammed Mohsin Mohammed Mohsin; Rana Fareed Ghani

Volume 22, Issue 4 , December 2022, , Page 152-159

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.12

Abstract
  The rapid growth of the human population and the spread of many bad habits affect the health of human beings, this leads to many health problems, such as heart disease, blood pressure, and diabetes. Some of these diseases require earlier detection and fast treatment, to avoid major risks, such as permanent ...  Read More ...

Computer
Image Protection Using Genetic Algorithm and Cipher Technique

Raad Abdul Ameer Qasim; Bashar Saadoon Mahdi

Volume 22, Issue 4 , December 2022, , Page 160-166

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.13

Abstract
  Image Protection is one of the most important issues that have created problems in technology challenges in the past and present years, whether they are stored or when sent to other parties. And how to develop the techniques adopted in encrypting it, devise new methods, or integrate the available technologies ...  Read More ...

Communication
A Review of Modern and Recent Studies on the Low-Density Parity-Check Technology Approach

Noora Nazar kamal; Qusay F. Al-Doori; Omar Alani

Volume 23, Issue 1 , March 2023, , Page 165-178

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.13

Abstract
  Data theory coding is an excellent and well-known branch of study that has produced various crucial solutionsto the insoluble challenges of safe data transfers. Last improvements in detecting error techniques have resulted in a significant increase in the use of low-density parity-check (LDPC) code to ...  Read More ...

Computer
Software Defined Network Implementation by Using OpenDayLight Centralized Controller

Salah Sabah Abed; Mohammed Natiq Fadhil

Volume 22, Issue 4 , December 2022, , Page 167-176

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.14

Abstract
  The most attractive study framework among academics is Software Define Networking Networking SDN, which aims to create the Internet with an architecture- independent architecture that will lead to the most significant advances in the network field. This can solve many network problems to deal with high ...  Read More ...

Control
A Review of Smart Structures Vibration Control Strategies

Imad Zuhair; Hasan M Alwan; Hussain M. Al-Khafaji

Volume 23, Issue 3 , September 2023, , Page 171-185

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.14

Abstract
  The expert system and artificial intelligence are still important modern technologies. A structure can modify its behavior under dynamic stresses by using active controls. The term "intelligent" or "smart" structures refers to these self-modifying structures. The structural engineering discipline may ...  Read More ...

Computer
Generating Honeyword Based on A Proposed Bees Algorithm

Yasser A. Yasser; Ahmed T. Sadiq; Wasim AlHamdani

Volume 22, Issue 4 , December 2022, , Page 177-191

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.15

Abstract
  Honeywords are fake passwords that are typically companions to the real password “sugarword.” The honeyword technique is a password cracking detection technique that works effectively to improve the security of hashed passwords by making password cracking simpler to detect. The password database ...  Read More ...

Control
Discontinuous Control Analysis and Design for Temperature Control of Thermal System

Bashar F. Midhat

Volume 23, Issue 1 , March 2023, , Page 179-188

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.14

Abstract
  Temperature control system is a widely applied process since temperature plays a major role in our life starting from room temperature conditioning to various industrial and medical applications. In this paper, a control algorithm is proposed for controlling the temperature of a certain process. Analysis ...  Read More ...

Computer
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique

Yasmin A. Hassan; Abdul Monem S. Rahma

Volume 23, Issue 3 , September 2023, , Page 186-196

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.15

Abstract
  Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and ...  Read More ...

Communication
D-GIFT: Cryptography Algorithm Development Using Dynamic DNA and A Chaos Map

Ghada K. Emad; Soukaena Hassan Hashiem

Volume 23, Issue 1 , March 2023, , Page 189-197

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.15

Abstract
  Recently, the growth of data transmission through various networks has the necessity for an elevated level of security. Encryption is one of the essential technologies for protecting and ensuring the integrity of IoT devices. Secure communication among constrained devices is critical during data transmission ...  Read More ...