Volume 23 (2023)
Volume 22 (2022)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Integrating Wearable Devices for Intelligent Health Monitoring System

Sondous Sulaiman Wali; Mohammed Najm Abdullah

Volume 21, Issue 4 , December 2021, Page 1-14

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.1

Abstract
  It is known that many individuals suffer from chronic diseases such as heart disease, high blood pressure, and sleep apnea, which requires constant monitoring, which is only found in the hospital, and the high cost that the individual cannot afford, especially at present. This paper proposes a system ...  Read More ...

Detection and Classification of Leaf Disease Using Deep Learning for a Greenhouses’ Robot

shahad ahmed; Saman Hameed Ameen

Volume 21, Issue 4 , December 2021, Page 15-28

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.2

Abstract
  Plant diseases are a severe threat to the environment, economy, and health. Early disease identification remains a challenging task in Iraq due to the scarce of the necessary resources and infrastructure. This paper uses various deep learning algorithms to detect different diseases on plant leaves and ...  Read More ...

Image Encryption Paillier Homomorphic Cryptosystem

Zainab Mohammed Muneef; Hala bahjat; Abdulmohsen Jaber Abdulhoseen

Volume 21, Issue 4 , December 2021, Page 29-36

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.3

Abstract
  With the increasing use of media in communications, both academia and industry pay attention to the content security of digital images. This research presents a Homomorphic cryptosystem-based asymmetric picture encryption technique (Paillier). The algorithm is used for securing images that transmit over ...  Read More ...

Data Hiding by Unsupervised Machine Learning Using Clustering K-mean Technique

Hiba Hamdi Hassan; Maisa'a Abid Ali Khodher

Volume 21, Issue 4 , December 2021, Page 37-49

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.4

Abstract
  Steganography includes hiding text, image, or any sentient information inside another image, video, or audio. It aims to increase individuals’ use of social media, the internet and web networks to securely transmit information between sender and receiver and an attacker will not be able to detect ...  Read More ...

An Enhanced Hybrid Edge-Cloud algorithm For Reducing IoT Service Delay

Rawaa Ammar Razooqi; hassan Jaleel; Gaida Muttasher

Volume 21, Issue 4 , December 2021, Page 50-59

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.5

Abstract
  The Savvy Manufacturing plant could be a concept that communicates the conclusion goal of fabricating digitization. A Smart Factory, within the most common sense, profoundly digitized shop floor that collects and offers information persistently through associated computers, gadgets, and generations. ...  Read More ...

Load Balancing and Detection of Distributed Denial of Service Attacks Using Entropy Detection

Hiba Salah Yaseen; Ahmed Al-Saadi

Volume 21, Issue 4 , December 2021, Page 60-73

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.6

Abstract
  Software Defined Network (SDN) is a modern network architecture that has a centralized controller. It is more flexible, and programmable due to the separation of the control plane from the data plane. However, Distributed Denial of Service (DDoS) attacks is one of the dangers that the SDN network is ...  Read More ...

Study of Cyber Security Effects on Wireless Sensors Networks

Shaymaa M. Naser; Yossra Hussain Ali

Volume 21, Issue 4 , December 2021, Page 74-81

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.7

Abstract
  In recent two years, information systems have been adopted in most fields oflife due to the health state around the world. At the same time, the risk factor ofsecurity attacks is increased sharply as well. These attacks consider different actionstoward damaging the data of systems or even making down ...  Read More ...

Computer
Speaker Recognition System Based on Mel Frequency Cepstral Coefficient and Four Features

Ashraf Tahseen Ali; Hasanen Abdullah; Mohammed Natiq Fadhil

Volume 21, Issue 4 , December 2021, Page 82-89

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.8

Abstract
  Biometrics signs are the most important factor in the human recognition field and considered an effective technique for person authentication systems. Voice recognition is a popular method to use due to its ease of implementation and acceptable effectiveness. This research paper will introduce a speaker ...  Read More ...

3D Textured Model Encryption Using 2D Logistic and 3D Lorenz Chaotic Map

Nashwan Alsalam Ali; Abdul Monem S Rahma; Shaimaa h. Shaker

Volume 21, Issue 4 , December 2021, Page 90-103

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.9

Abstract
  The widespread of recent multimedia, including various 3D model applications in different domains of areas, may lead to 3D models being stolen and attacked by hackers. Moreover, 3D models must be protected from unauthorized users and when transmitting over the internet. Nowadays the 3D model protection ...  Read More ...

Computer
Timetabling Problem Solving Based on Improved Meerkat Clan Algorithm (IMCA)

Mohammed Abdulwahid Jebur; Hasanen Abdullah

Volume 21, Issue 4 , December 2021, Page 104-113

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.4.10

Abstract
  The university courses timetabling problem (UCTP) is a big topic among academics and institutions since it occurs every academic year. In general, UCTP is the distribution of events across slots time for each room based on a list of restrictions provided in one semester, such as (hard constraint and ...  Read More ...