Volume 23 (2023)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
Color Visual Cryptography Based on Three Dimensional Chaotic Map

Shaymaa Ammar Fadhil; Alaa K. Farhan

Volume 22, Issue 2 , June 2022, Page 1-12

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.1

Abstract
  Cryptographic approaches based on chaos theory provide a several new and promising avenues for developing safe picture encryption solutions. This paper aims to complicate the process of decrypting images by adding encryption with keys, this was achieved by applying the principle of the 3D-chaotic system ...  Read More ...

Communication
PAPR Reduction for Different O-OFDM in VLC Using -Law Companding and Convolutional Encoder

Samir M. Hameed; Sinan M. Abdulsatar; Atheer Alaa Sabri

Volume 22, Issue 2 , June 2022, Page 13-26

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.2

Abstract
  Researchers have extensively utilized optical orthogonal frequency division multiplexing (O-OFDM) in visible light communication (VLC) to achieve high data rate transmission for free spectrum bandwidth. The peak-to-average power ratio (PAPR) is the critical challenge for VLC systems-based O-OFDM that ...  Read More ...

Computer
Convolutional Recurrent Neural Networks for Text Lecture Summarization

Muna Ghazi; Matheel Abdulmunim

Volume 22, Issue 2 , June 2022, Page 27-39

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.3

Abstract
  Text summarization can be utilized for variety type of purposes; one of them for summary lecture file. A long document expended long time and large capacity. Since it may contain duplicated information, more over, irrelevant details that take long period to access relevant information. Summarization ...  Read More ...

Computer
Unknown Input Observer-Based Decentralized PID- BFO Algorithm for Interconnected Systems Against Fault Actuator

Noor Safaa; Montadher sami shaker

Volume 22, Issue 2 , June 2022, Page 40-52

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.4

Abstract
  This article presents a decentralized controller/observer for nonlinear large- scale interconnected systems with actuator fault. The proposal integrates a robust proportional-integral-derivative (PID) controller with the unknown input observer (UIO) to achieve closed-loop robustness against the interactions ...  Read More ...

Computer
A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm(Keccak)

Yusra Ahmed Ghareeb; Ekhlas Khalaf Gbashi

Volume 22, Issue 2 , June 2022, Page 53-62

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.5

Abstract
  Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated ...  Read More ...

Computer
Comparative of Viola-Jones and YOLO v3 for Face Detection in Real time

Tameem Obaida; Nidaa Flaih Hassan; Abeer Salim Jamil

Volume 22, Issue 2 , June 2022, Page 63-72

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.6

Abstract
  This Face detection is considering one of the important topics for recognizing human, it is the first step before the face recognition process, it is considered one of the biggest challenges in the field of vision computer. In recent years Many algorithms for detection have appeared, which depend on ...  Read More ...

Computer
Proposed Hybrid Ensemble Learning Algorithms for an Efficient Intrusion Detection System

doaa nteesha mhawi; Soukaena H. hashem

Volume 22, Issue 2 , June 2022, Page 73-84

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.7

Abstract
  Due to sophisticated cyber-attacks, and to produce false alarms on suspicious or unusual behavior to monitor computer resources, Intrusion Detection Systems (IDSs) are required. Hence, Many Machine Learning (ML) and data mining techniques have been proposed to increase the effectiveness of IDSs, whereas ...  Read More ...

Computer
Intrusion Detection System Based on Ada boosting and Bagging Algorithm

Ali khalid Hilool; Soukaena H. hashem; Shatha H. Jafer

Volume 22, Issue 2 , June 2022, Page 85-95

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.8

Abstract
  Computer worms execute damaging functions in the network systems, compromising system security. Although researchers use a variety of methods to detect worms and prevent their spread. Detecting worms remains a challenge for the following reasons: First, a huge volume of irrelevant data affects classification ...  Read More ...

Computer
Designing a New Lightweight AES Algorithm to Improve the Security of the IoT Environment

Sameeh Abdulghafour Jassim; Alaa K. Farhan

Volume 22, Issue 2 , June 2022, Page 96-108

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.9

Abstract
  Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. ...  Read More ...

Control
Optimal Linear Quadratic Control for Knee-Ankle Orthosis System

Fatimah I. Hussein; Safanah Raafat

Volume 22, Issue 2 , June 2022, Page 109-124

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.10

Abstract
  The control technique for an exoskeleton system for lower limb rehabilitation is complicated, and numerous internal and external elements must be taken into account, in addition to the uncertainties in the system model. In this paper, through the analysis of the lower extremity exoskeleton is utilized ...  Read More ...

Computer
Detection And Count of Human Bodies In a Crowd Scene Based on Enhancement Features By Using The YOLO v5 Algorithm

Mohammed Abduljabbar Ali; Abir Jaafar Hussain; Ahmed T. Sadiq

Volume 22, Issue 2 , June 2022, Page 125-134

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.11

Abstract
  Crowd detection has various applications nowadays. However, detecting humans in crowded circumstances is difficult because the features of different objects conflict, making cross-state detection impossible. Detectors in the overlapping zone may therefore overreact. The proposal uses the YOLO v5 (You ...  Read More ...

Computer
Survey: Recent Techniques of Image Fragile Watermarking

hala khalid Hussien; Ra'ad A. Muhajjar; Bashar saadoon mahdi

Volume 22, Issue 2 , June 2022, Page 135-145

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.12

Abstract
  Ease of access to digital images and the many images editing programs available, like photoshop. All this makes the Issue of protecting images against modification becomes essential. Some images contain crucial information that can risk a patient's life, such as medical images and e- government images ...  Read More ...