Volume 23 (2023)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
A Convolutional Neural Network for Detecting COVID-19 from Chest X-ray Images

Basma Wael Abdullah; Hanaa Mohsin Ahmed

Volume 22, Issue 3 , September 2022, Page 1-14

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.1

Abstract
  since the global pandemic of COVID-19 has spread out, the use of Artificial Intelligence to analyze Chest X-Ray (CXR) image for COVID-19 diagnosis and patient treatment is becoming more important. This research hypothesized that using COVID19 radiographic changes in the X-Ray images. Artificial Intelligence ...  Read More ...

Computer
Meerkat Clan-Based Feature Selection in Random Forest Algorithm for IoT Intrusion Detection

Adil Yousef Hussein; Ahmed T. Sadiq

Volume 22, Issue 3 , September 2022, Page 15-24

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.2

Abstract
  Hackerscanconductmoredestructivecyber-attacksthankstotherapidspread of Internet of Things (IoT) devices, posing significant security risks for users. Through a malicious process, the attacker intended to exhaust the capital of the target IoT network. Researchers and company owners are concerned about ...  Read More ...

Computer
An Efficient Electronic Payment Using Biometric Authentication

Ahmed Abdul Karim Talib; Aymen Dawood Salman

Volume 22, Issue 3 , September 2022, Page 25-33

Abstract
  Traditional identification techniques for electronic payments, such as the Personal Identification Number (PIN), are becoming outdated and unsafe, while mobile payments are becoming more popular and widely used. It presents a risk to issuers since there is no reliable consumer verification method available, ...  Read More ...

Control
Robust Sensor Fault Estimation for Control Systems Affected by Friction Force

Ruaa Hameed Ahmed; Montadher Sami Shaker

Volume 22, Issue 3 , September 2022, Page 34-47

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.4

Abstract
  The paper presents an observer-based estimation of sensor fault for control systems affected by friction force. In such systems, the non-linearity of friction force leads to deteriorating sensor fault estimation capability of the observer. Hence, the challenge is to design an observer capable of attaining ...  Read More ...

Computer
RCAE_BFV: Retrieve Encrypted Images using Convolution AutoEncoder and BFV

Emad M. Alsaedi; Alaa Kadhim Farhan

Volume 22, Issue 3 , September 2022, Page 48-61

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.5

Abstract
  Content-Based Image Retrieval (CBIR) is an actual application in computer vision, which retrieves similar images from a database. Deep Learning (DL) is essential in many applications, including image retrieval applications. However, encryption techniques are used to protect data privacy because these ...  Read More ...

Computer
Intelligent Parameter Tuning using Deep Q-network in Adaptive Queue Management Systems

Ayman Basheer Yousif; Hassan Hassan Jaleel; Ghaida Muttasher

Volume 22, Issue 3 , September 2022, Page 62-71

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.6

Abstract
  Network traffic has risen in recent years to the point that it is obviously and astonishingly in 2020, with the increase predicted to double in the following days. Up to 23 Teraa bit every month is an incredible amount. The Active Queue Management (AQM) algorithm is one of the most significant study ...  Read More ...

Communication
Collision Prediction Based on Vehicular Communication System

Abdulqader Falhi Jabbar; Rana Fareed Ghani; Asia Ali Salman

Volume 22, Issue 3 , September 2022, Page 72-80

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.7

Abstract
  Road traffic accidents are one of the leading causes of mortality globally. Reducing the number of traffic-related incidents has become a serious socio-economic and public health problem, given the ever-increasing number of cars on the road. As a result, this paper proposes an intelligent vehicle prediction ...  Read More ...

Computer
A Framework for Predicting Airfare Prices Using Machine Learning

Heba Mohammed Fadhil; Mohammed Najm Abdullah; Mohammed Issam Younis

Volume 22, Issue 3 , September 2022, Page 81-96

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.8

Abstract
  Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques ...  Read More ...

Computer
Hybridized Dimensionality Reduction Method for Machine Learning based Web Pages Classification

Thabit Sulaiman Sabbah

Volume 22, Issue 3 , September 2022, Page 97-110

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.9

Abstract
  Feature space high dimensionality is a well-known problem in text classification and web mining domains, it is caused mainly by the large number of vocabularies contained within web documents. Several methods were applied to select the most useful and important features over the years; however, the performance ...  Read More ...

Computer
Unmasking Deepfakes Based on Deep Learning and Noise Residuals

Wildan J. Jameel; Suhad M. Kadhem; Ayad R. Abbas

Volume 22, Issue 3 , September 2022, Page 111-117

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.10

Abstract
  The main reason for the emergence of a deepfake (deep learning and fake) term is the evolution in artificial intelligence techniques, especially deep learning. Deep learning algorithms, which auto-solve problems when giving large sets of data, are used to swap faces in digital media to create fake media ...  Read More ...

Computer
Automatic Quality of Experience Measuring for Video Conference in Real-Time

Roaa E. Alhassany; Rana F. Ghani

Volume 22, Issue 3 , September 2022, Page 118-127

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.11

Abstract
  In recent years, especially with COVID-19, video conference applications have become very important. Millions of peoples around the world have become to communicate with each other through using video conference applications. The most critical factor in the performance success of video conference applications ...  Read More ...

Computer
Optimizing Artificial Neural Networks Using Levy- Chaotic Mapping on Wolf Pack Optimization Algorithm for Detect Driving Sleepiness

Sarah Saadoon Jasim; Alia Karim Abdul Hassan; Scott Turner

Volume 22, Issue 3 , September 2022, Page 128-136

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.12

Abstract
  Artificial Neural Networks (ANNs) are utilized to solve a variety of problems in many domains. In this type of network, training and selecting parameters that define networks architecture play an important role in enhancing the accuracy of the network's output; Therefore, Prior to training, those parameters ...  Read More ...

Computer
SNOW3G Modified by using PLL Algorithms in Magic Cube

Rana Mohammed Zaki; Hala Bahjat Abdul wahab

Volume 22, Issue 3 , September 2022, Page 137-146

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.13

Abstract
  Thomas and Patrik are working on a stream cipher called SNOW 3G. In 2006, it was chosen as the centerpiece of a new set of confidentiality and integrity algorithms for the Universal Mobile Telecommunications System (UMTS). In 2008, Böhm published an article named "Statistical Evaluation of Stream Cipher ...  Read More ...

Computer
The Techniques of Based Internet Key Exchange (IKE) Protocol to Secure Key Negotiation

Zainab Kareem Mahyob; Raheem AbdulSahib Ogla; Suhiar Mohammed Zeki

Volume 22, Issue 3 , September 2022, Page 147-154

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.3.14

Abstract
  The Internet is a massive network that connects millions of users from all over the world and the data transmitted via it needs great protection, especially since that are in the age of big data. To solve part of this problem, IPsec was utilized, which is a set of protocols necessary to offer security ...  Read More ...