Volume 24 (2024)
Volume 23 (2023)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
Machine Learning Techniques for Vehicle Detection

Maryam Raad Shihab; Rana Fareed Ghani; Athraa Jasim Mohammed

Volume 22, Issue 4 , December 2022, Page 1-12

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.1

Abstract
  The traffic surveillance system is a type of intelligent system of traffic control. Traffic control provides solutions to most problems faced by people. It helps to monitor, detect traffic congestion and traffic accidents. As science evolved, it became possible to control traffic using video surveillance. ...  Read More ...

Computer
Predicting Alzheimer's Disease Using Filter Feature Selection Method

Shaymaa Taha Ahmed; Suhad Malallah Kadhem

Volume 22, Issue 4 , December 2022, Page 13-27

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.2

Abstract
  Alzheimer’s disease (AD) is caused by multiple variables. Alzheimer's disease development and progression are influenced by genetic variants. The molecular pathways causing Alzheimer's disease are still poorly understood. In Alzheimer's disease research, determining an effective and reliable diagnosis ...  Read More ...

Computer
Systematic Review on Cyber-Security Applications

Shaymaa Mahmood Naser; Yossra Hussain Ali

Volume 22, Issue 4 , December 2022, Page 28-36

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.3

Abstract
  Cybersecurity systems have been taken into account in modern information systems and methods. This is due to the increase in electronic attacks on storage information in terms of transmission, reception and storage. Therefore, the need to produce such systems in a complete way to prevent their penetration ...  Read More ...

Control
A Survey of Power Consumption Minimization in WSN Using Feedback Control Strategies

Ali M. Majeed; Safanah M. Raafat; Najat M. Ramadhan

Volume 22, Issue 4 , December 2022, Page 37-47

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.4

Abstract
  Wireless Sensor Network (WSN) represents a key network in the present and future Internet of Things (IoT) technology. WSN has an uncountable number of applications and is commonly used to aggregate information and control the physical environment remotely through small embedded devices known as wireless ...  Read More ...

Computer
Medical Image Enhancement Techniques

Dhuha Abd Almoanf; Shaimaa H. Shaker

Volume 22, Issue 4 , December 2022, Page 48-59

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.5

Abstract
  Computed tomography (CT) is used to diagnose diseases and tumors. A special dye called contrast material is used in CT scans to assist emphasize the parts of the body being examined. Therefore, an enhancement technique to improve CT images' degradation is needed. This paper aims to present a method to ...  Read More ...

Computer
Combinatorial Testing Approaches: A Systematic Review

Heba Mohammed Fadhil; Mohammed Najm Abdullah; Mohammed Issam Younis

Volume 22, Issue 4 , December 2022, Page 60-79

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.6

Abstract
  Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and ...  Read More ...

Control
Fractional Order Fuzzy Like PID Controller Design for Three Links Rigid Robot Manipulator

Hadeel I. Abdulameer; Mohamed J. Mohamed

Volume 22, Issue 4 , December 2022, Page 80-98

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.7

Abstract
  Four Fractional/Integer Order Fuzzy Proportional Integral Derivative controller structures are designed in this study to successfully control a nonlinear, coupled, multi-input, multi-output, three-link rigid robotic manipulator system. The performance of Fractional Order Fuzzy Proportional Integral Derivative ...  Read More ...

Control
A Comparative Study of Graph Search Algorithms for Planar Manipulator to Avoid Obstacle Collision

Mustafa Laith Muhammed; Amjad Jaleel Humaidi; Enass Hassan Flaieh

Volume 22, Issue 4 , December 2022, Page 99-114

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.8

Abstract
  The search algorithms are characterized by their ability to find the optimal path in a short calculation time. In this study, a comparative analysis has been conducted to perform path planning of planar manipulator for static obstacle avoidance based on graph search algorithms. Four methods have been ...  Read More ...

Computer
A Hybrid Digital Image Watermarking By Using DWT and LSB Method

Zainab F. Makhrib; Abdulamir A. karim

Volume 22, Issue 4 , December 2022, Page 115-126

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.9

Abstract
  The Digital watermarking is a field of information hiding that entails hiding the crucial information in the original data in order to prevent illegal duplication and distribution of multimedia data such as image, video, text and ect.. In this paper, we present two techniques to embed watermarks in the ...  Read More ...

Computer
A Proposed Authentication Method for Document in Blockchain Based E-Government System

Zainab A. Kamal; Rana F. Ghani

Volume 22, Issue 4 , December 2022, Page 127-139

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.10

Abstract
  the primary concerns with manual transactions include corruption, lack oftransparency, fraud, and mismanagement of distribution operations, all of which arecreated by traditional centralized applications, necessitating the migration to blockchaintechnology. In this work, a system is presented to secure ...  Read More ...

Control
Machine Learning Approach Based on Automated Classification for Leg Rehabilitation

Ayat Naji Hussain; Sahar Adil Abboud; Basim Abdul baki Jumaa; Mohammed Najm Abdullah

Volume 22, Issue 4 , December 2022, Page 140-151

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.11

Abstract
  Human gait data follows distinct and identifiable patterns that are critical for movement analysis and evaluation Like other biological signals. The success of a rehabilitation program is dependent on the execution of proper progress monitoring. To ensure success, diagnosis of gait anomalies, as well ...  Read More ...

Computer
Cardiovascular Patients Monitoring Using Internet of Things And Decision Tree

Rasha Ismail Ahmed; Rasha Mohammed Mohsin Mohammed Mohsin; Rana Fareed Ghani

Volume 22, Issue 4 , December 2022, Page 152-159

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.12

Abstract
  The rapid growth of the human population and the spread of many bad habits affect the health of human beings, this leads to many health problems, such as heart disease, blood pressure, and diabetes. Some of these diseases require earlier detection and fast treatment, to avoid major risks, such as permanent ...  Read More ...

Computer
Image Protection Using Genetic Algorithm and Cipher Technique

Raad Abdul Ameer Qasim; Bashar Saadoon Mahdi

Volume 22, Issue 4 , December 2022, Page 160-166

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.13

Abstract
  Image Protection is one of the most important issues that have created problems in technology challenges in the past and present years, whether they are stored or when sent to other parties. And how to develop the techniques adopted in encrypting it, devise new methods, or integrate the available technologies ...  Read More ...

Computer
Software Defined Network Implementation by Using OpenDayLight Centralized Controller

Salah Sabah Abed; Mohammed Natiq Fadhil

Volume 22, Issue 4 , December 2022, Page 167-176

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.14

Abstract
  The most attractive study framework among academics is Software Define Networking Networking SDN, which aims to create the Internet with an architecture- independent architecture that will lead to the most significant advances in the network field. This can solve many network problems to deal with high ...  Read More ...

Computer
Generating Honeyword Based on A Proposed Bees Algorithm

Yasser A. Yasser; Ahmed T. Sadiq; Wasim AlHamdani

Volume 22, Issue 4 , December 2022, Page 177-191

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.4.15

Abstract
  Honeywords are fake passwords that are typically companions to the real password “sugarword.” The honeyword technique is a password cracking detection technique that works effectively to improve the security of hashed passwords by making password cracking simpler to detect. The password database ...  Read More ...