Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
A Proposed Algorithm for Hiding a Text in an Image Using QR Code

Haider Saeed Wdhayeh; Raghad Abdulaali Azeez; Athraa Jasim Mohammed

Volume 23, Issue 1 , March 2023, Page 1-9

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.1

Abstract
  In this paper, an algorithm to hide information in an image using QR code technology is presented. QR Code “QUICK RESPONSE CODE” is a two-dimensional array that can include different types of data and was first developed in 1993 for the Japanese Toyota Corporation for the purpose of tracking ...  Read More ...

Communication
Spectral And Energy Efficiency Analysis For Beamforming Optimization Objectives For Wireless Massive MIMO Systems

Zaid Hashim Jaber; Dheyaa Jasim Kadhim; Ahmed Sabah Al-Araji

Volume 23, Issue 1 , March 2023, Page 10-22

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.2

Abstract
  Massive Multiple-Input Multiple-Output (MIMO) is an extension of the conventional MIMO in the wireless systems which improves both of the access density and the spectral efficiency by adding a massive number of antenna array at the base station (BS). Massive MIMO increases the spectral efficiency by ...  Read More ...

Computer
Data Analytics and Blockchain: A Review

Safa S. Abdul-Jabbar; Alaa K. Farhan; Rana F. Ghani

Volume 23, Issue 1 , March 2023, Page 23-34

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.3

Abstract
  Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships ...  Read More ...

Computer
Architecture of Deep Learning and Its Applications

Afrah Salman Dawood; Zena Mohammed Faris

Volume 23, Issue 1 , March 2023, Page 35-56

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.4

Abstract
  Recently, Deep Learning (DL) has accomplished enormous prosperity in various areas, like natural language processing (NLP), image processing, different medical issues and computer vision. Both Machine Learning (ML) and DL as compared to traditional methods, can learn and make better and enhanced use ...  Read More ...

Computer
A Review: E-voting Security in Mobile Fog computing

Asmaa Ibrahim Hussieen; Abeer Tariq MaoLood; Ekhlas Khalaf Gbash

Volume 23, Issue 1 , March 2023, Page 57-68

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.5

Abstract
  Conventional voting activities are often replaced by electronic voting (EV) in light of the quick expansion of the Internet. For a variety of reasons, various nations have lately switched to EV rather than conventional voting. Different EV systems were presented up to this point. In both practical and ...  Read More ...

Control
Modified Tracking Differentiator for Enhancing the Performance of Exoskeleton Knee System Based on Active Disturbance Rejection Control

Nasir Ahmed Alawad; Amjad J Humaidi; Ahmed Sabah Alarejee

Volume 23, Issue 1 , March 2023, Page 69-83

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.6

Abstract
  Exoskeleton robots help users with mechanical forces by recognizing their intentions, and they require a lot of energy efficiency, a lot of load capacity, and a good fit. A basic one degree of freedom (DOF) construction was devised in this work, which was mostly used in the knees of exoskeleton robots. ...  Read More ...

Communication
Interference Effect Evaluation with Radio Over Fiber In 5G Mobile System

Khasraw A. Abdulrahman; Jalal J Hamad Ameen

Volume 23, Issue 1 , March 2023, Page 84-94

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.7

Abstract
  The fifth generation (5G) of mobile technology is emerging as a advance communication network, delivering elevated speeds, coverage and reliability, this technology like other technologies not clear from drawbacks and limitations, 5G mobile system like other mobile systems 4G, 3G and 2G affected by interference ...  Read More ...

Communication
Performance Evaluation of 64 x 64 c Node-B Antenna Beamforming for 5G Mobile System

Akam Hussein Hasan; Jalal J Hamad Ameen

Volume 23, Issue 1 , March 2023, Page 95-103

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.8

Abstract
  Since the need for larger data rates and wireless system radio networks has increased, several organizations in this industry have started to develop and implement their 5G mobile technology scenarios. Since mobile telecommunications' quick expansion has motivated companies to constantly plan and work ...  Read More ...

Computer
Deep Learning Based on Attention in Semantic Segmentation: An Introductory Survey

Muna Khalaf; Ban N. Dhannoon

Volume 23, Issue 1 , March 2023, Page 104-114

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.9

Abstract
  Semantic segmentation refers to labeling each pixel in the scene to its belonging object. It is a critical task for many computer vision applications that requires scene understanding because It attempts to mimic human perceptual grouping. Despite the unremitting efforts in this field, it is still a ...  Read More ...

Control
Comparative Between Backstepping and Adaptive Backstepping Control for Controlling Prosthetic Knee

Mayyasah Ali Salman; Saleem Khalefa Kadhim

Volume 23, Issue 1 , March 2023, Page 115-131

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.10

Abstract
  The lower limb amputees are increasing day by day. This has led to an increase in research in the field of prosthetic knee. In this work, a prosthetic knee was designed and developed to assist human movements and more quality of life for millions of individuals who have lost lower limbs. The dynamic ...  Read More ...

Communication
Review on Fractal Video and Image Compression Techniques

Baydaa Sh. Z. Abood; Hanan A. R. Akkar; Amean Sh. Al-Safi

Volume 23, Issue 1 , March 2023, Page 132-142

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.11

Abstract
  Compression of images process is a step in the image processing. It is concerned with the transmission and storage of digitally created images. Fractal coding is a potential image and video compression approach with good reconstruction fidelity and relatively large compression ratios, because of its ...  Read More ...

Computer
Dynamic Model Based on the Gaming Argumentation Framework (DGAF): Foreign Exchange Market as A Case of Study

Adnan T. Kareem; Hasanen S. Abdullah; Ahmed T. Sadiq

Volume 23, Issue 1 , March 2023, Page 143-164

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.12

Abstract
  argumentation has become an attraction recently, because it is widely used in decision-making, at 1994 Dung invented a new argumentation model, called Argumentation Framework AF. This system investigates assaults of arguments, and it also works away on attributes, this model is designed to take care ...  Read More ...

Communication
A Review of Modern and Recent Studies on the Low-Density Parity-Check Technology Approach

Noora Nazar kamal; Qusay F. Al-Doori; Omar Alani

Volume 23, Issue 1 , March 2023, Page 165-178

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.13

Abstract
  Data theory coding is an excellent and well-known branch of study that has produced various crucial solutionsto the insoluble challenges of safe data transfers. Last improvements in detecting error techniques have resulted in a significant increase in the use of low-density parity-check (LDPC) code to ...  Read More ...

Control
Discontinuous Control Analysis and Design for Temperature Control of Thermal System

Bashar F. Midhat

Volume 23, Issue 1 , March 2023, Page 179-188

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.14

Abstract
  Temperature control system is a widely applied process since temperature plays a major role in our life starting from room temperature conditioning to various industrial and medical applications. In this paper, a control algorithm is proposed for controlling the temperature of a certain process. Analysis ...  Read More ...

Communication
D-GIFT: Cryptography Algorithm Development Using Dynamic DNA and A Chaos Map

Ghada K. Emad; Soukaena Hassan Hashiem

Volume 23, Issue 1 , March 2023, Page 189-197

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.1.15

Abstract
  Recently, the growth of data transmission through various networks has the necessity for an elevated level of security. Encryption is one of the essential technologies for protecting and ensuring the integrity of IoT devices. Secure communication among constrained devices is critical during data transmission ...  Read More ...