Volume 24 (2024)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Computer
A Review of Face Detection Methods Based on Feature Approach

Dina M. Abdulhussien; Laith J. Saud

Volume 23, Issue 3 , September 2023, Page 1-9

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.1

Abstract
  Face detection technology is the first and essential step for facial-based analysis algorithms such as face recognition, face feature extraction, face alignment, face enhancement, and face parsing. That is besides serving other applications related to human intention and act analysis such as facial expression ...  Read More ...

Computer
Metadata Scraping Using Programmable Customized Search Engine

Esraa Q. Naamha; Matheel E. Abdulmunim

Volume 23, Issue 3 , September 2023, Page 10-25

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.2

Abstract
  The World Wide Web (WWW) is a vast repository of knowledge, including intellectual, social, financial, and security-related data. Online information is typically accessed for instructional purposes. On the internet, information is accessible in a variety of formats and access interfaces. ...  Read More ...

Computer
Decentralized IoT System Based on Blockchain and Homomorphic Technologies

Mohanad A. Mohammed; Hala B. Abdul Wahab

Volume 23, Issue 3 , September 2023, Page 26-38

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.3

Abstract
  decentralization within IoT eliminates the need to use distributed networks within IoT to communicate only with servers that may face difficulties related to the internet, vulnerabilities, DDOS, or hijacks, merging blockchain with IoT converted the IoT system into a decentralized with many benefits and ...  Read More ...

Computer
Big Data Aggregation, Visualization and Clustering for Smart Grid in Smart City using Machine Learning

Haider M. Al-Mashhadi; Hussain Jassim Fahad

Volume 23, Issue 3 , September 2023, Page 39-53

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.4

Abstract
  Electrical energy is one of the most important components of life today where different fields depend on it. The field of electrical energy distribution (electricity network), which transmits electrical energy from sources to consumers, is one of the most important areas that need to be developed and ...  Read More ...

Control
Distinct Architectures of Feed Forward Neural Network for Implementing A Human Swing Leg System

Aws M Abdullah; Farah F. Alkhalid; Ali Mohsin Kaittan

Volume 23, Issue 3 , September 2023, Page 54-67

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.5

Abstract
  The artificial intelligence techniques such as neural networks and fuzzy systems play an important role to disconnect flexion & expansion of the swing leg, the earth response force of the other foot has been redesigned. Underthat paper, we think the fuzzy controller plan issue for yield following ...  Read More ...

Computer
A Review on Utilizing Big Data Techniques for Performance Improvement in Software Defined Networking

Sama Salam Samaan; Hassan Awheed Jeiad

Volume 23, Issue 3 , September 2023, Page 68-79

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.6

Abstract
  Traditional network abilities have a drastic shortage in the current networking world. Software-Defined Networking (SDN) is a revival development in the networking domain that provides separation of control and data planes, enlarges the data plane granularity, and simplifies the network devices. All ...  Read More ...

Computer
A New Perspective for Mining COCO Dataset

Suha Dh. Athab; Kesra Nermend; Abdulamir Abdullah Karim

Volume 23, Issue 3 , September 2023, Page 80-89

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.7

Abstract
  Microsoft Common Objects in Context (COCO) is a huge image dataset that has over 300 k images belonging to more than ninety-one classes. COCO has valuable information in the field of detection, segmentation, classification, and tagging; but the COCO dataset suffers from being unorganized, and classes ...  Read More ...

Communication
Design of Ultra Dense WDM Optical Communication System to Reduce Signal Impairments Using DCF and Repeater Techniques

Dina S Akram; Haydar M. AL-Tamimi

Volume 23, Issue 3 , September 2023, Page 90-103

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.8

Abstract
  Linear and non-linear impairments are the major problems that affected the dense wavelength division multiplexing (DWDM) system performance. In this simulation designs, two different compensation techniques have been proposed to eliminate signal impairments. The repeater technique was ...  Read More ...

Computer
Efficient Iris Image Recognition System Based on Machine Learning Approach

Hind Moutaz Al-Dabbas; Raghad Abdulaali Azeez; Akbas Ezaldeen Ali

Volume 23, Issue 3 , September 2023, Page 104-114

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.9

Abstract
  Iris identification is a well‐ known technology used to detect striking biometric identification techniques for recognizing human beings based on physical behavior. The texture of the iris is essential and its anatomy varies from individual to individual. Humans have distinctive physical characteristics ...  Read More ...

Computer
A Survey of Graph Techniques Applied in Software Defined Networking

Sama Salam Samaan; Hassan Awheed Jeiad

Volume 23, Issue 3 , September 2023, Page 115-124

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.10

Abstract
  Modelling computer networks in general, particularly Software Defined Networking (SDN) as a graph, is beneficial in network planning and design, configuration management, traffic analysis, and security. According to the dynamic nature of SDN, it needs a fast response due to the rapid changes in the network ...  Read More ...

Computer
In-Depth Assessment of Cryptographic Algorithms Namely DES, 3DES, AES, RSA, and Blowfish

Samara Mohammed Radhi; Raheem Ogla

Volume 23, Issue 3 , September 2023, Page 125-138

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.11

Abstract
  Securing information is difficult in the modern internet era, asterabytes of data are generated daily online and online transactions occurvirtually every second. The current world's information security relies heavily oncryptography, which makes the internet a safer environment. Making informationincoherent ...  Read More ...

Communication
Review: Dual Method Cryptography and Steganography in Video Frames in IoT

Rawia Abdullah Muhammed; Maisa'a Abid Ali Al-Dabbas; Ashwak Mahmood Alabaichi

Volume 23, Issue 3 , September 2023, Page 139-155

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.12

Abstract
  The Internet of things (IoT) is one of those emerging technologies, which aregoing to rule the world in the next few decades. The IoT environment not only enablesHuman to Machine interaction but also fosters Machine to Machine connectivity.Numerous IoT devices have poor security and insufficient computing ...  Read More ...

Computer
Real-Time Multi-Agent Mobile Robot based on A Client-Server Model

Rasheed Abdul Ameer Rasheed; Ahmed Sabah Al-Araji; Mohammed Najm Abdullah; Hamed S Al-Raweshidy

Volume 23, Issue 3 , September 2023, Page 156-170

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.13

Abstract
  A client-server network is one of the most important topics in a computer network. In this work, a real-time computer control system is designed based on the Client-Server Model for a Multi-Agent Mobile Robot System (CSM-MAMRS) and is applied to a building that consists of (N) floors and uses one mobile ...  Read More ...

Control
A Review of Smart Structures Vibration Control Strategies

Imad Zuhair; Hasan M Alwan; Hussain M. Al-Khafaji

Volume 23, Issue 3 , September 2023, Page 171-185

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.14

Abstract
  The expert system and artificial intelligence are still important modern technologies. A structure can modify its behavior under dynamic stresses by using active controls. The term "intelligent" or "smart" structures refers to these self-modifying structures. The structural engineering discipline may ...  Read More ...

Computer
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique

Yasmin A. Hassan; Abdul Monem S. Rahma

Volume 23, Issue 3 , September 2023, Page 186-196

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.15

Abstract
  Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and ...  Read More ...